Visible to the public Towards trustworthy complex event processing

TitleTowards trustworthy complex event processing
Publication TypeConference Paper
Year of Publication2014
AuthorsHua Chai, Wenbing Zhao
Conference NameSoftware Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on
Date PublishedJune
Keywordsactionable situational knowledge, algorithmic stock trading, application semantics, Big Data, Business, business intelligence, Byzantine Fault Tolerance, complex event processing, Context, Dependable Computing, event processing operations, Fault tolerance, Fault tolerant systems, intelligent computing, Intrusion detection, minimum runtime overhead, mission-critical applications, Runtime, Servers, soft realtime computing, Synchronization, threat analysis, Trust, Trusted Computing, trustworthy
Abstract

Complex event processing has become an important technology for big data and intelligent computing because it facilitates the creation of actionable, situational knowledge from potentially large amount events in soft realtime. Complex event processing can be instrumental for many mission-critical applications, such as business intelligence, algorithmic stock trading, and intrusion detection. Hence, the servers that carry out complex event processing must be made trustworthy. In this paper, we present a threat analysis on complex event processing systems and describe a set of mechanisms that can be used to control various threats. By exploiting the application semantics for typical event processing operations, we are able to design lightweight mechanisms that incur minimum runtime overhead appropriate for soft realtime computing.

DOI10.1109/ICSESS.2014.6933677
Citation Key6933677