{"title":"Voronoi-based Secure kNN Queries over Spatial Data at the Cloud","authors":"Eva Habeeb, Ayesha M. Talha, I. Kamel, Z. Aghbari","doi":"10.1109/INNOVATIONS.2018.8606031","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606031","url":null,"abstract":"The evolution of cloud computing complete security of the database but does not provide real-time enabled organizations to utilize massive storage and computing power. The main problem with database outsourcing is data confidentiality. To protect the confidentiality of data objects, the data owner encrypts data objects using a strong encryption algorithm, like AES, before sending them to the cloud. Which in turn results in the challenge of searching encrypted data to answer kNN queries. This paper provides a novel solution for answering k NN queries at the cloud over encrypted data. To achieve that, data objects are organized using Voronoi network. Moreover, a Grid-based index is built on top of a Voronoi network to expedite the search for the k NN. The cloud service provider uses the proposed index to extract a superset of the nearest neighboring objects (candidate set) and sends it back to the user. Consequently, the user, which has a copy of the encryption key, decrypts the candidate set and performs the final refinement filter to extract the exact k objects.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
May AlTaei, N. A. Barghuthi, Q. Mahmoud, Sonia Al Barghuthi, Huwida E. Said
{"title":"Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges","authors":"May AlTaei, N. A. Barghuthi, Q. Mahmoud, Sonia Al Barghuthi, Huwida E. Said","doi":"10.1109/INNOVATIONS.2018.8606033","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606033","url":null,"abstract":"A blockchain is a distributed ledger and the underlying technology of the Bitcoin cryptocurrency, allowing it to operate in a decentralized fashion with no intermediaries such as financial institutions. The use of blockchain, however, will be far beyond the financial sector; smart contracts, for example would allow business and legal agreements to be stored and executed online. It is anticipated that blockchain will do to middle- and back-office functions what the Internet and the Web have done to the front-office – automate functions. In this paper, we investigate what Chief Information Officers (CIOs) think of blockchain and how they plan to utilize it for their organizations. We conducted a survey that was completed by 25 CIOs in the United Arab Emirates and found mixed feelings about the technology and barriers for use. In this paper, we also discuss opportunities and challenges in adopting blockchain.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132329330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eiman Alothali, Nazar Zaki, E. Mohamed, Hany Al Ashwal
{"title":"Detecting Social Bots on Twitter: A Literature Review","authors":"Eiman Alothali, Nazar Zaki, E. Mohamed, Hany Al Ashwal","doi":"10.1109/INNOVATIONS.2018.8605995","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605995","url":null,"abstract":"Due to the exponential growth in the popularity of online social networks (OSNs), such as Twitter and Facebook, the number of machine accounts that are designed to mimic human users has increased. Social bots accounts (Sybils) have become more sophisticated and deceptive in their efforts to replicate the behaviors of normal accounts. As such, there is a distinct need for the research community to develop technologies that can detect social bots. This paper presents a review of the recent techniques that have emerged that are designed to differentiate between social bot account and human accounts. We limit the analysis to the detection of social bots on the Twitter social media platform. We review the various detection schemes that are currently in use and examine common aspects such as the classifier, datasets, and selected features employed. We also compare the evaluation techniques that are employed to validate the classifiers. Finally, we highlight the challenges that remain in the domain of social bot detection and consider future directions for research efforts that are designed to address this problem.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly Secured Implantable Medical Devices","authors":"Emad Hamadaqa, A. Abadleh, Ayoub Mars, W. Adi","doi":"10.1109/INNOVATIONS.2018.8605968","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605968","url":null,"abstract":"This work is targeting a solid security improvement in the wireless communication between existing and possibly future implantable medical devices (IMDs) and Programmer Monitor Device (PMD). A public medical server acting as a trusted Authority is introduced. A dedicated Pacemaker Proxy Device (PPD) is proposed to serve as a security mediator between PMD and IMD taking care of all medical security, liability and responsibility issues. The key idea is based on embedding low-complexity and resilient digital physical identities based on a new concept in the system devices to prohibit physical substitution/cloning attacks. A biometric identity extracted from the patient's ECG (electrocardiogram) is supporting the security system by adding rather hard-to-clone patient personal health profile. A machine learning algorithm is deployed to extract such biometric identity (key). The initial results of the proposed approach showed practical accuracy in extracting the biometric identity approaching 95%. The whole resulting system ensures solid, resilient and high level of protection for future smart medical environment.