Structural Cloud Audits that Protect Private Information
|
|
|
- Abraham Mosley
- 10 years ago
- Views:
Transcription
1 Structural Cloud Audits that Protect Private Information Hongda Xiao, Bryan Ford, Joan Feigenbaum Department of Computer Science Yale University Cloud Computing Security Workshop November 8, 2013
2 Motivation Cloud computing and cloud storage now plays a central role in the daily lives of individuals and businesses. Over a billion people use Gmail and Facebook to create, share, and store personal data 20% of all organizations use the commercially available cloudstorage services provided both by established vendors and by cloud-storage start-ups Reliability of cloud-service providers grows in importance.
3 Motivation Cloud-service providers use redundancy to achieve reliability Data Center 1 Data Center 2 But redundancy can fail due to Common Dependencies [Ford, Icebergs in the Clouds, HotCloud '12] Power Station 1
4 Motivation This is a real problem e.g. a lightning storm in northern Virginia took out both the main power supply and the backup generator that powered all of Amazon EC2's data centers in the region We need a systematic way to discover and quantify vulnerabilities resulting from common dependencies
5 Motivation Zhai et al. proposed Structural Reliability Auditing (SRA) collect comprehensive information from infrastructure providers construct a service-wide fault tree identify critical components, estimiate likelihood of service outage A potential barrier to adoption of SRA is the sensitive nature of both its input and its output. cloud service providers and infrastructure providers may not be willing to disclose the required information
6 Objective Privacy-Preserving SRA (P-SRA): investigate the use of secure multi-party computation (SMPC) to perform SRA in a privacy preserving manner Perform SMPC on complex, linked data structures of cloud topology, which has not often been explored yet
7 Basic Idea Step 1: Build a structural model of cloud infrastructure of interest Cloud Service1 Step 2: Perform fault tree analysis to detect hidden failure risks Cloud Service1 Data Center 1 Data Center 2 (Power1, Router1 Router2) Power 1 (Router1 Router2) Power 1 Router 1 Router 2 Power 2 Router 1 Router 2 [Zhai et al., Auditing the Structural Reliability of the Clouds, Yale TR-1479]
8 Challenges Private Data Acquisition How to collect complex, linked data of cloud topology without compromising the privacy of the cloud and infrastructure providers? Privacy-Preserving Analysis Efficiency How to identify common dependencies and correlated failure risk without requiring providers to disclose confidential information? SMPC is NOT very efficient especially when the size of inputs are large
9 Our Solutions Private Data Acquisition Leverage secret sharing techniques in SMPC Specify valid output protecting privacy Privacy-Preserving Analysis Efficiency Specialized graph representation techniques to build fault tree in a privacy preserving manner Novel data partitioning techniques to effectively reduce the input size of SMPC and leave most of the computations locally
10 System Design Overview P-SRA Client P-SRA Client Data Acquisition Unit (DAU) Local Execution Unit (LEU) Cloud 1 DAU LEU SSU Secret Sharing Unit (SSU) P-SRA Host Represents Cloud Users, Reliability Auditors Cloud 2 DAU LEU SSU SMPC Computation Cloud Users SMPC Coordination Does SMPC coordination Cloud 3 DAU LEU SSU P-SRA Host
11 Cloud Provider Install and control a P-SRA Client Input their private infrastructure information, which is considered private Semi-honest Threat Model The Cloud Providers are honest but curious
12 P-SRA Client Fully controlled by Cloud Providers Data Acquisition Unit Collects component and dependency information Local Execution Unit Perform local stractural reliability analysis Secret Sharing Unit Perform SMPC with P-SRA Host
13 P-SRA Host SMPC module Perform SMPC with each P-SRA client installed by cloud providers Coordination module Coordinate the communication between P-SRA Clients and P- SRA Host Semi-honest Model The P-SRA Host is honest but curious
14 Outline of How the System Works Step 1: Privacy-preserving dependency acquisition Step 2: Subgraph abstraction to reduce problem size Step 3: SMPC protocol execution and local computation Step 4: Privacy-preserving output delivery
15 Privacy-preserving dependency acquisition The DAU of each cloud-service provider collects information about the components and dependencies of this provider network dependencies hardware dependencies software dependencies failure probability estimates for components Store the information in a local database for use by P-SRA's other modules.
