Filters








2,966 Hits in 3.5 sec

Preventing data leakage in service orchestration

Thomas Demongeot, Eric Totel, Yves Le Traon
2011 2011 7th International Conference on Information Assurance and Security (IAS)  
However, the dynamic aspects of web services lead to situations where the policy prohibits the nominal operation of orchestration (e.g., when using a service that is unknown by the user).  ...  In this paper, we offer the opportunity to the user to specify constraints on the use of its personal data. To ensure the privacy of data at runtime, we define a distributed security policy model.  ...  User data protection in a service orchestration is thus crucial, and requires two basic bricks.  ... 
doi:10.1109/isias.2011.6122806 dblp:conf/IEEEias/DemongeotTT11 fatcat:qzzazxhm4ncgxcw3k4rpbcn2zy

Secure Collaborative Training and Inference for XGBoost [article]

Andrew Law, Chester Leung, Rishabh Poddar, Raluca Ada Popa, Chenyu Shi, Octavian Sima, Chaofan Yu, Xingmeng Zhang, Wenting Zheng
2020 arXiv   pre-print
Crucially, Secure XGBoost augments the security of the enclaves using novel data-oblivious algorithms that prevent access side-channel attacks on enclaves induced via access pattern leakage.  ...  Moreover, collaborative learning among multiple parties has the potential to greatly benefit all parties involved, but organizations have also encountered obstacles in sharing sensitive data due to business  ...  Acknowledgments This work was supported in part by the NSF CISE Expeditions Award CCF-1730628, and gifts from the Sloan Foundation, Bakar Program, Alibaba, Amazon Web Services, Ant Group, Capital One,  ... 
arXiv:2010.02524v1 fatcat:mh5gmhwqefe7lfh25jet2jgpzq

BPEL orchestration of secure webmail

Saket Kaushik, Duminda Wijesekera, Paul Ammann
2006 Proceedings of the 3rd ACM workshop on Secure web services - SWS '06  
We show how a verifiably-correct, generic mail service that enables extensions of SMTP-based standard mail use cases that avoids known misuse cases can be specified using WSDL and orchestrated using BPEL  ...  WebMail proposes to migrate existing SMTP-based mail systems to Web-Services.  ...  For the transformation procedures below we assume that a policy can be represented as a logical formula in disjunctive normal form (DNF), i.e., it can be represented as d 1 ∨d 2 ∨…∨d n where each d i is  ... 
doi:10.1145/1180367.1180383 dblp:conf/sws/KaushikWA06 fatcat:wmg4rxycy5fzjnv37uuh5ckt3i

Mobile Software Security Threats in the Software Ecosystem, a Call to Arms [chapter]

Andrey Krupskiy, Remmelt Blessinga, Jelmer Scholte, Slinger Jansen
2017 Lecture Notes in Business Information Processing  
These platforms have experienced security issues since their public release in 2007.  ...  The conclusion highlights vulnerabilities in the developer guidelines of mobile platforms and recommends appropriate action to improve the situation.  ...  Apple does not refer directly to data leakage, nor to the ways mentioned by OWASP on how data leakage could occur on iOS.  ... 
doi:10.1007/978-3-319-69191-6_11 fatcat:pvrhyh7wbrep3ej2y2jsmo774m

Distributed access control and privacy for the internet of me

Daniel Diaz-Sanchez, R. Simon Sherratt, Florina Almenares, Patricia Arias, Andres Marin Lopez
2016 2016 IEEE International Conference on Consumer Electronics (ICCE)  
by things to the cloud preventing information leakage.  ...  That prevents denial of service attacks, but if there is no policy restraining an authenticated EE from writing into a given channel, the policy enforcement will be handled in a distributed fashion at  ... 
doi:10.1109/icce.2016.7430506 dblp:conf/iccel/SanchezSAAL16a fatcat:ox7yqzhf2ncx5mcrolbpe6bicq

Insider Threats in Emerging Mobility-as-a-Service Scenarios [article]

Franco Callegati, Saverio Giallorenzo, Andrea Melis, Marco Prandini
2016 arXiv   pre-print
, in an effort to mitigate the problems.  ...  Traditionally, transits and data on mobility belong to a scattered plethora of operators.  ...  Data leakage is the accidental distribution of private or sensitive data to unauthorized entities [20] . In SMAll, both Users and Managers can cause data leakage.  ... 
arXiv:1609.06447v1 fatcat:weofcwcwxzelfenjyjcsz2afja

Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications

Sahil Garg, Song Guo, Vincenzo Piuri, Kim-Kwang Raymond Choo, Balasubramanian Raman
2020 IEEE Internet of Things Journal  
In "A cloud-MEC collaborative task offloading scheme with service orchestration," the authors introduced an offloading scheme for big data transmission and processing load.  ...  In "Trusted cloud-edge network resource management: DRL-driven service function chain orchestration for IoT," the authors presented a service function chain orchestration architecture based on the consortium  ... 
doi:10.1109/jiot.2020.2999798 fatcat:sbfruvc4djh7haw3scb4u2jxku

