Till Örebro universitet

oru.seÖrebro universitets publikationer
Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (10 of 42) Visa alla publikationer
Mazzara, M., Dragoni, N., Bucchiarone, A., Giaretta, A., Larsen, S. T. & Dustdar, S. (2021). Microservices: Migration of a Mission Critical System. IEEE Transactions on Services Computing, 14(5), 1464-1477
Öppna denna publikation i ny flik eller fönster >>Microservices: Migration of a Mission Critical System
Visa övriga...
2021 (Engelska)Ingår i: IEEE Transactions on Services Computing, E-ISSN 1939-1374, Vol. 14, nr 5, s. 1464-1477Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

An increasing interest is growing around the idea of microservices and the promise of improving scalability when compared to monolithic systems. Several companies are evaluating pros and cons of a complex migration. In particular, financial institutions are positioned in a difficult situation due to the economic climate and the appearance of agile competitors that can navigate in a more flexible legal framework and started their business since day one with more agile architectures and without being bounded to outdated technological standard. In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture (MA) into a microservices architecture (MSA). The case study is based on the FX Core system, a mission critical system of Danske Bank, the largest bank in Denmark and one of the leading financial institutions in Northern Europe. The technical problem that has been addressed and solved in this paper is the identification of a repeatable migration process that can be used to convert a real world Monolithic architecture into a Microservices architecture in the specific setting of financial domain, typically characterized by legacy systems and batch-based processing on heterogeneous data sources.

Ort, förlag, år, upplaga, sidor
IEEE Press, 2021
Nyckelord
Scalability, Computer architecture, Service-oriented architecture, Tools, Mission critical systems, Automation, Service Computing, Software Architecture, Scalability, Microservices
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-71108 (URN)10.1109/TSC.2018.2889087 (DOI)000704110400016 ()2-s2.0-85059027049 (Scopus ID)
Tillgänglig från: 2019-01-26 Skapad: 2019-01-26 Senast uppdaterad: 2024-04-26Bibliografiskt granskad
Thomsen, M. D., Giaretta, A. & Dragoni, N. (2021). Smart Lamp or Security Camera? Automatic Identification of IoT Devices. In: Ghita, Bogdan; Shiaeles, Stavros (Ed.), Selected Papers from the 12th International Networking Conference: . Paper presented at 12th International Networking Conference (INC 2020), Rhodes, Greece, September 19-21, 2020 (Virtual Conference) (pp. 85-99). Springer International Publishing
Öppna denna publikation i ny flik eller fönster >>Smart Lamp or Security Camera? Automatic Identification of IoT Devices
2021 (Engelska)Ingår i: Selected Papers from the 12th International Networking Conference / [ed] Ghita, Bogdan; Shiaeles, Stavros, Springer International Publishing , 2021, s. 85-99Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The tsunami of connectivity brought by the Internet of Things is rapidly revolutionising several sectors, ranging from industry and manufacturing, to home automation, healthcare and many more. When it comes to enforce security within an IoT network such as a smart home, there is a need to automatically recognise the type of each joining devices, in order to apply the right security policy. In this paper, we propose a method for identifying IoT devices’ types based on natural language processing (NLP), text classification, and web search engines. We implement a proof of concept and we test it against 33 different IoT devices. With a success rate of 88.9% for BACnet and 87.5% for MUD devices, our experiments show that we can efficiently and effectively identify different IoT devices.

