<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!-- $RCS$ -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
    There has to be one entity for each item to be referenced. 
    An alternate method (rfc include) is described in the references. -->

<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC5226 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
    please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
    (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="no"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
    (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="info" docName="draft-baba-iot-interconnection-04" ipr="trust200902">
 <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN" 
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
   <!-- The abbreviated title is used in the page header - it is only necessary if the 
        full title is longer than 39 characters -->

   <title abbrev="IoT Interconnections">Study Report on a Framework for Cloud Inter-connection toward the Realization of IoT
   </title>

   <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->

   <author fullname="Hiroyuki Baba" initials="H.B."
           surname="Baba">
     <organization>The University of Tokyo</organization>
     <address>
       <postal>
         <street>Institute of Industrial Science</street>
         <street>4-6-1 Komaba</street>

         <!-- Reorder these if your country does things differently -->

         <city>Meguro-ku</city>

         <region>Tokyo</region>

         <code>153-8505</code>

         <country>Japan</country>
       </postal>

       <email>hbaba@iis.u-tokyo.ac.jp</email>

     </address>
   </author>


   <author fullname="Izaya Miyake" initials="I.M."
           surname="Miyake">
     <organization>IoT Square Inc.</organization>
     <address>
       <postal>
         <street>Hibiya Parkfront.</street>
         <street>2-1-6, Uchisaiwai-cho</street>

         <city>Chiyoda-ku</city>

         <region>Tokyo</region>

         <code>100-0011</code>

         <country>Japan</country>
       </postal>

       <email>izmiyake@iot-sq.com</email>
     </address>
   </author>


   <author fullname="Jun Matsumura" initials="J.M."
           surname="Matsumura">
     <organization>BizMobile Inc.</organization>
     <address>
       <postal>
	 <street>Kanda Business Cube 3F</street>
 	 <street>5-1, Kandatomiyama-cho</street>

	 <city>Chiyoda-ku</city>

	 <region>Tokyo</region>

         <code>101-0043</code>

         <country>Japan</country>
       </postal>

       <email>jumatsum@bizmobile.co.jp</email>
     </address>
   </author>



   <author fullname="Yoshiki Ishida" initials="Y.I."
           surname="Ishida">

     <organization>Japan Network Enabler Corporation</organization>
     <address>
       <postal>
         <street>7F S-GATE Akasaka-Sanno.</street>
         <street>1-8-1 Akasaka</street>

         <city>Minato-ku</city>

         <region>Tokyo</region>

         <code>107-0052</code>

         <country>Japan</country>
       </postal>

       <email>ishida@jpne.co.jp</email>

     </address>
   </author>


   <date year="2020"/>

   <!-- If the month and year are both specified and are the current ones, xml2rfc will fill 
        in the current day for you. If only the current year is specified, xml2rfc will fill 
	 in the current day and month for you. If the year is not the current one, it is 
	 necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the 
	 purpose of calculating the expiry date).  With drafts it is normally sufficient to 
	 specify just the year. -->

   <!-- Meta-data Declarations -->

   <area>General</area>

   <workgroup>Internet Research Task Force</workgroup>

   <!-- WG name at the upperleft corner of the doc,
        IETF is fine for individual submissions.  
	 If this element is not present, the default is "Network Working Group",
        which is used by the RFC Editor as a nod to the history of the IETF. -->

   <keyword>IoT</keyword>
   <keyword>Interconnection</keyword>

   <!-- Keywords will be incorporated into HTML output
        files in a meta tag but they have no effect on text or nroff
        output. If you submit your draft to the RFC Editor, the
        keywords will be used for the search engine. -->

   <abstract>
     <t>
This paper describes issues for solutions through cloud inter-connection
to structural problems, which are called as "silo effects" found in
cloud-connected electric home appliances, housing equipment and sensors in
the face of increasingly accelerated connection of them.  Specifically,
this paper explains an inter-connection agreement considered to be
required for enhancement of cloud inter-connection, what performance
guarantee as well as IoT supervising and management should be, necessity
of inter-connection HUB which is able to provide inter-connection amongst
the preponderance of private cloud groups, and the necessity of a mechanism
to avoid threats that cause danger to users when we make the inter-connection.
     </t>
   </abstract>
 </front>

