To Örebro University

oru.seÖrebro universitets publikasjoner
Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 42) Visa alla publikasjoner
Mazzara, M., Dragoni, N., Bucchiarone, A., Giaretta, A., Larsen, S. T. & Dustdar, S. (2021). Microservices: Migration of a Mission Critical System. IEEE Transactions on Services Computing, 14(5), 1464-1477
Åpne denne publikasjonen i ny fane eller vindu >>Microservices: Migration of a Mission Critical System
Vise andre…
2021 (engelsk)Inngår i: IEEE Transactions on Services Computing, E-ISSN 1939-1374, Vol. 14, nr 5, s. 1464-1477Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

An increasing interest is growing around the idea of microservices and the promise of improving scalability when compared to monolithic systems. Several companies are evaluating pros and cons of a complex migration. In particular, financial institutions are positioned in a difficult situation due to the economic climate and the appearance of agile competitors that can navigate in a more flexible legal framework and started their business since day one with more agile architectures and without being bounded to outdated technological standard. In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture (MA) into a microservices architecture (MSA). The case study is based on the FX Core system, a mission critical system of Danske Bank, the largest bank in Denmark and one of the leading financial institutions in Northern Europe. The technical problem that has been addressed and solved in this paper is the identification of a repeatable migration process that can be used to convert a real world Monolithic architecture into a Microservices architecture in the specific setting of financial domain, typically characterized by legacy systems and batch-based processing on heterogeneous data sources.

sted, utgiver, år, opplag, sider
IEEE Press, 2021
Emneord
Scalability, Computer architecture, Service-oriented architecture, Tools, Mission critical systems, Automation, Service Computing, Software Architecture, Scalability, Microservices
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-71108 (URN)10.1109/TSC.2018.2889087 (DOI)000704110400016 ()2-s2.0-85059027049 (Scopus ID)
Tilgjengelig fra: 2019-01-26 Laget: 2019-01-26 Sist oppdatert: 2024-04-26bibliografisk kontrollert
Thomsen, M. D., Giaretta, A. & Dragoni, N. (2021). Smart Lamp or Security Camera? Automatic Identification of IoT Devices. In: Ghita, Bogdan; Shiaeles, Stavros (Ed.), Selected Papers from the 12th International Networking Conference: . Paper presented at 12th International Networking Conference (INC 2020), Rhodes, Greece, September 19-21, 2020 (Virtual Conference) (pp. 85-99). Springer International Publishing
Åpne denne publikasjonen i ny fane eller vindu >>Smart Lamp or Security Camera? Automatic Identification of IoT Devices
2021 (engelsk)Inngår i: Selected Papers from the 12th International Networking Conference / [ed] Ghita, Bogdan; Shiaeles, Stavros, Springer International Publishing , 2021, s. 85-99Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The tsunami of connectivity brought by the Internet of Things is rapidly revolutionising several sectors, ranging from industry and manufacturing, to home automation, healthcare and many more. When it comes to enforce security within an IoT network such as a smart home, there is a need to automatically recognise the type of each joining devices, in order to apply the right security policy. In this paper, we propose a method for identifying IoT devices’ types based on natural language processing (NLP), text classification, and web search engines. We implement a proof of concept and we test it against 33 different IoT devices. With a success rate of 88.9% for BACnet and 87.5% for MUD devices, our experiments show that we can efficiently and effectively identify different IoT devices.

sted, utgiver, år, opplag, sider
Springer International Publishing, 2021
Emneord
Internet of Things, Device identification, Profiling, Natural language processing, Text classification
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-88919 (URN)978-3-030-64757-5 (ISBN)978-3-030-64758-2 (ISBN)
Konferanse
12th International Networking Conference (INC 2020), Rhodes, Greece, September 19-21, 2020 (Virtual Conference)
Tilgjengelig fra: 2021-01-25 Laget: 2021-01-25 Sist oppdatert: 2021-02-04bibliografisk kontrollert
Tange, K., De Donno, M., Fafoutis, X. & Dragoni, N. (2020). A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Communications Surveys and Tutorials, 22(4), 2489-2520
Åpne denne publikasjonen i ny fane eller vindu >>A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
2020 (engelsk)Inngår i: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 22, nr 4, s. 2489-2520Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

sted, utgiver, år, opplag, sider
IEEE, 2020
Emneord
Internet of Things, Edge computing, Systematics, Tutorials, Industries, Access control, Industrial Internet of Things, cyber-security, security requirements, fog computing
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-88386 (URN)10.1109/COMST.2020.3011208 (DOI)000593999900013 ()2-s2.0-85091841797 (Scopus ID)
Merknad

Funding Agencies:

European Union (EU) 764785

Poul V. Andersen Fund 

Tilgjengelig fra: 2021-01-08 Laget: 2021-01-08 Sist oppdatert: 2024-04-05bibliografisk kontrollert
Herskind, L., Giaretta, A., De Donno, M. & Dragoni, N. (2020). BitFlow: Enabling Real‐time Cash‐flow Evaluations through Blockchain. Concurrency and Computation, 32(12), Article ID e5333.
Åpne denne publikasjonen i ny fane eller vindu >>BitFlow: Enabling Real‐time Cash‐flow Evaluations through Blockchain
2020 (engelsk)Inngår i: Concurrency and Computation, ISSN 1532-0626, E-ISSN 1532-0634, Vol. 32, nr 12, artikkel-id e5333Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Disbursement registration has always been a cumbersome, opaque, and inefficient process, up to the point that most businesses perform cash-flow evaluations only on a quarterly basis. We believe that automatic cash-flow evaluations can actively mitigate these issues. In this paper, we presentBitFlow, ablockchain-based architecture thatprovides complete cash-flow transparency and diminishes the probability of undetected frauds through the BitKrone, a non-volatile cryptocurrency that maps to the Danish Krone (DKK). We show that confidentiality can be effectively achieved on a permissionless blockchain using Zero-Knowledge proofs, ensuring verifiable transfers and automatic evaluations. Furthermore, we discuss several experiments to evaluate our proposal, in particular, the impact that confidential transactions have on the whole system, in terms of responsiveness and from an economical expenditure perspective.

sted, utgiver, år, opplag, sider
John Wiley & Sons, 2020
Emneord
BitFlow, blockchain, bulletproofs, cash-flow, Ethereum, zero-knowledge
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-78929 (URN)10.1002/cpe.5333 (DOI)000529224600008 ()2-s2.0-85066913820 (Scopus ID)
Tilgjengelig fra: 2020-01-09 Laget: 2020-01-09 Sist oppdatert: 2020-05-18bibliografisk kontrollert
Matthíasson, G., Giaretta, A. & Dragoni, N. (2020). IoT Device Profiling: From MUD Files to S×C Contracts. In: Roßnagel, H., Schunck, C. H., Mödersheim, S. & Hühnlein, D. (Ed.), Open Identity Summit 2020: . Paper presented at Open Identity Summit 2020 (OID2020) (pp. 143-154). Gesellschaft für Informatik e.V.
Åpne denne publikasjonen i ny fane eller vindu >>IoT Device Profiling: From MUD Files to S×C Contracts
2020 (engelsk)Inngår i: Open Identity Summit 2020 / [ed] Roßnagel, H., Schunck, C. H., Mödersheim, S. & Hühnlein, D., Gesellschaft für Informatik e.V. , 2020, s. 143-154Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Security is a serious, and often neglected, issue in the Internet of Things (IoT). In order to improve IoT security, researchers proposed to use Security-by-Contract (S×C), a paradigm originally designed for mobile application platforms. However, S×C assumes that manufacturers equip their devices with security contracts, which makes hard to integrate legacy devices with S×C. In this paper, we explore a method to extract S×C contracts from legacy devices’ Manufacturer Usage Descriptions (MUDs). We tested our solution on 28 different MUD files, and we show that it is possible to create basic S×C contracts, paving the way to complete extraction tools.

sted, utgiver, år, opplag, sider
Gesellschaft für Informatik e.V., 2020
Serie
Lecture Notes in Informatics, ISSN 1617-5468
Emneord
Internet of Things, S×C, Security-by-Contract, MUD, Manufacturer Usage Description, Device profiling
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-88920 (URN)10.18420/ois2020_12 (DOI)978-3-88579-699-2 (ISBN)
Konferanse
Open Identity Summit 2020 (OID2020)
Merknad

Due to COVID-19, OID 2020 is publication only.

Tilgjengelig fra: 2021-01-25 Laget: 2021-01-25 Sist oppdatert: 2021-02-02bibliografisk kontrollert
Sigurdsson, G., Giaretta, A. & Dragoni, N. (2020). Vulnerabilities and Security Breaches in Cryptocurrencies. In: Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G. (Ed.), Proceedings of 6th International Conference in Software Engineering for Defence Applications: . Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018. Springer
Åpne denne publikasjonen i ny fane eller vindu >>Vulnerabilities and Security Breaches in Cryptocurrencies
2020 (engelsk)Inngår i: Proceedings of 6th International Conference in Software Engineering for Defence Applications / [ed] Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G., Springer, 2020Konferansepaper, Publicerat paper (Fagfellevurdert)
sted, utgiver, år, opplag, sider
Springer, 2020
Serie
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 925
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-71864 (URN)978-3-030-14686-3 (ISBN)978-3-030-14687-0 (ISBN)
Konferanse
6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018
Tilgjengelig fra: 2019-01-28 Laget: 2019-01-28 Sist oppdatert: 2019-02-01bibliografisk kontrollert
De Donno, M., Felipe, J. M. & Dragoni, N. (2019). ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. In: 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings. Paper presented at 4th IEEE European Symposium on Security and Privacy Workshops (EUROS and PW 2019), Stockholm, Sweden, June 17-19, 2019 (pp. 11-20). IEEE
Åpne denne publikasjonen i ny fane eller vindu >>ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things
2019 (engelsk)Inngår i: 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings, IEEE , 2019, s. 11-20Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. However, the increasing adoption of IoT devices both in industries and personal environments has exposed businesses and consumers to a number of security threats, such as Distributed Denial of Service (DDoS) attacks. Along the way, Fog computing was born. A novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. In this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0). In particular, we discuss the design and implementation of the system, including possible models for deployment, security assumptions, interaction among system components, and possible modes of operation.

