64 research outputs found

    Managing identities in cloud computing environments

    Get PDF
    As cloud computing becomes a hot spot of research, the security issues of clouds raise concerns and attention from academic research community. A key area of cloud security is managing users’ identities, which is fundamental and important to other aspects of cloud computing. A number of identity management frameworks and systems are introduced and analysed. Issues remaining in them are discussed and potential solutions and countermeasures are proposed

    Non-Transferable Proxy Re-Encryption Scheme

    Get PDF
    SEC8: Selected topics in Information SecurityA proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings. Some schemes fail to provide the non-transferable property in which the proxy and the delegatee can collude to further delegate the decryption right to anyone. This is the main open problem left for PRE schemes. Other schemes assume the existence of a fully trusted private key generator (PKG) to generate the re-encryption key to be used by the proxy for re-encrypting a given ciphertext for a target delegatee. But this poses two problems in PRE schemes if the PKG is malicious: the PKG in their schemes may decrypt both original ciphertexts and re-encrypted ciphertexts (referred as the key escrow problem); and the PKG can generate reencryption key for arbitrary delegatees without permission from the delegator (we refer to it as the PKG despotism problem). In this paper, we propose the first non-transferable proxy re-encryption scheme which successfully achieves the nontransferable property. We show that the new scheme solved the PKG despotism problem and key escrow problem as well. © 2012 IEEE.published_or_final_versio

    Smart Waste Collection Processes - A Case Study about Smart Device Implementation

    Get PDF
    For decades the core processes of collecting waste have been unchanged. Through new IoT-technologies, advances in sensors, and data transfer technologies, data-driven smart waste collection processes will replace old inefficient collection processes. Causing a shift from fix collection intervals to collection on demand, supported by smart algorithms and innovative web-applications. However, implementing such ideas come along with some almost insurmountable challenges related to wireless data transfer, battery lifetime and IoT infrastructure. Therefore, the question arises of how to implement IoT solutions in such complex and challenging environments. In order to contribute to the existing research about smart cities and autonomous IoT devices, we implemented smart devices in glass containers, measuring filling level over several months. The research study’s outcomes are test results, data analysis and a prototype implementation for a reengineered waste collection process. Furthermore, we identified main challenges and key issues which obstruct the implementation and spread of such smart city applications

    Improved Reliability of FPGA-based PUF Identification Generator Design

    Get PDF

    Trust and Believe -- Should We? Evaluating the Trustworthiness of Twitter Users

    Full text link
    Social networking and micro-blogging services, such as Twitter, play an important role in sharing digital information. Despite the popularity and usefulness of social media, they are regularly abused by corrupt users. One of these nefarious activities is so-called fake news -- a "virus" that has been spreading rapidly thanks to the hospitable environment provided by social media platforms. The extensive spread of fake news is now becoming a major problem with far-reaching negative repercussions on both individuals and society. Hence, the identification of fake news on social media is a problem of utmost importance that has attracted the interest not only of the research community but most of the big players on both sides - such as Facebook, on the industry side, and political parties on the societal one. In this work, we create a model through which we hope to be able to offer a solution that will instill trust in social network communities. Our model analyses the behaviour of 50,000 politicians on Twitter and assigns an influence score for each evaluated user based on several collected and analysed features and attributes. Next, we classify political Twitter users as either trustworthy or untrustworthy using random forest and support vector machine classifiers. An active learning model has been used to classify any unlabeled ambiguous records from our dataset. Finally, to measure the performance of the proposed model, we used accuracy as the main evaluation metric.Comment: arXiv admin note: text overlap with arXiv:2107.0802

    A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks

    Get PDF
    The idea of Cognitive Radio (CR) is to share the spectrum between a user called primary, and a user called secondary. Dynamic Spectrum Access (DSA) is a new spectrum sharing paradigm in cognitive radio that allows secondary users to access the abundant spectrum holes in the licensed spectrum bands. DSA is an auspicious technology to alleviate the spectrum scarcity problem and increase spectrum utilization. While DSA has attracted many research efforts recently, in this paper, a survey of spectrum access techniques using cooperation and competition to solve the problem of spectrum allocation in cognitive radio networks is presented

