216 research outputs found

    Adaptability and Integrity Attestation System for Circulated Software-as-a-Service Clouds

    Get PDF
    Programming as-an administration (SaaS) cloud frameworks adjust application administration suppliers to convey their applications by means of enormous distributed computing bases. In any case, because of their sharing nature, SaaS mists square measure inclined to malignant assaults. Amid this paper, we tend to propel framework, a versatile and viable administration uprightness authentication structure for SaaS clouds,which offers a totally extraordinary incorporated validation chart examination topic that may give more grounded aggressor pinpointing force than past plans. Additionally, our system will mechanically improve result quality by substitution horrible results made by pernicious aggressors with sensible results made by kindhearted administration suppliers. We have authorized an encapsulation of our foundation and tried it on a creation distributed computing foundation. Our exploratory results demonstrate that proposed system has the capacity do higher aggressor pinpointing precision than existing methodologies, which needn't bother with any unique equipment or secure bit support and forces next to no execution effect to the applying, that makes it sensible for expansive scale cloud frameworks. Yet an amazing IDS is obliged to counter the vindictive aggressors ,however a large portion of the IDS experiences bogus motioning of alerts and makes fizzled endeavor to get the gatecrasher .In this paper, we have proposed a framework which will lessen a fake disturbing rate to control the cloud security framework in certified way. DOI: 10.17762/ijritcc2321-8169.15073

    Cloud Anchor: An Exploration of Service Integrity Attestation with Hardware Roots of Trust

    Get PDF
    Distributed computing has enabled developers and researchers to solve complex problems at an impressive scale. Users implicitly trust these subtasks to be performed accurately and this trust can be abused by malicious service providers who aim to compromise the integrity of the system. These problems can be solved by using dedicated hardware; however it is expensive or impossible to distribute this solution to all providers in a system. In this paper, we explore InTest, a service integrity attestation framework that uses replay-based consistency checks to detect malicious service providers without the use of dedicated hardware. We investigate if its performance is affected by network topology, its accuracy in the face of incomplete information, and if it can be improved by minimally utilizing dedicated hardware. Our preliminary solution, Cloud Anchor, reduces the number of duplicated tasks by 30% while providing identical detection rates as the prior solution

    Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030

    Get PDF
    The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment

    Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

    Full text link

    PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications - Technical and Scientific Contributions

    Get PDF
    Most industries worldwide have entered a period of reaping the benefits and opportunities cloud offers. At the same time, many efforts are made to address engineering challenges for the secure development of cloud systems and software.With the majority of software engineering projects today relying on the cloud, the task to structure end-to-end secure-by-design cloud systems becomes challenging but at the same time mandatory. The PaaSword project has been commissioned to address security and data privacy in a holistic way by proposing a context-aware security-by-design framework to support software developers in constructing secure applications for the cloud. This chapter presents an overview of the PaaSword project results, including the scientific achievements as well as the description of the technical solution. The benefits offered by the framework are validated through two pilot implementations and conclusions are drawn based on the future research challenges which are discussed in a research agenda

    Adaptable conveyed administration uprightness verification for software as a service clouds

    Get PDF
    SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in a less demanding manner. As the earth is partaking in nature there is more degree for SaaS mists defenseless against vindictive assailants. In this paper IntTest another trustworthiness verification plan is presented that can utilize diagram investigation plan to accomplish higher Pinpointing of aggressors. Here additionally consequently rectifying the aftereffects of malignant aggressors with results gave by kindhearted administration supplier's method called auto revision is presented. Additionally we actualized IntTest and tried on a creation cloud foundation, the exploratory results demonstrate this plan accomplished higher precision than past plans. IntTest does not require any protected piece backing and equipment and it additionally underpins for huge scale cloud computing foundation

    Trustworthy Knowledge Planes For Federated Distributed Systems

    Full text link
    In federated distributed systems, such as the Internet and the public cloud, the constituent systems can differ in their configuration and provisioning, resulting in significant impacts on the performance, robustness, and security of applications. Yet these systems lack support for distinguishing such characteristics, resulting in uninformed service selection and poor inter-operator coordination. This thesis presents the design and implementation of a trustworthy knowledge plane that can determine such characteristics about autonomous networks on the Internet. A knowledge plane collects the state of network devices and participants. Using this state, applications infer whether a network possesses some characteristic of interest. The knowledge plane uses attestation to attribute state descriptions to the principals that generated them, thereby making the results of inference more trustworthy. Trustworthy knowledge planes enable applications to establish stronger assumptions about their network operating environment, resulting in improved robustness and reduced deployment barriers. We have prototyped the knowledge plane and associated devices. Experience with deploying analyses over production networks demonstrate that knowledge planes impose low cost and can scale to support Internet-scale networks
    • …
    corecore