20,062 research outputs found

    Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment

    Get PDF
    This paper introduces Secure Cloud Storage (SCS), a framework for Data Protection as a Service (DPaaS) to cloud computing users. Compared to the existing Data Encryption as a Service (DEaaS) such as those provided by Amazon and Google, DPaaS provides more flexibility to protect data in the cloud. In addition to supporting the basic data encryption capability as DEaaS does, DPaaS allows users to define fine-grained access control policies to protect their data. Once data is put under an access control policy, it is automatically encrypted and only if the policy is satisfied, the data could be decrypted and accessed by either the data owner or anyone else specified in the policy. The key idea of the SCS framework is to separate data management from security management in addition to defining a full cycle of data security automation from encryption to decryption. As a proof-of-concept for the design, we implemented a prototype of the SCS framework that works with both BT Cloud Compute platform and Amazon EC2. Experiments on the prototype have proved the efficiency of the SCS framework

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Management system requirements for wireless systems beyond 3G

    Get PDF
    This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints

    Container network functions: bringing NFV to the network edge

    Get PDF
    In order to cope with the increasing network utilization driven by new mobile clients, and to satisfy demand for new network services and performance guarantees, telecommunication service providers are exploiting virtualization over their network by implementing network services in virtual machines, decoupled from legacy hardware accelerated appliances. This effort, known as NFV, reduces OPEX and provides new business opportunities. At the same time, next generation mobile, enterprise, and IoT networks are introducing the concept of computing capabilities being pushed at the network edge, in close proximity of the users. However, the heavy footprint of today's NFV platforms prevents them from operating at the network edge. In this article, we identify the opportunities of virtualization at the network edge and present Glasgow Network Functions (GNF), a container-based NFV platform that runs and orchestrates lightweight container VNFs, saving core network utilization and providing lower latency. Finally, we demonstrate three useful examples of the platform: IoT DDoS remediation, on-demand troubleshooting for telco networks, and supporting roaming of network functions

    The Five Indicia of Virtual Property

    Get PDF
    [Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it. “It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital commodities. If it were to be damaged or stolen, the immediate questions would be: (1) how should a court identify it; and (2) what degree of legal protection should it receive? Because no court or legislature in the United States yet has recognized virtual property interests, a combination of contract and custom currently controls the relationship between Internet users and service providers. […] The question therefore becomes, how should courts identify protectable virtual property interests? Partially due to the dramatic success of Massively Multiplayer Online Games (MMOGs)9 and the rise of secondary markets for virtual characters and treasures from those games, a recent frenzy of legal scholarship has struggled to resolve this question. This note supports the legal recognition of virtual property interests, as already convincingly justified by the legal analogy to traditional property interests set forth by Professor Joshua Fairfield, buttressed by the practical reality that virtual property has significant economic value. Building on these rationales, this note proposes five indicia, common to most forms of virtual property, which a court should use to identify legally protectable virtual property interests on the Internet. These indicia are: (1) rivalry; (2) persistence; (3) interconnectivity; (4) secondary markets; and (5) value-added-by-users. This note cautions, however, against applying this newfound definition indiscriminately against the interests of the very entities without whom the property would not exist: the businesses hosting the remotely accessed computer resources (i.e., the service providers). […] Part III of this note applies the five indicia to the well-established framework of traditional property to illustrate this balancing process. Throughout the development of the law in this area, courts must retain the freedom and flexibility to craft appropriate equitable remedies on a case-by-case basis, and special attention should be directed to the practical issues commonly faced by Internet service providers. The ultimate purpose of virtual property jurisprudence should be to strike a balance that provides legal redress to users whose legitimate virtual property interests have been violated while simultaneously reducing liability and disincentives to service providers who promote and sustain the growth of the Internet.
    • …
    corecore