14,713 research outputs found
Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection
The new generation of security threats has been promoted by digital
currencies and real-time applications, where all users develop new ways to
communicate on the Internet. Security has evolved in the need of privacy and
anonymity for all users and his portable devices. New technologies in every
field prove that users need security features integrated into their
communication applications, parallel systems for mobile devices, internet, and
identity management. This review presents the key concepts of the main areas in
computer security and how it has evolved in the last years. This work focuses
on cryptography, user authentication, denial of service attacks, intrusion
detection and firewalls
A New Secure Mobile Cloud Architecture
The demand and use of mobile phones, PDAs and smart phones are constantly on
the rise as such, manufacturers of these devices are improving the technology
and usability of these devices constantly. Due to the handy shape and size
these devices come in, their processing capabilities and functionalities, they
are preferred by many over the conventional desktop or laptop computers. Mobile
devices are being used today to perform most tasks that a desktop or laptop
computer could be used for. On this premise, mobile devices are also used to
connect to the resources of cloud computing hence, mobile cloud computing
(MCC). The seemingly ubiquitous and pervasive nature of most mobile devices has
made it acceptable and adequate to match the ubiquitous and pervasive nature of
cloud computing. Mobile cloud computing is said to have increased the
challenges known to cloud computing due to the security loop holes that most
mobile devices have.Comment: 15 Pages, 8 Figures, 9 Tables, A New Secure Mobile Cloud Architecture
201
NFV: State of the Art, Challenges and Implementation in Next Generation Mobile Networks (vEPC)
As mobile network users look forward to the connectivity speeds of 5G
networks, service providers are facing challenges in complying with
connectivity demands without substantial financial investments. Network
Function Virtualization (NFV) is introduced as a new methodology that offers a
way out of this bottleneck. NFV is poised to change the core structure of
telecommunications infrastructure to be more cost-efficient. In this paper, we
introduce a Network Function Virtualization framework, and discuss the
challenges and requirements of its use in mobile networks. In particular, an
NFV framework in the virtual environment is proposed. Moreover, in order to
reduce signaling traffic and achieve better performance, this paper proposes a
criterion to bundle multiple functions of virtualized evolved packet-core in a
single physical device or a group of adjacent devices. The analysis shows that
the proposed grouping can reduce the network control traffic by 70 percent.Comment: To appear in IEEE Network Mag., November 2014 Issu
Application Management in Fog Computing Environments: A Taxonomy, Review and Future Directions
The Internet of Things (IoT) paradigm is being rapidly adopted for the
creation of smart environments in various domains. The IoT-enabled
Cyber-Physical Systems (CPSs) associated with smart city, healthcare, Industry
4.0 and Agtech handle a huge volume of data and require data processing
services from different types of applications in real-time. The Cloud-centric
execution of IoT applications barely meets such requirements as the Cloud
datacentres reside at a multi-hop distance from the IoT devices. \textit{Fog
computing}, an extension of Cloud at the edge network, can execute these
applications closer to data sources. Thus, Fog computing can improve
application service delivery time and resist network congestion. However, the
Fog nodes are highly distributed, heterogeneous and most of them are
constrained in resources and spatial sharing. Therefore, efficient management
of applications is necessary to fully exploit the capabilities of Fog nodes. In
this work, we investigate the existing application management strategies in Fog
computing and review them in terms of architecture, placement and maintenance.
