{"title":"Client-based ad insertion for adaptive video streaming","authors":"Hung T. Le, A. Pham, T. Thang","doi":"10.1109/CCNC.2014.6994434","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994434","url":null,"abstract":"Advertisement is a crucial factor in business models of Internet video streaming. So far, most methods for advertisement video insertion are of server-based type. In this paper, we present an approach for client-based advertisement insertion in HTTP streaming, which has become a cost effective means for multimedia delivery. The advantages of our approach include client's unawareness of advertisement and smooth transition between content and advertisement.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content protection and secure synchronization of HTML5 local storage data","authors":"Mayssa Jemel, A. Serhrouchni","doi":"10.1109/CCNC.2014.6994404","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994404","url":null,"abstract":"Storage is one of the main services that came with Cloud Computing. It offers to the client the possibility to externalize his data. In this work, we concentrate on the use of HTML5 standard in SaaS cloud Services. In particular, we focus on the local storage APIs that offer to Web application the possibility to store user's data and information in browsers. These APIs allow the user to work in offline mode. The problem with HTML5 local storage, besides the lack of security in storage, is the loss of data while moving from one machine to another. Based on the adoption of Digital Safe, the main contributions of our proposal are as follows. First, we add new secure mechanisms to enhance the security in HTML5 local storage APIs. Second, we propose an architecture that ensures a secure synchronization of local data stored with HTML5.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of adaptive multi-gateway mesh network","authors":"Takaaki Kawai, Naoki Yusay, Hiroshi Minenoz","doi":"10.1109/CCNC.2014.6994421","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994421","url":null,"abstract":"A system with which anyone can build a network easily anywhere is needed in disaster areas and developing countries where the communication infrastructure is unstable. Wireless mesh network can be cited as a way to build a network on the spot. However, radio interference, distance and obstacles cause the radio disturbance. In addition, to prevent the traffic load from being concentrated on one gateway node, it is necessary to use as many gateway nodes as possible based on the Internet connection status. In this paper, we propose Adaptive Multi- Gateway Mesh Network(AMGMN). AMGMN can use wired LAN and wireless LAN as links. The combination of these prevents radio interference and ensures ease of structuring the network. We implemented AMGMN inside bootable USB and it made it possible to build the network automatically.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic social networking service using smart TV","authors":"Sangho Lee, Woosuk Kwon, Shiho Kim","doi":"10.1109/CCNC.2014.6994395","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994395","url":null,"abstract":"We propose a Semantic Social Networking Service (SSNS) using Smart TV to provide an enhanced object-centered social communication during watching TV. In the proposed semantic social communication service, it supports not only 1 to N interaction but also provides N to N interactions. Additionally, real-time social survey system supports the viewers to participate in a survey by synchronizing with broadcasting TV program. To ensure safe message sharing, a symmetric key based cryptography algorithm is employed to decrypt incoming and encrypt outgoing messages among participants.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating NFV with fast path offloading","authors":"D. Touitou, E. Roch","doi":"10.1109/CCNC.2014.6994407","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994407","url":null,"abstract":"In this paper, we propose Fast Path Offloading (FPO), a new framework that accelerates the performance of many virtual Network Functions. FPO enables the Network Functions to offload the majority of the traffic processing to the underlying network. We implemented FPO and used it to accelerate the performance of HA-proxy, an open source L7 load balancer.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122524350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a multi-trust model for multi-purpose healthcare social networks","authors":"Chunming Gao, N. Iwane","doi":"10.1109/CCNC.2014.6994398","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994398","url":null,"abstract":"Online E-health platforms have enabled patients to obtain useful references on the Internet, as well as to share information and exchange experiences among people with similar diseases. Such social networks also enable researchers and corporates to conduct studies or advocates on targeted groups of patients. To make such a multi-purpose healthcare social network to be practical, concerns must be addressed regarding data security, patients privacy, user and data credibility, as well as how to promote user participation. This paper addresses these concerns as trust-engagement and develops a multi-trust model integrating public key encryption, access control, credible anonymity, and mutual rating mechanism for a multi-purpose healthcare social network.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic implementation of RSA for ion fault injection attack","authors":"C. Shao, Huiyun Li, Xiaolong Zhang","doi":"10.1109/CCNC.2014.6994410","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994410","url":null,"abstract":"Nowadays the RSA cryptographic algorithm is widely used to protect Big Data security and privacy. Fault injection has been proved effective against RSA implementations. Although heavy ions have been long known as a source to cause single event effect (SEE), there is few publication about how the RSA implementations could be compromised by ion strikes. This paper proposes an RSA implementation specifically designed for the ion strike experiment. The design includes the handshake protocol with the microbeam facility, SEE response module, recovery module, fault detection module. This design paves the way to discover to what extend the ion attack will compromise the RSA implementations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Binaural decoding for efficient multi-channel audio service in network environment","authors":"Kwangki Kim, Jinsul Kim","doi":"10.1109/CCNC.2014.6994429","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994429","url":null,"abstract":"In this paper, we proposed the binaural decoding in sound source location coefficient coding to focus on the reduction of the complexity. The proposed binaural decoding is implemented by convolution between the gain factors of the multi-channel audio signals generated by the spatial parameters and the HRTF coefficients in frequency domain. Compared with the typical binaural decoding in time domain, the proposed method can greatly reduce the complexity as about 90 %.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133808838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks","authors":"Ari Hadiks, Yu Chen, Feng Li, Bingwei Liu","doi":"10.1109/CCNC.2014.6994425","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994425","url":null,"abstract":"Wi-Fi Direct technology enriches local services that enables social interactions off the grid. Allowing purely local connections among mobile devices, Device-to-Device (D2D) networks support more versatile proximity-based applications and reduce dependence on central entity. While the D2D paradigm allows more convenient information exchanging or resource sharing, it also brought new challenges. Information assurance and system security are top concerns users have. In this paper, we studied the impacts of Denial-of-Service (DoS) attacks in a D2D underlaying network. Our experimental results show that malicious users can effectively force the victim mobile device drop off its Wi-Fi connection to the access point (AP) without being detected by the AP or the cellular network. We expect this preliminary results can inspire more research in this raising area.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna selection for cyclostationarity detection based spectrum sensing in cognitive radio","authors":"S. Narieda","doi":"10.1109/CCNC.2014.6994418","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994418","url":null,"abstract":"This paper presents a novel antenna selection technique for cyclostationarity detection based spectrum sensing for cognitive radio networks. An antenna selection criterion, which can compute by some test statistics obtained the cyclic autocorrelation function of received signals at all receive antenna elements, is developed. The presented results are compared with some conventional results, and the presented techniques can improve the sensing performances in same sensing period as the conventional techniques.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122387500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}