首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
Horizontal Address-Bit DEMA against ECDSA 针对ECDSA的水平地址位DEMA
I. Kabin, Z. Dyka, D. Kreiser, P. Langendörfer
With the advent of the Internet of Things security features become more and more important. Especially data integrity and authentication of its origin are of utmost importance. Digital signatures are a well-known means to provide these features. In this paper we detail our horizontal DEMA attack against a hardware implementation of the Montgomery kP algorithm for the NIST elliptic curve B-233. We apply the attack successfully against the ECDSA algorithm. In the past vertical attacks exploiting the key dependable activity of the bus and addressing of registers have been published. In contrast to those attacks we performed a horizontal attack exploiting the same phenomena using a single trace of electromagnetic emanations.
随着物联网的到来,安全特性变得越来越重要。特别是数据的完整性和来源的认证是至关重要的。数字签名是提供这些特性的一种众所周知的方法。在本文中,我们详细介绍了针对NIST椭圆曲线B-233的Montgomery kP算法的硬件实现的水平DEMA攻击。我们成功地对ECDSA算法进行了攻击。在过去,利用总线的关键可靠活动和寄存器寻址的垂直攻击已经被发布。与这些攻击相反,我们利用单一的电磁辐射痕迹进行了水平攻击,利用了相同的现象。
{"title":"Horizontal Address-Bit DEMA against ECDSA","authors":"I. Kabin, Z. Dyka, D. Kreiser, P. Langendörfer","doi":"10.1109/NTMS.2018.8328695","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328695","url":null,"abstract":"With the advent of the Internet of Things security features become more and more important. Especially data integrity and authentication of its origin are of utmost importance. Digital signatures are a well-known means to provide these features. In this paper we detail our horizontal DEMA attack against a hardware implementation of the Montgomery kP algorithm for the NIST elliptic curve B-233. We apply the attack successfully against the ECDSA algorithm. In the past vertical attacks exploiting the key dependable activity of the bus and addressing of registers have been published. In contrast to those attacks we performed a horizontal attack exploiting the same phenomena using a single trace of electromagnetic emanations.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring System 面向野生动物监测系统的物联网网络新架构
E. D. Ayele, N. Meratnia, P. Havinga
In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network infrastructure. This solution will facilitate an IoT devices to be deployed for ultra-low power and sustainable wildlife monitoring applications. As part of the IoT infrastructure, a LoRa based network is presented with coverage characterization and preliminary test bed deployment for wildlife tracking purpose. In addition, through simulation, the utilization of existing BLE based opportunistic data collection protocols for the proposed architecture is investigated.
在本文中,我们介绍了一种用于野生动物监测系统(WMS)的机会双无线电物联网网络架构。由于数据处理比传输原始数据消耗更少的能量,因此所提出的架构利用了固定LPWAN物联网网络基础设施中的机会移动网络。该解决方案将有助于将物联网设备部署到超低功耗和可持续野生动物监测应用中。作为物联网基础设施的一部分,基于LoRa的网络具有覆盖特性和用于野生动物跟踪目的的初步测试平台部署。此外,通过仿真,研究了现有的基于BLE的机会数据收集协议在该架构中的应用。
{"title":"Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring System","authors":"E. D. Ayele, N. Meratnia, P. Havinga","doi":"10.1109/NTMS.2018.8328721","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328721","url":null,"abstract":"In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network infrastructure. This solution will facilitate an IoT devices to be deployed for ultra-low power and sustainable wildlife monitoring applications. As part of the IoT infrastructure, a LoRa based network is presented with coverage characterization and preliminary test bed deployment for wildlife tracking purpose. In addition, through simulation, the utilization of existing BLE based opportunistic data collection protocols for the proposed architecture is investigated.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114169551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Evaluating Blockchains for IoT 评估物联网的区块链
Runchao Han, V. Gramoli, Xiwei Xu
As proof-of-work blockchains are inherently energy greedy and offer probabilistic guarantees, blockchains based on Byzantine consensus appear as a promising technology to track billions of connected devices. In this paper, we evaluate the performance of prominent blockchains that solve the classic Byzantine consensus problem. Our results show that while offering reasonable throughput their performance usually do not scale to tens of devices and drops dramatically as the number of devices increases. This study motivates the need for solutions that solves the Blockchain consensus problem, a scalable variant of the classic Byzantine consensus problem but dedicated to blockchains.
