P. J. Riesch, Xiaojiang Du, Haibin Ling, M. Mayhew
{"title":"Face Recognition with Environment Tolerance on a Mobile Device","authors":"P. J. Riesch, Xiaojiang Du, Haibin Ling, M. Mayhew","doi":"10.1109/CSCloud.2015.79","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.79","url":null,"abstract":"One of the most logical applications of face recognition for authentication is on mobile handset devices. However, face recognition still faces challenges in providing environment tolerance: being able to compensate for changes in light conditions within an environment where authentication is occurring, due to users carrying their mobile handset devices to different locations with varying and unpredictable sources of illumination. Existing face recognition systems operate by finding fiduciary points relative to the area of the entire face, which becomes their weakness when they are not used in applications where light conditions are fixed and controlled. This research investigates Local Binary Patterns (LBP), an image encoding technique whose origins lie in texture analysis, in order to overcome the problems faced by existing face recognition systems and provide tolerance to variable light conditions. This research aims to utilize LBP on modern mobile handset device hardware that is \"off-the-shelf\": utilizing only the most basic and widely available onboard imaging hardware and processing capability provided on mobile handset devices of the present day. We have performed rigorous experimentation with LBP both on large databases of images of human faces, as well as developing mobile handset software that was deployed to real users and tested in a field environment. Our experimentation indicates that LBP is capable of being used to develop face recognition systems that provide environment tolerance, potentially finding practical use as a component of mobile device authentication applications.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MR-Graph: A Customizable GPU MapReduce","authors":"Zhi Qiao, Shuwen Liang, Hai Jiang, Song Fu","doi":"10.1109/CSCloud.2015.49","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.49","url":null,"abstract":"The MapReduce programming model has been widely used in Big Data and Cloud applications. Criticism on its inflexibility when being applied to complicated scientific applications recently emerges. Several techniques have been proposed to enhance its flexibility. However, some of them exert special requirements on applications, while others fail to support the increasingly popular coprocessors, such as Graphics Processing Unit (GPU). In this paper, we propose MR-Graph, a customizable and unified framework for GPU-based MapReduce, which aims to improve the flexibility, scalability and performance of MapReduce. MR-Graph addresses the limitations and restrictions of the traditional MapReduce execution paradigm. The three execution modes integrated in MR-Graph facilitates users to write their applications in a more flexible fashion by defining a Map and Reduce function call graph. MR-Graph efficiently explores the memory hierarchy in GPUs to reduce the data transfer overhead between execution stages and accommodate big data applications. We have implemented a prototype of MR-Graph and experimental results show the effectiveness of using MR-Graph for flexible and scalable GPU-based MapReduce computing.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safe Internet Browsing Using a Transparent Virtual Browser","authors":"Jeffrey Bickford, P. Giura","doi":"10.1109/CSCloud.2015.58","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.58","url":null,"abstract":"With the proliferation of Internet access across the globe, as well as the advancement of many new devices and next generation networks, there is no surprise that malware infection via web browsing is still one of the most significant threats to Internet users today. Over the past several years we have also seen the increase in advanced targeted attacks against corporations which steal intellectual property and sensitive customer information. This problem is amplified as security is bypassed for work productivity and usability, while mobile devices increasingly access sensitive information. Though many organizations are beginning to invest significantly into securing their internal corporate network, users are typically given access to the Internet for web browsing purposes, leaving the enterprise vulnerable to drive-by downloads and data exfiltration attacks. In this work we propose a new method to safely browse the Internet by redirecting web requests to a cloud-based Transparent Virtual Browser. Web browsing requests are automatically redirected to the Transparent Virtual Browser via a transparent network proxy, protecting against user configuration errors or malware running on the device. The virtual browsing session is streamed back to the user securely, while maintaining a seamless user experience. Experiments show that our architecture can isolate web-attacks from a user's machine, protecting enterprises from most of the attacks to which they are vulnerable today. Using a small user trial we tested our solution with several popular web browsers on various operating systems and report on their feedback. Our testing also shows that our prototype only incurs a small initial delay when browsing to a webpage while maintaining a seamless browsing experience for the rest of the browsing session.