the proceedings contain 48 papers. the topics discussed include: 5G SUCI Catcher: attack and detection;enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform;decentralized ...
ISBN:
(纸本)9798350339826
the proceedings contain 48 papers. the topics discussed include: 5G SUCI Catcher: attack and detection;enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform;decentralized authentication in microservice architectures with SSI and DID in blockchain;performance analysis of the raft consensus algorithm on Hyperledger fabric and Ethereum on cloud;cost-optimized scheduling for microservices in Kubernetes;surveying cyber threat intelligence and collaboration: a concise analysis of current landscape and trends;semi-automatic PenTest methodology based on threat-model: the IoT brick case study;a flexible trust manager for remote attestation in heterogeneous critical infrastructures;and enabling trusted TEE-as-a-Service models with privacy preserving automatons.
the usage of Kubernetes for running microservices applications is increasing nowadays. In a particular application, all microservices do not have the same priority. Hence it is costly to allocate the same resources to...
详细信息
ISBN:
(纸本)9798350339826
the usage of Kubernetes for running microservices applications is increasing nowadays. In a particular application, all microservices do not have the same priority. Hence it is costly to allocate the same resources to both high and low-priority services. this research aims to utilize spot instances to run low-priority services withthe intention of reducing the cloud cost and providing overall high availability to the application. A service called KubeEconomy has been proposed to monitor and manage Kubernetes worker nodes. three functionalities of the KubeEconomy service have been explained and it is shown that it is possible to reduce the cloud cost while maintaining high availability for the microservices.
We consider the case of a set of energy harvesting edge nodes, equipped with photovoltaic panels that implement some kind of monitoring service. To ensure that the service operates in an optimal way, nodes have someti...
详细信息
ISBN:
(纸本)9798350339826
We consider the case of a set of energy harvesting edge nodes, equipped with photovoltaic panels that implement some kind of monitoring service. To ensure that the service operates in an optimal way, nodes have sometimes offload some of their data to other nodes. We show that this kind of task offloading (migration) can improve service performance by avoiding temporary interruptions and prolonging the overall service lifetime. We present a centralized algorithm based on Linear Programming optimization problem solution and a distributed implementation.
Services in the cloud-Edge continuum and Multi-access Edge computing have received continuously increasing attention in industry and research. the majority of cloud-edge solutions, specifically those that support ultr...
详细信息
ISBN:
(纸本)9798350339826
Services in the cloud-Edge continuum and Multi-access Edge computing have received continuously increasing attention in industry and research. the majority of cloud-edge solutions, specifically those that support ultra-low latency services, are based on a centrally deployed edge services orchestrator that allocates resources in all involved cloud-edge components and in the interconnecting infrastructure. Within closed, private settings, such as industry corporate environments, the dependency on an edge services orchestrator may not pose any limitation. However in a public open access scenario, the organization owning and controlling this orchestration instance may gain a dominating market position due to the dependency of cloudedge services and infrastructure providers on this mediating instance between demand and supply. In this article, peer-to-peer approach for discovering and subscribing to edge infrastructure services is presented, utilizing multicast DNS and peer-to-peer networks. Withthis approach the necessity of deploying a centralized edge services orchestrator and the associated lock-in effects are avoided. the resulting overlay services model that completely decouples the services layer from the infrastructure layer is well suited to support use cases with loose Quality of Service requirements and limited user equipment mobility.
We aim to provide trusted time measurement mechanisms to applications and cloud infrastructure deployed in environments that could harbor potential adversaries, including the hardware infrastructure provider. Despite ...
详细信息
ISBN:
(纸本)9798350339826
We aim to provide trusted time measurement mechanisms to applications and cloud infrastructure deployed in environments that could harbor potential adversaries, including the hardware infrastructure provider. Despite Trusted Execution Environments (TEEs) providing multiple security functionalities, timestamps from the Operating System are not covered. Nevertheless, some services require time for validating permissions or ordering events. To address that need, we introduce Triad, a trusted timestamp dispatcher of time readings. the solution provides trusted timestamps enforced by mutually supportive enclave-based clock servers that create a continuous trusted timeline. We leverage enclave properties such as forced exits and CPU-based counters to mitigate attacks on the server's timestamp counters. Triad produces trusted, confidential, monotonically-increasing timestamps with bounded error and desirable, non-trivial properties. Our implementation relies on Intel SGX and SCONE, allowing transparent usage. We evaluate Triad's error and behavior in multiple dimensions.
Federated Learning is being hailed as a privacy-preserving machine learning alternative, by allowing models to be distributively trained on source devices owning their data. Most FL solutions, and their assessments, h...
