Secure Resilient Edge Cloud Designed Network
نویسندگان
چکیده
منابع مشابه
Secure and Resilient Routing: A Framework for Resilient Network Architectures
A common paradigm for a network service architecture is to provide a number of different services or applications in which all of them share resources; the routing framework provides the best path to all services. A simple twist to this basic notion is if we were to architect in a way to virtualize the network so that different services are clustered into different virtual, adaptive partitions ...
متن کاملSafe and Secure Execution at the Network Edge: A Framework for Coordinating Cloud, Fog, and Edge
System design where cyber-physical applications are securely coordinated from the cloud may simplify the development process. However, all private data are then pushed to these remote ‘swamps’, and human users lose the actual control as compared to when the applications are executed directly on their devices. At the same time, computing at the network edge is still lacking support for such stra...
متن کاملSecure and Resilient Cloud Computing for the Department of Defense
Imagine a military commander who urgently needs a specialized computing capability to analyze new intelligence, surveillance , and reconnaissance (ISR) data and integrate those data with existing ISR information. The commander directs his information technology (IT) staff and developers to design this capability. The staff quickly provision computing hardware from a Department of Defense (DoD) ...
متن کاملSecure Network Solutions for Enterprise Cloud Services
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...
متن کاملIntrusion-Resilient Secure Channels
We propose a new secure communication primitive called an Intrusion-Resilient Channel (IRC) that limits the damage resulting from key exposures and facilitates recovery. We define security against passive but mobile and highly adaptive adversaries capable of exposing even expired past secrets. We describe an intuitive channel construction using (as a black box) existing public key cryptosystems...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Communications
سال: 2020
ISSN: 0916-8516,1745-1345
DOI: 10.1587/transcom.2019nri0002