C. Wagner, Aleksandar Hudic, Silia Maksuti, Markus Tauber, Frank Pallas
{"title":"Impact of Critical Infrastructure Requirements on Service Migration Guidelines to the Cloud","authors":"C. Wagner, Aleksandar Hudic, Silia Maksuti, Markus Tauber, Frank Pallas","doi":"10.1109/FiCloud.2015.79","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.79","url":null,"abstract":"A high level of information security in critical infrastructure IT systems and services has to be preserved when migrating their IT services to the cloud. Often various legislative and security constraints have to be met in line with best practice guidelines and international standards to perform the migration. To support the critical infrastructure providers in migrating their services to the cloud we are developing a process based migration guideline for critical infrastructure providers focusing on information security. First of all we investigate, via questionnaires, how the importance of individual security topics covered in such guidelines differentiates between industry stakeholders and critical infrastructure providers. This supports the selection of relevant security topics and the considered guidelines and standards, which we survey in search for common relevant security topics. Subsequently we present the analysis of the above-mentioned security requirements and how they affect a here developed taxonomy for a process-based security guideline. Furthermore we present potential service migration use cases and how our methodology would affect the migration of secure critical infrastructure services.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kanchi, S. Sandilya, Shashank Ramkrishna, S. Manjrekar, Akshata Vhadgar
{"title":"Challenges and Solutions in Big Data Management -- An Overview","authors":"S. Kanchi, S. Sandilya, Shashank Ramkrishna, S. Manjrekar, Akshata Vhadgar","doi":"10.1109/FiCloud.2015.121","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.121","url":null,"abstract":"Currently, a huge explosion of data is observed in many organizations in the world. Industry analysts and businesses are looking towards Big Data As the next big thing to provide opportunities, insights, solutions and a new way to increase profits in business. From social networking sites to records in a hospital, Big Data has played an important role to improve businesses and innovation. Businesses strive to get quality information and retrieve them for data analysis and business purposes. Though big data is obtained from numerous resources, there are many issues and challenges that companies face while storing and handling Big Data. Proper data management practices, techniques, technology and infrastructure can help overcome these challenges, problems and issues. This paper gives an overview about the issues and challenges of Big Data management, also their solutions and practices being used to handle them.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paolo Farina, E. Cambiaso, Gianluca Papaleo, M. Aiello
{"title":"Understanding DDoS Attacks from Mobile Devices","authors":"Paolo Farina, E. Cambiaso, Gianluca Papaleo, M. Aiello","doi":"10.1109/FiCloud.2015.19","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.19","url":null,"abstract":"The recent proliferation of smartphones and tablets leads to consider such devices as means for the execution of cyber-attacks. This scenario has rarely been considered earlier, since mobile devices always represented a target for cyber-criminals, rather than a vector to exploit. In this paper we introduce an innovative mobile bot net infrastructure, composed by mobile agents, for the execution of denial of service attacks. We prove that the chance of involving mobile bots is possible, comparing the proposed infrastructure to Low-Orbit Ion Cannon (LOIC), a well-known system in this context. Results show that in virtue of reduced resource consumption the proposed system is particularly addicted to the mobile environment. The idea of a mobile bot net is unexplored until now, therefore, the proposed system represents an important step in the mobile and cyber security field.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh Network","authors":"Llorenç Cerdà-Alabern, Axel Neumann, L. Maccari","doi":"10.1109/FiCloud.2015.28","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.28","url":null,"abstract":"Modeling the performance of Wireless Mesh Networks (WMN) is a task that has received a lot of attention and has produced a large body of related literature. Most of the times, such literature is based on analytic assumptions or computer simulations, and results not always match reality. In this paper we use data collected over a one-month period in a 50-nodes wireless community network in Barcelona to compare the experimental throughput we measured over multi-hop paths with the capacity estimated using the well known conflict graph model. Our experiments show that the model generally overestimates the available capacity, despite the availability of precise information on the underlying network graph. We also use the data to test the performance of the BMX6 routing protocol that runs on the network nodes and show that in the large majority of cases the path chosen by BMX6 corresponds to the path with the highest available capacity, which is a key feature to guarantee the maximum exploitation of the network resources.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Modeling of Association Attempt with the Base Station for Maximum Number of Customer Premise Equipments in the IEEE 802.22 Network","authors":"Humaira Afzal, I. Awan, M. Mufti","doi":"10.1109/FiCloud.2015.128","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.128","url":null,"abstract":"Avoiding collision among contending customer premise equipments (CPEs) attempting to associate with a base station (BS), the only available solution in IEEE 802.22 standard is binary exponential random backoff process in which the contending CPEs retransmit their association requests. The number of attempts the CPEs sends their requests to the BS are fixed in IEEE 802.22 network. This paper presents a mathematical framework for helping the BS in determining at which attempt the majority of the CPEs become the part of wireless regional area network (WRAN) from a particular number of contending CPEs at a given initial contention window size.