Jedidiah Yanez-Sierra, A. Díaz-Pérez, V. Sosa-Sosa, J. L. Gonzalez
{"title":"A digital envelope scheme for document sharing in a private cloud storage","authors":"Jedidiah Yanez-Sierra, A. Díaz-Pérez, V. Sosa-Sosa, J. L. Gonzalez","doi":"10.1109/CEWIT.2015.7338158","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338158","url":null,"abstract":"Data assurance is one of the biggest concerns in adopting Cloud Computing. In Cloud Storage environment organizations outsource the storage and management of their documents for great flexibility and economic savings. However, contracting data storage to a third-party even in private cloud deployment could lead to potential security and privacy risks. Encryption of remotely stored documents before outsourced to the cloud has been the most widely used technique to bridge the privacy gap, nevertheless, this technique impose important limitations when users want to have workflows for sharing documents with others users, because data must be decrypted by the cloud storage before being sent or the private keys used to encrypt the documents must be shared. Both cases may lead to a lack of access control to the information. In this paper we present a digital envelope scheme over a configurable workflow architecture allowing secure document sharing in private cloud storage environments. Our scheme uses three main ideas: the encryption of the main information by using cryptographic systems, the construction of a documentsharing envelope by using attribute based encryption and digital signature mechanisms, and the development of a well-defined assurance workflow to transport the information through the different security phases. Based on our scheme, we developed a prototype and conducted a proof of concept in a private cloud environment. Experimental results revealed that the overhead of the assurance represents in average only a fraction (no more than 15%) of the sharing operations.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122181223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of microcontroller based intelligent traffic light control","authors":"Jing Pang","doi":"10.1109/CEWIT.2015.7338166","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338166","url":null,"abstract":"The congestion of the urban traffic is becoming one of critical issues with increasing population and automobiles in cities. Traffic jams not only cause extra delay and stress for the drivers, but also increase fuel consumption, add transportation cost, and increase carbon dioxide air pollution. The traffic controller is one of critical factors affecting the traffic flow. The conventional traffic patterns are nonlinear and complex. As a result, the fixed traffic light controller is not optimized to reduce the traffic jam. Moreover, it does not improve the response time for ambulances, fire trucks, police cars and other emergency vehicles. This paper is written with the endeavor to provide the readers an idea of the research that has been carried out in the intelligent traffic light field and the microcontroller based traffic light control system. The historical review of the technology and the recent development of the intelligent traffic light control system are stated in this paper. In addition, the future studies of the related work are also presented.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Piliouras, Robert J. Suss, Pui Lam Raymond Yu, Siddhant Vikas Kachalia, Rahul Sanjeeva Bangera, Raj Rajesh Kalra, Muzammil Pasha Maniyar
{"title":"The rise of mobile technology in healthcare: the challenge of securing teleradiology","authors":"T. Piliouras, Robert J. Suss, Pui Lam Raymond Yu, Siddhant Vikas Kachalia, Rahul Sanjeeva Bangera, Raj Rajesh Kalra, Muzammil Pasha Maniyar","doi":"10.1109/CEWIT.2015.7338167","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338167","url":null,"abstract":"There are many potential security risks associated with viewing, accessing, and storage of DICOM files on mobile devices. Digital Imaging and Communications in Medicine (DICOM) is the industry standard for the communication and management of medical imaging. DICOM files contain multidimensional image data and associated meta-data (e.g., patient name, date of birth, etc.) designated as electronic protected health information (e-PHI). The HIPAA (Health Insurance Portability and Accountability Act) Privacy Rule, the HIPAA Security Rule, the ARRA (American Recovery and Reinvestment Act), the Health Information Technology for Economic and Clinical Health Act (HITECH), and applicable state law mandate comprehensive administrative, physical, and technical security safeguards to protect e-PHI, which includes (DICOM) medical images. Implementation of HIPAA security safeguards is difficult and often falls short. Mobile device use is proliferating among healthcare providers, along with associated risks to data confidentiality, integrity, and availability (CIA). Mobile devices and laptops are implicated in wide-spread data breaches of millions of patients' data. These risks arise in many ways, including: i) inherent vulnerabilities of popular mobile operating systems (e.g., iOS, Android, Windows Phone); ii) sharing of mobile devices by multiple users; iii) lost or stolen devices; iv) transmission of clinical images over public (unsecured) wireless networks; v) lack of adequate password protection; vi) failure to use recommended safety precautions to protect data on a lost device (e.g., data wiping); and vi) use of personal mobile devices while accessing or sharing e-PHI. Analysis of commonly used methods for DICOM image sharing on mobile devices elucidates areas of vulnerability and points to the need for holistic security approaches to ensure HIPAA compliance within and across clinical settings. Innovative information governance strategies and new security approaches are needed to protect against data breaches, and to aid in the collection and analysis of compliance data. Generally, it is difficult to share DICOM images across different HIPAAcompliant Picture Archive and Communication Systems (PACS) and certified electronic health record (EHR) systems - while it is easy to share images using non-FDA approved, personal devices on unsecured networks. End-users in clinical settings must understand and strictly adhere to recommended mobile security precautions, and should be held to greater standards of personal accountability when they fail to do so.