Explore chapters and articles related to this topic
Attacking Smartphone Security and Privacy
Published in Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos, Intrusion Detection and Prevention for Mobile Ecosystems, 2017
Vincent F. Taylor, Ivan Martinovic
From our survey of the literature, we uncovered that email client apps and network service apps (those that open ports) have not received wide attention from adversaries or the research community. These categories of apps may potentially be more vulnerable because of their distinctive characteristics. For email apps, the rending of HTML email or automatic downloading of attachments can provide unique access to the system if malicious emails/attachments are not handled properly. Network service apps that open ports on a smartphone may also introduce vulnerabilities if they are not designed properly. Even very mature network services on desktops/workstations/servers contain vulnerabilities, so it would be no surprise if the less mature smartphone versions of these services also contain vulnerabilities. This fact becomes worrying when one considers that many apps are developed by small teams or individuals with potentially little knowledge or concern for security. Submodule firmware (such as Wi-Fi) has also received little attention from attackers. This may be because it requires esoteric knowledge to actually interface with hardware. If successfully exploited, submodule firmware can provide long-term, almost undetectable, elevated privileges on a smartphone. IDS approaches to protecting hardware are a welcome area for future research.
Building Cloud Networks
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
With the explosive growth of the Internet and its increasingly important role in our lives, the traffic on the Internet is increasing dramatically, which has been growing at over 100% annualy. The workload on servers is increasing rapidly, so servers may easily be overloaded, especially serversfor a popular web site. There are two basic solutions to the problem of overloaded servers, One is a single-server solution, i.e., upgrade the server to a higherperformance server. However, the new server may also soon be overloaded, requiring another upgrade. Further, the upgrading process is complex and the cost is high. The second solution is a multiple-server solution, i.e., build a scalable network service system on a cluster of servers. When load increases, you can simply add one or more new servers to the cluster, and commodity servers have the highest performance/cost ratio. Therefore, it is more scalable and more cost-effective to build a server cluster system for network services.
Server load balance based on SDN
Published in Amir Hussain, Mirjana Ivanovic, Electronics, Communications and Networks IV, 2015
Zhenwei Meng, Lijun Zhang, Han Xu
To improve the performance, availability and scalability of network service and also to make full use of the source on servers, the traditional network service providers use server farm and load balancer to achieve the goals above. The traditional load balance on servers often has two situations: one is to provide the unified service with the same functional servers, the other one is to provide different services with different type servers. In the former type, every user can obtain the same service from each server as the servers have the same sources and states. While in the latter one, each server may provide one type of service, then we need a device to distribute the user request to different servers according to the request type or contents. In this paper, we just focus on the former one
A novel blockchain-based privacy-preserving framework for online social networks
Published in Connection Science, 2021
Shiwen Zhang, Tingting Yao, Voundi Koe Arthur Sandor, Tien-Hsiung Weng, Wei Liang, Jinshu Su
In this paper, aiming at addressing these above challenges, we propose a blockchain-based privacy-preserving framework for online social networks (BPP), which enables the data querier to enjoy efficient and privacy-preserving social network service, such as data retrieving, data sharing, data accessing, from SNSP (i.e. cloud server) in a flexible and scalable manner without worrying about the potential damage of his/her own interest. We implement this framework by combining the public-key cryptography and blockchain technique. To protect the security of block data, we adopt an asymmetric encryption algorithm, such as RSA, Elgamal, to guarantee the confidentiality block data and the legality of the transactions in blockchain. Meanwhile, we can use symmetric encryption algorithms to protect the confidentiality of outsourced social network data in cloud. To protect the query privacy, by using the smart contract in blockchain (i.e. Ethereum), a novel secure, fair and efficient keyword search algorithm has been proposed. To preserve the integrity and accuracy of the query result, we also utilise the consensus mechanism in Ethereum to automatically verify the authenticity and completeness of query results. At last, the data querier finally gains the desirable data without compromising the security of the data.
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services
Published in Connection Science, 2022
Ioannis Stellios, Kostas Mokos, Panayiotis Kotzanikolaou
To be as realistic as possible and at the same time, to depict the current threat landscape, we consider simplified versions of realistic scenarios. In particular, we consider several installation domains ranging from home environments, public areas and buildings up to corporate and government institutions. An overview of the PoC installation domains, devices, networks and physical location are depicted in Figure 2. In particular, we have included the following scenarios: A systemic monetary institution (e.g. banks): The smart lighting system is installed within the bank's premises and can communicate with the Internet (e.g. via UPnP network service) with the administrators network, but has no direct access to the bank's server.A pharmaceutical company: The smart lighting system is installed within the company's premises, is isolated from the Internet but can communicate with the server sub-network.A government cloud infrastructure: The smart lighting system is installed within the building, can communicate with the Internet as well as with the G-cloud's management network.A smart home environment (remote working scenario): The smart lighting system can communicate with the Internet and is installed in the same network with a mobile workstation that has admin access to G-Cloud infrastructure.A sports stadium facility: The smart lighting system can communicate with the Internet and is installed in the same network with an vulnerable IoT-enabled alerting system.It is part of the public lighting infrastructure: The smart lighting system is massively installed to several public areas (streets, parks, etc.) and is managed remotely via the Internet.