{"title":"Warehousing and Protecting Big Data: State-Of-The-Art-Analysis, Methodologies, Future Challenges","authors":"A. Cuzzocrea","doi":"10.1145/2896387.2900335","DOIUrl":"https://doi.org/10.1145/2896387.2900335","url":null,"abstract":"This paper proposes a comprehensive critical survey on the issues of warehousing and protecting big data, which are recognized as critical challenges of emerging big data research. Indeed, both are critical aspects to be considered in order to build truly, high-performance and highly-flexible big data management systems. We report on state-of-the-art approaches, methodologies and trends, and finally conclude by providing open problems and challenging research directions to be considered by future efforts.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards A Framework for Rate Control on Dynamic Communication Networks","authors":"S. Kumari, Anurag Singh, P. Ranjan","doi":"10.1145/2896387.2896397","DOIUrl":"https://doi.org/10.1145/2896387.2896397","url":null,"abstract":"Ours is the era of convergence in mobility, communication, computation, etc. which finally leads to a new class of machines hitherto thought impossible. These kinds of complexities raise very fundamental questions in modern science and technology from basic Mathematical theory point of view. One of the issues, which we are interested in this work is nature of a communication process on an extremely volatile time-varying network where nodes can join or leave at its own and edges appear in a predictable or unpredictable time window as per mobility, communication and policy parameters. Keeping these issues in consideration, we propose a simple framework to represent mobile networks dynamically in a Spatio-temporal fashion and move towards a new model of communication process where edges and nodes can appear unpredictably with time which is most natural setting in communication networks. We illustrate some simple representations, algebraic structure and how it affects the connectivity of the network at various time instants. An illustrative example is also presented to outline the usage of this framework. Future directions are outlined as analysis of system utility on dynamic networks under the given capacity constraint which will result in theorems stating the robustness, survivability and connectivity in the presence of volatile disruptions due to many factors affecting physical layer. These new representations will be explored in simulation and in real life experiments to ascertain their efficacy.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134424921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad N. Khalaf, Abdel-Rahman Al-Ghuwairi, Laith Al-Yasen
{"title":"A Trust Framework for Ranking User as a Cloud Provider in Peer-to-Peer cloud system","authors":"Mohammad N. Khalaf, Abdel-Rahman Al-Ghuwairi, Laith Al-Yasen","doi":"10.1145/2896387.2896415","DOIUrl":"https://doi.org/10.1145/2896387.2896415","url":null,"abstract":"Cloud computing is essential now for IT companies and for the users of IT companies. Recently researchers were focusing in peer-peer cloud computing, which also named as user as a cloud provider system. There are a few of researches discussed and implemented trust problem in peer-to-peer models. This paper presents a framework for automatically generate trust ranking for user as a cloud provider. The ranking is generated first by testing method for ranking QoS parameters, the second phase is applied trust factors to generate ranking for user as cloud provider. The generated ranking method is useful for cloud users to get benefit of their wasting resources, and other users will be trusted in renting cloud services while paying less cost.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massinissa Saoudi, A. Bounceur, R. Euler, Mohand Tahar Kechadi
{"title":"Data Mining Techniques Applied to Wireless Sensor Networks for Early Forest Fire Detection","authors":"Massinissa Saoudi, A. Bounceur, R. Euler, Mohand Tahar Kechadi","doi":"10.1145/2896387.2900323","DOIUrl":"https://doi.org/10.1145/2896387.2900323","url":null,"abstract":"Nowadays, forest fires are a serious threat to the environment and human life. The monitoring system for forest fires should be able to make a real-time monitoring of the target region and the early detection of fire threats. In this paper, we present a new approach for forest fire detection based on the integration of Data Mining techniques into sensor nodes. The idea is to use a clustered WSN where each sensor node will individually decide on detecting fire using a classifier of Data Mining techniques. When a fire is detected, the corresponding node will send an alert through its cluster-head which will pass through gateways and other cluster-heads until it will reach the sink in order to inform the firefighters. We use the CupCarbon simulator to validate and evaluate our proposed approach. Through extensive simulation experiments, we show that our approach can provide a fast reaction to forest fires while consuming energy efficiently. 1","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Putting the lab on the map: A wireless sensor network system for border security and surveillance","authors":"Mohammad Hammoudeh","doi":"10.1145/2896387.2900338","DOIUrl":"https://doi.org/10.1145/2896387.2900338","url":null,"abstract":"Traditionally, countries viewed international border control as mostly immigration- and customs-based challenge. However, with the increased risks of terrorism, illegal movement of drugs, weapons, contraband and people, these countries face unprecedented challenges in securing borders effectively. Securing international borders is a complex task that involves international collaboration, deployment of advanced technological solutions and professional skill-sets. In the current financial climate, governments strive to secure their borders, but also ensure that costs are kept low. Wireless Sensor Networks (WSNs) is a low cost technology that can provide an effective solution to the range of problems faced in securing borders effectively. The ability of a WSN to operate without human involvement and in situations where other surveillance technologies are impractical has made it favourite for deployment in hostile hazardous environments. This technology offers intelligence-led approach to strengthen vulnerable points on the international borders. This class of WSN applications imposes a linear network topology, which has nodes daisy chained using radio communication. Linear WSN topologies are characterised by sparse node deployment, long data transmission distances and alignment of nodes along a virtual line. This talk presents solutions to address the new challenges introduced by Linear WSNs, including: What is the minimum network density to achieve k-barrier coverage in a given belt region? Given an appropriate network density, how to determine if a region is indeed k-barrier covered? How to find a path connecting the two ends of the border such that every point on the path is covered by a sensor node? How to balance workload across sensor nodes? How to elongate network life time and meet quality of service requirements?","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef El Fatimi, Mohammed Fihri, Abedellah Ezzati
