SecFuNet: Security for Future Networks
From Navigators
(One intermediate revision not shown) | |||
Line 5: | Line 5: | ||
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT) | |ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT) | ||
|Url=http://www.secfunet.eu/ | |Url=http://www.secfunet.eu/ | ||
- | |Researchers=Paulo Verissimo, Alysson Bessani, Diego Kreutz, Oleksandr Malichevskyy, Nuno Ferreira Neves, | + | |Sponsor=FP7-ICT-2011-EU-Brazil |
+ | |Project Number=288349 | ||
+ | |Coordinator=Université Pierre et Marie Curie -LIP6 | ||
+ | |Partners=Several European and Brazilian organizations | ||
+ | |month=may | ||
+ | |year=2011 | ||
+ | |Duration months=36 | ||
+ | |Summary===Summary== | ||
+ | |||
+ | The future Internet will rely on virtualization and cloud networking, and one of the main challenges is to achieve highly secure virtual networks and cloud accesses. The main problems addressed by this project are secure identification, secure authentication, secure data transfer, secure virtualized infrastructure, and privacy in virtual networks and clouds, exploring techniques such as the usage of microcontrollers, resource management, intrusion tolerant algorithms, and cryptographic protocols. The goal of the SecFuNet project is to design and develop a coherent security architecture for virtual networks and cloud | ||
+ | accesses. This architecture must allow the management of security with respect to communications for all machines connected to a public cloud using virtual networks. Hence, we need a coherent and robust identification scheme as well as a strong authentication system. Algorithms robust to intrusions are also needed for creating a secure environment. Besides, the proposed architecture must guarantee security in the virtualized infrastructure, through isolation of virtual networks and access control for users and | ||
+ | managers. These aspects must not compromise users’ privacy. Moreover, it is necessary to bring an ergonomic security scheme that is acceptable for all users, even those unknowledgeable in computer science. Finally, the proposed scheme must take into account the heterogeneity of equipment (wireless and wired) to preserve interoperability. | ||
+ | |Researchers=Paulo Verissimo, Alysson Bessani, Diego Kreutz, Oleksandr Malichevskyy, Nuno Ferreira Neves, | ||
}} | }} |
Latest revision as of 16:02, 16 December 2014
- Research Line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT)
- Sponsor: FP7-ICT-2011-EU-Brazil
- Project Number: 288349
- Coordinator: Université Pierre et Marie Curie -LIP6
- Partners: Several European and Brazilian organizations
- Start Date: May 2011
- Duration: 36 months
- Team at FCUL: Researchers including Paulo Verissimo, Alysson Bessani, Diego Kreutz, Oleksandr Malichevskyy, Nuno Ferreira Neves
Summary
The future Internet will rely on virtualization and cloud networking, and one of the main challenges is to achieve highly secure virtual networks and cloud accesses. The main problems addressed by this project are secure identification, secure authentication, secure data transfer, secure virtualized infrastructure, and privacy in virtual networks and clouds, exploring techniques such as the usage of microcontrollers, resource management, intrusion tolerant algorithms, and cryptographic protocols. The goal of the SecFuNet project is to design and develop a coherent security architecture for virtual networks and cloud accesses. This architecture must allow the management of security with respect to communications for all machines connected to a public cloud using virtual networks. Hence, we need a coherent and robust identification scheme as well as a strong authentication system. Algorithms robust to intrusions are also needed for creating a secure environment. Besides, the proposed architecture must guarantee security in the virtualized infrastructure, through isolation of virtual networks and access control for users and managers. These aspects must not compromise users’ privacy. Moreover, it is necessary to bring an ergonomic security scheme that is acceptable for all users, even those unknowledgeable in computer science. Finally, the proposed scheme must take into account the heterogeneity of equipment (wireless and wired) to preserve interoperability.
Publications
- Diego Kreutz, Alysson Bessani, Eduardo Feitosa, Hugo Cunha, “Towards Secure and Dependable Authentication and Authorization Infrastructures”, in Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Singapore, Nov. 2014.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Anchors of Trust for Autonomic and Secure Configuration and Assessment in SDN”, in Fast Abstract at the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, USA, Jun. 2014.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, Aug. 2013.
- Oleksandr Malichevskyy, “Resilient Authentication Service”, Master’s thesis, Faculty of Sciences, University of Lisbon, Jan. 2013.
BibTeX
Navigators - SecFuNet projectCurrent projects: | VEDLIoT, SATO, ADMORPH, SEAL, AQUAMON, UPVN, REDBOOK, ThreatAdapt, SEL, Xivt |
---|---|
Past projects: | TCLOUDS, MASSIF, MAFTIA, RESIST NoE, DiSIEM, KARYON, HIDENETS, CORTEX, CRUTIAL, TRONE, SITAN, ReD, IRCoC, DIVERSE, CloudFIT, READAPT, REGENESYS, RC-Clouds, TACID, DARIO, RITAS, AJECT, MICRA, DEAR-COTS, COPE, DEFEATS, MOOSCO, TOPCOM, RE:DY, NORTH, Abyss, SUPERCLOUD, COST Action IC1402, SEGRID, BioBankCloud, PROPHECY, SAPIENT, SecFuNet, FTH-Grid, AIR-II, AIR, ESFORS, CaberNet, GODC, BROADCAST, CoDiCom, Delta-4, RAPTOR |