1,283 Hits in 3.0 sec

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer
2019 Journal of Computer Networks and Communications  
With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified  ...  This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature.  ...  Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2019/5747136 fatcat:dps6x5rtlrgznhi5rjuv4dtlji

Integrity verification of Docker containers for a lightweight cloud environment

Marco De Benedictis, Antonio Lioy
2019 Zenodo  
This paper presents a solution for security monitoring of a lightweight cloud infrastructure, which exploits Remote Attestation to verify the software integrity of cloud applications during their whole  ...  available for a lightweight virtualisation environment (such as Docker).  ...  Acknowledgement 795 The authors wish to thank Dr. Tao Su for his valuable contribution in the creation of a first prototype of DIVE.  ... 
doi:10.5281/zenodo.3267028 fatcat:paxhe3z3ifdy5bmvmbkcer4jyq

Towards Secure Cloud Orchestration for Multi-Cloud Deployments

Nicolae Paladi, Antonis Michalas, Hai-Van Dang
2018 Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms - CrossCloud'18  
However, despite the central role of orchestration, the popular orchestration frameworks lack mechanisms to provide security guarantees for cloud operators.  ...  In this work, we analyze the security landscape of cloud orchestration frameworks for multicloud infrastructure.  ...  Acknowledgments The research was conducted within the COLA project and received funding from the European Union's Horizon 2020 research and innovation programme under grant No 731574.  ... 
doi:10.1145/3195870.3195874 dblp:conf/eurosys/PaladiMD18 fatcat:qul32bkf4rfdnghqmnxyfzl5ga

Clouds of Things Need Information Flow Control with Hardware Roots of Trust

Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon
2015 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)  
TPMs can be leveraged to validate software configurations, including the IFC enforcement mechanism, both in the cloud and externally via remote attestation.  ...  There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things.  ...  We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre.  ... 
doi:10.1109/cloudcom.2015.41 dblp:conf/cloudcom/PasquierSB15 fatcat:tna3qe4grbdyjkh4jwzggnoqda

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
First, we review the main contents of the selected papers and classify them into 24 topics.  ...  In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation  ...  message distribution in clouds [62] .  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Design of an Efficient Trustful-Lightweight Cloud Service Provisioning Model using Service Optimizer

Suvarna Pawar, Y. Prasanth
2021 EAI Endorsed Transactions on Cloud Systems  
OBJECTIVES: Thus, this research intends to propose a Trustful-Lightweight Cloud Service Provisioning algorithm (TL-CSP) using Service Optimizer (SO).  ...  INTRODUCTION: The establishment of trusted cloud services pretends to provide high impactful service with better satisfaction to the web-users and cloud service providers.  ...  It deals with the nature of both property and binary-based attestation method, which cannot be attesting absolutely for the service characteristics.  ... 
doi:10.4108/eai.19-10-2021.171468 fatcat:f45t7syqzvdolgxsocoae2crzu

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation

Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos
2019 2019 IEEE Conference on Network Softwarization (NetSoft)  
In this paper, we present a lightweight dynamic control-flow property-based attestation architecture (CFPA) that can be applied on both resource-constrained edge and cloud devices and services.  ...  Towards this direction, remote attestation has been proposed as a promising defense mechanism. It allows a third party, the verifier, to ensure the integrity of a remote device, the prover.  ...  AN ARCHITECTURAL BLUEPRINT FOR LIGHTWEIGHT CF PROPERTY-BASED ATTESTATION A.  ... 
doi:10.1109/netsoft.2019.8806658 dblp:conf/netsoft/Koutroumpouchos19 fatcat:fqxbdi4m5jdwfaf5srmlllhy3u

A practical approach to the attestation of computational integrity in hybrid cloud

Andrew Pawloski, Longfei Wu, Xiaojiang Du, Lijun Qian
2015 2015 International Conference on Computing, Networking and Communications (ICNC)  
In this paper, we present an efficient method for attestation of computational integrity in hybrid cloud.  ...  In the context of a heterogeneous trust environment, such as a hybrid cloud (consisting of public and private cloud), it is possible for an untrusted component to create a Byzantine fault intentionally  ...  ACKNOWLEDGEMENT This work was supported in part by the US National Science Foundation under grants CNS-0963578, CNS-1022552, and CNS-1065444.  ... 
doi:10.1109/iccnc.2015.7069318 dblp:conf/iccnc/PawloskiWDQ15 fatcat:tzh5ms64mzfdrplnuashzcklye

