Browsing by Author "Fernandes, Diogo A. B."
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- Applications of artificial immune systems to computer security: A surveyPublication . Fernandes, Diogo A. B.; Freire, Mario; Fazendeiro, Paulo; Inácio, Pedro R. M.For the last two decades, artificial immune systems have been studied in various fields of knowledge. They were shown to be particularly effective tools at detecting anomalous behavior in the security domain of computer systems. This article introduces the principles of artificial immune systems and surveys several works applying such systems to computer security problems. The works herein discussed are summarized and open issues are pointed out afterwards, elaborating on a novel applicability of these systems to cloud computing environments.
- Applications of Trusted Computing in Cloud ContextPublication . Memarian, Mohammad Reza; Fernandes, Diogo A. B.; Inácio, Pedro R. M.; Leppänen, Ville; Conti, MauroTrusted computing is a technology that enables computer systems to behave in a given expected way. Achieving that goal happens by arming an isolated piece of hardware with embedded processing, cryptographic ca- pabilities such as encryption key that is kept safe from software layer attacks. The mentioned module is accessible to the rest of the computer system via a well de ned and tested application programming interface. Trusted com- puting protects the system against external attackers and even against the owner of the system. Cloud computing enables users to have access to vast amounts of computational resources remotely, in a seamless and ubiquitous manner. However, in some cloud deployment models, such as public cloud computing, users do not have much control over how their data is remotely handled and are not able to assure that their data is securely processed and stored. Cloud administrators and other parties can be considered threats in such cases. Given the ground that cloud has been gaining and the rate at which data is generated, transmitted, processed and stored remotely, it is vital to protect it using means that address the ubiquitous nature of the cloud, including trusted computing. This chapter investigates applications of trusted computing in cloud computing areas where security threats exist, namely in live virtual machine migration.
- Challenges of Securing Internet of Things DevicesPublication . Samaila, Musa Gwani; Neto, Miguel; Fernandes, Diogo A. B.; Freire, Mario; Inácio, Pedro R. M.The current vision of the Internet of Things (IoT) is to ensure that everything from everywhere is connected to the Internet at all times using Internet Protocol (IP). This idea has the potential of making homes, cities, electric grids, among others, safer, more efficient, and easier to manage. Nevertheless, a number of obstacles still remain to fully realize the IoT vision, with security and privacy among the most critical. Ensuring security and privacy in the IoT is particularly complicated, especially for the resource-constrained devices due to finite energy supply and low computing power. These factors are typically at odds with most of the existing security protocols and schemes proposed for the IoT because of the intensive computational nature of the cryptographic algorithms involved. This paper performs an extensive comparison of previous surveys on the subject, and shows its novelty with respect to the previous work. It describes 9 application domains and presents, in detail, security requirements, system models, threat models along with protocols and technologies for those 9 application areas. The survey also performs an exhaustive examination of some existing mechanisms and approaches proposed in the literature for ensuring security and privacy of IoT devices. Finally, it outlines some open research issues associated with IoT security.
- Security Challenges of the Internet of ThingsPublication . Samaila, Musa Gwani; Neto, Miguel; Fernandes, Diogo A. B.; Freire, Mario; Inácio, Pedro R. M.The Internet of Things (IoT) is an environment in which ordinary and complex consumer products, buildings, bridges, animals or even people, etc. are embedded with sensors, equipped with a variety of communication technologies and given unique identifiers that can enable them connect to the Internet. This allows them to talk to each other, collect data and transfer data over the Internet. IoT has the potential to enhance the way we do things by increasing productivity and efficiency. It also has the prospects of delivering significant business benefits. Nonetheless, implementing secure communication in the IoT and integrating security mechanisms into some of its devices have been a major impediment to its progress, resulting in many privacy concerns. Although IoT is a hybrid network of the Internet, many security solutions for the Internet cannot be directly used on the resource-constrained devices of the IoT, hence the need for new security solutions. In this chapter, we discuss the security challenges of the IoT. First, we discuss some basic concepts of security and security requirements in the context of IoT. We then consider fundamental security issues in the IoT and thereafter highlight the security issues that need immediate attention.