{"title":"Efficient dynamic traffic light control for ITS","authors":"Naushin Nower, Sakhawat Hossan","doi":"10.1145/3018896.3056807","DOIUrl":"https://doi.org/10.1145/3018896.3056807","url":null,"abstract":"In almost all modern cities around the world, traffic congestion is a severe problem. Existing adaptive traffic control systems utilized traffic phase and phase duration either considering traffic density or vehicular waiting time and hunger level, without any optimization. To solve this problem, we have proposed an efficient dynamic traffic light control for ITS by considering multiple factors at a time with the provisions to optimize the average vehicular waiting time, and maximize throughput. Moreover, phase duration is set in such a way so that maximum people will get benefit. Simulation results demonstrate that our algorithm produces much higher throughput and lower vehicle's average waiting time, compared with that of other adaptive algorithms.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116066244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thwarting pollution attacks in network coding for delay tolerant mobile social networks","authors":"L. Sassatelli, M. Médard","doi":"10.1145/3018896.3018960","DOIUrl":"https://doi.org/10.1145/3018896.3018960","url":null,"abstract":"We consider Delay Tolerant Mobile Social Networks (DTMSNs), made of wireless nodes with intermittent connections and clustered into social communities. The lack of infrastructure and its reliance on nodes' mobility make routing a challenge. Network Coding (NC) is a generalization of routing and has been shown to bring a number of advantages over routing. We consider the problem of pollution attacks in these networks, that are a very important issue both for NC and for DTMSNs. Our first contribution is to propose a protocol which allows controlling adversary's capacity by combining cryptographic hash dissemination and error-correction to ensure message recovery at the receiver. Our second contribution is the modeling of the performance of such a protection scheme. To do so, we adapt an inter-session NC model based on a fluid approximation of the dissemination process. We provide a numerical validation of the model. We are eventually able to provide a workflow to set the correct parameters and counteract the attacks. We conclude by highlighting how these contributions can help secure a real-world DTMSN application (e.g., a smart-phone app.).","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126947888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang
{"title":"Improved group management protocol of RFID password method","authors":"Tao Chen, Linsen Li, Shiqi Wang, Gaosheng Chen, Zeming Wang","doi":"10.1145/3018896.3018937","DOIUrl":"https://doi.org/10.1145/3018896.3018937","url":null,"abstract":"The Radio Frequency Identification (RFID), as one of the key technologies in sensing layer of the Internet of Things (IoT) framework, has increasingly been deployed in a wide variety of application domains. But the reliability of RFID is still a great concern. This article introduces the group management of RFID passwords method, come up with by YUICHI KOBAYASHI and other researchers, which aimed to reduce the risk of privacy disclosure. But for reason that the password and pass key in the method, which are set to protect the ID, doesn't change and the ID is transmitted directly in the unsafe channel, it causes serious vulnerabilities that may be used by resourceful adversary. Thus, we proposed an improved method by using the random number to encrypt the password and switching the password into the temporally valid information. Besides, the protocol encrypts the ID during to avoid the direct transmission situation significantly increases the reliability.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on web service discovery approaches","authors":"Waeal J. Obidallah, B. Raahemi","doi":"10.1145/3018896.3056773","DOIUrl":"https://doi.org/10.1145/3018896.3056773","url":null,"abstract":"With the growth and emergence of the Internet of Things (IoT) and API economy, the number of APIs and web services increased rapidly over the web. Web services play a significant role in today's business computing environment for the development of distributed applications across different networks. The process of finding the right web services that meet users' functional and nonfunctional requirements is crucial. Several web service discovery approaches have been proposed to facilitate the discovery process. These approaches are different, operate in multiple layers, and use various techniques to meet users' requirements. In this paper, we present a survey of different web service discovery approaches. The survey includes context-ware, user-side, clustering and recommender-based web service discovery approaches.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriele Baldoni, A. Lombardo, Marcello Melita, Sergio Micalizzi, C. Rametta, Alessandro Vassallo
{"title":"An emulation framework for SDN-NFV based services","authors":"Gabriele Baldoni, A. Lombardo, Marcello Melita, Sergio Micalizzi, C. Rametta, Alessandro Vassallo","doi":"10.1145/3018896.3036378","DOIUrl":"https://doi.org/10.1145/3018896.3036378","url":null,"abstract":"Due to the emergence of a hyper-connectivity communication paradigm, the \"softwarisation\" of the Internet infrastructure and of its network management framework is gaining increasing popularity. Cloud computing helps supporting this evolution, together with the emergence of Software Defined Networking (SDN) and Network Functions Virtualization (NFV). This technological paradigm allows to both move services closer to users, ensuring a lower latency in the service fruition, and support personalization of services by means of the migration of the latter towards edge nodes (in the so-called \"fog computing\" fashion). Actually, the development of cloud services based on the SDN-NFV paradigm has to cope with the availability for researcher and network enthusiasts to access to a full SDN testbed. Target of this paper is to present an emulation framework allowing simplification and cost reduction of network and application functions development, test and deployment. In such a way, the proposed architecture aims at supporting future Internet personal cloud services in a more scalable and sustainable way. Authors also present a proof-of-concept of the described architecture: a live video broadcasting service enabling small/medium and unusual content providers to share events with a restricted number of interested users without the need of adopting a dedicated and expensive data delivery infrastructure and/or subscribing expensive contracts with Telco.