{"title":"Trusted Block as a Service: Towards Sensitive Applications on the Cloud","authors":"J. Hao, Wentong Cai","doi":"10.1109/TrustCom.2011.13","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.13","url":null,"abstract":"Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. These potential threats block sensitive applications to join the Cloud. In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. The former refers to the protection of sensitive programs/data from disclosing to other users or even the Cloud administrators. The latter concerns with user's capability to verify whether computing results are faithfully calculated. To address SAND, we propose a new Cloud model, Trusted Block as a Service (TBaaS), to provide a confidential and verifiable environment for each sensitive application. TBaaS limits Cloud provider's access of sensitive applications while granting user the ability to verify whether the computation is faithfully carried out. Moreover, it offers high flexibility and low performance overhead.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115699674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-Level Data Model for Keyword Search over Relational Databases","authors":"Jun Zhang, Renjun Shao","doi":"10.1109/TrustCom.2011.185","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.185","url":null,"abstract":"Keyword Search Over Relational Databases(KSORD) has been widely studied in recent years. However, existing KSORD methods are usually based on schema graph or data graph and they are actually tuple-level methods. That is, the retrieved objects are direct tuple-level relational data, and the retrieval results are tuple-connected trees which are difficult to be understood by end-users. There are still much work to do to further improve the effectiveness and efficiency of existing KSORD methods. The essential cause is that an entity is usually divided into some parts stored in different tables due to normalized relational database design. In fact, the relational data model is storage-oriented rather than end-user-oriented. Therefore, a novel method called Object-level Keyword Search Over Relational Databases(OKSORD) is proposed in this paper. In OKSORD method, relational data are modeled as an object-level data graph, in which each node may consist of several tuples to present the complete information of an entity. There are two key issues in OKSORD method, one is object-level data modeling for relational databases, the other is object-level searching and ranking based on object-level data graph. This paper mainly addresses the first issues. The main contributions are as follows. Firstly, the concept of OKSORD is introduced for the first time. Secondly, an algorithm for classifying relation schemas is proposed to partition relations into four categories: primary relations, secondary relations, linked relations and coding relations. Finally, an object-level data model for relational data is defined and the algorithm for generating corresponding object-level data graph is proposed.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Private-Key Generation Scheme with Self-Certified Identity","authors":"Yongming Xie, Guojun Wang","doi":"10.1109/TrustCom.2011.65","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.65","url":null,"abstract":"In an identity-based encryption (IBE) system, a private-key generator (PKG) is assumed to be credible, which takes charge of identity authentication and private-key issuing for users. However, the reliability of IBE may be questioned since this assumption does not always hold. In this paper, we propose a new distributed private-key generation scheme with self-certified identity (SCI-DKG) which does not need any PKG. SCI-DKG takes advantage of distributed private key generation and self certification to remove PKG from IBE. Comparing with the existing IBE schemes, a user and his identity can be independently authenticated through his blind digital ID (BDID) card and identity signature. In the meanwhile, a user can extract private keys from other users' sharing packets containing secret shares, partial public parameters and BDID cards. The proposed scheme significantly extends IBE without involvement of PKGs, and provides a promising solution for applications where PKG is not always available. Theoretical analysis demonstrates that our scheme is secure and effective.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115826393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hüseyin Aysan, R. Dobrin, S. Punnekkat, Rolf Johansson
{"title":"Probabilistic Schedulability Guarantees for Dependable Real-Time Systems under Error Bursts","authors":"Hüseyin Aysan, R. Dobrin, S. Punnekkat, Rolf Johansson","doi":"10.1109/TrustCom.2011.157","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.157","url":null,"abstract":"The fundamental requirement for the design of effective and efficient fault-tolerance mechanisms in dependable real-time systems is a realistic and applicable model of potential faults, their manifestations and consequences. Fault and error models also need to be evolved based on the characteristics of the operational environments or even based on technological advances. In this paper we propose a probabilistic burst error model in lieu of the commonly used simplistic fault assumptions in the context of processor scheduling. We present a novel schedulability analysis that accounts for the worst case interference caused by error bursts on the response times of tasks scheduled under the fixed priority scheduling (FPS) policy. Further, we describe a methodology for the calculation of probabilistic schedulability guarantees as a weighted sum of the conditional probabilities of schedulability under specified error burst characteristics. Finally, we identify potential sources of pessimism in the worst case response time calculations and discuss potential means for circumventing these issues.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination","authors":"Chunlei Mei, Maoxiang Yi, Zhifei Shen","doi":"10.1109/TrustCom.2011.90","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.90","url":null,"abstract":"Ever-growing test data volume and test power dissipation poses significant cost and security challenges in testing core-based system-on-chip (SoC). In this paper, a test pattern recombination technique is proposed to improve test data compression and decrease scan test power dissipation. The proposed technique first analyzes the entropy of a test set, which is used to determine the maximum compression ratio, and then divides the test set into a group of patterns that are used as scan slices for scan test based on multi-scan chains. The probability of the compatibility between the patterns in every vector is calculated, according to which the patterns of each test vector are recombined so that the patterns with high compatible probability are placed closely. Finally, for all the test vectors in a test set, a unified arrangement order for their patterns is determined based on the goal that the test set can be compressed and the scan test power dissipation can be decreased to advantage. The proposed scheme is applied to ISCAS89 test benchmarks and their MinTest test sets are used. The experimental results show that compared to the recently presented scheme, the proposed technique can effectively ensure a high data compression ratio and reduce shift power dissipation during testing.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li
