{"title":"FiCloud 2018 Program Committee","authors":"","doi":"10.1109/ficloud.2018.00007","DOIUrl":"https://doi.org/10.1109/ficloud.2018.00007","url":null,"abstract":"","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. P. Namanya, A. Cullen, I. Awan, Jules Pagna Disso
{"title":"The World of Malware: An Overview","authors":"A. P. Namanya, A. Cullen, I. Awan, Jules Pagna Disso","doi":"10.1109/FiCloud.2018.00067","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00067","url":null,"abstract":"Malware, short for malicious software is a program code that is hostile and often used to corrupt or misuse a system. Introducing malware into a computer network environment has different effects depending on the design intent of the malware and the network layout. Malware detection and prevention systems are bypassed by malicious files in computer systems as malware become more complex and large in numbers. This paper presents an overview of the world of malware with the intent of providing the underlying information for the intended study into developing malware detection approaches.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srinikethan Madapuzi Srinivasan, Tram Truong-Huu, M. Gurusamy
{"title":"TE-Based Machine Learning Techniques for Link Fault Localization in Complex Networks","authors":"Srinikethan Madapuzi Srinivasan, Tram Truong-Huu, M. Gurusamy","doi":"10.1109/ficloud.2018.00012","DOIUrl":"https://doi.org/10.1109/ficloud.2018.00012","url":null,"abstract":"","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"581 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117068453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faraz Fatemi Moghaddam, Tayyebe Emadinia, P. Wieder, R. Yahyapour
{"title":"A Sequence-Based Access Control Framework for Reliable Security Management in Clouds","authors":"Faraz Fatemi Moghaddam, Tayyebe Emadinia, P. Wieder, R. Yahyapour","doi":"10.1109/FiCloud.2018.00023","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00023","url":null,"abstract":"Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be protected from disclosing to unauthorized users. Policy-Management models are the most appropriate solutions to create and manage security levels in clouds. However, these models increase the process of matching access requests to defined policies considerably. In this paper, we proposed a reliable access management framework based on multi-level policies and sequences. The suggested model introduces each level of security as s sequence according to the inheritance concepts to classify security levels efficiently and to enhance the process of access control by elimination of un-necessary re-matching. our results showed the suggested model is able to decrease the access response time without affecting the security of the environments.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117277363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating Smart Environments: Analysis of Improving Security on Smart Homes","authors":"Ivan Del Pozo, Denise Cangrejo","doi":"10.1109/FiCloud.2018.00051","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00051","url":null,"abstract":"The more we immerse ourselves in the 'Digital Transformation', social and business, the more the new technologies that are launched to the market arise. Thinking about the concept of 'housing of the future', 'smart environments' or 'autonomous cars' may seem somewhat distant or perhaps very few people enjoy, but it is not. Above all, it is a phenomenon that is happening thanks to the development of the Internet of Things (IoT). The development of intelligent devices has been changing the behavioral patterns of users, such as using smart devices for everything to collect information that we rarely knew. However, with the introduction of IoT, we will be experiencing giant challenges to secure and protect its advanced information services due to the significant increase of the cyber-attacks, and number of interconnected resources that can be a double-edged sword. The purpose of this paper is to present a solution to this problem implementing a smart hub, complemented with an analytical review of security in all the devices interconnected focused in smart homes. It also presents how vulnerable and exposed we are with the interconnection of all our devices, identifying limitations and research challenges.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126418170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tadeu Freitas, João Rodrigues, Diogo Bogas, M. Coimbra, Rolando Martins
{"title":"Panoptic, Privacy over Edge-Clouds","authors":"Tadeu Freitas, João Rodrigues, Diogo Bogas, M. Coimbra, Rolando Martins","doi":"10.1109/FiCloud.2018.00054","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00054","url":null,"abstract":"The increasing capabilities of smartphones is paving way to novel applications through the crowd-sourcing of these untapped resources, to form hyperlocal meshes commonly known as edge-clouds. While a relevant body-of-work is already available for the underlying networking, computing and storage facilities, security and privacy remain second class citizens. In this paper we present Panoptic, an edge-cloud system that enables the search for missing people, similar to the commonly known Amber alert system, in high density scenarios where wireless infrastructure might be limited (WiFi and LTE), e.g. concerts, while featuring privacy and security by design. Since the limited resources present in the mobile devices, namely battery capacity, Panoptic offers a computing offloading that tries to minimize data leakage while offering acceptable levels of performance. Our results show that it is achievable to run these algorithms in an edge-cloud configuration and that it is beneficial to use this architecture to lower data transfer through the wireless infrastructure while enforcing privacy. Results from our experimental evaluation show that the security layer does not impose a significant overhead, and only accounts for 2% of the total execution time for an edge cloud comprised by, but not limited to, 8 devices.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad A. Altahat, A. Agarwal, N. Goel, Marzia Zaman
