the most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. they have to deal with t...
详细信息
ISBN:
(纸本)9789897581045
the most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. they have to deal withthe security of the individual components as well as withthe overall applicationsecurity including the communications and the data flow between the components. In this paper we present a novel approach currently in progress, the MUSA framework. the MUSA framework aims to support the security-intelligent lifecycle management of distributed applications over heterogeneous cloud resources. the framework includes security-by-design mechanisms to allow application self-protection at runtime, as well as methods and tools for the integrated security assurance in boththe engineering and operation of multi-cloud applications. the MUSA framework leverages security-by-design, agile and DevOps approaches to enable the security-aware development and operation of multi-cloud applications.
this paper researches and designs a APT detection system based on big data processing architecture, which includes data capturing, big data processing, APT Analyzing and application layer. the system can detect both k...
详细信息
ISBN:
(纸本)9781479972845
this paper researches and designs a APT detection system based on big data processing architecture, which includes data capturing, big data processing, APT Analyzing and application layer. the system can detect both known and unknown APT attacks with high performance, and provide alert and forensics function to APT.
the proceedings contain 28 papers. the topics discussed include: hospital dietary planning system using constraint programming;toward a student information system for Sebha university, Libya;distribution based ensembl...
详细信息
ISBN:
(纸本)9781467375504
the proceedings contain 28 papers. the topics discussed include: hospital dietary planning system using constraint programming;toward a student information system for Sebha university, Libya;distribution based ensemble for class imbalance learning;the impact of social media networks on enhancing students' performance in online learning systems;extending PostgreSQL to handle OLXP workloads;software components selection using the fuzzy set theory;an application of augmented Reality (AR) in the manipulation of Fanuc 200IC robot;cerebral abnormalities detection by region-growing segmentation and KNN classification;scheduling in hybrid cloud to maintain dataprivacy;understanding DevOps & bridging the gap from continuous integration to continuous delivery;point triangulation using Graham's scan;separable convolution Gaussian smoothing filters on a Xilinx FPGA platform;accurate and fast multi-rate multicast scheme in wireless networks;and RAMSES: a robotic assistant and a mobile support environment for speech and language therapy.
Withthe development of science and technology, the security of power system is facing great challenge, and it is necessary to implement the analysis of electricity behavior characteristics based on big data technolog...
详细信息
Personal data Stores are among the many efforts that are currently underway to try to re-decentralise the Web, and to bring more control and data management and storage capability under the control of the user. Few of...
详细信息
ISBN:
(纸本)9781450334730
Personal data Stores are among the many efforts that are currently underway to try to re-decentralise the Web, and to bring more control and data management and storage capability under the control of the user. Few of these architectures, however, have considered the needs of supporting decentralised social software from the user's perspective. In this short paper, we present the results of our design exercise, focusing on two key design needs for building decentralised social machines: that of supporting heterogeneous social apps and multiple, separable user identities. We then present the technical design of a prototype social machine platform, INDX, which realises both of these requirements, and a prototype heterogeneous microblogging application which demonstrates its capabilities.
As information security and privacy are primary concerns for most enterprises and individuals, a threat called Cross-VM (Virtual Machine) Attack certainly impedes their adoption of public or hybrid cloud computing. Sp...
详细信息
ISBN:
(纸本)9781467371834
As information security and privacy are primary concerns for most enterprises and individuals, a threat called Cross-VM (Virtual Machine) Attack certainly impedes their adoption of public or hybrid cloud computing. Specifically, Cross-VM Attack enables hostile tenants to leverage various forms of covert channels to exfiltrate sensitive information of victims on the same physical host. A new covert channel has been demonstrated by exploiting a special feature of memory deduplication which is widely used in virtualization products, that is, writing to a shared page would incur longer access delay than those non-shared. However, this sort of covert channel attack is merely considered as "potential threat" due to lack of practical protocol. In this paper, we study how to design an efficient and reliable protocol of CCCMD (Cloud Covert Channel based on Memory Deduplication). We first analyze the CCCMD working scheme in a virtualized environment, and uncover its major defects and implementation difficulties. We then build a prototype named WindTalker which overcomes these obstacles. Our experiments show that WindTalker performs much better with lower bit error rate and achieves a reasonable transmission speed adaptive to noisy environment.
the proceedings contain 13 papers. the special focus in this conference is on Global Innovation and Knowledge Academy. the topics include: Contribution of computing services to benchmarking asset management knowledge ...
