首页 > 最新文献

2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)最新文献

英文 中文
Dog ORAM: A Distributed and Shared Oblivious RAM Model with Server Side Computation Dog ORAM:一个具有服务器端计算的分布式共享遗忘内存模型
Alexandre Pujol, Christina Thorpe
Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because traditional Cloud storage does not support the level of privacy required to prevent access pattern leakage. Oblivious Random Access Machines (ORAM) have been a hot topic of research over the past number of years, proposing various cryptographic techniques to obtain the privacy levels required. We propose a new model, Dog ORAM - a distributed and shared oblivious RAM model with server side computation, that merges several models existing in the literature and includes a new method of access right management for multi-party data access. To achieve this, we use an additive homomorphic encryption scheme and a chameleon signature.
对于许多处理大量数据的组织来说,外包到云正在成为一个有吸引力的选择。然而,处理高度监管的数据的公司仍然不愿意这样做,因为传统的云存储不支持防止访问模式泄漏所需的隐私级别。在过去的几年里,遗忘随机存取机(ORAM)一直是研究的热点,提出了各种加密技术来获得所需的隐私级别。我们提出了一个新的模型,Dog ORAM——一个具有服务器端计算的分布式共享遗忘内存模型,该模型融合了已有的几种模型,并包含了一种用于多方数据访问的访问权限管理的新方法。为了实现这一点,我们使用了一个加性同态加密方案和一个变色龙签名。
{"title":"Dog ORAM: A Distributed and Shared Oblivious RAM Model with Server Side Computation","authors":"Alexandre Pujol, Christina Thorpe","doi":"10.1109/UCC.2015.109","DOIUrl":"https://doi.org/10.1109/UCC.2015.109","url":null,"abstract":"Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because traditional Cloud storage does not support the level of privacy required to prevent access pattern leakage. Oblivious Random Access Machines (ORAM) have been a hot topic of research over the past number of years, proposing various cryptographic techniques to obtain the privacy levels required. We propose a new model, Dog ORAM - a distributed and shared oblivious RAM model with server side computation, that merges several models existing in the literature and includes a new method of access right management for multi-party data access. To achieve this, we use an additive homomorphic encryption scheme and a chameleon signature.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Cryptographic Keys in the IaaS Cloud Model 在IaaS云模型中保护加密密钥
Bushra AlBelooshi, K. Salah, T. Martin, E. Damiani
Infrastructure-as-a-Service (IaaS) is a widespread cloud computing provisioning model where ICT infrastructure, including servers, storage and networking, is supplied on-demand, in a pay-as-you-go fashion. IaaS cloud providers give their clients virtual machines (VMs) that are controlled by cloud administrators who can run, stop, restore and migrate the VMs. A typical threat to IaaS is unauthorized access of untrustworthy administrators to cloud users' sensitive information residing in VMs' memory. In this paper we focus on the threat of users' cryptographic keys being stolen from the RAM of the VM they provision. We propose a decrypt-scatter/gather-decrypt technique that allows users to carry our encryption/decryption while protecting keys from unauthorized peeks on the part of cloud administrators. Our technique does not require modification to the current cloud architecture, but only the availability of a Trusted Platform Module (TPM) capable of creating and holding a TPM-protected public/private key pair. It lends itself to security-as-a-service scenarios where third parties perform encryption/decryption on behalf of data owners.
