Cybersecurity and High-Performance Computing Environments

Cybersecurity and High-Performance Computing Environments PDF Author: Kuan-Ching Li
Publisher: CRC Press
ISBN: 1000553698
Category : Computers
Languages : en
Pages : 307

Get Book

Book Description
In this fast-paced global economy, academia and industry must innovate to evolve and succeed. Today’s researchers and industry experts are seeking transformative technologies to meet the challenges of tomorrow. Cutting-edge technological advances in cybersecurity solutions aid in enabling the security of complex heterogeneous high-performance computing (HPC) environments. On the other hand, HPC facilitates powerful and intelligent innovative models for reducing time to response to identify and resolve a multitude of potential, newly emerging cyberattacks. Cybersecurity and High-Performance Computing Environments provides a collection of the current and emergent research innovations, practices, and applications focusing on the interdependence of cybersecurity and HPC domains for discovering and resolving new emerging cyber-threats. KEY FEATURES Represents a substantial research contribution to the state-of-the-art solutions for addressing the threats to confidentiality, integrity, and availability (CIA triad) in HPC environments Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent, multifaceted, anomalous, and malicious characteristics The content will help university students, researchers, and professionals understand how HPC research fits broader cybersecurity objectives and vice versa.

Advances in Cyber Security and Intelligent Analytics

Advances in Cyber Security and Intelligent Analytics PDF Author: Abhishek Verma
Publisher:
ISBN: 9781032216010
Category : Computer networks
Languages : en
Pages : 0

Get Book

Book Description
"We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include Cloud Computing, Fog Computing, and Edge Computing which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models, IoT, SDN, and ICN, to support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, the book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc"--

Secure Cloud Computing

Secure Cloud Computing PDF Author: Sushil Jajodia
Publisher: Springer Science & Business Media
ISBN: 1461492785
Category : Computers
Languages : en
Pages : 343

Get Book

Book Description
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Information Technology - New Generations

Information Technology - New Generations PDF Author: Shahram Latifi
Publisher: Springer
ISBN: 3319770284
Category : Computers
Languages : en
Pages : 818

Get Book

Book Description
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.

Contemporary High Performance Computing

Contemporary High Performance Computing PDF Author: Jeffrey S. Vetter
Publisher: CRC Press
ISBN: 1498700632
Category : Computers
Languages : en
Pages : 255

Get Book

Book Description
HPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles. This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics Examines the data center/facility as well as system statistics Featuring pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.

Proceedings of International Symposium on Sensor Networks, Systems and Security

Proceedings of International Symposium on Sensor Networks, Systems and Security PDF Author: Nageswara S.V. Rao
Publisher: Springer
ISBN: 3319756834
Category : Technology & Engineering
Languages : en
Pages : 309

Get Book

Book Description
This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is currently feasible. Readers are also given a vision of what these technologies can be expected to produce in the near future. The topics are covered comprehensively by experts in respective areas. Each section includes an overview that puts the research topics in perspective and integrates the sections into an overview of how technology is evolving. The book represents the proceedings of the International Symposium on Sensor Networks, Systems and Security, August 31 – September 2, 2017, Lakeland Florida.

Security for Containers and Kubernetes

Security for Containers and Kubernetes PDF Author: Luigi Aversa
Publisher: BPB Publications
ISBN: 9355518439
Category : Computers
Languages : en
Pages : 425

