Spelling suggestions: "subject:"recure cloud"" "subject:"recure aloud""
1 |
A Smart and Interactive Edge-Cloud Big Data SystemStauffer, Jake 08 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Data and information have increased exponentially in recent years. The promising era of big data is advancing many new practices. One of the emerging big data applications is healthcare. Large quantities of data with varying complexities have been leading to a great need in smart and secure big data systems.
Mobile edge, more specifically the smart phone, is a natural source of big data and is ubiquitous in our daily lives. Smartphones offer a variety of sensors, which make them a very valuable source of data that can be used for analysis. Since this data is coming directly from personal phones, that means the generated data is sensitive and must be handled in a smart and secure way. In addition to generating data, it is also important to interact with the big data. Therefore, it is critical to create edge systems that enable users to access their data and ensure that these applications are smart and secure. As the first major contribution of this thesis, we have implemented a mobile edge system, called s2Edge. This edge system leverages Amazon Web Service (AWS) security features and is backed by an AWS cloud system. The implemented mobile application securely logs in, signs up, and signs out users, as well as connects users to the vast amounts of data they generate. With a high interactive capability, the system allows users (like patients) to retrieve and view their data and records, as well as communicate with the cloud users (like physicians). The resulting mobile edge system is promising and is expected to demonstrate the potential of smart and secure big data interaction.
The smart and secure transmission and management of the big data on the cloud is essential for healthcare big data, including both patient information and patient measurements. The second major contribution of this thesis is to demonstrate a novel big data cloud system, s2Cloud, which can help enhance healthcare systems to better monitor patients and give doctors critical insights into their patients' health. s2Cloud achieves big data security through secure sign up and log in for the doctors, as well as data transmission protection. The system allows the doctors to manage both patients and their records effectively. The doctors can add and edit the patient and record information through the interactive website. Furthermore, the system supports both real-time and historical modes for big data management. Therefore, the patient measurement information can, not only be visualized and demonstrated in real-time, but also be retrieved for further analysis. The smart website also allows doctors and patients to interact with each other effectively through instantaneous chat. Overall, the proposed s2Cloud system, empowered by smart secure design innovations, has demonstrated the feasibility and potential for healthcare big data applications. This study will further broadly benefit and advance other smart home and world big data applications. / 2023-06-01
|
2 |
DSFS: a data storage facilitating service for maximizing security, availability, performance, and customizabilityBilbray, Kyle 12 January 2015 (has links)
The objective of this thesis is to study methods for the flexible and secure storage of sensitive
data in an unaltered cloud. While current cloud storage providers make guarantees
on the availability and security of data once it enters their domain, clients are not given
any options for customization. All availability and security measures, along with any
resulting performance hits, are applied to all requests, regardless of the data's sensitivity or client's wishes. In addition, once a client's data enters the cloud, it becomes vulnerable to different types of attacks. Other cloud users may access or disrupt the availability of their peers' data, and cloud providers cannot protect from themselves in the event of a malicious administrator or government directive. Current solutions use combinations of known encoding schemes and encryption techniques to provide confidentiality from peers and sometimes the cloud service provider, but its an all-or-nothing model. A client either uses the security methods of their system, or does not, regardless of whether the client's data needs more or less protection and availability. Our approach, referred to as the Data Storage Facilitating Service (DSFS), involves providing a basic set of proven protection schemes with configurable parameters that encode
input data into a number of fragments and intelligently scatters them across the target
cloud. A client may choose the encoding scheme most appropriate for the sensitivity of their data. If none of the supported schemes are sufficient for the client's needs or the client
has their own custom encoding, DSFS can accept already encoded fragments and perform
secure placement.