基础设施即服务(IaaS)是一种广泛的云计算供应模式,其中ICT基础设施(包括服务器、存储和网络)以按需付费的方式按需提供。IaaS云提供商为其客户提供由云管理员控制的虚拟机(vm),这些管理员可以运行、停止、恢复和迁移虚拟机。IaaS面临的一个典型威胁是,不可信的管理员未经授权访问云用户在虚拟机内存中的敏感信息。在本文中,我们主要研究用户的加密密钥从他们提供的VM的RAM中被盗的威胁。我们提出了一种解密-分散/收集-解密技术,允许用户携带我们的加密/解密,同时保护密钥不被云管理员未经授权的窥视。我们的技术不需要修改当前的云架构,只需要一个可信平台模块(TPM)的可用性,该模块能够创建和保存受TPM保护的公钥/私钥对。它适合于第三方代表数据所有者执行加密/解密的安全即服务场景。
{"title":"Securing Cryptographic Keys in the IaaS Cloud Model","authors":"Bushra AlBelooshi, K. Salah, T. Martin, E. Damiani","doi":"10.1109/UCC.2015.64","DOIUrl":"https://doi.org/10.1109/UCC.2015.64","url":null,"abstract":"Infrastructure-as-a-Service (IaaS) is a widespread cloud computing provisioning model where ICT infrastructure, including servers, storage and networking, is supplied on-demand, in a pay-as-you-go fashion. IaaS cloud providers give their clients virtual machines (VMs) that are controlled by cloud administrators who can run, stop, restore and migrate the VMs. A typical threat to IaaS is unauthorized access of untrustworthy administrators to cloud users' sensitive information residing in VMs' memory. In this paper we focus on the threat of users' cryptographic keys being stolen from the RAM of the VM they provision. We propose a decrypt-scatter/gather-decrypt technique that allows users to carry our encryption/decryption while protecting keys from unauthorized peeks on the part of cloud administrators. Our technique does not require modification to the current cloud architecture, but only the availability of a Trusted Platform Module (TPM) capable of creating and holding a TPM-protected public/private key pair. It lends itself to security-as-a-service scenarios where third parties perform encryption/decryption on behalf of data owners.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Controlling the Katz-Bonacich Centrality in Social Network: Application to Gossip in Online Social Networks 控制社交网络中的Katz-Bonacich中心性:在线社交网络中的八卦应用
Alexandre Reiffers, E. Altman, Y. Hayel
Recent papers studied the control of spectral centrality measures of a network by manipulating the topology of the network. We extend these works by focusing on a specific spectral centrality measure, the Katz-Bonacich centrality. The optimization of the Katz-Bonacich centrality using a topological control is called the Katz-Bonacich optimization problem. We first prove that this problem is equivalent to a linear optimization problem. Thus, in the context of large graphs, we can use state of the art algorithms. We provide a specific applications of the Katz-Bonacich centrality minimization problem based on the minimization of gossip propagation and make some experiments on real networks.
最近的论文研究了通过操纵网络的拓扑结构来控制网络的频谱中心性度量。我们通过专注于一个特定的光谱中心性度量,即卡茨-博纳奇中心性来扩展这些工作。利用拓扑控制对Katz-Bonacich中心性进行优化称为Katz-Bonacich优化问题。首先证明了该问题等价于一个线性优化问题。因此,在大型图的背景下,我们可以使用最先进的算法。给出了基于最小化八卦传播的卡兹-波那契中心性最小化问题的一个具体应用,并在实际网络上进行了一些实验。
{"title":"Controlling the Katz-Bonacich Centrality in Social Network: Application to Gossip in Online Social Networks","authors":"Alexandre Reiffers, E. Altman, Y. Hayel","doi":"10.1109/UCC.2015.79","DOIUrl":"https://doi.org/10.1109/UCC.2015.79","url":null,"abstract":"Recent papers studied the control of spectral centrality measures of a network by manipulating the topology of the network. We extend these works by focusing on a specific spectral centrality measure, the Katz-Bonacich centrality. The optimization of the Katz-Bonacich centrality using a topological control is called the Katz-Bonacich optimization problem. We first prove that this problem is equivalent to a linear optimization problem. Thus, in the context of large graphs, we can use state of the art algorithms. We provide a specific applications of the Katz-Bonacich centrality minimization problem based on the minimization of gossip propagation and make some experiments on real networks.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiences in Building Micro-cloud Provider Federation in the Guifi Community Network 贵非社区网微云提供商联盟建设经验
Roger Baig, Felix Freitag, A. Moll, Leandro Navarro-Moldes, R. P. Centelles, Vladimir Vlassov
Cloud federation is foreseen to happen among large cloud providers. The resulting interoperability of cloud services among these providers will then increase even more the elasticity of cloud services. The cloud provisioned that is targeted by this scenario is mainly one which combines the cloud services offered by large enterprises. Cloud computing, however, has started moving to the edge. We now increasingly see the tendency to fullfil cloud computing requirements by multiple levels and different kind of infrastructures, where the Fog Computing paradigm has started playing its role. For this scenario of edge computing, we show in this paper the case of the federation of multiple independent micro-cloud providers within a community network, where providers pool their resources and services into a community cloud. Federation happens here primarily at the service level and the domain of trust is the community of practice. While we can today already report this case in the context of community networks, IPv6 deployment in the Internet will principally allow micro-cloud providers to appear everywhere, needing cloud federation mechanisms. We describe for a real case how this micro-cloud provider federation has been built and argue why micro-cloud provider should be considered for the integration in cloud federations.
