{"title":"Implementing a high-performance recommendation system using Phoenix++","authors":"Chongxiao Cao, Fengguang Song, D. Waddington","doi":"10.1109/ICITST.2013.6750200","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750200","url":null,"abstract":"Recommendation systems are important big data applications that are used in many business sectors of the global economy. While many users utilize Hadoop-like MapReduce systems to implement recommendation systems, we utilize the high-performance shared-memory MapReduce system Phoenix++ [1] to design a faster recommendation engine. In this paper, we design a distributed out-of-core recommendation algorithm to maximize the usage of main memory, and devise a framework that invokes Phoenix++ as a sub-module to achieve high performance. The design of the framework can be extended to support different types of big data applications. The experiments on Amazon Elastic Compute Cloud (Amazon EC2) demonstrate that our new recommendation system can be faster than its Hadoop counterpart by up to 225% without losing recommendation quality.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using multi-agent systems to solve food distribution problem in disaster area","authors":"U. Manzoor, M. Zubair, K. Batool","doi":"10.1109/ICITST.2013.6750290","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750290","url":null,"abstract":"Disasters have been causing huge damages to infrastructure as well as human life from a long time. One of the key problems faced when disaster hits an area is efficient distribution of resources such as medicine, food, water etc. In this paper, we propose a solution particularly for distribution of food. We have proposed a solution in which a big disaster region is divided into smaller areas (regions) and multi-agent system are used to deliver food in these regions. Agents use shortest path algorithms and coordination to deliver food within their particular region efficiently. In the experiment section, we have performed different experiments to check how the proposed solution performs when one of the parameter is changed. Using multi-agents can be very useful approach for distribution problems especially in disaster region.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining salient images from a large-scale blogosphere","authors":"Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim","doi":"10.1109/icist.2013.6747526","DOIUrl":"https://doi.org/10.1109/icist.2013.6747526","url":null,"abstract":"","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak, Y. Chang
{"title":"Securing E-Seal real time tracking system for Internet of Things","authors":"Mouza Ahmad Bani Shemaili, C. Yeun, M. Zemerly, Khalid Mubarak, Y. Chang","doi":"10.1109/ICITST.2013.6750163","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750163","url":null,"abstract":"High volume products such as RFID tags and Wireless Sensors (WS) have a constricted cost that limit the cryptographic implementation in such devices. Our work focuses on securing an E-Seal that can be used to secure the communication of the real time tracking communication by using a symmetric cryptosystem. Also, this paper addresses the use of the asymmetric cipher which is an Identity Based Cryptosystem (IBC) based with lightweight computation specification that can be used in low computation devices for locking and unlocking of the E-Seal.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation of Web services using policies","authors":"M. Velasco, D. While, Pathmeswaran Raju","doi":"10.1109/ICITST.2013.6750218","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750218","url":null,"abstract":"Web services technology is evolving as a base for implementing service-oriented architectures (SOA), which has become an important architectural style for Web applications development. As Web Services development has grown considerably, the need for Quality of Service (QoS) has become a substantial aspect for developing a reliable service applications. In diverse business domains, Web services need to exhibit quality characteristics such as response time, availability, and reliability. However, a problem arises when a Web service is modified, updated or replaced by a new one. The new Web service may not fully match the QoS features provided from the previous one, this unavoidable problem is recognized as a mismatch. Mismatches are found in different layers of the Web service interoperability stack and corresponding adapters are needed to deal with this issue. This paper proposes a study to investigate the feasibility of achieving interoperability in Web services by evaluating the functionality of adapters when mismatches appear at the policy layer, which includes non-functional properties like QoS.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure","authors":"A. Akinbi, E. Pereira, Chris Beaumont","doi":"10.1109/ICITST.2013.6750183","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750183","url":null,"abstract":"The security risks of cloud computing and ambiguity of security mechanisms implemented on an on-demand cloud service like Platform-as-a-Service (PaaS), continues to raise concerns in cloud consumers. These risks clearly affect the adoption of the potentials offered by provisioning of computer resources of this scale. Examining an on-demand Platform-as-a-Service public cloud environment, this paper focuses on the security controls and mechanisms implemented on each component of Windows Azure. Using a security framework which consists of industry standard controls to evaluate its security offerings, this study attempts to understand how its security controls and implementations meet the needs of consumers in identity management, access management and virtualization security in the development of web based applications hosted on the cloud.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeinab Fawaz, S. E. Assad, M. Frajallah, Ayman Khalil, R. Lozi, O. Déforges
{"title":"Lightweight chaos-based cryptosystem for secure images","authors":"Zeinab Fawaz, S. E. Assad, M. Frajallah, Ayman Khalil, R. Lozi, O. Déforges","doi":"10.1109/ICITST.2013.6750156","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750156","url":null,"abstract":"In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a simple scan of plain-image pixels. In this kind of cryptosystems, due to the channel effect, a bit error(s) in the cipher-image produces, at the decryption side, a random bit error in the estimated plain-image. In this paper, we propose a cipher-block encryption algorithm in CBC (Cipher Block Chaining) mode. It consists of a permutation process on the bits achieved by a 2D-cat map, followed by a bitwise XOR operation. Here, each permuted bit (confusion phase) is immediately diffused in a simple manner in the same phase. Therefore, the confusion and diffusion effects are stronger and the cryptanalyses for permutation-only ciphers become ineffective.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127210393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in the cloud based systems: Structure and breaches","authors":"Vivek Shandilya, S. Shiva","doi":"10.1109/ICITST.2013.6750260","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750260","url":null,"abstract":"Cloud based systems(CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many components of the CBS, needs to be secured too. There have been initial attempts to model the security of the cloud in terms of securing stakeholder's computational space. Some recent attempts formally model the CBS as modularized actor models, using rewriting & equational logic based modeling languages. Building on these works we present a framework for building executable models of CBSs for security analyses. We illustrate its validity showing how the recent security breaches and security solutions can be modeled and analyzed using this framework.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an efficient shopping mechanism for M-commerce","authors":"S. Réhman, N. Ejaz","doi":"10.1109/ICITST.2013.6750264","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750264","url":null,"abstract":"Mobile commerce (M-commerce) is the facility to carry out commerce using mobile devices. This mechanism provides freedom to the customers that they can perform transaction anywhere, anytime. In this research, we propose a solution that makes the use of intelligent agents as the component units around which our application and its services can be conceptualized. One such application is Pocket Savvy which is an android base application based on the principals of m-commerce. It's based on the buying of online products in an efficient and effective way through mobile devices.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ProtoML: A rule-based validation language for Google Protocol Buffers","authors":"Miklós Kálmán","doi":"10.1109/ICITST.2013.6750189","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750189","url":null,"abstract":"We live in an information age where massive amounts of data are being transferred across multiple platforms. Cross-platform formats are constantly evolving to aid the communication between machines running different backends. There are text-based (e.g.: XML, JSON) and binary (e.g.: BSON, bXML, Google Protocol Buffers) formats that can provide the basis of common communication. In this article we will be focusing on a widely used binary-format: Google Protocol Buffers. This format has support for various languages. One caveat of this format is that although the structure of the messages is defined by the “.proto” file the validation and sanitization of the transmitted messages have to be implemented by the developer. We introduce a new metalanguage called ProtoML that serves as a solid foundation for the definition of validation and constraint rules for Protocol Buffer messages. The ProtoML rules can easily be extended using additional validation functions and have the added benefit of providing a way to correct messages on the fly prior to transmission. We will also demonstrate a draft implementation of the ProtoML language to showcase its potential.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}