Evaluation of our prototype service demonstrates clear trade-offs in performance between
the different levels of security encoding provides, allowing clients to choose how
much the importance of their data is worth. This amount of flexibility is unique to DSFS and turns it into more of a secure storage facilitator that can help clients as much or as little as required. We also see a significant effect on overhead from the service's location relative to its cloud when we compare performances of our own setup with a commercial cloud
service.
|
3 |
A Smart and Interactive Edge-Cloud Big Data SystemJake M Stauffer (10987104) 22 June 2021 (has links)
<p>Data and information have increased
exponentially in recent years. The promising era of big data is advancing many
new practices. One of the emerging big data applications is healthcare. Large
quantities of data with varying complexities have been leading to a great need
in smart and secure big data systems. </p>
<p>Mobile edge, more specifically the
smart phone, is a natural source of big data and is ubiquitous in our daily
lives. Smartphones offer a variety of sensors, which make them a very valuable
source of data that can be used for analysis. Since this data is coming
directly from personal phones, that means the generated data is sensitive and
must be handled in a smart and secure way. In addition to generating data, it
is also important to interact with the big data. Therefore, it is critical to
create edge systems that enable users to access their data and ensure that
these applications are smart and secure. As the first major contribution of
this thesis, we have implemented a mobile edge system, called s<sup>2</sup>Edge.
This edge system leverages Amazon Web Service (AWS) security features and is
backed by an AWS cloud system. The implemented mobile application securely logs
in, signs up, and signs out users, as well as connects users to the vast
amounts of data they generate. With a high interactive capability, the system
allows users (like patients) to retrieve and view their data and records, as
well as communicate with the cloud users (like physicians). The resulting
mobile edge system is promising and is expected to demonstrate the potential of
smart and secure big data interaction.</p>
<p>The smart and secure transmission
and management of the big data on the cloud is essential for healthcare big
data, including both patient information and patient measurements. The second
major contribution of this thesis is to demonstrate a novel big data cloud
system, s<sup>2</sup>Cloud, which can help enhance healthcare systems to better
monitor patients and give doctors critical insights into their patients'
health. s<sup>2</sup>Cloud achieves big data security through secure sign up
and log in for the doctors, as well as data transmission protection. The system
allows the doctors to manage both patients and their records effectively. The
doctors can add and edit the patient and record information through the
interactive website. Furthermore, the system supports both real-time and
historical modes for big data management. Therefore, the patient measurement
information can, not only be visualized and demonstrated in real-time, but also
be retrieved for further analysis. The smart website also allows doctors and
patients to interact with each other effectively through instantaneous chat.
Overall, the proposed s<sup>2</sup>Cloud system, empowered by smart secure
design innovations, has demonstrated the feasibility and potential for
healthcare big data applications. This study will further broadly benefit and
advance other smart home and world big data applications. </p>
|
4 |
Processus sécurisés de dématérialisation de cartes sans contact / Secure processes of dematerialization of contactless cardsBouazzouni, Mohamed Amine 08 November 2017 (has links)
Au fil des années, la technologie sans contact NFC s'est imposée dans notre quotidien au travers des différents services proposés. Les cas d'utilisation sont nombreux allant des cartes de fidélité, des cartes de transport, des cartes de paiement sans contact jusqu'aux cartes de contrôle d'accès. Cependant, les premières générations des cartes NFC ont une sécurité minimale reposant sur l'hypothèse de leur non-clonabilité. De multiples vulnérabilités ont été découvertes et leur exploitation a permis des copies frauduleuses. Afin de remédier à ces vulnérabilités, une nouvelle génération de cartes à la sécurité augmentée a vu le jour. Ces cartes permettent une authentification avec un lecteur basée sur des algorithmes de chiffrements symétriques tels qu'AES, DES, et 3DES. Elles sont plus robustes que la première génération mais ont subi des également une attaque en reverse-engineering. Pour garantir et améliorer le niveau de sécurité du système de contrôle d'accès, nous proposons dans le cadre de l'opération neOCampus, la dématérialisation sécurisée de la carte sans contact sur un smartphone muni de la technologie NFC. Cette dématérialisation nous permet d'exploiter la puissance de calcul et la capacité de stockage du smartphone afin de déployer des algorithmes d'authentification plus robustes. Cependant, l'OS du smartphone ne peut être considéré comme un environnement de confiance. Afin de répondre à la problématique du stockage et du traitement sécurisés sur un smartphone, plusieurs solutions ont été proposées : les Secure Elements (SE), les Trusted Platform Module (TPM), les Trusted Execution Environment (TEE) et la virtualisation. Afin