20 research outputs found
Management And Security Of Multi-Cloud Applications
Single cloud management platform technology has reached maturity and is quite successful in information technology applications. Enterprises and application service providers are increasingly adopting a multi-cloud strategy to reduce the risk of cloud service provider lock-in and cloud blackouts and, at the same time, get the benefits like competitive pricing, the flexibility of resource provisioning and better points of presence. Another class of applications that are getting cloud service providers increasingly interested in is the carriers\u27 virtualized network services. However, virtualized carrier services require high levels of availability and performance and impose stringent requirements on cloud services. They necessitate the use of multi-cloud management and innovative techniques for placement and performance management. We consider two classes of distributed applications – the virtual network services and the next generation of healthcare – that would benefit immensely from deployment over multiple clouds. This thesis deals with the design and development of new processes and algorithms to enable these classes of applications. We have evolved a method for optimization of multi-cloud platforms that will pave the way for obtaining optimized placement for both classes of services. The approach that we have followed for placement itself is predictive cost optimized latency controlled virtual resource placement for both types of applications. To improve the availability of virtual network services, we have made innovative use of the machine and deep learning for developing a framework for fault detection and localization. Finally, to secure patient data flowing through the wide expanse of sensors, cloud hierarchy, virtualized network, and visualization domain, we have evolved hierarchical autoencoder models for data in motion between the IoT domain and the multi-cloud domain and within the multi-cloud hierarchy
Software Defined Application Delivery Networking
In this thesis we present the architecture, design, and prototype implementation details of AppFabric. AppFabric is a next generation application delivery platform for easily creating, managing and controlling massively distributed and very dynamic application deployments that may span multiple datacenters.
Over the last few years, the need for more flexibility, finer control, and automatic management of large (and messy) datacenters has stimulated technologies for virtualizing the infrastructure components and placing them under software-based management and control; generically called Software-defined Infrastructure (SDI). However, current applications are not designed to leverage this dynamism and flexibility offered by SDI and they mostly depend on a mix of different techniques including manual configuration, specialized appliances (middleboxes), and (mostly) proprietary middleware solutions together with a team of extremely conscientious and talented system engineers to get their applications deployed and running. AppFabric, 1) automates the whole control and management stack of application deployment and delivery, 2) allows application architects to define logical workflows consisting of application servers, message-level middleboxes, packet-level middleboxes and network services (both, local and wide-area) composed over application-level routing policies, and 3) provides the abstraction of an application cloud that allows the application to dynamically (and automatically) expand and shrink its distributed footprint across multiple geographically distributed datacenters operated by different cloud providers. The architecture consists of a hierarchical control plane system called Lighthouse and a fully distributed data plane design (with no special hardware components such as service orchestrators, load balancers, message brokers, etc.) called OpenADN . The current implementation (under active development) consists of ~10000 lines of python and C code.
AppFabric will allow applications to fully leverage the opportunities provided by modern virtualized Software-Defined Infrastructures. It will serve as the platform for deploying massively distributed, and extremely dynamic next generation application use-cases, including:
Internet-of-Things/Cyber-Physical Systems: Through support for managing distributed gather-aggregate topologies common to most Internet-of-Things(IoT) and Cyber-Physical Systems(CPS) use-cases. By their very nature, IoT and CPS use cases are massively distributed and have different levels of computation and storage requirements at different locations. Also, they have variable latency requirements for their different distributed sites. Some services, such as device controllers, in an Iot/CPS application workflow may need to gather, process and forward data under near-real time constraints and hence need to be as close to the device as possible. Other services may need more computation to process aggregated data to drive long term business intelligence functions. AppFabric has been designed to provide support for such very dynamic, highly diversified and massively distributed application use-cases.
Network Function Virtualization: Through support for heterogeneous workflows, application-aware networking, and network-aware application deployments, AppFabric will enable new partnerships between Application Service Providers (ASPs) and Network Service Providers (NSPs). An application workflow in AppFabric may comprise of application services, packet and message-level middleboxes, and network transport services chained together over an application-level routing substrate. The Application-level routing substrate allows policy-based service chaining where the application may specify policies for routing their application traffic over different services based on application-level content or context.
Virtual worlds/multiplayer games: Through support for creating, managing and controlling dynamic and distributed application clouds needed by these applications. AppFabric allows the application to easily specify policies to dynamically grow and shrink the application\u27s footprint over different geographical sites, on-demand.
