{"title":"A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing","authors":"Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao","doi":"10.1109/ICDIS.2019.00018","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00018","url":null,"abstract":"Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired","authors":"Faruk Ahmed, M. Mahmud, M. Yeasin","doi":"10.1109/ICDIS.2019.00041","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00041","url":null,"abstract":"Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm","authors":"S. Mohammadi, M. Papa, E. Pereyra, C. Sarica","doi":"10.1109/ICDIS.2019.00017","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00017","url":null,"abstract":"A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack","authors":"Sanjeev Kumar, Harsh Kumar, G. Gunnam","doi":"10.1109/ICDIS.2019.00009","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00009","url":null,"abstract":"Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System","authors":"Xinchi He, Ethan Robards, R. Gamble, M. Papa","doi":"10.1109/ICDIS.2019.00008","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00008","url":null,"abstract":"Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols","authors":"Zachary Hill, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00020","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00020","url":null,"abstract":"Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Mix Column Computation of Cryptographic AES","authors":"Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar","doi":"10.1109/ICDIS.2019.00042","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00042","url":null,"abstract":"With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physiological Measurement for Emotion Recognition in Virtual Reality","authors":"Lee B. Hinkle, K. Khoshhal, V. Metsis","doi":"10.1109/ICDIS.2019.00028","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00028","url":null,"abstract":"In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas
{"title":"Data Dependencies Preserving Shuffle in Relational Database","authors":"Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas","doi":"10.1109/ICDIS.2019.00034","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00034","url":null,"abstract":"This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on the Impacts of Quantum Computers on Information Security","authors":"Maryann Njorbuenwu, Bobby Swar, P. Zavarsky","doi":"10.1109/ICDIS.2019.00039","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00039","url":null,"abstract":"Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}