5,378 research outputs found
Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study
Cloud computing has emerged as a popular paradigm and an attractive model for
providing a reliable distributed computing model.it is increasing attracting
huge attention both in academic research and industrial initiatives. Cloud
deployments are paramount for institution and organizations of all scales. The
availability of a flexible, free open source cloud platform designed with no
propriety software and the ability of its integration with legacy systems and
third-party applications are fundamental. Open stack is a free and opensource
software released under the terms of Apache license with a fragmented and
distributed architecture making it highly flexible. This project was initiated
and aimed at designing a secured cloud infrastructure called BradStack, which
is built on OpenStack in the Computing Laboratory at the University of
Bradford. In this report, we present and discuss the steps required in
deploying a secured BradStack Multi-node cloud infrastructure and conducting
Penetration testing on OpenStack Services to validate the effectiveness of the
security controls on the BradStack platform. This report serves as a practical
guideline, focusing on security and practical infrastructure related issues. It
also serves as a reference for institutions looking at the possibilities of
implementing a secured cloud solution.Comment: 38 pages, 19 figures
Teaching Cybersecurity Using the Cloud
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our experience when using cloud computing to teach a senior course on cybersecurity across two campuses via a virtual classroom equipped with live audio and video. Furthermore, based on this teaching experience, we propose guidelines that can be applied to teach similar computer science and engineering courses. We demonstrate how cloud-based laboratory exercises can greatly help students in acquiring crucial cybersecurity skills as well as cloud computing ones, which are in high demand nowadays. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, our presented use cases and approaches are equally applicable to other available cloud platforms such as Rackspace and Google Compute Engine, among others
Planning with Global Constraints for Computing Infrastructure Reconfiguration
This paper presents a prototype system called SFplan- ner which uses an automated planning technique to generate workflows for reconfiguring a computing infras- tructure. The system allows an administrator to specify a configuration task which consists of current state, de- sired state and global constraints. This task is compiled to a grounded finite-domain representation as the input for the standard (unmodified) Fast-Downward planner in order to automatically generate a workflow. The ex- ecution of the workflow will bring the system into the desired state, preserving the global constraints at every stage of the workflow
A fourfold typology of living labs: an empirical investigation amongst the ENoLL community
Living Labs can be seen as a means to structure user involvement in innovation processes. However, in this rather young research domain, there is no consensus yet regarding supporting theories and frameworks. This has resulted in a wide variety of projects and approaches being called ‘Living Labs’, which leaves a clear conceptualization and definition a task in progress. Within this research paper we propose a fourfold categorization of Living Labs based on a literature review and validated by an empirical investigation of the characteristics of 64 ICT Living Labs from the European Network of Living Labs (ENoLL). The four types are Living Labs for collaboration and knowledge support activities, original ‘American’ Living Labs, Living Labs as extension to testbeds and Living Labs that support context research and co-creation with users
Developing a Methodology for Creating Flexible Instructional Information Technology Laboratories
Many schools - particularly the more dynamic segments of high schools and community colleges - have begun to undertake instruction in the areas of PC repair, networking (vendor-neutral and specific alike), operating systems, wireless technologies, and so forth. For some schools, however, this leap forward has come only with a later realization that there are tremendous startup costs and ongoing expenses associated with such endeavors, especially considering that many of these instructional elements have historically called for independent instructional facilities. From this perspective, institutions may find they have to cut their programmatic vision short in the face of harsher budgetary realities of supporting so many laboratories, or abandon their efforts altogether. In this paper, it is suggested that this scenario does not have to become a reality. Instead, it is proposed that affordable, functional, and practical multipurpose Information Technology (IT) classrooms can be developed when a combination of good initial design and planning, affordable technologies, and mature business models are practiced. With the application of certain methodologies, a system can be created for any institution wishing to develop facilities and the means to support and mature them over time. Often faced with budgetary constraints, space limitations, or uncertain financial support mechanisms, it is becoming important that higher education institutions engaging in the instruction of advanced computing and networking develop a process and methodology for establishing and maintaining computing laboratories that can service a variety of diverse and complex instructional needs
Recommended from our members
A Comparison of Virtual Lab Solutions for Online Cyber Security Education
In this paper the authors describe their experience of designing a virtual lab architecture capable of providing hundreds of students with a hands on learning experience in support of an online educational setting. The authors discuss alternative approaches of designing a virtual lab and address the criteria in selecting the optimal deployment method. The authors conclude that virtualization offers a significant instructional advantage in delivering a cost effective and flexible hands on learning experience
Exemplary Design Research
In this paper, we will look at what role a research program and an interventionist research strategy based on design experiments may play for the advancement of knowledge relevant to design and designers. We suggest the notion of exemplary design research driven by programs and experiments and by this we refer to research based on the explicit formulation of design programs that act as a frame and foundation for carrying out series of design experiments. It is 'exemplary' in the sense that it enables critical dissemination primarily by creating examples of what could be done and how, i.e. examples that both express the possibilities and characteristics of the design program as well as more general suggestions about a certain (change to) design practice
Recommended from our members
Virtual Lab for Online Cyber Security Education
In this paper, the authors describe their experience of designing a virtual lab architecture capable of potentially providing thousands of students with a hands-on learning experience in support of an online educational offering. The authors discuss alternative approaches of designing a virtual lab and address the criteria in selecting the optimal deployment method. The authors suggest that virtualization offers a significant instructional advantage in delivering a cost effective and flexible hands-on learning experience
Migrating to the Cloud: a Software Product Line Based Analysis
Identifying which part of a local system should be migrated to a public Cloud environment is often a difficult and error prone process. With the significant (and increasing) number of commercial Cloud providers, choosing a provider whose capability best meets requirements is also often difficult. Most Cloud service providers offer large amounts of configurable resources, which can be combined in a number of different ways. in the case of small and medium companies, finding a suitable configuration with the minimum cost is often an essential requirement to migrate, or even to initiate the decision process for migration. We interpret this need as a problem associated with variability management and analysis. Variability techniques and models deal with large configuration spaces, and have been proposed previously to support configuration processes in industrial cases. Furthermore, this is a mature field which has a large catalog of analysis operations to extract valuable information in an automated way. Some of these operations can be used and tailored for Cloud environments. We focus in this work on Amazon Cloud services, primarily due to the large number of possible configurations available by this service provider and its popularity. Our approach can also be adapted to other providers offering similar capabilities
- …