A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
نویسندگان
چکیده
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. In this paper we address securing cyber infrastructures for ubiquitous computing environments, like smart buildings and campuses. Our emphasis here is to construct a middleware-based critical cyber infrastructure (CCI) that encompasses heterogeneous components and binds networks, processors, and devices with mechanisms, protocols and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems, which are isolated from the public Internet, and are context insensitive. This leads to multiple subsystems that are incompatible and incapable of interoperating, thus making operations, management, and trust difficult. In this paper, we propose Hestia: Heterogeneous Survivable Trusted Information-assurance Architecture and describe how it addresses the problem of securing critical information services in largescale ubiquitous computing environments. Hestia is a novel programmable middleware solution, implemented as a network of Middleboxes. These Middleboxes form protective layers that isolate critical cyber-infrastructure services and mediate authorized access to the services in our system. The Middleboxes provide a programmable distributed object-oriented framework that enables us to integrate security, privacy, and reliability mechanisms into service access interfaces and implementations.
منابع مشابه
Supporting Context-Awareness: A Taxonomic Review
Context-aware applications realise the vision of ubiquitous computing by utilising information gathered from their environment to automatically adapt behaviour. To support the development of such applications, researchers have developed infrastructures, architectures, middlewares, and toolkits. This paper presents a taxonomy based on a review of these support infrastructures for context-aware c...
متن کاملA Methodology for Designing Resilient and Smart Critical Infrastructures
Critical infrastructures are rapidly converging toward digital technologies in order to provide advanced information services, efficient management, and resource utilization. This has led to the proliferation of ubiquitous connectivity to critical infrastructures (electrical grid, utility networks, finance, etc.) that are connecting homes, businesses, and government resources. This will drive t...
متن کاملAutomatic Resource Scaling for Medical Cyber-Physical Systems Running in Private Cloud Computing Architecture
Cloud computing and its related virtualization technologies have become one of dominant trends to deploy software, compute difficult problems, store different types of data, and stream realtime video and audio. Due to its benefits from cost-efficiency and scalability to maintain server solutions, many organizations are migrating their server applications running on physical servers to virtual s...
متن کاملContext-Awareness for Physical Service Environments
Over the next few years, mobile computing, sensing technologies, and distributed middleware will combine to create a new generation of adaptive, context-aware services. Context sensing infrastructures will be deployed in Physical Service Environments such as airports, conference centers, government agencies, and services. These infrastructures will use the wealth of information generated by sen...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Distributed Systems Online
دوره 5 شماره
صفحات -
تاریخ انتشار 2004