{"title":"Reform and Practice of Training Engineering Professionals in 2C+E Computer Science","authors":"Jianbo Fan, Liangxu Liu, Rina Su, Hua Yu, Qingfeng Li","doi":"10.1109/TrustCom.2011.178","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.178","url":null,"abstract":"In order to meet the current demand for IT professionals, this paper presents the reform idea of 2C+E (Core professional knowledge, Core professional ability, Engineering environment) training system with the goal of training ideal professionals. The idea needs students to master core professional knowledge, to train core professional ability in the university, and to enhance their capability of engineering practice in the environment of university-enterprise cooperation. We have successfully applied reform measures of training engineering professionals in real situations and demonstrated a training scheme of university-enterprise cooperation. The result of the reform has played a significant role in training engineering professionals of computer major in our university.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phase-Wise Clustering of Time Series Gene Expression Data","authors":"Poonam Goyal, Navneet Goyal, R. Karwa, M. John","doi":"10.1109/TrustCom.2011.231","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.231","url":null,"abstract":"Extensive studies have shown that analyzing micro array time series data is important in bioinformatics research and biomedical applications. An observation in the analysis of gene expression data is that many genes have similarity in their expression patterns and therefore appear to be co-regulated. Previously, the time series gene expression data was analyzed mainly by checking the global similarities between the gene expression profiles and local similarities were overlooked. Local similarities can provide useful insight into gene behavior. In this paper, we propose a clustering algorithm for analyzing the time series gene expression data to identify the gene clusters based on the phase-wise local similarities in the cell cycle. Our approach exploits the fact that the genes which are involved in one phase of a cell cycle would have a characteristic profile for time points belonging to that phase and may not be involved in other phases. Moreover, a gene that is clustered with a set of genes in one phase might be involved with a different set of genes in other phases. In the proposed approach, we first clustered the genes at every time point of a phase and group genes with similar expression profiles, i.e., we group those genes together which remain in the same cluster at every time point within a phase. The functions of genes were obtained from Gene Ontology. In this paper, the results are presented for different phases of a cell cycle. Candidate genes are identified for these phases and their groups are analyzed. We found that the group of candidate genes had few genes which are known to be involved. Furthermore, some genes are found to be involved in more than one phase with different set of genes. Results presented show that local similarities can provide useful insight into gene behavior. Results are compared with an existing algorithm, STEM. We have used a saccharomyces cerevisiae cell cycle micro array database which is part of the Stanford Micro array Database (SMD).","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Decision Making Ontology Building Process for Analytical Requirements Elicitation","authors":"Fahmi Bargui, H. Ben-Abdallah, J. Feki","doi":"10.1109/TrustCom.2011.212","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.212","url":null,"abstract":"Goal-oriented modeling is a promising approach to elicit the analytical requirements of decision makers. However, the lack of a technique that formalizes the decision making knowledge necessary for goal elicitation hinders the automation of this type of approaches. In this paper, we propose a process for building a decision making ontology that represents the domain knowledge. The formal aspect of the ontology makes the domain knowledge machine readable, which facilitates the decomposition of goals and automates their elicitation. The usefulness of the ontology in analytical requirements elicitation is assessed through an experimental evaluation.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115537157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Platform Application Sharing Mechanism","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1109/TrustCom.2011.77","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.77","url":null,"abstract":"The application sharing mechanism in multi-application smart cards facilitates corroborative schemes between applications in a secure and reliable manner. Traditional application sharing can only be realised if both applications are installed on the same device. In this paper, we extend the smart card firewall to include the application sharing mechanism between applications installed on different smart cards. We propose Platform and Application Binding Protocols that enables two smart-cards / applications to authenticate and ascertain the trustworthiness before sharing resources. Furthermore, we provide an informal analysis of the protocols along with comparison with existing protocols. Subsequently, mechanical formal analysis based on the CasperFDR, and the implementation experience is presented.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for a Testbed for Evaluating Reputation Systems","authors":"P. Chandrasekaran, B. Esfandiari","doi":"10.1109/TrustCom.2011.40","DOIUrl":"https://doi.org/10.1109/TrustCom.2011.40","url":null,"abstract":"The lack of an universal model in reputation systems makes it challenging to evaluate and compare them against attacks. While there are test beds that provide application domain specific metrics to evaluate reputation systems, in this paper we propose a model for a test bed that is application agnostic. It is a workflow of graph transformations that is generic enough to accommodate a number of reputation systems in existing literature. In doing so, we note that these reputation systems work at different stages in the workflow and as a result, a byproduct of this model is a new classification method. We also describe various attacks using our model.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}