2015 IEEE Trustcom/BigDataSE/ISPA

Size: px
Start display at page:

Download "2015 IEEE Trustcom/BigDataSE/ISPA"

Transcription

1 2015 IEEE Trustcom/BigDataSE/ISPA Helsinki, Finland August 2015 Volume 1 Pages IEEE Catalog Number: ISBN: CFP15TRU-POD /4

2 2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs...xx Message from the IEEE TrustCom 2015 Program Chairs...xxi TrustCom 2015 Organizing Committee...xxii TrustCom 2015 and RATSP 2015 Program Committee...xxiii TrustCom 2015 External Reviewers...xxviii Message from the RATSP 2015 Symposium Chairs...xxix Message from the Workshop Chairs of IEEE TSCloud xxx TSCloud 2015 Organizing and Program Committees...xxxi Message from the TrustSoft 2015 Workshop Chairs...xxxii TrustSoft 2015 Organizing and Program Committees...xxxiii Message from the IW5GS 2015 Workshop Chairs...xxxiv IW5GS Organizing and Program Committees...xxxv Message from the SpaIoT 2015 Workshop Chairs...xxxvi SpaIoT 2015 Organizing and Program Committees...xxxvii Message from the TrustWSN 2015 Workshop Chairs...xxxviii Message from the UbiSafe 2015 Workshop Chairs UbiSafe 2015 Organizing and Program Committees...xl Keynote Abstracts...xli Organizers, Patrons, and Partners...xlviii 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications TrustCom Trust Track 1: Trust Evaluation, Reputation and Recommender Systems DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics...1 Huanyang Zheng and Jie Wu CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management...9 Wei Tang and Zheng Yan v

3 Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags...17 Jiageng Chen, Atsuko Miyaj, Hiroyuki Sato, and Chunhua Su Trust Evaluation in Mobile Devices: An Empirical Study...25 Richard Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, and Justin Cappos Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor...33 Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, and Zhiyong Feng TrustCom Trust Track 2: Trusted Environments TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone...41 Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, and Dengguo Feng On Rehoming the Electronic ID to TEEs...49 Sandeep Tamrakar, Jan-Erik Ekberg, and Pekka Laitinen Trusted Execution Environment: What It is, and What It is Not...57 Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface...65 Mordechai Guri, Yuri Poliak, Bracha Shapira, and Yuval Elovici Performance of Cooperative Firewalls in Real-World Deployments...74 Nishant Patanaik and Ana Goulart TrustCom Trust Track 3: Trust in Wireless and Sensor Networks Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents...82 Po-Hung Yang and Sung-Ming Yen Mobility Increases the Risk of Malware Propagations in Wireless Networks...90 Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, and Tom H. Luan Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks...96 Ming Xiang, William Liu, Quan Bai, and Adnan Al-Anbuky Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks Weidong Yang, Le Xiao, Limin Sun, and Qing Li Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures Chuanyou Li, Michel Hurfin, and Yun Wang TrustCom Trust Track 4: Trust in Social and Cloud Computing Contextual Sub-network Extraction in Contextual Social Networks Xiaoming Zheng, Yan Wang, and Mehmet A. Orgun Trust-Based Formal Delegation Framework for Enterprise Social Networks Ahmed Bouchami, Olivier Perrin, and Ehtesham Zahoor vi

4 Trust-Aware Elastic Social Compute Units Mirela Riveni, Hong-Linh Truong, and Schahram Dustdar Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, and Minghui Zheng TrustCom Security Track 1: Key Management Research on Key Management for Multi-privileged Group Communications Wei Zhou, Yang Xu, and Guojun Wang Attainable Unconditional Security for Shared-Key Cryptosystems Fabrizio Biondi, Thomas Given-Wilson, and Axel Legay Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability Keita Emura, Le Trieu Phong, and Yohei Watanabe RFID Secure Application Revocation for IoT in 5G Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, and Yintang Yang TrustCom Security Track 2: Software and OS Security Identifying Unknown Android Malware with Feature Extractions and Classification Techniques Ludovic Apvrille and Axelle Apvrille Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, and Qingkai Zeng Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche, Amaury Lendasse, and Juha Karhunen A First Look at Android Malware Traffic in First Few Minutes Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, and Jin Li Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware Marian Kühnel, Manfred Smieschek, and Ulrike Meyer TrustCom Security Track 3: Data and Application Security Secure Block Device Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems Daniel Hein, Johannes Winter, and Andreas Fitzek A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection Jing Long, Dafang Zhang, Wei Liang, and Wenwei Li Big Data Analytics for Detecting Host Misbehavior in Large Logs Daniel Gonçalves, João Bota, and Miguel Correia DPBSV An Efficient and Secure Scheme for Big Sensing Data Stream Deepak Puthal, Surya Nepal, Rajiv Ranjan, and Jinjun Chen vii