 <middle>

   <section anchor="introduction" title="Introduction">
     <t>
To date, based on the results of interviews with "Things" companies,
the authors of this paper, the Autors, issued a Problem Statement on IoT
<xref target="ID-baba-iot-problems"></xref>,
and reported on an experiment of WebAPI
<xref target="ID-baba-iot-webapi"></xref>.
With further interviewing and
experiments, various requirements specification on a base for securing
cloud inter-connection in the anticipated IoT society become clearer.
     </t>
     <t>
Currently, the use of various connected devices, hereinafter "IoT
Devices" is largely expected to become a using scene of IoT, and
such IoT Device manufacturers operates their private cloud groups,
the "Cloud", where IoT Devices are connected one after another. It
depends on the manufactures whether API of one cloud is open to a third
party or whether the cloud remains closed just for itself just like a
"silo". However, it is expected that API be open by manufacturers in
charge to third parties in the near future and a large variety of values
shall be created through cloud inter-connection of IoT Devices that are
connected to the other cloud groups with a similar structure. Several
cloud inter-connection services, enabling one cloud with aforementioned
IoT Devices to connect with another cloud with IoT Devices, have already
been provided.
     </t>
     <t>
Thus, by combining cloud-connected IoT Devices, or "connected Things",
just like toy blocks being built freely through cloud inter-connection,
the era for creating a variety of benefits for users seems to approach us.
     </t>
     <t>
As far as users select and handle connected Things on their own response,
there are not any significant issues. However, those whom you cannot
expect IT literacy like elder people should be able to get access to
benefits from IoT. If we stand on such an assumption, there seem to be
many open issues.
    </t>
    <t>
Furthermore, there is a concern of threats that cause danger
to the user's body, property, etc. when we make the inter-connection,
and the mechanism to avoid these threats are necessary.
     </t>
     <t>
The Authors conducted interviews with 9 market players including IoT
service providers and those who were preparing to provide IoT services
and undertook research and summarized issues that those players felt with
regard to cloud inter-connection. In parallel with other researching
experience, we discussed on what framework would be required for doing
IoT service provider businesses at smart houses.
In addition, we organized the basic concept of the mechanism for avoiding threats
when we make the inter-connection.
This paper outlines the findings from such discussions.
     </t>
   </section>

   <section anchor="framework" title="Draft Framework for Cloud Inter-connection">
    <t> 
Not assuming the style where users enjoy combination of the use of IoT
Devices like DIY but assuming the one where so called service providers
offer IoT services to users on a "do-it-for-me (DIFM)" manner, issues
different from DIY style become more patent in the light of responsibility
for customers and business continuity. Those issues are well diversified
but may be summarized into three core categories as follows:
    </t> 

    <t><list style="empty">
    <t>(1) Inter-connection Agreement</t>
    <t>
Commercial cloud inter-connection requires some kind of contracts without
any doubt. Such contracting procedures are very common in the Internet
market. However, manufacturers of home appliances and housing equipment
have no experience and they feel worried.
    </t>


    <t>(2) Operation Confirmation and Operation Monitoring of IoT Devices</t>
    <t>
Once being cloud-connected, it is necessary that not products of one
manufacture but also ones made by others are operated with commands sent
out of one's cloud server. At the development stage of services and
during operation of the services, the operation monitoring of one's
IoT Devices being connected with other's cloud group just with commands
of one's.
    </t>

    <t>(3) Inter-connection Infrastructure</t>
    <t>
Currently a large number of manufacturers proceed with activities in
getting appliances and equipment that used to operate on a standalone
basis connected to the Internet. Those pieces of appliances and equipment
are independent of each other, namely "silos". Therefore, in case
of connecting all those pieces with one another, the number of ways
to connect needs to be N(N-1)/2. To do this, much resources shall be
required. As was seen in telephone and the Internet, if HUBs connecting
with one another are put in place, this issue would be less cumbersome
to some extent.
    </t>
    </list></t>

    <t>
The framework, comprising of above three points, shall be explained in
details in the following chapter.
    </t>
    </section>

   <section anchor="agreement" title="Interconnection Agreement">
   <t>
In the era of IoT, it is desirable to facilitate contracting
between businesses smoothly by preparing a boilerplate format for
an interconnection agreement in advance. As described in the previous
chapter, because of the lack of experience in home appliances and housing
equipment manufacturers, needless to say, any guidelines or formats
would give great comfort to them. The benefits from an interconnection
agreement are to define responsibility of each contracting party and
clarify consent of the parties.
    </t>

