2020 29th International Conference on Computer Communications and Networks (ICCCN)最新文献

筛选
英文 中文
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function 基于SHA-512哈希函数的SDEx增强加密方法的统计分析
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209663
A. Hłobaż
{"title":"Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function","authors":"A. Hłobaż","doi":"10.1109/ICCCN49398.2020.9209663","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209663","url":null,"abstract":"The paper presents statistical analysis of the enhanced SDEx method based on SHA-512 hash function. Statistical analysis of the method is performed in a similar way as for the method with the SHA-256, described in [9]. To realize it the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. Additionally, compression tests on encrypted files were performed using the WinRAR software. The SDEx method based on SHA-512 hash function is faster and provides similar or higher level of security than AES with 256-bit key. The method can be used to secure end-to-end encryption in data transferring.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing 基于组件差异和模板变形的人脸隐私保护框架
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209637
Min Long, Sai Long, Guolou Ping, Fei Peng
{"title":"A Facial Privacy Protection Framework Based on Component Difference and Template Morphing","authors":"Min Long, Sai Long, Guolou Ping, Fei Peng","doi":"10.1109/ICCCN49398.2020.9209637","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209637","url":null,"abstract":"Aiming to countermeasure facial privacy disclosure of the shared images in social media, a face privacy protection framework based on component difference and template morphing is proposed. For a shared facial image that requires privacy protection, its facial attributes are first detected, and then the most suitable face template is searched from a pre-built facial image template library. After that, the key points of the facial image and the face template are detected, and they are implemented for facial components segmentation. Finally, the facial components of two images are morphed according to the privacy protection level and the optimal morphing sequence determined by the component difference. Experiments and analysis are performed to an implementation of the framework. The results show that it can effectively protect the facial privacy meanwhile keep the visual quality of the image. It has great potential to be applied for privacy protection of the shared facial images in social media.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122363473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing Fault-tolerant Overhead for Distributed Stream Processing with Approximate Backup 近似备份减少分布式流处理的容错开销
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209717
Yuan Zhuang, Xiaohui Wei, Hongliang Li, Mingkai Hou, Yundi Wang
{"title":"Reducing Fault-tolerant Overhead for Distributed Stream Processing with Approximate Backup","authors":"Yuan Zhuang, Xiaohui Wei, Hongliang Li, Mingkai Hou, Yundi Wang","doi":"10.1109/ICCCN49398.2020.9209717","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209717","url":null,"abstract":"The stream processing model continuously processes online data in an on-pass fashion that can be more vulnerable to failures than other offline-data processing schemes. Checkpoint-based fault-tolerant methods have been widely used to enhance the reliability of stream processing systems. To ensure exact data recoveries upon failures, full-backup mechanisms are used to store a complete copy of data, which introduces substantial runtime overhead and increases output latency. In the meantime, a wide range of online processing applications prefer quick-and-dirty results with a slight degradation inaccuracy to delayed exact results. This paper introduces a novel approximate fault-tolerant problem (OAFP) with the objective of reducing the failure-free fault-tolerant overhead and ensuring user-defiled output accuracy requirement upon failure at the same time. We present an approximate fault-tolerant scheme based on sampling backup mechanism and study the trade-off between fault-tolerant overhead and output accuracy in stream processing systems. We proposed two algorithms to compute backup plans for both single-node failure and correlated failure scenarios. Extensive experiments with different types of stream topologies are conducted on our simulator to verify the correctness and effectiveness of our approach. We prove our solution guarantees the output accuracy requirement with minimum FT latency for directed acyclic graph (DAG) stream topologies with single-node failures.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CPSA: A Coordinated Process Scheduling Algorithm for Coupled Earth System Model 耦合地球系统模型的协调过程调度算法
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209733
Hongliang Li, Zhewen Xu, Fangyu Tang, Xiaohui Wei, Zhaohui Ding
