527 research outputs found

    Model for Trust Among Peers in Electronic Multiparty Transactions

    Get PDF

    Research challenges for cross-cloud applications.

    Get PDF

    SECURING DATA INTEGRITY AND AUTHENTICATION SERVICE INFRASTRUCTURE FOR SERVICE CLOUDS

    Get PDF
    SaaS Cloud frameworks give proficient and financially savvy service facilitating foundation for SaaS service providers. The frameworks are regularly shared by different clients from an assortment of security areas, which make them obligated to different noxious assaults. Moreover, the cloud foundation ordinarily has applications that manage significant data, for example, data preparing applications. This gives chance to assailants to exploit the framework powerlessness and complete key assaults. In this paper, we present IntTest, a versatile and successful service honesty verification structure for SaaS clouds. IntTest gives a novel incorporated authentication diagram investigation conspire that can give more grounded aggressor pinpointing power than past schemes. In addition, IntTest can consequently improve result quality by supplanting awful outcomes created by noxious assailants with great outcomes delivered by kindhearted service providers. We have actualized a model of the IntTest framework and tried it on a creation cloud computing foundation utilizing IBM System S stream preparing applications. Our exploratory outcomes demonstrate that IntTest can accomplish higher assailant pinpointing precision than existing methodologies. IntTest does not require any exceptional equipment or secure piece support and forces little execution effect to the application, which makes it functional for huge scale cloud frameworks

    Twenty security considerations for cloud-supported Internet of Things

    Get PDF
    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, crossplatform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.This work was supported by UK Engineering and Physical Sciences Research Council grant EP/K011510 CloudSafetyNet: End-to-End Application Security in the Cloud and Microsoft through the Microsoft Cloud Computing Research Centre

    Authenticated Quality-of-Service Signaling for Virtual Networks

    Get PDF

    A proposal for secured, efficient and scalable layer 2 network virtualisation mechanism

    Get PDF
    El contenidos de los capítulos 3 y 4 está sujeto a confidencialidad. 291 p.La Internet del Futuro ha emergido como un esfuerzo investigador para superar estas limitaciones identificadas en la actual Internet. Para ello es necesario investigar en arquitecturas y soluciones novedosas (evolutivas o rompedoras), y las plataformas de experimentación surgen para proporcionar un entorno realista para validar estas nuevas propuestas a gran escala.Debido a la necesidad de compartir la misma infraestructura y recursos para testear simultáneamente diversas propuestas de red, la virtualización de red es la clave del éxito. Se propone una nueva taxonomía para poder analizar y comparar las diferentes propuestas. Se identifican tres tipos: el Nodo Virtual (vNode), la Virtualización posibilitada por SDN (SDNeV) y el overlay.Además, se presentan las plataformas experimentales más relevantes, con un foco especial en la forma en la que cada una de ellas permite la investigación en propuestas de red, las cuales no cumplen todos estos requisitos impuestos: aislamiento, seguridad, flexibilidad, escalabilidad, estabilidad, transparencia, soporte para la investigación en propuestas de red. Por lo tanto, una nueva plataforma de experimentación ortogonal a la experimentación es necesaria.Las principales contribuciones de esta tesis, sustentadas sobre tecnología SDN y NFV, son también los elementos clave para construir la plataforma de experimentación: la Virtualización de Red basada en Prefijos de Nivel 2 (Layer 2 Prefix-based Network Virtualisation, L2PNV), un Protocolo para la Configuración de Direcciones MAC (MAC Address Configuration Protocol, MACP), y un sistema de Control de Acceso a Red basado en Flujos (Flow-based Network Access Control, FlowNAC).Como resultado, se ha desplegado en la Universidad del Pais Vasco (UPV/EHU) una nueva plataforma experimental, la Plataforma Activada por OpenFlow de EHU (EHU OpenFlow Enabled Facility, EHU-OEF), para experimentar y validar estas propuestas realizadas
    corecore