A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
2019
Journal of Computer Networks and Communications
With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified ...
This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. ...
Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2019/5747136
fatcat:dps6x5rtlrgznhi5rjuv4dtlji
Integrity verification of Docker containers for a lightweight cloud environment
2019
Zenodo
This paper presents a solution for security monitoring of a lightweight cloud infrastructure, which exploits Remote Attestation to verify the software integrity of cloud applications during their whole ...
available for a lightweight virtualisation environment (such as Docker). ...
Acknowledgement
795 The authors wish to thank Dr. Tao Su for his valuable contribution in the creation of a first prototype of DIVE. ...
doi:10.5281/zenodo.3267028
fatcat:paxhe3z3ifdy5bmvmbkcer4jyq
Towards Secure Cloud Orchestration for Multi-Cloud Deployments
2018
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms - CrossCloud'18
However, despite the central role of orchestration, the popular orchestration frameworks lack mechanisms to provide security guarantees for cloud operators. ...
In this work, we analyze the security landscape of cloud orchestration frameworks for multicloud infrastructure. ...
Acknowledgments The research was conducted within the COLA project and received funding from the European Union's Horizon 2020 research and innovation programme under grant No 731574. ...
doi:10.1145/3195870.3195874
dblp:conf/eurosys/PaladiMD18
fatcat:qul32bkf4rfdnghqmnxyfzl5ga
Clouds of Things Need Information Flow Control with Hardware Roots of Trust
2015
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
TPMs can be leveraged to validate software configurations, including the IFC enforcement mechanism, both in the cloud and externally via remote attestation. ...
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things. ...
We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre. ...
doi:10.1109/cloudcom.2015.41
dblp:conf/cloudcom/PasquierSB15
fatcat:tna3qe4grbdyjkh4jwzggnoqda
A Survey on Recent Advanced Research of CPS Security
2021
Applied Sciences
First, we review the main contents of the selected papers and classify them into 24 topics. ...
In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation ...
message distribution in clouds [62] . ...
doi:10.3390/app11093751
fatcat:fxby2wjzpnchrfshvilxalmptm
Design of an Efficient Trustful-Lightweight Cloud Service Provisioning Model using Service Optimizer
2021
EAI Endorsed Transactions on Cloud Systems
OBJECTIVES: Thus, this research intends to propose a Trustful-Lightweight Cloud Service Provisioning algorithm (TL-CSP) using Service Optimizer (SO). ...
INTRODUCTION: The establishment of trusted cloud services pretends to provide high impactful service with better satisfaction to the web-users and cloud service providers. ...
It deals with the nature of both property and binary-based attestation method, which cannot be attesting absolutely for the service characteristics. ...
doi:10.4108/eai.19-10-2021.171468
fatcat:f45t7syqzvdolgxsocoae2crzu
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
2019
2019 IEEE Conference on Network Softwarization (NetSoft)
In this paper, we present a lightweight dynamic control-flow property-based attestation architecture (CFPA) that can be applied on both resource-constrained edge and cloud devices and services. ...
Towards this direction, remote attestation has been proposed as a promising defense mechanism. It allows a third party, the verifier, to ensure the integrity of a remote device, the prover. ...
AN ARCHITECTURAL BLUEPRINT FOR LIGHTWEIGHT CF PROPERTY-BASED ATTESTATION A. ...
doi:10.1109/netsoft.2019.8806658
dblp:conf/netsoft/Koutroumpouchos19
fatcat:fqxbdi4m5jdwfaf5srmlllhy3u
A practical approach to the attestation of computational integrity in hybrid cloud
2015
2015 International Conference on Computing, Networking and Communications (ICNC)
In this paper, we present an efficient method for attestation of computational integrity in hybrid cloud. ...
In the context of a heterogeneous trust environment, such as a hybrid cloud (consisting of public and private cloud), it is possible for an untrusted component to create a Byzantine fault intentionally ...
