{"title":"Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events","authors":"Zaid Al-Ali, Basheer Al-Duwairi, A. Al-Hammouri","doi":"10.1109/CSCloud.2015.66","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.66","url":null,"abstract":"This paper presents a system that provides mitigation for DDoS attacks as a service, and is capable of handling flash crowd events at the same time. Providing DDoS protection as a service represents an important solution especially for Websites that have limited resources with no infrastructure in place for defense against these attacks. The proposed system is composed of two main components: (i) The distributed CAPTCHA service, which comprises a large number of powerful nodes geographically and suitably distributed in the Internet acting as a large distributed firewall, and (ii) The HTTPredirect module, which is a stateless HTTP server that redirects Web requests destined to the targeted Webserver to one of the CAPTCHA nodes. The CAPTCHA node can then segregate legitimate clients from automated attacks by requiring them to solve a challenge. Upon successful response, legitimate clients (humans) are forwarded through a given CAPTCHA node to the Webserver.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners","authors":"Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao","doi":"10.1109/CSCloud.2015.34","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.34","url":null,"abstract":"Many RFID tags store valuable information that can easily be subject to unauthorized reading, leading to system security and privacy risks. The detection methods existed are not only complex and impractical, but also unable to extract more information about the abnormal signal. In this paper, we propose a lightweight detection approach for the unauthorized reading without affecting the operation of RFID systems. Such an approach contains three parts: RF signal scanner, signalevent model construction and abnormal feature extraction. In particular, we design and implement a RF scanner to acquire RF signals and measure RSSI values. After that, we build a signal-event model to analyze how the RSSI value is related to the RFID event. The detection of unauthorized reading is to investigate the deviation of observed RSSI values from their expected values. Finally, we extract and separate abnormal RSSI values to estimate the risk of unauthorized reading. The primary experimental results show that our approach can achieve high prediction accuracy in detecting unauthorized reading and make better performance in extracting abnormal features.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao
{"title":"Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry","authors":"Hevel Jean-Baptiste, Meikang Qiu, Keke Gai, Lixin Tao","doi":"10.1109/CSCloud.2015.69","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.69","url":null,"abstract":"The growing trend of the e-banking has driven the implementations of big data in financial industry. Data analytic is considered one of the most critical aspects in current economic development, which is broadly accepted in various financial domains, such as risk forecast and risk management. However, gaining an accurate risk prediction is still a challenging issue for current financial service institutions and the hazards can be caused in various perspectives. This paper proposes an approach using meta meta-analytics for risks forecast in big data. The proposed model is Meta Meta-Analytics Risk Forecast Model (MMA-RFM) with a crucial algorithm Regression with Meta Meta-Analytics Algorithm (RMMA). The proposed schema has been examined by the experimental evaluation in which it performs an optimized performance.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jedidiah Yanez-Sierra, A. Díaz-Pérez, Víctor Jesús Sosa Sosa, J. L. González
{"title":"Towards Secure and Dependable Cloud Storage Based on User-Defined Workflows","authors":"Jedidiah Yanez-Sierra, A. Díaz-Pérez, Víctor Jesús Sosa Sosa, J. L. González","doi":"10.1109/CSCloud.2015.28","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.28","url":null,"abstract":"A major concern of users of cloud storage services is the lost of control over security, availability and privacy of their files. That is partially addressed by end-to-end encryption techniques. However, most of the solutions currently available offer rigid functionalities that cannot be rapidly integrated into customized tools to meet user's requirements like, for example, file sharing with other users. This paper presents an end-to-end architecture that enables users to build secure and resilient work-flows for storing and sharing files in the cloud. The workflows are configurable structures executed on the user-side that perform processing operations on the files through chained stages such as data compression for capacity overhead reduction, file assurance for ensuring confidentiality when sharing files and information dispersion for storing files in n cloud locations and retrieving them even during outages of m cloud storage providers. The users can set up different workflows depending on their requirements because they can organize the processing units of each stage in either pipeline to improve its performance or stack for improving functionality. The stages and their processing units are connected using I/O communication interfaces which ensure a continuous data flow from the user/organization computers to multiple cloud locations. Based on our architecture, we developed a prototype for a private cloud infrastructure. The experimental evaluation revealed the feasibility of enabling flexible file sharing and storage user-defined workflows in terms of performance.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127677910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-step Attack Pattern Detection on Normalized Event Logs","authors":"David Jaeger, M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/CSCloud.2015.26","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.26","url":null,"abstract":"Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot integrate valuable external threat intelligence, which would simplify the creation of complex signatures and enables the detection of malicious activities seen by other targets. We extend an existing multi-step signature language to support attack detection on normalized log events, which were collected from various applications and devices. Additionally, the extended language supports the integration of external threat intelligence and allows us to reference current threat indicators. With this approach, we can create generic signatures that stay up-to-date. Using our language, we could detect various login brute-force attempts on multiple applications with only one generic signature.