61 research outputs found

    A new secure proxy-based distributed virtual machines management in mobile cloud computing

    Get PDF
    The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations to engage with this technology. Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs). Many studies show that sensitive data of legitimate users’ VMs may be the target of malicious users, which lead to violating VMs’ confidentiality and privacy. The current approaches offer various solutions for this security issue. However, they are suffering from many inconveniences such as unauthorized distributed VM access behavior and robust strategies that ensure strong protection of communication of sensitive data among distributed VMs. The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. The proposed approach is illustrated using a healthcare case study. Including the experimental results that show interesting high-efficiency protection and accurate attacks identification

    Secure policies for the distributed virtual machines in mobile cloud computing

    Get PDF
    Mobile Cloud Computing (MCC) is a combination of cloud computing and mobile computing through wireless technology in order to overcome mobile devices' resource limitations. In MCC, virtualization plays a key role whereas the cloud resources are shared among many users to help them achieve an efficient performance and exploiting the maximum capacity of the cloud’s servers. However, the lack of security aspect impedes the benefits of virtualization techniques, whereby malicious users can violate and damage sensitive data in distributed Virtual Machines (VMs). Thus, this study aims to provide protection of distributed VMs and mobile user’s sensitive data in terms of security and privacy. This study proposes an approach based on cloud proxy known as Proxy-3S that combines three security policies for VMs; user’s access control, secure allocation, and secure communication. The Proxy-3S keeps the distributed VMs safe in different servers on the cloud. It enhances the grants access authorization for permitted distributed intensive applications’ tasks. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. A prototype is implemented on a NetworkCloudSim simulator to manage VMs security and data confidentiality automatically. Several experiments were conducted using real-world healthcare distributed application in terms of efficiency, coverage and execution time. The experiments show that the proposed approach achieved lower attacker’s efficiency and coverage ratios; equal to 0.35 and 0.41 respectively in all experimented configurations compared with existing works. In addition, the execution time of the proposed approach is satisfactory ranging from 441ms to 467ms of small and large cloud configurations. This study serves to provide integrity and confidentiality in exchanging sensitive information among multistakeholder in distributed mobile applications

    Cheating and Virtual Crime in Massively Multiplayer Online Games

    Get PDF
    Massively Multiplayer Online Games (MMOG) have become extremely popular since the birth of the Internet, with many millions of players playing games such as Poker and World of Warcraft. However, they do not seem to be well understood, and academic research into them has been limited. This project explains the nature of MMOG, and the relationship between MMOG and information security. This project discusses the problem of cheating in MMOG and it explains what cheating is, how it occurs, and how information security can be used to prevent it. The nature of virtual economies in MMOG is discussed, and the virtual crimes that have affected MMOG along with preventative measures are examined

    Reliable and secure low energy sensed spectrum communication for time critical cloud computing applications

    Get PDF
    Reliability and security of data transmission and access are of paramount importance to enhance the dependability of time critical remote monitoring systems (e.g. tele-monitoring patients, surveillance of smart grid components). Potential failures for data transmissions include wireless channel unavailability and delays due to the interruptions. Reliable data transmission demands seamless channel availability with minimum delays in spite of interruptions (e.g. fading, denial-of-service attacks). Secure data transmissions require sensed data to be transmitted over unreliable wireless channels with sucient security using suitable encryption techniques. The transmitted data are stored in secure cloud repositories. Potential failures for data access include unsuccessful user authentications due to mis-management of digital identities and insucient permissions to authorize situation specic data access requests. Reliable and secure data access requires robust user authentication and context-dependent authorization to fulll situation specic data utility needs in cloud repositories. The work herein seeks to enhance the dependability of time critical remote monitoring applications, by reducing these failure conditions which may degrade the reliability and security of data transmission or access. As a result of an extensive literature survey, in order to achieve the above said security and reliability, the following areas have been selected for further investigations. The enhancement of opportunistic transmissions in cognitive radio networks to provide greater channel availability as opposed to xed spectrum allocations in conventional wireless networks. Delay sensitive channel access methods to ensure seamless connectivity in spite of multiple interruptions in cognitive radio networks. Energy ecient encryption and route selection mechanisms to enhance both secure and reliable data transmissions. Trustworthy digital identity management in cloud platforms which can facilitate ecient user authentication to ensure reliable access to the sensed remote monitoring data. Context-aware authorizations to reliably handle the exible situation specic data access requests. Main contributions of this thesis include a novel trust metric to select non-malicious cooperative spectrum sensing users to reliably detect vacant channels, a reliable delaysensitive cognitive radio spectrum hand-o management method for seamless connectivity and an energy-aware physical unclonable function based encryption key size selection method for secure data transmission. Furthermore, a trust based identity provider selection method for user authentications and a reliable context-aware situation specic authorization method are developed for more reliable and secure date access in cloud repositories. In conclusion, these contributions can holistically contribute to mitigate the above mentioned failure conditions to achieve the intended dependability of the timecritical remote monitoring applications

