243 research outputs found

    Security challenges of microservices

    Get PDF
    Abstract. Security issues regarding microservice are well researched, however the different security issues and solutions have not been brought together as yet. This study searched through academic databases to find out what security issues and proposed solutions or mitigation methods can be found in existing literature. It found several security issues and methods in literature. Most security issues are raised regarding microservice that externally facing or in open environment. Majority of sources addressed security monitoring and authentication and authorization issues, fewer studies on implementation and bug-related issues such as container implementation and -bugs and some on networking related issues. This study found also that there is some amount of disconnect in literature when it comes to addressing security issues and their solutions and mitigation methods. The study offers a more detailed account of existing microservice security issues and solutions

    Oceanids C2: An Integrated Command, Control, and Data Infrastructure for the Over-the-Horizon Operation of Marine Autonomous Systems

    Get PDF
    Long-range Marine Autonomous Systems (MAS), operating beyond the visual line-of-sight of a human pilot or research ship, are creating unprecedented opportunities for oceanographic data collection. Able to operate for up to months at a time, periodically communicating with a remote pilot via satellite, long-range MAS vehicles significantly reduce the need for an expensive research ship presence within the operating area. Heterogeneous fleets of MAS vehicles, operating simultaneously in an area for an extended period of time, are becoming increasingly popular due to their ability to provide an improved composite picture of the marine environment. However, at present, the expansion of the size and complexity of these multi-vehicle operations is limited by a number of factors: (1) custom control-interfaces require pilots to be trained in the use of each individual vehicle, with limited cross-platform standardization; (2) the data produced by each vehicle are typically in a custom vehicle-specific format, making the automated ingestion of observational data for near-real-time analysis and assimilation into operational ocean models very difficult; (3) the majority of MAS vehicles do not provide machine-to-machine interfaces, limiting the development and usage of common piloting tools, multi-vehicle operating strategies, autonomous control algorithms and automated data delivery. In this paper, we describe a novel piloting and data management system (C2) which provides a unified web-based infrastructure for the operation of long-range MAS vehicles within the UK's National Marine Equipment Pool. The system automates the archiving, standardization and delivery of near-real-time science data and associated metadata from the vehicles to end-users and Global Data Assembly Centers mid-mission. Through the use and promotion of standard data formats and machine interfaces throughout the C2 system, we seek to enable future opportunities to collaborate with both the marine science and robotics communities to maximize the delivery of high-quality oceanographic data for world-leading science

    Cybersecurity issues in software architectures for innovative services

    Get PDF
    The recent advances in data center development have been at the basis of the widespread success of the cloud computing paradigm, which is at the basis of models for software based applications and services, which is the "Everything as a Service" (XaaS) model. According to the XaaS model, service of any kind are deployed on demand as cloud based applications, with a great degree of flexibility and a limited need for investments in dedicated hardware and or software components. This approach opens up a lot of opportunities, for instance providing access to complex and widely distributed applications, whose cost and complexity represented in the past a significant entry barrier, also to small or emerging businesses. Unfortunately, networking is now embedded in every service and application, raising several cybersecurity issues related to corruption and leakage of data, unauthorized access, etc. However, new service-oriented architectures are emerging in this context, the so-called services enabler architecture. The aim of these architectures is not only to expose and give the resources to these types of services, but it is also to validate them. The validation includes numerous aspects, from the legal to the infrastructural ones e.g., but above all the cybersecurity threats. A solid threat analysis of the aforementioned architecture is therefore necessary, and this is the main goal of this thesis. This work investigate the security threats of the emerging service enabler architectures, providing proof of concepts for these issues and the solutions too, based on several use-cases implemented in real world scenarios

    Design, development and orchestration of 5G-ready applications over sliced programmable infrastructure

    Get PDF
    5G networks design and evolution is considered as a key to support the introduction of digital technologies in economic and societal processes. Towards this direction, vertical industries' needs should be considered as drivers of 5G networks design and development with high priority. In the current manuscript, MATILDA is presented, as a holistic 5G end-to-end services operational framework tackling the overall lifecycle of design, development and orchestration of 5G-ready applications and 5G network services over programmable infrastructure, following a unified programmability model and a set of control abstractions

    Extreme weather conditions dashboard

    Get PDF
    Our planet Earth is changing due to the action of Man. Several factors influence the functioning of our planet, such as the constant need for human evolution, population growth and many others. Due to this, more and more we have extreme atmospheric events. There is an increasing need to become aware of this problem and take action both in terms of what we can do to prevent the destruction of our planet and prevent when these extreme events happen. The objective of this thesis is based on this last point. To combat the lack of a system in Portugal capable of helping the general public in extreme weather conditions, we created an atmospheric dashboard. The goals were that this dashboard was simple to use, open to the general public, with high spacial resolution (currently the smallest area used is the municipality, here we use an even smaller geographic area), flexible, and scalable so that new data sources or new variables could be added to the existing ones in the future without affecting the correct functioning of the system. This system uses meteorological data and relates them to other variables such as the age of the population, the thermal conditions of buildings, number of deaths, among others. The combination of all these data leads to the calculation of a risk index associated with each zone. The results show that the application has excellent portability, as it was easily installed on another device thanks to the virtualization offered by Docker. In terms of scalability, although did no tests at this level. However, during the application development, there was the need to add new data sources. Considering that the application is modularised, there was no problem with the existing or new data sources. Users see great potential in the application in terms of usability for prevention by the population during extreme weather events. Another positive aspect was that they liked the layout of the elements in the interface, namely the fact that the map area is the most prominent and most visible area in the dashboard. It also helped us get some feedback on what could be improved, such as using more distinct colors to present the level of risk or even improving the connection between the different views of the application. The results are positive and encourage further development of the application, applying the suggestions obtained from user testing
    • …
    corecore