Shao-Jui Chen, Chia-Ching Chen, Hsiang-Lun Lu, Wei-Jen Wang
{"title":"Efficient resource provisioning for virtual clusters on the cloud","authors":"Shao-Jui Chen, Chia-Ching Chen, Hsiang-Lun Lu, Wei-Jen Wang","doi":"10.1504/IJSTM.2017.10002703","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002703","url":null,"abstract":"A virtual cluster could consume a considerable amount of network bandwidth due to its internal communication demands. Since communication among VMs on the same physical machine is done through emulation, it does not use any network bandwidth. Therefore, placement of virtual clusters should utilise this fact to reduce unnecessary bandwidth consumption. To achieve this goal, one has to consider the constraints of the physical machines, as well as the communication relationship among the virtual machines of the virtual cluster. In this paper, we propose to use a monitoring/profiling mechanism to track and to classify virtual clusters. The information is then used by a resource provisioning mechanism to place virtual machines on physical machines, such that unnecessary network bandwidth consumption is reduced. Our experimental results show that, the proposed mechanism significantly outperforms the default VM scheduler provided by OpenStack.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haehyun Cho, Hyunki Kim, Jongsu Lim, Junghwan Lee, J. Yi
{"title":"Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things","authors":"Haehyun Cho, Hyunki Kim, Jongsu Lim, Junghwan Lee, J. Yi","doi":"10.1504/IJSTM.2017.10002693","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002693","url":null,"abstract":"Java-based Android apps are primarily composed of managed code. Managed codes can be easily modified; therefore many static prevention techniques are applied. However, static prevention techniques can be immobilised by dynamic reverse engineering tools. Reverse engineering tools for such managed code operate using QEMU-based emulator methods. Among the many anti-reversing techniques to detect tampering of the application, schemes that terminate the application when an emulator has been detected are being used. In this paper, we compare and analyse the characteristics of the various schemes used to detect emulator-based reverse engineering tools and report experimental results on the effectiveness of the methods in question.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of lightweight network access control technique on wireless router","authors":"Hyeji Heo, Jaecheol Ryou","doi":"10.1504/IJSTM.2017.10002706","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002706","url":null,"abstract":"We propose a lightweight network access control (NAC) technique applied to wireless router. It authenticates users and devices whether they are trusted or not and it controls the access of the devices according to their security state. As the age of internet of things and bring your own device has begun, NAC technique has become more important. However, it is hard to adopt the NAC from small and medium sized enterprise because of the cost problem. For this reason, we suggest lightweight NAC on wireless router. To do this, we developed an advanced NAC module added to OpenWrt, open source wireless router firmware, which allows to establish secure network environment without additional NAC appliance. We also developed agent programs for PC and mobile to examine the security state of device and identify the trusted users and devices.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of random noise generated by graphic processing units","authors":"Yongjin Yeom, Taeill Yoo","doi":"10.1504/IJSTM.2017.10002707","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002707","url":null,"abstract":"Random number generators are essential in modern cryptography. The security of a cryptographic scheme can be achieved under the assumption that the system uses ideal random numbers to produce sensitive security parameters such as encryption keys and initial vectors. The weakness of the random number generator makes the entire cryptographic system insecure. In particular, the lack of entropy sources leads to predictable output random bits so that secret information can be guessed by malicious attackers. Therefore, it is important to collect sufficient entropy from physical noise sources. In this paper, we consider graphics processing units (GPUs) as an entropy source. From the race conditions in the parallel computations on a GPU, we can harvest sufficient entropy for cryptography. Using the entropy estimations in NIST SP 800-90B, the amount of entropy is estimated and compared with other physical sources.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world","authors":"A. Buldas, Risto Laanoja, A. Truu","doi":"10.1504/IJSTM.2017.10002708","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002708","url":null,"abstract":"Multi-tenancy in the cloud environment brings new challenges to data security including but not limited to trust, data and system integrity and the overhead of cryptographic key management. These challenges can be efficiently addressed using novel data signing schemes. We compare personal digital signature solutions provided by public key infrastructure (PKI) and keyless signature infrastructure (KSI) and describe how these technologies can support each other. We discuss some ways of integrating a personal KSI service with external identity providers. As KSI can 'indemnify' PKI against the cryptographic threat of practical quantum computers, we delve into the post-quantum security of cryptographic hash functions and hash-and-publish signature schemes.