The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
In this work, information security of a cooperative wireless communication system over three-phase amplify-and-forward (AF) two-way relaying channels is investigated. A relay power allocation scheme is proposed to improve secrecy capacity of the system. We first derive the secrecy rate expression for the basic scenario which consists of one source, one destination, one single relay, and an eavesdropper...
In this paper, we study a wireless cooperative secure transmission system with the help of a friendly cooperative jammer Chad to interfere a potential malicious eavesdropper Eve. For imperfect channel estimation, we continue to follow the optimal power allocation and the maximum secrecy rate design of the perfect channel. Considering channel estimation scenario in the actual communication environment,...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
Cloud computing is growing rapidly due to its features of low cost, space saving, sharing etc., yet security issues are still a major concern. Multi-cloud computing technology was developed, in part, to address security concerns. One technique could use the Shamir's secret sharing method which is based on risk diversification. This work offers a solution strategy allowing users to allocate their resources...
Hybrid Clouds couple the scalability of public Clouds with the greater control supplied by private ones. Hybrid Cloud Brokers support customers in selecting the most suitable providers' offers, optionally adding the provisioning of dedicated services with higher Quality of Service (QoS) levels. A clear evaluation of the benefits on performance and energy savings brought about by any allocation strategy...
A resource allocation scheme consisting of joint assignment of routing, wavelength and time-slot is proposed to construct different channels in software-defined optical networks secured by quantum key distribution (QKD). Security level is considered by key-updating period.
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption...
Cloud computing is a relatively emerging concept of providing dramatically scalable and virtualized IT resources. The lack of novel security controls for the cloud might arise from the fact that cloud computing is the convergence of many different technological areas, including virtualization and service oriented architectures. One of the most challenging issues in clouds is to provide an appropriate...
In many Internet of ing (IoT) application domains security is a critical requirement, because malicious parties can undermine the eectiveness of IoT-based systems by compromising single components and/or communication channels. us, a security infrastructure is needed to ensure the proper functioning of such systems even under aack. However, it is also critical that security be at a reasonable resource...
We present recent work in the design and operation of wireless sensor-actuation systems along three aspects. At the device level, a major drive is the reduced power consumption of the wireless transceivers without loss of control performance. At the channel access level, a shared wireless channel needs to be administered between multiple systems with control performance guarantees for all systems...
This paper investigates the secrecy rates and optimal power allocation schemes of a decode-and-forward (DF) wiretap relay channel where a relay operates in a full-duplex (FD) mode. A practical self-interference model is adopted to take into account the effect of residual self-interference. At first, we demonstrate that while the optimal power allocation schemes between the source and the relay are...
While unmanned aerial vehicles (UAVs) are a promising technology, they suffer from fundamental fuel and payload restrictions. A system of UAVs can be used to address these limitations. In this paper, we consider an automated system of UAVs seeking to provide an uninterrupted, or persistent, security presence to customers in an outdoor environment. We define the goals of such a system and provide architecture...
Cloud data centers are critical infrastructures to deliver cloud services. Although security and performance of cloud data centers have been well studied in the past, their networking aspects are overlooked. Current network infrastructures in cloud data centers limit the ability of cloud provider to offer guaranteed cloud network resources to users. In order to ensure security and performance requirements...
This paper describes the status of the 5G NORMA architecture after the second design iteration. It integrates the control and data layer functions developed in the project into a harmonized mobile network architecture, applying the paradigms of adaptive (de-) composition and allocation of network functions (NFs), programmable network control, and end-to-end network slicing. The paper depicts the design...
We present a formal method for computing the bestsecurity provisioning for Internet of Things (IoT) scenarios characterizedby a high degree of mobility. The security infrastructureis intended as a security resource allocation plan, computedas the solution of an optimization problem that minimizes therisk of having IoT devices not monitored by any resource. Weemploy the shortfall as a risk measure,...
With the explosive growth of users in mobile carrier, telecommunication fraud causes a serious loss to both of the users and carriers. The academia has an increasing interest in the issue of detecting and recognizing fraudster, and varies strategies have been proposed to prevent the attack and fraudulent activity. However, fraudsters are always inclined to hide their identity and perform the fraudulent...
As the multitude and complexity of the cloud market increases, the evaluation and selection of cloud services becomes a burdensome task for the users. With the extraordinary rise of available services from various Cloud Service Providers (CSPs), the role of cloud brokers has become more and more important. This paper proposes an optimal cloud broker model to address the challenge of optimally allocating...
Recently, security problems in massive multiple-input multiple-output (MIMO) network draw more and more attention. In this paper, a security problem for a multi-pair massive MIMO two-way amplify-and-forward (AF) relay network is considered, where multiple users exchange confidential messages via a common relay equipped with large number of antennas. We propose an optimal power allocation scheme that...
In this paper, the security in a device-to-device (D2D) spectrum sharing network is investigated. The cellular users and eavesdroppers are distributed according to two independent Poisson Point Processes (PPPs), and the positions of the D2D transmitters follow a hard-core point process. Based on the stochastic geometry, we first derive closed-form expressions of the connection and secrecy outage probabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.