    <t>
For example, manufacturers of gas cookers have been working on operational
linkage between a gas cooker and air conditioner in order to harness the
increase of room temperature. Possibly a universal remote controller may
be linked with a gas cooker and then the user can of course operate an
air conditioner with the gas cooker controller. However, unless there
is consent from the manufacturer of the air conditioner on this link
operation, the gas cooker manufacturer seems to hesitate to pursue this
due to his feeling that this is not a fair business behavior.
    </t>

    <t>
Following precedents in the Internet, the contents of the interconnection
agreement include demarcation of responsibility, procedures in operation
and maintenance, cost allocation, technical specifications, and general
prohibitions. In addition to such contents, however, the interconnection
agreement becomes significantly valuable by proving that participating
parties formally agree upon commercial terms of cloud inter-connection.
    </t>

    <t>
Of course, the agreement stipulates terms on malfunctioning of IoT
Devices. For example, there is a structure where an energy management
application located in a cloud group of lighting equipment of Manufacturer
A gives a command to a cloud group of air conditioning equipment of
Manufacturer B. By chance, one air conditioner starts malfunctioning and
the user may call a customer service of Manufacturer A that provides DIFM
energy management services to the user. In this case, problems are 1)
how the fault can be isolated and 2) how this user's report can be
transferred to Manufacturer B if the fault is identified to come from
the other service provider, namely Manufacturer B.
    </t>

    <t>
In case of one manufacture Authors interviewed with, regarding 1) above,
the provider asks the user confirm the lighting operation by its universal
remote controller. If operates, the manufacturer process the user's
report for the moment as a problem of Manufacturer A. If not operates, the
user report could be handled as a problem of Manufacturer B. Manufacture
A does not escalate the user's report to Manufacture B in case of 2)
above. At a glance, this behavior of Manufacture A may not be sincere,
but this is related with the treatment of personal information. Nowadays,
manufacturers collect personal information of the user only in case
they really need such information. Following this information policy,
if a lighting remote controller does not operate the air conditioner,
problem of Manufacture B is suspected. However, Manufacturer A does not
ask the user for his/her personal information. Instead, they ask the
user to call Manufacturer B once again.
    </t>

    <t>
Because there are very extraordinary restrictions on transfer of personal
information among service providers in many countries, aforementioned
treatment of users has to prevail. Contrarily this treatment is totally
opposite to a direction of the one-stop services that users generally
look for.
    </t>

    <t>
Regarding cloud inter-connection, several opinions on issues in business
continuity were heard. Namely, in case of formulating DIFM services
containing services provided by others, the DIFM service providers
are concerned with adverse impacts of the suspension or cancellation of
other providers' services on his/her DIFM services. The interconnection
agreement does not make other providers promise to continue the provision
of the services to the DIFM providers. However, the agreement possibly
defines responsibility of advance notification and a certain lead time
for countermeasure formulation. Therefore, the interconnection agreement
is meaningful in this regard.
    </t>
    </section>


    <section anchor="device" title="IoT Device Operation Confirmation and Monitoring">
    <t>
As was mentioned before, it is prerequisite to secure function of
operation confirmation of related IoT Devices in DIFM business in its
services development and in processing claims of users during service
provision. Even in the experimental service development stage, it is
often necessary to identify where a fault occurs and how to isolate the
fault in case that IoT Device does not perform as it is expected. This
articulates an issue related to inter-operability which is the purpose
of inter-connection. Especially, fault identification and capacity to
recover the identified faults are very significant issues.
   </t>

    <t>
In interviewing with IoT service providers, their capacity to process
users' claims involves the following three functions.
    </t>
    <t><list style="empty">
    <t>1) Monitoring fault incidents;</t>
    <t>2) Fault isolation; and</t>
    <t>3) On-site fault recovery capability</t>
    </list></t>

    <t>
As of now, generally operational confirmation and monitoring functions
comprise the following items.
    </t>
    <t><list style="empty">
    <t>1) Alive monitoring of IoT Devices through confirmation on ping
signal communications;</t>
    <t>2) Understanding of fault situations and history by remote
reading of equipment log; and</t>
    <t>3) Alarm monitoring beyond pre-set threshold levels such as
data traffic volume</t>
    </list></t>