    Optimization of open flow controller placement in software defined networks

    Get PDF
    The world is entering into the era of Big Data where computer networks are an essential part. However, the current network architecture is not very convenient to configure such leap. Software defined network (SDN) is a new network architecture which argues the separation of control and data planes of the network devices by centralizing the former in high level, centralised devices and efficient supervisors, called controllers. This paper proposes a mathematical model that helps optimizing the locations of the controllers within the network while minimizing the overall cost under realistic constrains. Our method includes finding the minimum cost of placing the controllers; these costs are the network latency, controller processing power and link bandwidth. Different types of network topologies have been adopted to consider the data profile of the controllers, links of controllers and locations of switches. The results showed that as the size of input data increased, the time to find the optimal solution also increased in a non-polynomial time. In addition, the cost of solution is increased linearly with the input size. Furthermore, when increasing allocating possible locations of the controllers, for the same number of switches, the cost was found to be less

    Joint relay selection and bandwidth allocation for cooperative relay network

    Get PDF
    Cooperative communication that exploits multiple relay links offers significant performance improvement in terms of coverage and capacity for mobile data subscribers in hierarchical cellular network. Since cooperative communication utilizes multiple relay links, complexity of the network is increased due to the needs for efficient resource allocation. Besides, usage of multiple relay links leads to Inter- Cell Interference (ICI). The main objective of this thesis is to develop efficient resource allocation scheme minimizes the effect of ICI in cooperative relay network. The work proposed a joint relay selection and bandwidth allocation in cooperative relay network that ensures high achievable data rate with high user satisfaction and low outage percentage. Two types of network models are considered: single cell network and multicell network. Joint Relay Selection and Bandwidth Allocation with Spatial Reuse (JReSBA_SR) and Optimized JReSBA_SR (O_JReSBA_SR) are developed for single cell network. JReSBA_SR considers link quality and user demand for resource allocation, and is equipped with spatial reuse to support higher network load. O_JReSBA_SR is an enhancement of JReSBA_SR with decision strategy based on Markov optimization. In multicell network, JReSBA with Interference Mitigation (JReSBA_IM) and Optimized JReSBA_IM (O_JReSBA_IM) are developed. JReSBA_IM deploys sectored-Fractional Frequency Reuse (sectored- FFR) partitioning concept in order to minimize the effect of ICI between adjacent cells. The performance is evaluated in terms of cell achievable rate, Outage Percentage (OP) and Satisfaction Index (SI). The result for single cell network shows that JReSBA_SR has notably improved the cell achievable rate by 35.0%, with reduced OP by 17.7% compared to non-joint scheme at the expense of slight increase in complexity at Relay Node (RN). O_JReSBA_SR has further improved the cell achievable rate by 13.9% while maintaining the outage performance with reduced complexity compared to JReSBA_SR due to the effect of optimization. The result for multicell network shows that JReSBA_IM enhances the cell achievable rate up to 65.1% and reduces OP by 35.0% as compared to benchmark scheme. Similarly, O_JReSBA_IM has significantly reduced the RN complexity of JReSBA_IM scheme, improved the cell achievable rate up to 9.3% and reduced OP by 1.3%. The proposed joint resource allocation has significantly enhanced the network performance through spatial frequency reuse, efficient, fair and optimized resource allocation. The proposed resource allocation is adaptable to variation of network load and can be used in any multihop cellular network such as Long Term Evolution-Advanced (LTE-A) network

    Cyber-physical manufacturing systems: An architecture for sensor integration, production line simulation and cloud services

    Get PDF
    none9noThe pillars of Industry 4.0 require the integration of a modern smart factory, data storage in the Cloud, access to the Cloud for data analytics, and information sharing at the software level for simulation and hardware-in-the-loop (HIL) capabilities. The resulting cyber-physical system (CPS) is often termed the cyber-physical manufacturing system, and it has become crucial to cope with this increased system complexity and to attain the desired performances. However, since a great number of old production systems are based on monolithic architectures with limited external communication ports and reduced local computational capabilities, it is difficult to ensure such production lines are compliant with the Industry 4.0 pillars. A wireless sensor network is one solution for the smart connection of a production line to a CPS elaborating data through cloud computing. The scope of this research work lies in developing a modular software architecture based on the open service gateway initiative framework, which is able to seamlessly integrate both hardware and software wireless sensors, send data into the Cloud for further data analysis and enable both HIL and cloud computing capabilities. The CPS architecture was initially tested using HIL tools before it was deployed within a real manufacturing line for data collection and analysis over a period of two months.openPrist Mariorosario; Monteriu' Andrea; Pallotta Emanuele; Cicconi Paolo; Freddi Alessandro; Giuggioloni Federico; Caizer Eduard; Verdini Carlo; Longhi SauroPrist, Mariorosario; Monteriu', Andrea; Pallotta, Emanuele; Cicconi, Paolo; Freddi, Alessandro; Giuggioloni, Federico; Caizer, Eduard; Verdini, Carlo; Longhi, Saur
    corecore