Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    A framework for intrusion tolerance in cloud computing
    (2011) Karande, V.M.; Pais, A.R.
    Cloud Computing has been envisioned as the next generation architecture and one of the fastest growing segments of the IT enterprises. No matter how much investment is made in cloud intrusion detection and prevention, cloud infrastructure remains vulnerable to attacks. Intrusion Tolerance in Cloud Computing is a fault tolerant design approach to defend cloud infrastructure against malicious attacks. Thus to ensure dependability we present a framework by mapping available Malicious and Accidental Fault Tolerance for Internet Applications (MAFTIA) intrusion tolerance framework for dependencies such as availability, authenticity, reliability, integrity, maintainability and safety against new Cloud Computing environment. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud environment. Performance analysis of the proposed framework is also done. © 2011 Springer-Verlag.
  • Item
    A Conceptual Framework for Intelligent Management of Workloads in Cloud Environment
    (Institute of Electrical and Electronics Engineers Inc., 2020) Shishira, S.R.; Kandasamy, A.
    Cloud computing is an important paradigm for processing, computation, storage, and network bandwidth. Workloads are the amount of data given to the hardware resource for processing. Its behavior and properties play a major role in the efficient scheduling of requests to given resources. Also, it is very difficult to predict workloads nature if they are changing excessively. To address this issue, we propose a conceptual framework which can be used for efficient prediction and optimization of workloads in a cloud environment. Classification of optimization metrics based on the provider and consumer constraints are presented. In addition to this, some of the research gaps found during the study has been highlighted and also provided possible solutions in the cloud research domain. © 2020 IEEE.
  • Item
    Human-in-the-Loop Control and Security for Intelligent Cyber-Physical Systems (CPSs) and IoT
    (Springer, 2023) Jena, S.; Sundarrajan, S.; Meena, A.; Chandavarkar, B.R.
    In this era of connectivity and digitization, our appliances and equipment are becoming more intelligent and interlinked, creating an Internet of Things (IoT) that can be used to support new kinds of intelligent cyber-physical systems (CPSs). With the massive growth of CPSs, humans have become more involved within this structure. These types of CPSs/IoT systems containing humans are called human-in-the-loop cyber-physical systems (HiTLCPSs)/human-in-the-loop Internet of Things (HiTLIoT). The involvement of humans results in an external and unpredictable element that increases security concerns. This chapter proposes a unique “human-centric†framework to mitigate these issues, enabling humans as crucial components to make the CPS/IoT systems more robust and secure. Through this, the chapter tries to focus on “humans are a solution†rather than “humans are a problem.†Furthermore, the chapter looks into various components that make up the framework, how they are interlinked and how security can be bolstered with a human in the loop combined with this framework. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.