A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures

نویسندگان

  • Raquel L. Hill
  • Jalal Al-Muhtadi
  • Roy H. Campbell
  • Apu Kapadia
  • Prasad Naldurg
  • Anand Ranganathan
چکیده

Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, processors, and devices with mechanisms, protocols and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems, which are isolated from the public Internet, and are context insensitive. This leads to multiple subsystems that are incompatible and incapable of interoperating, thus making operations, management, and trust difficult. In this paper, we propose Hestia: Heterogeneous Survivable Trusted Information-assurance Architecture and describe how it addresses the problem of securing critical information services in largescale ubiquitous computing environments. Hestia is a novel programmable middleware solution, implemented as a network of Middleboxes. These Middleboxes form protective layers that isolate critical cyber-infrastructure services and mediate authorized access to the services in our system. The Middleboxes provide a programmable distributed object-oriented framework that enables us to integrate security, privacy, and reliability mechanisms into service access interfaces and implementations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Supporting Context-Awareness: A Taxonomic Review

Context-aware applications realise the vision of ubiquitous computing by utilising information gathered from their environment to automatically adapt behaviour. To support the development of such applications, researchers have developed infrastructures, architectures, middlewares, and toolkits. This paper presents a taxonomy based on a review of these support infrastructures for context-aware c...

متن کامل

A Methodology for Designing Resilient and Smart Critical Infrastructures

Critical infrastructures are rapidly converging toward digital technologies in order to provide advanced information services, efficient management, and resource utilization. This has led to the proliferation of ubiquitous connectivity to critical infrastructures (electrical grid, utility networks, finance, etc.) that are connecting homes, businesses, and government resources. This will drive t...

متن کامل

Automatic Resource Scaling for Medical Cyber-Physical Systems Running in Private Cloud Computing Architecture

Cloud computing and its related virtualization technologies have become one of dominant trends to deploy software, compute difficult problems, store different types of data, and stream realtime video and audio. Due to its benefits from cost-efficiency and scalability to maintain server solutions, many organizations are migrating their server applications running on physical servers to virtual s...

متن کامل

Context-Awareness for Physical Service Environments

Over the next few years, mobile computing, sensing technologies, and distributed middleware will combine to create a new generation of adaptive, context-aware services. Context sensing infrastructures will be deployed in Physical Service Environments such as airports, conference centers, government agencies, and services. These infrastructures will use the wealth of information generated by sen...

متن کامل

SCADA Cyber Attacks and Security Vulnerabilities: Review

SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Distributed Systems Online

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2004