{"title":"A survey on smart city technologies, initiatives and global technology providers","authors":"M. Hendy, S. Miniaoui, Shadi Atalla, K. F. Hashim","doi":"10.1145/3018896.3025132","DOIUrl":"https://doi.org/10.1145/3018896.3025132","url":null,"abstract":"Many cities are being named or motivated to become \"smart\" by the leaders, planners and officials. Smart cities infrastructure development involves \"smart grids\" for energy and water, \"smart networks\" for information and communications technologies (ICT) and \"smart mobility\" for transportation and logistics. The \"smart\" term is striving to be a solid brand in cities planning and management from all aspects. A very common theme in \"smart\" cities is the high dependency, and application of ICT technologies in city planning and management, which is expected to result-in superior and rational optimization of time and resources with harmonious smart city ecosystem. Nevertheless, the definitions of \"smart\" cities remain vague, and poor understanding may lead cities planners to possible technological traps such as heavy investments in ICT infrastructure for short-term solutions without reasonably considering the long term. As cities officials deals with rapid development, expansion and goals for creating sustainable development, dealing with climate change mitigation, and rationally manage resources, the precise definition and wisdom about being \"smart\" will be vital for smart cities leaders and planners. The aim of this study is to survey and assess the conceptual perceptions of smart cities by academicians, researchers, practitioners and policy makers about smart cities and the technology providers who developed smart city solutions. Furthermore, we survey the strategic ICT strategic frameworks used for smart cities.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125872719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeethu V. Devasia, P. Chandran, G. Shreya, A. R., Abijith R.
{"title":"On parallelizing graph theoretical approaches for identifying causal genes and pathways from very large biological networks","authors":"Jeethu V. Devasia, P. Chandran, G. Shreya, A. R., Abijith R.","doi":"10.1145/3018896.3056793","DOIUrl":"https://doi.org/10.1145/3018896.3056793","url":null,"abstract":"The time taken to compute meaningful information from biological networks is very high for most of the applications and therefore these networks are very hard to process. This work focuses on improving the speed of processing biological networks, in particular, faster traversal of genomes which have been mapped into a network for the detection of causal genes and associated pathways. Inference of disease causing genes and their pathways has achieved a crucial role in computational biology because of its practicality in understanding the major causal genes and their interactions that lead to a disease state, and suggesting new drug targets. In this work, Hadoop's distributed storage system has been used to store the molecular interaction network. Graph parallel processing techniques of Hadoop MapReduce, in conjunction with graph theoretical approaches have been utilized to improve the accuracy of results and execution time on benchmark data.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Azni, Abdul Fuad Abdul Rahman, N. M. Alwi, K. Seman
{"title":"Measuring sensor to cloud energy consumption","authors":"A. Azni, Abdul Fuad Abdul Rahman, N. M. Alwi, K. Seman","doi":"10.1145/3018896.3056803","DOIUrl":"https://doi.org/10.1145/3018896.3056803","url":null,"abstract":"IoT devices must provide seamless connectivity while obeying stringent power and size constraints. Power consumption plays important factor to determine the status and connectivity of Sensor Node. This paper describes a series of simple experiments which measure the energy consumption of two IoT Sensor Nodes transmitting data to the cloud. The experiments will be used to compare the best solution between wire and wireless for IoT Sensor Nodes implementation. The experimental result shows that wireless connection consume more power compared to wire connection. Apart from comparison of two methods, the goal of this paper is also to develop a solid experimental basis, thus setting a better foundation for future research on IoT Sensor Nodes.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multichannel key exchange","authors":"Siddharth Gupta, S. Kodam, B. Yang","doi":"10.1145/3018896.3025145","DOIUrl":"https://doi.org/10.1145/3018896.3025145","url":null,"abstract":"As the world is becoming more and more connected, managing security of the network system is becoming more difficult. One of the ways to ensure security is by encrypting the data and in order to do so, the encryption key needs to be exchanged between the devices trying to communicate with each other. The key exchange that happens today use only a single communication channel, in this paper author tries to secure key exchange process and designs a key exchange technique using multiple channels.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed S. Rizvi, J. Willett, Donte Perino, Tyler Vasbinder, Seth Marasco
{"title":"Protecting an automobile network using distributed firewall system","authors":"Syed S. Rizvi, J. Willett, Donte Perino, Tyler Vasbinder, Seth Marasco","doi":"10.1145/3018896.3056791","DOIUrl":"https://doi.org/10.1145/3018896.3056791","url":null,"abstract":"As the automobile industry continues to incorporate more technology into cars, the security of the \"automobile network\" portion of that technology is in need of tremendous improvement. The communications between the in-vehicle infotainment (IVI) systems and the essential safety systems (e.g., anti-lock brake systems) should remain secure. However, there are few to no security measures currently implemented in an automobile network. This implies that if an attacker could break into a modern vehicle's IVI system, they could possibly endanger drivers, passengers, and others. Any of the integral mechanisms of the vehicle connected to the IVI system could be open to vulnerabilities. To protect automobile networks from threats, we present a novel Hybrid Security System (HSS). The proposed HSS uses the distributed firewalls to filter malicious content (e.g., data packets) placed at each module and an electronic control unit (ECU). The HSS creates two layers of defense within an automobile network that allows flexibility for manufactures who want extra security for their cars without causing abandonment or redesigning their current security architectures. Our proposed HSS is unique from other existing solutions in that it operates on a universal platform that can reach across all automobile manufacturers.