7,554 research outputs found
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security Isolation
Approximately Truthful Multi-Agent Optimization Using Cloud-Enforced Joint Differential Privacy
Multi-agent coordination problems often require agents to exchange state
information in order to reach some collective goal, such as agreement on a
final state value. In some cases, it is feasible that opportunistic agents may
deceptively report false state values for their own benefit, e.g., to claim a
larger portion of shared resources. Motivated by such cases, this paper
presents a multi-agent coordination framework which disincentivizes
opportunistic misreporting of state information. This paper focuses on
multi-agent coordination problems that can be stated as nonlinear programs,
with non-separable constraints coupling the agents. In this setting, an
opportunistic agent may be tempted to skew the problem's constraints in its
favor to reduce its local cost, and this is exactly the behavior we seek to
disincentivize. The framework presented uses a primal-dual approach wherein the
agents compute primal updates and a centralized cloud computer computes dual
updates. All computations performed by the cloud are carried out in a way that
enforces joint differential privacy, which adds noise in order to dilute any
agent's influence upon the value of its cost function in the problem. We show
that this dilution deters agents from intentionally misreporting their states
to the cloud, and present bounds on the possible cost reduction an agent can
attain through misreporting its state. This work extends our earlier work on
incorporating ordinary differential privacy into multi-agent optimization, and
we show that this work can be modified to provide a disincentivize for
misreporting states to the cloud. Numerical results are presented to
demonstrate convergence of the optimization algorithm under joint differential
privacy.Comment: 17 pages, 3 figure
Private networks intrusion detection system by satisfying network constraints
The great development of newer technologies also carries an important growth in the number of malicious attacks [1]. Even private networks without external Internet connections suffer from those attacks. These private networks play a crucial role in the country’s security. Imagine the consequences of turning the power of an entire city down or a denial of service [2] in an air traffic control system. Because of this fact, numerous politicians, including the recently named United States of America’s president, Donald Trump, are seriously taking into consideration the huge importance of protecting the private networks from intrusions in order to assure their countries’ peace. Some people even believe that efficient Intrusion Detection Systems (IDS) [3] could be a good protection against a possible Third World War. Thus, new and more powerful security solutions need to be developed to protect our organizations’ systems
- …