{"title":"Web Services Policy Generation Based on SLA Requirements","authors":"Alaeddine Saadaoui, S. Scott","doi":"10.1109/CIC.2017.00029","DOIUrl":"https://doi.org/10.1109/CIC.2017.00029","url":null,"abstract":"The deployment of web services in dynamic environments like cloud infrastructures offers flexible solutions to provide required resources to maintain web services availability and performance during peak demands. However, the lack of control and monitoring tools on the cloud infrastructure exposes the deployed web services to security threats. While there are security solutions that focus on web services, there is no tool to generate security policies documents. Therefore, this paper proposes an SLA (Service Level Agreement) based framework to generate web services policy documents. The framework allows the service provider to define security needs of a web service based on its WSDL (Web Service Description Language) description and generate required policies. The proposed framework is extensible and satisfies three web service security aspects: transport, authentication, and message encryption.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Challenges and Opportunities of Cloud Stacks in Dynamic Resource Environments","authors":"Fan Yang, Haryadi S. Gunawi, A. Chien","doi":"10.1109/CIC.2017.00061","DOIUrl":"https://doi.org/10.1109/CIC.2017.00061","url":null,"abstract":"Traditional cloud stacks are designed to tolerate server or rack-level failures, that are unpredictable and uncorrelated. � Such stacks successfully deliver highly-available cloud services at global scale. The increasing criticality of cloud services to the overall world economy is causing concern about the impact of power outages, cyber-attacks, configuration errors, or other causes of datacenter or larger-scale failures on cloud availability. Recent experience shows that these events can trigger cascading failures and global-scale service outages. We study the impact of correlated, datacenter resource failures, exploring distributed protocols (widely-used in Cassandra) across varied configurations and resource availability. Our study reveals that using such protocols to achieve high availability on resources with large-scale, correlated outages are costly in storage and update traffic, requiring replication factors of 10 or more. Further analysis reveals that this limitation arises from from inflexible replication and quorum.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Collaborative Trust Management","authors":"Hisham Salah, M. Eltoweissy","doi":"10.1109/CIC.2017.00035","DOIUrl":"https://doi.org/10.1109/CIC.2017.00035","url":null,"abstract":"Current technologies to include cloud computing, social networking, mobile applications and crowd and synthetic intelligence, coupled with the explosion in storage and processing power, are evolving massive-scale marketplaces for a wide variety of resources and services. They are also enabling unprecedented forms and levels of collaborations among human and machine entities. In this new era, trust remains the keystone of success in any relationship between two or more parties. A primary challenge is to establish and manage trust in environments where massive numbers of consumers, providers and brokers are largely autonomous with vastly diverse requirements, capabilities, and trust profiles. Most contemporary trust management solutions are oblivious to diversities in trustors' requirements and contexts, utilize direct or indirect experiences as the only form of trust computations, employ hardcoded trust computations and marginally consider collaboration in trust management. We surmise the need for reference architecture for trust management to guide the development of a wide spectrum of trust management systems. In our previous work, we presented a preliminary reference architecture for trust management which provides customizable and reconfigurable trust management operations to accommodate varying levels of diversity and trust personalization. In this paper, we present a comprehensive taxonomy for trust management and extend our reference architecture to feature collaboration as a first-class object. Our goal is to promote the development of new collaborative trust management systems, where various trust management operations would involve collaborating entities. Using the proposed architecture, we implemented a collaborative personalized trust management system. Simulation results demonstrate the effectiveness and efficiency of our system.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Temporal Insider Threats to Relational Databases","authors":"Asmaa Sallam, E. Bertino","doi":"10.1109/CIC.2017.00058","DOIUrl":"https://doi.org/10.1109/CIC.2017.00058","url":null,"abstract":"The mitigation of insider threats against databases is a challenging problem as insiders often have legitimate access privileges to sensitive data. Therefore, conventional security mechanisms, such as authentication and access control, may be insufficient for the protection of databases against insider threats and need to be complemented with techniques that support real-time detection of access anomalies. The existing real-time anomaly detection techniques consider anomalies in references to the database entities and the amounts of accessed data. However, they are unable to track the access frequencies. According to recent security reports, an increase in the access frequency by an insider is an indicator of a potential data misuse and may be the result of malicious intents for stealing or corrupting the data. In this paper, we propose techniques for tracking users' access frequencies and detecting anomalous related activities in real-time. We present detailed algorithms for constructing accurate profiles that describe the access patterns of the database users and for matching subsequent accesses by these users to the profiles. Our methods report and log mismatches as anomalies that may need further investigation. We evaluated our techniques on the OLTP-Benchmark. The results of the evaluation indicate that our techniques are very effective in the detection of anomalies.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129575493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn
{"title":"OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements","authors":"Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn","doi":"10.1109/CIC.2017.00012","DOIUrl":"https://doi.org/10.1109/CIC.2017.00012","url":null,"abstract":"Sophisticated attacks on Energy Delivery Systems (EDS) are no longer theoretical, and instead pose a serious threat to American economies. The EDS community has worked collaboratively to develop security requirements to protect EDS against such attacks, but the documents that contain these requirements are often dense, ambiguous and difficult for humans to understand, resulting in highly subjective security implementa- tions that reduce their effectiveness. Therefore, there is a need for a methodology that models and visualizes security requirements enabling quick retrieval, understanding and analysis, along with the evaluation and evolution of the implementations of such requirements within EDS. With this in mind, this paper presents a collaborative tool called OntoEDS that provides a well- defined representation of security requirements within ontological representations, and a set of ontology exploration techniques to analyze and evaluate the implementations of such requirements against the current attack surface. We also present a case study exemplifying the usefulness of our tool surrounding the series of EDS attacks that occurred in Ukraine in 2015 and 2016.