دانلود مقاله ISI انگلیسی شماره 21948
عنوان فارسی مقاله

معماری سیستم امن برای نواحی وسیع مدار بسته با استفاده از چارچوب امنیت، اعتماد و حفظ حریم خصوصی (شرایط استاندارد)

کد مقاله سال انتشار مقاله انگلیسی ترجمه فارسی تعداد کلمات
21948 2012 6 صفحه PDF سفارش دهید محاسبه نشده
خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.
عنوان انگلیسی
Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Procedia Engineering, Volume 41, 2012, Pages 480–485

کلمات کلیدی
محاسبات قابل اعتماد - دوربین مداربسته - ضربان قلب - امنیت - اعتماد - حریم خصوصی - گواهی - سیستم امن - سنسور - چراغ دریایی - انرژی - برق - شرایط استاندارد - نگهداری فنی با بهره وری كامل - دستگاه خودپرداز -
پیش نمایش مقاله
پیش نمایش مقاله معماری سیستم امن برای نواحی وسیع مدار بسته با استفاده از چارچوب امنیت، اعتماد و حفظ حریم خصوصی (شرایط استاندارد)

چکیده انگلیسی

Mobile computing emerged in the market for the past few years to provide solution for various platforms that range from smart phone, tablet, laptop, desktop computer, server to virtual computing systems such as cloud computing. The design approach and development of solutions for mobile computing continues to evolve in fulfilling the needs of diverse applications that run on various platforms. Recently, a new framework was introduced to provide a unified approach to resolve Security, Trust and Privacy (STP) enhancement on these platforms. This new framework emerged to enable a better way of dealing with security, trust and privacy conflicting aspects in pervasive environment such as mobile computing. This framework will be useful for system architects, engineers, designers and developers that are still struggling to create a secure, trustworthy, and privacy preserved environment to create confidence amongst users to do business transactions and collaborations especially in a more challenging environment such as cloud computing. In this paper, we discuss and propose new Secure System Architecture for strengthening surveillance activities in Wide Area using a combination of Trusted Computing (TC) via mutual attestation process to ensure integrity of components of the system, and Surveillance System. We further propose using Intel AMT chip that will generate a heartbeat pulse and transmit the signal through network interface to detect any possible physical intrusion. A failure to provide this pulse within a given time frame will trigger an action by the trusted security system for further analysis such as thievery detection.

مقدمه انگلیسی

This paper intends to propose new security system architecture using the concept of a unified security, trust and privacy (STP) framework for surveillance activities in cloud computing. In this proposal, we propose to merge Trusted Computing security model with a hardware based system such as Intel AMT, surveillance system. The strength of this paper is that it integrates the unified STP framework with existing cloud computing infrastructure which will hopefully help to reduce cost without compromising the security, trust and privacy elements.

نتیجه گیری انگلیسی

In this paper, we have discussed and proposed new Secure System Architecture for strengthening surveillance activities in Wide Area using a combination of Trusted Computing (TC) via mutual attestation process to ensure integrity of components of the system, and Surveillance System. The proposed Secure System Architecture specifically uses AMT chip that will generate a heartbeat pulse and transmit this signal through network interface. Non-existence of a pulse within a given time frame will trigger an action by TCC for further investigation such as thievery detection and arrestment actions. The proposed system architecture for wide area surveillance will fit into the STP framework. We hope that the proposal will help create a secure, trustworthy, and privacy preserved environment for us to do business, transactions and collaborations. For our next step is to use modelling and formal verification of the case study.

خرید مقاله
پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.