2019 4th International Conference on Computing, Communications and Security (ICCCS)最新文献

筛选
英文 中文
A Web Client Secure Storage Approach in Multi-Cloud Environment 多云环境下的Web客户端安全存储方法
Murtadha Arif Bin Sahbudin, R. D. Pietro, M. Scarpa
{"title":"A Web Client Secure Storage Approach in Multi-Cloud Environment","authors":"Murtadha Arif Bin Sahbudin, R. D. Pietro, M. Scarpa","doi":"10.1109/CCCS.2019.8888062","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888062","url":null,"abstract":"Cloud computing has seen the fastest adoption due to its tremendous benefits to business organizations and individuals. However, ensuring the security level is essential as users often store sensitive information with Cloud storage providers who lack transparency within their policies. Dealing with single Cloud providers is becoming less popular with customers due to the risk of malicious insiders in a single Cloud. In this work, we propose a Web client application supporting secure storage approach primarily to guarantee confidentiality and integrity issues concerning data stored on a multi-Cloud environment. Hence, we present and discuss our Web application framework and its implementation. Besides, we evaluate this proposal by conducting several experiments for the Web application in a real multi-Cloud environment scenario.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128227498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAFFI: Performance Analysis Framework for Fog Infrastructures in realistic scenarios PAFFI:现实场景中雾基础设施的性能分析框架
C. Canali, R. Lancellotti
{"title":"PAFFI: Performance Analysis Framework for Fog Infrastructures in realistic scenarios","authors":"C. Canali, R. Lancellotti","doi":"10.1109/CCCS.2019.8888117","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888117","url":null,"abstract":"The growing popularity of applications involving the process of a huge amount of data and requiring high scalability and low latency represents the main driver for the success of the fog computing paradigm. A set of fog nodes close to the network edge and hosting functions such as data aggregation, filtering or latency sensitive applications can avoid the risk of high latency due to geographic data transfer and network links congestion that hinder the viability of the traditional cloud computing paradigm for a class of applications including support for smart cities services or autonomous driving. However, the design of fog infrastructures requires novel techniques for system modeling and performance evaluation able to capture a realistic scenario starting from the geographic location of the infrastructure elements. In this paper we propose PAFFI, a framework for the performance analysis of fog infrastructures in realistic scenarios. We describe the main features of the framework and its capability to automatically generate realistic fog topologies, with an optimized mapping between sensors, fog nodes and cloud data centers, whose performance can be evaluated by means of simulation.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BRAIN-IoT: Model-Based Framework for Dependable Sensing and Actuation in Intelligent Decentralized IoT Systems BRAIN-IoT:智能分散物联网系统中可靠传感和驱动的基于模型的框架
Davide Conzon, Mohammad Rifat Ahmmad Rashid, Xu Tao, Angel Soriano, Richard Nicholson, Enrico Ferrera
{"title":"BRAIN-IoT: Model-Based Framework for Dependable Sensing and Actuation in Intelligent Decentralized IoT Systems","authors":"Davide Conzon, Mohammad Rifat Ahmmad Rashid, Xu Tao, Angel Soriano, Richard Nicholson, Enrico Ferrera","doi":"10.1109/CCCS.2019.8888136","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888136","url":null,"abstract":"Modern applications in the Smart Building and Industry 4.0 scenarios will be complex software ecosystems with strict requirements of geographic distribution, heterogeneity, dynamic evolution, security and privacy protection, highly more challenging than the ones required by the current environments. Two of the main challenges arising in the current Internet Of Things scenarios, i.e., the Smart Building one, are, on one side, the requirement of interconnecting several heterogeneous platforms and smart Things in the same environment and, on the other side, the need to be able to evolve the complex software ecosystem deployed, reacting automatically and at runtime to environmental changes, without the human intervention. To address these challenges, BRAIN-IoT establishes a framework and methodology supporting smart cooperative behaviour in fully de-centralized, composable and dynamic federations of heterogeneous Internet of Things platforms. In this way, BRAIN-IoT enables smart autonomous behaviour in Internet of Things scenarios, involving heterogeneous sensors and actuators autonomously cooperating to execute complex, dynamic tasks. Furthermore, BRAIN-IoT enables dynamically deploying and orchestrating distributed applications, allowing the automatic installation and replacement of smart behaviours reacting to environmental changes and User events. Finally, BRAIN-IoT provides a set of components that guarantee the security and privacy protection of the data exchanged using the solution. BRAIN-IoT is a general purpose solution that aims at being adaptable for heterogeneous scenarios, from Service Robotics to Critical Infrastructure Management. This paper introduces a Smart Building use case of the solution, which allows highlighting the advantages given by BRAIN-IoT in such scenario.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Vertelas - Automated User-Controlled Vertical Elasticity in Existing Commercial Clouds Vertelas——现有商业云中的自动用户控制垂直弹性