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security issues surrounding the use of open source software by online students","authors":"Jose Rene Tubilleja","doi":"10.1109/CEWIT.2015.7338170","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338170","url":null,"abstract":"This study investigates the security issues related to the use of open source software by students in online education. Research studies and common wisdom contend that open source software, by having being developed and continuously updated by numerous knowing experts, is more secure and less prone to hacking attacks. Using a systematic three-step approach, this study surveys journal and conference proceedings articles that deal with the security of using open source software in education in general and online education in particular. The open source software most commonly used by online students are identified and the articles on the security of using them are categorized. It is discovered that not very many articles are dedicated to purely online education, but conclusions can be drawn from them that answer the study's research questions. The articles and studies that are investigated report that open source software are indeed more secure and more quickly patched than their proprietary counterpart. Online students are also found to be not any more vulnerable than their onsite counterparts. The studies surveyed, however, indicate that the institutions and educators are the ones who should pay particular attention to their use of open-source software in their online education activities.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of research efforts in dynamic/big data analytics","authors":"Lyublyana Turiy","doi":"10.1109/CEWIT.2015.7338171","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338171","url":null,"abstract":"The recent explosion in Dynamic (a.k.a., \"Big\") Data Analytics1 research provides a massive amount of software capabilities, published papers, and conference proceedings that make it difficult to sift through and inter-relate it all. This paper proposes a trial classification scheme with several orthogonal dimensions of classification. These dimensions include stages of application, challenges, solution origins, specialization of technologies, purpose, ownership (business type), data processing (batch vs. streaming), and data types applied to (structured, semi-structured and unstructured). The full list of determined categories in each dimension is presented. The classification scheme is intentionally made to be not too complex, to help anyone entering the expanding world of Big Data Analytics, by helping them gain a better understanding of the applicability of various tools and capabilities that are available, and how they contrast and synergize amongst each another. Additionally, this work can help with creation of educational materials, demarcation of the domain, and encourage full research coverage in big data analytics, as well as enable discovery and articulation of common principles and solutions. The research topics used in testing this classification scheme are retrieved from the top 20 most relevant papers of Scopus online database, which is aiming to be the largest repository of the peer-reviewed literature, as well as by reviewing examples of similar past classification attempts.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125211515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the feasibility of heterogeneous computing of complex networks for big data analysis","authors":"A. Garcia-Robledo, A. Díaz-Pérez, G. Morales-Luna","doi":"10.1109/CEWIT.2015.7338160","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338160","url":null,"abstract":"We present our experience with exploring the configuration space for accelerating BFS's on large complex networks in the context of a heterogeneous GPU + CPU HPC platform. We study the feasibility of the heterogeneous computing approach by systematically studying different graph partitioning strategies while processing synthetic and real-world complex networks. To achieve this, we exploit the coreness of complex networks for load partitioning.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130209784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STEM and green IT","authors":"J. Lamb, S. K. Marimekala","doi":"10.1109/CEWIT.2015.7338163","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338163","url":null,"abstract":"Most students know about Information Technology (IT) through the use of their PCs, laptops, IPads, smart phones, and all the social media used with those devices. Thus energy efficient IT (or Green IT), is an area that should grab their interest. Most schools in the U.S. use IT as a tool with their instruction. The student will need to understand the basics on data centers since data centers house the servers that students access when they use Google, Facebook, or any of the many Internet applications used by all users, young and old. This paper provides an overview on how Green IT is an excellent topic for STEM (Science, Technology, Engineering, and Mathematics). An important aspect of the STEM project would be data centers. Data centers are found in nearly every sector of the economy including financial services, media, high-tech, universities, and government institutions. Dramatic server growth at data centers is indicated by well known web services such as Google, Amazon, and eBay. Estimates indicate that Google maintains over 450,000 servers, arranged in racks located in clusters in cities around the world. Google has major data centers in California, Virginia, Georgia, Ireland, and new facilities in Oregon and Belgium. In 2009 Google opened one of its first sites in the upper Midwest in Council Bluffs, Iowa, close to abundant wind power resources for fulfilling green energy objectives and proximate to fiber optic communications links. There are also thousands of servers for Amazon.com and eBay. It is estimated that the Second Life Internet-based virtual world launched in 2003 has over 9,000 servers. Even with these large numbers of current servers, IBM Consulting estimates that in the next decade server shipments will grow by six times and data storage by an amazing 69-fold. Green energy efficient data centers will help us reduce greenhouse gases - which in turn will help reduce global warming. The ongoing UN and White House sessions on climate change emphasize the environmental importance of green projects. Although the extent of the Global Warming danger may continue to be open to debate, implementing Green Data Centers presents a significant opportunity for all of us to help reduce greenhouse gasses. This paper will bring in case studies based on the authors experiences with energy efficient computing and experiences discussing Green IT with STEM students.