The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service attacks against high-profile targets have become more frequent in recent years. In response to such massive attacks, several architectures have adopted proxies to introduce layers of indirection between end users and target services and reduce the impact of a DDoS attack by migrating users to new proxies and shuffling clients across proxies so as to isolate malicious...
This poster looks at adapting Intrusion Detection Systems solutions to multiple SDN based domains. We present a preliminary evaluation of the performance in terms of latency cost while offering IDS solutions as a service (IDSaaS) in SDN. The goal is to eventually be able to determine what resources are needed in order for the IDSaaS in SDN to perform in a manner that is almost comparable to running...
Proofs of Retrievability (POR) is a scheme to build a verifiable storage on a remote server that a client can access the data randomly, and periodically execute an efficient Audit protocol to ensure that the data is intact. In dynamic POR, the difficulties are to maintain the latest version of the data while achieving efficient Update and Audit. In this paper, we propose PDPOR that achieves the best...
The current PKI has problems like certificate revocations and fraudulent certificates. To address such issues, we propose TwinPeaks, which is a new infrastructure to distribute public keys of named entities online. TwinPeaks leverages certificateless public key cryptography (CL-PKC), which we extend to make the public key of an entity depend on any combination of its networking parameters; thus TwinPeaks...
In the last decade, Tor proved to be a very successful and widely popular system to protect users' anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. In this work we introduce, the concept of honey onions, a...
In this paper, we present the design and implementation details of a Kinect-based framework for human activity tracking. The framework is intentionally designed to be open so that it can communicate over the network with other systems and mobile/wearable devices. The possibility of integrating with other devices and systems makes it possible to use Kinect for human activity tracking in a way unforeseen...
In this paper, we present a Smart Audio/Video Mixing method (SmartAVM) for a software-based multipoint control unit (SW-based MCU) to provide an immersive video conferencing service. The SmartAVM determines the mixing mode to one of the true mixing, equal mixing, and main speaker decision-based mixing modes, according to the number of clients (i.e., human users) connected to the SW-based MCU. Then,...
In network education, there are several benefits for conducting cooperative practice among a variety of learning levels of learners. We have proposed a hands-on IP network practice system by constructing a virtual network on a cloud server. In our past study, we introduced a pseudo cooperative practice function to our system so that cooperative practice with a companion agent can be accomplished even...
An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a proactive secret sharing scheme suitable for...
Live migration of Virtual Machines (VMs) is a key technique to quickly migrate workloads in response to events such as impending failure or load changes. Despite extensive research, state-of-the-art live migration approaches take a long time to migrate a VM, which in turn negatively impacts the application performance during migration. We present, Quick Eviction, a new approach to significantly speed...
Motivated by applications of distributed storage systems to key-value stores, recently, the multi-version coding problem was proposed to store data that is frequently being updated in a distributed storage system. In particular, in multi-version coding, it is desired to store the data consistently, that is, even if all servers do not receive the data updates simultaneously, the decoder can recover...
We consider the coded caching problem with a central server containing N files, each of length F bits, and K users, each equipped with a cache of capacity MF bits. We assume that coded contents can be proactively placed into users' caches at no cost during the placement phase. During the delivery phase, each user requests exactly one file from the database, and all the requests are served simultaneously...
Caching is an effective way to reduce peak-hour network traffic congestion by storing some contents at user's local cache. Maddah-Ali and Niesen (MAN) initiated a fundamental study of caching systems by proposing a scheme (with uncoded cache placement and linear network coding delivery) that is provably optimal to within a factor 4.7. In this paper, when the cache contents and the user demands are...
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious...
Distribution of smartphone apps represents a major risk for tomorrow. Alternative app stores filled by pirated content create a dangerous substrate for the diffusion of tricky apps. We present in this paper a dedicated Crawling Engine conceived to protect distribution of genuine apps.
For purpose of information management of film capacitor production workshop to provide convenience for production department management to grasp the production realtime data, in this paper, we design a film capacitor production monitoring system adopting the man-machine interactive information collection technology based on data acquisition and wireless network transmission. By the technology, we...
Cloud computing provides rapid provisioning, convenient deployment, and simplified management of computing resources and applications with pay-as-you-go pricing models [1]. As more and more workloads are created on the cloud or migrated to the cloud for economic and flexibility reasons, it is important for developers, users, and service providers alike to understand the challenges, opportunities,...
This paper aims to design a Hadoop system and evaluates the performance of a task allocation scheme. The task allocation scheme splits each job into tasks using an appropriate splitting ratio, and assigns tasks to slave servers based on server processing performance and network resource availability. We experimentally evaluate the performance of the scale out of the task allocation scheme with five...
For stabilizing power frequency in the grid, demand-supply balancing capability by manipulating the demand side, known as Demand Response (DR), is getting attention because of the continuous increase in renewable energy resources and deferrable loads such as electric vehicles in addition to the traditional adjustment function by supply side such as thermal plants. In the future smart grid, it is imperative...
This paper shows the effectiveness of the system that controls the network route based on social information. An automatic route control is performed with the network virtualization node FLARE that uses VLAN coupling between each base of the wide area network test bed called JGN-X as a platform.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.