Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Figure 1 OctopusViz architecture. 4.2. Proposed Environment Architecture As a fundamental requirement, and for security and privacy reasons, the environment should ensure that the source of the collection is anonymous in order to not create an opportunity for data change trends or the possibility of influencing the data source. Therefore, one of the ways to achieve this requirement is by using a VPN, so that any collecting sources are not easily identified, avoiding the risk of data contamination by the source. Figure 1 shows the proposed environment’s architecture. The environment’s physical architecture employs a host connected in a Demilitarized Zone (DMZ) and to a protected network of the University of Brasilia (UnB) Research Laboratory. In this host, there are three virtual machines.
Discover breakthrough research and expand your academic network
Join for free