The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advances in cloud computing have made it a feasible and cost-effective solution to improve the resiliency of enterprise systems. However, the replication approach taken by cloud computing to provide resiliency leads to an increase in the number of ways an attacker can exploit or penetrate the systems. This calls for designing cloud systems that can accurately detect anomalies and dynamically adapt...
Organizations increasingly utilize cloud services such as Infrastructure as a Service (IaaS) where virtualized IT infrastructure are offered on demand by cloud providers. A major challenge for cloud providers is the security of virtual resources provided to its customers. In particular, a key concern is whether, for example, virtual machines (VMs) in the datacenter are performing tasks that are not...
Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effects of such attacks. However, limited security resources prohibit full detection coverage on all VMs...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
Many Cyber-Physical Systems (CPS) at different scales are being developed for a variety of applications that provide valuable interactions between the cyber world and the physical systems and environments. However, the development of these systems face many challenges due to the complexity of the applications. An appropriate middleware is needed to provide infrastructural support and assist the development...
Cloud federation is an emergent cloud-computing paradigm where partner organisations share data and services hosted on their own cloud platforms. In this context, it is crucial to enforce access control policies that satisfy data protection and privacy requirements of partner organisations. However, due to the distributed nature of cloud federations, the access control system alone does not guarantee...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Bees are an important part of our echo system. Pollinators, such as bees, help at least 30% of the worlds crops and 90% of the worlds wild plans to thrive via cross-pollination. Studies show that between 2015 and 2016 beekeepers lost 44% of bee colonies over the winter, this is up about 10% from the previous decade. Causes for this decline is correlated to the overall hive health. The healthier the...
Applications integrating software with a large number of physical objects and devices in a large-scale Internet of Things (IoT) networks are on the rise. Some examples of these applications are smart grids and water networks and intelligent transportation systems. As they operate in and control a large heterogeneous environment, these applications need real-time controls, powerful and scalable data...
Applications for data analysis of biomedical data are complex programs and often consist of multiple components. Re-usage of existing solutions from external code repositories or program libraries is common in algorithm development. To ease reproducibility as well as transfer of algorithms and required components into distributed infrastructures Linux containers are increasingly used in those environments,...
The organization of monitoring of an aromosecurity of space with the help the aromosensory of systems and networks of terminals of smells. Approach which allows to create effective systems for safety of vital space, protection from technogenic, productions, social interactions, etc. factors is offered.
Quality of Service (QoS) is an important enabler for communication in industrial environments. The Arrowhead Framework was created to support local cloud functionalities for automation applications by means of a Service Oriented Architecture. To this aim, the framework offers a number of services that ease application development, among them the QoSSetup and the Monitor services, the first used to...
The vast attack surface of clouds presents a challenge in deploying scalable and effective defenses. Traditional security mechanisms, which work from inside the VM fail to provide strong protection as attackers can bypass them easily. The only available option is to provide security from the layer below the VM i.e., the hypervisor. Previous works that attempt to secure VMs from "outside"...
Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service...
Nowadays, nested VMs are often being used to address compatibility issues, security concerns, software scaling and continuous integration scenarios. With the increased adoption of nested VMs, there is a need for newer techniques to troubleshoot any unexpected behavior. Because of privacy and security issues, ease of deployment and execution overhead, these investigation techniques should preferably...
Cloud computing has been a frequently researched subject as it brings many advantages, such as the ability to store data remotely and scale rapidly, but also comes with several issues, including privacy, trust and security. The decision whether it is best to go ‘into the cloud’ or to ‘stay inside’ is quite complicated when it comes to privacy issues, considering that the organization itself stays...
The utilization of cloud computing resources contributes to a fast growth of e-business and e-government where businesses and government agencies often require processing a large volume of service requests in a constrained period of time. In order to achieve on-time completion of a large volume of time-constrained parallel processes, this paper proposes a novel dynamic checkpoint selection strategy...
The main objective of this paper is to compare and document low cost open source SCADA options available for remote controlling and monitoring of inverters. To achieve this objective from the client side, interface between inverter and the SCADA has been developed. Three low cost options are being tested and tabulated the paper comparing inherent advantages and disadvantages. From the server side...
Nowadays, the study of underwater WSNs (UWSNs) has become a hot topic. However, UWSNs have not been fully utilized in the complex underwater environment, since there are some difficulties in controlling mobile sensor nodes and underwater environment conditions. In addition, how to ensure the security of UWSNs and the safety of underwater mobile sensor nodes has not been solved well. In this article,...
Today, the world is influenced by new emerging technologies. As a result we are surrounded by a number of smart devices. These smart devices make our life easy and convenient. On the contrary, we are exposed to a number of threats and cyber attacks. There is always a threat to our privacy. In this paper, we discuss the different applications of IOT and the security threats involved.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.