{"title":"Improvement of Leach Routing Algorithm Based on the Use of Game Theory","authors":"Youssef El Fatimi, Mohammed Fihri, Abedellah Ezzati","doi":"10.1145/2896387.2900332","DOIUrl":"https://doi.org/10.1145/2896387.2900332","url":null,"abstract":"Wireless Sensor Networks usage is spreading throughout many aspects of life, such as health, military, security, environment monitoring and others, providing more important services with less efforts and costs. The rational energy consumption in WSNs is one of the main fields of scientific researches that have been done on the different layers of the protocols' stack, LEACH is an energy-efficient routing protocol based on the clustering technique that expands the lifetime span of a WSN remarkably. However the randomly chosen cluster head may be located near to another one, thing that causes a useless waste of energy that is proportional to the number of cluster heads located close to each others. A proposed distributed algorithm is designed by applying game theory concepts to design a non-cooperative game and a Nash Equilibrium solution's concept to avoid this issue, by computing a value of the probability to be cluster head, that takes into account the localization of other neighbor cluster heads.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing and Procurement","authors":"Bernardo Nicoletti","doi":"10.1145/2896387.2896441","DOIUrl":"https://doi.org/10.1145/2896387.2896441","url":null,"abstract":"This paper aims to contribute to the understanding of the use of cloud computing in procurement, particularly from a benefit/cost point of view. The qualitative benefits of cloud computing are clear. It seems important to define a model to evaluate from a quantitative way the decision to adopt cloud computing in procurement. We used the TCM methodology to tackle the subject and to arrive to a theoretical approach strongly skewed also to a practical usage (Hollmann, 2012). This paper presents a model to evaluate a cloud computing solution for procurement. It has been found very useful in real life utilization. It might be interesting to analyse additional cases. The method presented in this paper has many practical utilization and can support academicians as well as managers to approach the evaluation of migrating to a cloud computing solution. This paper approaches the problem using the TCM Total cost methodology. Based on our analysis, this method was not used in the past for evaluating the use of cloud computing in procurement. The paper presents a model for the evaluation of the costs/benefits connected with cloud computing in procurement useful to compare such a solution with on.-site premises.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134359179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid feature selection approach based on heuristic and exhaustive algorithms using Rough set theory","authors":"Muhammad Summair Raza, Usman Qamar","doi":"10.1145/2896387.2896432","DOIUrl":"https://doi.org/10.1145/2896387.2896432","url":null,"abstract":"A dataset may have many irrelevant and unnecessary features, which not only increase computational space but also lead to a very critical phenomenon called curse of dimensionality. Feature selection process aims at selecting some relevant features for further processing on behalf of the entire dataset. However, to extract such information is non-trivial task, especially for large datasets. In literature many feature selection approaches have been proposed but recently rough set based heuristic approaches have become prominent ones. However, these approaches do not ensure the optimum solution. In this paper, a hybrid approach for feature selection has been proposed, based on heuristic algorithm and exhaustive search. Heuristic algorithm finds initial feature subset which is then further optimized by exhaustive search. We have used genetic algorithm and particle swarm optimization as preprocessor and relative dependency for optimization. Experiments have shown that our proposed approach is more effective and efficient as compared to the conventional relative dependency based approach.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Laouid, Mohamed-Lamine Messai, A. Bounceur, R. Euler, A. Dahmani, A. Tari
{"title":"A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks","authors":"A. Laouid, Mohamed-Lamine Messai, A. Bounceur, R. Euler, A. Dahmani, A. Tari","doi":"10.1145/2896387.2900322","DOIUrl":"https://doi.org/10.1145/2896387.2900322","url":null,"abstract":"Ensuring key management in Wireless Sensor Networks has a vital importance, especially when sensor nodes have to communicate in hostile environments. In this paper, we propose a new simple and resource-aware key management scheme. The scheme is based on the idea that the initial pre-distributed key is not pre-loaded in all nodes to improve its resilience to node compromising attacks. Each node has to store an initial key, a set of prime number groups and a pseudo-random function. This pre-distributed secret information is used to establish pairwise keys between adjacent nodes after their deployment. Moreover, the proposed scheme is dynamic since it allows a flexible key refresh.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud Platforms","authors":"P. Pise, Nilesh J. Uke","doi":"10.1145/2896387.2896423","DOIUrl":"https://doi.org/10.1145/2896387.2896423","url":null,"abstract":"Now day's use of big data platforms is increasing for storing large amount of end user's data remotely on big data servers. Cloud computing storage was widely used for storing user's data, but cloud computing only providing the tasks of data storage but not supporting the important functionalities like computation and database operations. These operations are supported by big data systems and hence currently use of big data platform for storage in increases worldwide by enterprises. Sharing sensitive information and data resulted into big reduction in costs of enterprises for users to provide value added data and personalized services. As enterprises are sharing their important and sensitive information on big data platforms from different and many domains, it becomes necessary to provide the security and privacy in big data platform. Data security and privacy is gaining significant attentions of researchers. There are many security methods already proposed for cloud computing platform, now same methods slowly adopted on big data platform. For Big Data platforms, secure sharing of sensitive data is challenging research problem. In this paper, first we are introducing the different security and privacy preserving methods of cloud computing and big data platforms with their limitations, and then presenting the novel hybrid framework for secure sensitive data sharing and privacy preserving public auditing for shared data over big data systems including functionalities such as privacy preserving, public auditing, data security, storage, data access, deletion or secure data destruction using cloud services.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125227199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}