5,378 research outputs found

    Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

    Full text link
    Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud deployments are paramount for institution and organizations of all scales. The availability of a flexible, free open source cloud platform designed with no propriety software and the ability of its integration with legacy systems and third-party applications are fundamental. Open stack is a free and opensource software released under the terms of Apache license with a fragmented and distributed architecture making it highly flexible. This project was initiated and aimed at designing a secured cloud infrastructure called BradStack, which is built on OpenStack in the Computing Laboratory at the University of Bradford. In this report, we present and discuss the steps required in deploying a secured BradStack Multi-node cloud infrastructure and conducting Penetration testing on OpenStack Services to validate the effectiveness of the security controls on the BradStack platform. This report serves as a practical guideline, focusing on security and practical infrastructure related issues. It also serves as a reference for institutions looking at the possibilities of implementing a secured cloud solution.Comment: 38 pages, 19 figures

    Teaching Cybersecurity Using the Cloud

    Get PDF
    Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our experience when using cloud computing to teach a senior course on cybersecurity across two campuses via a virtual classroom equipped with live audio and video. Furthermore, based on this teaching experience, we propose guidelines that can be applied to teach similar computer science and engineering courses. We demonstrate how cloud-based laboratory exercises can greatly help students in acquiring crucial cybersecurity skills as well as cloud computing ones, which are in high demand nowadays. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, our presented use cases and approaches are equally applicable to other available cloud platforms such as Rackspace and Google Compute Engine, among others

    Planning with Global Constraints for Computing Infrastructure Reconfiguration

    Get PDF
    This paper presents a prototype system called SFplan- ner which uses an automated planning technique to generate workflows for reconfiguring a computing infras- tructure. The system allows an administrator to specify a configuration task which consists of current state, de- sired state and global constraints. This task is compiled to a grounded finite-domain representation as the input for the standard (unmodified) Fast-Downward planner in order to automatically generate a workflow. The ex- ecution of the workflow will bring the system into the desired state, preserving the global constraints at every stage of the workflow

    A fourfold typology of living labs: an empirical investigation amongst the ENoLL community

    Get PDF
    Living Labs can be seen as a means to structure user involvement in innovation processes. However, in this rather young research domain, there is no consensus yet regarding supporting theories and frameworks. This has resulted in a wide variety of projects and approaches being called ‘Living Labs’, which leaves a clear conceptualization and definition a task in progress. Within this research paper we propose a fourfold categorization of Living Labs based on a literature review and validated by an empirical investigation of the characteristics of 64 ICT Living Labs from the European Network of Living Labs (ENoLL). The four types are Living Labs for collaboration and knowledge support activities, original ‘American’ Living Labs, Living Labs as extension to testbeds and Living Labs that support context research and co-creation with users

    Developing a Methodology for Creating Flexible Instructional Information Technology Laboratories

    Get PDF
    Many schools - particularly the more dynamic segments of high schools and community colleges - have begun to undertake instruction in the areas of PC repair, networking (vendor-neutral and specific alike), operating systems, wireless technologies, and so forth. For some schools, however, this leap forward has come only with a later realization that there are tremendous startup costs and ongoing expenses associated with such endeavors, especially considering that many of these instructional elements have historically called for independent instructional facilities. From this perspective, institutions may find they have to cut their programmatic vision short in the face of harsher budgetary realities of supporting so many laboratories, or abandon their efforts altogether. In this paper, it is suggested that this scenario does not have to become a reality. Instead, it is proposed that affordable, functional, and practical multipurpose Information Technology (IT) classrooms can be developed when a combination of good initial design and planning, affordable technologies, and mature business models are practiced. With the application of certain methodologies, a system can be created for any institution wishing to develop facilities and the means to support and mature them over time. Often faced with budgetary constraints, space limitations, or uncertain financial support mechanisms, it is becoming important that higher education institutions engaging in the instruction of advanced computing and networking develop a process and methodology for establishing and maintaining computing laboratories that can service a variety of diverse and complex instructional needs

    Exemplary Design Research

    Get PDF
    In this paper, we will look at what role a research program and an interventionist research strategy based on design experiments may play for the advancement of knowledge relevant to design and designers. We suggest the notion of exemplary design research driven by programs and experiments and by this we refer to research based on the explicit formulation of design programs that act as a frame and foundation for carrying out series of design experiments. It is 'exemplary' in the sense that it enables critical dissemination primarily by creating examples of what could be done and how, i.e. examples that both express the possibilities and characteristics of the design program as well as more general suggestions about a certain (change to) design practice

    Migrating to the Cloud: a Software Product Line Based Analysis

    Get PDF
    Identifying which part of a local system should be migrated to a public Cloud environment is often a difficult and error prone process. With the significant (and increasing) number of commercial Cloud providers, choosing a provider whose capability best meets requirements is also often difficult. Most Cloud service providers offer large amounts of configurable resources, which can be combined in a number of different ways. in the case of small and medium companies, finding a suitable configuration with the minimum cost is often an essential requirement to migrate, or even to initiate the decision process for migration. We interpret this need as a problem associated with variability management and analysis. Variability techniques and models deal with large configuration spaces, and have been proposed previously to support configuration processes in industrial cases. Furthermore, this is a mature field which has a large catalog of analysis operations to extract valuable information in an automated way. Some of these operations can be used and tailored for Cloud environments. We focus in this work on Amazon Cloud services, primarily due to the large number of possible configurations available by this service provider and its popularity. Our approach can also be adapted to other providers offering similar capabilities
    corecore