16 Subgraph Abstraction The Client's SSU abstracts the dependency information of private components as a set of macro-components, which are the actual inputs of the SMPC Key step to reduce the input size of SMPC The choice of abstraction policy is flexible as long as satisfying the proper criterions Can be generalized to other SMPC problem on complex and linked data structure
17 Subgraph Abstraction Policy A subgraph H of the full dependency graph G of a cloudservice provider S should have two properties in order to be eligible for abstraction as a macro-component all components in H must be used only by S for any two components v and w in H, the dependency information of v with respect to components outside of H is identical to that of w SSU collapses H to a single node to transfer G to a smaller graph G'
18 Subgraph Abstraction: Example Dependency Graph of a Simple Data Center A Storage Service Two Data Centers, one for service and the other for back-up Red Frame is the data center 1, which satisfies the two properties Router 1 Router 2 Power 1 Power 2 Core1 Agg1 Gateway1 Core2 Agg2 Core3 Agg3 Gateway2 Core4 Agg4 ToR1 ToR1 ToR1 ToR1 S1 S2 S3 S4 S5 S6 S7 S8 Storage Back-up Back-up
19 Subgraph Abstraction: Example Router 1 Router 2 Power 1 Power 2 Red frame on the left is data center 1, which is abstracted as Data Center 1 on the right Gateway1 Gateway2 Cloud Service1 Core1 Core2 Core3 Core4 Data Center 1 Data Center 2 Agg1 Agg2 Agg3 Agg4 ToR1 ToR1 ToR1 ToR1 Power 1 Router 1 Router 2 Power 2 S1 S2 S3 S4 S5 S6 S7 S8 Storage Back-up Back-up
20 SMPC and Local Computation SMPC Local Computation Perform SMPC to identify common dependency and reliability analysis across cloud providers SSU passes the dependency informaiton within macro-components to LEU SSUs of P-SRA Clients work with SMPC of P- SRA Host LEU performs structural reliability analysis locally
21 SMPC Protocol Fault-tree construction Generate input for the SMPC Identify common dependencies Calculate failure sets
22 Fault Tree Analysis FTA is a deductive reasoning technique Occurence of top event is a boolean combination of occurence of lower level events Fault Tree is a Directed Acyclic Graph (DAG) Node: gate or event Link: dependency information Failure Set is a set of components whose simultaneous failure results in cloud service outage
23 SMPC Fault Tree Construction Challenge Solution SMPC cannot readily handle conditionals, which are necessary in traditional ways of processing Fault Trees Rewrite the fault tree as topology paths form with types Eliminates use of conditionals
24 Topology Paths with Types Extract all paths through dependency DAG root node intermediate nodes leaf node Unpacks the DAG for "circuit" processing Can be exponentially larger than DAG in worst case :( Types of topology paths The SSU builds a disjunction of conjunctions of disjunctions data structure by assigning each path a type
25 Topology Paths with Types: Example Cloud Service1 Cloud Service1 Data Center 1 Power 1 Cloud Service1 Data Center 2 Power 2 Data Center 1 Data Center 2 Cloud Service1 Data Center 1 Router 1 Cloud Service1 Data Center 1 Router 2 Power 1 Power 2 Cloud Service1 Data Center 2 Router 1 Router 1 Router 2 Cloud Service1 Data Center 12 Router 2
26 Local Execution Protocol Generate fault tree for components within macro-components Compute the failure sets of each macro-component
27 Generate input for the SMPC SSUs pad the fault tree in order to avoid leaking structural informatoin such as the size of the cloud infrastructure Add dummy nodes with zero ID into each topology path Add zero paths into the fault tree with randomly assigned types Zero ID nodes do not affect the result
28 Identify common dependencies SSUs and P-SRA Host cooperate to identify common dependency doing multiple (privacy-preserving) set intersections, followed by one (privacy-preserving) union Strict security requires doing it without conditional statements Transfer conditional statements into arithmetic computation
29 Identify common dependencies
30 Privacy Preserving Fault Tree Analysis: Calculate failure sets Minimal FSes algorithm Find minimal FSes Exponential complexity Heuristic failure-sampling algorithm Faster Not necessarily the minimal FSes
31 Minimal FSes Algorithm The algorithm traverses the Fault Tree Basic events generate FSes containing only themselves, while non-basic events produce FSes based on the FSes of their child events and their gate types. For an OR gate, any FS of one of the input nodes is an FS of the OR. For an AND gate, take cartesian product of the sets of FSes of the input nodes then combine each element of the cartesian product into a single FS by taking a union.
32 Minimal FSes Algorithm: Example Cloud Service1 (Power1, Router1 Router2) Power 1 (Router1 Router2) Router 1 Router 2
33 Minimal FSes Algorithm
34 Failure Sampling Algorithm Randomly assigns fail or no fail to the basic events of the Fault Tree Compute whether the top event fails If the top event fails, the failed basic events consist of a FS
35 Failure Sampling Algorithm: Example Cloud Service1 (Power1Router1) is a failure set, but not minimal Power 1 Router 1 Router 2
36 Privacy-preserving Output Delivery Output for Cloud-Service Providers Common dependency Partial failure sets Output for Cloud-Service Users Common-dependency ratio Overall failure probabilities of cloud services Top-ranked failure sets
37 Implementation Sharemind SecreC C-like SMPC programming language Specialized assembly to execute the code Cloud Provider Coordination DAU LEU SSU P-SRA Client C++ Controller SecreC Script Result SMPC Module P-SRA Host
38 Simulation: SMPC
39 Simulation: Local Execution
40 Conclusion We designed P-SRA, a private, structural-reliability auditor for cloud services based on SMPC, and prototyped it using the Sharemind SecreC platform We explored the use of data partitioning and subgraph abstraction SMPC on large graphs, with promising results. Our preliminary experiments indicate that P-SRA could be a practical, off-line service, at least for small-scale cloud services or for ones that permit significant subgraph abstraction.