    As lated tongues bespoke: popular protest in south-east England, 1790-1840

    Get PDF
    Available from British Library Document Supply Centre- DSC:DXN062666 / BLDSC - British Library Document Supply CentreSIGLEGBUnited Kingdo

    Hooligans, vandals and the community: a study of social reaction to juvenile delinquency

    Get PDF
    The thesis consists of three studies on various ways in which society reacts to juvenile delinquency. It is introduced with an account of recent developments in the sociology of deviance which have drawn attention to the nature and effect of the societal reaction to deviance. These developments, termed the "transactional perspective", are put in the context of a "sceptical" reaction against more conventional ways of conceptualizing deviance. The implications of this new perspective for theory and research are indicated. The first study is on vandalism, and starts by attempting to unravel the different definitions of this behaviour as a form of rule-breaking and deviance. It goes on to consider the processes through which vandalism becomes defined as a social problem and then discusses the main images and stereotypes through which society tries to conceptualize this form of delinquency. It finally considers the organized approaches to the prevention and control of vandalism. The second study is a survey of the views about delinquency - its nature, causes and control - and allied topics, held by a selected sample of official and unofficial control agents in a London Borough "Northview". The relevance of these views to understanding the social control of delinquency is considered. The final study is of various types of response to the Mods and Rockers phenomenon. Using mass media and observational sources, an analysis is made of how this form of deviance was reported and conceptualized. The emergent images of the behaviour are related to the ways in which society attempted to control it. The effects of these reactions on the form and development of the phenomenon are suggested

    Skyscraping Frontiers

    Get PDF
    As a space of extremes, the skyscraper has been continually constructed as an urban frontier in American cultural productions. Like its counterpart of the American wilderness, this vertical frontier serves as a privileged site for both subversion and excessive control. Beyond common metaphoric readings, this study models the skyscraper not only as a Foucauldian heterotopia, but also as a complex network of human and nonhuman actors while retracing its development from its initial assemblage during the 19th century to its steady evolution into a smart structure from the mid-20th century onward. It takes a close look at US-American literary and filmic fictions and the ways in which they sought to make sense of this extraordinary structure throughout the 20th and early 21st centuries. More traditional poststructuralist spatial theories are connected with concepts and methods of Actor-Network Theory in a compelling account of the skyscraper’s evolution as reflected in fictional media from early 20th-century short stories via a range of action, disaster and horror films to selected city novels of the 1990s and 2000s

    Law of Police Service in Gujarat

    Get PDF
    Not availabl

    The Public Papers of Governor Bert T. Combs: 1959–1963

    Get PDF
    This volume presents the most important public papers of Bert T. Combs during the four years he served as governor of Kentucky. Arranged chronologically, the papers reveal the policy of the Combs administration as it evolved in the early years of the 1960s and show how the governor dealt with varying concurrent problems. Although this collection is not intended as a definitive statement of the Combs administration, it provides important source material that will enable historians to study the broad spectrum of issues faced by the people of the Commonwealth at a time when considerable government-inspired change was occurring. John Ed Pearce has provided a perceptive introductory essay to the volume. The appendix offers a complete listing of speeches delivered by Governor Combs during his term of office. George W. Robinson is professor of history and chairman of the department at Eastern Kentucky University.https://uknowledge.uky.edu/upk_political_science_papers/1016/thumbnail.jp
    • …
    corecore