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130854262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data confidentiality in cloud-based pervasive system","authors":"K. Khan, Mahboob Shaheen, Yongge Wang","doi":"10.1145/3018896.3056802","DOIUrl":"https://doi.org/10.1145/3018896.3056802","url":null,"abstract":"Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing capabilities, smart devices need to rely on cloud servers for heavy-duty computations such as matrix multiplication. Conventional security mechanisms such as public key encryption is not an option to safeguard data from cloud servers to see them. Ensuring client data confidentiality in cloud computing can be achieved using data obfuscating techniques instead of encryption. In a matrix multiplication application, clients can protect their data from dishonest or curious cloud servers which perform multiplication operations on matrices without `knowing or seeing' actual values of input matrices. In our approach, we introduce random noise to the data, and generate several matrices randomly from each matrix in order to cloak data from cloud servers. The main idea is to mask the data as well as confuse the cloud server so it is unable to derive or guess the actual values of matrices as well as computer results.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1989 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125489839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Awatif Ragmani, Amina El Omri, N. Abghour, K. Moussaid, M. Rida
{"title":"An efficient load balancing strategy based on mapreduce for public cloud","authors":"Awatif Ragmani, Amina El Omri, N. Abghour, K. Moussaid, M. Rida","doi":"10.1145/3018896.3056777","DOIUrl":"https://doi.org/10.1145/3018896.3056777","url":null,"abstract":"Cloud computing has emerged as the most promising technology concept within several structures regardless of their industries. However, the exponential growth experienced by the Cloud has significantly complicated the administration of Cloud platforms. One aspect of the sustainability of Cloud development remains the performance of services supplied by Cloud providers. Through this paper, we propose to tackle the particular feature of performance optimization within the Cloud model by introducing a load balancing architecture based on the MapReduce concept. Indeed, the geographic extent of physical resources which are implemented in different datacenters of the Cloud is at the same time strength in terms of fault tolerance and availability for critical resources, but also a weakness in terms of management of the load balancing of the system. Indeed, the proposed architecture will take advantage from the MapReduce principles to handle the massive number of available resources in order to find out the most appropriate load balancer regarding the requirements of users' requests. The proposed architecture aims to improve both the response time and the fault tolerance within the Cloud.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of tasks classification and virtual machines categorization on tasks scheduling algorithms in cloud computing","authors":"Tahani Aladwani","doi":"10.1145/3018896.3056775","DOIUrl":"https://doi.org/10.1145/3018896.3056775","url":null,"abstract":"Tasks scheduling algorithms play a significant role in determining the performance of cloud computing. In this paper new method called tasks classification & Virtual Machines (VMs) categorization (TC & VC) can be applied in conjunction with any task scheduling algorithm to improve algorithms performance and increase its load fairness. Task classified based on their length, while VMs are categorized into the same number as tasks classification. In order to measure the performance achieved by this method, it will be applied on a set of simple scheduling algorithms, such as First Come First Service (FCFS), Shortest Job First (SJF), and Max-Min scheduling algorithms.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121460745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo
{"title":"Graphic model analysis of frauds in online consumer reviews","authors":"Chungsik Song, Kunal Goswami, Younghee Park, Sang-Yoon Chang, Euijin Choo","doi":"10.1145/3018896.3018942","DOIUrl":"https://doi.org/10.1145/3018896.3018942","url":null,"abstract":"Consumers often rely on online reviews and opinions posted on social media to make a decision when they purchase products or services. This article addresses what are collectively referred to as opinion spam, which are opinions posted by fake reviewers who seek to promote or tear down target entities for financial gain. This has led industry and academic research to seek to develop an efficient and scalable framework to detect such opinion spam. Yelp dataset for online reviews are studied using graph-based methods that leverage the relational ties among reviewers, reviews, and businesses. Yelp user networks is considered, in which reviewer nodes are connected to each other as \"friends\" relationship. We investigate structural properties of user networks for recommended (non-spam) and fake (spam) reviewer groups. It has demonstrated that networks for groups of recommended reviewers show characteristics of a small-world network. However, networks for groups of fake reviewers reveal properties closer to those of a random network. Clues from the study of structural properties of user networks are used to extend a fraud detection framework which exploits network effects among reviewers and products. Our extended framework is more effective on detecting frauds in Yelp review dataset than previous works.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart university: reservation system with contactless technology","authors":"Lok Li Ching, Nurul Malim, M. Husin, M. Singh","doi":"10.1145/3018896.3018903","DOIUrl":"https://doi.org/10.1145/3018896.3018903","url":null,"abstract":"This paper introduces a reservation system for sport facilities which consist of a web application and an Android-based mobile application. The system simplifies the reservation process for users to book available sport facilities within a university to be more efficient. The proposed system is utilized together with a contactless technology where a brief introduction of the contactless technology is provided in the paper. We selected the Near Field Communication (NFC) as the contactless technology for our proposed system. The efficiency of the proposed system is explored within this paper as well.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}