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Ownership Management for Medical IoT (MIoT) Devices","authors":"M. Alblooshi, K. Salah, Yousof Al-Hammadi","doi":"10.1109/INNOVATIONS.2018.8606032","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606032","url":null,"abstract":"Recently, blockchain has been foreseen by industry and research community as a transformational and disruptive technology that is poised to play a major role in transforming the way we transact, trade, bank, track and register assets, and do business. Blockchain can potentially be used to provide trusted authenticity, origin, and ownership for IoT devices, in a way that is secure and decentralized without the involvement of a Trusted Third Parties (TTP) or centralized authorities and services. A TTP can be a subject to a single point of failure, and it can be disrupted, compromised or hacked. A TTP can potentially misbehave and become corrupt in the future, even if it is trustworthy now. This paper shows how Ethereum blockchain (with the powerful feature of programmability through smart contracts) can provide a trusted ownership management for medical IoT (MIoT) devices. Tracking the true ownership of MIoT devices is of a paramount importance as using counterfeited MIoT devices can be life-threatening to patients. The paper presents a general framework and solution to manage and trace back the true origin of ownership for an MIoT; whereby an MIoT device can be owned by multiple parties during its life cycle. The paper presents a detailed overview of our proposed system architecture, design, entity relationship, and interactions among all involved parties. The source code of the Ethereum smart contracts is made publicly available. Key aspects related to the algorithms, interactions, implementation and testing are discussed in the paper. Furthermore, we provide security analysis of our proposed solution in terms of satisfying the general security goals and also resiliency against popular attacks as those of DDoS, eavesdropping and replay attacks.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of evolutionary algorithms for the prediction of software change","authors":"Loveleen Kaur, A. Mishra","doi":"10.1109/INNOVATIONS.2018.8605988","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605988","url":null,"abstract":"Change-proneness prediction of software components has become a significant research area wherein the quest for the best classifier still persists. Although numerous statistical and Machine Learning (ML) techniques have been presented and employed in the past literature for an efficient generation of change-proneness prediction models, evolutionary algorithms, on the other hand, remain vastly unexamined and unaddressed for this purpose. Bearing this in mind, this research work targets to probe the potency of six evolutionary algorithms for developing such change prediction models, specifically for source code files. We employ apposite object oriented metrics to construct four software datasets from four consecutive releases of a software project. Furthermore, the prediction capability of the selected evolutionary algorithms is evaluated, ranked and compared against two statistical classifiers using the Wilcoxon signed rank test and Friedman statistical test. On the basis of the results obtained from the experiments conducted in this article, it can be ascertained that the evolutionary algorithms possess a capability for predicting change-prone files with high accuracies, sometimes even higher than the selected statistical classifiers.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Detection of Airline Ticket Price and Demand: A review","authors":"J. Abdella, Nazar Zaki, K. Shuaib","doi":"10.1109/INNOVATIONS.2018.8606022","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606022","url":null,"abstract":"Prediction of airline ticket prices and or demand is very challenging as it depends on various internal and external factors that can dynamically vary within short period of time. Researchers have proposed different types of ticket price/demand prediction models with the aim of either assisting the customer forecast ticket prices or aid the airline to predict the demand. In this paper, we present a review of customer side and airlines side prediction models. Our review analysis shows that models on both sides rely on limited set of features such as historical ticket price data, ticket purchase date and departure date. A combination of external factors such as social media data and search engine query in conjunction with advanced machine learning techniques are not considered.