5 Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based Development Brahim Hamid TrustCom Security Track 4: Network Security RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries Yue-Bin Luo, Bao-Sheng Wang, Xiao-Feng Wang, Xiao-Feng Hu, Gui-Lin Cai, and Hao Sun MimicHunter: A General Passive Network Protocol Mimicry Detection Framework Zigang Cao, Gang Xiong, and Li Guo An Analysis of TLS Handshake Proxying Douglas Stebila and Nick Sullivan How to Misuse SMTP over TLS: A Study of the (In) Security of Server Communication Lars Baumgäertner, Jonas Höchst, Matthias Leinweber, and Bernd Freisleben TrustCom Security Track 5: Network Security Unsupervised Feature Selection Method for Intrusion Detection System Mohammed A. Ambusaidi, Xiangjian He, and Priyadarsi Nanda Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach Jiaojiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, and Yang Xiang An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking Rui Wang, Zhiping Jia, and Lei Ju A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, and Ren Ping Liu TrustCom Security Track 6: Information Security Surveys of Daily Information Security of Citizens in Finland Jukka A. Koskinen Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, and Shyi-Ming Chen Diversifying SQL to Prevent Injection Attacks Sampsa Rauti, Jukka Teuhola, and Ville Leppänen Information Security Awareness in Educational Institution: An Analysis of Students Individual Factors Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni Isoaho TrustCom Security Track 7: Authentication and Crypto A Hybrid Mobile Authentication Model for Ubiquitous Networking Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed Alhabeeb, and Waleed Alfehaid viii

6 Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records Sufian Hameed, Usman Murad Jamali, and Adnan Samad An Instruction-Set Randomization Using Length-Preserving Permutation Jianming Fu, Xu Zhang, and Yan Lin Cut-and-Choose Bilateral Oblivious Transfer and Its Application Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, and Minghao Zhao A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography Chaohui Du and Guoqiang Bai TrustCom Security Track 8: Secure Environments Open-TEE An Open Virtual Trusted Execution Environment Brian McGillion, Tanel Dettenborn, Thomas Nyman, and N. Asokan Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor Julian Horsch and Sascha Wessel NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive Requirements Nuno Teodoro, Luís Gonçalves, and Carlos Serrão A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management Sivadon Chaisiri, Ryan K. L. Ko, and Dusit Niyato TrustCom Security Track 9: Cloud Security Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, and Junquan Deng Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds Kenichi Kourai and Tatuya Kajiwara Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud Chang Liu, Liehuang Zhu, and Jinjun Chen Achieving Lightweight and Secure Access Control in Multi-authority Cloud Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, and Fangfang Shan TrustCom Security Track 10: IoT and Wireless Security, Heterogeneous Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus Guowei Wu, Jie Wang, and Lin Yao ix

7 Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, and Keith Mayes On Using a Von Neumann Extractor in Heart-Beat-Based Security Robert Mark Seepers, Christos Strydis, Ioannis Sourdis, and Chris Innocentius De Zeeuw TrustCom Privacy Track 2: User Privacy WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems Li Lu, Muhammad Jawad Hussain, and Hongzi Zhu Effects of Contextual Properties on Users Privacy Preferences in Mobile Computing Environments Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, and Daeseon Choi Private Membership Test for Bloom Filters Tommi Meskanen, Jian Liu, Sara Ramezanian, and Valtteri Niemi You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, and Sasu Tarkoma TrustCom Privacy Track 3: Location Privacy and others A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks Matthew Bradbury, Matthew Leeke, and Arshad Jhumka Time Distortion Anonymization for the Publication of Mobility Data with High Utility Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, and Lionel Brunie Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection Ian Oliver and Silke Holtmanns Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, and Juru Zeng TrustCom Privacy Track 4: Data Privacy Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud Mark A. Will, Ryan K. L. Ko, and Ian H. Witten PEAS: Private, Efficient and Accurate Web Search Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, and Harald Kosch Privacy-Preserving Mining of Frequent Routes in Cellular Network Data Olof Görnerup, Nima Dokoohaki, and Andrea Hess ucentive: An Efficient, Anonymous and Unlinkable Incentives Scheme Milica Milutinovic, Italo Dacosta, Andreas Put, and Bart De Decker x

8 TrustCom Privacy Track 5: Identity Privacy (l1,..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers Yuichi Sei, Takao Takenouchi, and Akihiko Ohsuga Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid Neetesh Saxena, Bong Jun Choi, and Shinyoung Cho A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram, and Konstantinos Markantonakis Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces Takao Murakami, Atsunori Kanemura, and Hideitsu Hino The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP) RATSP Trust Track 1 Provenance-Based Attestation for Trustworthy Computing Jiun Yi Yap and Allan Tomlinson A Framework for Evaluating the End-to-End Trustworthiness Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis, and Thorsten Weyer Trusted Tamper-Evident Data Provenance Mohammad M. Bany Taha, Sivadon Chaisiri, and Ryan K. L. Ko Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference Igor Kotenko, Igor Saenko, and Sergey Ageev RATSP Trust Track 2 Trust Metrics Based on a Trusted Network Element Jouni Hiltunen and Jarkko Kuusijärvi Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis Zhengping Wu and Lifeng Wang Formal Modeling and Verification of Opportunity-enabled Risk Management Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, and Jonathan Guislain xi

9 RATSP Trust Track 3 Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous Networks Andrew Bolster and Alan Marshall RLTE: A Reinforcement Learning Based Trust Establishment Model Abdullah Aref and Thomas Tran In Certificates We Trust Revisited Florian Reimair, Peter Teufl, and Bernd Prünster Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data Networking Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, and Hiroshi Shigeno RATSP Trust Track 4 Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, and Elisa Bertino Trust-Aware Review Spam Detection Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks Ester López and Leandro Navarro Inferring User Actions from Provenance Logs Xin Li, Chaitanya Joshi, Alan Yu Shyang Tan, and Ryan Kok Leong Ko RATSP Security Track 1 Data Mobility Management Model for Active Data Cubes Thanh Dat Dang, Doan Hoang, and Priyadarsi Nanda BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, and Shigeki Goto Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection Nada Alruhaily, Behzad Bordbar, and Tom Chothia A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models Subil Abraham and Suku Nair eskami: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid Mourad Benmalek and Yacine Challal RATSP Security Track 2 Implementing Authentication Systems Based on Physical Unclonable Functions John Ross Wallrabenstein xii