由于工作量证明区块链本质上是能源贪婪的,并提供概率保证,基于拜占庭共识的区块链似乎是一种有前途的技术,可以跟踪数十亿台连接的设备。在本文中,我们评估了解决经典拜占庭共识问题的著名区块链的性能。我们的结果表明,虽然提供了合理的吞吐量,但它们的性能通常不能扩展到数十个设备,并且随着设备数量的增加而急剧下降。这项研究激发了对解决区块链共识问题的解决方案的需求,这是经典拜占庭共识问题的可扩展变体,但专门用于区块链。
{"title":"Evaluating Blockchains for IoT","authors":"Runchao Han, V. Gramoli, Xiwei Xu","doi":"10.1109/NTMS.2018.8328736","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328736","url":null,"abstract":"As proof-of-work blockchains are inherently energy greedy and offer probabilistic guarantees, blockchains based on Byzantine consensus appear as a promising technology to track billions of connected devices. In this paper, we evaluate the performance of prominent blockchains that solve the classic Byzantine consensus problem. Our results show that while offering reasonable throughput their performance usually do not scale to tens of devices and drops dramatically as the number of devices increases. This study motivates the need for solutions that solves the Blockchain consensus problem, a scalable variant of the classic Byzantine consensus problem but dedicated to blockchains.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks 异构无线网络中基于图论的网络选择算法
M. Lahby, A. Sekkaki
The major trend in heterogeneous wireless networks is determining the best access network for the end user in terms of quality of service (QoS)and providing ubiquitous connectivity during the network selection transition. In this paper, we propose a new mechanism based on graph theory for the selection of the best path for network selection decision. We carry out experiments evaluation on a testbed by using mininet, to demonstrate the efficacy of our proposed mechanism as compared to conventional network selection algorithms. Our experimental results show that our proposed mechanism can achieve a significant performance in terms of QoS metrics for two services FTP and video streaming.
异构无线网络的主要趋势是根据服务质量(QoS)为最终用户确定最佳接入网,并在网络选择过渡期间提供无处不在的连接。本文提出了一种基于图论的网络选择决策最优路径选择新机制。我们通过使用mininet在测试台上进行实验评估,以证明与传统网络选择算法相比,我们提出的机制的有效性。实验结果表明,我们提出的机制可以在FTP和视频流两种服务的QoS指标方面取得显着的性能。
{"title":"A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks","authors":"M. Lahby, A. Sekkaki","doi":"10.1109/NTMS.2018.8328670","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328670","url":null,"abstract":"The major trend in heterogeneous wireless networks is determining the best access network for the end user in terms of quality of service (QoS)and providing ubiquitous connectivity during the network selection transition. In this paper, we propose a new mechanism based on graph theory for the selection of the best path for network selection decision. We carry out experiments evaluation on a testbed by using mininet, to demonstrate the efficacy of our proposed mechanism as compared to conventional network selection algorithms. Our experimental results show that our proposed mechanism can achieve a significant performance in terms of QoS metrics for two services FTP and video streaming.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security Assurance for Smart Contract 智能合约的安全保障
Ence Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, K. Yamashita, H. Kurihara
Currently, Bitcoin and Ethereum are the two most popular cryptocurrency systems, especially Ethereum. It permits complex financial transactions or rules through scripts, which is called smart contracts. Since Ethereum smart contracts hold millions of dollars, their execution correctness is crucial against attacks which aim at stealing the assets. In this paper, we proposed a security assurance method for smart contract source code to find potential security risks. It contains two main functions, the first is syntax topological analysis of smart contract invocation relationship, to help developers to understand their code structure clearly; the second is logic risk (which may lead to vulnerabilities) detection and location, and label results on topology diagram. For developers' convenience, we have built a static analysis tool called SASC to generate topology diagram of invocation relationship and to find potential logic risks. We have made an evaluation on 2,952 smart contracts, experiment results proved that our method is intuitive and effective.