{"title":"Analysis and Comparison of Live Virtual Machine Migration Methods","authors":"Mohammad A. Altahat, A. Agarwal, N. Goel, Marzia Zaman","doi":"10.1109/FiCloud.2018.00044","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00044","url":null,"abstract":"With the huge development of servers' virtualization technology, the importance of live virtual machines (VM) migration has increased in order to improve hardware utilization, increase the power efficiency of data centers, and to decrease the effect of data centers failures and service downtime during the maintenance period. Live VM migration is the process of copying the CPU state and the memory and disk states of a VM from a hosting physical server to another destination server at the same data center, or to another data center connected to the hosting data center over LAN or WAN networks, with the least service downtime, in order not to affect the Quality of Experience (QoE) of virtualization service users. After the VM is transferred to the destination host and before it resumes running there, network traffic should be redirected to the new VM's location. In this paper, we analyze and compare the three migration methods: the Pre-copy, the Post-copy, and the Hybrid-copy method. We explain the mathematical model of the Pre-copy method as available in the literature. We present our mathematical models for Post-copy and Hybrid-copy methods for the migration downtime, total migration time, and total transferred data during the migration process. We implement the three models using MATLAB and evaluate the performance of these migration methods for different experimental parameters. Based on the performance we propose which method is suitable for live migration of virtual machines.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134391288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page i]","authors":"","doi":"10.1109/ficloud.2018.00001","DOIUrl":"https://doi.org/10.1109/ficloud.2018.00001","url":null,"abstract":"","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127375122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Behavioural Security Factors for Enhanced Protection of Organisational Information Technology Assets","authors":"Aristotle Onumo, A. Cullen, I. Awan","doi":"10.1109/FiCloud.2018.00026","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00026","url":null,"abstract":"Recently organisations are beginning to realise that strategic application of controls and the application of security behavioural principles in organisational processes and procedures is a prerequisite to developing a cybersecurity infrastructure that will support economic development in line with organisations value orientation. In this study, we propose a model that attempts to examine how organisational cultural value orientation and employee security behaviour complement each other in fostering organisational compliance to practices and procedure for the protection of information technology assets. Drawing from the theory of planned behaviour, triandis' model and competing value framework, a theoretical model that fuses the constituents of the aforementioned was proposed while relevant hypotheses emanating from relevant and related literatures were also presented. The study's implication for continuing research and how this model will be tested empirically are discussed.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Modica, O. Tomarchio, Domenico Calcaterra, Vincenzo Cartelli
{"title":"Implementation of a Fault Aware Cloud Service Provisioning Framework","authors":"G. Modica, O. Tomarchio, Domenico Calcaterra, Vincenzo Cartelli","doi":"10.1109/FiCloud.2018.00010","DOIUrl":"https://doi.org/10.1109/FiCloud.2018.00010","url":null,"abstract":"Cloud resource providers have to face the technical issues that may arise with the virtualization and provisioning of their own resources to the requesting customers on a daily basis. A provisioning technique is said to be smart if it is able to orchestrate the provisioning activities in a way that minimizes the overall time IT people spend to manually recover from faults occurring while customer requests are being served. The big players adopt proprietary solutions to guarantee a smooth provisioning experience to their customers. On the research side, the TOSCA specification represents the most authoritative effort to define a standard representation of interoperable Cloud services. In this work we discuss the design and implementation of a software prototype of a fault-aware orchestrator capable of automating the workflow for service provisioning. The developed system leverages on the ease of use of TOSCA for the description of provisioning schemes, and exploits the potential of the BPMN notation for the enforcement of the provisioning activities. The software prototype was developed and tested with a sample use case which is discussed in the paper.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124789649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}