By Topic

A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
6 Author(s)
R. Hill ; University of Illinois at Urbana-Champaign ; J. Al-Muhtadi ; R. Campbell ; A. Kapadia
more authors

Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia’s services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.

Published in:

IEEE Distributed Systems Online  (Volume:5 ,  Issue: 9 )