目前,比特币和以太坊是两种最流行的加密货币系统,尤其是以太坊。它允许通过脚本进行复杂的金融交易或规则,这被称为智能合约。由于以太坊智能合约持有数百万美元,因此它们的执行正确性对于旨在窃取资产的攻击至关重要。在本文中,我们提出了一种智能合约源代码的安全保证方法,以发现潜在的安全风险。它包含两个主要功能,一是智能合约调用关系的语法拓扑分析,帮助开发人员清楚地了解其代码结构;二是逻辑风险(可能导致漏洞)的检测和定位,并在拓扑图上标注结果。为了方便开发人员,我们构建了静态分析工具SASC,生成调用关系的拓扑图,发现潜在的逻辑风险。我们对2952份智能合约进行了评估,实验结果证明了我们的方法是直观有效的。
{"title":"Security Assurance for Smart Contract","authors":"Ence Zhou, Song Hua, Bingfeng Pi, Jun Sun, Yashihide Nomura, K. Yamashita, H. Kurihara","doi":"10.1109/NTMS.2018.8328743","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328743","url":null,"abstract":"Currently, Bitcoin and Ethereum are the two most popular cryptocurrency systems, especially Ethereum. It permits complex financial transactions or rules through scripts, which is called smart contracts. Since Ethereum smart contracts hold millions of dollars, their execution correctness is crucial against attacks which aim at stealing the assets. In this paper, we proposed a security assurance method for smart contract source code to find potential security risks. It contains two main functions, the first is syntax topological analysis of smart contract invocation relationship, to help developers to understand their code structure clearly; the second is logic risk (which may lead to vulnerabilities) detection and location, and label results on topology diagram. For developers' convenience, we have built a static analysis tool called SASC to generate topology diagram of invocation relationship and to find potential logic risks. We have made an evaluation on 2,952 smart contracts, experiment results proved that our method is intuitive and effective.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
An Authenticated Encrypted Compressive Sensing based Imaging Mechanism 基于认证加密压缩感知的成像机制
Tao Wu, C. Ruland
Compressive Sensing (CS) based imaging (CSI) method can recover N pixel information from only M measurements with N ≫ M, if the source information is sparse in some domain. With help of CSI mechanism an imaging system could capture information directly, meanwhile, the confidentiality could be also supported with some configuration due to the random projection, i.e., CSI method integrates sensing, compression and encryption in one step. However, image should be also protected against tampering and forgery, which could be realized by providing the origin and integrity. Since CSI method captures measurements instead of pixel information, the authenticity should be provided in an unconventional but semantic way. This paper introduces an Authenticated Encrypted Compressive Sensing based Imaging (AE-CSI) mechanism, which is constructed by the existed CSMAC and improved CSI mechanism, such that the system provides the origin, integrity and confidentiality of the target image while the sensing process.
基于压缩感知(CS)的成像(CSI)方法可以从N > M的M个测量值中恢复N个像素信息,如果源信息在某些域中是稀疏的。借助CSI机制,成像系统可以直接捕获信息,同时由于其随机投影,还可以通过一些配置来支持机密性,即CSI方法集传感、压缩和加密于一体。然而,图像也要防止篡改和伪造,这可以通过提供来源和完整性来实现。由于CSI方法捕获的是测量值而不是像素信息,因此应该以一种非常规但语义化的方式提供真实性。本文介绍了一种基于认证加密压缩感知的成像(AE-CSI)机制,该机制由现有的CSMAC和改进的CSI机制构建而成,使系统在感知过程中提供目标图像的来源、完整性和机密性。
{"title":"An Authenticated Encrypted Compressive Sensing based Imaging Mechanism","authors":"Tao Wu, C. Ruland","doi":"10.1109/NTMS.2018.8328676","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328676","url":null,"abstract":"Compressive Sensing (CS) based imaging (CSI) method can recover N pixel information from only M measurements with N ≫ M, if the source information is sparse in some domain. With help of CSI mechanism an imaging system could capture information directly, meanwhile, the confidentiality could be also supported with some configuration due to the random projection, i.e., CSI method integrates sensing, compression and encryption in one step. However, image should be also protected against tampering and forgery, which could be realized by providing the origin and integrity. Since CSI method captures measurements instead of pixel information, the authenticity should be provided in an unconventional but semantic way. This paper introduces an Authenticated Encrypted Compressive Sensing based Imaging (AE-CSI) mechanism, which is constructed by the existed CSMAC and improved CSI mechanism, such that the system provides the origin, integrity and confidentiality of the target image while the sensing process.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy-Controlled Signature from NTRU Lattice 来自NTRU格的策略控制签名
Zi-Yuan Liu, Jen-Chieh Hsu, R. Tso, Tzong-Chen Wu
Policy-controlled signature (PCS) was introduced by Pairat Thorncharoensri et al. at ICICS 2009, and improved at Computer Standards & Interfaces 2017. In this type of digital signature, signer can sign a message with some policies. Any verifier who does not satisfies the policies cannot verify the message. They also extended the notion of policy-controlled signature, and called it "universal policy-controlled signature". In their extended notion, they improve the flexibility of the PCS scheme by allowing a third party to equip the signature with policy, rather than the signer. In this work, we use the recent techniques in lattice to construct policy- controlled based signature from NTRU lattice. In particular, we adapt Léo Ducas et al.'s encryption and signature protocol on lattice (ASIACRYPT 2014), and combine them with Pairat Thorncharoensri et al.'s work to satisfy the properties of policy-controlled signature. Our contribution is developing the first quantum- resistant schema based on the policy-controlled signature.