云联盟预计将发生在大型云提供商之间。这些提供商之间云服务的互操作性将进一步提高云服务的弹性。此场景所提供的云主要是大型企业提供的云服务的组合。然而,云计算已经开始向边缘移动。我们现在越来越多地看到,通过多层次和不同类型的基础设施来满足云计算需求的趋势,雾计算范式已经开始发挥作用。对于这种边缘计算场景,我们在本文中展示了社区网络中多个独立微云提供商联合的情况,其中提供商将其资源和服务汇集到社区云中。这里的联合主要发生在服务级别,而信任的领域是实践社区。虽然我们今天已经可以在社区网络的背景下报告这种情况,但IPv6在互联网上的部署将主要允许微云提供商无处不在,需要云联合机制。我们通过一个实际案例描述了如何构建这个微云提供商联盟,并讨论了为什么应该考虑将微云提供商集成到云联盟中。
{"title":"Experiences in Building Micro-cloud Provider Federation in the Guifi Community Network","authors":"Roger Baig, Felix Freitag, A. Moll, Leandro Navarro-Moldes, R. P. Centelles, Vladimir Vlassov","doi":"10.1109/UCC.2015.92","DOIUrl":"https://doi.org/10.1109/UCC.2015.92","url":null,"abstract":"Cloud federation is foreseen to happen among large cloud providers. The resulting interoperability of cloud services among these providers will then increase even more the elasticity of cloud services. The cloud provisioned that is targeted by this scenario is mainly one which combines the cloud services offered by large enterprises. Cloud computing, however, has started moving to the edge. We now increasingly see the tendency to fullfil cloud computing requirements by multiple levels and different kind of infrastructures, where the Fog Computing paradigm has started playing its role. For this scenario of edge computing, we show in this paper the case of the federation of multiple independent micro-cloud providers within a community network, where providers pool their resources and services into a community cloud. Federation happens here primarily at the service level and the domain of trust is the community of practice. While we can today already report this case in the context of community networks, IPv6 deployment in the Internet will principally allow micro-cloud providers to appear everywhere, needing cloud federation mechanisms. We describe for a real case how this micro-cloud provider federation has been built and argue why micro-cloud provider should be considered for the integration in cloud federations.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the Cloud to Teach Computer Networks 使用云来教授计算机网络
Mhd Wael Bazzaza, K. Salah
STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities and schools throughout the world. In this paper, we show how the cloud can be utilized to replace traditional physical computer networks laboratories. In particular, we demonstrate how cloud-based laboratory exercises related to computer networks can greatly help students in acquiring almost all crucial computer networks skills. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, the use cases and approaches are equally applicable to other cloud platforms.
