{"title":"A Distributed Routing Algorithm for LEO Satellite Networks","authors":"Jundong Ding, Yong Zhang, Ruonan Li, Liang Zhao","doi":"10.1109/TrustCom.2013.165","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.165","url":null,"abstract":"Datagram routing in inclined delta LEO satellite constellation networks is a challenge issue due to their fast-changing topologies. We propose a novel location-based routing algorithm to reduce the routing overhead. The simulation has been done for performance evaluation.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"354 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanheng Zhao, Xin Li, Zhiping Jia, Lei Ju, Ziliang Zong
{"title":"Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters","authors":"Yanheng Zhao, Xin Li, Zhiping Jia, Lei Ju, Ziliang Zong","doi":"10.1109/TrustCom.2013.155","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.155","url":null,"abstract":"Computer clusters bring high performance as well as large energy consumption. Energy-efficient scheduling strategies for parallel applications running on a homogeneous cluster can perform efficiently in conserving energy. In order to achieve the goal of optimizing performance and energy efficiency in clusters, we propose an energy-efficient Dependency-based task Grouping (DG) method to assign parallel tasks under precedence constrains to multi-core processors. Dependency degree is defined as the sum of the reduced communication time by assigning task paths with much intercommunication to one processor and the execution time of unexecuted redundant tasks on the same node. Our algorithms aim at reducing energy consumption and improving resource utilization by assigning the task paths with highest dependency degrees to one processor. Combining three existing schedule algorithms-TDS (Task Duplication Scheduling), EAD (Energy-Aware Duplication) and PEBD (Performance-Energy Balanced Duplication) with the DG method, we propose three improved algorithms-TDS-DG, EAD-DG and PEBD-DG. Compared with the three existing algorithms, the improved algorithms can save energy and improve computing resource utilization by 55.4% and 71.2% on average, respectively, at the cost of a slightly 2% performance degradation.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality Assessment for Stereoscopic Image Based on DCT Frequency Information","authors":"Chao Sun, Xingang Liu, Kai Kang, L. Yang","doi":"10.1109/TrustCom.2013.168","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.168","url":null,"abstract":"In this paper, we propose an efficient perceptual quality assessment for stereoscopic image based on Discrete Cosine Transform (DCT) coding. In this algorithm, visual sensitivity for human beings to perceive stereoscopic image in frequency domain has been considered. Excepting for this important property related to Human Visual System (HVS), another property is also taken into account: contrast sensitivity function (CSF). In our algorithm, for the left reference block, its most matching block in the left view is found by using the block matching method, and the right reference block is searched based on disparity information as a vital feature in 3D image/video. In addition, its matching block for the right reference one is also finished. The processing mode is completed for the original and distorted stereoscopic images. Then, these blocks are processed by DCT and calculated by modified PSNR in view of CSF and Region of Interest (ROI) mechanism (visual sensitivity). The calculated results have demonstrated its validity compared with the subjective test results. And the proposed perceptual quality assessment metric outperforms other currently popular metrics.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Saleem, M. Khalil, N. Fisal, A. A. Ahmed, M. Orgun
{"title":"Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs","authors":"K. Saleem, M. Khalil, N. Fisal, A. A. Ahmed, M. Orgun","doi":"10.1109/TRUSTCOM.2013.206","DOIUrl":"https://doi.org/10.1109/TRUSTCOM.2013.206","url":null,"abstract":"Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Role Based Access Control for Security-Purpose Hypervisors","authors":"Manabu Hirano, D. Chadwick, S. Yamaguchi","doi":"10.1109/TrustCom.2013.199","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.199","url":null,"abstract":"This paper shows the design and implementation of a Role Based Access Control (RBAC) mechanism for securing a hypervisor called BitVisor. BitVisor is a small hypervisor that provides security functions like encryption services for I/O devices in its hypervisor-layer. BitVisor enforces security functions without the help of guest OSs, but it only supports a static configuration file for machine set up. Consequently, we employ the RBAC system called PERMIS, a proven implementation of an RBAC policy decision engine and credential validation service, in order to provide dynamic configuration control. By using PERMIS, we can write finer grained authorization policies and can dynamically update them for the security-purpose hypervisor.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications","authors":"Wei Zhou, Yang Xu, Guojun Wang","doi":"10.1109/TrustCom.2013.78","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.78","url":null,"abstract":"Key management becomes more difficult in multi-privileged communications due to the dynamic membership and the complex relations between users and resources. Since centralized key management schemes have the drawbacks of the single point of failure and performance bottleneck, distributed key management schemes are proposed to solve the problem. In this paper, we propose a distributed key management scheme using multilinear forms for multi-privileged group communications. The identifications are assigned to service groups (SGs) and session keys (SKs). Based on the relationship of SGs and SKs, a derivation technique is designed to allow the SG servers to efficiently determine the affected SKs on their own according to the identification of the SG in which membership changes. For one leaving/switching operation, a uniform rekeying material is negotiated between the related SGs by using multilinear forms. As a consequence, the affected SGs can deduce all the affected SKs through the previous keys or with the rekeying material by using one-way function. The security analysis shows that the proposed scheme is secure. The performance evaluation shows the proposed scheme reduces the communication cost greatly.