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of one-time signatures for multicast authentication in smart grid","authors":"Cheongmin Ji, Jimin Kim, Jae-Young Lee, M. Hong","doi":"10.1109/CEWIT.2015.7338162","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338162","url":null,"abstract":"One-time signatures are known to be one of the most promising solution for time-critical multicast authentication in environments with resource-constrained devices such as smart grid. There have been several solutions for multicast applications and TV-OTS has been known to be the most efficient scheme so far. However, there still exists several challenges for one-time signatures to be deployed in practice. We review existing onetime signatures for multicast authentication and address several challenges such as key management and storage cost problems that can inevitably arise when they are actually deployed in practice.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast pipelined storage for high-performance energy-efficient computing with superconductor technology","authors":"M. Dorojevets, Zuoting Chen","doi":"10.1109/CEWIT.2015.7338159","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338159","url":null,"abstract":"New superconductor single flux quantum (SFQ) technology, such as Reciprocal Quantum Logic (RQL), is currently considered one of the promising candidates for highperformance energy-efficient computing. This paper presents our work on the design and detailed energy efficiency analysis of three types of 32- and 64-bit RQL multi-ported pipelined local storage structures (13 total), namely 1) random access memory (RAM) and register files, 2) direct-mapped write-through and write-back caches, and 3) first-in-first-out (FIFO) buffers. Our layout-aware cell-level design process uses a VHDL RQL cell library developed at the Ultra High Speed Computing Laboratory at Stony Brook University (SBU). The SBU VHDL RQL cell library specifies the dynamic and standby energy consumption, gate delays, a number of Josephson junctions (JJs) per cell, and approximate sizes of individual cells based on the parameters of the 248 nm 100 μA/μm2 10 Nb metal layer SFQ fabrication process currently under development at the MIT Lincoln Laboratory. Gate and wire delays as well as clock skew are taken into account during digital circuit simulation done with Mentor Graphics CAD tools. After completing a physical chip layout, the circuit models need to be updated and re-simulated to include the effects of parasitic inductances and actual wire lengths on signal propagation delays. To meet both performance and energy efficiency targets, the RQL storage structures were designed with RQL non-destructive read-out single-bit storage cells. We chose a relatively moderate clock frequency of 8.5 GHz for all storage units to keep their read latencies in the range of 1- 3 cycles. The most complex design in terms of JJs is a tripleported 4 Kbit 64x64-bit register file with 253,918 JJs and its read access latency of 338 ps. The highest energy consumption in terms of energy/operation/bit (~9.5 aJ at 4.2 K) is for a write hit in a 2 Kbit 32-bit wide write-back cache. The average energy consumption of the RQL storage designs varies from ~1.6 aJ/operation/bit for a small 4x32-bit FIFO to 7.3 aJ/operation/bit for the 2 Kbit write-back cache at 4.2 K. Given the cryocooler efficiency of 0.1%, this means the energy consumption of ~1.6-7.3 fJ/operation/bit at room temperature. The physical implementation of the RQL storage units will become feasible upon the development of the target MIT fabrication process and CAD tools for VLSI RQL chip design in 2015-2016.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. K. Bodin, David Jaramillo, S. K. Marimekala, M. Ganis
{"title":"Security challenges and data implications by using smartwatch devices in the enterprise","authors":"W. K. Bodin, David Jaramillo, S. K. Marimekala, M. Ganis","doi":"10.1109/CEWIT.2015.7338164","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338164","url":null,"abstract":"In the age of the Internet of Things, use of Smartwatch devices in the enterprise is evolving rapidly and many companies are exploring, adopting and researching the use of these devices in the Enterprise IT (Information Technology). The biggest challenge presented to an organization is understanding how to integrate these devices with the back end systems, building the data correlation and analytics while ensuring the security of the overall systems. The core objective of this paper is to provide a brief overview of such security challenges and data exposures to be considered. The research effort focuses on three key questions: 1. Data: how will we integrate these data streams into of physical world instrumentation with all of our existing data? 2. Security: how can pervasive sensing and analytics systems preserve and protect user security? 3. Usability: what hardware and software systems will make developing new intelligent and secure Smartwatch applications as easy as a modern web application? This area of research is in the early stages and through this paper we attempt to bring different views on how data, security and usability is important for Enterprise IT to adopt this type of Internet of Things (IoT) device in the Enterprise.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}