10 Save Our Passwords Martin Boonk, Ronald Petrlic, and Christoph Sorge Partial Data Protection via Structure-Preserving Document Partitioning Luigi Lo Iacono Enhancing EMV Online PIN Verification Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, and Keith Mayes A Formalization of Fingerprinting Techniques Fabian Lanze, Andriy Panchenko, and Thomas Engel RATSP Security Track 3 Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey Andreev, and Yevgeni Koucheryavy A Secure Northbound Interface for SDN Applications Christian Banse and Sathyanarayanan Rangarajan Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks Yuri Ohata, Sayaka Umeda, Takashi Kamimoto, and Hiroshi Shigeno A Study of IEEE Association Protocols Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, and Zheng Yan RATSP Security Track 4 Access Control for the Cloud Based on Multi-device Authentication L. Gonzalez-Manzano, J.M. de Fuentes, and A. Orfila Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, and Claude Godart RESCUE: Resilient Secret Sharing Cloud-Based Architecture Elochukwu Ukwandu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo On the Resource Consumption of Secure Data Sharing Holger Kuehner and Hannes Hartenstein Secure Location Validation with Wi-Fi Geo-fencing and NFC Maksim Avdyushkin and Musfiq Rahman RATSP Security Track 5 Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators Dongxi Liu and John Zic A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos Gyan Singh Yadav and Aparajita Ojha xiii

11 Detecting Data Semantic: A Data Leakage Prevention Approach Sultan Alneyadi, Elankayer Sithirasenan, and Vallipuram Muthukkumarasamy A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, and Jingning Liu CaptureMe: Attacking the User Credential in Mobile Banking Applications Mohamed El-Serngawy and Chamseddine Talhi RATSP Privacy Track 1 Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure Zakaria Sahnoune, Esma Aïmeur, Ghada El Haddad, and Rodrigue Sokoudjou Disequilibrium: Tor s Exit Node Selection under the Stereoscope Robert Koch, Mario Golling, and Gabi Dreo Rodosek Extended Model of Side-Information in Garbling Tommi Meskanen, Valtteri Niemi, and Noora Nieminen A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users Ahmad Sabouri Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So? Vladimir Estivill-Castro and David F. Nettleton RATSP Privacy Track 2 Stylometric Anonymity: Is Imitation the Best Strategy? Mahmoud Khonji and Youssesf Iraqi k-anonymity: Risks and the Reality Anirban Basu, Toru Nakamura, Seira Hidano, and Shinsaku Kiyomoto A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device Dali Zhu, Zheming Fan, and Na Pang The Pseudonym Broker Privacy Pattern in Medical Data Collection Christiaan Hillen Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, and Tansu Alpcan RATSP Privacy Track 3 DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, and Te-En Wei Secure Two-Party Rank Correlation Computations for Recommender Systems Kok-Seng Wong, Minjie Seo, and Myung Ho Kim The Role of Risk Perceptions in Privacy Concerns Evaluation Anna Rohunen and Jouni Markkula xiv

12 A Language for the Composition of Privacy-Enforcement Techniques Ronan-Alexandre Cherrueau, Rémi Douence, and Mario Südholt Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications Silvia Puglisi, David Rebollo-Monedero, and Jordi Forné The Fifth IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud) TSCloud Session I A Review of Free Cloud-Based Anti-Malware Apps for Android Jason Walls and Kim-Kwang Raymond Choo Forensic Collection and Analysis of Thumbnails in Android Ming Di Leom, Christian Javier D Orazio, Gaye Deegan, and Kim-Kwang Raymond Choo EyeCloud: A BotCloud Detection System Mohammad Reza Memarian, Mauro Conti, and Ville Leppänen TSCloud Session II A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management Kin Suntana Tep, Ben Martini, Ray Hunt, and Kim-Kwang Raymond Choo Cloud Security Audit for Migration and Continuous Monitoring Umar Mukhtar Ismail, Shareeful Islam, and Haralambos Mouratidis Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement Bob Duncan and Mark Whittington Android Cache Taxonomy and Forensic Process Felix Immanuel, Ben Martini, and Kim-Kwang Raymond Choo TSCloud Session III Secure Sketch Search for Document Similarity Cengiz Orencik, Mahmoud Alewiwi, and Erkay Savas Architectural Model and Security Mechanisms for Cloud Federations Luciano Barreto, Joni Fraga, and Frank Siqueira A Framework for Cryptography Based Accountability and Service Invocation Control for Service Composition in a Multicloud Architecture Gwan-Hwan Hwang, Kuh-Yih Huang, and Yu-Cheng Hsiao Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm Jose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, and Ruppa Thulasiram The First IEEE International Workshop on Trustworthy Software Systems (TrustSoft) xv

