The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With SDN increasingly becoming an enabling technology for NFV in the cloud, many virtualized network functions need to monitor the network state in order to function properly. An outdated network view at the controllers can impact the performance of those virtualized network functions. In earlier work, we identified two main factors contributing to an outdated network view in the case of a load-balancer:...
Personal storage services are one of the most popular applications based on the cloud computing paradigm. Therefore, the analysis of possible privacy and security issues has been a relevant part of the research agenda. However, threats arising from the adoption of information hiding techniques have been mainly neglected. In this perspective, the paper investigates how personal cloud storage services...
Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning...
In cloud environment, client user credential protection is a critical security capability that is target of adversarial attacks, especially, in cloud file synchronization applications. Among the various adversarial attacks, MITC (Man in the Cloud) attack on commercial cloud storage applications has emerged as a critical threat because it is easy to launch and hard to detect. In this paper, we propose...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
The Network Time Security specification provides measures which are designed to add security to time synchronization protocols, while considering their specific timing-related requirements. The development of the specification is accompanied by formal analysis of its security model. Special attention is paid to the Network Time Protocol, for which an implementation of those measures is in progress.
Moving Target Defense (MTD) has been proposed as a new revolutionary technology to alter the asymmetric situation between attacks and defences. Network address shuffling is an important branch of MTD technology. However, there is no systematic introduction to network address shuffling. In this paper, we present a brief introduction to the research achievements of network address shuffling according...
The usage of smartphone nowadays has been increasingly and most of people in the world use it. Following this development a wide variety of applications for mobile phones have been created. After all, most people use the smartphone to browse social networks, listen to music, play games, make memos upload photos to Instagram, accessing banking services, as well as data sharing through cloud system...
In typical IP network, load balancing is adopt to enable the load of all servers approach a global optimal balanced by dynamically dispatching new flows to different servers in the network. Linux Virtual Server (LVS) plays an important role in the dispatching process. However, previous LVS-based researches have failed to consider expansibility, efficiency and security. Based on this, we proposed a...
Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype...
Although the great success and the popularity of Cloud computing, an important number of challenges and threats are inherent to this new computing paradigm. One of the serious challenges in Cloud service architecture is managing authentication. Our goal in this paper is to present a flexible authentication solution based on TLS standard and asynchronous one time password mechanism. Our purpose is...
Abstract- Cloud computing is a promising next generation computing paradigm which offers significant economic benefits to both commercial and public entities. Due to the unique combination of characteristics that cloud computing introduce, including; on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service, digital investigations face various technical,...
With the rise of smart phones and tablets and the ubiquitous use of computers in daily life, the number of computing devices a user interacts with in a day has grown dramatically in recent years. This growth has led to numerous inconveniences for the user, one of the largest being the difficulty of accessing their data across all the devices they use. While one solution for this is cloud storage services...
Machine-to-machine communication (M2M) is a popular topic in many fields of industry. Within this paper the authors present a system for optimizing agricultural processes using M2M technologies as a result of research project “M2M-Teledesk”.
While originating as an instant messaging infrastructure, the eXtensible Messaging and Presence Protocol (XMPP) has its applications as a lightweight middleware for real-time event distribution, e.g. for mobile computing or the Internet of Things. Services based on XMPP are traditionally realized as server components with simple local registration for discovery, which is not appropriate for distributed...
Mobile-cloud offloading mechanisms delegate heavy mobile computation to the cloud. In real life use, the energy tradeoff of computing the task locally or sending the input data and the code of the task to the cloud is often negative, especially with popular communication intensive jobs like social-networking, gaming, and emailing. We design and build a working implementation of CDroid, a system that...
Wireless sensor network (WSN) is made up two or more interconnected sensor nodes wirelessly. These nodes may be deployed either in open or closed environment. As these nodes communicates wirelessly and deployed in open environment there are always threat of security of nodes as well as data communicated. In order to making secure communication over WSN there should be some security mechanism. In this...
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, design issues for efficient and secure biometrics-based remote user authentication scheme have been extensively investigated by research community in these years. Recently, two biometrics-based authentication...
We propose a solution to avoid stability, security and performance concerns in multi-player games. This should lead to greater scalability in existing multi-player games but could also provide a way to implement multi-player functionality in an existing single-player game whilst ensuring the code-base stays organised and robust without requiring large modifications to the existing architecture. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.