策略控制签名(PCS)由Pairat Thorncharoensri等人在ICICS 2009上提出,并在2017年计算机标准与接口上进行了改进。在这种类型的数字签名中,签名者可以使用一些策略对消息进行签名。任何不满足策略的验证者都不能验证消息。他们还扩展了策略控制签名的概念,称之为“通用策略控制签名”。在他们的扩展概念中,他们通过允许第三方而不是签名者为签名配备策略来提高PCS方案的灵活性。在这项工作中,我们利用晶格中的最新技术,从NTRU晶格构造基于策略控制的签名。特别地,我们采用了lsamao Ducas等人的格上加密和签名协议(ASIACRYPT 2014),并将其与Pairat Thorncharoensri等人的工作相结合,以满足策略控制签名的性质。我们的贡献是开发了第一个基于策略控制签名的抗量子模式。
{"title":"Policy-Controlled Signature from NTRU Lattice","authors":"Zi-Yuan Liu, Jen-Chieh Hsu, R. Tso, Tzong-Chen Wu","doi":"10.1109/NTMS.2018.8328712","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328712","url":null,"abstract":"Policy-controlled signature (PCS) was introduced by Pairat Thorncharoensri et al. at ICICS 2009, and improved at Computer Standards & Interfaces 2017. In this type of digital signature, signer can sign a message with some policies. Any verifier who does not satisfies the policies cannot verify the message. They also extended the notion of policy-controlled signature, and called it \"universal policy-controlled signature\". In their extended notion, they improve the flexibility of the PCS scheme by allowing a third party to equip the signature with policy, rather than the signer. In this work, we use the recent techniques in lattice to construct policy- controlled based signature from NTRU lattice. In particular, we adapt Léo Ducas et al.'s encryption and signature protocol on lattice (ASIACRYPT 2014), and combine them with Pairat Thorncharoensri et al.'s work to satisfy the properties of policy-controlled signature. Our contribution is developing the first quantum- resistant schema based on the policy-controlled signature.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132144017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Network Management Framework for SDN SDN的网络管理框架
Sarah Abdallah, I. Elhajj, A. Chehab, A. Kayssi
Software Defined Networking (SDN) is a networking technology that caught the interest of many researchers and specialists in the field. The attention that SDN management obtained wasn't any less since traditional techniques were no longer sufficient for managing this new concept, and fully exploiting the flexibility and agility introduced with it. The purpose of this paper is to survey techniques used for network management for Software Defined Networks, and build on the FCAPS (Fault, Configuration, Accounting, Performance, Security) model to propose a new management framework to serve SDN orchestration. Results showed an improvement of 27.5% for our proposed design as compared to the Controller-only and Manager-only scenarios.
软件定义网络(SDN)是一种引起了该领域许多研究人员和专家兴趣的网络技术。SDN管理获得的关注并没有减少,因为传统技术不再足以管理这个新概念,并充分利用它带来的灵活性和敏捷性。本文的目的是调查用于软件定义网络的网络管理技术,并在FCAPS(故障、配置、计费、性能、安全)模型的基础上提出一个新的管理框架来服务于SDN编排。结果显示,与仅控制器和仅管理器方案相比,我们提出的设计改进了27.5%。
{"title":"A Network Management Framework for SDN","authors":"Sarah Abdallah, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/NTMS.2018.8328672","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328672","url":null,"abstract":"Software Defined Networking (SDN) is a networking technology that caught the interest of many researchers and specialists in the field. The attention that SDN management obtained wasn't any less since traditional techniques were no longer sufficient for managing this new concept, and fully exploiting the flexibility and agility introduced with it. The purpose of this paper is to survey techniques used for network management for Software Defined Networks, and build on the FCAPS (Fault, Configuration, Accounting, Performance, Security) model to propose a new management framework to serve SDN orchestration. Results showed an improvement of 27.5% for our proposed design as compared to the Controller-only and Manager-only scenarios.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Inter-Application Based Resource Management Approach for Cloud Infrastructure 基于应用间的云基础设施资源管理方法
M. Balaji, C. Kumar
Biased pricing model is a cardinal factor that is keeping Cloud from becoming the primary choice for an enterprise. Current pricing model is complex because of their datacenter lineage and favors the Cloud service providers. The onus to maximize resource utilization and minimize the total-cost-of-ownership both belongs to the end-user. End-users are not rewarded for adhering to the fair usage policy. The current study proposes an Inter-Application Resource Management approach comprising of a Just-In-Time resource management design and a flexible pricing model to overcome the limitations of the existing cloud pricing model.
