狠狠撸shows by User: shankarlal3
/
http://www.slideshare.net/images/logo.gif狠狠撸shows by User: shankarlal3
/
Tue, 30 May 2017 08:34:22 GMT狠狠撸Share feed for 狠狠撸shows by User: shankarlal3Assuring VNF image integrity and host sealing in telco cloud
/shankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloud
presentation-170530083422 In Telco cloud environment, virtual network functions
(VNFs) can be shipped in the form of virtual machine
images and hosted over commodity hardware. It is likely that
these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.]]>
In Telco cloud environment, virtual network functions
(VNFs) can be shipped in the form of virtual machine
images and hosted over commodity hardware. It is likely that
these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.]]>
Tue, 30 May 2017 08:34:22 GMT/shankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloudshankarlal3@slideshare.net(shankarlal3)Assuring VNF image integrity and host sealing in telco cloudshankarlal3In Telco cloud environment, virtual network functions
(VNFs) can be shipped in the form of virtual machine
images and hosted over commodity hardware. It is likely that
these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.<img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=120&height=120&fit=bounds" /><br> In Telco cloud environment, virtual network functions
(VNFs) can be shipped in the form of virtual machine
images and hosted over commodity hardware. It is likely that
these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.
]]>
2133https://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=120&height=120&fit=boundspresentationBlackhttp://activitystrea.ms/schema/1.0/posthttp://activitystrea.ms/schema/1.0/posted0techniques for removing smallest Stopping sets in LDPC codes
/slideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400
internshipreport-160329144112 I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.]]>
I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.]]>
Tue, 29 Mar 2016 14:41:12 GMT/slideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400shankarlal3@slideshare.net(shankarlal3)techniques for removing smallest Stopping sets in LDPC codesshankarlal3I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.<img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=120&height=120&fit=bounds" /><br> I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.
]]>
3266https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=120&height=120&fit=boundsdocumentBlackhttp://activitystrea.ms/schema/1.0/posthttp://activitystrea.ms/schema/1.0/posted0Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Traces
/slideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760
template-160329140854 Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Tue, 29 Mar 2016 14:08:54 GMT/slideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760shankarlal3@slideshare.net(shankarlal3)Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Tracesshankarlal3Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.<img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=120&height=120&fit=bounds" /><br> Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of
misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
]]>
1757https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=120&height=120&fit=boundsdocumentBlackhttp://activitystrea.ms/schema/1.0/posthttp://activitystrea.ms/schema/1.0/posted0Privacy Preserving Log File Processing in Mobile Network Environment
/slideshow/privacy-preserving-log-file-processing-in-mobile-network-environment/57607861
thesis-presentation-160128144251 Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Thu, 28 Jan 2016 14:42:51 GMT/slideshow/privacy-preserving-log-file-processing-in-mobile-network-environment/57607861shankarlal3@slideshare.net(shankarlal3)Privacy Preserving Log File Processing in Mobile Network Environmentshankarlal3Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.<img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thesis-presentation-160128144251-thumbnail.jpg?width=120&height=120&fit=bounds" /><br> Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
]]>
5098https://cdn.slidesharecdn.com/ss_thumbnails/thesis-presentation-160128144251-thumbnail.jpg?width=120&height=120&fit=boundspresentationBlackhttp://activitystrea.ms/schema/1.0/posthttp://activitystrea.ms/schema/1.0/posted0https://cdn.slidesharecdn.com/profile-photo-shankarlal3-48x48.jpg?cb=1590570802鈫� Experienced in IT Security (SSCP certified)
鈫� Experience in working with virtualized environments (AWS, KVM, VirtualBox, Docker)
鈫� Good knowledge in scripting and programming languages (Python, Bash)
鈫� Quick learner who strives to increase his knowledge and enjoys learning new technological developments.http://www.about.me/shankar.lalhttps://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=320&height=320&fit=boundsshankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloudAssuring VNF image int...https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=320&height=320&fit=boundsslideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400techniques for removin...https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=320&height=320&fit=boundsslideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760Utilisation of l-Diver...