Ort, förlag, år, upplaga, sidor
Springer International Publishing, 2021
Nyckelord
Internet of Things, Device identification, Profiling, Natural language processing, Text classification
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:oru:diva-88919 (URN)978-3-030-64757-5 (ISBN)978-3-030-64758-2 (ISBN)
Konferens
12th International Networking Conference (INC 2020), Rhodes, Greece, September 19-21, 2020 (Virtual Conference)
Tillgänglig från: 2021-01-25 Skapad: 2021-01-25 Senast uppdaterad: 2021-02-04Bibliografiskt granskad
Tange, K., De Donno, M., Fafoutis, X. & Dragoni, N. (2020). A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Communications Surveys and Tutorials, 22(4), 2489-2520
Öppna denna publikation i ny flik eller fönster >>A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
2020 (Engelska)Ingår i: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 22, nr 4, s. 2489-2520Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

Ort, förlag, år, upplaga, sidor
IEEE, 2020
Nyckelord
Internet of Things, Edge computing, Systematics, Tutorials, Industries, Access control, Industrial Internet of Things, cyber-security, security requirements, fog computing
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-88386 (URN)10.1109/COMST.2020.3011208 (DOI)000593999900013 ()2-s2.0-85091841797 (Scopus ID)
Anmärkning

Funding Agencies:

European Union (EU) 764785

Poul V. Andersen Fund 

Tillgänglig från: 2021-01-08 Skapad: 2021-01-08 Senast uppdaterad: 2024-04-05Bibliografiskt granskad
Herskind, L., Giaretta, A., De Donno, M. & Dragoni, N. (2020). BitFlow: Enabling Real‐time Cash‐flow Evaluations through Blockchain. Concurrency and Computation, 32(12), Article ID e5333.
Öppna denna publikation i ny flik eller fönster >>BitFlow: Enabling Real‐time Cash‐flow Evaluations through Blockchain
2020 (Engelska)Ingår i: Concurrency and Computation, ISSN 1532-0626, E-ISSN 1532-0634, Vol. 32, nr 12, artikel-id e5333Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Disbursement registration has always been a cumbersome, opaque, and inefficient process, up to the point that most businesses perform cash-flow evaluations only on a quarterly basis. We believe that automatic cash-flow evaluations can actively mitigate these issues. In this paper, we presentBitFlow, ablockchain-based architecture thatprovides complete cash-flow transparency and diminishes the probability of undetected frauds through the BitKrone, a non-volatile cryptocurrency that maps to the Danish Krone (DKK). We show that confidentiality can be effectively achieved on a permissionless blockchain using Zero-Knowledge proofs, ensuring verifiable transfers and automatic evaluations. Furthermore, we discuss several experiments to evaluate our proposal, in particular, the impact that confidential transactions have on the whole system, in terms of responsiveness and from an economical expenditure perspective.

Ort, förlag, år, upplaga, sidor
John Wiley & Sons, 2020
Nyckelord
BitFlow, blockchain, bulletproofs, cash-flow, Ethereum, zero-knowledge
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-78929 (URN)10.1002/cpe.5333 (DOI)000529224600008 ()2-s2.0-85066913820 (Scopus ID)
Tillgänglig från: 2020-01-09 Skapad: 2020-01-09 Senast uppdaterad: 2020-05-18Bibliografiskt granskad
Matthíasson, G., Giaretta, A. & Dragoni, N. (2020). IoT Device Profiling: From MUD Files to S×C Contracts. In: Roßnagel, H., Schunck, C. H., Mödersheim, S. & Hühnlein, D. (Ed.), Open Identity Summit 2020: . Paper presented at Open Identity Summit 2020 (OID2020) (pp. 143-154). Gesellschaft für Informatik e.V.
Öppna denna publikation i ny flik eller fönster >>IoT Device Profiling: From MUD Files to S×C Contracts
2020 (Engelska)Ingår i: Open Identity Summit 2020 / [ed] Roßnagel, H., Schunck, C. H., Mödersheim, S. & Hühnlein, D., Gesellschaft für Informatik e.V. , 2020, s. 143-154Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Security is a serious, and often neglected, issue in the Internet of Things (IoT). In order to improve IoT security, researchers proposed to use Security-by-Contract (S×C), a paradigm originally designed for mobile application platforms. However, S×C assumes that manufacturers equip their devices with security contracts, which makes hard to integrate legacy devices with S×C. In this paper, we explore a method to extract S×C contracts from legacy devices’ Manufacturer Usage Descriptions (MUDs). We tested our solution on 28 different MUD files, and we show that it is possible to create basic S×C contracts, paving the way to complete extraction tools.