STEM教育可以从云技术中受益匪浅。云可以为教师和学生(无论是本地还是远程)提供按需、专用、隔离、无限和易于配置的计算和存储资源。云计算可以显著降低实验室建设和维护的成本和支出。由于这些特性,云已经被世界各地的许多大学和学校广泛采用。在本文中,我们展示了如何利用云来取代传统的物理计算机网络实验室。特别是,我们展示了与计算机网络相关的基于云的实验室练习如何极大地帮助学生获得几乎所有关键的计算机网络技能。我们在本课程中使用的云是亚马逊网络服务(AWS)公共云。然而,这些用例和方法同样适用于其他云平台。
{"title":"Using the Cloud to Teach Computer Networks","authors":"Mhd Wael Bazzaza, K. Salah","doi":"10.1109/UCC.2015.49","DOIUrl":"https://doi.org/10.1109/UCC.2015.49","url":null,"abstract":"STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities and schools throughout the world. In this paper, we show how the cloud can be utilized to replace traditional physical computer networks laboratories. In particular, we demonstrate how cloud-based laboratory exercises related to computer networks can greatly help students in acquiring almost all crucial computer networks skills. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, the use cases and approaches are equally applicable to other cloud platforms.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122532989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Clouds4Coordination: Managing Project Collaboration in Federated Clouds Clouds4Coordination:在联邦云中管理项目协作
I. Petri, O. Rana, T. Beach, Y. Rezgui, A. Sutton
The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of "multi-Clouds" or Cloud-of-Clouds environments it has become possible to link such systems and create a distributed environment. The key benefits suggested for such an aggregation is: (i) reduced reliance on a single cloud infrastructure, (ii) improved fault tolerance (whereby failure in one Cloud system does not render the entire infrastructure inoperable), (iii) improved security -- similar argument to fault tolerance, i.e. a breach in one Cloud system does not impact the entire infrastructure, (iv) the ability to utilise capability (and data) that may only be available in one Cloud system and not be easily transferable to another. Such infrastructure becomes efficacious when multiple individuals and organisations work collaboratively. In this paper we present a coordination model for distributed clouds where the interacting parties are represented by AEC industry organisations. We present the underlying architecture that has been implemented as part of the "Clouds-for-Coordination"(C4C) project and provide a real use case where different organisations work jointly on an AEC project. We validate our system by measuring an "aggregated time-to-complete" metric over a number of different scenarios.
云计算在AEC(建筑/工程/建设)项目中的应用在最近的研究中得到了深入的探讨。企业已经采用云计算来存储AEC行业产生的大量数据。在大多数情况下,这些云系统是私有的、孤立的,并且在实际计算操作方面受到限制。随着“多云”或云的云环境的出现,连接这些系统并创建分布式环境已经成为可能。这种聚合的主要好处是:(i)减少对单一云基础设施的依赖,(ii)提高容错性(即一个云系统的故障不会导致整个基础设施无法运行),(iii)提高安全性——与容错性类似,即一个云系统的漏洞不会影响整个基础设施,(iv)利用可能仅在一个云系统中可用且不易转移到另一个云系统的能力(和数据)的能力。当多个个人和组织协同工作时,这样的基础设施变得有效。在本文中,我们提出了一个分布式云的协调模型,其中交互各方由AEC行业组织代表。我们展示了作为“协调云”(C4C)项目的一部分实现的底层架构,并提供了不同组织在AEC项目上共同工作的真实用例。我们通过测量多个不同场景的“聚合完成时间”度量来验证我们的系统。
{"title":"Clouds4Coordination: Managing Project Collaboration in Federated Clouds","authors":"I. Petri, O. Rana, T. Beach, Y. Rezgui, A. Sutton","doi":"10.1109/UCC.2015.88","DOIUrl":"https://doi.org/10.1109/UCC.2015.88","url":null,"abstract":"The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of \"multi-Clouds\" or Cloud-of-Clouds environments it has become possible to link such systems and create a distributed environment. The key benefits suggested for such an aggregation is: (i) reduced reliance on a single cloud infrastructure, (ii) improved fault tolerance (whereby failure in one Cloud system does not render the entire infrastructure inoperable), (iii) improved security -- similar argument to fault tolerance, i.e. a breach in one Cloud system does not impact the entire infrastructure, (iv) the ability to utilise capability (and data) that may only be available in one Cloud system and not be easily transferable to another. Such infrastructure becomes efficacious when multiple individuals and organisations work collaboratively. In this paper we present a coordination model for distributed clouds where the interacting parties are represented by AEC industry organisations. We present the underlying architecture that has been implemented as part of the \"Clouds-for-Coordination\"(C4C) project and provide a real use case where different organisations work jointly on an AEC project. We validate our system by measuring an \"aggregated time-to-complete\" metric over a number of different scenarios.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vehicular Cloud Networks: Architecture, Applications and Security Issues 车载云网络:架构、应用和安全问题
Farhan Ahmad, Muhammad Kazim, A. Adnane, Abir Awad
Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging from low sized applications to very complex applications. VCN is composed of three types of clouds: Vehicular cloud, Infrastructure cloud and traditional Back-End (IT) cloud. We introduced these clouds via a three tier architecture along with their operations and characteristics. We have proposed use cases of each cloud tier that explain how it is practically created and utilised while taking the vehicular mobility in consideration. Moreover, it is critical to ensure security, privacy and trust of VCN network and its assets. Therefore, to describe the security of VCN, we have provided an in-depth analysis of different threats related to each tier of VCN. The threats related to vehicular cloud and infrastructure cloud are categorized according to their assets, i.e., vehicles, adjacent infrastructure, wireless communication, vehicular messages, and vehicular cloud threats. Similarly, the Back-End cloud threats are categorized into data and network threats. The possible implications of these threats and their effects on various components of VCN are also explained in detail.