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125650366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment","authors":"Syed S. Rizvi, A. Razaque, K. Cover","doi":"10.1109/CSCloud.2015.87","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.87","url":null,"abstract":"The confidentiality and verification of customer's data at the cloud service provider (CSP) side becomes a critical issue in terms of both reliability (i.e., the trust aspect) and efficiency (i.e., the ease of performing such verifications). As data owners no longer physically possess their data storage, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted. In such a scenario, the use of a third-party auditor (TPA) provides both efficiency, transparency, and the fairness in performing the required auditing tasks as well as it serves as a bridge between the cloud service users (CSUs) and the CSPs. Thus, for practical use, it seems more rational to equip the verification capabilities with public auditability, which is expected to play a more important role in achieving economies of scale for cloud computing. Although the use of TPA provides several advantages, the fact that TPA is an untrusted entity and it can turn into a malicious user or promote insider threats cannot be ignored. Thus, for a complete realistic security solution where CSUs achieve maximum cloud benefits at minimum computational cost, the auditing of TPA is required. In this paper, we develop an auditing method for CSUs/CSPs to ensure the integrity of the TPA and minimize the possibility of insider threats or malicious activities. The integrity of TPA will be verified using the time-released session keys and the service level agreement (SLA).","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Issues in WSNs with Cooperative Communication","authors":"T. Hayajneh, Zhang Tao, B. Mohd","doi":"10.1109/CSCloud.2015.78","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.78","url":null,"abstract":"Cooperative communication is a technique that helps to improve the communication performance in wireless networks. It allows the nodes to rely on their neighbors when transmitting packets providing some diversity gain. Wireless sensor networks (WSNs) can benefit from cooperative communication to, which was proven by other researcher in the field. In this paper we consider security issues in WSNs with cooperative communications. We study such issues at each of the main protocol layers: physical layer, data link layer, network layer, services (topology) layer, and application layer. For each layer, we clarify the main task, enumerate the main attacks and threats, specify the primary security approaches and techniques, if any, and discuss possible new attacks and problems that may arise with the use of cooperative communications. Further, we showed for some attacks (e.g. jamming, packet dropping, and wormhole) that using cooperative communication improves the network resiliency and reliability. This paper builds the foundations and clarifies the specifications for a needed security protocol in WSNs with cooperative communications that can enhance its performance and resiliency against cyber-attacks.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems","authors":"Waqas Haider, Jiankun Hu, Xinghuo Yu, Yi Xie","doi":"10.1109/CSCloud.2015.11","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.11","url":null,"abstract":"The generation of representative computer system behavior profile from system calls in LINUX environments to establish reliable Host Based Anomaly Detection Systems (HADS) against Next Generation of Attacks (NGA) is a challenge due to two major reasons. Firstly, NGA causes a low footprint upon host activities and consequently, attack activities are difficult to detect from normal computer processes in terms of accuracy and processing time. Secondly, there is no effective method to extract the natural difference from the two different types of traces (e.g. normal or abnormal) of system calls. Following these reasons, a semi-supervised model is proposed, which is comprised of two parts. Firstly, to establish an unsupervised computer behavior classification, an integer data zero-watermarking algorithm is developed to extract abstract hidden representation of system calls. This hidden representation constitutes the natural difference between attack and normal computer system behavior in real-time. Secondly, various supervised Machine Learning (ML) algorithms and normalizations are realized with proposed hidden representation of the system calls to evaluate the semi-supervised model in HADS. To evaluate the performance in terms of accuracy and processing time, the publicly available bench mark host based data sets: ADFA-LD and KDD 98 have been utilized. Each data set is the collection of traces of processes and each trace comprises of process's system calls. Experimental results shows that the suggested semi-supervised model outperforms existing methodologies in terms of accuracy and processing time for the detection of low and high foot print attacks.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121764140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keke Gai, Meikang Qiu, Saravanan Jayaraman, Lixin Tao