Towards Management Of Chains Of Trust For Multi-Clouds With Intel Sgx

Houssem Kanzari, Marc Lacoste
2016 Zenodo  
We propose a protocol for establishing trust between a chain of Intel SGX enclaves, both when they are located on the same and on remote platforms.  ...  In multi-cloud infrastructures, despite the great diversity of current isolation technologies, a federating model to manage trust across layers or domains is still missing.  ...  A MULTI-CLOUD 2.1 Multi-Cloud Infrastructure Model Abbadi et al. proposed a simple architectural model to manage trust in a distributed cloud [1] (seeFigure 1).  ... 
doi:10.5281/zenodo.58681 fatcat:lrgfqqhiyjfgjfcmhn5xhyv2by

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device

Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng
2020 Security and Communication Networks  
In this paper, we propose a novel and practical scheme for software trusted execution based on lightweight trust.  ...  Software measurement and attestation are general methods to detect software integrity and their executing states in IoT.  ...  log) to server with for device attestation.  ... 
doi:10.1155/2020/8957641 fatcat:w373tmsvqna5tniaatv7viqqmq

Security for Cyber-Physical Systems: Leveraging Cellular Networks and Fog Computing [article]

Filipo Sharevski, Sharief Oteafy
2018 arXiv   pre-print
The routine support for cellular authentication, encryption, and integrity protection is enhanced with the addition of a cellular cloud controller to take over the management of the radio and core security  ...  We present a hybrid framework for securing CPS that leverages the computational resources and coordination of Fog networks, and builds on cellular connectivity for low-power and resource constrained CPS  ...  For example, a compromised PLC in a water plant -controlling chlorine levels -will prompt isolation for other PLCs controlling water distribution, when detected by the fog attestation.  ... 
arXiv:1806.11053v1 fatcat:iygu4gkfhjbdbiiu473l3r4gei

On the establishment of trust in the cloud-based ETSI NFV framework

Marco De Benedictis, Antonio Lioy
2017 Zenodo  
Cloud computing, envisioned by ETSI as enabling technology for the deployment of the NFV infrastructure, represents a challenging environment for the establishment of trust.  ...  This paper discusses the challenges in applying one specific technology, Trusted Computing, to a NFV cloud-based architecture and proposes a concrete solution (based on the Intel OpenCIT framework) to  ...  ACKNOWLEDGMENT The research described in this paper is part of the SHIELD project, co-funded by the European Commission (H2020 grant agreement no. 700199).  ... 
doi:10.5281/zenodo.3265972 fatcat:lrwv6ya5srfgrbibedvavylwsu

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization [article]

Yifeng Zheng and Shangqi Lai and Yi Liu and Xingliang Yuan and Xun Yi and Cong Wang
2022 arXiv   pre-print
a cloud server can still perform the aggregation.  ...  Only model updates are locally computed and shared for aggregation to produce a global model.  ...  For initialization, each client generates its own key pair and leverages the cloud server as a central hub for distribution of public keys. Let G be a cyclic group of prime order p, with generator g.  ... 
arXiv:2202.01971v1 fatcat:e4se2nznbzbkdbe3v5347fmtqe

Accountable proof of ownership for data using timing element in cloud services

Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, Ragib Hasan
2013 2013 International Conference on High Performance Computing & Simulation (HPCS)  
While many cloud storage and infrastructure systems exist today, none of them provide a mechanism for accountability of stored or user generated content.  ...  The proposed scheme allows a service provider to incorporate timing accountability of data generated at the provider, by requesting proofs from accountability servers in the cloud.  ...  We presented a novel system of secure timing element based attestation for accountability. Our system design focused on the scalability of cloud services.  ... 
doi:10.1109/hpcsim.2013.6641393 dblp:conf/ieeehpcs/MizanRKHH13 fatcat:bzll6spkonfpfdrijgtsvigcgy

Multi-Layer IoT Security Framework for Ambient Intelligence Environments

Ion Bica, Bogdan-Cosmin Chifor, Ștefan-Ciprian Arseni, Ioana Matei
2019 Sensors  
The adoption of this new paradigm for health and social care largely depends on the technology deployed (sensors and wireless networks), the software used for decision-making and the security, privacy  ...  (Cloud, gateway and IoT device), that offer functionalities relative to that layer  ...  Acknowledgments: The authors would like to thank the reviewers for all useful and helpful comments on our manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19184038 fatcat:2wcbql5adzhmlgbewi4sdvix5e
« Previous Showing results 1 — 15 out of 1,283 results