Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments

Youakim Badr, Salim Hariri, Youssif Al-Nashif, Erik Blasch

Research output: Contribution to journalConference articlepeer-review

27 Scopus citations

Abstract

Future crisis management systems need resilient and trustworthy infrastructures to quickly develop reliable applications and processes, and ensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information; crisis management systems tend to be highly vulnerable and subject to unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This paper presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides a set of resilient DDDAS-As-A Service (rDaaS) components to build secure and trusted adaptable crisis processes. The rDaaS also ensures resilience and security by obfuscating the execution environment and applying Behavior Software Encryption and Moving Technique Defense. A simulation environment for a nuclear plant crisis management case study is illustrated to build resilient and trusted crisis response processes.

Original languageEnglish (US)
Pages (from-to)2623-2637
Number of pages15
JournalProcedia Computer Science
Volume51
Issue number1
DOIs
StatePublished - 2015
EventInternational Conference on Computational Science, ICCS 2002 - Amsterdam, Netherlands
Duration: Apr 21 2002Apr 24 2002

Keywords

  • Cloud computing
  • RDaaS
  • Resilience
  • Service-oriented computing
  • Trust and security

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments'. Together they form a unique fingerprint.

Cite this