2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing最新文献

筛选
英文 中文
Tunable Performance and Consistency Tradeoffs for Geographically Replicated Cloud Services (COLOR) 地理复制云服务的可调性能和一致性权衡(COLOR)
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.33
Wenbo Zhu, Murray Woodside
{"title":"Tunable Performance and Consistency Tradeoffs for Geographically Replicated Cloud Services (COLOR)","authors":"Wenbo Zhu, Murray Woodside","doi":"10.1109/CSCloud.2015.33","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.33","url":null,"abstract":"COLOR (client-oriented layered optimistic replication) is a combination of optimistic and conservative data replication that allows cloud services to be replicated across widely distributed locations without suffering from the latency overhead of strict algorithms, and with quantifiable and controllable tradeoffs between performance and consistency guarantees. The COLOR solution adopts a layered approach to enable optimistic delivery of client messages on top of any existing storage layer that manages the strict replication of the cloud service. When clients may be temporarily exposed to inconsistent states due to replication failures, such inconsistency is made recoverable similar to \"optimistic concurrency control\" for clients that cache the server state. COLOR supports different numeric parameters to trade the strict consistency for better performance to possibly match Eventual Consistency, while the end-to-end consistency is always guaranteed as the storage layer will never deliver any client messages generated from inconsistent states.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"31 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures 网站伪造:了解网络钓鱼攻击和非技术对策
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.77
I. Waziri
{"title":"Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures","authors":"I. Waziri","doi":"10.1109/CSCloud.2015.77","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.77","url":null,"abstract":"Website Forgery is a type of web based attack where the phisher builds a website that is completely independent or a replica of a legitimate website, with the goal of deceiving a user by extracting information that could be used to defraud or launch other attacks upon the victim. In this paper we attempt to identify the different types of website forgery, phishing attacks, and non-technical countermeasure that could be used by users, (mostly by non-IT users) that lack the understanding of how phishing attack works and how they can prevent themselves from these criminals.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNA 基于DLNA的跨局域网媒体资源共享设计
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.18
Fei Gu, J. Niu, Zhenxue He, Meikang Qiu, Cuijiao Fu
{"title":"CLMRS: Designing Cross-LAN Media Resources Sharing Based on DLNA","authors":"Fei Gu, J. Niu, Zhenxue He, Meikang Qiu, Cuijiao Fu","doi":"10.1109/CSCloud.2015.18","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.18","url":null,"abstract":"Digital Living Network Alliance (DLNA) puts forward an interoperable architecture of home network equipment to implement the simple and seamless interoperability between household appliances, mobile devices and computers, so as to enhance and enrich users' experience. Because DLNA is designed to implement the sharing of multimedia resources between devices in a family environment, it does not support cross-LAN accessing. Currently, the cross-network cooperative work between smart devices has become a hot issue. To overcome this problem, this paper presents CLMRS - a cross-LAN accessing solution of C/S architecture based on DLNA technology. CLMRS can be used to implement cross-network media resources sharing by designing DLNA gateway/router of applicaion-level. We use DLNA gateway as a agent of LAN which is designed to transpond communication messages and to redirect address. To achieve cross-LAN media resources sharing, CLMRS adapts DLNA router as a transfer server to transpond communication data and to manage users access right. We also optimize the transmission path of media Steam to reduce the pressure of DLNA router. In order to protect user privacy, CLMRS sets a family account to limit the access right and proposes an efficient and secure authentication mechanism with anonymity. Our design and theoretical model are validated via implementing an instance of DLNA cross-network communication. Experimental results show that the approach is practical and can protect user privacy effectively.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131187894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics 电弧炉v-i特性的极限学习机(ELM)预测器
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.94
Salam Ismaeel, A. Miri, A. Sadeghian, Dharmendra Chourishi
{"title":"An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics","authors":"Salam Ismaeel, A. Miri, A. Sadeghian, Dharmendra Chourishi","doi":"10.1109/CSCloud.2015.94","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.94","url":null,"abstract":"This paper presents an Extreme Learning Machine (ELM) time series prediction strategy to estimate the current and voltage behaviour of an Electric Arc Furnace (EAF). The proposed ELM predictor is designed for both long and short term predictions of the v-i characteristics of an EAF. The proposed predictor is evaluated using two real sensors' outputs collected over different time periods with a rate of 2000 samples per second, and its performance is compared against Feed-Forward Neural Networks (FFNN), Radial Basis Functions (RBF) and Adaptive Neuro-Fuzzy Inference Systems (ANFIS) algorithms. Experimental results obtained show the proposed ELM predictor to have superior speed and stability behaviour, while obtaining similar error values to comparable techniques.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria 提供网上银行服务的能力和障碍:以尼日利亚银行员工为例
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.48
Joseph Funsho Omonaiye, V. Lalitha, H. Khan, Sheila D. Fournier-Bonilla, Rajvir Singh
{"title":"Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria","authors":"Joseph Funsho Omonaiye, V. Lalitha, H. Khan, Sheila D. Fournier-Bonilla, Rajvir Singh","doi":"10.1109/CSCloud.2015.48","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.48","url":null,"abstract":"Identifying the employee version regarding the necessities of customers and the status of the technological initiatives is one of the latest strategies of the online banking companies. As many of the studies are limited to collect the opinion of the customer, the other side of the coin is not coming to lime light. So, the present study intended to capture the opinion of the employees regarding two vital aspects -- the ability of the organization to follow the pioneers of the industry with respect to adapting online banking practices and the hurdles that the online banking organizations are facing nationally and internationally. Two research questions are framed accordingly and the opinion of the employee regarding the questions is collected. A total of 90 employees of three reputed banks are selected at random and data is collected from them using the study tool, questionnaire. The collected is analyzed using simple statistical techniques and portrayed for better understanding. For the first question, answer is taken as yes and no and for the second research question, the average of the opinions regarding the social, economic, political and legal environments is considered. Thus, the opinion of the employees about Nigerian technology market is portrayed using pictorial representation. From the figures, it is affirmed that strategies have been being implemented in Nigeria by following the forerunners of the online banking industry. At the same time, it is also opined by majority of employees that the compartmentalized working of the sectors has become a big problem for the development of the online banking. On the whole, it is proved that synchronized services of all the sectors, aimed at customer oriented collaborative strategies can convince the customers to use online banking ventures and hence to upgrade themselves","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Small-Scale Cyber Security 小规模网络安全