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the Ranking Capability of SWA System","authors":"Orabi Shurrab, I. Awan","doi":"10.1109/FiCloud.2015.98","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.98","url":null,"abstract":"The analysts need timely and accurate information to conduct proactive action over complex situations. Typically, there are thousands of reported activities in real time operation, although, to direct the analysts attentions to the most important one, researchers have designed multiple levels of situational awareness (SWA). Each process lends itself to ranking the most important activities into a predetermined order. According to our best knowledge, less attention has been given to the performance evaluation with regards to the prioritisation stage. Specifically, the performance metric, \"The Activity of Interest Scores\" has not considered corner cases of different situational assessments needs and configurations. Originally, it had not been designed for measuring the capability of the SWA system. In this paper, we have proposed a new performance metric, as well as a guidance case study for measuring the ranking capability of SWA systems. Our initial result shows that, The Ranking Capability Score has provided an appropriate scoring scheme for different ranking capabilities of SWA systems.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116887625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Edutainment System -- National Palace Museum as an Example","authors":"Y. Lien","doi":"10.1109/FiCloud.2015.91","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.91","url":null,"abstract":"In order to achieve highest level of knowledge dissemination, many museums have been digitalizing their collections and disseminated them to the world through the Internet. On the other hand, cloud computing and mobile communication technologies will further enhance the penetration capability of digital information, enabling mobile users surfing the wave of information world at anytime and anywhere through mobile devices such as smart phones or tablet PC. Nevertheless, both technologies have their own limitations that may hinder their applicability to the digital museums. We use the National Palace Museum (NPM) as a reference museum for the application of cloud computing and mobile communication technologies to mobilize digital museums. A set of design guidelines specific to the NPM's services is formulated and a few edutainment systems were implemented based on these guidelines: (1) Qing Ming Painting and (2) Mao Gong Ding Inscription graphical exhibition systems. With mobilization, the NPM and other museums will be able to lift their world-class services to another level for the benefit of all.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federation Tools: An Island Connectivity Experiment with Community-Lab","authors":"Gerard Marin, L. Navarro, B. Braem, C. Blondia","doi":"10.1109/FiCloud.2015.107","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.107","url":null,"abstract":"This paper describes the standard or test bed-agnostic interfaces offered by Community-Lab an exemplifies its use in a reference experiment, the Island Connectivity Experiment. The experiment provides a web application that shows a matrix of network measurements across a slice of test bed nodes from different community networks in the test bed. The experiment uses test bed-agnostic and interoperable interfaces such as the Slice-based Facility Architecture (SFA) for resource management, resource description (RSpec), experiment management framework (OMF), instrumentation and measurement collection (OML), and presents a web interface. The experiment uses SFA to selects nodes for a slice, runs the measurements using OMF and collects measurements using OML. The experience in running the experiment validates the implementation of these test bed-agnostic interfaces, shows the complementarity and correct integration among the tools and interfaces as part of the Fed4FIRE federation, and confirms the value of a federation of test beds and the usage of test bed-agnostic tools for experimentation.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134203546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of OpenAirInterface System Emulation","authors":"A. Virdis, N. Iardella, G. Stea, D. Sabella","doi":"10.1109/FiCloud.2015.77","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.77","url":null,"abstract":"With the rapid growth of mobile networks, the radio access network becomes more and more costly to deploy, operate, maintain and upgrade. The most effective answer to this problem lies in the centralization and virtualization of the eNodeBs. This solution is known as Cloud RAN and is one of the key topics in the development of fifth generation networks. Within this context Open Air Interface is a promising emulation tool that can be used for prototyping innovative scheduling algorithms, making the most of the new architecture. In this work we first describe the emulation environment of OpenAirInterface and its scheduling framework and we use it to implement two MAC schedulers. Moreover we validate the above schedulers and we perform a thorough profiling of Open Air Interface, in terms of both memory occupancy and execution time. Our results show that OpenAirInterface can be effectively used for prototyping scheduling algorithms in emulated LTE networks.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lossy Compression of Dynamic, Weighted Graphs","authors":"Wilko Henecka, M. Roughan","doi":"10.1109/FiCloud.2015.64","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.64","url":null,"abstract":"A graph is used to represent data in which the relationships between the objects in the data are at least as important as the objects themselves. Large graph datasets are becoming more common as networks such as the Internet grow, and our ability to measure these graphs improves. This necessitates methods to compress these datasets. In this paper we present a method aimed at lossy compression of large, dynamic, weighted graphs.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122623553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}