Change search
Link to record
Permanent link

Direct link
BETA
Mehri, Vida. A.
Alternative names
Publications (5 of 5) Show all publications
Mehri, V. A. A., Ilie, D. & Tutschku, K. (2019). Designing a Secure IoT System Architecture from a Virtual Premise for a Collaborative AI Lab. In: : . Paper presented at Workshop on Decentralized IoT Systems and Security (DISS) 24 February 2019, San Diego, CA,.
Open this publication in new window or tab >>Designing a Secure IoT System Architecture from a Virtual Premise for a Collaborative AI Lab
2019 (English)Conference paper, Published paper (Refereed)
Abstract [en]

IoT systems are increasingly composed out of flexible, programmable, virtualised, and arbitrarily chained IoT elements and services using portable code. Moreover, they might be sliced, i.e. allowing multiple logical IoT systems (network + application) to run on top of a shared physical network and compute infrastructure. However, implementing and designing particularly security mechanisms for such IoT systems is challenging since a) promising technologies are still maturing, and b) the relationships among the many requirements, technologies and components are difficult to model a-priori.

The aim of the paper is to define design cues for the security architecture and mechanisms of future, virtualised, arbitrarily chained, and eventually sliced IoT systems. Hereby, our focus is laid on the authorisation and authentication of user, host, and code integrity in these virtualised systems. The design cues are derived from the design and implementation of a secure virtual environment for distributed and collaborative AI system engineering using so called AI pipelines. The pipelines apply chained virtual elements and services and facilitate the slicing of the system. The virtual environment is denoted for short as the virtual premise (VP). The use-case of the VP for AI design provides insight into the complex interactions in the architecture, leading us to believe that the VP concept can be generalised to the IoT systems mentioned above. In addition, the use-case permits to derive, implement, and test solutions. This paper describes the flexible architecture of the VP and the design and implementation of access and execution control in virtual and containerised environments. 

Keywords
IoT, AI, Security, Authentication, Collaboration
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-17550 (URN)10.14722/diss.2019.23006 (DOI)1-891562-56-8 (ISBN)
Conference
Workshop on Decentralized IoT Systems and Security (DISS) 24 February 2019, San Diego, CA,
Funder
EU, Horizon 2020, 732204
Available from: 2019-01-30 Created: 2019-01-30 Last updated: 2019-08-09Bibliographically approved
Mehri, V. A. A. & Tutschku, K. (2017). Flexible Privacy and High Trust in the Next Generation Internet: The Use Case of a Cloud-based Marketplace for AI. In: : . Paper presented at SNCNW - Swedish National Computer Networking Workshop, Halmstad. Halmstad university
Open this publication in new window or tab >>Flexible Privacy and High Trust in the Next Generation Internet: The Use Case of a Cloud-based Marketplace for AI
2017 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cloudified architectures facilitate resource ac-cess and sharing which is independent from physical lo-cations. They permit high availability of resources at lowoperational costs. These advantages, however, do not comefor free. End users might fear that they lose control overthe location of their data and, thus, of their autonomy indeciding to whom the data is communicate to. Thus, strongprivacy and trust concerns arise for end users.In this work we will review and investigate privacy andtrust requirements for Cloud systems in general and for acloud-based marketplace (CMP) for AI in particular. We willinvestigate whether and how the current privacy and trustdimensions can be applied to Clouds and for the design ofa CMP. We also propose the concept of a "virtual premise"for enabling "Privacy-by-Design" [1] in Clouds. The ideaof a "virtual premise" might probably not be a universalsolution for any privacy requirement. However, we expectthat it provides flexibility in designing privacy in Cloudsand thus leading to higher trust.

Place, publisher, year, edition, pages
Halmstad university, 2017
Keywords
marketplace, privacy, trust, cloud computing
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-14963 (URN)
Conference
SNCNW - Swedish National Computer Networking Workshop, Halmstad
Projects
Horizon 2020 Bonseyes
Funder
EU, Horizon 2020, 732204
Available from: 2017-07-25 Created: 2017-07-25 Last updated: 2019-08-09Bibliographically approved
Mehri, V. A. A. & Tutschku, K. (2017). Privacy and trust in cloud-based marketplaces for AI and data resources. In: IFIP Advances in Information and Communication Technology: . Paper presented at 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM,Gothenburg (pp. 223-225). Springer New York LLC, 505
Open this publication in new window or tab >>Privacy and trust in cloud-based marketplaces for AI and data resources
2017 (English)In: IFIP Advances in Information and Communication Technology, Springer New York LLC , 2017, Vol. 505, p. 223-225Conference paper, Published paper (Refereed)
Abstract [en]