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security evaluation of cloud service providers using third party auditors","authors":"Syed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer","doi":"10.1145/3018896.3025154","DOIUrl":"https://doi.org/10.1145/3018896.3025154","url":null,"abstract":"Cloud computing is a revolutionary breakthrough in computing technology. It allows businesses to supply their customers with a seemingly endless amount of resources on demand, so long as they are willing to pay for it. From a business perspective, cloud computing is revolutionizing profitability. From a security standpoint, cloud computing presents an alarming amount of risk to customer data. When customers make purchases, they transfer data to a Cloud Service Provider (CSP), but are unable to evaluate which CSP has sufficient security controls to protect their sensitive data. The Cloud Security Alliance (CSA) is an organization whose mission is to suggest best practice security controls and guidelines for CSPs to follow. The CSA provides a questionnaire or risk assessment, known as the Consensus Assessment Initiative Questionnaire (CAIQ) for CSPs to fill out in order to gauge their level of security within their organization. The CSPs access these questionnaires from the CSA's STAR (Security Trust and Assurance Registry) database. This allows for CSUs to base their level of trust in a specific organization on these assessments. However, there is no way for the CSA to validate that the CSP's responses to the questionnaire are accurate. This paper presents a framework that uses a third-party auditor (TPA) to review, audit, and validate the CAIQ responses stored in the STAR repository. Our framework provides a specific group of auditors that can be used to evaluate and validate the security controls of CSPs. Therefore, the primary objective of this research is to formulate the mechanism by which the appropriate auditor(s) can be chosen by the TPA and create a verification system in which CSUs may finally put their trust in.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Hani, I. V. Paputungan, M. Hassan, V. Asirvadam
{"title":"Manifold learning in SLA violation detection and prediction for cloud-based system","authors":"A. Hani, I. V. Paputungan, M. Hassan, V. Asirvadam","doi":"10.1145/3018896.3056800","DOIUrl":"https://doi.org/10.1145/3018896.3056800","url":null,"abstract":"SLA is a contract between service providers and consumers, mandating specific numerical target values which the service needs to achieve. For service providers, detecting and preventing SLA violation becomes very important to enhance customer trust and avoid penalty charges. Therefore, it is necessary for providers to detect and forecast possible service violations. However, this is difficult to achieve when dealing with service violation in a cloud-based system due to multiple Quality of Service (QoS) parameters. In this work, manifold learning is used to reduce the high dimensionality problem arising from multiple QoS data into 1-D output of violation level (low, medium, high) data. From the transformed data, service violation will be detected as well as predicted based on violation level data. The violation level is obtained from aggregate value of each QoS weightage. Based on QoS data of 14 days, manifold learning is able to scale down 5 various parameters into a single parameter before detection and prediction process is performed. The prediction accuracy of Support Vector Regression as the time series analysis technique used is able to achieve 80%.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision support system for predicting stock prices based on sentiments in social media","authors":"G. Chornous, I. Iarmolenko","doi":"10.1145/3018896.3025158","DOIUrl":"https://doi.org/10.1145/3018896.3025158","url":null,"abstract":"This paper proposes a theoretical model of a decision support system for predicting stock prices based on data from social media. The model corresponds to the concept of multi-agent information system, which is characterized by parallel work of separate intelligent agents. In contrast to other projects in this area, the new model uses neither technical analysis approaches nor econometric tools, but machine-learning algorithms that can connect social network content sentiments and stock market movements. The practical realization of this model can be used for commercial purposes.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT deployment for smarter cities with special reference to mobility","authors":"Nachiket Tapas, O. Vyas","doi":"10.1145/3018896.3036390","DOIUrl":"https://doi.org/10.1145/3018896.3036390","url":null,"abstract":"The Internet of Things is a fast-growing and pervasive reality, and millions of physical entities - from consumer products to transport vehicles, are recorded and tracked in time and space. Smart City projects are becoming suitable platform for exploring the IoT deployments to enhance performance and well-being, and to engage more effectively and actively with its citizens. Bicycling is an important part of the solution to many urban transportation issues since the growing increase in motor vehicle use is burdening cities with increasing problems and costs related to congestion, accidents, loss of amenity and space, noise, poor urban air quality having adverse effects on both the natural and built environment. In this paper, we present a framework in which city bicycles are being proposed to be used as urban sensing platform. Such a network will also be useful for several entities like city authorities for road maintenance and deployment and environment authorities, etc., not only to make the urban biking easier but would also involve addressing some technical issues in terms of sensors and base station deployments, appropriate communication protocols, integration with City admin servers thus highlighting effective use cases with IoT forming the technical infrastructure for \"Transport and Mobility Solutions\".","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing adoption readiness assessment in saudi healthcare organisations: a strategic view","authors":"Fawaz D. Alharbi, A. Atkins, C. Stanier","doi":"10.1145/3018896.3025156","DOIUrl":"https://doi.org/10.1145/3018896.3025156","url":null,"abstract":"Adopting Cloud Computing is a decision-making problem that raises a number of critical issues for organisation management. The aim of this paper is to apply Holistic Approach Framework for Cloud Computing Strategic Decision-Making in Healthcare Sector (HAF-CCS) to provide a systematic approach that takes into account different perspectives. This framework has been developed to act as an assessment tool for healthcare organisations that are considering adopting Cloud Computing. This framework will provide health organisations with strategic planning and risk assessment strategies to avoid the risks, and gain the full advantages of, Cloud Computing. This framework is based on a holistic view of the organisation that covers multiple perspectives and includes factors other than Technology such as: Human, Business, Organisational and Environmental factors.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}