{"title":"Implementation of C-BAS: Certificate-Based AAA for SDN Experimental Facilities","authors":"U. Toseef, K. Pentikousis","doi":"10.1109/NCCA.2015.16","DOIUrl":"https://doi.org/10.1109/NCCA.2015.16","url":null,"abstract":"Recent work in software-defined networking experimental facilities has been shifting towards large scale deployments through federation of resources that span across continents and make it possible to perform experiments at a global scale. The success of such deployments very much depends on the design and implementation of essential, secure mechanisms for authentication, authorization, and accounting (AAA) that not only ensure the robustness of such facilities against intrusions and unauthorized use but also ease experimentation and system administration in such complex environments. C-BAS is an initiative in this direction that uses a secure and flexible certificate-based AAA architecture for SDN experimental facilities. Advanced certificate-based authentication and authorization makes C-BAS inherently resilient against attacks specific to traditional AAA mechanisms, increases flexibility and autonomy in experimental facility system administration, and facilitates federation. This article introduces the implementation details of C-BAS, explains its features through use cases, and evaluates its computational performance.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments with Smart Workload Allocation to Cloud Servers","authors":"Lan Wang, E. Gelenbe","doi":"10.1109/NCCA.2015.15","DOIUrl":"https://doi.org/10.1109/NCCA.2015.15","url":null,"abstract":"We present experiments that compare three on-line real time techniques for task allocation to different cloud servers: an adaptive random neural network (RNN) based on reinforcement algorithm, an algorithm based on \"sensible routing'', one which uses a simple analytical model to select the server is estimated to give the best response as a function of workload, and round-robin task allocation. Measurements indicate that the RNN based algorithm can make accurate decisions when it exploits frequent measurement updates.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131131484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabio Pierazzi, Andrea Balboni, Alessandro Guido, Mirco Marchetti
{"title":"The Network Perspective of Cloud Security","authors":"Fabio Pierazzi, Andrea Balboni, Alessandro Guido, Mirco Marchetti","doi":"10.1109/NCCA.2015.21","DOIUrl":"https://doi.org/10.1109/NCCA.2015.21","url":null,"abstract":"The cloud computing paradigm has become really popular, and its adoption is constantly increasing. Hence, also network activities and security alerts related to cloud services are increasing and are likely to become even more relevant in the upcoming years. In this paper, we propose the first characterization of real security alerts related to cloud activities and generated by a network sensor at the edge of a large network environment over several months. Results show that the characteristics of cloud security alerts differ from those that are not related to cloud activities. Moreover, alerts related to different cloud providers exhibit peculiar and different behaviors that can be identified through temporal analyses. The methods and results proposed in this paper are useful as a basis for the design of novel algorithms for the automatic analysis of cloud security alerts, that can be aimed at forecasting, prioritization, anomaly and state-change detection.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Library Recommender System on Hadoop","authors":"A. Ismail, Haytham Tawfeek al Feel","doi":"10.1109/NCCA.2015.27","DOIUrl":"https://doi.org/10.1109/NCCA.2015.27","url":null,"abstract":"DBLP that is considered a digital repository of a massive amount of scientific papers does not have an easy and scalable way for users to find what they need. Our paper introduces a digital library recommender system named DLRS that facilitates the searching process in big data environment based on Hadoop and Hive-Ql as a query engine using MapReduce parallel programming framework.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Practical Homomorphic Encryption in Cloud Computing","authors":"Adil Bouti, J. Keller","doi":"10.1109/NCCA.2015.20","DOIUrl":"https://doi.org/10.1109/NCCA.2015.20","url":null,"abstract":"Secure computing in clouds faces many challenges related to data confidentiality and integrity. Classical security models focus on securing data from outside attacks, e.g. from other cloud users. Yet, breach of data confidentiality by the cloud provider has received far less attention. In previous work, we presented a protocol to delegate computations into clouds, providing security against other cloud users and cloud providers through encrypted data. The protocol is based on homomorphic properties of encryption algorithms. However,that protocol was only practical in certain circumstances. In the present paper we introduce some practical extensions to our algorithm to improve its efficiency. Additionally we extend the algorithm to support multiparty computation while preserving its homomorphic properties. We then show how these optimization blocks can be used for applying the scheme to efficient face recognition using Eigenface recognition algorithm.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122033365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Generic Architecture for Scalable and Highly Available Content Serving Applications in the Cloud","authors":"Evie Kassela, I. Konstantinou, N. Koziris","doi":"10.1109/NCCA.2015.22","DOIUrl":"https://doi.org/10.1109/NCCA.2015.22","url":null,"abstract":"The cloud computing paradigm allows service providers to offer scalable and highly available applications to their end users. Typical cases where this is required are content serving applications, where a large number of connected users manage arbitrary data amounts. In the Big Data era, where the amount of information that is being produced and consumed grows exponentially, centralized legacy approaches are inefficient, as they cannot adequately scale according to the number of connected users or the dataset sizes. In these cases, an efficient cloudification of content serving applications is required in order to benefit from the cloud's offerings. In this work, we present a generic architecture that can be used by almost any content serving application in order to offer scalable and highly available data management operations to their users by employing cloud management techniques. We describe the architectural blocks of our approach along with how they can be efficiently deployed in a cloud environment. We document our experiences with an actual deployment of a typical content serving application over ~okeanos, an Openstack compatible public cloud service. We describe the open source frameworks that we have selected from a plethora of existing tools, we justify our choices and we describe our initial observations during their operation. We give a detailed overview of how we installed and configured these systems to achieve high availability and scalability in a public cloud setting. Finally, we document our initial performance evaluation where we showcase the system's ability to handle increasing workloads by elastically scaling its resources.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115593146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}