{"title":"Interoperability in the Heterogeneous Cloud Environment: A Survey of Recent User-centric Approaches","authors":"I. Mansour, R. Sahandi, K. Cooper, A. Warman","doi":"10.1145/2896387.2896447","DOIUrl":"https://doi.org/10.1145/2896387.2896447","url":null,"abstract":"Cloud computing provides users the ability to access shared, online computing resources. However, providers often offer their own proprietary applications, interfaces, APIs and infrastructures, resulting in a heterogeneous cloud environment. This heterogeneous environment makes it difficult for users to change cloud service providers; exploring capabilities to support the automated migration from one provider to another is an active, open research area. Many standards bodies (IEEE, NIST, DMTF and SNIA), industry (middleware) and academia have been pursuing approaches to reduce the impact of vendor lock-in by investigating the cloud migration problem at the level of the VM. However, the migration downtime, decoupling VM from underlying systems and security of live channels remain open issues. This paper focuses on analysing recently proposed live, cloud migration approaches for VMs at the infrastructure level in the cloud architecture. The analysis reveals issues with flexibility, performance, and security of the approaches, including additional loads to the CPU and disk I/O drivers of the physical machine where the VM initially resides. The next steps of this research are to develop and evaluate a new approach LibZam (Libya Zamzem) that will work towards addressing the identified limitations.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication as a Service for Cloud Computing","authors":"Alshaimaa Abo-Alian, N. Badr, M. Tolba","doi":"10.1145/2896387.2896395","DOIUrl":"https://doi.org/10.1145/2896387.2896395","url":null,"abstract":"Traditional authentication techniques such as static passwords are vulnerable to replay and guessing attacks. Recently, many studies have been conducted on keystroke dynamics as a promising behavioral biometrics for strengthening user authentication, however, current keystroke based solutions suffer from a numerous number of features with an insufficient number of samples which lead to a high verification error rate and high verification time. In this paper, a keystroke dynamics based authentication system is proposed for cloud environments that supports fixed and free text samples. The proposed system utilizes the ReliefF dimensionality reduction method, as a preprocessing step, to minimize the feature space dimensionality. The proposed system applies clustering to users' profile templates to reduce the verification time. The proposed system is applied to two different benchmark datasets. Experimental results prove the effectiveness and efficiency of the proposed system.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy-preserving Proximity Detection Method in social network","authors":"Qiuling Chen, Ayong Ye, Li Xu","doi":"10.1145/2896387.2900320","DOIUrl":"https://doi.org/10.1145/2896387.2900320","url":null,"abstract":"Proximity detection is a fundamental service in social network. Most of traditional proximity detection methods need users' locations for location server to find their neighbors by calculating relative distance among them. However, this mechanism has caused similarly serious concerns on the potential privacy leakage if server is untrusted. To solve this problem, we propose a proximity detection method which is based on wireless APs (Access Point). Each request user only needs to submit a nearby AP list to social network server, which called SNS in this paper. After that, the SNS finds neighbors of request users by judging whether their nearby AP lists have a common item. In addition, since most existing APs may be uneven distribution and have risks of the location leakage, we also present a distributed Beacon Node Rotating Mechanism---each user acts as a beacon node, which is similar to AP to be a reference of neighbor discovery in proximity detection. Our method works well without requiring user's location information, which enhances the security of location privacy. Finally, we experimentally demonstrate the effectiveness and feasibility of the method.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mariotti, O. Gervasi, Flavio Vella, A. Costantini, A. Cuzzocrea
{"title":"A DBMS-Based System for Integrating Grids and Clouds: Anatomy, Models, Functionalities","authors":"M. Mariotti, O. Gervasi, Flavio Vella, A. Costantini, A. Cuzzocrea","doi":"10.1145/2896387.2900327","DOIUrl":"https://doi.org/10.1145/2896387.2900327","url":null,"abstract":"This paper provides anatomy, models and functionalities of a DBMS-based systems for integrating Grids and Clouds. Our study starts from recognizing the similarity of some axioms of Grid and Cloud computing, still being these computational paradigms very different for what regards both computing and economic models. Our proposed system is centered along a well-designed DBMS schema that allows to obtain a seamless integration between Grids and IaaS Cloud providers. The paper details how images from a Cloud environment are deployed in reply to a specific task execution invoked from the (integrated) Grid environment, as well as other essential components of the proposed architecture (e.g., resource access and grant, user authorization, resource discovery and sharing, job and task management and distribution, integration with other computational platforms, and so forth).","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130045597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing in wireless Ad Hoc networks using the Skyline operator and an outranking method","authors":"Manar Abourezq, A. Idrissi, Fadoua Yakine","doi":"10.1145/2896387.2900333","DOIUrl":"https://doi.org/10.1145/2896387.2900333","url":null,"abstract":"The issue of routing in wireless networks has been widely addressed, but mostly using conventional routing protocols. We proposed, in a previous work, a new approach to routing using the Skyline operator, which allows us to find the routes that optimize Quality of Service (QoS) attributes related to routing, namely the number of hops, bandwidth, delay, and cost. Our approach showed some promising first results. In this paper, we introduce to use of an outranking method, the ELECTRE IS method, on top of the Skyline operator, to allow finding routes that optimize each QoS attribute in respect to its importance in the routing decision.