狠狠撸shows by User: shankarlal3 / http://www.slideshare.net/images/logo.gif 狠狠撸shows by User: shankarlal3 / Tue, 30 May 2017 08:34:22 GMT 狠狠撸Share feed for 狠狠撸shows by User: shankarlal3 Assuring VNF image integrity and host sealing in telco cloud /shankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloud presentation-170530083422
In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.]]>

In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.]]>
Tue, 30 May 2017 08:34:22 GMT /shankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloud shankarlal3@slideshare.net(shankarlal3) Assuring VNF image integrity and host sealing in telco cloud shankarlal3 In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.
Assuring VNF image integrity and host sealing in telco cloud from Shankar Lal
]]>
213 3 https://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
techniques for removing smallest Stopping sets in LDPC codes /slideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400 internshipreport-160329144112
I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.]]>

I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.]]>
Tue, 29 Mar 2016 14:41:12 GMT /slideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400 shankarlal3@slideshare.net(shankarlal3) techniques for removing smallest Stopping sets in LDPC codes shankarlal3 I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I developed the LDPC code on matlab to remove small stopping sets which effect the error floor on communication channels.
techniques for removing smallest Stopping sets in LDPC codes from Shankar Lal
]]>
326 6 https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Traces /slideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760 template-160329140854
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>

Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Tue, 29 Mar 2016 14:08:54 GMT /slideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760 shankarlal3@slideshare.net(shankarlal3) Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Traces shankarlal3 Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of Network Traces from Shankar Lal
]]>
175 7 https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy Preserving Log File Processing in Mobile Network Environment /slideshow/privacy-preserving-log-file-processing-in-mobile-network-environment/57607861 thesis-presentation-160128144251
Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>

Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.]]>
Thu, 28 Jan 2016 14:42:51 GMT /slideshow/privacy-preserving-log-file-processing-in-mobile-network-environment/57607861 shankarlal3@slideshare.net(shankarlal3) Privacy Preserving Log File Processing in Mobile Network Environment shankarlal3 Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thesis-presentation-160128144251-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Noise addition for anonymisation is a known technique for increasing the privacy of a data sets. However this technique is often presented as individual and independent, or, just stated as techniques to be applied. This increases the danger of misapplication of these techniques and a resulting anonymised data set that is open to relatively easy re-identification or reconstruction. To better understand the application of these techniques we demonstrate their application to a specific domain - that of network trace anonymisation.
Privacy Preserving Log File Processing in Mobile Network Environment from Shankar Lal
]]>
509 8 https://cdn.slidesharecdn.com/ss_thumbnails/thesis-presentation-160128144251-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-shankarlal3-48x48.jpg?cb=1590570802 鈫� Experienced in IT Security (SSCP certified) 鈫� Experience in working with virtualized environments (AWS, KVM, VirtualBox, Docker) 鈫� Good knowledge in scripting and programming languages (Python, Bash) 鈫� Quick learner who strives to increase his knowledge and enjoys learning new technological developments. http://www.about.me/shankar.lal https://cdn.slidesharecdn.com/ss_thumbnails/presentation-170530083422-thumbnail.jpg?width=320&height=320&fit=bounds shankarlal3/assuring-vnf-image-integrity-and-host-sealing-in-telco-cloud Assuring VNF image int... https://cdn.slidesharecdn.com/ss_thumbnails/internshipreport-160329144112-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/techniques-for-removing-smallest-stopping-sets-in-ldpc-codes/60169400 techniques for removin... https://cdn.slidesharecdn.com/ss_thumbnails/template-160329140854-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/utilisation-of-ldiversity-and-differential-privacy-in-the-anonymisation-of-network-traces/60167760 Utilisation of l-Diver...