de stocker et de traiter de manière sécurisée les données d'authentification, le TEE apparait comme la solution idéale avec le meilleur compromis sécurité/performances. Cependant, de nombreux smartphones n'embarquent pas encore de TEE. Pour remédier à cette contrainte, nous proposons une architecture basée sur l'utilisation de TEEs déportés sur le Cloud. Le smartphone peut le contacter via une liaison Wi-Fi ou 4G. Pour se faire, un protocole d'authentification basé sur IBAKE est proposé. En plus de ce scénario nominal, deux autres scenarii complémentaires ont été proposés permettant d'accompagner le développement et la démocratisation des TEE non seulement dans le monde des smartphones mais aussi sur des dispositifs peu onéreux comme le Raspberry Pi 3. Ces architectures déploient le même algorithme d'authentification que le scénario nominal. Nous proposons aussi une architecture hors ligne permettant à un utilisateur de s'authentifier à l'aide d'un jeton de connexion en cas d'absence de réseaux sans fil. Cette solution permet de relâcher la contrainte sur la connectivité du smartphone à son Cloud. Nous procédons à une évaluation de l'architecture de dématérialisation et de l'algorithme d'authentification en terme de performances et de sécurité. Les opérations cryptographiques du protocole d'authentification sont les plus coûteuses. Nous avons alors procédé à leur évaluation en nous intéressant en particulier aux opérations de chiffrement IBE et à la génération de challenges ECC. Nos implémentations ont été évaluées pour l'infrastructure Cloud et l'environnement mobile. Nous avons ensuite procédé à une validation du protocole d'authentification sur les trois architectures sélectionnées à l'aide de l'outil Scyther. Nous avons montré, que pour les trois scenarii, la clé de session négociée via le protocole d'authentification restait secrète durant tout le protocole. Cette caractéristique nous garantit que les données d'authentification chiffrées avec cette clé resteront secrètes et que la phase d'identification de la personne est protégée tout en préservant l'ergonomie du système existant. / Over the years, the Near Field Communication technology has emerged in our daily lives through a variety of services. There are several use cases for contactless cards : loyalty cards, metro and bus cards, payment cards and access control cards. However, the first version of these cards has a low security level that is based on the assumption that the cards can not be cloned. To address this issue, a new version of NFC cards has been developed. It allows an authentication with the NFC reader through symmetric encryption algorithms such as AES, DES or 3DES. These cards are more robust that the previous ones. However, these cards have also undergone a reverseengineering attack. We propose, in the context of the neOCampus project, to replace the contactless cards with a smartphone equipped with the NFC capabilities. This process, called dematerialization, allows us to take advantage of the computational power and the storage capabilities of the smartphone to deploy more complex and robust authentication algorithms. However, the OS of the smartphone can not be considered as a trusted environment for the storage and the processing of sensitive data. To address these issues, several solutions were proposed : Secure Elements (SE), Trusted Platform Module (TPM), Trusted Execution Environment (TEE) and Virtualization. In order to store and process securely authentication data, the TEE seems to be the best trade-off between security and performances. Nevertheless, many smartphones do not embeed TEE and it is necessary to negotiate agreements with the TEE manufacturers in order to deploy a secure application on it. In order to figure out these issues, we propose to set up an architecture with a TEE in the Cloud. The smartphone has a secure Cloud that can be reached through a Wi-Fi or 4G connection. The reader has also its own secure Cloud reachable with an Ethernet link. An authentication protocol based on IBAKE is also proposed. In addition to this scenario, two other scenarios were proposed to follow the development and democratization of the TEE on the smartphones and on some inexpensive devices such as Raspberry Pi 3. These alternative architectures deploy the same authentication protocol as the main scenario. We propose an offline architecture allowing a user to authenticate using a connection token. This solution relaxes the connectivity constraint between the smartphone and its secure Cloud. We perform an evaluation of our architecture and of the authentication algorithm in terms of performances and security. The cryptographical operations of the authentication protocol are the most consuming operations in term of performance. We have chosen to target these operations especially the encryption with the IBE and the ECC challenges generation. Our implementations have been evaluated for a Cloud infrastructure and a mobile-like environment. We also perform a formal verification of the authentication protocol through the three considered architectures with Scyther. We showed that, for the three scenarios, that the session key negotiated through the authentication protocol remains secret during the overall execution of the protocol. These characteristic guarantee that the authentication data encrypted with this key will remain secret and that this step of the algorithm will be secure while preserving the ergonomy of the existing system.