    <t>
However, if the number of IoT Devices increases rapidly from now on,
a set of aforementioned simple monitoring functions may not be efficient
in terms of recovery capacity and cost competitiveness. It is necessary
to re-examine the scalability of current operation and monitoring
systems carefully and introduce required new technologies for effective
operational monitoring of widely proliferated IoT Devices from now on.
   </t>
   </section>


    <section anchor="hub" title="Interconnection HUB">
    <t>
When a large number of manufacturers start the operation of independent
cloud groups, their mutual interconnection becomes more and more complex
as is mentioned before. Telephone and the Internet are supported with
so called interconnection gateway switch and IX structures, achieving
inter-connection among service providers.
    </t>

    <t>
Of course, in the IoT world, similar arrangements to connect among cloud
groups are possible. There is one difference from the era of telephone
and the Internet. This is no existence of inter-connection communication
protocols such as SS#7 and BGP4 here.
    </t>

    <t>
During the interviews with the providers, no one mentioned the necessity
of standardization of inter-cloud interconnection communication
protocols. Contrarily, many providers told that they would utilize
whatever they can use in an extremely businesslike manner. Actually
already existing inter-cloud interconnection services do not specially
focus on this issue. So it is considered that interconnection HUBs would
necessarily be structured in way HUBs accommodate various different
kinds of protocols. In order to connect different protocols that
respective cloud group utilize with one another, the HUB side needs to
be equipped with a driver module matching each of the cloud groups to
be connected. Authors call this as a "printer driver model."
    </t>

    <t>
And according to a research of Authors, interconnection services
already put in place tend to take similar patterns such as inter-cloud
interconnection and application-cloud connection. Therefore it is
necessary to proceed with interconnections with different patterns in
order to make it more universal.
    </t>

    <t>
Service providers as a bussiness that Authors are considering are at least the
following four patterns.  The University of Tokyo has proceeded a research,
recognizing requirements for infrastructures for interconnection of
those items.
    </t>
    <t><list style="empty">
    <t>[Pattern 1] Service providers with their private cloud connecting with IoT devices, </t>
    <t>[Pattern 2] preparing device drivers to IoT devices,</t>
    <t>[Pattern 3] supplying gateways which connect IoT devices, and</t>
    <t>[Pattern 4] application and service providers with with others IoT devices.</t>
    </list></t>

    <t>
     <figure align="center" anchor="structure" title="Structure of IoT HUB.">
       <artwork align="left"><![CDATA[

                                   +-------------------+
[Pattern 1]                        |  IoT HUB          |
   +------+    +--------------+    |                   |
   | IoT  +----+ Private |App|+----+| Cloud |          |
   |Device|    | Cloud        |    || Driver|          |
   +------+    +--------------+    |        +          |
             <----------------+    |        |          |
                   Inter-Cloud|    |    Interface-R    |
               Interconnection|    |                   |
             <----------------+    |                   |
   +------+    +--------------+    |                   |
   | IoT  +----+ Private |App|+----+| Cloud |          |
   |Device|    | Cloud        |    || Driver|          |
   +------+    +--------------+    |        +          |
                                   |        |          |
                                   |    Interface-R    |
                       Application-Cloud Interconnection
                      <------------------------------------->[Pattern 4]
                                   |                   | +-------------+
              <---------------+    |            | Web |+-+Application  |
                  Device-Cloud|    |            | API || |(B2C/Service)|
               Interconnection|    |            +      | +-------------+
              <---------------+    |            |      |
                                   |    Interface-R    |
[Pattern 2]                        |                   |
   +------+                        |                   |
   | IoT  +------------------------+| Thing |          |
   |Device|                        || Driver|          |
   +------+                        |        +          |
                                   |        |          |
                                   |    Interface-R    |
[Pattern 3]                        |                   |
   +------+     +-------------+    |                   |
   | IoT  |     |    Gateway  |    |                   |
   |Device+-----+| Thing |    +----+                   |
   |      |     || Driver|    |    |                   |
   +------+     +-------------+    |                   |
                                   | Database          |
                                   |   Directory       | 
                                   |   Description     |
                                   +-------++----------+
                                           ||
                                   +-------++------+
                                   |    Sekisyo    |
                                   |    Service[1] |
                                   +---------------+
           ]]></artwork>
     </figure>
    </t>

    <t>
As a result, we verified the effectivness and flexibility of a new architecture.
The architecture has a common interface named Interface-R within IoT-HUB,
and all devices are connected to the HUB by defining the drivers for R-interface.
    </t>

    </section>

   <section anchor="flexibility" title="Flexibility of this method">

    <t>
This method is designed to interconnect IoT Devices, the connectable system is not limited to IoT Device.
It can be connected with almost no limitations, such as a block chain engine or a system for data storage.
As a result, it can be expected to contribute to the development of new economy such as utilization of data.
For example, by setting the unit price for each operation of the IoT Device,
costs for deployment of IoT devices are reocovable. 
Or by using this HUB as a branch point on the data transmission path,
new business player such as a data storage provider can be involved in the connection
between the IoT Device business companies.
    </t>

    </section>

    <section anchor="avoid-threatts" title="Mechanisms to avoid threats when we make the inter-connection">
    <t>
As an example, let us consider a cooperative operation of
"If the outside air is fresh, turn off the air conditioner and open the window".
In case of humans operate, this behavior does not occur if no one is in the house,
however, this behavior can occur in IoT whether the user is in the house or not. 
And your house can be entered by a thief if you are absence and unlucky.
    </t>
    <t>
In this example, the threat of being entered by a thief can occur by competing
for the action of "opening the window" and the situation of "absence".
    </t>
    <t>
For this reason, a mechanism for avoiding the occurrence of such threats is required
when we make inter-connection.
    </t>
    <t>
This can be realized by not permitting the target operation
when the combination causing the threat as described above.
This mechanism checks the movement of operations.
In Japan, about 400 years ago, the Shogunate (government) had set up the checkpoints of human traffic,
called the "sekisho." 
So, we are calling tentatively this mechanism SEKISHO after this fact.
    </t>
    </section>

    <section anchor="security" title="Security Considerations">
    <t>
Regarding security, pattern 2 of service providers specified in
Chapter 5 may contain some vulnerability and thus precaution is
required.
    </t>
    </section>

    <section anchor="privacy" title="Privacy Considerations">
    <t>
Regarding privacy, Chapter 2 touches upon concerns on privacy among
inter-connected service providers in case of fault isolation after
IoT Device malfunctioning.
    </t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
    <t>
This document has no actions for IANA.
    </t>
    </section>

    <section anchor="acknowledgement" title="Acknowledgement">
    <t>
This paper contains findings of the study funded by the Ministry of
Internal Affairs and Communications of Japan as well as research
activities of IoT Committee of Internet Association Japan. We
hereby touch upon such facts and show our gratitude to those who
relate to the study and committee activities.
    </t>
    </section>
  </middle>

  <back>
  <references title="Normative References">
   <reference anchor="ID-baba-iot-problems"
              target="draft-baba-iot-problems">
   <front>
     <title>Problems in and among industries for the prompt realization
of IoT and safety considerations</title>
     <author fullname="Hiroyuki Baba" initials="H.B." surname="Baba">
       <organization>The University of Tokyo</organization>
     </author>
     <author fullname="Yoshiki Ishida" initials="Y.I." surname="Ishida">
     </author>
     <author fullname="Takayuki Amatsu" initials="T.A." surname="Amatsu">
     </author>
     <author fullname="Koichi Kunitake" initials="K.K." surname="Kunitake">
     </author>
     <author fullname="Kaoru Maeda" initials="K.M." surname="Maeda">
     </author>
     <date year="2020" />
   </front>
   </reference>
   <reference anchor="ID-baba-iot-webapi"
              target="draft-baba-iot-webapi">
   <front>
     <title>Report on Problem Solving Experiment for Realization of Web-API-based IoT</title>
     <author fullname="Hiroyuki Baba" initials="H.B." surname="Baba">
       <organization>The University of Tokyo</organization>
     </author>
     <author fullname="Yoshiki Ishida" initials="Y.I." surname="Ishida">
     </author>
     <author fullname="Takayuki Amatsu" initials="T.A." surname="Amatsu">
     </author>
     <author fullname="Hiroshi Masuda" initials="H.M." surname="Masuda">
     </author>
     <author fullname="Shintaro Ogura" initials="S.O." surname="Ogura">
     </author>
     <author fullname="Koichi Kunitake" initials="K.K." surname="Kunitake">
     </author>
     <date year="2020" />
   </front>
   </reference>
 </references>
 </back>
</rfc>