Ort, förlag, år, upplaga, sidor
Gesellschaft für Informatik e.V., 2020
Serie
Lecture Notes in Informatics, ISSN 1617-5468
Nyckelord
Internet of Things, S×C, Security-by-Contract, MUD, Manufacturer Usage Description, Device profiling
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-88920 (URN)10.18420/ois2020_12 (DOI)978-3-88579-699-2 (ISBN)
Konferens
Open Identity Summit 2020 (OID2020)
Anmärkning

Due to COVID-19, OID 2020 is publication only.

Tillgänglig från: 2021-01-25 Skapad: 2021-01-25 Senast uppdaterad: 2021-02-02Bibliografiskt granskad
Sigurdsson, G., Giaretta, A. & Dragoni, N. (2020). Vulnerabilities and Security Breaches in Cryptocurrencies. In: Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G. (Ed.), Proceedings of 6th International Conference in Software Engineering for Defence Applications: . Paper presented at 6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018. Springer
Öppna denna publikation i ny flik eller fönster >>Vulnerabilities and Security Breaches in Cryptocurrencies
2020 (Engelska)Ingår i: Proceedings of 6th International Conference in Software Engineering for Defence Applications / [ed] Ciancarini, P.; Mazzara, M.; Messina, A.; Sillitti, A.; Succi, G., Springer, 2020Konferensbidrag, Publicerat paper (Refereegranskat)
Ort, förlag, år, upplaga, sidor
Springer, 2020
Serie
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 925
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-71864 (URN)978-3-030-14686-3 (ISBN)978-3-030-14687-0 (ISBN)
Konferens
6th International Conference in Software Engineering for Defence Applications (SEDA 2018), Rome, Italy, June 7-8, 2018
Tillgänglig från: 2019-01-28 Skapad: 2019-01-28 Senast uppdaterad: 2019-02-01Bibliografiskt granskad
De Donno, M., Felipe, J. M. & Dragoni, N. (2019). ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things. In: 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings. Paper presented at 4th IEEE European Symposium on Security and Privacy Workshops (EUROS and PW 2019), Stockholm, Sweden, June 17-19, 2019 (pp. 11-20). IEEE
Öppna denna publikation i ny flik eller fönster >>ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things
2019 (Engelska)Ingår i: 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019: Proceedings, IEEE , 2019, s. 11-20Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. However, the increasing adoption of IoT devices both in industries and personal environments has exposed businesses and consumers to a number of security threats, such as Distributed Denial of Service (DDoS) attacks. Along the way, Fog computing was born. A novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. In this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0). In particular, we discuss the design and implementation of the system, including possible models for deployment, security assumptions, interaction among system components, and possible modes of operation.

Ort, förlag, år, upplaga, sidor
IEEE, 2019
Nyckelord
Fog Computing, Internet of Things, Security, Distributed Denial of Service, Malware, Anti-Malware
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-76974 (URN)10.1109/EuroSPW.2019.00008 (DOI)000485315600002 ()2-s2.0-85071931412 (Scopus ID)9781728130262 (ISBN)
Konferens
4th IEEE European Symposium on Security and Privacy Workshops (EUROS and PW 2019), Stockholm, Sweden, June 17-19, 2019
Tillgänglig från: 2019-10-03 Skapad: 2019-10-03 Senast uppdaterad: 2019-10-03Bibliografiskt granskad
De Donno, M. & Dragoni, N. (2019). Combining ANTIBIOTIC with Fog Computing: ANTIBIOTIC 2.0. In: 2019 IEEE 3rd International Conference on Fog and Edge Computing, ICFEC 2019 - Proceedings: . Paper presented at 3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), Larnaca, Cyprus, May 14-17, 2019. IEEE
Öppna denna publikation i ny flik eller fönster >>Combining ANTIBIOTIC with Fog Computing: ANTIBIOTIC 2.0
2019 (Engelska)Ingår i: 2019 IEEE 3rd International Conference on Fog and Edge Computing, ICFEC 2019 - Proceedings, IEEE , 2019Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. From the security perspective, the increasing adoption of IoT devices in all aspects of our society has exposed businesses and consumers to a number of threats, such as Distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we proposed ANTIBIOTIC 1.0 In However, this solution has some limitations that make it difficult (when not impossible) to be implemented in a legal and controlled manner. Along the way, Fog computing was born: a novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. As a result, in this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0). First, we present ANTIBIOTIC 1.0 and its main problem. Then, after introducing Fog computing, we present ANTIBIOTIC 2.0, showing how it overcomes the main issues of its predecessor by including Fog computing in its design.

