The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
Internet of Things (IoT) is an enabler for the intelligence appended to many central features of the modern world, such as hospitals, cities, grids, organizations, and buildings. The security and privacy are some of the major issues that prevent the wide adoption of Internet of Things. In this paper, with example scenarios, we are presenting review of security attacks from the perspective of layers...
Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems...
We introduce a set of tools and techniques for increasing the resilience and trustworthiness of identity providers (IdPs) based on OpenID. To this purpose we propose an architecture of specialized components capable of fulfilling the essential requirements for ensuring high availability, integrity and higher confidentiality guarantees for sensitive data and operations. Additionally, we also discuss...
Cloud computing, which has emerged as one of the most influential paradigms in the IT industry in recent years, is powered by the concept of virtualization technology. For achieving energy efficiency, load balancing and high availability of physical server in Cloud Data Center, the virtual machines should be migrated from one physical server to another. During the migration process, some steps should...
Reliability and security are properties which are required by any computing system. This paper will describe modern trends in distributed file systems (DFS) oriented on reliability and security in these systems. The first part will present the definition of distributed systems and distributed file systems, with a focus on reliability and security in these systems, then describe traditional DFS like...
File-sharing is one of the main applications in P2P technology. JXTA is the most representative development platform for P2P. According to the research and analysis of the current P2P technologies and JXTA platform, we implemented a P2P file-sharing system based on JXTA. The system realized the basic functions of file-sharing and also improved its security. We propose three kinds of security strategy,...
To enhance access security capability of WiMAX (Worldwide Interoperability for Microwave Access), a trusted access scheme based on identity is proposed in this paper. It adopts trusted access architecture which includes three layers: identity layer, evaluation layer and authentication layer. Firstly, every entity is assigned only an identity in the identity layer; secondly, credible attribute of the...
In wireless sensor networks (WSNs), secure data aggregation is an important application. Previous works are implemented by authentication among neighboring sensors. Considering that in many cases, data aggregation is both spatial and temporal correlation, this paper proposes a distributed and localized secure data aggregation algorithm based on behavior trust (BTDA). The security and reliability of...
With the success of wireless technologies, standard wireless technologies are envisioned for the development in industrial environments as well. The paper discusses and analyzes the feasibility and method of applying the wireless communication technology in the industrial network system. In wired environments, anti-jamming and security are well catered for industrial systems. But when wireless links...
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But the features of RFID system and the constraints of RFID devices may bring about various security problems. In this paper, we propose a novel cross-layer architecture designed to...
Many critical systems require high reliability and availability even when the systems are being maintained or upgraded. Soft System Bus (SSB) is the middleware for such systems. A conceptual architecture of SSB based on structured p2p network was proposed in our previous work. But, how high reliability and availability can be ensured was left unsolved. In this paper, we propose mechanisms to solve...
A proposed grid middleware system includes specific enhancements to support the development and assessment of highly secure, dependable, service-oriented grid systems and applications. Service-oriented architectures can be defined as application architectures "within which all functions are defined as independent services.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.