{"title":"Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems","authors":"B. Silva, P. Maciel, A. Zimmermann","doi":"10.1109/ICITST.2013.6750283","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750283","url":null,"abstract":"Providing high availability in a diverse client demand scenario is a key challenge of cloud computing providers. A possible approach to protect cloud systems from natural disasters corresponds to the utilization of redundant data centers located far enough apart. The time to migrate a virtual machine (VM) from a data center to another increases due to distance. As this time impacts the overall system behavior, performability evaluation considering VM migration time and different load balances is of utmost importance when considering the analysis of distributed cloud systems. This work presents performability models for evaluating distributed cloud computing systems deployed into multiple data centers considering disaster occurrence. Additionally, we present a case study which evaluates a set of scenarios with different client loads and distances between data centers.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-aware RESTful services on mobile devices","authors":"C. M. D. Westhuizen, M. Coetzee","doi":"10.1109/ICITST.2013.6750220","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750220","url":null,"abstract":"Web accessible services on mobile devices such as smart phones and tablets are a reality in today's age. Services hosted on mobile devices consume valuable device resources such as battery power, network connectivity, and Global Positioning Systems (GPS) availability. For this research, clients consume web accessible services, provisioned from mobile devices acting as service providers. A challenge for constrained mobile devices is how the efficiency and discovery of web accessible services on mobile devices can be improved. To address this, a framework is presented that considers context information focusing on lightweight services and their discovery.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic data reuse for accelerating data intensive applications in the Cloud","authors":"Liangxiu Han, Zheng Xie, R. Baldock","doi":"10.1109/ICITST.2013.6750272","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750272","url":null,"abstract":"This paper proposes a cost-oriented, petri-net based intelligent data reuse management to minimise data movement, reduce computing and storage costs and therefore improve the performance of data intensive applications in the Cloud. The proposed approach can automatically manage intermediate datasets of data intensive applications, predict the cost of the applications based on the previous runs, and intelligently decide whether the intermediate results should be stored or deleted for the subsequent runs, and dynamically optimise the cost of data intensive applications in the Cloud. The experimental evaluation demonstrates the proposed data reuse mechanism can significantly reduce the overall cost and enhance the performance of data intensive applications.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies","authors":"L. Adedayo, S. Butakov, Ron Ruhl, Dale Lindskog","doi":"10.1109/ICITST.2013.6750278","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750278","url":null,"abstract":"This paper examines the processing of PII data in e-Government web services in developing nations using the case study of some Nigerian embassies. It presents a secured framework intended for protecting Personally Identifiable Information (PII) data in e-Government web services in developing nations where such do not already exist. The framework is based on OWASP ASVS security requirement for data protection in web environment and this was used as a basis of assessment for the respective website by analysing the security of the web portal used in processing citizens' registration data through a non-invasive web sites analysis method.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formally defining NFC M-coupon requirements, with a case study","authors":"A. Alshehri, Steve A. Schneider","doi":"10.1109/ICITST.2013.6750161","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750161","url":null,"abstract":"An NFC-based mobile coupon (M-coupon) is a cryptographically secured electronic message with some value stored at user's mobile. In the literature, a number of NFC M-coupon protocols were proposed in order to meet particular security requirements. However, formal security analysis is required to check the security of these protocols and whether they address their requirements. This paper mainly focuses on the formal definition of the NFC M-coupon requirements, which is the first, and most important, part of the formal analysis. The formal definitions can apply to a variety of protocols. Then, we illustrate the concept on a case study.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of security attacks on AODV routing","authors":"Mohamed A. Abdelshafy, P. King","doi":"10.1109/ICITST.2013.6750209","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750209","url":null,"abstract":"MANET routing protocols have many vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In this paper, we present a vulnerability analysis of AODV. We simulate four routing attacks to analyse their impacts on AODV protocol using NS-2 network simulator. These attacks are blackhole, grayhole, selfish and flooding attacks. The blackhole and flooding attacks have a severe impact on the network performance while the selfish and grayhole attacks have less significant effect on the network performance.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdolazim Rezaei, Z. M. Kasirun, Vala Ali Rohani, T. Khodadadi
{"title":"Anomaly detection in Online Social Networks using structure-based technique","authors":"Abdolazim Rezaei, Z. M. Kasirun, Vala Ali Rohani, T. Khodadadi","doi":"10.1109/ICITST.2013.6750277","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750277","url":null,"abstract":"Online Social Networks as new phenomenon have affected our life in many positive ways; however it can be considered as way of malicious activities. Identifying anomalous users has become a challenge and many researches are conducted but they are not enough and in this paper we propose a methodology based on graph metrics of online social networks. The experimental results illustrate that majority of friends in online social networks have common friends with their friends while anomalous users may not follow this fact.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of the contents visualization system for social networks","authors":"J. Lee, J. Kim, Ikkyun Kim, K. Han","doi":"10.1109/ICITST.2013.6750246","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750246","url":null,"abstract":"Generally, social network contains a social structure between individuals who are connected by a set of social relationships, such as family, friendship, co-working and colleague etc. Our paper suggests an approach for visualizing the social network elements including users and relationships as well as the community that contains groups of users and contents. For this, we designed and implemented a social visualization system that manage and visualize the relationship among a related group of users called ‘communities’ and members including contents shared by the group users. The visualization system provides multi-dimensional layers for monitoring and arranging the social contents for its optimized way to visualize relationships among users and communities.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124699011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the effectiveness of collaborative learning processes in Libyan Higher Education","authors":"T. Kenan, C. Pislaru, A. Elzawi, Maysoun Restoum","doi":"10.1109/ICITST.2013.6750233","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750233","url":null,"abstract":"This paper analyses the existing state-of-the-art implementation of e-learning and collaborative learning systems in Libyan Higher Education. The authors have developed a questionnaire, which was completed by mature Libyan students enrolled for two categories, the first category is a researchers group in UK who also are full-time lecturers at the Universities of Tripoli, Garyounis, Gharian and Ezawia; the second category is full-time lecturers in Libya at the above- mentioned universities. The quantitative and qualitative analysis of the answers shows the necessity to revise the nature of knowledge so the classroom activities and interactive online applications enable the development of team-building skills required by employers. Also other factors such as intelligent multimedia, internet technologies, knowledge management; have a significant influence on creating innovative and inspiring collaborative learning environments where lecturers are expert designers of intellectual experiences for students who become active participants to the learning processes.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121614677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive market place for converged cloud computing model","authors":"I. K. Musa, Stuart D. Walker","doi":"10.1109/ICITST.2013.6750273","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750273","url":null,"abstract":"Next generation cloud computing architecture is envisioned to be built on advanced self-serviced and converged infrastructure with high adaptability. As a result, there is a growing interest on cloud value added services. Platform and brokering services enable functionalities to address these challenges. This paper identifies the ecosystem in a converged cloud computing model that binds together infrastructure and platform service in a common market place. In the model, resources are organized in a virtual container and delivered to users in a holistic manner. Our work presents a business model in which additional value is created from the interaction and transactions of various virtual service actors. Results obtained from experiment conducted on private cloud shows the strength of our model in increasing the aggregate revenue and achieving a stable response time.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}