The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent years have witnessed a growing popularity of file synchronization systems. In this paper, we take a first step towards the understandings of a new Peer-to-Peer file synchronization system, Resilio Sync. Our real-world measurement identifies its unique features and reveals its potential fairness issues
Internet of Things (IoT) serves not only as an essential part of the new generation information technology but as an important development stage in the information era. IoT devices such as unmanned aerial vehicles, robots and wearable equipments have been widely used in recent years. For most organizations' inner networks, innumerable dynamic connections with Internet accessible IoT devices occur...
The Internet of Things (IoT) is producing a tidal wave of data, much of it originating at the network edge, from applications with requirements unmet by the traditional back-end Cloud architecture. To address the disruption caused by the overabundance of data, this paper offers a holistic data-centric architectural vision for the data-centric IoT. It advocates that we rethink our approach to the design...
from the viewpoint of new malicious code signatures, Symantec created 2,895,802, Countermeasures against these cyber security threats. Consequently, an organization in one country may be attacked by malware whose countermeasures are already known and implemented within another organization in another country. Such incidents occur due to the lack of exchanging of information among organizations. This...
Storage demands in the data centers are growing dramatically for most internet and cloud service providers today. More and more service providers are adopting Software-Defined Storage (SDS) instead of traditional fiber channel based storage appliances due to the lead time, expense, and flexibility. However, data centers are held back by storage I/O that cannot keep up with ever-increasing demand,...
Utility computing models such as cloud computing provide a variety of computing services using several pricing options. Flexibility of requirements and availability of pricing options, enable a consumer to make trade-offs between cost and time. These trade-offs are governed by consumers' behavior with respect to how they discount price vis-à-vis time of delivery. In this paper, we study this trade-off...
Distributed and cloud storage systems are used to reliably store large-scale data. To enhance data reliability, erasure codes have been recently proposed and used in real-world distributed and cloud storage systems. Conventional erasure codes are not suitable for distributed storage systems, as they cause significant repair bandwidth and disk I/O. As a solution, a class of erasure codes called locally...
We consider the problem of proactive (i.e. predictive) content caching that is aware of the costs of retention of the content in the cache. Prior work on caching (whether proactive or reactive) does not explicitly take into account the storage cost due to the duration of time for which a content is cached. This new problem, which we call retention aware caching, is motivated by two recent technological...
Attacker VMs try to co-reside with victim VMs on the same physical infrastructure as a precursor to launching attacks that target information leakage. VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, we first undertake an experimental study on Amazon EC2 to obtain an in-depth understanding of the side-channels an attacker can use to ascertain co-residency...
Auto-scaling mechanisms are an important line of defense against Distributed Denial of Service (DDoS) in the cloud. Using auto-scaling, machines can be added and removed in an on-line manner to respond to fluctuating load. It is commonly believed that the auto-scaling mechanism casts DDoS attacks into Economic Denial of Sustainability (EDoS) attacks. Rather than suffering from performance degradation...
Live virtual machine (VM) migration is commonly used for enabling dynamic resource or fault management, or for load balancing in datacenters or cloud platforms. A service hosted by a VM may also be migrated to prevent its visibility to an external adversary who may seek to disrupt its operation by launching a DDoS attack against it. We first show that current systems cannot adequately hide a VM migration...
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to the outsourced data confidentiality, we also aim to ensure the integrity of the deduplicated cloud storage. With the existing works based on Provable Data Possession (PDP)/Proof of Retrievability (PoR), we are either required to rely on a fully trusted proxy server or inevitably...
Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval,...
In contemporary IT and Internet society, Cloud computing brings a paradigm shift not only for successfully evolving large distributed software applications but also for delivering a number of innovative services and applications. Cloud computing is an umbrella enveloping several models of service, like SaaS, IaaS, PaaS, TaaS. In particular, software testing in/on/over cloud is the focus of this paper...
The development of mobile industry promotes a deep progress of mobile applications, such as vehicular social networks (VSNs), which afford large scale data sharing between vehicles. However, trustworthiness has still been a potential security issue. Traditional public key infrastructure (PKI) cannot restrain malicious users as they are authorized in VSNs. For the reason, this paper proposes a trust...
The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of...
Network virtualization and SDN-based routing allow carriers to flexibly configure their networks in response to demand and unexpected network disruptions. However, cellular networks, by nature, pose some unique challenges because of user mobility and control/data plane partitioning, which calls for new architectures and provisioning paradigms. In this paper, we address the latter part by devising...
The GENI network testbed was designed to enable experimentation with network protocols by offering the capability to construct virtual networks at the link layer (L2). GENI users build virtual networks in their GENI slices that span resources on multiple GENI aggregates, linked by L2 network circuits from network fabric providers (e.g., Internet2). This paper summarizes new features for cross-slice...
In still developing, public cloud-computing markets, prices for virtual machine (VM) offerings fluctuate, and not just for spot/preemptible instances. Moreover, some (particularly derivative) providers allow for fine-grain initial resource provisioning and dynamic reprovisioning of VMs. In this preliminary study, we consider long-lived tenants of a public cloud under resource-based service-level agreements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.