Carlos Becker Westphall

Carlos Becker Westphall
Federal University of Santa Catarina | UFSC · Departamento de Informática e Estatística

Full Professor

About

327
Publications
690,155
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,340
Citations
Introduction
Carlos Becker Westphall is Full Professor (since 1993) in the Department of Informatics and Statistics at the Federal University of Santa Catarina - Brazil, where he acts as the leader of the Network and Management Laboratory. Obtained a degree in Electrical Engineering in 1985 and a M.Sc. degree in Computer Science in 1988, both at the Federal University of Rio Grande do Sul, Brazil. Obtained a D.Sc. degree in Computer Science at the Université Paul Sabatier, France, in 1991.
Additional affiliations
August 1993 - present
Federal University of Santa Catarina
August 1993 - present
Federal University of Santa Catarina
Position
  • Professor (Full)

Publications

Publications (327)
Article
Full-text available
Currently, the Internet of Things is spreading in all areas that apply computing resources. An important ally of the IoT is fog computing. It extends cloud computing and services to the edge of the network. Smart environments are becoming real and possible through IoT and fog computing. However, they are not free from security threats and vulnerabi...
Cover Page
Full-text available
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
Article
Full-text available
The COVID-19 pandemic has had a significant negative impact in all parts of the world. Although public healthcare system continues to play a vital role in restricting the spread of the virus, the strain on their resources and the manner in which they operate have become key issues that need to be addressed, with especial focus on the healthcare man...
Article
Full-text available
Due to Internet of Things devices resource limitations, security often does not receive enough attention. Intrusion detection approaches are important for identifying attacks and taking appropriate countermeasures for each specific threat. This work presents a two-step approach for intrusion detection and identification. The first step performs a t...
Conference Paper
Full-text available
Given the use of web applications on dynamic environments of cloudcomputing integrated with IoT devices, SQL injection and XSS (Cross-Site Scrip-ting) attacks continue to cause security problems. The detection of maliciousrequests on the application level is a research challenge that’s evolving by theuse of Machine Learning and neural network. This...
Conference Paper
Full-text available
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, t...
Conference Paper
Full-text available
IoT devices emerge to integrate devices (or "things") into the Internet, but with limited computational resources, thus IoT networks have been integrated into the cloud and fog paradigms. On the other hand, AI techniques have been shown to be efficient in several areas, especially for data classification and prediction. In this paper, it is propose...
Presentation
Full-text available
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. The development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge, according to previous studies. The pres...
Article
Full-text available
We introduce an Autonomic System to perform management of energy consumption in Internet of Things (IoT) devices and Fog Computing, including an advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cycles based on contextual information, like environmental co...
Preprint
Full-text available
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
Preprint
Full-text available
We introduce a system for Autonomic Management of Power Consumption in setups that involve Internet of Things (IoT) and Fog Computing. The Central IoT (CIoT) is a Fog Computing based solution to provide advanced orchestration mechanisms to manage dynamic duty cycles for extra energy savings. The solution works by adjusting Home (H) and Away (A) cyc...
Book
Full-text available
Welcome Messages from IEEE BigDataSE 2020 Program Chairs On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021. The IEEE BigDataSE 2020 Conference is a forum f...
Article
Full-text available
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. According to previous studies, the development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge. The pres...
Conference Paper
A escolha de qual protocolo de mensagem usar em uma aplicação IoT envolve vários fatores e certo número de experimentações. Este trabalho visa compartilhar informações sobre a montagem de uma ambiente de experimentação para protocolos de mensagem em IoT. Traz um descrição das tecnologias utilizadas na programação, como brokers e suporte a geração d...
Conference Paper
Soluções seguras para IoT e agronegócios são primordiais. Entretanto se faz necessária a adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco nos protocolos de mensagem pub/sub, nosso trabalho traz uma visão geral dos protocolos de mensagem AQMP, MQTT e STOMP, uma descrição de caso de uso de aplicação de segurança n...
Cover Page
Full-text available
Welcome Messages from IEEE BigDataSE 2020 Program Chairs On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021. The IEEE BigDataSE 2020 Conference is a foru...
Article
Full-text available
In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion de...
Preprint
Full-text available
Choose a message protocol to use in an IoT application involves several factors and a number of experiments. This work aims to share information about setting up an experimentation environment for IoT message protocols. It provides a description of the technologies used in programming, such as brokers and support for the generation of graphics. It...
Preprint
Full-text available
Secure solutions for IoT and agribusiness are critical. However, it is necessary to adopt the appropriate technology for the development of systems in this area. With a focus on pub/sub message protocols, our work provides an overview of the message protocols AQMP, MQTT and STOMP, a use case description of security application in agribusiness and a...
Article
Full-text available
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) an...
Article
Full-text available
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to multiple objectives represented by rules, qualifiers, and improvement cost, which can be easily modified and ext...
Article
Full-text available
The Internet of Things and Fog Computing are technologies currently used in many areas. They can be applied to provide a residential automation environment, for example, fire alarm applications, gas leak alarms, among others. Security-related searches for these fog-based environments are still in the early stages. Also, the fact that these environm...
Article
Full-text available
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The auto...
Conference Paper
Full-text available
With the increasing advancement of services on the Internet, due to the strengthening of cloud computing, the exchange of data between providers and users is intense. Management of access control and applications need data to identify users and/or perform services in an automated and more practical way. Applications have to protect access to data c...
Conference Paper
Full-text available
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing em...
Conference Paper
Full-text available
Fog Computing is an area of Computer Science that is under constant construction and evolution, and in conjunction with information security, the paradigm becomes more reliable and secure for IoT’s edge platforms. The authentication of restricted memory devices has major problems because memory consumption is high when applied with other models tha...
