Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius
{"title":"Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things","authors":"Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius","doi":"10.1109/Trustcom.2015.408","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.408","url":null,"abstract":"In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management","authors":"Sivadon Chaisiri, R. Ko, D. Niyato","doi":"10.1109/Trustcom.2015.403","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.403","url":null,"abstract":"Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis","authors":"Zhengping Wu, Lifeng Wang","doi":"10.1109/Trustcom.2015.433","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.433","url":null,"abstract":"Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid
{"title":"A Hybrid Mobile Authentication Model for Ubiquitous Networking","authors":"A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid","doi":"10.1109/Trustcom.2015.395","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.395","url":null,"abstract":"The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Key Management for Multi-privileged Group Communications","authors":"Wei Zhou, Yang Xu, Guojun Wang","doi":"10.1109/Trustcom.2015.369","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.369","url":null,"abstract":"In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users","authors":"Ahmad Sabouri","doi":"10.1109/Trustcom.2015.470","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.470","url":null,"abstract":"Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan
{"title":"A Study of IEEE 802.15.6 Association Protocols","authors":"Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan","doi":"10.1109/Trustcom.2015.456","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.456","url":null,"abstract":"A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter
{"title":"Provision of Disk I/O Guarantee for MapReduce Applications","authors":"X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter","doi":"10.1109/Trustcom.2015.576","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.576","url":null,"abstract":"YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong
{"title":"Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning","authors":"Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong","doi":"10.1109/Trustcom.2015.572","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.572","url":null,"abstract":"In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"152 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang
{"title":"Cyber-physical Design of Data Centers Cooling Systems Automation","authors":"A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang","doi":"10.1109/Trustcom.2015.641","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.641","url":null,"abstract":"Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}