Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 2012 2012 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0
Now showing 1 - 10 of 29
  • Publication
    A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology
    (2015)
    Hudic, A. 
    ;
    ;
    Loruenser, T. 
    ;
    Krotsiani, M. 
    ;
    Spanoudakis, G. 
    ;
    Mauthe, A. 
    ;
    Weippl, E. 
    Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.
      153Scopus© Citations 8
  • Publication
    Generic Autonomic Management as a Service in a SOA-based Framework for Industry 4.0
    (IEEE, 2019-10) ; ;
    Delsing, Jerker 
    Cyber-physical production systems are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. In order to make these systems interoperable with each other for addressing Industry 4.0 applications a number of service-oriented architecture frameworks are developed. Such frameworks are composed by a number of services, which are inherently dynamic by nature and thus imply the need for self-adaptation. In this paper we propose generic autonomic management as a service and show how it can be integrated in the Arrowhead framework. We propose generic and reusable interfaces for each phase of the autonomic control loop in order to increase the usability of the service for other frameworks and application systems, while reducing the software engineering effort. To show the utility of our approach in the Arrowhead framework we use a climate control application as a representative example.
      424Scopus© Citations 10
  • Publication
    Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
    (IEEE, 2019-02) ; ;
    Settanni, Giuseppe 
    ;
    ;
    Delsing, Jerker 
    Manufacturing enterprises are constantly exploring new ways to improve their own production processes to address the increasing demand of customized production. However, such enterprises show a low degree of flexibility, which mainly results from the need to configure new production equipment at design and run time. In this paper we propose self-adaptation as an approach to improve data transmission flexibility in Industry 4.0 environments. We implement an autonomic manager using a generic autonomic management framework, which applies the most appropriate data transmission configuration based on security and business process related requirements, such as performance. The experimental evaluation is carried out in a MQTT infrastructure and the results show that using self-adaptation can significantly improve the trade-off between security and performance. We then propose to integrate anomaly detection methods as a solution to support self-adaptation by monitoring and learning the normal behavior of an industrial system and show how this can be used by the generic autonomic management framework.
      471Scopus© Citations 4
  • Publication
    Security Vulnerabilities And Risks In Industrial Usage Of Wireless Communication
    (2014-09-16)
    Plosz, S. 
    ;
    Lesjak, C. 
    ;
    Pereira, N. 
    ;
    ;
    Ruprechter, T. 
    Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
      135Scopus© Citations 24
  • Publication
    Trustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.
    (2014)
    Florian, M. 
    ;
    Paudel, S. 
    ;
    Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.
      92Scopus© Citations 6
  • Publication
    Towards continuous Cloud Service Assurance for Critical Infrastructure IT
    (2014-08-27)
    Hudic, A. 
    ;
    Mauthe, A. 
    ;
    Caceres, S. 
    ;
    Hecht, T. 
    ;
    The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.
      119Scopus© Citations 8
  • Publication
    The Effect of the 802.11 Power Save Mechanism (PSM) on Energy Efficiency and Performance During System Activity
    (2012) ;
    Bhatti, S. N. 
    802.11 WLAN is a popular choice for wireless access on a range of ICT devices. A growing concern is the increased energy usage of ICT, for reasons of cost and environmental protection. The Power Save Mode (PSM) in 802.11 deactivates the wireless network interface during periods of inactivity. However, applications increasingly use push models, and so devices may be active much of the time. We have investigated the effectiveness of PSM, and considered its impact on performance when a device is active. Rather than concentrate on the NIC, we have taken a system-wide approach, to gauge the impact of the PSM from an application perspective. We experimentally evaluated performance at the packet level and system-wide power usage under various offered loads, controlled by packet size and data rate, on our 802.11n test bed. We have measured the system-wide power consumption corresponding to the individual traffic profiles and have derived application-specific effective energy-usage. We have found that in our scenarios, no significant benefit can be gained from using PSM.
      105Scopus© Citations 34
  • Publication
    A Self-Organising Approach for Smart Meter Communication Systems
    (2014) ;
    Skopik, F. 
    ;
    Hutchison, D. 
    ;
    Bleier, T. 
      147Scopus© Citations 1