2019 2nd International Conference on Data Intelligence and Security (ICDIS)最新文献

筛选
英文 中文
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing 云计算环境下Ceph分布式文件系统双I/O性能的新方法
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00018
Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao
{"title":"A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing","authors":"Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao","doi":"10.1109/ICDIS.2019.00018","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00018","url":null,"abstract":"Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired 视障人士寻路和避障的RNN和CNN
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00041
Faruk Ahmed, M. Mahmud, M. Yeasin
{"title":"RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired","authors":"Faruk Ahmed, M. Mahmud, M. Yeasin","doi":"10.1109/ICDIS.2019.00041","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00041","url":null,"abstract":"Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm 基于遗传算法的多相流最优闭合关系选择
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00017
S. Mohammadi, M. Papa, E. Pereyra, C. Sarica
{"title":"Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm","authors":"S. Mohammadi, M. Papa, E. Pereyra, C. Sarica","doi":"10.1109/ICDIS.2019.00017","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00017","url":null,"abstract":"A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack 网络攻击下智能电表数据采集的安全完整性
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00009
Sanjeev Kumar, Harsh Kumar, G. Gunnam
{"title":"Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack","authors":"Sanjeev Kumar, Harsh Kumar, G. Gunnam","doi":"10.1109/ICDIS.2019.00009","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00009","url":null,"abstract":"Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System 基于modbus的油气井监测系统异常检测传感器
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00008
Xinchi He, Ethan Robards, R. Gamble, M. Papa
{"title":"Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System","authors":"Xinchi He, Ethan Robards, R. Gamble, M. Papa","doi":"10.1109/ICDIS.2019.00008","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00008","url":null,"abstract":"Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols 将控制原语映射到SCADA通信协议的平台无关语言
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00020
Zachary Hill, J. Hale, M. Papa, P. Hawrylak
{"title":"Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols","authors":"Zachary Hill, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00020","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00020","url":null,"abstract":"Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Mix Column Computation of Cryptographic AES 改进的加密AES混合列计算
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00042
Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar
{"title":"Improved Mix Column Computation of Cryptographic AES","authors":"Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar","doi":"10.1109/ICDIS.2019.00042","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00042","url":null,"abstract":"With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physiological Measurement for Emotion Recognition in Virtual Reality 虚拟现实中情感识别的生理测量
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00028
Lee B. Hinkle, K. Khoshhal, V. Metsis
{"title":"Physiological Measurement for Emotion Recognition in Virtual Reality","authors":"Lee B. Hinkle, K. Khoshhal, V. Metsis","doi":"10.1109/ICDIS.2019.00028","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00028","url":null,"abstract":"In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Dependencies Preserving Shuffle in Relational Database 关系数据库中的数据依赖保持Shuffle
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00034
Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas
{"title":"Data Dependencies Preserving Shuffle in Relational Database","authors":"Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas","doi":"10.1109/ICDIS.2019.00034","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00034","url":null,"abstract":"This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on the Impacts of Quantum Computers on Information Security 量子计算机对信息安全的影响综述
2019 2nd International Conference on Data Intelligence and Security (ICDIS) Pub Date : 2019-06-28 DOI: 10.1109/ICDIS.2019.00039
Maryann Njorbuenwu, Bobby Swar, P. Zavarsky
{"title":"A Survey on the Impacts of Quantum Computers on Information Security","authors":"Maryann Njorbuenwu, Bobby Swar, P. Zavarsky","doi":"10.1109/ICDIS.2019.00039","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00039","url":null,"abstract":"Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信