{"title":"CPSA: A Coordinated Process Scheduling Algorithm for Coupled Earth System Model","authors":"Hongliang Li, Zhewen Xu, Fangyu Tang, Xiaohui Wei, Zhaohui Ding","doi":"10.1109/ICCCN49398.2020.9209733","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209733","url":null,"abstract":"Coupled climate system models are important tools for climatologists to predict and understand future climate. These models are usually resource-consuming due to the large number of processors required and long execution time. Although the performance and scalability of individual physical system model have been improved over the past years, coupled climate systems still suffer from low efficiency when sharing resource across models. This paper focuses on the process scheduling strategy of Coupled Earth System Model (CESM), a widely applied coupled system model. Instead of pursuing best speedup efficiency for individual component, the proposed resource allocation strategy allows components to execute on compromised sub-optimal setup and still maintains relatively high parallel speedup. With this flexible resource allocation strategy, we further propose a Coordinated Process Scheduling Algorithm (CPSA) to make efficient resource sharing configurations, including resource allocation and process layout of components. We integrate CPSA as a tool into CESM program, and deploy it on Huawei Kunpeng Platform. Speedup curves of CESM components are prepared in advance based on sampling tests. Experimental data show that our algorithm reduces up to 52.6% of execution time compared with CESM default strategy. We also present simulation data to show that our algorithm is efficient for the platforms with up to a million cores.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge 结合高吞吐量和低迁移延迟,实现边缘数据一致存储
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209720
Nuno Afonso, Manuel Bravo, L. Rodrigues
{"title":"Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge","authors":"Nuno Afonso, Manuel Bravo, L. Rodrigues","doi":"10.1109/ICCCN49398.2020.9209720","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209720","url":null,"abstract":"Today, many applications offload computation and storage to the cloud. Unfortunately, the high network latency between clients and datacenters can impair novel, latency-constrained, applications such as augmented reality. Edge computing has emerged as a potential solution to circumvent this problem. To unleash its full potential, the edge must cache data that is frequently used. However, building a storage service that is able to maintain many (partial) replicas while providing meaningful consistency guarantees to clients that migrate among multiple edge caches is an open challenge. In this paper, we present Gesto, a data storage architecture that enables scalable causal consistency for edge networks. Gesto integrates a novel causality tracking mechanism that relies on multi-part timestamps of constant size, independently on the number of edge caches. As our evaluation shows, this mechanism enables Gesto to simultaneously offer scalability, low read/write latency, high throughput, and, unlike previous work, fast client migrations.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICCCN 2020 Breaker Page ICCCN 2020断路器页面
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/icccn49398.2020.9209610
{"title":"ICCCN 2020 Breaker Page","authors":"","doi":"10.1109/icccn49398.2020.9209610","DOIUrl":"https://doi.org/10.1109/icccn49398.2020.9209610","url":null,"abstract":"","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms 无人机群安全广播协议
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209739
Hongpeng Guo, Tianyuan Liu, K. Lui, C. Danilov, K. Nahrstedt
{"title":"Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms","authors":"Hongpeng Guo, Tianyuan Liu, K. Lui, C. Danilov, K. Nahrstedt","doi":"10.1109/ICCCN49398.2020.9209739","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209739","url":null,"abstract":"The technology advancement has made Unmanned Aerial Vehicle (UAV) swarm a promising method to achieve complicated missions that a single UAV cannot support. Leader-followers formation is a widely used swarm management scenario where a leader drone frequently broadcasts controlling messages to all follower drones to achieve collaboratively a common mission. However, managing such a UAV swarm, especially when the member drones dynamically join and leave the swarm, introduces significant security challenges and performance overhead.In this work, we propose a Swarm Broadcast Protocol (SBP) to facilitate the security protection of leader-followers formation based UAV swarms. SBP contains a security key management scheme that manages a broadcast key among the swarm for leader to broadcast encrypted messages to followers. When swarm membership changes, the broadcast key will be updated and synchronized among the swarm to maintain both backward and forward secrecy. The overhead of SBP is small that only constant computational overhead is needed for both swarm leader and followers to achieve key synchronization when a new drone joins regardless of the current swarm size. This feature would highly reduce the overhead when there are many individual drone joining events. Through experiments on network emulator, we show that SBP achieves lowest bandwidth overhead and CPU utilization to handle multiple swarm membership changing events, comparing with two public-key-based swarm management protocol baselines.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks Sec-ALG:用于安全访问私有网络的开源应用层网关
