Preserving Biodiversity tài liệu, giáo án, bài giảng , luận văn, luận án, đồ án, bài tập lớn về tất cả các lĩnh vực kinh...
Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino CS Department Purdue University West Lafayette, Indiana bertino@cs.purdue.edu Federica Paci CS Department Purdue University West Lafayette, Indiana paci@cs.purdue.edu Rodolfo Ferrini CS Department Purdue University West Lafayette, Indiana rferrini@purdue.edu Ning Shang CS Department Purdue University West Lafayette, Indiana nshang@cs.purdue.edu Abstract Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties (also called attributes) and past interaction histories. Such services should preserve the privacy of users, while at the same time enhancing interoperability across multiple domains and simplifying management of identity verification. In this paper we propose an approach addressing such requirements, based on the use of high-level identity verification policies expressed in terms of identity attributes, zero-knolwedge proof protocols, and semantic matching techniques. The paper describes the basic techniques we adopt and the architeture of a system developed based on these techniques, and reports performance experimental results. 1 Introduction Internet is not any longer only a communication medium but, because of the reliable, afforbable, and ubiquitous broadband access, is becoming a powerful computing platform. Rather than running software and managing data on a desktop computer or server, users are able to execute applications and access data on demand from the “cloud” (the Internet) anywhere in the world. This new computing paradigm is referred to as cloud computing. Examples of cloud computing applications are Amazon’s Simple Storage Service (S3), Elastic Computing Cloud (EC2) for storing photos on Smugmug an on line photo service, and Google Apps for word-processing. Cloud services make easier for users to access their personal information from databases and make it avail- able to services distributed across Internet. The availability of such information in the cloud is crucial to provide Copyright 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 1 better services to users and to authenticate users in case of services sensitive with respect to privacy and secu- rity. Users have typically to establish their identity each time they use a new cloud service, usually by filling out an online form and providing sensitive personal information (e.g., name, home address, credit card number, phone number, etc.). This leaves a trail of personal information that, if not properly protected, may be misused. Therefore, the development of digital identity management (IdM for short) systems suitable for cloud comput- ing is crucial. An important requirement is that users of cloud services must have control on which personal information is disclosed and how this information is used in order to minimize the risk of identity theft and fraud. Another major issue concerning IdM in cloud platforms is interoperability. Interoperability issues range from the use of different identity tokens, such those encoded in X.509 certificates and SAML assertions, and different identity negotiation protocols, such as the client-centric protocols and the Preserving Biodiversity Preserving Biodiversity Bởi: OpenStaxCollege Preserving biodiversity is an extraordinary challenge that must be met by greater understanding of biodiversity itself, changes in human behavior and beliefs, and various preservation strategies Change in Biodiversity through Time The number of species on the planet, or in any geographical area, is the result of an equilibrium of two evolutionary processes that are ongoing: speciation and extinction Both are natural “birth” and “death” processes of macroevolution When speciation rates begin to outstrip extinction rates, the number of species will increase; likewise, the reverse is true when extinction rates begin to overtake speciation rates Throughout the history of life on Earth, as reflected in the fossil record, these two processes have fluctuated to a greater or lesser extent, sometimes leading to dramatic changes in the number of species on the planet as reflected in the fossil record ([link]) Extinction intensity as reflected in the fossil record has fluctuated throughout Earth’s history Sudden and dramatic losses of biodiversity, called mass extinctions, have occurred five times Paleontologists have identified five strata in the fossil record that appear to show sudden and dramatic (greater than half of all extant species disappearing from the fossil record) losses in biodiversity These are called mass extinctions There are many 1/13 Preserving Biodiversity lesser, yet still dramatic, extinction events, but the five mass extinctions have attracted the most research into their causes An argument can be made that the five mass