Presentation
Full-text available
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Throug...
Preprint
Full-text available
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
Preprint
Full-text available
We introduce a method for Intrusion Detection based on the classification, understanding and prediction of behavioural deviance and potential threats, issuing recommendations, and acting to address eminent issues. Our work seeks a practical solutions to automate the process of identification and response to Cybersecurity threats in hybrid Distribut...
Cover Page
Full-text available
Welcome Message! On behalf of the Organizing Committee, we are honored and delighted to welcome you to the 7th International Conference on Computing, Communications and Informatics (ICACCI'18), Bangalore, India. Bangalore, officially known as Bengaluru is the capital of the Indian state of Karnataka. Bangalore is popularly known as the ‘Silicon Va...
Conference Paper
Full-text available
Várias evoluções de paradigmas foram propostas nos últimos anos. Fog Computing é uma área da Ciência da Computação que está em construção e constante evolução, e em conjunto com a segurança da informação, o paradigma se torna mais confiável e seguro para as plataformas da borda do IoT. Os quesitos de segurança são de difícil alcance em ambientes com...
Book
Full-text available
Os principais problemas associados à implementação e uso da gerência de redes e serviços ocorrem devido à grande quantidade de proposições, padrões e de diferentes produtos oferecidos no mercado, dificultando consideravelmente a tomada de decisão no que se refere a utilização da abordagem de gerência de redes e serviços mais adequada. Além disso, n...
Presentation
Full-text available
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the ”the guardian” reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT a...
Presentation
Full-text available
Serviços de cloud estão sempre “ligados,” e são acessíveis globalmente, assim as “coisas” podem ser localizadas em qualquer lugar, podem ser móveis, podem transmitir dados diferentes em momentos diferentes. Serviços de cloud tem escalabilidade, o que é bom em IoT já que muitas “coisas” podem se comunicar com velocidades diferentes em momentos difer...
Presentation
Full-text available
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva...
Book
Full-text available
These proceedings contain papers selected for presentation at the 5th International Symposium on Security in Computing and Communications (SSCC’17). SSCC aims to provide the most relevant opportunity to bring together researchers and practitioners from both academia and industry to exchange their knowledge and discuss their research findings. The s...
Presentation
Full-text available
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elem...
Book
Full-text available
The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for further development, and evaluations of potential directions. The event targeted to bring together academia, researc...
Book
Full-text available
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ICWMC 2017 addressed wireless related topics concerning integration of latest technological adv...
Article
Full-text available
With the rise of cloud computing, thousands of users and multiple applications have sought to communicate with each other, exchanging sensitive data. Thus, for effectively managing applications and resources, the use of models and tools is essential for the secure management of identities and to avoid compromising data privacy. There are models and...
Conference Paper
Full-text available
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques; however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In additio...
Book
Full-text available
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing. The main tracks referred to the general concepts of systems automation,...
Conference Paper
Full-text available
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could repre...
Presentation
Full-text available
Abstract—In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), co...
Presentation
Full-text available
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machine...
Book
Full-text available
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research top...
Book
Full-text available
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identif...
Article
Full-text available
By taking two distinct Diophantine equations with distinct large prime numbers and two different coordinates , two secret keys are generated at the same time so that two users can encrypt their messages / plaintext. Hence two sets of public key exponents with one set of private key exponents were the result of proposed algorithm.
Presentation
Full-text available
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
Article
Full-text available
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This paper proposes an approach to model the load flow through abstract and concrete cloud components using double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assi...
Book
Full-text available
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ICWMC 2016 addressed wireless related topics concerning integration of latest technological...
Book
Full-text available
The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held on August 21 - 25, 2016 in Rome, Italy, continued a series of events covering a broad spectrum of systems and networks related topics. We welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of...
Article
Full-text available
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known...
Conference Paper
Abstract—Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute actions upon the environment, seeking goals such as the environment optimization and service level agreemen...
Article
Full-text available
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes...
Conference Paper
Full-text available
This paper presents the implementation and tests of a flexible and extensible framework, named Order@Cloud, that improves the Virtual Machine placements of a Cloud. It receives new VMs on the Cloud and organises them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualif...
Book
Full-text available
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open iss...
Conference Paper
Full-text available
This paper proposes a flexible framework to improve the quality of Virtual Machine's placements, in Clouds. It organises them by relocating the VMs based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers, and Costs, which can be extended and prioritised. Based on Evolutionary Searches, the framewor...
Conference Paper
Full-text available
Due scale and dynamism of Cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to model the load flow in cloud components using a double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the...
Book
Full-text available
The Fifteenth International Conference on Networks (ICN 2016), held between February 21- 25, 2016 in Lisbon, Portugal continued a series of events focusing on the advances in the field of networks. ICN 2016 welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such a...
Presentation
Full-text available
T2. Clouds and Security: A Scrutinized Marriage Presenters: Prof. Dr. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Prof. Dr. Carla Merkle Westphall, Federal University of Santa Catarina, Brazil Introduction Motivation Cloud security challenges and problems Basic concepts Cloud computing Security Cloud Security Concerns Iden...