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Power Control Approach for Better Data Throughput in CubeSat Nanosatellites","authors":"Fedeyya Almansoori, P. Marpu, Z. Aung","doi":"10.1109/INNOVATIONS.2018.8605944","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605944","url":null,"abstract":"Adaptive/Variable Coding and Modulation (ACM/VCM) techniques have been used to enhance the data throughput of CubeSat nanosatellites with limited resources and communication capabilities. On average, these techniques showed an improvement by almost doubling the data throughput over the traditional fixed modulation method. To move beyond that, we seek to further enhance the performance of the VCM/ACM techniques by considering the CubeSat’s power features. Altering the power level is a key contributor in the process of selecting the suitable modulation and coding option of the VCM/ACM techniques. In this paper, we introduce our approach named “Improved Power Control” (IPC), which is based on the combination of Adaptive Coding and Modulation (ACM) and Adaptive Power Control (APC) techniques.Simulation studies are performed on a sample remote-sensing CubeSat mission that takes photos from the payload camera and sends them to the ground station. Performance comparison of the three modulation techniques (fixed modulation, ACM, and IPC) is carried out with respect to the total data throughput and the total number of photos that can be downloaded from the CubeSat. The results show that the IPC approach, which considers the CubeSat’s power feature while applying the ACM technique, outperforms the simple fixed methods by a wide margin. When compared to the ACM method deployed alone, IPC offers 35% more data throughput and 80% more photos downloaded in the said remote-sensing CubeSat mission.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"50 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Pipelined KATAN Ciphers under Handle-C for FPGAs","authors":"Palwasha W. Shaikh, I. Damaj","doi":"10.1109/INNOVATIONS.2018.8606012","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8606012","url":null,"abstract":"Embedded Systems are everywhere from the smartphones we hold in our hands to the satellites that hover around the earth. These embedded systems are being increasingly integrated into our personal and commercial infrastructures. More than 98% of all processors are implanted and used in embedded systems rather than traditional computers. As a result, security in embedded systems now more than ever has become a major concern. Since embedded systems are designed to be low-cost, fast and real-time, it would be appropriate to use tiny, lightweight and highly secure cryptographic algorithms. KATAN and KATANTAN family of light-weight block ciphers are promising cryptographic options. In this paper, a sequential hardware design is developed under Handel-C. Taking a step further, Handel-C’s parallel construct is taken advantage of to develop a parallel-pipelined hybrid implementation. Both sequential and parallel-pipelined implementations are tested under Altera Quartus to implement and analyze hardware designs in conjunction with DK Design Suite’s Handel-C compiler. The developed designs are mapped to Altera’s Stratix II that is one of the industry’s highest bandwidth and density FPGAs. The results confirm that using Handel-C can provide faster implementations. The obtained results are promising and show better performance when compared with similar implementations–-specifically the developed parallel-pipelined processor.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. F. Nasir, Ahmad Ali, Wasib Javed, Asim Altaf Shah, Junaid Imtiaz
{"title":"Effect on Detection and False Alarm Probabilities For Various Amplitude Modulation Techniques","authors":"M. F. Nasir, Ahmad Ali, Wasib Javed, Asim Altaf Shah, Junaid Imtiaz","doi":"10.1109/INNOVATIONS.2018.8605999","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2018.8605999","url":null,"abstract":"Wireless communication has seen rapid development in the past decade, resulting in a growing demand for radio spectrum. Scarcity and under-utilization of radio spectrum became a major obstacle which needed to be dealt with, in order to achieve further advancements. Cognitive Radio overcame this obstacle and is one of the vibrant solutions. The backbone of cognitive radio is spectrum sensing, conventional energy detector technique is used due to its simplicity and effectiveness. The successful use of cognitive radio depends on the capability of a reporting scheme to sense the spectrum. Soft and Hard spectrum sensing schemes have been put to use, to explore which scheme provides more favorable results. Cognitive radio is defined by two essential metrics which are probability of detection and probability of false alarm. There are several modulation techniques by which amplitude modulated signals are generated, namely DSB, SSB and QAM. A detailed analysis is presented for various amplitude modulation techniques which are subjected to cognitive radio technology. A mathematical model has also been presented that explains how each type of modulation eg. DSB, SSB and QAM directly effect probability of detection and probability of false alarm, while using both hard and soft spectrum sensing schemes. The simulation results show that all techniques have considerably close results, so selecting a technique is entirely dependent on the licensed users situation.","PeriodicalId":319472,"journal":{"name":"2018 International Conference on Innovations in Information Technology (IIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126899991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}