ACKNOWLEDGEMENT This work was supported in part by the US National Science Foundation under grants CNS-0963578, CNS-1022552, and CNS-1065444. ...
doi:10.1109/iccnc.2015.7069318
dblp:conf/iccnc/PawloskiWDQ15
fatcat:tzh5ms64mzfdrplnuashzcklye
Towards Management Of Chains Of Trust For Multi-Clouds With Intel Sgx
2016
Zenodo
We propose a protocol for establishing trust between a chain of Intel SGX enclaves, both when they are located on the same and on remote platforms. ...
In multi-cloud infrastructures, despite the great diversity of current isolation technologies, a federating model to manage trust across layers or domains is still missing. ...
A MULTI-CLOUD 2.1 Multi-Cloud Infrastructure Model Abbadi et al. proposed a simple architectural model to manage trust in a distributed cloud [1] (seeFigure 1). ...
doi:10.5281/zenodo.58681
fatcat:lrgfqqhiyjfgjfcmhn5xhyv2by
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device
2020
Security and Communication Networks
In this paper, we propose a novel and practical scheme for software trusted execution based on lightweight trust. ...
Software measurement and attestation are general methods to detect software integrity and their executing states in IoT. ...
log) to server with for device attestation. ...
doi:10.1155/2020/8957641
fatcat:w373tmsvqna5tniaatv7viqqmq
Security for Cyber-Physical Systems: Leveraging Cellular Networks and Fog Computing
[article]
2018
arXiv
pre-print
The routine support for cellular authentication, encryption, and integrity protection is enhanced with the addition of a cellular cloud controller to take over the management of the radio and core security ...
We present a hybrid framework for securing CPS that leverages the computational resources and coordination of Fog networks, and builds on cellular connectivity for low-power and resource constrained CPS ...
For example, a compromised PLC in a water plant -controlling chlorine levels -will prompt isolation for other PLCs controlling water distribution, when detected by the fog attestation. ...
arXiv:1806.11053v1
fatcat:iygu4gkfhjbdbiiu473l3r4gei
On the establishment of trust in the cloud-based ETSI NFV framework
2017
Zenodo
Cloud computing, envisioned by ETSI as enabling technology for the deployment of the NFV infrastructure, represents a challenging environment for the establishment of trust. ...
This paper discusses the challenges in applying one specific technology, Trusted Computing, to a NFV cloud-based architecture and proposes a concrete solution (based on the Intel OpenCIT framework) to ...
ACKNOWLEDGMENT The research described in this paper is part of the SHIELD project, co-funded by the European Commission (H2020 grant agreement no. 700199). ...
doi:10.5281/zenodo.3265972
fatcat:lrwv6ya5srfgrbibedvavylwsu
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
[article]
2022
arXiv
pre-print
a cloud server can still perform the aggregation. ...
Only model updates are locally computed and shared for aggregation to produce a global model. ...
For initialization, each client generates its own key pair and leverages the cloud server as a central hub for distribution of public keys. Let G be a cyclic group of prime order p, with generator g. ...
arXiv:2202.01971v1
fatcat:e4se2nznbzbkdbe3v5347fmtqe
Accountable proof of ownership for data using timing element in cloud services
2013
2013 International Conference on High Performance Computing & Simulation (HPCS)
While many cloud storage and infrastructure systems exist today, none of them provide a mechanism for accountability of stored or user generated content. ...
The proposed scheme allows a service provider to incorporate timing accountability of data generated at the provider, by requesting proofs from accountability servers in the cloud. ...
We presented a novel system of secure timing element based attestation for accountability. Our system design focused on the scalability of cloud services. ...
doi:10.1109/hpcsim.2013.6641393
dblp:conf/ieeehpcs/MizanRKHH13
fatcat:bzll6spkonfpfdrijgtsvigcgy
Multi-Layer IoT Security Framework for Ambient Intelligence Environments
2019
Sensors
The adoption of this new paradigm for health and social care largely depends on the technology deployed (sensors and wireless networks), the software used for decision-making and the security, privacy ...
(Cloud, gateway and IoT device), that offer functionalities relative to that layer ...
Acknowledgments: The authors would like to thank the reviewers for all useful and helpful comments on our manuscript.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s19184038
fatcat:2wcbql5adzhmlgbewi4sdvix5e
« Previous
Showing results 1 — 15 out of 1,283 results