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.12
E. Osborn, A. Simpson
{"title":"Small-Scale Cyber Security","authors":"E. Osborn, A. Simpson","doi":"10.1109/CSCloud.2015.12","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.12","url":null,"abstract":"The nature of cyberspace continues to evolve, and so do the associated threats. The focus of the cyber security industry is typically (and understandably) on high-value assets. However, there is a large user group intersecting with corporate and government IT users, which lacks the resources -- in terms of finance, time and/or knowledge -- to deal with the threats that they face. We argue that greater attention needs to be given to this user group, differentiating these small-scale IT users when thinking about cyber security. Going further, we argue that it is essential that the research community starts to give consideration to what we term Small-Scale Cyber Security. To this end, we describe the results of an initial feasibility study, as well as a research agenda for tackling this cross-disciplinary problem.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114828806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Confidentiality and Privacy of Outsourced Spatial Data 加强外判空间数据的保密和私隐
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.39
Ayesha M. Talha, I. Kamel, Z. Aghbari
{"title":"Enhancing Confidentiality and Privacy of Outsourced Spatial Data","authors":"Ayesha M. Talha, I. Kamel, Z. Aghbari","doi":"10.1109/CSCloud.2015.39","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.39","url":null,"abstract":"The increase of spatial data has led organizations to upload their data onto third-party service providers. Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The main challenge is maintaining data confidentiality with respect to untrusted parties as well as providing efficient and accurate query results to the authenticated users. We propose a dual transformation scheme on the spatial database to overcome this problem, while the service provider executes queries and returns results to the users. First, our approach utilizes the space-filling Hilbert curve to map each spatial point in the multidimensional space to a one-dimensional space. This space transformation method is easy to compute and preserves the spatial proximity. Next, the order-preserving encryption algorithm is applied to the clustered data. The user issues spatial range queries to the service provider on the encrypted Hilbert index and then uses a secret key to decrypt the query response returned. This allows data protection and reduces the query communication cost between the user and service provider.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications “是否要安装此应用程序的更新?”对更新的Android应用程序的严格分析
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.97
A. Aysan, Sevil Şen
{"title":"\"Do You Want to Install an Update of This Application?\" A Rigorous Analysis of Updated Android Applications","authors":"A. Aysan, Sevil Şen","doi":"10.1109/CSCloud.2015.97","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.97","url":null,"abstract":"Attackers have been searching for security vulnerabilities in Android applications to exploit. One of these security vulnerabilities is that Android applications could load codes at runtime. This helps attackers to avoid being detected by static analysis tools. In this study, we have done a rigorous analysis to see how attackers employ updating techniques in order to exploit this vulnerability, and to assess the security risks of applications using these techniques in the markets. A comprehensive analysis is carried out on nearly 30,000 applications collected from three different Android markets and two malware datasets. Both static and dynamic analysis techniques are employed to monitor malicious activities in such applications. As a result, we found 70 new malicious applications from Google Play. Our work is the first study which monitors updating behaviours of applications during their execution. This analysis allows us to analyse suspicious applications deeply and to develop better security solutions.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"60 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Simulation Modeling Method Based on Petri Net 基于Petri网的仿真建模方法
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.22
Yu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang
{"title":"A Simulation Modeling Method Based on Petri Net","authors":"Yu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang","doi":"10.1109/CSCloud.2015.22","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.22","url":null,"abstract":"With the development of science and technology, simulation technology has been widely applied in all fields, such as complexity of model design field. And it has become an indispensable supportive technology, but the current simulation model is still lack of a formal description method for model verification and the analysis. Based on Petri nets, this paper presents a data-driven simulation model and the formal definition, then describes the model on the basis of the operation and shows an example to describe the principle and process of the formal model. A simulation model definition language that extends the PNML language is proposed in this paper and XML Schema is used for implementation.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services 一种基于Bloom过滤器的加密云服务低存储阶段搜索方案
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.30
Hoi Ting Poon, A. Miri
{"title":"A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services","authors":"Hoi Ting Poon, A. Miri","doi":"10.1109/CSCloud.2015.30","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.30","url":null,"abstract":"Despite the many benefits of cloud technologies, there have also been significant concerns regarding its security and privacy. To address the issues, much efforts have been made towards development of an encrypted cloud system. One of the key features being investigated is the ability to search over encrypted data. Although many have proposed solutions for conjunctive keyword search, few have considered phrase searching techniques over encrypted data. Due to the increased amount of information required to identify phrases, existing phrase search algorithms require significantly more storage than conjunctive keyword search schemes. In this paper, we propose a phrase search scheme, which takes advantage of the space efficiency of Bloom filters, for applications requiring a low storage cost. It makes use of symmetric encryption, which provides computational and storage efficiency over schemes based on public key encryption. The scheme provides simple ranking capability, can be adapted to non-keyword search and is suitable against inclusion-relation attack.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信