sted, utgiver, år, opplag, sider
IEEE, 2019
Emneord
Fog Computing, Internet of Things, Security, Distributed Denial of Service, Malware, Anti-Malware
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-76974 (URN)10.1109/EuroSPW.2019.00008 (DOI)000485315600002 ()2-s2.0-85071931412 (Scopus ID)9781728130262 (ISBN)
Konferanse
4th IEEE European Symposium on Security and Privacy Workshops (EUROS and PW 2019), Stockholm, Sweden, June 17-19, 2019
Tilgjengelig fra: 2019-10-03 Laget: 2019-10-03 Sist oppdatert: 2019-10-03bibliografisk kontrollert
De Donno, M. & Dragoni, N. (2019). Combining ANTIBIOTIC with Fog Computing: ANTIBIOTIC 2.0. In: 2019 IEEE 3rd International Conference on Fog and Edge Computing, ICFEC 2019 - Proceedings: . Paper presented at 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), Larnaca, Cyprus, May 14-17, 2019. IEEE
Åpne denne publikasjonen i ny fane eller vindu >>Combining ANTIBIOTIC with Fog Computing: ANTIBIOTIC 2.0
2019 (engelsk)Inngår i: 2019 IEEE 3rd International Conference on Fog and Edge Computing, ICFEC 2019 - Proceedings, IEEE , 2019Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. From the security perspective, the increasing adoption of IoT devices in all aspects of our society has exposed businesses and consumers to a number of threats, such as Distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we proposed ANTIBIOTIC 1.0 In However, this solution has some limitations that make it difficult (when not impossible) to be implemented in a legal and controlled manner. Along the way, Fog computing was born: a novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. As a result, in this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0). First, we present ANTIBIOTIC 1.0 and its main problem. Then, after introducing Fog computing, we present ANTIBIOTIC 2.0, showing how it overcomes the main issues of its predecessor by including Fog computing in its design.

sted, utgiver, år, opplag, sider
IEEE, 2019
Emneord
Fog Computing, Internet of Things, Security, Distributed Denial of Service, Malware, Anti-Malware
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-75969 (URN)10.1109/CFEC.2019.8733144 (DOI)000480444000001 ()2-s2.0-85068409281 (Scopus ID)978-1-7281-2365-3 (ISBN)
Konferanse
3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), Larnaca, Cyprus, May 14-17, 2019
Tilgjengelig fra: 2019-08-29 Laget: 2019-08-29 Sist oppdatert: 2019-08-29bibliografisk kontrollert
De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A. & Mazzara, M. (2019). Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet, 11(6), Article ID 127.
Åpne denne publikasjonen i ny fane eller vindu >>Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
Vise andre…
2019 (engelsk)Inngår i: Future Internet, E-ISSN 1999-5903, Vol. 11, nr 6, artikkel-id 127Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The Internet of Things (IoT) is rapidly changing our society to a world where every thing is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

sted, utgiver, år, opplag, sider
MDPI, 2019
Emneord
security, Internet of Things, Cloud computing
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-75237 (URN)10.3390/fi11060127 (DOI)000473805800007 ()2-s2.0-85067464961 (Scopus ID)
Tilgjengelig fra: 2019-07-25 Laget: 2019-07-25 Sist oppdatert: 2023-08-03bibliografisk kontrollert
De Donno, M., Tange, K. & Dragoni, N. (2019). Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog. IEEE Access, 7, 150936-150948
Åpne denne publikasjonen i ny fane eller vindu >>Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
2019 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 150936-150948Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In the last few years, Internet of Things, Cloud computing, Edge computing, and Fog computing have gained a lot of attention in both industry and academia. However, a clear and neat definition of these computing paradigms and their correlation is hard to find in the literature. This makes it difficult for researchers new to this area to get a concrete picture of these paradigms. This work tackles this deficiency, representing a helpful resource for those who will start next. First, we show the evolution of modern computing paradigms and related research interest. Then, we address each paradigm, neatly delineating its key points and its relation with the others. Thereafter, we extensively address Fog computing, remarking its outstanding role as the glue between IoT, Cloud, and Edge computing. In the end, we briefly present open challenges and future research directions for IoT, Cloud, Edge, and Fog computing.

sted, utgiver, år, opplag, sider
IEEE, 2019
Emneord
Cloud computing, Edge computing, Internet of Things, Market research, Computer architecture, Licenses, Libraries, Fog computing, mobile cloud computing, mobile edge computing
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-78533 (URN)10.1109/ACCESS.2019.2947652 (DOI)000497163000043 ()
Merknad

Funding Agencies:

European Union (EU) 764785

Fog Computing for Robotics and Industrial Automation (FORA)  

Tilgjengelig fra: 2019-12-10 Laget: 2019-12-10 Sist oppdatert: 2019-12-10bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-9575-2990