41
Estimating Software Reliability In the Absence of Data
Estimating Software Reliability In the Absence of Data Joanne Bechta Dugan ([email protected]) Ganesh J. Pai ([email protected]) Department of ECE University of Virginia, Charlottesville, VA NASA OSMA SAS
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
How To Write A Privacy Preserving Firewall Optimization Protocol
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems Melanie Berg 1, Kenneth LaBel 2 1.AS&D in support of NASA/GSFC [email protected] 2. NASA/GSFC [email protected]
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Accountability in Cloud Computing and Distributed Computer Systems
Abstract Accountability in Cloud Computing and Distributed Computer Systems Hongda Xiao 2014 Traditionally, research in computer security has focused on preventive techniques such as passwords, authentication
Methods for Firewall Policy Detection and Prevention
Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)
Automatic Configuration Generation for Service High Availability with Load Balancing
Automatic Configuration Generation for Service High Availability with Load Balancing A. Kanso 1, F. Khendek 1, M. Toeroe 2, A. Hamou-Lhadj 1 1 Electrical and Computer Engineering Department, Concordia
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
TORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
The Information Leak Detection & Prevention Guide
The Information Leak Detection & Prevention Guide Essential Requirements for a Comprehensive Data Leak Prevention System April 2007 GTB Technologies 4685 MacArthur Court Newport Beach, CA 92660 WWW.GTTB.COM
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin [email protected] 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
Privacy-Preserving Public Auditing for Secure Cloud Storage
Privacy-Preserving Public Auditing for Secure Cloud Storage Prof. N.L. Chourasiya, Dayanand Lature, Arun Kumavat, Vipul Kalaskar, Sanket Thaware. [email protected] Contact no: 9970131164 Abstract The
Security for Ubiquitous and Adhoc Networks
Security for Ubiquitous and Adhoc Networks Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate
WORKFLOW ENGINE FOR CLOUDS
WORKFLOW ENGINE FOR CLOUDS By SURAJ PANDEY, DILEBAN KARUNAMOORTHY, and RAJKUMAR BUYYA Prepared by: Dr. Faramarz Safi Islamic Azad University, Najafabad Branch, Esfahan, Iran. Workflow Engine for clouds
Smart grid security analysis
Smart grid security analysis Paul Smith et al. [email protected] SPARKS Stakeholder Workshop 20 th May, 2014, Graz SPARKS Objectives The SPARKS project has three main objectives regarding security analysis:
OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement
OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement Clinton Mikel The Health Law Partners, P.C. Alessandra Swanson U.S. Department of Health and Human Services - Office for Civil Rights Disclosure
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology
Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG Cloudy with Showers of Business Opportunities and a Good Chance of
A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)
A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department
Network analysis and dimensioning course project
Network analysis and dimensioning course project Alexander Pyattaev March 10, 2014 Email: [email protected] 1 Project description Your task in this project is to be a network architect. You will
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Ayla Networks, Inc. SOC 3 SysTrust 2015
Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Risk Mitigation Strategies for Critical Infrastructures Based on Graph Centrality Analysis
Risk Mitigation Strategies for Critical Infrastructures Based on Graph Centrality Analysis George Stergiopoulos a, Panayiotis Kotzanikolaou b, Marianthi Theocharidou c, Dimitris Gritzalis a, a Information
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
A Study on Security and Privacy in Big Data Processing
A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Sanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Network Topology. White Paper
White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,
Backbone Capacity Planning Methodology and Process
Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Security related to the information designing or even media editing. This enables users
A Potential Cloud Service by Auditing Cloud MalaimariSuganya.P 1, Padma Priya.R 2 1 Department of Computer Science and Information Technology Nadar Saraswathi College of Arts and Science, Theni dt-625531,
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases
A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases Gerardo Canfora Bice Cavallo University of Sannio, Benevento, Italy, {gerardo.canfora,bice.cavallo}@unisannio.it ABSTRACT In
Secure Data Migration across Cloud System Using Third Party Auditor (TPA)
Secure Data Migration across Cloud System Using Third Party Auditor (TPA) Shyamli Dewan 1, Devendra Kumar 2, Sandeep Gonnade 3 M.Tech. Scholar, School of Engineering & IT, MATS University, Raipur, Chhattisgarh,
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Cisco Disaster Recovery: Best Practices White Paper
Table of Contents Disaster Recovery: Best Practices White Paper...1 Introduction...1 Performance Indicators for Disaster Recovery...1 High Level Process Flow for Disaster Recovery...2 Management Awareness...2
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Violin: A Framework for Extensible Block-level Storage
Violin: A Framework for Extensible Block-level Storage Michail Flouris Dept. of Computer Science, University of Toronto, Canada [email protected] Angelos Bilas ICS-FORTH & University of Crete, Greece
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Components of Routing Table Growth
Components of Routing Table Growth Harsha Narayan (U. of California, San Diego) Joint work with Ramesh Govindan (U. of Southern California) and George Varghese (U. of California, San Diego) 1 The Goal
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process Chapter 12 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-1 Learning Objective 1 Describe how IT improves internal
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