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Migration-Aware Virtual Machines","authors":"Taimur Al Said, O. Rana","doi":"10.1109/CSCloud.2015.92","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.92","url":null,"abstract":"Virtual Machines hosted in cloud systems are susceptible to migration usually without notifying the cloud consumer. This is generally undertaken to load balance user requests across multiple data centres, often without direct awareness of the user. Migration could be to a regional site or to a data centre in another geographical area, i.e. to a country which has non-conforming laws with regards to data privacy. This concern becomes even more significant when a cloud federation is considered, where a number of different providers may need to work together. It is therefore necessary to develop a mechanism that enables a user to detect if migration of a VM has happened. More importantly, such a mechanism should be user driven and not require input from a provider. We compare various techniques to enable a VM migration to be detected, by monitoring events inside a VM that could signify whether such a migration has taken place, and subsequently notifying the owner about such an event. A review of migration detection techniques is presented followed by the proposition of a hybrid model to carry out the migration detection process.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruixin Tao, Jianwei Liu, H. Su, Yang Sun, Xiao Liu
{"title":"Combination in Advance Batch Multi-exponentiation on Elliptic Curve","authors":"Ruixin Tao, Jianwei Liu, H. Su, Yang Sun, Xiao Liu","doi":"10.1109/CSCloud.2015.88","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.88","url":null,"abstract":"Multi-exponentiation is very important in varies cryptographic and digital signatures. In the situation like electronic cash and SNS websites, the server need to answer a mass of requests in a short time. With every request, there are always processes of encryption, decryption, signature and verification. In these processes, there are large amount of computations of multi-exponentiation, which shows the demand of the acceleration of multi-exponentiation. Handling many multi-exponentiation simultaneously is called batch multi-exponentiation. Yang Sun first came up with a algorithm (BME) deal with this problem. We propose a new batch multi-exponentiation method to accelerate BME in this paper and also extend it to the elliptic curve setting by specifying an optimal left-to-right Binary signed-digit recoding. It is named Combination in Advance Batch Multiexponentiation on Elliptic Curve (CABME)algorithm. We focus on the form which is multi-exponentiation with two bases in a group since it is commonly used. Our CABME algorithm is about 16:7% more effective than BME under the same situation.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiently Managing Encrypted Data in Cloud Databases","authors":"O. B. Omran, B. Panda","doi":"10.1109/CSCloud.2015.44","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.44","url":null,"abstract":"Cloud computing has brought many advantages to organizations and computer users. It allows different service providers to distribute many applications as services in an economical way. Therefore, many users and companies have begun using cloud computing. However, they are concerned about their data when they store it on a third party server, the cloud. The private data of individual users and companies is stored and managed by the service providers on the cloud, which offers services on the other side of the Internet in terms of its users, and consequently results in privacy concerns [1]. In this paper, a technique has been explored to encrypt the data on the cloud and to execute and run SQL queries on the cloud over encrypted data. The strategy is to process the query at the service providers' site without having to decrypt the data. Also, to achieve efficiency, no more than the exact set of requested data is returned to the client. Data decryption is performed at the client site to prevent any leakage at the cloud or during transmission. Two techniques have been provided to effectively store the encrypted data. Also, an experiment evaluation has been provided to compare between the two techniques.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131078261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma
{"title":"Survey on Privacy Protection of Android Devices","authors":"Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma","doi":"10.1109/CSCloud.2015.21","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.21","url":null,"abstract":"Nowadays, the ubiquity of smart phones make them carry large amounts of personal sensitive information, but at the same time, there are also many Apps in Android APP market that target to collect users' sensitive data. So it becomes quite important to prevent users from the threat of privacy leakage. In this paper, we analyze the Android's privacy protection mechanism, and describe various threats to users' different types of privacy data. After that, we enumerate two ways that can leak sensitive information, and discuss the current solutions and techniques from aspects of privacy protection enhancement and privacy leakage detection. We also make a fine-grained classification for these two aspects, and study the difference between solutions in each category. Finally, we summarize the deficiency of existing research of Android privacy protection and propose the future research direction.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Andreoli, Luca Ferretti, Mirco Marchetti, M. Colajanni
{"title":"Enforcing Correct Behavior without Trust in Cloud Key-Value Databases","authors":"Andrea Andreoli, Luca Ferretti, Mirco Marchetti, M. Colajanni","doi":"10.1109/CSCloud.2015.51","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.51","url":null,"abstract":"Traditional computation outsourcing and modern cloud computing are affected by a common risk of distrust between service requestor and service provider. We propose a novel protocol, named Probus, that offers guarantees of correct behavior to both parts without assuming any trust relationship between them in the context of cloud-based key-value databases. Probus allows a service requestor to have evidence of cloud provider misbehavior on its data, and a cloud provider to defend itself from false accusations by demonstrating the correctness of its operations. Accusation and defense proofs are based on cryptographic mechanisms that can be verified by a third party. Probus improves the state-of-the-art by introducing novel solutions that allow for efficient verification of data security properties and by limiting the overhead required to provide its security guarantees. Thanks to Probus it is possible to check the correctness of all the results generated by a cloud service, thus improving weaker integrity assurance based on probabilistic verifications that are adopted by related work.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}