The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lightweight virtualization technologies have revolutionized the world of software development by introducing flexibility and innovation to this domain. Although the benefits introduced by these emerging solutions have been widely acknowledged in cloud computing, recent advances have led to the spread of such technologies in different contexts. As an example, the Internet of Things (IoT) and mobile...
Over the past years the use of digital devices has increased and home networks continue to grow in size and complexity. By the use of virtualized residential gateways advanced functionality can be moved away from the home by extending the customers edge network to the Internet Service Provider (ISP) and thereby decrease the administrative burden for the home user. By employing edge computing and cloud...
Technologies like software defined networking and cloud computing allow for new approaches in mobile network design. A key driver for bringing mobile networks into the cloud is the expected cost reduction resulting from economies of scale: all software run on commercial off-the-shelf server which can be accumulated in one or more datacenters with all of those having a similar setup, minimizing the...
Industrial and academic focus in recent years has been shifting towards the Fifth Generation Mobile Networks (5G). In the horizon 2020, the key improvements will rely on technical breakthroughs in the radio access networks, mainly to bring increased bandwidth to the user devices. However, there is still much discussion ongoing about the evolution required in the core network to accommodate increased...
Industrial and academic focus in recent years has been shifting towards the Fifth Generation Mobile Networks (5G). In the horizon 2020, the key improvements will rely on technical breakthroughs in the radio access networks, mainly to bring increased bandwidth to the user devices. However, there is still much discussion ongoing about the evolution required in the core network to accommodate increased...
Virtual Desktop Infrastructure (VDI) is a new generation of cloud service in which users operating systems execute in a cloud data center. Users can access their desktops and applications by using thin client devices. This thin client is consisting of only a screen attached with low power CPU. This new paradigm of delivering remote desktop provides benefits in terms of flexibility, cost reduction,...
Wireless Sensor Network (WSN) has led to a new paradigm of Internet of Everything (IoE). In case of Ambient Assisted Living (AAL) that is based on the sensor network is usually deployed for single application. However, the future of WSNs based on sensors lies in the multiple application support and the aggregation of resources either in the form of hardware or software. To deal with the challenges...
Software-Defined Networking brings application-level programmability to access and aggregation networks. This paper explains architectures and use-cases and reviews recent work.
In cloud computing, hypervisor is the all-powerful software running in the highest privilege layer, thus attackers who compromise a hypervisor may jeopardize the whole cloud, especially cause memory corruption of any sensitive workloads within the cloud. In this paper, we propose a novel architecture and approach to provide memory protection from an untrusted hypervisor on current x86 platforms. Unlike...
A previously developed plug-in architecture for network-virtualization nodes allows network operators to introduce new types of virtual nodes and links and slice developers to use them in slices (i.e., virtual networks). In this paper, a method for extending network-virtualization infrastructures by introducing plug-ins to nodes in the infrastructure and a freely-designed plug-in-specific packet header,...
Mobile security becomes a hot topic recently, especially in mobile payment and privacy data fields. Traditional solution can't keep a good balance between convenience and security. Against this background, a dual OS security solution named Trusted Execution Environment (TEE) is proposed and implemented by many institutions and companies. However, it raised TEE fragmentation and control problem. Addressing...
Wireless Sensor Network (WSN) has led to a new paradigm of Internet of Things (IoT). WSNs are usually deployed for particular application. However, the future of WSNs in Smart Home and Ambient Assisted Living (SHAAL) lies in the aggregation and allocation of resources serving diverse applications. Virtualization of a sensor network is an emerging concept that enables aggregation of multiple independent...
Cloud computing is the state of the art approach of information technologies. While migrating from conventional data centers to cloud computing paradigm, administrators have to consider costs. Security is one of the biggest problems for all information technologies and also in cloud computing. Some mechanisms are used such as antivirus software, firewall, guard systems or intrusion detection/prevention...
The use of virtualization in HPC clusters can provide rich software environments, application isolation and efficient workload management mechanisms, but system-level virtualization introduces a software layer on the computing nodes that reduces performance and inhibits the direct use of hardware devices. We present an unobtrusive user-level platform to execute virtual machines inside batch jobs that...
Three important factors in dependable computing are cost, error correction and high availability. In this paper we will focus on assessing a proposed model that encapsulates all three important factors and a virtual architecture that can be implemented in the IaaS layer of cloud computing. The proposed model will be assessed against a popular existing architecture (Triple Modular Redundant System...
Hardware virtualization is a well known technique in processor based hardware architectures for abstraction of the complexity of an underlying hardware from the programmer. Not only processor based hardware, especially Field Programmable Gate Arrays (FPGA), comes with a high complexity and the exploitation for developers suffer from this fact. Each change in the hardware e.g. through an introduction...
In residential environments, a home gateway platform can offer services that are configurable by a user depending on current needs or preferences. Gateway devices are very often managed by a service provider or an access provider to enhance performance or guarantee QoS. Assuming a multi-provider and/or multi-user scenario, a secure framework has to maintain security and privacy between different gateway...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.