车辆自组织网络(VANET)是自组织网络在现实生活中的最大应用,其中节点通过快速移动的车辆表示。本文介绍了未来的新兴技术,即车辆云网络(VCN),其中车辆和相邻的基础设施与传统的互联网云合并,以提供从小型应用到非常复杂的应用的不同应用。VCN由三种类型的云:车辆的云,云基础设施云和传统的后端(IT)。我们通过三层架构介绍了这些云,以及它们的操作和特征。我们提出了每个云层的用例,解释了在考虑车辆移动性的同时如何实际创建和使用它。此外,确保VCN网络及其资产的安全、隐私和信任至关重要。因此,为了描述VCN的安全,我们提供了一个深入分析不同的威胁与每层VCN有关。与车辆云和基础设施云相关的威胁根据其资产进行分类,即车辆、相邻基础设施、无线通信、车辆消息和车辆云威胁。同样,后端云威胁也分为数据威胁和网络威胁。还详细解释了这些威胁的可能含义及其对VCN各组成部分的影响。
{"title":"Vehicular Cloud Networks: Architecture, Applications and Security Issues","authors":"Farhan Ahmad, Muhammad Kazim, A. Adnane, Abir Awad","doi":"10.1109/UCC.2015.101","DOIUrl":"https://doi.org/10.1109/UCC.2015.101","url":null,"abstract":"Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud Networking (VCN) where vehicles and adjacent infrastructure merge with traditional internet clouds to offer different applications ranging from low sized applications to very complex applications. VCN is composed of three types of clouds: Vehicular cloud, Infrastructure cloud and traditional Back-End (IT) cloud. We introduced these clouds via a three tier architecture along with their operations and characteristics. We have proposed use cases of each cloud tier that explain how it is practically created and utilised while taking the vehicular mobility in consideration. Moreover, it is critical to ensure security, privacy and trust of VCN network and its assets. Therefore, to describe the security of VCN, we have provided an in-depth analysis of different threats related to each tier of VCN. The threats related to vehicular cloud and infrastructure cloud are categorized according to their assets, i.e., vehicles, adjacent infrastructure, wireless communication, vehicular messages, and vehicular cloud threats. Similarly, the Back-End cloud threats are categorized into data and network threats. The possible implications of these threats and their effects on various components of VCN are also explained in detail.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Towards Secure SDN Policy Management 迈向安全的SDN策略管理
Nicolae Paladi
Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors -- either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.
