2,660 research outputs found
Security Implications of Fog Computing on the Internet of Things
Recently, the use of IoT devices and sensors has been rapidly increased which
also caused data generation (information and logs), bandwidth usage, and
related phenomena to be increased. To our best knowledge, a standard definition
for the integration of fog computing with IoT is emerging now. This integration
will bring many opportunities for the researchers, especially while building
cyber-security related solutions. In this study, we surveyed about the
integration of fog computing with IoT and its implications. Our goal was to
find out and emphasize problems, specifically security related problems that
arise with the employment of fog computing by IoT. According to our findings,
although this integration seems to be non-trivial and complicated, it has more
benefits than the implications.Comment: 5 pages, conference paper, to appear in Proceedings of the ICCE 2019,
IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11-
13, 2019, Las Vegas, NV, US
Security and Privacy Issues in Cloud Computing
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew ex-ponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security and privacy issues still pose significant challenges. In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. In particular, we discuss three critical challenges: regulatory, security and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment
(RIP) Cybersecurity Agility: Antecedents and Effects on Security Incident Management Effectiveness
Increased dynamism and complexity of cybersecurity threat environments mean that traditional approaches of managing cybersecurity are no longer effective to minimize the harm of cybersecurity attacks. Although comprehensive guidelines and past studies that address the issue of effective incident management are available, a conceptual model that explains and addresses organizational factors that might help or impede organizational ability to manage cybersecurity incidents effectively is yet to be developed and empirically tested. To address this gap, this research aim to develop and empirically test a conceptual model that would address the role of both social and technical part of cybersecurity infrastructure in enhancing organization’s incident management effectiveness. Based on dynamic capability perspective, a research model has been developed. Research motivation, literature review, research methodology, as well as potential research and practical implications are discussed in this manuscript
GNFC: Towards Network Function Cloudification
An increasing demand is seen from enterprises to host and dynamically manage middlebox services in public clouds in order to leverage the same benefits that network functions provide in traditional, in-house deployments. However, today's public clouds provide only a limited view and programmability for tenants that challenges flexible deployment of transparent, software-defined network functions. Moreover, current virtual network functions can't take full advantage of a virtualized cloud environment, limiting scalability and fault tolerance. In this paper we review and evaluate the current infrastructural limitations imposed by public cloud providers and present the design and implementation of GNFC, a cloud-based Network Function Virtualization (NFV) framework that gives tenants the ability to transparently attach stateless, container-based network functions to their services hosted in public clouds. We evaluate the proposed system over three public cloud providers (Amazon EC2, Microsoft Azure and Google Compute Engine) and show the effects on end-to-end latency and throughput using various instance types for NFV hosts
Container-based network function virtualization for software-defined networks
Today's enterprise networks almost ubiquitously deploy middlebox services to improve in-network security and performance. Although virtualization of middleboxes attracts a significant attention, studies show that such implementations are still proprietary and deployed in a static manner at the boundaries of organisations, hindering open innovation. In this paper, we present an open framework to create, deploy and manage virtual network functions (NF)s in OpenFlow-enabled networks. We exploit container-based NFs to achieve low performance overhead, fast deployment and high reusability missing from today's NFV deployments. Through an SDN northbound API, NFs can be instantiated, traffic can be steered through the desired policy chain and applications can raise notifications. We demonstrate the systems operation through the development of exemplar NFs from common Operating System utility binaries, and we show that container-based NFV improves function instantiation time by up to 68% over existing hypervisor-based alternatives, and scales to one hundred co-located NFs while incurring sub-millisecond latency
Rethinking Security Incident Response: The Integration of Agile Principles
In today's globally networked environment, information security incidents can
inflict staggering financial losses on organizations. Industry reports indicate
that fundamental problems exist with the application of current linear
plan-driven security incident response approaches being applied in many
organizations. Researchers argue that traditional approaches value containment
and eradication over incident learning. While previous security incident
response research focused on best practice development, linear plan-driven
approaches and the technical aspects of security incident response, very little
research investigates the integration of agile principles and practices into
the security incident response process. This paper proposes that the
integration of disciplined agile principles and practices into the security
incident response process is a practical solution to strengthening an
organization's security incident response posture.Comment: Paper presented at the 20th Americas Conference on Information
Systems (AMCIS 2014), Savannah, Georgi
- …