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure rank correlation computation for IoT applications","authors":"Kok-Seng Wong, M. Kim","doi":"10.1504/IJSTM.2017.10002702","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002702","url":null,"abstract":"The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127743008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy-preserving URL-hiding scheme for the web of things","authors":"J. H. Park, I. Jung, Soon-Ja Kim","doi":"10.1504/IJSTM.2017.10002692","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002692","url":null,"abstract":"Internet-enabled devices have been increasing due to the development of the system-on-chip technology. It is not practical to use different applications to communicate with these devices due to many different types of the devices. To use the existing web protocol is an alternative solution because the internet-enabled devices can be accessed and controlled via web browser. However, the privacy exposure when accessing the devices by URL has raised serious concerns. To address this problem, we propose an efficient URL-hiding scheme. The scheme is lightweight and does not expose any information with the URL.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116720843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing security vulnerability by operating system environment","authors":"Dongkyun Seo, Kyungho Lee","doi":"10.1504/IJSTM.2017.10002715","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002715","url":null,"abstract":"Windows platforms such as Windows XP, Windows 7 and Windows 8 have various security vulnerabilities. Windows has 90% market share and is targeted for hackers. Thus, financial incident or system failure can be caused by hackers. To prevent these incidents, it is necessary to grasp and understand the area of high vulnerability in Windows platform to prevent these incidents. We researched and analysed vulnerabilities with Windows platforms and compared with the analysed result in terms of the difference in user privilege, Windows operating system and version of Internet Explorer. We found vulnerabilities that occurred only in specific Windows product or version of Internet Explorer. Through analysed vulnerability scanning result, we compared the differences between in each environment. The vulnerability incident frequency was found based on user privilege, OS platforms, and Internet Explorer versions. In this paper, we propose the way to make an essential and secure computing configuration of Windows.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System security manager education framework","authors":"Geunhye Kim, Mina Shim","doi":"10.1504/IJSTM.2017.10002704","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002704","url":null,"abstract":"This study aims to develop an education framework for system security manager via job analysis. By developing an education framework as basis for acquiring the job skills to become a system security manager, we intend to elucidate the job profiles necessary for information security professionals, and offer relevant information and guidelines. To achieve this goal, this study is organised as follows: first, jobs required from a system security manager are derived; second, knowledge and skills required to perform those jobs and duties are proposed; third, a frame curriculum is established based on those knowledge and skills; lastly, roadmaps for paths toward system security manager are presented based on this frame curriculum. This education framework will serve as standard for curricula for system security-related education, training programs, and criteria for evaluating the program participants' knowledge, skills, and proficiency levels as industrial human resources (HR).","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132943412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on the thermo-control characteristics of moxibustion device based on temperature sensing data","authors":"Taegon Kim, M. Cheon","doi":"10.1504/IJSTM.2017.10002699","DOIUrl":"https://doi.org/10.1504/IJSTM.2017.10002699","url":null,"abstract":"In this study, a moxibustion device was developed using a silicone heater for safe and effective use. The developed moxibustion device is divided into a control unit in charge of overall control of the apparatus and a care unit to transfer heat and extract to the treated part. The device uses an infrared temperature sensor installed in the care units for real-time detection of the change in the skin surface temperature using a heater, so that it always follows the setting temperature. Moreover, to implement various heating patterns, the constant voltage applied to the heater was adjusted using voltage regulator (VR). As a result, the constant voltage applied to the object changed according to the variation in the VR. According to the measurement of the skin temperature, the heat was uniformly transferred to the affected parts.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}