{"title":"Telecommunication traffic through submarine cables: Security and vulnerabilities","authors":"Aisha Suliaman Alazri","doi":"10.1109/ICITST.2016.7856733","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856733","url":null,"abstract":"This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experience-based learning for identifying sub-regions in Wireless Sensor Networks","authors":"Aiman Ghannami, C. Shao","doi":"10.1109/ICITST.2016.7856722","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856722","url":null,"abstract":"In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez
{"title":"A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack","authors":"Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez","doi":"10.1109/ICITST.2016.7856659","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856659","url":null,"abstract":"The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1109/ICITST.2016.7856731","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856731","url":null,"abstract":"A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera
{"title":"Learning History Transition Graphs for understanding the programming learning situations","authors":"H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICITST.2016.7856758","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856758","url":null,"abstract":"This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks","authors":"S. M. Jameii, M. Maadani","doi":"10.1109/ICITST.2016.7856744","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856744","url":null,"abstract":"Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang
{"title":"Secure cloud distributed file system","authors":"Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang","doi":"10.1109/ICITST.2016.7856692","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856692","url":null,"abstract":"Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust chaos-based stream-cipher for secure public communication channels","authors":"Ons Jallouli, S. E. Assad, M. Chetto","doi":"10.1109/ICITST.2016.7856658","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856658","url":null,"abstract":"In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera
{"title":"Range query integrity in the cloud: the case of video surveillance","authors":"F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera","doi":"10.1109/ICITST.2016.7856691","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856691","url":null,"abstract":"Cloud computing provides users with the possibility to store their data in third-party servers, but these data centers may be untrusted or susceptible to attacks. This issue becomes particularly crucial in the case a third-party cloud is used to store video surveillance data. A number of methods have been proposed in the literature to allow users to verify that query results are correct. However, in the considered scenario, in which efficiency is a critical factor, classical techniques for query integrity are little suitable. This paper proposes a new solution to overcome these drawbacks.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong
{"title":"System and Protocols for secure Intercloud Communications","authors":"C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong","doi":"10.1109/ICITST.2016.7856739","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856739","url":null,"abstract":"In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other effectively and efficiently. Inspired by the HyperText Transfer Protocol (HTTP), this paper presents an Intercloud Communications Protocol (ICCP). ICCP allows clouds to communicate with each other using a common protocol, which is transparent to the underlying application programming interfaces of different clouds. It also includes security functions to ensure confidentiality and integrity. Essentially, clouds can communicate with each other based on XML-based request/response messages in a secure manner. An Intercloud Gateway prototype has been developed to demonstrate the basic functionalities of the ICCP, such as transferring data objects securely. The proposed framework is expected to inspire innovative cloud computing services as well as pose challenging research problems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}