Kashifuddin Qazi
{"title":"Vertelas - Automated User-Controlled Vertical Elasticity in Existing Commercial Clouds","authors":"Kashifuddin Qazi","doi":"10.1109/CCCS.2019.8888039","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888039","url":null,"abstract":"Cloud computing has become ubiquitous as a way for users to obtain scalable services. Commercial Infrastructure-as-a-Service (IaaS) providers offer pay-as-you-go Virtual Machines (VM) to users to run their applications. One of the main benefits of using IaaS is the ability to increase or decrease the size of a VM (amount of RAM, cpu, etc.) on demand, based on requirement. This approach is known as vertical elasticity, and results in reduced costs over the lifetime of an application for the user. However, most IaaS providers including Amazon and Google, do not offer vertical elasticity out-of-the-box. Instead, they offer horizontal elasticity, which is the ability to vary the number of VMs based on requirement. In a myriad of scenarios such as non-parallelizable applications and scientific computations, vertical elasticity instead of horizontal elasticity is a must to reduce costs. This paper proposes a framework called Vertelas, that users can utilize within their current cloud based VMs to achieve vertical elasticity and save costs. Vertelas automatically predicts the required resources, and moves the running application to smaller or larger VMs. By utilizing Linux container migrations, no modifications or support on the part of the service providers is required, making the approach provider-agnostic. Experimental evaluations on a real world IaaS provider (AWS), with real world load traces, demonstrate the substantial reductions in costs as opposed to running the application inside a single, fixed-size VM.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114355307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICCCS 2019 Message from TPC Co-Chairs ICCCS 2019 TPC联合主席致辞
{"title":"ICCCS 2019 Message from TPC Co-Chairs","authors":"","doi":"10.1109/cccs.2019.8888064","DOIUrl":"https://doi.org/10.1109/cccs.2019.8888064","url":null,"abstract":"","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mental Stress Assessment via Ultra-Short-Term Recordings of Photoplethysmographic Sensor 用光容积脉搏波传感器超短期记录的精神压力评估
Muhammad Zubair, Changwoo Yoon
{"title":"Mental Stress Assessment via Ultra-Short-Term Recordings of Photoplethysmographic Sensor","authors":"Muhammad Zubair, Changwoo Yoon","doi":"10.1109/CCCS.2019.8888131","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888131","url":null,"abstract":"This paper investigates the potential of ultra-short term recordings of a low cost Photoplethysmographic (PPG) sensor to detect multilevel mental stress. For this purpose, we designed an experimental paradigm to induce different level of stress using Mental Arithmetic Tasks (MAT). Stress-related data was acquired with a single low-cost PPG sensor. After estimating pulse rate variability series from 60 seconds long segments of PPG signals, we computed different features based on their reliability for ultra-short term PRV analysis. In order to mitigate the issues of irrelevancy and redundancy among features, we employed a Sequential Forward Floating Selection (SFFS) algorithm to select an optimum feature set. We developed two classifiers based on Quadratic Discriminant Analysis (QDA) and Support Vector Machine (SVM). The results of the proposed stress detection system produced 92% accuracy with SVM for five level identification of mental stress. In conclusion, we proposed a multilevel stress detection system that has the potential to detect five different mental stress states using the ultra-short recordings of a low-cost PPG sensor.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130123151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MIRAGE: Mobile-app Traffic Capture and Ground-truth Creation 海市蜃楼:移动应用流量捕获和地面真相创造
Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, V. Persico, A. Pescapé
