2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

筛选
英文 中文
A Decentralised Mechanism for Secure Cloud Computing Transactions 安全云计算事务的分散机制
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732405
Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn
{"title":"A Decentralised Mechanism for Secure Cloud Computing Transactions","authors":"Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn","doi":"10.1109/FMEC54266.2021.9732405","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732405","url":null,"abstract":"In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a de centralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Ngā-KNgōpuku - a de centralised and distributed computing security model that employs scattered and redundant de centralised processing.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review 网络入侵检测的在线数据流和主动学习研究综述-系统文献综述
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732566
Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan
{"title":"Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review","authors":"Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan","doi":"10.1109/FMEC54266.2021.9732566","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732566","url":null,"abstract":"Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data streams are potentially infinite and require real-time processing in order to provide timely detection of changing attacks. To address the nature of the network data stream it is important to consider the use of online data stream learning methods for IDS. Online data stream learning is an extension of Machine Learning (ML) where special consideration is given to finding anomalies in the data stream via supervised and unsupervised methods, adapting to concept drift, processing real-time events, and management of labelling cost by using Active Learning (AL). This paper asks the question of which online data stream and AL methods for IDS have been recently reviewed? A Systematic Literature Review (SLR) was performed and found that there is currently no reviews available that focus primarily on IDS data stream learning. Reviews were organised into categories and key considerations presented.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Polymorphic Ciphers 多态密码建模
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732571
Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro
{"title":"Modeling Polymorphic Ciphers","authors":"Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro","doi":"10.1109/FMEC54266.2021.9732571","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732571","url":null,"abstract":"Polymorphic ciphers are a relatively new construct in the field of encryption. Although the first real example of the encryption, the One Time Pad (OTP), has been known since the early part of the 20th century, the idea of a “mutating cipher” has not been implemented and well studied until now. Since these ciphers are actually “engines” comprised of single algorithm ciphers with good encryption properties, such as a large key space, evaluating the characteristics of the engine becomes im-portant. In this paper, we present a simple method to classify the polymorphic properties of ciphers and the polymorphic engine. In addition, the security of such engines is presented, along with an analysis of the additional latency and overhead costs.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133393115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Trust Layer for Edge Infrastructure 边缘基础设施的分布式信任层
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732606
V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna
{"title":"A Distributed Trust Layer for Edge Infrastructure","authors":"V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna","doi":"10.1109/FMEC54266.2021.9732606","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732606","url":null,"abstract":"Recently, Mobile Edge Cloud computing (MEC) has attracted attention both from academia and industry. The idea of moving a part of cloud resources closer to users and data sources can bring many advantages in terms of speed, data traffic, security and context-aware services. The MEC infrastructure does not only host and serves applications next to the end-users, but services can be dynamically migrated and reallocated as mobile users move in order to guarantee latency and performance constraints. This specific requirement calls for the involvement and collaboration of multiple MEC providers, which raises a major issue related to trustworthiness. Two main challenges need to be addressed: i) trustworthiness needs to be handled in a manner that does not affect latency or performance, ii) trustworthiness is considered in different dimensions - not only security metrics but also performance and quality metrics in general. In this paper, we propose a trust layer for public MEC infrastructure that handles establishing and updating trust relations among all MEC entities, making the interaction withing a MEC network transparent. First, we define trust attributes affecting the trusted quality of the entire infrastructure and then a methodology with a computation model that combines these trust attribute values. Our experiments showed that the trust model allows us to reduce latency by removing the burden from a single MEC node, while at the same time increase the network trustworthiness.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EdgeRE: An Edge Computing-enhanced Network Redundancy Elimination Service for Connected Cars EdgeRE:一种基于边缘计算的互联汽车网络冗余消除服务
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732548
Masahiro Yoshida, Koya Mori, Tomohiro Inoue, Hiroyuki Tanaka
{"title":"EdgeRE: An Edge Computing-enhanced Network Redundancy Elimination Service for Connected Cars","authors":"Masahiro Yoshida, Koya Mori, Tomohiro Inoue, Hiroyuki Tanaka","doi":"10.1109/FMEC54266.2021.9732548","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732548","url":null,"abstract":"Connected cars generate a huge amount of Internet of Things (IoT) sensor information called Controller Area Network (CAN) data. Interest has recently been growing in collecting CAN data from connected cars in a cloud system in order to enable life-critical use cases such as safe driving support. Although each CAN data packet is very small, a connected car generates thousands of CAN data packets per second. Therefore, real-time CAN data collection from connected cars to a cloud system is one of the most challenging problems in the current IoT. In this paper, we propose an Edge computing-enhanced network Redundancy Elimination service (EdgeRE) for CAN data collection. In developing EdgeRE, we design a CAN data compression architecture that combines in-vehicle computers, edge datacenters, and a public cloud system. EdgeRE includes the idea of a hierarchical data compression and dynamic data buffering at edge datacenters for real-time CAN data collection. Across a wide range of field tests with connected cars and an edge computing testbed, we show that the EdgeRE reduces the bandwidth usage by 88% and the number of packets by 99%.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architecture for Component Authentication using Secure Cyber-physical Information and Blockchain 使用安全网络物理信息和区块链的组件认证体系结构