ISBN:
(纸本)9783319222035
the proceedings contain 13 papers. the special focus in this conference is on Global Innovation and Knowledge Academy. the topics include: Contribution of computing services to benchmarking asset management knowledge management;financing of productive investments;a fuzzy logic approach to modeling brand value;human resource characteristics and E-business;the complexity of cyber attacks in a new layered-security model and the maximum-weight, rooted-subtree problem;are problems with violence and the lack of public safety a barrier to entrepreneurship?;the development of ICTs and the introduction of entrepreneurial capital;analysis and improvement of knowledge management processes in organizations using the business process model notation;re-examining the consistency in fsQCA;a web services-based application for LMS data extraction and processing for social network analysis;fault tolerance patterns mining in dynamic databases and a unified approach for the longest path problem on some tree-like graphs.
security has become one of the main barriers for the adoption of cloud services. A range of legal initiatives that require support mechanisms such as access control and data encryption have been proposed to ensure pri...
详细信息
ISBN:
(纸本)9789897581045
security has become one of the main barriers for the adoption of cloud services. A range of legal initiatives that require support mechanisms such as access control and data encryption have been proposed to ensure privacy for data moved to the cloud. Although these mechanisms are currently feasible in situations in which the cloud acts as a mere data storage system, they are insufficient in more complex scenarios requiring processing in external cloud servers. Several new schemes have been proposed to overcome these shortcomings. data Processing in the Encrypted Domain (DPED) permits arithmetic operations over ciphered data and the generation of encrypted results, without exposure of clear data. In such a set-up, the servers have no access to the information at any point of the process. In this paper we describe, as a case study of secure cloud data processing, a cloud spreadsheet that relies on DPED libraries to perform operations in the encrypted domain. Tests performed on local servers and in the Google cloud through the Google App Engine platform show that representative real applications can benefit from this technology. Because the proposed solution is PaaS-oriented, developers can apply the libraries to other applications.
Android has 81.5% of the smartphone market now, and it is also suffering from the explosive growth of malicious applications (or apps). these apps steal users' secret data and transmit it out of the phones. By ana...
详细信息
ISBN:
(纸本)9781450338325
Android has 81.5% of the smartphone market now, and it is also suffering from the explosive growth of malicious applications (or apps). these apps steal users' secret data and transmit it out of the phones. By analyzing the required permissions and the abnormal behaviors, some malicious apps may be easily detected. However, in this paper, we present a bidirectional covert channel in Android, named bitheft, which steals secrets and privacies covertly without any permission. bitheft firstly collects secret data from a set of unprotected shared resources in Android system. then, it analyzes and infers secrets from the data. Withthe Intent mechanism, bitheft transmits secrets by legally launching some activities of other apps without requiring any permission itself. bitheft also monitors the usages and statuses of the shared resources to receive commands from remote server. We implement a bitheft scenario, and demonstrate that some types of secrets can be stolen and transmitted out. With pre-agreement, bitheft dynamically adjusts according withthe remote server commands. Comparing withthe traditional covert channels, bitheft is more practical in the real world scenarios.
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user'...
详细信息
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user's sensitive data. Further, its popularity also opens a new era of application development; because of which Google's Play Store now contains millions of free Android applications. To use these applications users are bound to give the permission to access their data as a cost of the application. the required permissions, sometimes are genuine (such as location information required by Google map, etc), however in most of the cases they need unnecessary permissions due to which security and the privacy of user are hampered. Considering these facts, in this paper, we proposed a computationally efficient framework to enhance the privacy as well as the security of Android users.
暂无评论