|
5 |
Untersuchungen zur Risikominimierungstechnik Stealth Computing für verteilte datenverarbeitende Software-Anwendungen mit nutzerkontrollierbar zusicherbaren Eigenschaften / Investigations of the risk minimisation technique Stealth Computing for distributed data-processing software applications with user-controllable guaranteed propertiesSpillner, Josef 05 July 2016 (has links) (PDF)
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt sich durch die geschützte Verlagerung in die Cloud mit einer Kombination aus zielgrößenabhängiger Datenkodierung, kontinuierlicher mehrfacher Dienstauswahl, dienstabhängiger optimierter Datenverteilung und kodierungsabhängiger Algorithmen deutlich erhöhen und anwenderseitig kontrollieren. Die Kombination der Verfahren zu einer anwendungsintegrierten Stealth-Schutzschicht ist eine notwendige Grundlage für die Konstruktion sicherer Anwendungen mit zusicherbaren Sicherheitseigenschaften im Rahmen eines darauf angepassten Softwareentwicklungsprozesses. / The security and reliability of applications processing sensitive data can be significantly increased and controlled by the user by a combination of techniques. These encompass a targeted data coding, continuous multiple service selection, service-specific optimal data distribution and coding-specific algorithms. The combination of the techniques towards an application-integrated stealth protection layer is a necessary precondition for the construction of safe applications with guaranteeable safety properties in the context of a custom software development process.
|
6 |
Untersuchungen zur Risikominimierungstechnik Stealth Computing für verteilte datenverarbeitende Software-Anwendungen mit nutzerkontrollierbar zusicherbaren EigenschaftenSpillner, Josef 18 December 2015 (has links)
Die Sicherheit und Zuverlässigkeit von Anwendungen, welche schutzwürdige Daten verarbeiten, lässt sich durch die geschützte Verlagerung in die Cloud mit einer Kombination aus zielgrößenabhängiger Datenkodierung, kontinuierlicher mehrfacher Dienstauswahl, dienstabhängiger optimierter Datenverteilung und kodierungsabhängiger Algorithmen deutlich erhöhen und anwenderseitig kontrollieren. Die Kombination der Verfahren zu einer anwendungsintegrierten Stealth-Schutzschicht ist eine notwendige Grundlage für die Konstruktion sicherer Anwendungen mit zusicherbaren Sicherheitseigenschaften im Rahmen eines darauf angepassten Softwareentwicklungsprozesses.:1 Problemdarstellung
1.1 Einführung
1.2 Grundlegende Betrachtungen
1.3 Problemdefinition
1.4 Einordnung und Abgrenzung
2 Vorgehensweise und Problemlösungsmethodik
2.1 Annahmen und Beiträge
2.2 Wissenschaftliche Methoden
2.3 Struktur der Arbeit
3 Stealth-Kodierung für die abgesicherte Datennutzung
3.1 Datenkodierung
3.2 Datenverteilung
3.3 Semantische Verknüpfung verteilter kodierter Daten
3.4 Verarbeitung verteilter kodierter Daten
3.5 Zusammenfassung der Beiträge
4 Stealth-Konzepte für zuverlässige Dienste und Anwendungen
4.1 Überblick über Plattformkonzepte und -dienste
4.2 Netzwerkmultiplexerschnittstelle
4.3 Dateispeicherschnittstelle
4.4 Datenbankschnittstelle
4.5 Stromspeicherdienstschnittstelle
4.6 Ereignisverarbeitungsschnittstelle
4.7 Dienstintegration
4.8 Entwicklung von Anwendungen
4.9 Plattformäquivalente Cloud-Integration sicherer Dienste und Anwendungen
4.10 Zusammenfassung der Beiträge
5 Szenarien und Anwendungsfelder
5.1 Online-Speicherung von Dateien mit Suchfunktion
5.2 Persönliche Datenanalyse
5.3 Mehrwertdienste für das Internet der Dinge
6 Validierung
6.1 Infrastruktur für Experimente