软件定义网络(SDN)作为一种新型的网络体系结构模型,能够促进大规模网络的管理,实现高效的网络虚拟化和可扩展的网络多租户。集中式网络控制器是SDN范例中的一个重要组件,它在数据平面上部署来自多个独立来源的网络策略,这些策略是基于全局网络视图定义的。虽然这种方法可以有效地管理网络连接,并减少部署新配置的时间和成本,但它也增加了错误的风险——要么是由于意外引入的,要么是通过与以前的策略相结合引入的,要么是由有动机的对手引入的。在这篇立场文件中,我们回顾了SDN部署的网络策略验证的最新进展,确定了存在的挑战,并概述了SDN部署中网络策略管理的安全框架。结合云平台和存储安全方面的现有工作,这将有助于创建安全和可信的云部署。
{"title":"Towards Secure SDN Policy Management","authors":"Nicolae Paladi","doi":"10.1109/UCC.2015.106","DOIUrl":"https://doi.org/10.1109/UCC.2015.106","url":null,"abstract":"Software-Defined Networking (SDN) has emerged as a novel network architectural model that facilitates management of large-scale networks, enables efficient network virtualization and scalable network multi-tenancy. Centralized network controllers, an important component in the SDN paradigm, deploy on the data plane devices network policies from several independent sources, defined based on a global network view. While this approach allows to efficiently manage network connectivity and reduce the time and cost of deploying new configurations, it also increases the risk for errors -- either introduced by accident, through a combination with previous policies, or by a motivated adversary. In this position paper we review the state of the art for network policy verification for SDN deployments, identify existing challenges and outline a secure framework for network policy management in SDN deployments. Combined with existing work on cloud platform and storage security, this will contribute towards creating secure and trusted cloud deployments.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Conceptualized Policy Design for User-Regulated Trusted Clouds 用户监管可信云的概念化策略设计
Jörg Kebbedies, Josef Spillner, I. Braun, A. Schill
The term "trust" in the area of cloud computing has always been one of the most problematic issues. The cloud user becomes willing to accept insecure conditions and unconsciously increases these conditions' security level if he is able to find a strategy that provides trust. This level of trust, once established, is difficult to maintain if any deception takes place. The indications of proven trust can only be seen in future usage of a cloud service. For this reason, specific control instruments are required to ascertain the accuracy of one's trust. The establishment of trust in a public cloud environment requires a paradigm change: a holistic strategy that enforces regulation requirements throughout the cloud architecture. The movement of the root of trust into hardware reduces vulnerability to compromise, as hardware attacks require a high expenditure of time and effort. Cloud users would define regulation standards through trust-worthy IT instruments and enforce them in specific cloud-service layers. The extension of this approach is the regulation of SaaS-based applications to enforce requirements for separation and availability. This work introduces a conceptual approach to establish a chain of policy by using hardware-oriented root of trust. The conceptual description of a chain of policy outlines the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust.
在云计算领域,术语“信任”一直是最有问题的问题之一。云用户变得愿意接受不安全的条件,如果他能够找到提供信任的策略,就会无意识地提高这些条件的安全级别。这种程度的信任,一旦建立,就很难维持,如果有任何欺骗发生。只有在将来使用云服务时才能看到已证明信任的迹象。因此,需要特定的控制手段来确定一个人的信任的准确性。在公共云环境中建立信任需要改变范式:在整个云架构中实施监管要求的整体战略。由于硬件攻击需要花费大量的时间和精力,因此将信任根转移到硬件中可以减少遭受攻击的风险。云用户将通过值得信赖的IT工具定义监管标准,并在特定的云服务层执行这些标准。这种方法的扩展是对基于saas的应用程序的规范,以加强对分离和可用性的需求。本文介绍了一种概念性方法,通过使用面向硬件的信任根来建立策略链。策略链的概念性描述概述了基于已建立的信任链对每个架构云层准确执行规则的主要原则。
{"title":"Conceptualized Policy Design for User-Regulated Trusted Clouds","authors":"Jörg Kebbedies, Josef Spillner, I. Braun, A. Schill","doi":"10.1109/UCC.2015.105","DOIUrl":"https://doi.org/10.1109/UCC.2015.105","url":null,"abstract":"The term \"trust\" in the area of cloud computing has always been one of the most problematic issues. The cloud user becomes willing to accept insecure conditions and unconsciously increases these conditions' security level if he is able to find a strategy that provides trust. This level of trust, once established, is difficult to maintain if any deception takes place. The indications of proven trust can only be seen in future usage of a cloud service. For this reason, specific control instruments are required to ascertain the accuracy of one's trust. The establishment of trust in a public cloud environment requires a paradigm change: a holistic strategy that enforces regulation requirements throughout the cloud architecture. The movement of the root of trust into hardware reduces vulnerability to compromise, as hardware attacks require a high expenditure of time and effort. Cloud users would define regulation standards through trust-worthy IT instruments and enforce them in specific cloud-service layers. The extension of this approach is the regulation of SaaS-based applications to enforce requirements for separation and availability. This work introduces a conceptual approach to establish a chain of policy by using hardware-oriented root of trust. The conceptual description of a chain of policy outlines the main principles to enforce regulations accurately for each architectural cloud layer based on an established chain of trust.