有偏见的定价模式是阻碍云成为企业首选的主要因素。由于数据中心的沿袭,当前的定价模式很复杂,而且有利于云服务提供商。最大限度地利用资源和最大限度地降低总拥有成本的责任都属于最终用户。最终用户不会因为遵守公平使用政策而得到奖励。目前的研究提出了一种应用程序间资源管理方法,包括即时资源管理设计和灵活的定价模型,以克服现有云定价模型的局限性。
{"title":"Inter-Application Based Resource Management Approach for Cloud Infrastructure","authors":"M. Balaji, C. Kumar","doi":"10.1109/NTMS.2018.8328728","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328728","url":null,"abstract":"Biased pricing model is a cardinal factor that is keeping Cloud from becoming the primary choice for an enterprise. Current pricing model is complex because of their datacenter lineage and favors the Cloud service providers. The onus to maximize resource utilization and minimize the total-cost-of-ownership both belongs to the end-user. End-users are not rewarded for adhering to the fair usage policy. The current study proposes an Inter-Application Resource Management approach comprising of a Just-In-Time resource management design and a flexible pricing model to overcome the limitations of the existing cloud pricing model.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trust-by-Design Framework for the Internet of Things 物联网的设计信任框架
Davide Ferraris, M. C. Gago, Javier López
The Internet of Things (IoT) is an environment of interconnected entities, that are identifiable, usable and controllable via the Internet. Trust is necessary in a system such as IoT as the entities involved should know the effect of interacting with other entities. Moreover, the entities must also be able to trust a system to reliably use it. An IoT system is composed of different entities from different vendors, each of them with a different purpose and a different lifecycle. So considering trust in the whole IoT system lifecycle is useful and necessary to guarantee a good service for the whole system. The heterogeneity and dynamicity of this field make it difficult to ensure trust in IoT. We propose a trust by design framework for including trust in the development of an IoT entity considering all the phases of the life-cycle. It is composed of the K-Model and transversal activities.
物联网(IoT)是一个由相互连接的实体组成的环境,这些实体可以通过互联网识别、使用和控制。在物联网这样的系统中,信任是必要的,因为所涉及的实体应该知道与其他实体交互的效果。此外,实体还必须能够信任系统可靠地使用它。物联网系统由来自不同供应商的不同实体组成,每个实体都有不同的目的和不同的生命周期。因此,在整个物联网系统生命周期中考虑信任对于保证整个系统的良好服务是有用的和必要的。该领域的异质性和动态性使得物联网难以保证信任。我们提出了一个基于设计的信任框架,该框架考虑到物联网实体生命周期的所有阶段,将信任包含在物联网实体的开发中。它由k模型和横向活度组成。
{"title":"A Trust-by-Design Framework for the Internet of Things","authors":"Davide Ferraris, M. C. Gago, Javier López","doi":"10.1109/NTMS.2018.8328674","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328674","url":null,"abstract":"The Internet of Things (IoT) is an environment of interconnected entities, that are identifiable, usable and controllable via the Internet. Trust is necessary in a system such as IoT as the entities involved should know the effect of interacting with other entities. Moreover, the entities must also be able to trust a system to reliably use it. An IoT system is composed of different entities from different vendors, each of them with a different purpose and a different lifecycle. So considering trust in the whole IoT system lifecycle is useful and necessary to guarantee a good service for the whole system. The heterogeneity and dynamicity of this field make it difficult to ensure trust in IoT. We propose a trust by design framework for including trust in the development of an IoT entity considering all the phases of the life-cycle. It is composed of the K-Model and transversal activities.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"117 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1