Now showing 1 - 10 of 15
  • 2017Conference Paper
    [["dc.bibliographiccitation.firstpage","91"],["dc.bibliographiccitation.lastpage","98"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-01-25T09:22:37Z"],["dc.date.available","2019-01-25T09:22:37Z"],["dc.date.issued","2017"],["dc.description.abstract","Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. Lack of coincidence in identity management models based on defined policies and various security levels in different cloud servers is one of the most challenging issues in clouds. In this paper, a policy-based user authentication model has been presented to provide a reliable and scalable identity management and to map cloud users' access requests with defined polices of cloud servers. In the proposed schema several components are provided to define access policies by cloud servers, to apply policies based on a structural and reliable ontology, to manage user identities and to semantically map access requests by cloud users with defined polices. Finally, the reliability and efficiency of this policy-based authentication schema have been evaluated by scientific performance, security and competitive analysis. Overall, the results show that this model has met defined demands of the research to enhance the reliability and efficiency of identity management in cloud computing environments."],["dc.identifier.doi","10.1109/NOF.2017.8251226"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57383"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","8th International Conference on the Network of the Future (NOF)"],["dc.relation.eventend","2017-11-24"],["dc.relation.eventlocation","London, UK"],["dc.relation.eventstart","2017-11-22"],["dc.relation.isbn","978-1-5386-0554-7"],["dc.relation.ispartof","8th International Conference on the Network of the Future (NOF)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A policy-based identity management schema for managing accesses in clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2017Conference Paper
    [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.lastpage","6"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-02-06T10:55:46Z"],["dc.date.available","2019-02-06T10:55:46Z"],["dc.date.issued","2017"],["dc.description.abstract","Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the flexibility and scalability of this management schema according to the characteristics of cloud computing models. Accordingly, an efficient token-based access model has been presented in this paper to provide a semantic mapping between access requests of cloud users and defined policies and sub-policies of cloud customers according to the authentication and access management protocols of protection ontology. Furthermore, a policy-based session token has been introduced to enhance the reliability of access, decrease the time of mapping by eliminating un-necessary mapping from checked policies and decrease data overhead of by classification of policies and sub-policies."],["dc.identifier.doi","10.1109/CCST.2017.8167836"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57528"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","International Carnahan Conference on Security Technology (ICCST)"],["dc.relation.eventend","2017-10-26"],["dc.relation.eventlocation","Madrid, Spain"],["dc.relation.eventstart","2017-10-23"],["dc.relation.isbn","978-1-5386-1585-0"],["dc.relation.ispartof","2017 International Carnahan Conference on Security Technology (ICCST)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","Token-based policy management (TBPM): A reliable data classification and access management schema in clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2017Conference Paper
    [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.lastpage","6"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-02-06T11:00:22Z"],["dc.date.available","2019-02-06T11:00:22Z"],["dc.date.issued","2017"],["dc.description.abstract","Cloud computing is becoming a widely adopted technology for delivering On-Demand IT Services via Internet. Despite the rapid advancement of cloud-based environments, security challenges have to be addressed to a greater extent. One of the major issues in modern clouds is to guarantee the privacy and security of resources after the process of user revocation. In fact, each of revocation requests should be mapped to defined security policies of associated resources in the request for evaluation of user revocation process and updating defined policies. Accordingly, an effective user revocation model is presented in this paper for mapping revocation requests to defined policies of associated resources. The proposed model uses a revocation engine associated with three other stand-alone components to guarantee the privacy of affected nodes after user revocation requests. Furthermore, the reliability and efficiency of the suggested schema has been evaluated by a performance, security and competitive analysis."],["dc.identifier.doi","10.1109/CloudNet.2017.8071549"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57529"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","IEEE 6th International Conference on Cloud Networking (CloudNet)"],["dc.relation.eventend","2017-09-27"],["dc.relation.eventlocation","Prague, Czech Republic"],["dc.relation.eventstart","2017-09-25"],["dc.relation.isbn","978-1-5090-4026-1"],["dc.relation.ispartof","2017 IEEE 6th International Conference on Cloud Networking (CloudNet)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","An effective user revocation for policy-based access control schema in clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2018Conference Paper
