Filters








54 Hits in 2.5 sec

Fides: Managing Data on Untrusted Infrastructure [article]

Sujaya Maiyya, Danny Hyun Bum Cho, Divyakant Agrawal, Amr El Abbadi
2020 arXiv   pre-print
Using TFCommit, we propose an auditable data management system, Fides, residing completely on untrustworthy infrastructure.  ...  While small enterprises cannot avoid using external infrastructures, they need the right set of protocols to manage their data on untrusted infrastructures.  ...  FIDES ARCHITECTURE Fides is a data management system built on untrusted infrastructure.  ... 
arXiv:2001.06933v1 fatcat:ocakfvphc5bitihwuyccjizrwa

FIDES: Enhancing trust in reconfigurable based hardware systems

Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
2015 2015 IEEE High Performance Extreme Computing Conference (HPEC)  
We target FIDES architecture on a Xilinx Zynq 7020 device implemented with a red-black system comprising of sensitive and non-sensitive IP cores.  ...  On the other hand, as compared to the baseline implementation, when all the communications within the system are routed to the Trusted Anchor for centralized policy checking and verification, a latency  ...  FIDES architecture will leverage those existing defenses based on asymmetric cryptography.  ... 
doi:10.1109/hpec.2015.7322483 dblp:conf/hpec/ShilaVP15 fatcat:lqipkoe7svcnpn2xhxl3nh5xzy

A Wake-up Call: Managing Data in an Untrusted World

Divyakant Agrawal, Amr El Abbadi
2020 IEEE Data Engineering Bulletin  
The Distributed Systems and the Systems Communities have developed consensus protocols to ensure the fault-tolerant maintenance of data residing on untrusted, malicious infrastructure.  ...  We also illustrate that transaction management can learn from the blockchain approach when attempting to restrict untrusted behaviour from the underlying infrastructure.  ...  We propose using TFCommit in an auditable data management system, Fides, residing completely on untrustworthy infrastructures.  ... 
dblp:journals/debu/AgrawalA20 fatcat:4svnawkuanayro64dla2l2p3ga

What's in a Name? Exploring CA Certificate Control

Zane Ma, Joshua Mason, Manos Antonakakis, Zakir Durumeric, Michael Bailey
2021 USENIX Security Symposium  
A client's confidence that it is connecting to the right server depends entirely on the set of CAs that it trusts.  ...  TLS clients rely on a supporting PKI in which certificate authorities (CAs)-trusted organizations-validate and cryptographically attest to the identities of web servers.  ...  Acknowledgments The authors thank Ryan Sleevi and the anonymous reviewers for providing insightful feedback on various parts of this work.  ... 
dblp:conf/uss/MaMADB21 fatcat:xobfqecwxbadhe2mq6fosjt5bm

Securing Application with Software Partitioning: A case study using SGX [article]

Ahmad Atamli-Reineh, Andrew Martin
2017 arXiv   pre-print
To some extent, this is dependent on the capabilities and performance of the partitioning technology in use.  ...  SGX provides a trusted execution environment, called an enclave, that protects the integrity of the code and the confidentiality of the data inside it from other software, including the operating system  ...  These systems address how to isolate trusted code from untrusted code using one TEE, and managing the TEE for different partitions requires intervention of software and not hardware.  ... 
arXiv:1706.03006v1 fatcat:sbezhzauwba4rizynnly5o4gpq

Performance Analysis of QoS Using Compression over Routing Protocols in MANET

Sumitra Ranjan Sinha, Pallavi Khatri, Shashikant Gupta
2016 International Journal of Wireless and Mobile Communication for Industrial Systems  
Adhoc Network Infrastructure Security 22 VempatiSudheshna Why wireless networks?  ...  How ARAN is utilized within secure directing situations the place hubs need aid untrusted to co-operate Be that commissioned should take an interest.  ...  Multi hop infrastructure systems Multi-jump remote systems use more than two bounces to convey data from a sender to a recipient.  ... 
doi:10.21742/ijwmcis.2016.3.1.03 fatcat:wekht3enczdlhky6v3224o65c4

Privacy and Security Problems in Fog Computing

Khalid A.
2016 Communications on Applied Electronics  
Generally called Edge Computing or preliminaries, fog computing supports the operation of Fog/cloud, storage and networking services between end devices and conveyed processing data centers.  ...  away on untrusted servers.  ...  One possible gullible course of action is that the fog client makes sham assignments and offloads them to diverse fog nodes, disguising its bona fide endeavors among the fake ones.  ... 
doi:10.5120/cae2016652088 fatcat:sor65detxfbapnv4ammh7bi7lm

A framework for application partitioning using trusted execution environments

Ahmad Atamli-Reineh, Andrew Paverd, Giuseppe Petracca, Andrew Martin
2017 Concurrency and Computation  
In the business sector, sensitive data includes trade secrets, research and business intelligence data, management reports, customer information, and sales data.  ...  It follows that software partitioning of the application into several trusted and untrusted partitions is expected to produce smaller partitions of code in comparison to the whole application as one partition  ...  TrustVisor provides application developers with a strong secure environment for code execution and data storage on untrusted platforms.  ... 
doi:10.1002/cpe.4130 fatcat:ojcrwrl5hnavpmb6g7xbnnqumy

