475 research outputs found

    Provenance Threat Modeling

    Full text link
    Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set. Provenance systems are also used for debugging, process improvement, understanding data proof of ownership, certification of validity, etc. The provenance of data includes information about the processes and source data that leads to the current representation. In this paper we study the security risks provenance systems might be exposed to and recommend security solutions to better protect the provenance information.Comment: 4 pages, 1 figure, conferenc

    Security as a service in smart clouds: opportunities and concerns

    Get PDF
    The cloud computing paradigm emerged shortly after the introduction of the "invisible" grid concepts but it has taken only a few years for cloud computing to gain enormous momentum within industry and academia alike. However, providing adequate security support by those complex distributed systems is of primary importance for the wide adoption of cloud computing by the end users. This paper gives an overview of the main cloud security issues and challenges. Existing and proposed solutions are also presented with particular attention to the security as a service approach. Some of the available directions for future work are also discussed

    Chapter Securing the Home Energy Management Platform

    Get PDF
    Recently, many efforts have been done to chemically functionalize sensors surface to achieve selectivity towards diagnostics targets, such as DNA, RNA fragments and protein tumoural biomarkers, through the surface immobilization of the related specific receptor. Especially, some kind of sensors such as microcantilevers (gravimetric sensors) and one-dimensional photonics crystals (optical sensors) able to couple Bloch surface waves are very sensitive. Thus, any kind of surface modifications devoted to functionalize them has to be finely controlled in terms of mass and optical characteristics, such as refractive index, to minimize the perturbation, on the transduced signal, that can affect the response sensitivity towards the detected target species

    Survey on securing data storage in the cloud

    Get PDF
    Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field
    • …
    corecore