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732547
M. Sandborn, Carlos Olea, Sam Hays, Jules White
{"title":"An Architecture for Component Authentication using Secure Cyber-physical Information and Blockchain","authors":"M. Sandborn, Carlos Olea, Sam Hays, Jules White","doi":"10.1109/FMEC54266.2021.9732547","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732547","url":null,"abstract":"Cyber-physical systems (CPSs) tie software to components that manipulate physical space, and safety-critical CPSs comprise an increasing share of roles in process automation, transportation, and industrial operations. As device intercon-nectivity increases, security paradigms must be developed to address cross-domain interactions and prevent vulnerabilities from one domain (e.g. misconfigured robot controller software) manifesting in the other (e.g. mechatronic arm harms factory worker). In particular, counterfeit goods pose a significant threat to the construction of safety-critical CPSs with downstream effects spanning both cyber and physical environments (e.g. commercial aircraft with faulty fuel pump). In this paper, we present a theoretical architecture for exchanging and verifying Signed Physically Unclonable iDentities (SPUDs). The proposed system, based on Blockchain, allows tracking of components throughout a CPS supply network using both cyber and physical identifiers.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A micro grid information architecture with open source components 一个带有开源组件的微网格信息架构
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732593
A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac
{"title":"A micro grid information architecture with open source components","authors":"A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac","doi":"10.1109/FMEC54266.2021.9732593","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732593","url":null,"abstract":"Presented is an information system architecture based on open source platforms to support the successful management of a micro grid. The paper justifies the use of open source platforms in the micro grid context. Also given are the benefits of a micro grid as it relates to distributed energy generation and subsequently the need explained for an information system that keeps a record of all devices and their interconnections, while simultaneously providing access to instantaneous data along various points in the micro grid. Three examples of services made possible by the architecture are given.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-Healing for Cyber-Security 网络安全的自我修复
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732575
B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski
{"title":"Self-Healing for Cyber-Security","authors":"B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski","doi":"10.1109/FMEC54266.2021.9732575","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732575","url":null,"abstract":"Autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding self-healing IT. In this paper, we demonstrate how emerging technology can be integrated into a platform for regenerating and adaptive, self-healing containers. This Self-Healing for Cyber-Security (SH4CS) contribution paves the way towards a new type of autonomous cyber-security solutions.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Real-Time IoT Workflows in a Fog Computing Environment Utilizing Cloud Resources with Data-Aware Elasticity 利用具有数据感知弹性的云资源在雾计算环境中调度实时物联网工作流
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732561
Georgios L. Stavrinides, H. Karatza
{"title":"Scheduling Real-Time IoT Workflows in a Fog Computing Environment Utilizing Cloud Resources with Data-Aware Elasticity","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/FMEC54266.2021.9732561","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732561","url":null,"abstract":"In a fog computing environment the supplementary public cloud resources should be managed as effectively as possible, utilizing a dynamic scaling mechanism, in order to provide monetary cost savings and resilience against workload fluctuations. Furthermore, the dynamic scaling strategy should take into account the data dependencies of the workload, in order to prevent data loss. Towards this direction, in this paper we propose a reactive data-aware dynamic scaling mechanism for the provision of cloud resources, along with a heuristic for the scheduling of real-time Internet of Things (IoT) workflows, in a three-tier IoT-fog-cloud architecture. The performance of the proposed scheme is evaluated and compared via simulation to a static provisioning case, under different patterns of incoming workload. The simulation results provide useful insights into how each workload pattern affects the performance of the framework under study, in each of the provisioning cases of the cloud resources.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anti-jamming strategy based on game theory in single-channel UAV communication network 基于博弈论的单通道无人机通信网络抗干扰策略
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC) Pub Date : 2021-12-06 DOI: 10.1109/FMEC54266.2021.9732602
Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou
{"title":"Anti-jamming strategy based on game theory in single-channel UAV communication network","authors":"Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou","doi":"10.1109/FMEC54266.2021.9732602","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732602","url":null,"abstract":"This paper investigates the power control prob-lem in unmanned aerial vehicle (UAV) communication network anti-jamming system. To obtain the optimal power of UAVs, Stackelberg game and Nash game, two different anti-jamming models, are proposed to achieve the best performance. In the Stackelberg game model, as the leader, the smart jammer who has the privilege to take actions ahead of the user, while the user acts as the follower after knowing the strategy of the smart jammer and adjusts transmission power adaptively to maximize the utility function. We design a simulated annealing algorithm to obtain Stackelberg equilibrium (SE). In the Nash game model, two players would take actions simultaneously, and the closed-form expression of Nash equilibrium (NE) is derived. Finally, we verify the convergence of proposed algorithm, compare the two game models and analyze the influence of observation error and transmission distance on the user UAV's and jammer UAV's utility function through detailed simulations.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信