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling Automated Network Services Provisioning for Cloud Based Applications Using Zero Touch Provisioning 使用零接触配置为基于云的应用程序启用自动网络服务配置
Y. Demchenko, S. Filiposka, Raimundas Tuminauskas, A. Mishev, K. Baumann, Damir Regvart, Tony Breach
Modern research and education networks need to solve two major tasks: (1) providing seamless access to their users, and (2) support new scientific and collaborative applications that are becoming increasingly complex and dynamic in their scale, use of distributed resources, and required advanced networking services. Rapid deployment and automation of new network services provisioning is becoming difficult in large networks that incorporate different technologies and solutions. The task of providing seamless user experience in typically mobile and dynamically changing collaborative groups generates additional burdens for the configuration phases included in network provisioning. By introducing automation and enabling multipoint auto configuration of network devices, the Zero Touch Provisioning (ZTP) concept emerges as a possible alleviation of the complex network provisioning and infrastructure services deployment process. This paper investigates the characteristics of the ZTP model and discovers how ZTP can be used in order to enhance the services provided by the GEANT network and its associated National Research and Education Networks (NRENs) to the European research and education community. The future solution can be achieved by combining and enriching the existing provisioning models, solutions and practices available from different domains such as wireless networks, (complex) network management and operations services, and cloud based infrastructure services provisioning.
现代研究和教育网络需要解决两个主要任务:(1)为其用户提供无缝访问;(2)支持新的科学和协作应用,这些应用在规模、分布式资源的使用和高级网络服务方面变得越来越复杂和动态。在包含不同技术和解决方案的大型网络中,快速部署和自动化新网络服务供应变得越来越困难。在典型的移动和动态变化的协作组中提供无缝用户体验的任务为网络供应中包含的配置阶段带来了额外的负担。通过引入自动化和启用网络设备的多点自动配置,零接触配置(ZTP)概念可能缓解复杂的网络配置和基础设施服务部署过程。本文研究了ZTP模型的特点,并发现如何使用ZTP来增强GEANT网络及其相关的国家研究和教育网络(NRENs)向欧洲研究和教育界提供的服务。未来的解决方案可以通过组合和丰富现有的供应模型、解决方案和实践来实现,这些模型、解决方案和实践来自不同的领域,如无线网络、(复杂)网络管理和运营服务,以及基于云的基础设施服务供应。
{"title":"Enabling Automated Network Services Provisioning for Cloud Based Applications Using Zero Touch Provisioning","authors":"Y. Demchenko, S. Filiposka, Raimundas Tuminauskas, A. Mishev, K. Baumann, Damir Regvart, Tony Breach","doi":"10.1109/UCC.2015.82","DOIUrl":"https://doi.org/10.1109/UCC.2015.82","url":null,"abstract":"Modern research and education networks need to solve two major tasks: (1) providing seamless access to their users, and (2) support new scientific and collaborative applications that are becoming increasingly complex and dynamic in their scale, use of distributed resources, and required advanced networking services. Rapid deployment and automation of new network services provisioning is becoming difficult in large networks that incorporate different technologies and solutions. The task of providing seamless user experience in typically mobile and dynamically changing collaborative groups generates additional burdens for the configuration phases included in network provisioning. By introducing automation and enabling multipoint auto configuration of network devices, the Zero Touch Provisioning (ZTP) concept emerges as a possible alleviation of the complex network provisioning and infrastructure services deployment process. This paper investigates the characteristics of the ZTP model and discovers how ZTP can be used in order to enhance the services provided by the GEANT network and its associated National Research and Education Networks (NRENs) to the European research and education community. The future solution can be achieved by combining and enriching the existing provisioning models, solutions and practices available from different domains such as wireless networks, (complex) network management and operations services, and cloud based infrastructure services provisioning.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1