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Location-Based Publish/Subscribe Service Using a Graph-Based Computing Model","authors":"A. Tripathi, Henry Hoang","doi":"10.1109/CIC.2017.00024","DOIUrl":"https://doi.org/10.1109/CIC.2017.00024","url":null,"abstract":"We present here the initial results of our investigation of a system architecture for location-based publish/subscribe services utilizing a graph-based model for managing data and computations. This architecture is implemented on a cluster computer using the facilities and the computation model provided by the Beehive framework which supports a transactional model of parallel computing on dynamic graph data structures. We implemented a Museum Visitor Service as an example of a location-based publish/subscribe system to study and evaluate the performance this approach. This service includes features utilizing location-based publish/subscribe functions for supporting coordination and collaboration among members in a social group visiting the museum. We implemented a testbed system for this service and evaluated its performance on a cluster computer. Our work also illustrates that weaker consistency models for transactions can be utilized in such services to achieve higher performance and scalability.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"82 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. E. Ferreira, P. L. Takecian, L. T. Kamaura, Bruno Padilha, C. Pu
{"title":"Dependency Management with WED-flow Techniques and Tools: A Case Study","authors":"J. E. Ferreira, P. L. Takecian, L. T. Kamaura, Bruno Padilha, C. Pu","doi":"10.1109/CIC.2017.00055","DOIUrl":"https://doi.org/10.1109/CIC.2017.00055","url":null,"abstract":"Projects, in Process-Aware Information Systems (PAIS) for medical scientific research, have as requirements all sorts of data coming from many interdependent processes. More concretely, in autopsy study, data are collected from two main interdependent processes: 1) material collection and processing; and 2) interview. These processes are the groundwork to optimize the association between biological material and research projects. However, there is an important challenge for managing dependencies among these processes. In this scenario, we summarize this challenge with the following question: how to implement a PAIS specification efficiently when we have to manage dependencies among processes in a complex domain (such as the one found when constructing an autopsy study system)? To answer this, the authors used an alternative approach, called WED-flow, based on the combination of process-aware, event-based and data- driven paradigms as well as its process specification language called WED-SQL, to develop an autopsy study system called SISAUT. The implementation of dependencies among processes had its complexity reduced based on the maintenance of shared data states and the triggering of events that are responsible for the execution of processes activities as needed. This complexity reduction allows developers to put an extra emphasis on more essential tasks such as business process modelling and also the incremental development of the system.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128885395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AARBAC: Attribute-Based Administration of Role-Based Access Control","authors":"Jiwan Ninglekhu, R. Krishnan","doi":"10.1109/CIC.2017.00027","DOIUrl":"https://doi.org/10.1109/CIC.2017.00027","url":null,"abstract":"Administrative Role-Based Access Control (ARBAC) models deal with how to manage user-role assignments (URA), permission-role assignments (PRA), and role- role assignments (RRA). A wide-variety of approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose attribute-based administrative models that unify many prior approaches for URA and PRA. The motivating factor is that attributes of various RBAC entities such as admin users, regular users and permissions can be used to administer URA and PRA in a highly-flexible manner. We develop an attribute-based URA model called AURA and an attribute-based PRA model called ARPA. We demonstrate that AURA and ARPA can express and unify many prior URA and PRA models.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123292895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Identification for Collaborative, Geographically Dispersed, Cross-Functional Software Development Teams","authors":"Amol Patwardhan","doi":"10.1109/CIC.2017.00014","DOIUrl":"https://doi.org/10.1109/CIC.2017.00014","url":null,"abstract":"The process of software development is a collaborative effort that may consist of various geographically dispersed teams. It involves extensive communication over emails, intra-company forums, blogs, surveys and code reviews. The high level of message and opinion exchange evokes positive and negative emotions regarding the software project delivery. This paper proposed techniques to identify the underlying emotion polarity across various collaborating teams by analyzing the communication during the software release cycle. It also evaluated whether there was a relation between emotion polarity and social factors and software artifacts such as gender, location of team, experience level, release duration, team size, code issue count and code review comments. The sentiment analysis was used to implement an emotion dashboard to measure the project success and emotional health across various cross-functional software development teams. 80% of the managers found the tool useful in improving the overall team morale and 70% managers found the dashboard useful for identifying the emotional health of the collaborating teams.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter","authors":"Anup Kumar Maurya, V. N. Sastry","doi":"10.1109/CIC.2017.00032","DOIUrl":"https://doi.org/10.1109/CIC.2017.00032","url":null,"abstract":"For security sensitive Internet of Things (IoT) and Wireless Sensor Networks(WSNs), an efficient authenticated key exchange (AKE) mechanism improves the quality of services and reduces the possibility of security attacks. In this paper, we propose Bloom filter based authentication scheme suitable for the WSNs and IoT of large hop count (i.e., the large number of intermediate sensor nodes through which data must pass between source sensor node and gateway node). The novelty of our proposed protocol is, it eliminates unauthorized querying message transmission at the initial level (i.e., at the sensor node itself) to avoid bogus message flooding from the sensor nodes to the gateway node (which exhausts the resources of WSNs). We perform the formal and informal security analysis of the proposed schemes using widely accepted AVISPA tool and random oracle model. The computational analysis shows that our system is suitable for resource constrained sensor nodes like TelosB and MicaZ. The relative security and performance analysis results indicate that our scheme is more secure, efficient and robust in comparison to other existing systems.","PeriodicalId":156843,"journal":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122490756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}