Mobile Apps: Through support for extremely diversified and very dynamic application contexts typical of such applications. Also, AppFabric provides support for automatically managing massively distributed service deployment and controlling application traffic based on application-level policies. This allows mobile applications to provide the best Quality-of-Experience to its users without
This thesis is the first to handle and provide a complete solution for such a complex and relevant architectural problem that is expected to touch each of our lives by enabling exciting new application use-cases that are not possible today. Also, AppFabric is a non-proprietary platform that is expected to spawn lots of innovations both in the design of the platform itself and the features it provides to applications. AppFabric still needs many iterations, both in terms of design and implementation maturity. This thesis is not the end of journey for AppFabric but rather just the beginning
Integração do paradigma de cloud computing com a infraestrutura de rede do operador
Doutoramento em Engenharia InformáticaThe proliferation of Internet access allows that users have the possibility to use
services available directly through the Internet, which translates in a change of
the paradigm of using applications and in the way of communicating,
popularizing in this way the so-called cloud computing paradigm. Cloud
computing brings with it requirements at two different levels: at the cloud level,
usually relying in centralized data centers, where information technology and
network resources must be able to guarantee the demand of such services;
and at the access level, i.e., depending on the service being consumed,
different quality of service is required in the access network, which is a Network
Operator (NO) domain. In summary, there is an obvious network dependency.
However, the network has been playing a relatively minor role, mostly as a
provider of (best-effort) connectivity within the cloud and in the access network.
The work developed in this Thesis enables for the effective integration of cloud
and NO domains, allowing the required network support for cloud. We propose
a framework and a set of associated mechanisms for the integrated
management and control of cloud computing and NO domains to provide endto-
end services. Moreover, we elaborate a thorough study on the embedding of
virtual resources in this integrated environment. The study focuses on
maximizing the host of virtual resources on the physical infrastructure through
optimal embedding strategies (considering the initial allocation of resources as
well as adaptations through time), while at the same time minimizing the costs
associated to energy consumption, in single and multiple domains.
Furthermore, we explore how the NO can take advantage of the integrated
environment to host traditional network functions. In this sense, we study how
virtual network Service Functions (SFs) should be modelled and managed in a
cloud environment and enhance the framework accordingly.
A thorough evaluation of the proposed solutions was performed in the scope of
this Thesis, assessing their benefits. We implemented proof of concepts to
prove the added value, feasibility and easy deployment characteristics of the
proposed framework. Furthermore, the embedding strategies evaluation has
been performed through simulation and Integer Linear Programming (ILP)
solving tools, and it showed that it is possible to reduce the physical
infrastructure energy consumption without jeopardizing the virtual resources
acceptance. This fact can be further increased by allowing virtual resource
adaptation through time. However, one should have in mind the costs
associated to adaptation processes. The costs can be minimized, but the virtual
resource acceptance can be also reduced. This tradeoff has also been subject
of the work in this Thesis.A proliferação do acesso à Internet permite aos utilizadores usar serviços
disponibilizados diretamente através da Internet, o que se traduz numa
mudança de paradigma na forma de usar aplicações e na forma de comunicar,
popularizando desta forma o conceito denominado de cloud computing. Cloud
computing traz consigo requisitos a dois nÃveis: ao nÃvel da própria cloud,
geralmente dependente de centros de dados centralizados, onde as
tecnologias de informação e recursos de rede têm que ser capazes de garantir
as exigências destes serviços; e ao nÃvel do acesso, ou seja, dependendo do
serviço que esteja a ser consumido, são necessários diferentes nÃveis de
qualidade de serviço na rede de acesso, um domÃnio do operador de rede. Em
sÃntese, existe uma clara dependência da cloud na rede. No entanto, o papel
que a rede tem vindo a desempenhar neste âmbito é reduzido, sendo
principalmente um fornecedor de conectividade (best-effort) tanto no dominio
da cloud como no da rede de acesso.