    [["dc.bibliographiccitation.firstpage","160"],["dc.bibliographiccitation.lastpage","165"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.contributor.author","Emadinia, Tayyebe"],["dc.date.accessioned","2019-01-25T07:49:57Z"],["dc.date.available","2019-01-25T07:49:57Z"],["dc.date.issued","2018"],["dc.description.abstract","One of the most challenging obstacles for the advancement of clouds is the lack of assurance and transparency, along with the current paucity of techniques to quantify security. A fundamental requirement for solving this problem is to provide proper levels of security based on the requirements of cloud customers and sensitivity of data. However, generating these security levels only partially serves the requirements of cloud customers especially if it's not linked to the management of SLC commitments. Accordingly, a novel approach has been proposed in this paper to define and manage security indicators in the generated security levels. These indicators are used to react to eventualities that may threaten the established mechanisms of the generated security rings, to ensure the fulfillment of agreed assurance levels, and to minimize the damages in case of attacks, unpredictable events or unavoidable changes. The proposed schema uses simultaneous monitoring with two different stand-alone agents per security level. These agents are initialized based on all security policies in the SLA to enhance the process of monitoring and rectification and to increase the rate of satisfaction and reliability in clouds."],["dc.identifier.doi","10.1109/ICIS.2018.8466452"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57372"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","17th International Conference on Computer and Information Science (ICIS)"],["dc.relation.eventend","2018-06-08"],["dc.relation.eventlocation","Singapore, Singapore"],["dc.relation.eventstart","2018-06-06"],["dc.relation.isbn","978-1-5386-5892-5"],["dc.relation.ispartof","2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A Novel Approach to Define and Manage Security Indicators for the Fulfillment of Agreed Assurance Levels in Clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2019Journal Article
    [["dc.bibliographiccitation.journal","Digital Communications and Networks"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-11-29T08:52:14Z"],["dc.date.available","2019-11-29T08:52:14Z"],["dc.date.issued","2019"],["dc.description.abstract","The long awaited cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges have become the biggest obstacles for the advancement of this emerging technology. A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities. Moreover, a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels. The proposed model consists in the design of a well-established ontology according to security mechanisms, a procedure which classifies nodes with common policies into virtual clusters, a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes. The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multi-layered engine in cloud computing environments during policy definition, application and mapping procedures."],["dc.identifier.doi","10.1016/j.dcan.2019.02.001"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62713"],["dc.language.iso","en"],["dc.relation.issn","2352-8648"],["dc.title","A multi-layered policy generation and management engine for semantic policy mapping in clouds"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2017Journal Article Research Paper
    [["dc.bibliographiccitation.firstpage","11"],["dc.bibliographiccitation.journal","Journal of Information Security and Applications"],["dc.bibliographiccitation.lastpage","19"],["dc.bibliographiccitation.volume","36"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-01-31T08:13:47Z"],["dc.date.available","2019-01-31T08:13:47Z"],["dc.date.issued","2017"],["dc.description.abstract","One of the most challenging issues regarding to the information policy concerns in cloud computing environments is to provide an appropriate level of security for the stored data in cloud storages. In fact, each individual cloud customer needs to be granted reliable security level(s) based on defined details in SLA. The main aim of this paper is to propose multi-level policy-based schema to classify and manage data in cloud storages based on the sensitivity and confidentiality for enhancement of reliability in cloud computing environments. Furthermore, an efficient algorithm has been introduced to ensure the accuracy and authenticity of applying and managing defined policies according to the capabilities of the cloud providers and requirements of cloud customers. The most important characteristic of this model is syntactic and semantic analysis of requested policies by validity engine to provide reliable mapping between security mechanism and requested policies. Moreover, Policy Match Gate and Policy Checkpoint have been introduced to ensure about the policy application processes for all stored data based on defined policies in Security Level Certificate."],["dc.identifier.doi","10.1016/j.jisa.2017.07.003"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57443"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","Policy Management Engine (PME): A policy-based schema to classify and manage sensitive data in cloud storages"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.subtype","original_ja"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2017Conference Paper
    [["dc.bibliographiccitation.firstpage","910"],["dc.bibliographiccitation.lastpage","915"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-02-06T11:23:19Z"],["dc.date.available","2019-02-06T11:23:19Z"],["dc.date.issued","2017"],["dc.description.abstract","Cloud computing is a relatively emerging concept of providing dramatically scalable and virtualized IT resources. The lack of novel security controls for the cloud might arise from the fact that cloud computing is the convergence of many different technological areas, including virtualization and service oriented architectures. One of the most challenging issues in clouds is to provide an appropriate level of security for the virtualized infrastructure. Indeed, each individual cloud user needs to be granted reliable security level(s) based on defined details of SLA. In this paper, a federated policy-based resource classification model has been presented to classify and manage security levels in clouds and to provide efficient mapping between access requests and defined policies of each cloud node. This federation helps to decrease the processing power of evaluating each access request. Moreover, the process of mapping requests to target nodes is more efficient by clustering cloud nodes based on common policies. The reliability and efficiency of this policy-based classification schema have been evaluated by scientific performance, security and competitive analysis."],["dc.identifier.doi","10.1109/ICUFN.2017.7993931"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57533"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.publisher","IEEE"],["dc.publisher.place","Piscataway, USA"],["dc.relation.conference","2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)"],["dc.relation.doi","10.1109/ICUFN40537.2017"],["dc.relation.eventend","2017-07-07"],["dc.relation.eventlocation","Milan, Italy"],["dc.relation.eventstart","2017-07-04"],["dc.relation.isbn","978-1-5090-4749-9"],["dc.relation.ispartof","2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","Federated policy management engine for reliable cloud computing"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2016Conference Paper