extinctions are only the five most extreme events in a continuous series of large extinction events throughout the fossil record (since 542 million years ago) In most cases, the hypothesized causes are still controversial; in one, the most recent, the cause seems clear The most recent extinction in geological time, about 65 million years ago, saw the disappearance of the dinosaurs and many other species Most scientists now agree the cause of this extinction was the impact of a large asteroid in the present-day Yucatán Peninsula and the subsequent energy release and global climate changes caused by dust ejected into the atmosphere Recent and Current Extinction Rates A sixth, or Holocene, mass extinction has mostly to with the activities of Homo sapiens There are numerous recent extinctions of individual species that are recorded in human writings Most of these are coincident with the expansion of the European colonies since the 1500s One of the earlier and popularly known examples is the dodo bird The dodo bird lived in the forests of Mauritius, an island in the Indian Ocean The dodo bird became extinct around 1662 It was hunted for its meat by sailors and was easy prey because the dodo, which did not evolve with humans, would approach people without fear Introduced pigs, rats, and dogs brought to the island by European ships also killed dodo young and eggs ([link]) The dodo bird was hunted to extinction around 1662 (credit: Ed Uthman, taken in Natural History Museum, London, England) Steller’s sea cow became extinct in 1768; it was related to the manatee and probably once lived along the northwest coast of North America Steller’s sea cow was discovered by Europeans in 1741, and it was hunted for meat and oil A total of 27 years elapsed between the sea cow’s first contact with Europeans and extinction of the species The 2/13 Preserving Biodiversity last Steller’s sea cow was killed in 1768 In another example, the last living passenger pigeon died in a zoo in Cincinnati, Ohio, in 1914 This species had once migrated in the millions but declined in numbers because of overhunting and loss of habitat through the clearing of forests for farmland These are only a few of the recorded extinctions in the past 500 years The International Union for Conservation of Nature (IUCN) keeps a list of extinct and endangered species called the Red List The list is not complete, but it describes 380 vertebrates that became extinct after 1500 AD, 86 of which were driven extinct by overhunting or overfishing Estimates of Present-day Extinction Rates Estimates of extinction rates are hampered by the fact that most extinctions are probably happening without being observed The extinction of a bird or mammal is often noticed by humans, especially if it has been hunted or used in some other way But there are many organisms that are less noticeable to humans (not necessarily of less value) and many that are undescribed The background extinction rate is estimated to be about per million species years (E/MSY) One “species year” is one species in existence for one year One million species years could be one species persisting for one million years, or a million species persisting for one year If it is the latter, then one extinction per million species years would be one of those million species becoming extinct in that year For example, if ... Biodiversity in Vietnam Dang Thi An and Chu Thi Thu Ha Department of Environmental Biology. Institute of Ecology and Biological Resources. Vietnamese Academy of Science and Technology (VAST) - Vietnam has a dense river network: 2,300 rivers with a length over 10 km, 8 rivers have large basins of more than 10,000 km2. Lowland areas are fed by two major river systems: the Red River in the North and Mekong River in the South. - In Vietnam, there are over 3,260 km of coastline and more than 3,000 islands. Vietnam’s geographical conditions result in high variation in climate, soil and topography, and thus, a wide variety of ecosystems, each of which has its own flora and fauna. Some main characteristics of Biodiversity in Vietnam In 1992, the World Conservation Monitoring Center evaluated Vietnam as one of the 16 most biologically diverse countries in the world. Vietnam’s Biodiversity is characterized by : - Species diversity: about 11,458 species of fauna, 21,017 species of flora and 3,000 species of micro- organisms have been recognized and every year many new species are discovered. For example, in period of 1993-2002, 13 new genera, 222 species, 30 subspecies were described and 2 families, 19 genera, over 70 species were added to the native flora. Five new mammal, 3 bird species in mainland Southeast Asia and large number of new species of reptiles, amphibians, fishes and invertebrates have been described for 30 years. Table 1: Known species richness of selected taxonomic groups in Vietnam - Ecosystem