详细信息
ISBN:
(纸本)9798350339826
Federated Learning is being hailed as a privacy-preserving machine learning alternative, by allowing models to be distributively trained on source devices owning their data. Most FL solutions, and their assessments, however, assume superior environmental reliability, despite the more realistic variances in environmental factors such as device and network capacity, data distribution, and device churn. As such, we argue in this paper, that there is a growing chasm between current FL assessment setups and the evolving FL assessment needs. Motivated by this chasm, we conduct, to the best of our knowledge, the first empirical measurement study of FL performance given realistic environmental factors. Our study quantifies the impact of these environmental factors on FL performance in terms of training time, accuracy, and communication overhead. Our findings have broad implications for the future development of FL including client admission control and scheduling optimizations.
Energy profiling and optimization are expected to be crucial factors impacting the realisation of the Internet of things (IoT) as more intelligence is deployed at the network extremes to achieve better response times ...
详细信息
ISBN:
(纸本)9798350339826
Energy profiling and optimization are expected to be crucial factors impacting the realisation of the Internet of things (IoT) as more intelligence is deployed at the network extremes to achieve better response times in the proximity of where data are harvested. To improve the performance of streaming analytics jobs, several schedulers have been designed to tackle key challenges in edge computing realms, including resource heterogeneity and highly volatile network links. However, energy-aware scheduling for streaming analytic jobs is at best, not adequately examined. In this article, we introduce PowerStorm, a scheduler for streaming analytic jobs that is designed to explore trade-offs between performance and energy consumption in geodistributed edge computing settings. We implement our scheduler for Apache Storm and show the scheduler's energy saving capabilities over the Yahoo streaming benchmark with worker nodes featuring heterogeneous power and resource capabilities on both a physical and emulated testbed.
the rapid evolution of digital environments and their integration into critical operations of our society have led to substantial challenges in advancing cybersecurity to ensure the proper functioning of these systems...
详细信息
ISBN:
(纸本)9798350339826
the rapid evolution of digital environments and their integration into critical operations of our society have led to substantial challenges in advancing cybersecurity to ensure the proper functioning of these systems. In the face of over-evolving cyber threats and attacks, systems must be equipped with robust mechanisms for protection. In this context, resilience techniques aim to mitigate such treats. However, the evaluation of these techniques is a crucial process, enabling informed decision-making and proactive threat mitigation. this article introduces a methodology based on regression testing for evaluating the impact and cascading effects of resilience strategies. It delves into the methodology's adaptability across different scenarios and provides insights about the evaluation process.
Serverless Function-as-a-Service (FaaS) platforms enable easy deployment and hosting of microservices and have gained great traction among software developers. FaaS platforms, however, only host compute-based function...
详细信息
ISBN:
(纸本)9798350339826
Serverless Function-as-a-Service (FaaS) platforms enable easy deployment and hosting of microservices and have gained great traction among software developers. FaaS platforms, however, only host compute-based functionality of applications resulting in vendor lock-in as applications rely on supporting services known as Backend-as-a-Service (BaaS) offered by the cloud provider for key features such as data persistence. Migrating FaaS code to different cloud providers is made more challenging as a result of these dependencies on vendor-specific services. cloud service abstraction libraries have been developed to alleviate vendor lock-in, but these libraries were largely developed prior to the advent of serverless computing and have not been evaluated in this context. this paper investigates the use of cloud service abstraction libraries to interface with object storage, a key BaaS used in FaaS code. We investigate the utility of these libraries to improve the portability of code to enable easier migration between cloud providers. We investigate performance of seven FaaS functions on AWS and Google cloudthat use object storage using the Apache jclouds abstraction library vs. platform-specific APIs and assess code quality metrics. We then conduct an empirical study leveraging computer science students enrolled in cloudcomputing courses to assess the impact of cloud abstraction libraries on FaaS function code portability.
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge computing and Network Function Virtualization (NFV), providing advantages as flexibility, availability, and reduced management co...
详细信息
ISBN:
(纸本)9798350339826
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge computing and Network Function Virtualization (NFV), providing advantages as flexibility, availability, and reduced management costs. these paradigms introduce several advantages but - given their nature of physically distributed systems - leave room for various security threats, such as software integrity attacks. To counter these threats, Trusted computing and Remote Attestation (RA) techniques can be used, to allow a third party (Verifier) to verify the software and configuration integrity of a platform (Attester). In environments composed of different objects, several RA frameworks (hardware-based, software-based, or hybrid) might need to be deployed, depending on the capabilities of the attested elements. To ease this process, we propose a new design and implementation of our Trust Monitor (TM) architecture, which implements the Trust Manager specified by ETSI for NFV environments, making it more flexible and usable in different contexts. In addition, we define a generic model for performing RA in heterogeneous environments by employing various RA technologies. More specifically, the extended TM allows flexible RA in hybrid infrastructures composed of different objects, i.e., physical nodes, virtual machines, containers, pods, and enclaves. through tests performed in an experimental testbed, we show that the proposed implementation is scalable and usable in heterogeneous contexts.
暂无评论