Get Book

Book Description
A practical guide to hardening containers and securing Kubernetes deployments KEY FEATURES ● Learn how to develop a comprehensive security strategy for container platforms. ● Deep dive into best practices for application security in container environments. ● Design a logical framework for security hardening and orchestration in Kubernetes clusters. DESCRIPTION Security for Containers and Kubernetes provides you with a framework to follow numerous hands-on strategies for measuring, analyzing, and preventing threats and vulnerabilities in continuous integration and continuous delivery pipelines, pods, containers, and Kubernetes clusters. The book brings together various solutions that can empower agile teams to proactively monitor, safeguard, and counteract attacks, vulnerabilities, and misconfigurations across the entire DevOps process. These solutions encompass critical tasks such as reviewing and protecting pods, container clusters, container runtime, authorization policies, addressing container security issues, ensuring secure deployment and migration, and fortifying continuous integration and continuous delivery workflows. Furthermore, the book helps you in developing a robust container security strategy and provides guidance on conducting Kubernetes environment testing. It concludes by covering the advantages of service mesh, DevSecOps methodologies, and expert advice for mitigating misconfiguration during the implementation of containerization and Kubernetes. By the end of the book, you will have the knowledge and expertise to strengthen the overall security of your container-based applications. WHAT YOU WILL LEARN ● Understand the risks concerning the container and orchestrator infrastructure. ● Learn how to secure the container stack, the container image process and container registries. ● Learn how to harden your Kubernetes cluster. ● Deep dive into Kubernetes cloud security methodologies. ● Explore the security nature of the cluster orchestration and governance. WHO THIS BOOK IS FOR This book is for security practitioners, security analysts, DevOps engineers, cloud engineers, cloud architects, and individuals involved in containerization and Kubernetes deployment. TABLE OF CONTENTS 1. Containers and Kubernetes Risk Analysis 2. Hardware and Host OS Security 3. Container Stack Security 4. Securing Container Images and Registries 5. Application Container Security 6. Secure Container Monitoring 7. Kubernetes Hardening 8. Kubernetes Orchestration Security 9. Kubernetes Governance 10. Kubernetes Cloud Security 11. Helm Chart Security 12. Service Mesh Security

Adaptive Security and Cyber Assurance for Risk-Based Decision Making

Adaptive Security and Cyber Assurance for Risk-Based Decision Making PDF Author: Brooks, Tyson T.
Publisher: IGI Global
ISBN: 1668477688
Category : Computers
Languages : en
Pages : 256

Get Book

Book Description
Cyber-professionals recognize that some defensive measures could exacerbate cyber-defense challenges by motivating attackers to adapt—unintentionally inspiring attackers to develop more potent and resilient capabilities. Further study in this area is required to ensure defense and security practices are up to date. Adaptive Security and Cyber Assurance for Risk-Based Decision Making explores decision making in the context of software-based systems and discusses why it is difficult to achieve. It also identifies a discipline termed cyber-assurance, which considers the interactions of assurance-enhancing technology, system architecture, and the development life cycle. Covering key topics such as cyber assurance, security, and defensive operations, this premier reference source is ideal for industry professionals, computer scientists, academicians, engineers, researchers, scholars, practitioners, librarians, instructors, and students.

High-Performance Computing Applications in Numerical Simulation and Edge Computing

High-Performance Computing Applications in Numerical Simulation and Edge Computing PDF Author: Changjun Hu
Publisher: Springer Nature
ISBN: 9813299878
Category : Computers
Languages : en
Pages : 247

Get Book

Book Description
This book constitutes the referred proceedings of two workshops held at the 32nd ACM International Conference on Supercomputing, ACM ICS 2018, in Beijing, China, in June 2018. This volume presents the papers that have been accepted for the following workshops: Second International Workshop on High Performance Computing for Advanced Modeling and Simulation in Nuclear Energy and Environmental Science, HPCMS 2018, and First International Workshop on HPC Supported Data Analytics for Edge Computing, HiDEC 2018. The 20 full papers presented during HPCMS 2018 and HiDEC 2018 were carefully reviewed and selected from numerous submissions. The papers reflect such topics as computing methodologies; parallel algorithms; simulation types and techniques; machine learning.

Multi-domain Access Control and Trust

Multi-domain Access Control and Trust PDF Author: James Joshi
Publisher:
ISBN: 9781627051477
Category : Computers
Languages : en
Pages : 112

Get Book

Book Description