diversity: in Vietnam 10 terrestrial ecosystems (forests cover the largest area and support the highest levels of biodiversity) and 9 coastal/ marine biodiversity regions adjusted to follow provincial boundaries, 30 natural and 9 artificial wetlands were documented. Vietnam has an exclusive marine economic zone of about 20 types of marine ecosystems. There are more than 11,000 species including 2,500 marine fish, 225 shrimp, over 200 phytoplanton, nearly 700 zooplankton 100 mangrove plant, 15 sea grass and over 6,000 benthic inverterbrate species. Approximately 1,122 square km of coral reef distributed from the North to the South, 90 % of hard coral species in the Indo-Pacific has been found in Vietnamese waters - Vietnam’s natural ecosystem include a rich variety of productive and beautiful forest types, marshes, rivers and coral reefs, which together support nearly 10 % of the global total mammal and bird species. - Vietnam’s biodiversity is an important part of the country’s economy and culture. Because it makes a major contribution to forestry, fishery, agriculture, health, industry and tourism. In Vietnam, more than70% of habitants are farmers, about 25 million people living depend on forests, 8 million get their primary household income and other 12 million get part of their income from fisheries. - Ecological systems and biodiversity within them provide not only much of the basic needs for people, but insurance against natural disasters(as flood and drought) as well. - Today,Vietnamese have to face biodiversity’s loss and degradation. For examples: even forest cover in Vietnam is 37% of total land area, but 18% of that is plantation, of remaining forest only 7% is “primary” and about 70% is poor quality forest. Between 1992 and 2002, forest losses due to fire averaged 6,000 hectare annually. About 700 species of animals and plants are threatened with extinction nationally, while over 300 species are threatened with global extinction, among them 49 species are classified as “critically endangered”. This due to forest loss, illegal logging, wildlife trade, habitat’s loss and fragmentation, environmental pollution… - Biodiversity’s degradation is one kind of serious natural disasters. It’s reduction is Cyber Forensics Table of Contents Cyber Forensics—A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes 1 Disclaimer 6 Introduction 7 Background 8 Dimensions of the Problem 9 Computer Forensics 10 Works Cited 11 Section I: Cyber Forensics 13 Chapter List 13 13 Chapter 1: The Goal of the Forensic Investigation 14 Overview 14 Why Investigate 14 Internet Exceeds Norm 14 Inappropriate E−mail 16 Non−Work−Related Usage of Company Resources 17 Theft of Information 18 Violation of Security Parameters 18 Intellectual Property Infraction 19 Electronic Tampering 20 Establishing a Basis or Justification to Investigate 21 Determine the Impact of Incident 22 Who to Call/Contact 24 If You Are the Auditor/Investigator 24 Resources 25 Authority 25 Obligations/Goals 25 Reporting Hierarchy 25 Escalation Procedures 25 Time Frame 26 Procedures 26 Precedence 26 Independence 26 Chapter 2: How to Begin a Non−Liturgical Forensic Examination 27 Overview 27 Isolation of Equipment 27 Cookies 29 Bookmarks 31 History Buffer 32 Cache 34 Temporary Internet Files 35 Tracking of Logon Duration and Times 35 Recent Documents List 36 Tracking of Illicit Software Installation and Use 37 i Table of Contents Chapter 2: How to Begin a Non−Liturgical Forensic Examination The System Review 38 The Manual Review 41 Hidden Files 42 How to Correlate the Evidence 43 Works Cited 44 Chapter 3: The Liturgical Forensic Examination: Tracing Activity on a Windows−Based Desktop 45 Gathering Evidence For Prosecution Purposes 45 Gathering Evidence Without Intent to Prosecute 45 The Microsoft Windows−Based Computer 46 General Guidelines To Follow 48 Cookies 50 Bookmarks/Favorites 53 Internet Explorer's History Buffer 54 Temporary Storage on the Hard Drive 55 Temporary Internet Files 56 System Registry 57 Enabling and Using Auditing via the Windows Operating System 61 Confiscation of Computer Equipment 65 Other Methods of Covert Monitoring 66 Chapter 4: Basics of Internet Abuse: What is Possible and Where to Look Under the Hood 68 Terms 68 Types of Users 69 E−Mail Tracking 69 IP Address Construction 69 Browser Tattoos 69 How an Internet Search works 70 Swap Files 74 ISPs 75 Servers 75 Works Cited 75 Chapter 5: Tools of the Trade: Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation 77 Overview 77 Detection Tools 77 Protection Tools 84 Analysis Tools 87 Chapter 6: Network Intrusion Management and Profiling 91 Overview 91 Common Intrusion Scenarios 91 Intrusion Profiling 95 Creating the Profile 96 Conclusion 103 ii Table of Contents Chapter 7: Cyber Forensics and the Legal System 105 Overview 105 How the System Works 105 Issues of Evidence 106 Hacker, Cracker, or