    [["dc.bibliographiccitation.firstpage","137"],["dc.bibliographiccitation.lastpage","144"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-02-08T09:18:12Z"],["dc.date.available","2019-02-08T09:18:12Z"],["dc.date.issued","2016"],["dc.description.abstract","Security challenges are the most important obstacle for advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of managing different policies in clouds and to provide standard and also dedicated security levels (rings) based on capabilities of the cloud provider and requirements of cloud customers. Accordingly, policy database has been designed based on capabilities and policy engine establishes appropriate relations between policy database and SLA engine to provide security terms as a service. Furthermore, policy match maker and reasoning engine have been designed for syntactic and semantic analysis of security requests based on three-levels of protection ontology to enhance the process of policy management in clouds."],["dc.identifier.doi","10.1109/FiCloud.2016.27"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57537"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","4th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.eventend","2016-08-24"],["dc.relation.eventlocation","Vienna, Austria"],["dc.relation.eventstart","2016-08-22"],["dc.relation.isbn","978-1-5090-4052-0"],["dc.relation.ispartof","2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","Policy Engine as a Service (PEaaS): An Approach to a Reliable Policy Management Framework in Cloud Computing Environments"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2018Conference Paper
    [["dc.bibliographiccitation.firstpage","108"],["dc.bibliographiccitation.lastpage","113"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Emadinia, Tayyebe"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.date.accessioned","2019-01-25T08:04:08Z"],["dc.date.available","2019-01-25T08:04:08Z"],["dc.date.issued","2018"],["dc.description.abstract","Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be protected from disclosing to unauthorized users. Policy-Management models are the most appropriate solutions to create and manage security levels in clouds. However, these models increase the process of matching access requests to defined policies considerably. In this paper, we proposed a reliable access management framework based on multi-level policies and sequences. The suggested model introduces each level of security as s sequence according to the inheritance concepts to classify security levels efficiently and to enhance the process of access control by elimination of un-necessary re-matching. our results showed the suggested model is able to decrease the access response time without affecting the security of the environments."],["dc.identifier.doi","10.1109/FiCloud.2018.00023"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57374"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.eventend","2018-08-08"],["dc.relation.eventlocation","Barcelona, Spain"],["dc.relation.eventstart","2018-08-06"],["dc.relation.isbn","978-1-5386-7503-8"],["dc.relation.ispartof","2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A Sequence-Based Access Control Framework for Reliable Security Management in Clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2018Conference Paper
    [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.lastpage","5"],["dc.contributor.author","Fatemi Moghaddam, Faraz"],["dc.contributor.author","Wieder, Philipp"],["dc.contributor.author","Yahyapour, Ramin"],["dc.contributor.author","Khodadadi, Touraj"],["dc.date.accessioned","2019-01-25T08:07:40Z"],["dc.date.available","2019-01-25T08:07:40Z"],["dc.date.issued","2018"],["dc.description.abstract","Security and Privacy challenges are the most obstacles for the advancement of cloud computing and the erosion of trust boundaries already happening in organizations is amplified and accelerated by this emerging technology. Policy Management Frameworks are the most proper solutions to create dedicated security levels based on the sensitivity of resources and according to the mapping process between requirements cloud customers and capabilities of service providers. The most concerning issue in these frameworks is the rate of perfect matches between capabilities and requirements. In this paper, a reliable ring analysis engine has been introduced to efficiently map the security requirements of cloud customers to the capabilities of service provider and to enhance the rate of perfect matches between them for establishment of different security levels in clouds. In the suggested model a structural index has been introduced to receive the requirement and efficiently map them to the most proper security mechanism of the service provider. Our results show that this index-based engine enhances the rate of perfect matches considerably and decreases the detected conflicts in syntactic and semantic analysis."],["dc.identifier.doi","10.1109/TSP.2018.8441183"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/57375"],["dc.language.iso","en"],["dc.notes.status","final"],["dc.relation.conference","41st International Conference on Telecommunications and Signal Processing (TSP)"],["dc.relation.eventend","2018-07-06"],["dc.relation.eventlocation","Athens, Greece"],["dc.relation.eventstart","2018-07-04"],["dc.relation.isbn","978-1-5386-4695-3"],["dc.relation.ispartof","41st International Conference on Telecommunications and Signal Processing (TSP)"],["dc.relation.orgunit","Gesellschaft für wissenschaftliche Datenverarbeitung"],["dc.title","A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI