tural concerns. It highlights a set of challenges that
is a combination of technical, human, financial and
ethical aspects. Their work is complementary to our
work reported in this paper as it does not focus on
deployment, orchestration and trustworthiness. How-
ever, our work and (Gill et al., 2017) share some com-
mon findings, e.g., the lack of support for IoT security,
and the need for runtime adaptation of IoT systems.
7 CONCLUSIONS
Deployment and orchestration approaches for IoT
should be advanced enough to support distributed pro-
cessing and coordinated behavior across IoT, edge
and cloud infrastructures. In this paper, we have ex-
amined the research landscape of deployment and or-
chestration approaches for IoT, by conducting a sys-
tematic mapping study. After systematically identify-
ing and reviewing 69 primary studies out of thousands
relevant papers in this field, we have found out that
1) there is a sharp rise in the number of publications
addressing this field in the two recent years; 2) how-
ever, there are still different gaps that the current ap-
proaches seem to be immature to address such as the
real, low-level technical details of deployment and/or
orchestration at IoT devices level; 3) new deployment
and/or orchestration approaches should also focus on
addressing the trustworthy aspects and advanced sup-
ports for modern IoT systems. To make the IoT de-
ployment and orchestration approaches more practi-
cal, there is a need for increased research collabora-
tions between academia and industry. We will address
these open issues in our current research projects, es-
pecially for the trustworthiness of IoT.
ACKNOWLEDGEMENTS
This work is supported by the H2020 programme un-
der grant agreement no 780351 (ENACT).
REFERENCES
A. Metzger (Ed.) (2015). Cyber physical systems: Opportu-
nities and challenges for software, services, cloud and
data.
Aceto, G., Botta, A., De Donato, W., and Pescap
`
e, A.
(2013). Cloud monitoring: A survey. Computer Net-
works, 57(9):2093–2115.
Arcangeli, J.-P., Boujbel, R., and Leriche, S. (2015). Au-
tomatic deployment of distributed software systems:
Definitions and state of the art. Journal of Systems
and Software, 103:198–218.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz,
R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,
Stoica, I., et al. (2010). A view of cloud computing.
Communications of the ACM, 53(4):50–58.
Bergmayr, A., Breitenb
¨
ucher, U., Ferry, N., Rossini, A.,
Solberg, A., Wimmer, M., Kappel, G., and Leymann,
F. (2018). A systematic review of cloud modeling lan-
guages. ACM Comput. Surv., 51(1):22:1–22:38.
Binz, T., Breitenb
¨
ucher, U., Haupt, F., Kopp, O., Leymann,
F., Nowak, A., and Wagner, S. (2013). Opentosca–a
runtime for tosca-based cloud applications. In Inter-
national Conference on Service-Oriented Computing,
pages 692–695. Springer.
Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012).
Fog computing and its role in the internet of things. In
Proceedings of the first edition of the MCC workshop
on Mobile cloud computing, pages 13–16. ACM.
Borgia, E., Gomes, D. G., Lagesse, B., Lea, R. J., and Puc-
cinelli, D. (2016). Special issue on “internet of things:
Research challenges and solutions”. Computer Com-
munications, 89:1–4.
Carzaniga, A., Fuggetta, A., Hall, R. S., Heimbigner, D.,
Van Der Hoek, A., and Wolf, A. L. (1998). A char-
acterization framework for software deployment tech-
nologies. Technical report, Colorado State Univ Fort
Collins Dept Of Computer Science.
Dearie, A. (2007). Software deployment, past, present
and future. In Future of Software Engineering, 2007.
FOSE’07, pages 269–284. IEEE.
Eugster, P. T., Felber, P. A., Guerraoui, R., and Kermarrec,
A.-M. (2003). The many faces of publish/subscribe.
ACM computing surveys (CSUR), 35(2):114–131.
Fowler, M. (2010). Domain-specific languages. Pearson
Education.
Gill, A. Q., Behbood, V., Ramadan-Jradi, R., and Beydoun,
G. (2017). Iot architectural concerns: a systematic
review. In Proceedings of the Second International
Conference on Internet of things and Cloud Comput-
ing, page 117. ACM.
Griffor, E. R., Greer, C., Wollman, D. A., and Burns, M. J.
(2017). Framework for cyber-physical systems: Vol-
ume 1, overview. Technical report.
IEC, ISO (2011). Information technology-security
techniques-privacy framework. International Stan-
dard No. ISO/IEC.
IEC, ISO (2012). Information technology-security
techniques-information security management
systems-overview and vocabulary. International
Standard No. ISO/IEC, 27000:32.
IEEE Standards Association et al. (2016). P2413-standard
for an architectural framework for the internet of
things (iot). Institute of Electrical and Electronics En-
gineers, New York.
Kitchenham, B. (2004). Procedures for performing sys-
tematic reviews. Keele, UK, Keele University,
33(2004):1–26.
Ma, M., Preum, S. M., Tarneberg, W., Ahmed, M., Ruiters,
M., and Stankovic, J. (2016). Detection of run-
time conflicts among services in smart cities. In
A Systematic Mapping Study of Deployment and Orchestration Approaches for IoT
81