The processing of the huge amounts of information from the Internet of Things (IoT) has become challenging. Artificial Intelligence (AI) techniques have been developed to handle this task efficiently. However, they require annotated data sets for training, while manual preprocessing of the data sets is costly. The H2020 project “Bonseyes” has suggested a “Market Place for AI”, where the stakeholders can engage trustfully in business around AI resources and data sets. The MP permits trading of resources that have high privacy requirements (e.g. data sets containing patient medical information) as well as ones with low requirements (e.g. fuel consumption of cars) for the sake of its generality. In this abstract we review trust and privacy definitions and provide a first requirement analysis for them with regards to Cloud-based Market Places (CMPs). The comparison of definitions and requirements allows for the identification of the research gap that will be addressed by the main authors PhD project. © IFIP International Federation for Information Processing 2017.

Place, publisher, year, edition, pages
Springer New York LLC, 2017
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 505
Keywords
AI, Cloud, IoT, Marketplace, Privacy, Trust, Artificial intelligence, Clouds, Commerce, Internet of things, Trusted computing, Data resources, Internet of thing (IOT), Medical information, Privacy and trusts, Privacy requirements, Requirement analysis, Data privacy
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:bth-14841 (URN)10.1007/978-3-319-59171-1 (DOI)000432194900017 ()2-s2.0-85020537534 (Scopus ID)9783319591704 (ISBN)
Conference
11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM,Gothenburg
Available from: 2017-07-03 Created: 2017-07-03 Last updated: 2018-05-31Bibliographically approved
Tutschku, K., Ahmadi Mehri, V., Carlsson, A., Chivukula, K. V. & Johan, C. (2016). On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures. In: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC): . Paper presented at IEEE International Conference on Communications (ICC), Kuala Lumpur (pp. 442-447).
Open this publication in new window or tab >>On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures
Show others...
2016 (English)In: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, p. 442-447Conference paper, Published paper (Refereed)
Abstract [en]

The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to enable OPEX savings. We put a focus on monitoring resources on small time-scales and on the variation observed on such scales. We introduce a QoE-based comparative concept that relates guest and host views on "utilisation" and "load" for the analysis of the variations. We describe the order of variations in "utilisation" and "load" by measurement and by graphical analysis of the measurements. We do these evaluations for different host operating systems and monitoring tools.

Series
IEEE International Conference on Communications Workshops, ISSN 2164-7038
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11902 (URN)000386326800074 ()978-1-5090-0448-5 (ISBN)
Conference
IEEE International Conference on Communications (ICC), Kuala Lumpur
Note

Held in conjunction with the IEEE International Conference on Communications (ICC 2016)

Available from: 2016-05-21 Created: 2016-05-21 Last updated: 2019-08-09Bibliographically approved
Tutschku, K. T., Ahmadi Mehri, V. & Carlsson, A. (2016). Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures. In: : . Paper presented at 12th Swedish National Computer Networking Workshop (SNCNW), Sundsvall, Sweden.
Open this publication in new window or tab >>Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures
2016 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cloud Networking (CN) and related conceptsoffer appealing novelties to Cloud Computing (CC) customers.They can do a one-stop-shopping for network-enhanced cloudservices. In addition, the costs of such services might below due to multiple customers sharing the infrastructures.Moreover, telecommunication network operators are adopt-ing the CN in theirNetwork Functions Virtualisation (NFV)framework for reducing costs and increasing the flexibility oftheir networks. The technical appeal of CN comes from thetight integration of CC and smart networks. The economicalattractiveness results from avoiding dedicated hardware, shar-ing of resources, and simplified resource management (RM) asseen by the users respectively by the applications. The visionof cheap and integrated CN services is obviously attractive,but it is also evident that it will require more complex RMprocedures for efficiently balancing the usage of all resources.In this contribution, we suggest an initial architecture forintegrated and practical RM in CN and NFV systems. TheRM concept aims at locating and analysing performancebottlenecks, efficiency problems, and eventually discover un-used resources. The suggested architecture is based on alayered view on the system. Moreover, we detail difficultiesin practical resources usage monitoring which, in turn, definerequirements for a RM architecture. The requirement analysisis based on measurements in a CN infrastructure.

National Category
Communication Systems
Identifiers
urn:nbn:se:bth-11903 (URN)
Conference
12th Swedish National Computer Networking Workshop (SNCNW), Sundsvall, Sweden
Available from: 2016-05-21 Created: 2016-05-21 Last updated: 2016-05-25Bibliographically approved
Organisations

Search in DiVA

Show all publications