Ort, förlag, år, upplaga, sidor
IEEE, 2019
Nyckelord
Fog Computing, Internet of Things, Security, Distributed Denial of Service, Malware, Anti-Malware
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-75969 (URN)10.1109/CFEC.2019.8733144 (DOI)000480444000001 ()2-s2.0-85068409281 (Scopus ID)978-1-7281-2365-3 (ISBN)
Konferens
3rd IEEE International Conference on Fog and Edge Computing (ICFEC 2019), Larnaca, Cyprus, May 14-17, 2019
Tillgänglig från: 2019-08-29 Skapad: 2019-08-29 Senast uppdaterad: 2019-08-29Bibliografiskt granskad
De Donno, M., Giaretta, A., Dragoni, N., Bucchiarone, A. & Mazzara, M. (2019). Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era. Future Internet, 11(6), Article ID 127.
Öppna denna publikation i ny flik eller fönster >>Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
Visa övriga...
2019 (Engelska)Ingår i: Future Internet, E-ISSN 1999-5903, Vol. 11, nr 6, artikel-id 127Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The Internet of Things (IoT) is rapidly changing our society to a world where every thing is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.

Ort, förlag, år, upplaga, sidor
MDPI, 2019
Nyckelord
security, Internet of Things, Cloud computing
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-75237 (URN)10.3390/fi11060127 (DOI)000473805800007 ()2-s2.0-85067464961 (Scopus ID)
Tillgänglig från: 2019-07-25 Skapad: 2019-07-25 Senast uppdaterad: 2023-08-03Bibliografiskt granskad
De Donno, M., Tange, K. & Dragoni, N. (2019). Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog. IEEE Access, 7, 150936-150948
Öppna denna publikation i ny flik eller fönster >>Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog
2019 (Engelska)Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 150936-150948Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

In the last few years, Internet of Things, Cloud computing, Edge computing, and Fog computing have gained a lot of attention in both industry and academia. However, a clear and neat definition of these computing paradigms and their correlation is hard to find in the literature. This makes it difficult for researchers new to this area to get a concrete picture of these paradigms. This work tackles this deficiency, representing a helpful resource for those who will start next. First, we show the evolution of modern computing paradigms and related research interest. Then, we address each paradigm, neatly delineating its key points and its relation with the others. Thereafter, we extensively address Fog computing, remarking its outstanding role as the glue between IoT, Cloud, and Edge computing. In the end, we briefly present open challenges and future research directions for IoT, Cloud, Edge, and Fog computing.

Ort, förlag, år, upplaga, sidor
IEEE, 2019
Nyckelord
Cloud computing, Edge computing, Internet of Things, Market research, Computer architecture, Licenses, Libraries, Fog computing, mobile cloud computing, mobile edge computing
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:oru:diva-78533 (URN)10.1109/ACCESS.2019.2947652 (DOI)000497163000043 ()
Anmärkning

Funding Agencies:

European Union (EU) 764785

Fog Computing for Robotics and Industrial Automation (FORA)  

Tillgänglig från: 2019-12-10 Skapad: 2019-12-10 Senast uppdaterad: 2019-12-10Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-9575-2990

Sök vidare i DiVA

Visa alla publikationer