{"title":"Proactive Digital Companions in Pervasive Hypermedia Environments","authors":"Kimberly García, S. Mayer, A. Ricci, A. Ciortea","doi":"10.1109/CIC50333.2020.00017","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00017","url":null,"abstract":"Artificial companions and digital assistants have been investigated for several decades, from research in the autonomous agents and social robots areas to the highly popular voice-enabled digital assistants that are already in widespread use (e.g., Siri and Alexa). Although these companions provide valuable information and services to people, they remain reactive entities that operate in isolated environments waiting to be asked for help. The Web is now emerging as a uniform hypermedia fabric that interconnects everything (e.g., devices, physical objects, abstract concepts, digital services), thereby enabling unprecedented levels of automation and comfort in our professional and private lives. However, this also results in increasingly complex environments that are becoming unintelligible to everyday users. To ameliorate this situation, we envision proactive Digital Companions that take advantage of this new generation of pervasive hypermedia environments to provide assistance and protection to people. In addition to Digital Companions perceiving a person's environment through vision and sound, pervasive hypermedia environments provide them with means to further contextualize the situation by exploiting information from available connected devices, and give them access to rich knowledge bases that allow to derive relevant actions and recommendations.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invisible Security: Protecting Users with No Time to Spare","authors":"J. Dykstra","doi":"10.1109/CIC50333.2020.00031","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00031","url":null,"abstract":"For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or will not avail themselves of necessary cybersecurity measures such as patching. Average, non-expert users-particularly those in small businesses-cannot afford to devote time to cybersecurity. Instead of accepting the risk of no security, alternatives are possible which achieve both security outcomes and conservation of time. We explore the paradigm of invisible security focused on creating cyber defenses that occur automatically without end user intervention. Invisible security is the next evolutionary step to aid users, now that automation is robust and effective in supporting it. Even though some example implementations, such as automatic updates, have existed for years, dedicated focus on this emerging paradigm is required to develop, measure, and deploy new capabilities. We present examples consistent with this approach in existence today, including automatic software updates and protective DNS. We draw insight and comparisons to other domains, including automobile safety. Then we describe how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public. Finally, we present benefits and limitations of the approach and propose areas of future research and innovation.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions","authors":"Abdullah Al-Alaj, R. Krishnan, R. Sandhu","doi":"10.1109/CIC50333.2020.00022","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00022","url":null,"abstract":"Software Defined Networking (SDN) has become one of the most important network architectures for simplifying network management and enabling innovation through network programmability. Network applications submit network operations that directly and dynamically access critical network resources and manipulate the network behavior. Therefore, validating these operations submitted by SDN applications is critical for the security of SDNs. A feasible access control mechanism should allow system administrators to specify constraints that allow for applying minimum privileges on applications with high granularity. However, the granularity of access provided by current access control systems for SDN applications is not sufficient to satisfy such requirements. In this paper, we propose ParaSDN, an access control model to address the above problem using the concept of parameterized roles and permissions. Our model provides the benefits of enhancing access control granularity for SDN with support of role and permission parameters. We implemented a proof of concept prototype in an SDN controller to demonstrate the applicability and feasibility of our proposed model in identifying and rejecting unauthorized access requests submitted by controller applications.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Intelligence and Killer Applications in Edge Computing","authors":"","doi":"10.1109/cic50333.2020.00009","DOIUrl":"https://doi.org/10.1109/cic50333.2020.00009","url":null,"abstract":"","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129349436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Short Survey of LSTM Models for De-identification of Medical Free Text","authors":"Joffrey L. Leevy, T. Khoshgoftaar","doi":"10.1109/CIC50333.2020.00023","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00023","url":null,"abstract":"The confidentiality of patient information is legislated by governmental regulations in various countries, such as the Health Insurance Portability and Accountability Act (HIPAA) standards in the USA. Under these laws, adequate protections must be in place to safeguard patients' health records, which are often big data comprised of free text. Machine learning approaches are extensively used for the automated de-identification of medical free text, with outstanding results obtained from several studies that incorporate long short-term memory (LSTM) networks. These networks are a variant of the recurrent neural network (RNN) architecture. Our survey of LSTM models dates back five years, and the contribution of the findings is appreciable. Performance-wise, LSTMs generally surpassed other types of models used in automated de-identification of free text, namely conditional random field (CRF) algorithms and rule-based algorithms. In addition, hybrid or ensemble LSTM models did not outperform LSTM -only models. Finally, we note that the customization of gold-standard, de-identification datasets may result in overfitted models.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"40 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Driving: Practical Challenges & Opportunities","authors":"","doi":"10.1109/cic50333.2020.00010","DOIUrl":"https://doi.org/10.1109/cic50333.2020.00010","url":null,"abstract":"","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"cVM: Containerized Virtual Machine","authors":"Gong Su","doi":"10.1109/CIC50333.2020.00011","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00011","url":null,"abstract":"Virtual machines (VM) and containers are virtualization technologies that partition computing resources and isolate workloads. They are the foundations for resource consolidation which leads to the success of cloud computing. VMs perform partitioning and isolation at the machine device level while containers do so at the operation system level. The pros and cons of VMs and containers are generally well understood. VMs provide better isolation and security while containers are less resource intensive and perform better. There are various attempts to address the shortcomings in both communities to narrow the gap between the two. In this paper, we review these efforts and discuss their strengths and weaknesses. We also present the cVM architecture with ideas to explore ways of reducing VM resource demand and improving VM performance towards being comparable to those of containers. cVMs bootstrap from a “disk template” where Linux Logical Volume Manager snapshot is used to allow cVMs to share read-only files and directories, thus reducing their disk footprint. Similarly, “memory template” allows cVMs to share read-only code and data memory pages, thus reducing their memory footprint. Finally, cVMs leverage device hotplug capability and lightweight Linux distributions to reduce bootup time without sacrificing too much generality. And cVMs also take advantage of device virtualization and utilize device passthrough to achieve near native I/O performance.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dimitrios Georgakopoulos, P. Jayaraman, Anas Dawod
{"title":"SenShaMart: A Trusted loT Marketplace for Sensor Sharing","authors":"Dimitrios Georgakopoulos, P. Jayaraman, Anas Dawod","doi":"10.1109/CIC50333.2020.00012","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00012","url":null,"abstract":"This paper proposes a novel Trusted IoT Marketplace, which we refer to as SenShaMart, that permits different IoT applications to share (i.e., provide, discover, (re)use and pay for) IoT sensors. SenShaMart promotes both sharing of existing sensors and deployment of new sensors via a revenue generating scheme for IoT sensor provider applications. Unlike existing sensor discovery and integration solutions that are currently owned/controlled by a specific IoT platforms or sensor provider, SenShaMart has been specifically designed to be a trustworthy third party that manages all the important information needed for sensor discovery, integration, use and payment via a specialized blockchain (which we refer as SenShaMart blockchain). This solution ensures that the IoT application that use SenShaMart to share IoT sensors maintain their privacy and ensures first-come first-served access to any available sensor. The paper presents the key innovations in devising the SenShaMart and outlines the design of its main components.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HydraSpace: Computational Data Storage for Autonomous Vehicles","authors":"Ruijun Wang, Liangkai Liu, Weisong Shi","doi":"10.1109/CIC50333.2020.00033","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00033","url":null,"abstract":"To ensure the safety and reliability of an autonomous driving system, multiple sensors have been installed in various positions around the vehicle to eliminate any blind point which could bring potential risks. Although the sensor data is quite useful for localization and perception, the high volume of these data becomes a burden for on-board computing systems. More importantly, the situation will worsen with the demand for increased precision and reduced response time of self-driving applications. Therefore, how to manage this massive amount of sensed data has become a big challenge. The existing vehicle data logging system cannot handle sensor data because both the data type and the amount far exceed its processing capability. In this paper, we propose a computational storage system called HydraSpace with multi-layered storage architecture and practical compression algorithms to manage the sensor pipe data, and we discuss five open questions related to the challenge of storage design for autonomous vehicles. According to the experimental results, the total reduction of storage space is achieved by 88.6% while maintaining the comparable performance of the self-driving applications.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability","authors":"Sanchari Das, Shrirang Mare, L. Camp","doi":"10.1109/CIC50333.2020.00027","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00027","url":null,"abstract":"Exposure of passwords for authentication and access management is a ubiquitous and constant threat. Yet, reliable solutions, including multi-factor authentication (MFA), face issues with wide-spread adoption. Prior research shows that making MFA mandatory helps with tool adoption but is detrimental to users' mental models and leads to security-avoidance behavior. To explore feasible solutions, we implemented text-and video-based risk communication strategies to evaluate if either mode of risk communication was useful. We sought to explore users' technical biases to further examine the mental models that are associated with safer security habits. Our study of $N$ = 620 participants found that users are aware of frequent security attacks, including phishing. We found that text- and video-based communication is often useful when information is aligned with individual actions and their consequences, which can range from benign to catastrophic. Shorter mental-model-aligned video snippets piqued user interest in MFA. On the other hand, detailed risk communication videos or textual descriptions improved users' understanding of MFA and the potential risks of non-usage. Our study indicates that, beyond usability and comprehensive education, risk communication offers the potential to increase MFA adoption.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}