13 TrustSoft Session I A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications Baden Delamore and Ryan K. L. Ko Preventing Library Spoofing on Android Dennis Titze and Julian Schütte TrustSoft Session II Issues in Trustworthy Software Systems Mazen Ezzeddine and Haitham Akkary Mission-Aware Vulnerability Assessment for Cyber-Physical Systems Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders Alias Detection Across Multi-online Applications Based on User s Behavior Characteristics Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, and Tao Yang A Rejuvenation Model for Software System under Normal Attack Haining Meng, Xinhong Hei, Yan Li, Yanning Du, and Guo Xie The First IEEE International Workshop on 5G Security (IW5GS) IW5GS Session I Towards 5G Security Peter Schneider and Günther Horn Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, and Tuomas Aura Mobile Guard Demo: Network Based Malware Detection Vikramajeet Khatri and Joerg Abendroth IW5GS Session II Towards Secure Multi-tenant Virtualized Networks Nicolae Paladi and Christian Gehrmann CRC-Based Message Authentication for 5G Mobile Technology Elena Dubrova, Mats Näslund, and Göran Selander An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments and Beyond Prajwol Kumar Nakarmi, Oscar Ohlsson, and Michael Liljenstam IW5GS Session III Security in D2D Communications: A Review Mingjun Wang and Zheng Yan xvi

14 A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy Jari Arkko, Karl Norrman, Mats Näslund, and Bengt Sahlin The Eighth IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (SpaIoT) SpaIoT Session I Revocation Management in Vehicular Ad-hoc Networks Francisco Martín-Fernández, Pino Caballero-Gil, and Cándido Caballero-Gil Enhancing the Trajectory Privacy with Laplace Mechanism Daiyong Quan, Lihua Yin, and Yunchuan Guo A Simple RFID-Based Architecture for Privacy Preservation Di Wu, Jingfu Du, Dali Zhu, and Siye Wang Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs Chaohui Du, Guoqiang Bai, and Hongyi Chen Towards Tracing of k-anonymized Datasets Shinsaku Kiyomoto, Toru Nakamura, and Yutaka Miyake SpaIoT Session II WAVE: Secure Wireless Pairing Exploiting Human Body Movements Wei Wang, Zhan Wang, Wen Tao Zhu, and Lei Wang Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System Naveen Kumar, Anish Mathuria, and Manik Lal Das Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture Bernd Jaeger A Trustworthiness Model for Crowdsourced and Crowdsensed Data Catia Prandi, Stefano Ferretti, Silvia Mirri, and Paola Salomoni The First IEEE International Workshop on Trust and Security in Wireless Sensor Networks (TrustWSN) TrustWSN Session I Periodicity-and-Linear-Based Data Suppression Mechanism for WSN Yanchao Song, Juan Luo, Chang Liu, and Wenfeng He Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks Hongsong Chen, Zhi Han, and Zhongchuan Fu An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks Kyoungsoo Bok, Eunkyung Ryu, Junho Park, and Jaesoo Yoo xvii

15 TrustWSN Session II A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware Zuo Chen, Mengyuan Jia, Yan Wang, and Xiaolong Yan A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks Huan Zhao, Qian Zhang, Liang Zhang, and Yan Wang A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search Zuo Chen, Xue Li, Bin Lv, and Mengyuan Jia TrustWSN Session III Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement Learning with Application to Prostate Cancer Fei Zhu, Quan Liu, Xiaofang Zhang, and Bairong Shen Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust Huan Zhao, Chaoming Hu, Rui Zheng, and Bin Lv An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES Wei-qing Huang, Chang Ding, Si-ye Wang, and Shuang Hu A Near Field Communication(NFC) Security Model Based on OSI Reference Model Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, and Degang Sun Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers Kenta Muranaka, Naoto Yanai, Shingo Okamura, and Toru Fujiwara The Seventh IEEE International Symposium on UbiSafe Computing (UbiSafe) UbiSafe Session I A Method for Deriving and Testing Malicious Behavior Detection Rules Raimo Hilden and Kimmo Hätönen Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model Jorge López and Stephane Maag A Distributed Reputation System for Certification Authority Trust Management Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann, and Max Mühlhäuser xviii

16 UbiSafe Session II Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, and Chan Yeob Yeuny DDOS Mitigation Cloud-Based Service Fouad Guenane, Michele Nogueira, and Ahmed Serhrouchni Dynamic Game Access Control Based on Trust Shunan Ma Dynamic Security Policies Enforcement and Adaptation Using Aspects Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens The Second IEEE International Workshop on the Emerging Future Internet and Network Security (EFINS) EFINS Session I Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation Ameer Al-Nemrat and Chafika Benzaid From ZeuS to Zitmo: Trends in Banking Malware Najla Etaher, George R.S. Weir, and Mamoun Alazab ARP Cache Poisoning Mitigation and Forensics Investigation Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaïd, and Abdel-Rahman H. Tawil EFINS Session II Virtualization and Cyber Security: Arming Future Security Practitioners Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, and Chafika Benzaid A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe Florian Jacob, Jens Mittag, and Hannes Hartenstein Automated Collection and Analysis of Malware Disseminated via Online Advertising Muhammad N. Sakib and Chin-Tser Huang Author Index - Volume I xix

17 2015 IEEE Trustcom/BigDataSE/ISPA Helsinki, Finland August 2015 Volume 2 Pages IEEE Catalog Number: ISBN: CFP15TRU-POD /4

