The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
The majority of business activity of our integrated and connected world takes place in networks based on cloud computing infrastructure that cross national, geographic and jurisdictional boundaries. Such an efficient entity interconnection is made possible through an emerging networking paradigm, Software Defined Networking (SDN) that intends to vastly simplify policy enforcement and network reconfiguration...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
The aggregation of multiple carriers and even heterogeneous links is a well established method to boost data rates in wireless networks. At the same time, Network Coding has been proven as an efficient and robust mechanism to distribute content in mesh networks or cloud storages. In this paper, we introduce with ScalaNC a new method of heterogeneous link aggregation, which requires no changes in the...
Federation is generally used to denote collaboration between IT systems in different administrative domains to achieve common goals. Different administrative domains are typically distinct and loosely coupled by definition. While domains may have some degree of self-awareness, their awareness of other domains may be weak or non-existent. Hence, there is a fundamental challenge concerning how to build...
In cloud storage, the data owner and data users can easily perform cooperative work on shared data. In this paper, we focus on operation behavior auditing in shared cloud storage, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination for the forensic investigation in shared cloud. We first introduce a novel secure public auditing model for...
In cloud storage, auditing for operation behavior logs (OBLs) plays an increasingly important role in the field of cloud auditing. In this paper, we first introduce our third party auditing model for user's operation behavior. Further, a novel secure logging approach is proposed to ensure the OBLs security in cloud. Then, we present a secure public auditing scheme for OBLs. Specifically, BLS signature...
Ubiquitous learning environments have an increasing trend considering the huge number of connected smart devices dedicated to educational services. Ubiquitous learning (U-learning) provides to students the possibility to learn at anyplace and anytime within the collaborative environment using interactive multimedia system that enables effective communication among teacher and learners. The architecture...
In a complicated cloud storage environment in which users upload a large number of files everyday, in order to better solve the challenge of inefficient malicious detection and weak adaptability of multi-platform detection in the traditional way, we propose a malicious file detection method which is based on image texture analysis and BP neural network algorithm. By combining the technology of image...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight...
The proliferation of consumer Internet of Things (IoT) devices offers as many convenient benefits as it poses significant vulnerabilities. Patching or otherwise mitigating these vulnerabilities will be difficult for the existing home security ecosystem. This paper proposes a central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic...
Vehicular ad hoc network is based on MANET all the vehicle to vehicle and vehicle roadside are connected to the wireless sensor network. In this paper mainly discuss on the security in the VANET in the lightweight cloud environment. Moving vehicle on the roadside connected through the sensor nodes and to provide communication between the vehicles and directly connected to the centralized environment...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
As its complexity grows, securing a system is harder than it looks. Even with efficient security mechanisms, their configuration remains a complex task. Indeed, the current practice is the hand-made configuration of these mechanisms to protect systems about which we generally lack information. Cloud computing brings its share of new security concerns but it may also be considered as leverage to overcome...
Separation of network control from devices in Software Defined Network (SDN) allows for centralized implementation and management of security policies in a cloud computing environment. The ease of programmability also makes SDN a great platform implementation of various initiatives that involve application deployment, dynamic topology changes, and decentralized network management in a multi-tenant...
Biometric-established authentication method is maturing into fitting one probably the most promising candidate for either replacing or bettering normal approaches founded on password or token on the cloud. This technological know-how is a deterministic characteristic to provide a safer and more user friendly approach to authentication. However some vulnerability threatens the adoption of biometrics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.