Analysis of Trusted Execution Environment usage in Samsung KNOX

Ahmad Atamli-Reineh, Ravishankar Borgaonkar, Ranjbar A. Balisane, Giuseppe Petracca, Andrew Martin
2016 Proceedings of the 1st Workshop on System Software for Trusted Execution - SysTEX '16  
In the business sector, sensitive data includes trade secrets, research and business intelligence data, management reports, customer information, and sales data.  ...  It follows that software partitioning of the application into several trusted and untrusted partitions is expected to produce smaller partitions of code in comparison to the whole application as one partition  ...  TrustVisor provides application developers with a strong secure environment for code execution and data storage on untrusted platforms.  ... 
doi:10.1145/3007788.3007795 dblp:conf/middleware/Atamli-ReinehBB16 fatcat:qgob3wtqyfdipkxz4rtsmvefkq

Supercloud Self-Management Of Security Specification

Reda Yaich, Sabir Idrees, Nora Cuppens, Frédéric Cuppens
2015 Zenodo  
In this document, we present a preliminary architecture of SUPERCLOUD security self-management.  ...  We first identify and describe the design requirements of the user-centric self-management of multiclouds security.  ...  The infrastructure offered by an untrusted provider can be considered as an hostile environment wherein security objectives cannot be guaranteed.  ... 
doi:10.5281/zenodo.49741 fatcat:pxpw6e4uw5c4hpdyz6wjyehbqq

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [chapter]

Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius
2013 Lecture Notes in Computer Science  
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns.  ...  We also present a proof-of-concept implementation of the protocol based on OpenStack, an open-source IaaS platform.  ...  Trusted computing offers capabilities to securely perform data manipulations on remote hardware owned and maintained by another party by potentially preventing the use of untrusted software on that hardware  ... 
doi:10.1007/978-3-642-37682-5_22 fatcat:caz3fb3ldbcoxbja3aagtnqrvu

MQT-TZ: Hardening IoT Brokers Using ARM TrustZone [article]

Carlos Segarra and Ricard Delgado-Gonzalo and Valerio Schiavoni
2020 arXiv   pre-print
However, MQTT brokers must process data in clear, hence exposing a large attack surface.  ...  This paper presents MQT-TZ, a secure MQTT broker leveraging Arm TrustZone, a trusted execution environment (TEE) commonly found even on inexpensive devices largely available on the market (such as Raspberry  ...  Examples include live heartrate data [48] , smart-grids [31] , or infrastructure management systems [33] .  ... 
arXiv:2007.12442v2 fatcat:sdoepy7yjrearktaqez3ei4emu

Wireless Communications: Myths and Reality

Samuel C. Yang, Charlie C. Chan
2004 Communications of the Association for Information Systems  
For society, issues of wireless security and its effect on wireless adoption are examined. Based on these examinations, we propose research directions along each dimension.  ...  These factors in turn produce longer delays, less reliability which can hinder new multimedia services (voice, video, and data) over hand-held devices.  ...  Thus, the user's overall experience of wireless video conferencing depends on more than the raw data rate; it also depends on location management [March et al., 2000] , system adaptability [Welling and  ... 
doi:10.17705/1cais.01339 fatcat:jeaatt6zbvgshnjuqehoiv5zee

The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds [chapter]

Stephan Olariu, Tihomir Hristov, Gongjun Yan
2013 Mobile Ad Hoc Networking  
Additionally, data aggregation and empirical results are presented.  ...  A trust coordinator maintained by an external third party is imported to validate the untrusted cloud manager which makes a set of virtual machine such as Amazon's E2C (i.e., Infrastructure as a Service  ...  On our roadways, the static infrastructure includes ILDs, the roadside units, and other ITS hardware deployed in support of traffic monitoring and management.  ... 
doi:10.1002/9781118511305.ch19 fatcat:twwsesnj6bgupmjg37b2yh5r2i

Community Trust Stores for Peer-to-Peer e-Commerce Applications [chapter]

Ahmad H. Fauzi, Hamish Taylor
2011 Communications in Computer and Information Science  
Usage of a cheap and secure community store for trust data provides an effective alternative to conventional trusted third party support services for e-commerce transactions.  ...  The infrastructure is comprised of untrusted servers. However, data is protected through redundancy and cryptographic techniques.  ...  Or they may conspire together in sufficient numbers to succeed in voting for the exclusion of a bona fide member on trumped up grounds. However, these are not problems especial to online trading.  ... 
doi:10.1007/978-3-642-25327-0_37 fatcat:hvqyf4mcnne3dj6ah6sp4ton7u
« Previous Showing results 1 — 15 out of 54 results