18 2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 2 Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs...ix Message from the IEEE BigDataSE 2015 General Chairs...x Message from the DTWSM 2015 Workshop Chairs...xii DTWSM 2015 Organizing and Program Committees...xiii Message from the CPBD Chairs...xiv CPBD 2015 Organizing and Program Committees...xv Message from the RTStreams 2015 Workshop Chairs...xvi RTStreams 2015 Organizing and Program Committees...xvii The Ninth IEEE International Conference on Big Data Science and Engineering BigDataSE: Analytics I M-PCA Binary Embedding for Approximate Nearest Neighbor Search...1 Ezgi Can Ozan, Serkan Kiranyaz, and Moncef Gabbouj Large-Scale Classification by an Approximate Least Squares One-Class Support Vector Machine Ensemble...6 Vasileios Mygdalis, Iosifidis Alexandros, Anastasios Tefas, and Ioannis Pitas Nearest Class Vector Classification for Large-Scale Learning Problems...11 Alexandros Iosifidis, Anastasios Tefas, and Ioannnis Pitas Class-Specific Nonlinear Projections Using Class-Specific Kernel Spaces...17 Alexandros Iosifidis, Moncef Gabbouj, and Petri Pekki BigDataSE: Analytics II Scalable Learning of k-dependence Bayesian Classifiers under MapReduce...25 Jacinto Arias, José A. Gámez, and José M. Puerta Distributed Entropy Minimization Discretizer for Big Data Analysis under Apache Spark...33 Sergio Ramírez-Gallego, Salvador García, Héctor Mouriño-Talín, and David Martínez-Rego Scalable Massively Parallel Learning of Multiple Linear Regression Algorithm with MapReduce...41 Moufida Adjout Rehab and Faouzi Boufares v

19 An Algorithm for Identifying the Learning Patterns in Big Data...48 Majed Farrash and Wenjia Wang Goal-Based Analytic Composition for On-and Off-line Execution at Scale...56 Peter Coetzee and Stephen Jarvis BigDataSE: Text Analytics Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems...66 Sepideh Seifzadeh and Ali Miri Spatial-Temporal Aware Truth Finding in Big Data Social Sensing Applications...72 Chao Huang and Dong Wang Similarity-Based Query-Focused Multi-document Summarization Using Crowdsourced and Manually-built Lexical-Semantic Resources...80 Muhidin A. Mohamed and Mourad Oussalah Semi-Supervised Multiple Disambiguation...88 Kambiz Ghoorchian, Fatemeh Rahimian, and Sarunas Girdzijauskas BigDataSE: Big Data Technologies Hadoop Characterization...96 Icaro Alzuru, Kevin Long, Bhaskar Gowda, David Zimmerman, and Tao Li Telemetry for Elastic Data (TED): Middleware for MapReduce Job Metering and Rating Soheil Qanbari, Ashkan Farivarmoheb, Parham Fazlali, Samira Mahdizadeh, and Schahram Dustdar Cost Models for Distributed Pattern Mining in the Cloud Sabeur Aridhi, Laurent d Orazio, Mondher Maddouri, and Engelbert Mephu Nguifo Performance Evaluation of Enterprise Big Data Platforms with HiBench Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten Tolle, and Roberto V. Zicari Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework Grazziela P. Figueredo, Christian Wagner, Jonathan M. Garibaldi, and Uwe Aickelin The Second IEEE International Workshop on Data, Text, Web, and Social Network Mining (DTWSM) DTWSM Session I Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-learning Ni Xue, Huan He, Jun Liu, Qinghua Zheng, Tian Ma, Jianfei Ruan, and Bo Dong Enhancing the Detection Rate of Inclined Faces Jun-Horng Chen, I-Lin Tang, and Chun-Hsuan Chang PPT Image Segmentation Based on Color Entropy Feijuan He, Xuelu Chen, Dawei Xu, and Xianglin Miao vi

20 Mining E-commerce Data from E-shop Websites Andrea Horch, Holger Kett, and Anette Weisbecker Provision of Disk I/O Guarantee for MapReduce Applications Xuan Thi Tran, Tien Van Do, Nam H. Do, Lóránt Farkas, and Csaba Rotter The First IEEE International Workshop on Classification Problems Embedded in the Nature of Big Data (CPBD) CPBD Session I A MapReduce-Based k-nearest Neighbor Approach for Big Data Classification Jesús Maillo, Isaac Triguero, and Francisco Herrera Semantic HMC: A Predictive Model Using Multi-label Classification for Big Data Rafael Peixoto, Thomas Hassan, Christophe Cruz, Aurélie Bertaux, and Nuno Silva Analysis of Data Preprocessing Increasing the Oversampling Ratio for Extremely Imbalanced Big Data Classification Sara del Río, José Manuel Benítez, and Francisco Herrera Feature Ranking Based on Information Gain for Large Classification Problems with MapReduce Eftim Zdravevski, Petre Lameski, Andrea Kulakov, Boro Jakimovski, Sonja Filiposka, and Dimitar Trajanov Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations Fingerprint and EEM Wojciech Marian Czarnecki and Krzysztof Rataj The First IEEE International Workshop on Real Time Data Stream Analytics (RTStreams) CPBD Session II and RTStreams Session I Incremental One-Class Bagging for Streaming and Evolving Big Data Bartosz Krawczyk and Michał Woźniak An Increment Decision Tree Algorithm for Streamed Data Dariusz Jankowski and Konrad Jackowski Multi-label Stream Classification Using Extended Binary Relevance Model Pawel Trajdos and Marek Kurzynski Data Stream Classification Using Random Feature Functions and Novel Method Combinations Jesse Read and Albert Bifet Symbolic Time Series Representation for Stream Data Processing Jakub Sevcech and Maria Bielikova RTStreams Session II A Platform for Real-Time Opinion Mining from Social Media and News Streams Nikos Tsirakis, Vasilis Poulopoulos, Panagiotis Tsantilas, and Iraklis Varlamis Predicting Object Trajectories from High-Speed Streaming Data Nikolaos Zorbas, Dimitrios Zissis, Konstantinos Tserpes, and Dimosthenis Anagnostopoulos vii

21 The Technology of Processing Intensive Structured Dataflow on a Supercomputer Vladislav A. Shchapov, Grigorii F. Masich, and Aleksei G. Masich Issues in Complex Event Processing Systems Ioannis Flouris, Nikos Giatrakos, Minos Garofalakis, and Antonios Deligiannakis Author Index - Volume II viii

22 2015 IEEE Trustcom/BigDataSE/ISPA Helsinki, Finland August 2015 Volume 3 Pages IEEE Catalog Number: ISBN: CFP15TRU-POD /4

23 2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 3 Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs...ix Message from the ISPA 2015 Program Committee Chairs...x ISPA 2015 Organizing and Technical Program Committee...xi Message from the RePara 2015 Workshop Chairs...xiii RePara 2015 Organizing and Program Committees...xiv Message from the PBio 2015 Workshop Chairs...xv PBio 2015 Organizing and Program Committees...xvi Message from the DIAS 2015 Workshop Chairs...xvii DIAS 2015 Organizing and Program Committees...xviii The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications ISPA Session I Evaluating HTM for Pauseless Garbage Collectors in Java...1 Maria Carpen-Amarie, Dave Dice, Patrick Marlier, Gael Thomas, and Pascal Felber Selfish Self-Stabilizing Approach to Maximal Independent Sets...9 Li-Hsing Yen and Jean-Yao Huang Parallel SMT Solving and Concurrent Symbolic Execution...17 Emil Rakadjiev, Taku Shimosawa, Hiroshi Mine, and Satoshi Oshima Identifying Hierarchical Structures in Sequences on GPU...27 Prashant Jalan, Arihant Kumar Jain, and Subhajit Roy ISPA Session II A New Fill-in Strategy for IC Factorization Preconditioning Considering SIMD Instructions...37 Takeshi Iwashita, Naokazu Takemura, Akihiro Ida, and Hiroshi Nakashima Enhanced GPU Resource Utilization through Fairness-aware Task Scheduling...45 Ayman Tarakji, Alexander Gladis, Tarek Anwar, and Rainer Leupers v

24 Exploiting Hyper-Loop Parallelism in Vectorization to Improve Memory Performance on CUDA GPGPU...53 Shixiong Xu and David Gregg ISPA Session III Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems Using Console and Resource Usage Logs...61 Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, and James Browne Metaprogramming Dense Linear Algebra Solvers Applications to Multi and Many-Core Architectures...69 Ian Masliah, Marc Baboulin, and Joel Falcou Parallel Monte Carlo Tree Search from Multi-core to Many-core Processors...77 S. Ali Mirsoleimani, Aske Plaat, Jaap van den Herik, and Jos Vermaseren Routing Algorithms for Recursively-Defined Data Centre Networks...84 Alejandro Erickson, Abbas Kiasari, Javier Navaridas, and Iain A. Stewart Petri Nets Formalization of Map/Reduce Paradigm to Optimise the Performance-Cost Tradeoff...92 M. Carmen Ruiz, Javier Calleja, and Diego Cazorla ISPA Session IV A Horizontally-Scalable Multiprocessing Platform Based on Node.js Ahmad Maatouki, Joerg Meyer, Marek Szuba, and Achim Streit Performance Evaluations of Document-Oriented Databases Using GPU and Cache Structure Shin Morishima and Hiroki Matsutani Energy-Efficient Sorting with the Distributed Memory Architecture epuma Andréas Karlsson, Joar Sohl, and Dake Liu Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps Lars Frydendal Bonnichsen, Christian Wilhelm Probst, and Sven Karlsson Analysis of the Impact of CPU Virtualization on Parallel Applications in Xen Kenichi Kourai and Riku Nakata The First IEEE International Workshop on Reengineering for Parallelism in Heterogeneous Parallel Platforms (RePara) RePara Session I Parallelizing High-Frequency Trading Applications by Using C++11 Attributes Marco Danelutto, Tiziano De Matteis, Gabriele Mencagli, and Massimo Torquati AKI: Automatic Kernel Identification and Annotation Tool Based on C++ Attributes Rafael Sotomayor, Luis Miguel Sanchez, Javier Garcia Blas, Alejandro Calderon, and Javier Fernandez MeterPU: A Generic Measurement Abstraction API Enabling Energy-Tuned Skeleton Backend Selection Lu Li and Christoph Kessler vi