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209718
M. Riaz, Juha-Matti Tilli, R. Kantola
{"title":"Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks","authors":"M. Riaz, Juha-Matti Tilli, R. Kantola","doi":"10.1109/ICCCN49398.2020.9209718","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209718","url":null,"abstract":"Middleboxes such as Network Address Translators (NATs), proxy servers or Application Layer Gateways (ALGs) provide remote access to end-hosts in the private address space. The middleboxes offer proprietary solutions and encrypted traffic poses a challenge when middleboxes employ packet payload inspection techniques for connection establishment. Session key sharing and decryption followed by re-encryption of the traffic, for correctly routing to the private host, increases the connection latency and also poses a higher threat in case of traffic interception by a malicious third-party.In this paper, we present a novel open-source ALG, called Sec-ALG, for providing secure end-to-end communication to the web servers situated in the private address space. Sec-ALG relies on the technique of light Deep Packet Inspection (DPI) for protocol detection and session establishment using a novel parser-lexer generator called YaLe. The proposed approach offers increased security by maintaining end-to-end encryption for an HTTPS connection. Our experimental analysis demonstrates that Sec-ALG reduces the HTTPS connection latency in comparison to the NGINX reverse proxy using a 24-core host machine. Moreover, Sec-ALG handles requests at a three-fold increased rate than NGINX proxy when tested with 100 concurrent connections. The ALG can be used either as a standalone solution or a component of the Realm Gateway, that is a generic interworking solution between public and private networks. The presented work is part of an extensive ongoing research at Aalto University focusing on embedding policy based trust into the network.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open source threat intelligence discovery based on topic detection 基于主题检测的开源威胁情报发现
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209602
Dong Li, Xiao Zhou, Ao Xue
{"title":"Open source threat intelligence discovery based on topic detection","authors":"Dong Li, Xiao Zhou, Ao Xue","doi":"10.1109/ICCCN49398.2020.9209602","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209602","url":null,"abstract":"This paper analyzes open source threat data and identity emerging threat topics in real time. Based on the general topic detection technology, this paper deeply studies the feature extraction method in the security field. This paper studies the keyword feature extraction and entity feature extraction method. The experimental results show that the accuracy and F value of the proposed method are all above 0.98.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart e-Health Security and Safety Monitoring with Machine Learning Services 智能电子健康安全和安全监测与机器学习服务
2020 29th International Conference on Computer Communications and Networks (ICCCN) Pub Date : 2020-08-01 DOI: 10.1109/ICCCN49398.2020.9209679
W. Liu, E. K. Park, U. Krieger, S. S. Zhu
{"title":"Smart e-Health Security and Safety Monitoring with Machine Learning Services","authors":"W. Liu, E. K. Park, U. Krieger, S. S. Zhu","doi":"10.1109/ICCCN49398.2020.9209679","DOIUrl":"https://doi.org/10.1109/ICCCN49398.2020.9209679","url":null,"abstract":"This research provides security and safety extensions to a blockchain based solution whose target is e-health. The Advanced Blockchain platform is extended with intelligent monitoring for security and machine learning for detecting patient treatment medication safety issues. For the reasons of stringent HIPAA, HITECH, EU-GDPR and other regional regulations dictating security, safety and privacy requirements, the e-Health blockchains have to cover mandatory disclosure of violations or enforcements of policies during transaction flows involving healthcare. Our service solution further provides the benefits of resolving the abnormal flows of a medical treatment process, providing accountability of the service providers, enabling a trust health information environment for institutions to handle medication safely, giving patients a better safety guarantee, and enabling the authorities to supervise the security and safety of e-Health blockchains. The capabilities can be generalized to support a uniform smart solution across industry in a variety of blockchain applications.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信