Using Blockchain in the Internet of Things Coordination

Radia Belkeziz, Zahi Jarir
2021 International Journal of Advanced Computer Science and Applications  
One of the most complex is the IoT coordination service. Unfortunately, most research works give rarely importance to this service in their models or architectures proposals.  ...  Carbon leakage as a case study is used for experimentation.  ...  We plan as a future work to focus on scalability problem resolution, and the use of big data benefits to optimize the decision-making on the coordination mechanisms.  ... 
doi:10.14569/ijacsa.2021.0120877 fatcat:yhgctkvixzf77kmlymizsst2rq

FRAME 2022

Luca Ferrucci, Massimo Coppola, Hanna Kavalionak, Ioannis Kontopoulos
2022 Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed Computing  
As real-time data-driven decisions can be promptly taken on the spot, without the need to wait for data to travel to the Cloud and back, also interactive and time-sensitive services like the immersive  ...  Clouds provide appropriate levels of performance to large groups of different users, whereas Edge resources act as a first layer of computing capacity that is closer to the user, to reduce the service  ...  to thank the researchers and scholars that contributed to this workshop, all the authors for their hard work and the high quality papers as well as the anonymous reviewers, for their time and effort in  ... 
doi:10.1145/3502181.3535103 fatcat:luqm67lpgfgibhrs5vsdccbtoa

D1.3 - Supercloud Architecture Implementation

Markus Miettinen, Mario Münzer, Marc Lacoste, Sébastien Canard, Marie Paindavoine, Alysson Bessani, Fernando Ramos, Nuno Neves, Tommaso Frassetto, Daniel Pletea
2017 Zenodo  
and secure networking resources spanning across different cloud service providers' computation, data storage and network resources.  ...  In this document we describe the implementation of the SUPERCLOUD architecture.  ...  We propose to leverage secure cloud enclaves, such as Intel SGX, to help towards reliable key management and to prevent any leakage while storing and manipulating users' secret keys.  ... 
doi:10.5281/zenodo.836956 fatcat:zmbnf4z2qjarzcjrt4igpqzhpy

Improving Data Spillage in Multi Cloud Capacity Administrations

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The information is stored in multiple servers in order to avoid data loss due to vulnerabilities like hacking or server crash.  ...  The FHE algorithm provides keygen, copygen and taggen, using these keys the data can be decrypted and retrieved.  ...  To the best of our knowledge, this is the primary work which applies near-duplicate techniques for preventing information leakage in multi cloud storage services.  ... 
doi:10.35940/ijitee.a1015.1191s19 fatcat:gwpewlkk5ra2jjg7ebvtdop3cu

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments [chapter]

Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
2016 Lecture Notes in Computer Science  
As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets.  ...  Rapid advances in the industry of handheld devices and mobile applications has fuelled the penetration of interactive and ubiquitous web-based services into almost every aspect of our lives.  ...  The present work has been performed in the scope of the SESAME ( Small cEllS coordinAtion for Multi-tenancy and Edge services) European Research Project and has been supported by the Commission of the  ... 
doi:10.1007/978-3-319-45931-8_5 fatcat:3mft6bekkzbt7krasbyacvr2zy

Fog Orchestration for Internet of Things Services

Zhenyu Wen, Renyu Yang, Peter Garraghan, Tao Lin, Jie Xu, Michael Rovatsos
2017 IEEE Internet Computing  
This article provides an overview of the core issues, challenges and future research directions in Fog-enabled orchestration for IoT services.  ...  The orchestration of such applications can be leveraged to alleviate the difficulties of maintenance and enhance data security and system reliability.  ...  Therefore, data-driven optimization and planning should be considered in the orchestration of complex IoT services.  ... 
doi:10.1109/mic.2017.36 fatcat:5rvkwbrvj5cb5bamhlnztrwqy4

A survey on security in network functions virtualization

Wei Yang, Carol Fung
2016 2016 IEEE NetSoft Conference and Workshops (NetSoft)  
In this paper, we survey the challenges and opportunities in NFV security. We describe the NFV architecture design and some potential NFV security issues and challenges.  ...  We also survey NFV security use cases and explore promising research directions in this area.  ...  Data leakage. controls. Shared computing resources: Compute domain 1. CPU. Data should be encrypted and accessed only by the VNFs. 2. Memory. Network domain 1.  ... 
doi:10.1109/netsoft.2016.7502434 dblp:conf/netsoft/YangF16 fatcat:7o6oadtctrftppxemibdd6stvi

SHIELD: A Novel NFV-based Cybersecurity Framework

G. Gardikis, K. Tzoulas, K. Tripolitis, A. Bartzas, S. Costicoglou, Antonio Lioy, B. Gastón, C. Fernández, C. Dávila, A. Litke, N. Papadakis, D. Papadopoulos (+16 others)
2017 Zenodo  
Network Security Functions – vNSFs), Big Data analytics for real-time incident detection and mitigation, as well as attestation techniques for securing both the infrastructure and the services.  ...  SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity framework, which offers security-as-a-Service in an evolved telco environment.  ...  (e.g. denial of service, data leakage, identity theft etc.)  Security solution aspects -Aspects that cybersecurity solutions must address (e.g. cost, easiness to use, etc.)  ... 
doi:10.5281/zenodo.3264996 fatcat:xre6ko73engk5pvx5t4gvd4v4u
« Previous Showing results 1 — 15 out of 2,966 results