Saboteur 108 Best Practices 115 Notes 115 Acknowledgments 116 Section II: Federal and International Guidelines 117 Chapter List 117 117 References 118 Chapter 8: Searching and Seizing Computers and Obtaining Electronic Evidence 118 Recognizing and Meeting Title III Concerns in Computer Investigations 123 Computer Records and the Federal Rules of Evidence 131 Proposed Standards for the Exchange of Digital Evidence 134 Recovering and Examining Computer Forensic Evidence 140 International Principles for Computer Evidence 141 Chapter 9: Computer Crime Policy and Programs 143 The National Infrastructure Protection Center Advisory 01−003 143 The National Information Infrastructure Protection Act of 1996 146 Distributed Denial of Service Attacks 157 The Melissa Virus 163 Cybercrime Privacy-preserving Digital Identity Management for Cloud Computing Elisa Bertino CS Department Purdue University West Lafayette, Indiana bertino@cs.purdue.edu Federica Paci CS Department Purdue University West Lafayette, Indiana paci@cs.purdue.edu Rodolfo Ferrini CS Department Purdue University West Lafayette, Indiana rferrini@purdue.edu Ning Shang CS Department Purdue University West Lafayette, Indiana nshang@cs.purdue.edu Abstract Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties (also called attributes) and past interaction histories. Such services should preserve the privacy of users, while at the same time enhancing interoperability across multiple domains and simplifying management of identity verification. In this paper we propose an approach addressing such requirements, based on the use of high-level identity verification policies expressed in terms of identity attributes, zero-knolwedge proof protocols, and semantic matching techniques. The paper describes the basic techniques we adopt and the architeture of a system developed based on these techniques, and reports performance experimental results. 1 Introduction Internet is not any longer only a communication medium but, because of the reliable, afforbable, and ubiquitous broadband access, is becoming a powerful computing platform. Rather than running software and managing data on a desktop computer or server, users are able to execute applications and access data on demand from the “cloud” (the Internet) anywhere in the world. This new computing paradigm is referred to as cloud computing. Examples of cloud computing applications are Amazon’s Simple Storage Service (S3), Elastic Computing Cloud (EC2) for storing photos on Smugmug an on line photo service, and Google Apps for word-processing. Cloud services make easier for users to access their personal information from databases and make it avail- able to services distributed across Internet. The availability of such information in the cloud is crucial to provide Copyright 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 1 better services to users and to authenticate users in case of services sensitive with respect to privacy and secu- rity. Users have typically to establish their identity each time they use a new cloud service, usually by filling out an online form and providing sensitive personal information (e.g., name, home address, credit card number, phone number, etc.). This leaves a trail of personal information that, if not properly protected, may be misused. Therefore, the development of digital identity management (IdM for short) systems suitable for cloud comput- ing is crucial. An important requirement is that users of cloud services must have control on which personal information is disclosed and how this information is used in order to minimize the risk of identity theft and fraud. Another major issue concerning IdM in cloud platforms is interoperability. Interoperability issues range from the use of different identity tokens, such those encoded in X.509 certificates and SAML assertions, and different identity negotiation protocols, such as the client-centric protocols and the Preserving Biodiversity Preserving Biodiversity Bởi: OpenStaxCollege Preserving biodiversity is an extraordinary challenge that must be met by greater understanding of biodiversity itself, changes in human behavior and beliefs, and various preservation strategies Measuring Biodiversity The technology of molecular genetics and data ... ecosystems, but they have some serious drawbacks 6/13 Preserving Biodiversity National parks, such as Grand Teton National Park in Wyoming, help conserve biodiversity (credit: Don DeBold) A simple measure... activity There are now 34 biodiversity hotspots ([link]) that contain large numbers of endemic species, which include half of Earth’s endemic plants 7/13 Preserving Biodiversity Conservation... preserves if the activities outside them are not altered to be less damaging to biodiversity Concept in Action 9/13 Preserving Biodiversity Check out this interactive global data system of protected