25 RePara Session II Exploiting Task-Parallelism on GPU Clusters via OmpSs and rcuda Virtualization Adrián Castelló, Rafael Mayo, Judit Planas, and Enrique S. Quintana-Ortí Parallel Pipeline on Heterogeneous Multi-processing Architectures Andrés Rodríguez, Angeles Navarro, Rafael Asenjo, Antonio Vilches, Francisco Corbera, and María Garzarán The Loop-of-Stencil-Reduce Paradigm Marco Aldinucci, Marco Danelutto, Maurizio Drocco, Peter Kilpatrick, Guilherme Peretti Pezzi, and Massimo Torquati Prediction Models for Performance, Power, and Energy Efficiency of Software Executed on Heterogeneous Hardware Dénes Bán, Rudolf Ferenc, István Siket, and Ákos Kiss The Third IEEE International Workshop on Parallelism in Bioinformatics (PBio) PBio: Cluster Computing in Bioinformatics Parallel Computation of Voxelized Macromolecular Surfaces by Spatial Slicing Sebastian Daberdaku and Carlo Ferrari Scalable RNA Sequencing on Clusters of Multicore Processors Héctor Martínez, Sergio Barrachina, Maribel Castillo, Joaquín Tárraga, Ignacio Medina, Joaquín Dopazo, and Enrique S. Quintana-Ortí A Parallel Algorithm for Compression of Big Next-Generation Sequencing Datasets Sandino Vargas Pérez and Fahad Saeed Assessment of a Black-Box Approach for a Parallel Finite Elements Solver in Computational Hemodynamics Ferdinando Auricchio, Marco Ferretti, Adrien Lefieux, Mirto Musci, Alessandro Reali, Santi Trimarchi, and Alessandro Veneziani PBio: Hardware Accelerators in Bioinformatics Smith-Waterman Protein Search with OpenCL on an FPGA Enzo Rucci, Carlos García, Guillermo Botella, Armando De Giusti, Marcelo Naiouf, and Manuel Prieto-Matias Accelerating Phylogenetic Inference on Heterogeneous OpenCL Platforms Lídia Kuan, Leonel Sousa, and Pedro Tomás Accelerating DNA Sequence Analysis Using Intel(R) Xeon Phi(TM) Suejb Memeti and Sabri Pllana Fast Epistasis Detection in Large-Scale GWAS for Intel Xeon Phi Clusters Glenn R. Luecke, Nathan T. Weeks, Brandon M. Groth, Marina Kraeva, Li Ma, Luke M. Kramer, James E. Koltes, and James M. Reecy vii

26 PBio: Many-core, Multi-core, and Distributed Computing in Bioinformatics On the Performance of BWA on NUMA Architectures Josefina Lenis and Miquel Angel Senar Parallel H4MSA for Multiple Sequence Alignment Álvaro Rubio-Largo, Miguel A. Vega-Rodríguez, and David L. González-Álvarez Discovering Candidates for Gene Network Expansion by Distributed Volunteer Computing Francesco Asnicar, Luca Erculiani, Francesca Galante, Caterina Gallo, Luca Masera, Paolo Morettin, Nadir Sella, Stanislau Semeniuta, Thomas Tolio, Giulia Malacarne, Kristof Engelen, Andrea Argentini, Valter Cavecchia, Claudio Moser, and Enrico Blanzieri The First IEEE International Workshop on Distributed Intelligent Automation Systems (DIAS) DIAS Session I: Models and Applications for Industrial Cyber-physical Systems Cyber-physical Design of Data Centers Cooling Systems Automation Arash Mousavi, Valeriy Vyatkin, Yulia Berezovskaya, and Xiaojing Zhang Fuzzy Logic Based Prosumer Agent in a Modular Smart Grid Prosumer Architecture Chen-Wei Yang, Kashif Gulzar, Seppo Sierla, and Valeriy Vyatkin Adaptation of Material Flows in Mechanical Transportation Systems Based on Observation Experience Stanislav Belyakov, Marina Savelyeva, Jeffrey Yan, and Valeriy Vyatkin An OPC UA Based Architecture for Testing Tracking Simulation Methods Gerardo Santillán Martínez, Tommi Karhela, Valeriy Vyatkin, Tuomas Miettinen, and Cheng Pang Model-Driven Runtime Embedded Monitoring for Industrial Controllers Pavel Kustarev, Sergei Bykovskii, Vasiliy Milin, and Alexander Antonov DIAS Session II: Distributed Design Architectures Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse Safe Net Condition/Event Systems Victor Dubinin, Valeriy Vyatkin, and Hans-Michael Hanisch A Formal Perspective on IEC Execution Control Chart Semantics Per Lindgren, Marcus Lindner, David Pereira, and Luís Miguel Pinho Formal Modeling of Testing Software for Cyber-Physical Automation Systems Igor Buzhinsky, Cheng Pang, and Valeriy Vyatkin Inferring Automata Logic from Manual Control Scenarios: Implementation in Function Blocks Daniil Chivilikhin, Anatoly Shalyto, and Valeriy Vyatkin Formal Verification of IEC61499 Function Blocks with Abstract State Machines and SMV Modelling Sandeep Patil, Victor Dubinin, and Valeriy Vyatkin Author Index - Volume III viii

Trust and Reputation Management in Distributed Systems

Trust and Reputation Management in Distributed Systems Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania (felix.gomez-marmol@neclab.eu)

More information

IEEE. Final. TrustCom-BigDataSE-ISPA 2015. program AUGUST 20-22, 2015, HELSINKI, FINLAND

IEEE. Final. TrustCom-BigDataSE-ISPA 2015. program AUGUST 20-22, 2015, HELSINKI, FINLAND IEEE TrustCom-BigDataSE-ISPA 2015 AUGUST 20-22, 2015, HELSINKI, FINLAND Final program Photo: Matti Tirri The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing

Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu

More information

A Dynamic Approach to Extract Texts and Captions from Videos

A Dynamic Approach to Extract Texts and Captions from Videos Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

A Security Integrated Data Storage Model for Cloud Environment

A Security Integrated Data Storage Model for Cloud Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

