Security Enhancements for a User-Controlled Lightpath Provisioning System

被引:0
|
作者
Wu, Jing [1 ]
Savoie, Michel [1 ]
Zhang, Hanxi [1 ]
Campbell, Scott [1 ]
机构
[1] Commun Res Ctr, 3701 Carling Ave, Ottawa, ON K2H 8S2, Canada
关键词
Network Management Software; Distributed Software Security; User-Controlled Lightpath Provisioning;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User owned and managed optical networks offer new benefits compared to carrier networks. There are basically two types of user owned and managed optical networks: metro dark fibre networks and long-haul wavelength networks. A user-controlled lightpath provisioning system is designed to address the network management challenges, where only the customer has complete visibility of its own network and no provider can see all the network elements. The prototyped management software has a service-oriented architecture and uses the Jini and JavaSpaces technologies. Within one management system for a federation, there are six key components: a Jini Lookup Service, an instance of JavaSpaces; for storage of Light Path Objects (LPOs), a Jini Service Access Point (SAP), an LPO service, an instance of switch communication service for each switch in the transport layer and a Grid SAP. Since the new management system is a distributed system and the new management system may be deployed over a public Internet infrastructure, secure access to the management modules is required. The application of existing system security technologies to the new management system is analyzed. To securely transfer objects across a network, SSL is used to encrypt RMI data streams and thus data streams between Jini services. To securely execute a dynamically downloaded Java class, Jini adopts the Java security model. To securely use a dynamically downloaded proxy to communicate to a remote service, Jini Extensible Remote Invocation is implemented to support security features such as invocation constraints, remote method control, and the trust verification model.
引用
收藏
页码:634 / +
页数:2
相关论文
共 50 条
  • [31] User-controlled resource management in federated clouds
    Mosch, Marc
    Gross, Stephan
    Schill, Alexander
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2014, 3 (03): : 1 - 18
  • [32] Woodification: User-Controlled Cambial Growth Modeling
    Kratt, J.
    Spicker, M.
    Guayaquil, A.
    Fiser, M.
    Pirk, S.
    Deussen, O.
    Hart, J. C.
    Benes, B.
    COMPUTER GRAPHICS FORUM, 2015, 34 (02) : 361 - 372
  • [33] User-controlled Form Adaptation by Unsupervised Learning
    Eloi, Diego
    Sahraoui, Alaa
    Vanderdonckt, Jean
    Leiva, Luis A.
    ADJUNCT PROCEEDINGS OF THE 13TH NORDIC CONFERENCE ON HUMAN-COMPUTER INTERACTION, NORDICHI 2024, 2024,
  • [34] Performance Portability of Earth System Models with User-Controlled GGDML Code Translation
    Jum'ah, Nabeeh
    Kunkel, Julian
    HIGH PERFORMANCE COMPUTING, ISC HIGH PERFORMANCE 2018, 2018, 11203 : 693 - 710
  • [35] Bidirectional Lightpath Provisioning in GMPLS-Controlled Optical Networks
    Andriolli, N.
    Giorgetti, A.
    Ruepp, S.
    Buron, J.
    Valcarenghi, L.
    Castoldi, P.
    2008 INTERNATIONAL CONFERENCE ON PHOTONICS IN SWITCHING, 2008, : 118 - +
  • [36] USER-CONTROLLED MULTIRESOLUTION MODELING OF POLYGONAL MODELS
    Hussain, Muhammad
    Okada, Yoshihiro
    Niijima, Koichi
    COMPUTER VISION AND GRAPHICS (ICCVG 2004), 2006, 32 : 125 - 130
  • [37] User-controlled passive needle retraction speed
    不详
    NURSE PRACTITIONER, 2010, 35 (08): : 14 - 14
  • [38] User-Controlled Hybrid Recommendation for Academic Papers
    Rahdari, Behnam
    Brusilovsky, Peter
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES: COMPANION (IUI 2019), 2019, : 99 - 100
  • [39] Behaviourally rich actions for user-controlled characters
    Gillies, M
    Dodgson, NA
    COMPUTERS & GRAPHICS-UK, 2004, 28 (06): : 945 - 954
  • [40] A Study of User-Controlled Robot Simulation on Augmented Reality
    Jung, Hoe-Jun
    Park, Dea-Woo
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2012, 310 : 582 - 587