Security Enhancements for a User-Controlled Lightpath Provisioning System

被引:0
|
作者
Wu, Jing [1 ]
Savoie, Michel [1 ]
Zhang, Hanxi [1 ]
Campbell, Scott [1 ]
机构
[1] Commun Res Ctr, 3701 Carling Ave, Ottawa, ON K2H 8S2, Canada
关键词
Network Management Software; Distributed Software Security; User-Controlled Lightpath Provisioning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User owned and managed optical networks offer new benefits compared to carrier networks. There are basically two types of user owned and managed optical networks: metro dark fibre networks and long-haul wavelength networks. A user-controlled lightpath provisioning system is designed to address the network management challenges, where only the customer has complete visibility of its own network and no provider can see all the network elements. The prototyped management software has a service-oriented architecture and uses the Jini and JavaSpaces technologies. Within one management system for a federation, there are six key components: a Jini Lookup Service, an instance of JavaSpaces; for storage of Light Path Objects (LPOs), a Jini Service Access Point (SAP), an LPO service, an instance of switch communication service for each switch in the transport layer and a Grid SAP. Since the new management system is a distributed system and the new management system may be deployed over a public Internet infrastructure, secure access to the management modules is required. The application of existing system security technologies to the new management system is analyzed. To securely transfer objects across a network, SSL is used to encrypt RMI data streams and thus data streams between Jini services. To securely execute a dynamically downloaded Java class, Jini adopts the Java security model. To securely use a dynamically downloaded proxy to communicate to a remote service, Jini Extensible Remote Invocation is implemented to support security features such as invocation constraints, remote method control, and the trust verification model.
引用
收藏
页码:634 / +
页数:2
相关论文
共 50 条
  • [21] Anonymous attestation with user-controlled linkability
    D. Bernhard
    G. Fuchsbauer
    E. Ghadafi
    N. P. Smart
    B. Warinschi
    International Journal of Information Security, 2013, 12 : 219 - 249
  • [22] THE CASE FOR THE USER-CONTROLLED MICRO COMPUTER
    GRAND, J
    JOURNAL OF SYSTEMS MANAGEMENT, 1981, 32 (09): : 34 - 34
  • [23] User-Controlled Variable Impedance Teleoperation
    Walker, Daniel S.
    Wilson, Robert P.
    Niemeyer, Guenter
    2010 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2010, : 5352 - 5357
  • [24] MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency
    Akshatha, P. S.
    Kumar, S. M. Dilip
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (04):
  • [25] An automaton model of user-controlled navigation on the web
    Lodaya, K
    Ramanujam, R
    IMPLEMENTATION AND APPLICATION OF AUTOMATA, 2001, 2088 : 208 - 216
  • [26] Satisfaction and illuminances set with user-controlled lighting
    Uttley, James
    Fotios, Steve
    Cheal, Chris
    ARCHITECTURAL SCIENCE REVIEW, 2013, 56 (04) : 306 - 314
  • [27] User-Controlled Content Translation in Social Media
    Gupta, Ananya
    26TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES (IUI '21 COMPANION), 2021, : 96 - 98
  • [28] Towards a user-controlled software renovation factory
    Brunekreef, J
    Diertens, B
    PROCEEDINGS OF THE THIRD EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, 1999, : 83 - 90
  • [29] Towards a user-controlled software renovation factory
    Brunekreef, J
    Diertens, B
    SCIENCE OF COMPUTER PROGRAMMING, 2002, 45 (2-3) : 175 - 191
  • [30] Personal Responsibility in the Age of User-Controlled Neuroprosthetics
    Brown, Timothy
    Moore, Patrick
    Herron, Jeffrey
    Thompson, Margaret
    Bonaci, Tamara
    Chizeck, Howard
    Goering, Sara
    2016 IEEE INTERNATIONAL SYMPOSIUM ON ETHICS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ETHICS), 2016,