2015 IEEE Trustcom/BigDataSE/ISPA最新文献

筛选
英文 中文
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things 用于物联网的轻量级无证书且可证明安全的签名密码系统
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.408
Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius
{"title":"Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things","authors":"Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius","doi":"10.1109/Trustcom.2015.408","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.408","url":null,"abstract":"In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management 安全即服务配置与网络保险管理的联合优化方法
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.403
Sivadon Chaisiri, R. Ko, D. Niyato
{"title":"A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management","authors":"Sivadon Chaisiri, R. Ko, D. Niyato","doi":"10.1109/Trustcom.2015.403","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.403","url":null,"abstract":"Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis 利用模糊混合多标准分析法衡量电子商务系统的可信度
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.433
Zhengping Wu, Lifeng Wang
{"title":"Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis","authors":"Zhengping Wu, Lifeng Wang","doi":"10.1109/Trustcom.2015.433","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.433","url":null,"abstract":"Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Hybrid Mobile Authentication Model for Ubiquitous Networking 面向泛在网络的混合移动认证模型
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.395
A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid
{"title":"A Hybrid Mobile Authentication Model for Ubiquitous Networking","authors":"A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid","doi":"10.1109/Trustcom.2015.395","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.395","url":null,"abstract":"The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Key Management for Multi-privileged Group Communications 多特权群通信密钥管理研究
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.369
Wei Zhou, Yang Xu, Guojun Wang
{"title":"Research on Key Management for Multi-privileged Group Communications","authors":"Wei Zhou, Yang Xu, Guojun Wang","doi":"10.1109/Trustcom.2015.369","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.369","url":null,"abstract":"In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users 一种基于云的基于属性保护隐私的凭据用户移动性模型
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.470
Ahmad Sabouri
{"title":"A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users","authors":"Ahmad Sabouri","doi":"10.1109/Trustcom.2015.470","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.470","url":null,"abstract":"Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of IEEE 802.15.6 Association Protocols IEEE 802.15.6关联协议研究
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.456
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan
{"title":"A Study of IEEE 802.15.6 Association Protocols","authors":"Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan","doi":"10.1109/Trustcom.2015.456","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.456","url":null,"abstract":"A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provision of Disk I/O Guarantee for MapReduce Applications 为MapReduce应用提供磁盘I/O保证
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.576
X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter
{"title":"Provision of Disk I/O Guarantee for MapReduce Applications","authors":"X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter","doi":"10.1109/Trustcom.2015.576","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.576","url":null,"abstract":"YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning 基于概率模型的大规模网络学习中视频观看行为的幂律分布
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.572
Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong
{"title":"Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning","authors":"Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong","doi":"10.1109/Trustcom.2015.572","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.572","url":null,"abstract":"In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"152 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-physical Design of Data Centers Cooling Systems Automation 数据中心冷却系统自动化的信息物理设计
2015 IEEE Trustcom/BigDataSE/ISPA Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.641
A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang
{"title":"Cyber-physical Design of Data Centers Cooling Systems Automation","authors":"A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang","doi":"10.1109/Trustcom.2015.641","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.641","url":null,"abstract":"Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信