O trabalho desenvolvido nesta Tese permite uma integração efetiva dos
domÃnios de cloud e operador de rede, dando assim à cloud o efetivo suporte
da rede. Para tal, apresentamos uma plataforma e um conjunto de
mecanismos associados para gestão e controlo integrado de domÃnios cloud
computing e operador de rede por forma a fornecer serviços fim-a-fim. Além
disso, elaboramos um estudo aprofundado sobre o mapeamento de recursos
virtuais neste ambiente integrado. O estudo centra-se na maximização da
incorporação de recursos virtuais na infraestrutura fÃsica por meio de
estratégias de mapeamento ótimas (considerando a alocação inicial de
recursos, bem como adaptações ao longo do tempo), enquanto que se
minimizam os custos associados ao consumo de energia. Este estudo é feito
para cenários de apenas um domÃnio e para cenários com múltiplos domÃnios.
Além disso, exploramos como o operador de rede pode aproveitar o referido
ambiente integrado para suportar funções de rede tradicionais. Neste sentido,
estudamos como as funções de rede virtualizadas devem ser modeladas e
geridas num ambiente cloud e estendemos a plataforma de acordo com este
conceito.
No âmbito desta Tese foi feita uma avaliação extensa das soluções propostas,
avaliando os seus benefÃcios. Implementámos provas de conceito por forma a
demonstrar as mais-valias, viabilidade e fácil implantação das soluções
propostas. Além disso, a avaliação das estratégias de mapeamento foi
realizada através de ferramentas de simulação e de programação linear inteira,
mostrando que é possÃvel reduzir o consumo de energia da infraestrutura
fÃsica, sem comprometer a aceitação de recursos virtuais. Este aspeto pode
ser melhorado através da adaptação de recursos virtuais ao longo do tempo.
No entanto, deve-se ter em mente os custos associados aos processos de
adaptação. Os custos podem ser minimizados, mas isso implica uma redução
na aceitação de recursos virtuais. Esta compensação foi também um tema
abordado nesta Tese
Tuple Space Explosion: A Denial-of-Service Attack Against a Software Packet Classifier
Efficient and highly available packet classification is fundamental for various security primitives. In this paper, we evaluate whether the de facto Tuple Space Search (TSS) packet classification algorithm used in popular software networking stacks such as the Open vSwitch is robust against low-rate denial-of-service attacks. We present the Tuple Space Explosion (TSE) attack that exploits the fundamental space/time complexity of the TSS algorithm.
TSE can degrade the switch performance to 12% of its full capacity with a very low packet rate (0.7 Mbps) when the target only has simple policies such as, "allow some, but drop others". Worse, an adversary with additional partial knowledge of these policies can virtually bring down the target with the same low attack rate. Interestingly, TSE does not generate any specific traffic patterns but only requires arbitrary headers and payloads which makes it particularly hard to detect.
Due to the fundamental complexity characteristics of TSS, unfortunately, there seems to be no complete mitigation to the problem. As a long-term solution, we suggest the use of other algorithms (e.g., HaRP) that are not vulnerable to the TSE attack. As a short-term countermeasure, we propose MFCGuard that carefully manages the tuple space and keeps packet classification fast
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
Challenges in Cybersecurity and Privacy - the European Research Landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
Energy-efficient Transitional Near-* Computing
Studies have shown that communication networks, devices accessing the Internet, and data centers account for 4.6% of the worldwide electricity consumption.
Although data centers, core network equipment, and mobile devices are getting more energy-efficient, the amount of data that is being processed, transferred, and stored is vastly increasing.
Recent computer paradigms, such as fog and edge computing, try to improve this situation by processing data near the user, the network, the devices, and the data itself.
In this thesis, these trends are summarized under the new term near-* or near-everything computing.
Furthermore, a novel paradigm designed to increase the energy efficiency of near-* computing is proposed: transitional computing.
It transfers multi-mechanism transitions, a recently developed paradigm for a highly adaptable future Internet, from the field of communication systems to computing systems.
Moreover, three types of novel transitions are introduced to achieve gains in energy efficiency in near-* environments, spanning from private Infrastructure-as-a-Service (IaaS) clouds, Software-defined Wireless Networks (SDWNs) at the edge of the network, Disruption-Tolerant Information-Centric Networks (DTN-ICNs) involving mobile devices, sensors, edge devices as well as programmable components on a mobile System-on-a-Chip (SoC).
Finally, the novel idea of transitional near-* computing for emergency response applications is presented
to assist rescuers and affected persons during an emergency event or a disaster, although connections to cloud services and social networks might be disturbed by network outages, and network bandwidth and battery power of mobile devices might be limited