14,154 research outputs found

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

    Get PDF
    Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that utilize sensors and actuators placed in private places. This work provides an interdisciplinary overview of the social and technical core research challenges for the trustworthy integration of sensor and actuator devices with the Cloud Computing paradigm. Most importantly, these challenges include i) ease of development, ii) security and privacy, and iii) social dimensions of a cloud-based system which integrates into private life. When these challenges are tackled in the development of future cloud systems, the attractiveness of new use cases in a sensor-enabled world will considerably be increased for users who currently do not trust the Cloud.Comment: 14 pages, 3 figures, published as technical report of the Department of Computer Science of RWTH Aachen Universit

    AHP-based Adaptive Resource Selection for Cognitive Platform in Cloud Gaming Service

    Get PDF
    Cloud gaming service enables offloading heavy video-processing tasks up to the cloud server so that simple computers or mobile devices can be eligible to run sophisticated games, but on the expense of high network communications. In this regard, the adequate network utilization must be realized for delivering good gaming experiences to the game players. This necessitates a cognitive platform, which is capable of modifying its multimedia quality requirement in response to the network constraint, and notifying the cloud gaming server for updating the corresponded workload. In this regard, the Analytic Hierarchy Process (AHP) method has been proposed to deploy at the cognitive platform for cloud gaming service to select an optimal resource allocation strategy that satisfies various multimedia requirements and energy-awareness. Experiment results can confirm that the proposed method is flexible to enhance the capability of cloud gaming service in term of more efficient cloud gaming resource utilization, particularly during heavy-congested periods, while players’ quality of gaming experience can be still maintained under the mandate of intelligent agent on the player devices
    • …
    corecore