Security Issues in ProtoGENI
نویسندگان
چکیده
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test environment can mislead about security mechanism’s capabilities in a system. In this paper, existing ProtoGENI security mechanisms and functions are tested and analyzed through different experiments to find out the exploitable attacking loopholes. Experiments elaborate the existing functioning and security issues that can cause nonfunctional, semi non-functional or malfunctioned systems. Results indicate threats to ProtoGENI resources and run-time interactions. Cross-experiment communication in Emulab wireless nodes have the capability of assisting in verifying isolation between ProtoGENI slices. Host security is one of the security components, which can be enhanced by modifying default security settings including SSH port number and root login rights. Documentation of experiment environment, experiment design, results, and analysis including many observations is helpful to understand the basic functioning and security issues to improve the overall functioning and security of ProtoGENI.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Comparative Study of Security Council's Dual Standards toward Recent Developments in Libya and Bahrain
With international peace and security covering a broader concept and restriction of governments' authority, issues such as human rights have become intertwined with international peace and security and are no longer an internal issue of governments. It is such that international society may react toward it and make some decisions. What seems important is how Security Council deals with such iss...
متن کاملTrade and National Security: A Test for Best-Known Hypothesis
National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...
متن کاملOn Interconnecting GpENI with MAX: A Report
GpENI needs the capability of creating dynamic virtual circuits from any of the participating GpENI universities to the MAX network. In this document we investigate the changes needed in the GpENI infrastructure to establish a dynamic circuit connection to MAX. The current infrastructure of GpENI has already been described in the previous 2 deliverables [6] [7]. We discuss 3 options to connect ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EAI Endorsed Trans. Indust. Netw. & Intellig. Syst.
دوره 3 شماره
صفحات -
تاریخ انتشار 2016