{"title":"MIRAGE: Mobile-app Traffic Capture and Ground-truth Creation","authors":"Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, V. Persico, A. Pescapé","doi":"10.1109/CCCS.2019.8888137","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888137","url":null,"abstract":"Network traffic analysis, i.e., the umbrella of procedures for distilling information from network traffic, represents the enabler for highly-valuable profiling information, other than being the workhorse for several key network management tasks. While it is currently being revolutionized in its nature by the rising share of traffic generated by mobile and hand-held devices, existing design solutions are mainly evaluated on private traffic traces, and only a few public datasets are available, thus clearly limiting repeatability and further advances on the topic. To this end, this paper introduces and describes MIRAGE, a reproducible architecture for mobile-app traffic capture and ground-truth creation. The outcome of this system is MIRAGE-2019, a human-generated dataset for mobile traffic analysis (with associated ground-truth) having the goal of advancing the state-of-the-art in mobile app traffic analysis. A first statistical characterization of the mobile-app traffic in the dataset is provided in this paper. Still, MIRAGE is expected to be capitalized by the networking community for different tasks related to mobile traffic analysis.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Computational Complexity Upper Bounds For Fingerprint-Based Point-Of-Interest Recognition Algorithms 基于指纹的兴趣点识别算法的计算复杂度上限
I. Bisio, F. Lavagetto, Chiara Garibotto, A. Sciarrone
{"title":"Computational Complexity Upper Bounds For Fingerprint-Based Point-Of-Interest Recognition Algorithms","authors":"I. Bisio, F. Lavagetto, Chiara Garibotto, A. Sciarrone","doi":"10.1109/CCCS.2019.8888142","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888142","url":null,"abstract":"Thanks to the great proliferation of mobile devices within the Internet of Things (IoT) paradigm, Smart Buildings and Smart Cities are becoming hot topics. In such smart environments, user localization plays a central role. More specifically, Point-of-Interest (POI) recognition is one of the most attractive Location-Based-Service (LBS) applications. This paper provides computational complexity upper bounds for fingerprint-based POI recognition algorithms. We have considered five algorithms reported in a former work: LRACI and its extended variant ELRACI, BeaconPrint, PlaceSense, SensLoc and SAPFI. For each of them a close-form of their computational complexity has been derived, both for the training and the recognition phase. The results obtained in this works allow a comprehensive and fair comparison of some of the most well-known POI recognition algorithms.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Techno-Economic Evaluation of VNF Placement Strategies in Optical Metro Networks 光城域网络VNF配置策略的技术经济评价
Leila Askari, F. Musumeci, M. Tornatore
{"title":"A Techno-Economic Evaluation of VNF Placement Strategies in Optical Metro Networks","authors":"Leila Askari, F. Musumeci, M. Tornatore","doi":"10.1109/CCCS.2019.8888091","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888091","url":null,"abstract":"Network Function Virtualization (NFV) has changed the way operators can provision network services. Decoupling network functions from dedicated hardware and running them on software, on top of commodity servers and switches, not only helps operators have more flexible and easy-to-manage networks, but also reduces their capital and operational expenditures. This is especially true for incoming 5G services, characterized by ultra-low latency, high reliability and bandwidth requirements. To satisfy these challenging requirements, multi-layer optical networks based on Optical Transport Network (OTN) over wavelength division multiplexing (WDM) are being deployed in the metro segment to support 5G services. In addition, the possibility to equip metro nodes with computing capabilities, enabled by new paradigms such as CORD (Central Office Re-architected as a Datacenter) is being exploited. In this scenario, an efficient placement of Virtual Network Functions (VNFs) for Service Chain (SC) provisioning within the metro network is needed, and different VNF placement strategies can lead to different costs for network operators. In this paper we analyze the impact of different VNF placement strategies on the optical metro network cost, considering specific Service Level Agreement (SLA) requirements, expressed in terms of service blocking probability. We provide a cost model which takes into consideration both capital and operational expenditures. Through extensive numerical results, we quantify the impact of using a cost-effective VNF placement strategy in decreasing network cost while meeting the desired SLA performance.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICCCS 2019 Message from Co-Chairs ICCCS 2019联合主席致辞
{"title":"ICCCS 2019 Message from Co-Chairs","authors":"","doi":"10.1109/cccs.2019.8888051","DOIUrl":"https://doi.org/10.1109/cccs.2019.8888051","url":null,"abstract":"","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信