SOCIAL NETWORK DATA ANALYTICS

SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS SOCIAL NETWORK DATA ANALYTICS Edited by CHARU C. AGGARWAL IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA Kluwer Academic Publishers Boston/Dordrecht/London

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

CHASE Survey on 6 Most Important Topics in Hardware Security

CHASE Survey on 6 Most Important Topics in Hardware Security University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit

More information

Comparative Analysis of Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Load Balancing Algorithms in Cloud Computing Comparative Analysis of Load Balancing Algorithms in Cloud Computing Anoop Yadav Department of Computer Science and Engineering, JIIT, Noida Sec-62, Uttar Pradesh, India ABSTRACT Cloud computing, now a

More information

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

How To Balance Load In Rdi With Power Conservation In A Power Efficient System EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

Metaheuristics in Big Data: An Approach to Railway Engineering

Metaheuristics in Big Data: An Approach to Railway Engineering Metaheuristics in Big Data: An Approach to Railway Engineering Silvia Galván Núñez 1,2, and Prof. Nii Attoh-Okine 1,3 1 Department of Civil and Environmental Engineering University of Delaware, Newark,

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Mining Large Datasets: Case of Mining Graph Data in the Cloud

Mining Large Datasets: Case of Mining Graph Data in the Cloud Mining Large Datasets: Case of Mining Graph Data in the Cloud Sabeur Aridhi PhD in Computer Science with Laurent d Orazio, Mondher Maddouri and Engelbert Mephu Nguifo 16/05/2014 Sabeur Aridhi Mining Large

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

Efficient Cloud Management for Parallel Data Processing In Private Cloud

Efficient Cloud Management for Parallel Data Processing In Private Cloud 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR CLOUD ENVIRONMENT

AN EFFICIENT LOAD BALANCING ALGORITHM FOR CLOUD ENVIRONMENT AN EFFICIENT LOAD BALANCING ALGORITHM FOR CLOUD ENVIRONMENT V.Bharath 1, D. Vijayakumar 2, R. Sabarimuthukumar 3 1,2,3 Department of CSE PG, National Engineering College Kovilpatti, Tamilnadu, (India)

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Data Backup and Archiving with Enterprise Storage Systems

Data Backup and Archiving with Enterprise Storage Systems Data Backup and Archiving with Enterprise Storage Systems Slavjan Ivanov 1, Igor Mishkovski 1 1 Faculty of Computer Science and Engineering Ss. Cyril and Methodius University Skopje, Macedonia slavjan_ivanov@yahoo.com,

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

How To Balance In Cloud Computing

How To Balance In Cloud Computing A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids Naghmeh Esmaieli Esmaily.naghmeh@gmail.com Mahdi Jafari Ser_jafari@yahoo.com

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing *

Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing * Research on Digital Agricultural Information Resources Sharing Plan Based on Cloud Computing * Guifen Chen 1,**, Xu Wang 2, Hang Chen 1, Chunan Li 1, Guangwei Zeng 1, Yan Wang 1, and Peixun Liu 1 1 College

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department

More information

Present a New Middleware to Control and Management Database Distributed Environment

Present a New Middleware to Control and Management Database Distributed Environment Present a New Middleware to Control and Management Database Distributed Environment Mohammadjavad Hosseinpoor 1, Hamide Kazemi 2 1 Member of faculty Dept of Computer Engineering, Islamic Azad University

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Some Research Challenges for Big Data Analytics of Intelligent Security

Some Research Challenges for Big Data Analytics of Intelligent Security Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Scalable Developments for Big Data Analytics in Remote Sensing

Scalable Developments for Big Data Analytics in Remote Sensing Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

An Approach Towards Customized Multi- Tenancy

An Approach Towards Customized Multi- Tenancy I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Preface Introduction

Preface Introduction Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud

More information

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612 Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,

More information

Oracle: Database and Data Management Innovations with CERN Public Day

Oracle: Database and Data Management Innovations with CERN Public Day Presented to Oracle: Database and Data Management Innovations with CERN Public Day Kevin Jernigan, Oracle Lorena Lobato Pardavila, CERN Manuel Martin Marquez, CERN June 10, 2015 Copyright 2015, Oracle

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

ISSN: 2320-1363 CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS

ISSN: 2320-1363 CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS CONTEXTUAL ADVERTISEMENT MINING BASED ON BIG DATA ANALYTICS A.Divya *1, A.M.Saravanan *2, I. Anette Regina *3 MPhil, Research Scholar, Muthurangam Govt. Arts College, Vellore, Tamilnadu, India Assistant

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] NEMICO: Mining network data through cloud-based data mining techniques Original Citation: Baralis E.; Cagliero L.; Cerquitelli T.; Chiusano

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

Mutual Authentication Cloud Computing Platform based on TPM

Mutual Authentication Cloud Computing Platform based on TPM Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Cost Effective Automated Scaling of Web Applications for Multi Cloud Services

Cost Effective Automated Scaling of Web Applications for Multi Cloud Services Cost Effective Automated Scaling of Web Applications for Multi Cloud Services SANTHOSH.A 1, D.VINOTHA 2, BOOPATHY.P 3 1,2,3 Computer Science and Engineering PRIST University India Abstract - Resource allocation

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

A Cloud Test Bed for China Railway Enterprise Data Center

A Cloud Test Bed for China Railway Enterprise Data Center A Cloud Test Bed for China Railway Enterprise Data Center BACKGROUND China Railway consists of eighteen regional bureaus, geographically distributed across China, with each regional bureau having their

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information