2015 Fiscal Year Research-status Report
Research and Development of a Cyber-I Open Service Platform
Project/Area Number |
26330350
|
Research Institution | Hosei University |
Principal Investigator |
Jianhua Ma 法政大学, 情報科学部, 教授 (70295426)
|
Co-Investigator(Kenkyū-buntansha) |
Huang Runhe 法政大学, 情報科学部, 教授 (00254102)
|
Project Period (FY) |
2014-04-01 – 2017-03-31
|
Keywords | Web Computing / Ubiquitous Computing / Wearable Computing / User Modeling / Cyber-I / Personalized Service |
Outline of Annual Research Achievements |
In 2015 fiscal year, our main work was focused on personal data collections using smartphone and wearables as well as privacy-preserved and best-effort provisions of Cyber-I information to personalized services.
For personal data management and personality analysis, we have developed a smartphone based client-server system. The smartphone is functioned as not only a source of personal data but also a gateway to manage other wearables and communicate with a server that keeps personal data in a larger amount and a longer period. A multi-security mechanism is implemented to ensure data security in collection, transmission and storage. Personality analysis is made from data normalization, feature extraction and clustering, to personality computation based on sociological personality theories.
In order to provide Cyber-I information to personalized services, there are two main problems should be solved. One is the privacy protection problem. Methods should be designed to provide privacy preservation for user. Another one is the best-effort issue which is about how to make full use of existing Cyber-I information to satisfy personalized services as much as possible. Thus, we studied and developed a Cyber-I Information Provision System (CIPS) to provide Cyber-I information to personalized services by best-efforts provisions, simultaneously provide privacy preservation for Cyber-I.
|
Current Status of Research Progress |
Current Status of Research Progress
2: Research has progressed on the whole more than it was originally planned.
Reason
The research in FY 2015 has been done basically as we expected. The developed smartphone-based personal system enables automatic data collections from embedded sensors and apps in a smartphone and wearable devices worn by a user, and upload of the collected data from a SQLite local database in the smartphone to a remote Mongo database in the server. And further, a multi-security mechanism is implemented for authentication and encryption of personal data in the process of identification, collection and transmission. Another developed CPIS system is capable of providing Cyber-I information by using (1) two level privacy protection, i.e., the system level and the Cyber-I level privacy preservation; (2) three best-effort provisions, i.e., existing data provision, related data provision and predicting data preservation. We also studied the Cyber-I modeling with growable mechanisms along with successive collections of personal data from various sources. These research results were presented in IEEE conferences, IUCC-2015, CPSCom-2015 and IoP-2015.
|
Strategy for Future Research Activity |
The research in FY 2016 is planned as the following. (1) Development of a wearable-oriented platform to manage various wearable devices, which will be one kind of main sources to collect personal data. The main research issue is how to deal with heterogeneous devices, operating systems, networks, data formats and so on. (2) Integration of PC-based, smart-based and wearable-oriented platforms to form a general Cyber-I system that will be consisted of three layers: devices, gateways and clouds. All personal data will be kept permanently and securely in the clouds and related tools will be provided to access and use the data by users and Cyber-I application developers. (3) Refinement of Cyber-I modeling and implementation of Cyber-I growth mechanisms including time-driven scheme and data-driven scheme. We are also going to conduct research on analyzing an individual’s basic character, i.e., personality with utilization of personal data collected. The personality may form some kind of seed to guide a Cyber-I’s growth.
|
Causes of Carryover |
There are two main reasons. The one is that this principle researcher was invited to give keynote speeches supported by the two conferences. The other is that many devices haven't been purchased yet since the system was under developing stage.
|
Expenditure Plan for Carryover Budget |
The FY 2016 will be the 3rd year of this project. We should present research achievements in more conferences and thus need more travel expenses. More devices will be purchased to enhance and test our system.
|