Additionally, we propose a comprehensive taxonomy and highlight the research
gaps in Fog-based application management. We also discuss a perspective model
and provide future research directions for further improvement of application
management in Fog computing
Blockchain access control Ecosystem for Big Data security
In recent years, the advancement in modern technologies has experienced an
explosion of huge data sets being captured and recorded in different fields,
but also given rise to concerns the security and protection of data storage,
transmission, processing, and access to data. The blockchain is a distributed
ledger that records transactions in a secure, flexible, verifiable and
permanent way. Transactions in a blockchain can be an exchange of an asset, the
execution of the terms of a smart contract, or an update to a record. In this
paper, we have developed a blockchain access control ecosystem that gives asset
owners the sovereign right to effectively manage access control of large data
sets and protect against data breaches. The Linux Foundation's Hyperledger
Fabric blockchain is used to run the business network while the Hyperledger
composer tool is used to implement the smart contracts or transaction
processing functions that run on the blockchain network
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
This paper presents a comprehensive survey of existing authentication and
privacy-preserving schemes for 4G and 5G cellular networks. We start by
providing an overview of existing surveys that deal with 4G and 5G
communications, applications, standardization, and security. Then, we give a
classification of threat models in 4G and 5G cellular networks in four
categories, including, attacks against privacy, attacks against integrity,
attacks against availability, and attacks against authentication. We also
provide a classification of countermeasures into three types of categories,
including, cryptography methods, humans factors, and intrusion detection
methods. The countermeasures and informal and formal security analysis
techniques used by the authentication and privacy preserving schemes are
summarized in form of tables. Based on the categorization of the authentication
and privacy models, we classify these schemes in seven types, including,
handover authentication with privacy, mutual authentication with privacy, RFID
authentication with privacy, deniable authentication with privacy,
authentication with mutual anonymity, authentication and key agreement with
privacy, and three-factor authentication with privacy. In addition, we provide
a taxonomy and comparison of authentication and privacy-preserving schemes for
4G and 5G cellular networks in form of tables. Based on the current survey,
several recommendations for further research are discussed at the end of this
paper.Comment: 24 pages, 14 figure
A Survey on the Security of Pervasive Online Social Networks (POSNs)
Pervasive Online Social Networks (POSNs) are the extensions of Online Social
Networks (OSNs) which facilitate connectivity irrespective of the domain and
properties of users. POSNs have been accumulated with the convergence of a
plethora of social networking platforms with a motivation of bridging their
gap. Over the last decade, OSNs have visually perceived an altogether
tremendous amount of advancement in terms of the number of users as well as
technology enablers. A single OSN is the property of an organization, which
ascertains smooth functioning of its accommodations for providing a quality
experience to their users. However, with POSNs, multiple OSNs have coalesced
through communities, circles, or only properties, which make
service-provisioning tedious and arduous to sustain. Especially, challenges
become rigorous when the focus is on the security perspective of cross-platform
OSNs, which are an integral part of POSNs. Thus, it is of utmost paramountcy to
highlight such a requirement and understand the current situation while
discussing the available state-of-the-art. With the modernization of OSNs and
convergence towards POSNs, it is compulsory to understand the impact and reach
of current solutions for enhancing the security of users as well as associated
services. This survey understands this requisite and fixates on different sets
of studies presented over the last few years and surveys them for their
applicability to POSNs...Comment: 39 Pages, 10 Figure
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges
For various reasons, the cloud computing paradigm is unable to meet certain
requirements (e.g. low latency and jitter, context awareness, mobility support)
that are crucial for several applications (e.g. vehicular networks, augmented
reality). To fulfil these requirements, various paradigms, such as fog
computing, mobile edge computing, and mobile cloud computing, have emerged in
recent years. While these edge paradigms share several features, most of the
existing research is compartmentalised; no synergies have been explored. This
is especially true in the field of security, where most analyses focus only on
one edge paradigm, while ignoring the others. The main goal of this study is to
holistically analyse the security threats, challenges, and mechanisms inherent
in all edge paradigms, while highlighting potential synergies and venues of
collaboration. In our results, we will show that all edge paradigms should
consider the advances in other paradigms.Comment: In press, accepted manuscript: Future Generation Computer System
Internet of Things: Survey on Security and Privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among
different entities or "things". While its purpose is to provide effective and
efficient solutions, security of the devices and network is a challenging
issue. The number of devices connected along with the ad-hoc nature of the
system further exacerbates the situation. Therefore, security and privacy has
emerged as a significant challenge for the IoT. In this paper,we aim to provide
a thorough survey related to the privacy and security challenges of the IoT.
This document addresses these challenges from the perspective of technologies
and architecture used. This work focuses also in IoT intrinsic vulnerabilities
as well as the security challenges of various layers based on the security
principles of data confidentiality, integrity and availability. This survey
analyzes articles published for the IoT at the time and relates it to the
security conjuncture of the field and its projection to the future.Comment: 16 pages, 3 figure
Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems
Attribute-based encryption is a form of encryption which offers the capacity
to encrypt data such that it is only accessible to individuals holding a
satisfactory configuration of attributes. As cloud and distributed computing
become more pervasive in both private and public spheres, attribute-based
encryption holds potential to address the issue of achieving secure
authentication, authorization, and transmission in these environments where
performance must scale with security while also supporting fine-grained access
control among a massively large number of consumers. With this work, we offer
an example generic configurable stateless protocol for secure attribute-based
authentication, authorization, storage, and transmission in distributed storage
systems based upon ciphertext-policy attribute-based encryption (CP-ABE),
discuss the experience of implementing a distributed storage system around this
protocol, and present future avenues of work enabled by such a protocol. The
key contribution of this work is an illustration of a means by which any CP-ABE
system may be utilized in a black-box manner for attribute-based authentication
and cryptographically enforced attribute-based access control in distributed
storage systems
- …