Andreas Happe
Austrian Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Andreas Happe.
ieee international conference on cloud computing technology and science | 2015
Thomas Loruenser; Andreas Happe; Daniel Slamanig
Cloud based collaboration gives rise to many new applications and business opportunities in both the private and the business domain. However, building such systems in a secure and robust manner is a challenging task. In this paper, we present a new architecture for secure cloud based data sharing called ARCHISTAR. It builds upon a distributed storage system and thus avoids any single point of trust or failure. Besides providing confidentiality of data, our focus is on availability and in particular on robustness against active attacks or failures. Our system provides full multi-user support and enables advanced sharing scenarios without complex key management and revocation mechanisms. We also present a prototype implementation of the ARCHISTAR system and discuss open issues.
international conference on innovative computing technology | 2016
Bob Duncan; Alfred Bratterud; Andreas Happe
Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of unikernel based systems. The main thrust of this paper is to discuss the key issues which need to be addressed, noting which of those might be covered by our proposed approach. We discuss how our proposed approach may help better address the key security issues we have identified.
ieee acm international conference utility and cloud computing | 2016
Bob Duncan; Andreas Happe; Alfred Bratterud
Cloud computing has been a great enabler for both the In-ternet of Things and Big Data. However, as with all newcomputing developments, development of the technology is usually much faster than consideration for, and development of, solutions for security and privacy. In a previous paper, we proposed that a unikernel solution could be used to improve security and privacy in a cloud scenario. In this paper, we outline how we might apply this approach to the Internet of Things, which can demonstrate an improvement over existing approaches.
availability, reliability and security | 2017
Andreas Happe; Florian Wohner; Thomas Lorünser
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost- and energy-efficient, cloud storages availability and data confidentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration of such a solution into existing legacy systems. This paper introduces the Archistar Backup Proxy which allows integration of multi-cloud storage into existing legacy enterprise computing landscapes by overloading the industry-standard Amazon S3 protocol. The paper provides multiple lessons-learned during implementation and concludes with a performance evaluation with traditional backup solutions utilizing redundant remote storage.
international quantum electronics conference | 2013
Thomas Lorünser; Andreas Happe; Andreas Poppe
In quantum communication experiments using entangled photon pairs far-distant measurement results are correlated on the sub-nanosecond level. For best performances the timing of the coincidence window and its width are critical. In contrast to lab experiments, where accurate timing could be adjusted easily by e.g. matched cable length, in distributed experiments a common clock more accurate than the coincidence time is requested by means of time stable synchronization channels or atom clocks synchronized by GPS. Synchronization of distant clocks is far from trivial. Efficient synchronization mechanisms are required to enable novel architectures like switched star shaped QKD-networks and facilitate quantum communication of a high number of potential users.
international workshop on security | 2016
Andreas Happe; Stephan Krenn; Thomas Lorünser
Multi-cloud storage is a viable alternative to traditional storage solutions. Recent approaches realize safe and secure solutions by combining secret-sharing with Byzantine fault-tolerant distribution schemes into safe and secure storage systems protecting a user against arbitrarily misbehaving storage servers.
The 2nd International Conference on Complexity, Future Information Systems and Risk | 2017
Andreas Happe; Bob Duncan; Alfred Bratterud
ACKNOWLEDGEMENTS This work was in part funded by the European Commission through grant agreement no 644962 (PRISMACLOUD).
Archive | 2017
Bob Duncan; Andreas Happe; Alfred Bratterud
Achieving cloud security is not a trivial problem to address. Developing and enforcing good cloud security controls are fundamental requirements if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel means of effectively and efficiently achieving these goals through the use of well-designed unikernel-based systems. We have identified a range of issues, which need to be dealt with properly to ensure a robust level of security and privacy can be achieved. We have addressed these issues in both the context of conventional cloud-based systems, as well as in regard to addressing some of the many weaknesses inherent in the Internet of things. We discuss how our proposed approach may help better address these key security issues which we have identified.
international workshop on security | 2016
Andreas Happe
Malicious clients in distributed storage networks. The presentation will be split up into two parts. In the initial part, we’re going to talk about distributed storage networks that use secret-sharing, and in the second part I’m going to introduce malicious clients, their possible attack vectors and how to protect against those attack vectors.
optical fiber communication conference | 2009
Momtchil Peev; Thomas Länger; Thomas Lorünser; Andreas Happe; Oliver Maurhart; Andreas Poppe; Thomas Theme
Collaboration
Dive into the Andreas Happe's collaboration.
Oslo and Akershus University College of Applied Sciences
View shared research outputs