6.2 Experimentelle Validierung der Datenkodierung
6.3 Experimentelle Validierung der Datenverteilung
6.4 Experimentelle Validierung der Datenverarbeitung
6.5 Funktionstüchtigkeit und Eigenschaften der Speicherdienstanbindung
6.6 Funktionstüchtigkeit und Eigenschaften der Speicherdienstintegration
6.7 Funktionstüchtigkeit und Eigenschaften der Datenverwaltung
6.8 Funktionstüchtigkeit und Eigenschaften der Datenstromverarbeitung
6.9 Integriertes Szenario: Online-Speicherung von Dateien
6.10 Integriertes Szenario: Persönliche Datenanalyse
6.11 Integriertes Szenario: Mobile Anwendungen für das Internet der Dinge
7 Zusammenfassung
7.1 Zusammenfassung der Beiträge
7.2 Kritische Diskussion und Bewertung
7.3 Ausblick
Verzeichnisse
Tabellenverzeichnis
Abbildungsverzeichnis
Listings
Literaturverzeichnis
Symbole und Notationen
Software-Beiträge für native Cloud-Anwendungen
Repositorien mit Experimentdaten / The security and reliability of applications processing sensitive data can be significantly increased and controlled by the user by a combination of techniques. These encompass a targeted data coding, continuous multiple service selection, service-specific optimal data distribution and coding-specific algorithms. The combination of the techniques towards an application-integrated stealth protection layer is a necessary precondition for the construction of safe applications with guaranteeable safety properties in the context of a custom software development process.:1 Problemdarstellung
1.1 Einführung
1.2 Grundlegende Betrachtungen
1.3 Problemdefinition
1.4 Einordnung und Abgrenzung
2 Vorgehensweise und Problemlösungsmethodik
2.1 Annahmen und Beiträge
2.2 Wissenschaftliche Methoden
2.3 Struktur der Arbeit
3 Stealth-Kodierung für die abgesicherte Datennutzung
3.1 Datenkodierung
3.2 Datenverteilung
3.3 Semantische Verknüpfung verteilter kodierter Daten
3.4 Verarbeitung verteilter kodierter Daten
3.5 Zusammenfassung der Beiträge
4 Stealth-Konzepte für zuverlässige Dienste und Anwendungen
4.1 Überblick über Plattformkonzepte und -dienste
4.2 Netzwerkmultiplexerschnittstelle
4.3 Dateispeicherschnittstelle
4.4 Datenbankschnittstelle
4.5 Stromspeicherdienstschnittstelle
4.6 Ereignisverarbeitungsschnittstelle
4.7 Dienstintegration
4.8 Entwicklung von Anwendungen
4.9 Plattformäquivalente Cloud-Integration sicherer Dienste und Anwendungen
4.10 Zusammenfassung der Beiträge
5 Szenarien und Anwendungsfelder
5.1 Online-Speicherung von Dateien mit Suchfunktion
5.2 Persönliche Datenanalyse
5.3 Mehrwertdienste für das Internet der Dinge
6 Validierung
6.1 Infrastruktur für Experimente
6.2 Experimentelle Validierung der Datenkodierung
6.3 Experimentelle Validierung der Datenverteilung
6.4 Experimentelle Validierung der Datenverarbeitung
6.5 Funktionstüchtigkeit und Eigenschaften der Speicherdienstanbindung
6.6 Funktionstüchtigkeit und Eigenschaften der Speicherdienstintegration
6.7 Funktionstüchtigkeit und Eigenschaften der Datenverwaltung
6.8 Funktionstüchtigkeit und Eigenschaften der Datenstromverarbeitung
6.9 Integriertes Szenario: Online-Speicherung von Dateien
6.10 Integriertes Szenario: Persönliche Datenanalyse
6.11 Integriertes Szenario: Mobile Anwendungen für das Internet der Dinge
7 Zusammenfassung
7.1 Zusammenfassung der Beiträge
7.2 Kritische Diskussion und Bewertung
7.3 Ausblick
Verzeichnisse
Tabellenverzeichnis
Abbildungsverzeichnis
Listings
Literaturverzeichnis
Symbole und Notationen
Software-Beiträge für native Cloud-Anwendungen
Repositorien mit Experimentdaten
|
Page generated in 0.0593 seconds