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service","authors":"Wenkang Wu, Zhuo Tang, Renfa Li","doi":"10.1109/TrustCom.2013.192","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.192","url":null,"abstract":"Cloud computing provides a powerful environment for growing a variety of services and data. Role-Based Access Control (RBAC) has widely been accepted as a promising model to capture dynamic requirements in cloud computing service. Constraints are a powerful mechanism for enforce higher-level organizational policy for RBAC. In this paper, we study temporal constraints and role-based constraints, and propose Temporal Constraint Consistency Problem (TCCP). We study the computational complexities of TCCP in different subcases and generate a valid assignment to satisfy all the constraints, then reduce them into general P, NP and NP-Hard problems. By this way, we can provide a possible solution to the conflicting constraints which may coexist in a cloud computing environment.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. S. Parra, Neil Orlando Diaz Martinez, G. L. Rubio
{"title":"Comparison SIP and IAX to Voice Packet Signaling over VOIP","authors":"O. S. Parra, Neil Orlando Diaz Martinez, G. L. Rubio","doi":"10.1109/TrustCom.2013.174","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.174","url":null,"abstract":"Within the VolP networks environment, there are three protocols that solve the problem of voice packet signaling, known as \"highlight protocols\": H323, SIP and IAX. Particularly, this document focuses on a specific difference between SIP and IAX: the bandwidth, which is an essential parameter in order to design and optimize a VoIP network for an organization. One of the most important factors to consider when building VoIP networks is the proper capacity planning. About capacity planning, bandwidth calculation is an important factor to consider when designing and troubleshooting packet voice networks for good voice quality. This paper presents important explanations about the bandwidth utilization over VoIP networks, this include o take some theoretical foundations and calculate the bandwidth per media flow for a VoIP trunk, in which different voice codecs is enabled (specifically G. 711 and JSM) and when a VoIP protocol such as SIP and IAX. Voice over IP (VoIP) is used. These calculations will be compared here against the results obtained stats about traffic analysis from some network analyzers over a physical Ethernet trunk between two Asterisk servers into a specific LAN, simulating two different branches for an organization. Both the analysis of the results obtained and the proper conclusions from this work, are useful when calculating the maxim number of simultaneous calls or the minimal capability of a data link, necessary for a single number of voice conversations, taking into account the audio codecs used and signaling and data flow protocols.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang
{"title":"SciHive: Array-Based Query Processing with HiveQL","authors":"Yifeng Geng, Xiaomeng Huang, Meiqi Zhu, Huabin Ruan, Guangwen Yang","doi":"10.1109/TrustCom.2013.108","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.108","url":null,"abstract":"The data-intensive scientific discoveries are generating huge amounts of data at an alarming rate. Most of the data are multidimensional and stored in array-based file formats. The processing of such big data becomes an urgent challenge. In this paper, we present SciHive, a scalable and easy-to-use array-based query system. SciHive enables scientists to process raw array datasets in parallel with a SQL-like query language. We implement SciHive as an extension of Hive which is a data warehouse system on Hadoop. SciHive maps the arrays in NetCDF files to a table and executes the queries via MapReduce. Files are loaded dynamically as needed. So SciHive does not need any additional pre-loading or format conversion procedure. In addition, SciHive includes two optimization methods to reduce the generated rows. Experiments with different queries on representative datasets show that the optimizations are very effective in most cases and SciHive is scalable to handle large datasets.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Trust in Absorptive Capacity Operationalization","authors":"A. Qureshi, N. Evans","doi":"10.1109/TrustCom.2013.225","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.225","url":null,"abstract":"In this era of rapid growth in information and communication technologies organizations are going through melodramatic changes in their environments and culture. This challenge demands dynamic capabilities to sustain its competitive advantage. One such a capability is the knowledge absorption capability (i.e. absorptive capacity) that can be described as the ability of an organization to acquire, assimilate, transform and exploit knowledge gained from external sources. Absorptive capacity operationalization refers to the functioning of its dimensions. Although absorptive capacity has been extensively studied, the role of trust in operationalizing absorptive capacity is not yet been investigated. This research seeks to understand the role of trust in each of the absorptive capacity dimensions. A qualitative research methodology is employed through exploratory case studies to answer the research question, using semi-structured interviews as a dynamic data collection strategy. A theoretical framework is proposed to further understand the relationship between trust and absorptive capacity. A model will be developed to guide organizations to enhance absorptive capacity towards innovation, improved performance and competitive advantage. The paper is representing work in progress and the framework is currently being tested in the Healthcare industry in Australia.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}