{"title":"Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems","authors":"Keke Gai, Meikang Qiu, Saravanan Jayaraman, Lixin Tao","doi":"10.1109/CSCloud.2015.72","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.72","url":null,"abstract":"The implementation of cloud computing in tele-health has enabled enormous benefits of improving health-care services as well as active health approaches, such as Patient-Centered Telehealth (PCT). Applying cloud systems enables healthcare users to obtain medical information from multiple cloud-based platforms or sources. Various service deployments meet different customers' needs. As one of the popular information sharing manners on clouds, Online Self-Diagnosis (OSD) has been widely implemented for recommending medicines or treatment plans in the varied medical fields. However, there is a great risk for users when executing OSD since lack of professional pharmacological knowledge. This paper concentrates on this issue and proposes an ontology-based approach representing the medical knowledge for alarming potential risks. The proposed mechanism is named Secure Ontology-based Self-diagnosis (SOS) Model that is designed to generate knowledge of medical treatments or incompatibility of medicines to avoid improper behaviors of diagnoses. Based on the proposed model, our algorithm uses structure-level technique applying semantic schemas, which is Propositional Satisfiability Matching Algorithm (PSMA). Our experiment has proved the feasibility of our proposed mechanism.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanming Zhang, Kuan Ni, Jiawei Lu, Jun Xu, Gang Xiao
{"title":"DOGCP: A Domain-Oriented Government Cloud Platform Based on PaaS","authors":"Yuanming Zhang, Kuan Ni, Jiawei Lu, Jun Xu, Gang Xiao","doi":"10.1109/CSCloud.2015.25","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.25","url":null,"abstract":"Recently, cloud computing has been widely studied and applied in commercial area. However, it is still in exploratory stage in government area. One main reason is that government area usually involves complex and flexible business process and business data, which requires high flexible systems. To handle these problems, this paper proposes a domain-oriented government cloud platform based on PaaS, called DOGCP. The DOGCP can integrate and manage domain-oriented software resources, totally encapsulated as services. Government departments can customize applications by utilizing these services according to their special demands. The DOGCP has been applied in the domain of qualification promotion to build various applications for departments that review different qualifications. Actual experiences show that the DOGCP has great flexibility to satisfy various demands of departments.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao
{"title":"Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics","authors":"Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao","doi":"10.1109/CSCloud.2015.67","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.67","url":null,"abstract":"Building an effective Model Risk Management (MRM) system requires advanced skills in mutliple fields, such as technology, econometrics, and business. It is a dilemma that MRM practitioners are struggling with. Very often the enterprises are seeking someone who can understand their business ideas and transform them to technology solutions or come up with technology solutions to support their MRM ideas. However, many quantitative analysts fail in the required software development skills, while they are critical in this type of the project. We are witnesses these struggles where some model risk leaders fail in finding competent technologists or econometricians to implement their risk management philosophy. Also we have cases where technologists or econometricians cannot receive proper requirements to implement the functionality that the business needs. In this paper, we propose a MRM framework based on a review of MRM systems. Also we present the methodology of producing an effective MRM system.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance","authors":"Jiaxu Zhao, Zhide Chen, Yali Zeng","doi":"10.1109/CSCloud.2015.62","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.62","url":null,"abstract":"This research focuses on two aspects of Intelligent Transportation System (ITS): Intelligent Traffic Light and Dynamic Route Guidance (DRG). The paper aims to make traffic light and route guidance to be smarter. In this paper, the authors apply Grey-Markov Model which combines Grey Model and Markov Model together to predict short-time traffic and then build Intelligent Traffic Light Model (ITLM). For purpose of realizing DRG, the authors improve ant colony optimization (ACO) by putting forward a new feedback pheromone and changing the probabilistic formula, which would make ACO feasible for solving the DRG in reality transportation. Simulations show that the model do have a better performance on short-time traffic predicting and improved ACO is suitable for DRG.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125744179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}