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116884827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing Services in an Intelligent Environment: Smart Home Simulator based WoT","authors":"Wassila Guebli, Abdelkader Belkhir","doi":"10.1145/2896387.2896446","DOIUrl":"https://doi.org/10.1145/2896387.2896446","url":null,"abstract":"Smart house aims to offer the inhabitant the comfort and the security that they need and take in consideration the preferences and the needs of each member of the family. To do this, each household equipment is considered as a thing and it is connected to the internet. Using the concept of the Web of things, the user can control the home remotely, and activate many services. He can apply scenario, for example: \"sunny-day\" which consist to open all the curtains in the house or he can authorize a person to use or not a services like children. This is why we propose a smart house simulator based WoT, where the user can control his home remotely via the Web using his smart phone.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook S. Al-Rakhami, Majed Alrubaian, Atif Alamri
{"title":"A Framework for Optimum Selection of Online Social Network Management Systems","authors":"Mohammed Al-Hougbany, Muhammad Al-Qurishi, Mabrook S. Al-Rakhami, Majed Alrubaian, Atif Alamri","doi":"10.1145/2896387.2896409","DOIUrl":"https://doi.org/10.1145/2896387.2896409","url":null,"abstract":"Many Social Media Management Systems (SMMS) have been developed to utilize multiple accounts over different online social networks. Each system has advantages and disadvantages and can be more or less useful depending on its features and cost. However, the divers and lack of consensus in SMMS functionalities, lead to a problem for the decision makers to determine what platforms and tools they should be using. In this paper, we propose a new framework to select the most appropriate platform to manage multiple social network accounts. The proposed framework has two phases, namely, evaluation and ranking. The current practice of evaluation process involves expert users opinions on the systems to rate its importance based on the users' preferences which is measured on the efficiency of the tool for finding required results. The evaluation phase of the proposed technique combines the current practice with the weight of importance, where the later one has been calculated by applying statistical methods. The ranking phase has designed based on the well-known Analytic Hierarchy Process AHP algorithm. The results have been showed as a ranking list of the candidate SMMS.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anas M. Mzahm, M. S. Ahmad, Alicia Y. C. Tang, Azhana Ahmad
{"title":"Towards a Design Model for Things in Agents of Things","authors":"Anas M. Mzahm, M. S. Ahmad, Alicia Y. C. Tang, Azhana Ahmad","doi":"10.1145/2896387.2896426","DOIUrl":"https://doi.org/10.1145/2896387.2896426","url":null,"abstract":"The Internet of Things (IoT) is poised to augment the Internet by enabling machine to machine (M2M) communication. However, the machines, or 'things' lack of self-reasoning capability limits their potential applications in other value-added services. Consequently, we introduce the concept of Agents of Things (AoT) as an extension to the IoT, in which the things are embedded with self-reasoning intelligent software agents to provide value-added services to humans. Two crucial issues in designing intelligent things are to determine what value-added services they should offer and the subsequent level of reasoning abilities for the things. Therefore, we need to find an optimal match between the hardware capabilities of the things and their software agents' reasoning abilities to deliver value-added services on top of performing their basic IoT functions. In this paper, we present the results of the software analyses represented by a software spectrum and the hardware analyses represented by a hardware spectrum. We then associate the two spectrums to form a structured hardware-software optimizer for the thing's design model.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of the Current Level of Support to Aid Decisions for Migrating to Cloud Computing","authors":"A. Alkhalil, R. Sahandi, David John","doi":"10.1145/2896387.2896443","DOIUrl":"https://doi.org/10.1145/2896387.2896443","url":null,"abstract":"Cloud computing provides an innovative delivery model that enables enterprises to reduce operational costs and improve flexibility and scalability. Organisations wishing to migrate their legacy systems to the cloud often need to go through a difficult and complicated decision-making process. This can be due to multiple factors including restructuring IT resources, the still evolving nature of the cloud environment, and the continuous expansion of the services offered. These have increased the requirement for tools and techniques to help the decision-making process for migration. Although significant contributions have been made in this area, there are still many aspects which require further support. This paper evaluates the existing level of support to aid the decision-making process. It examines the complexity of decisions, evaluates the current state of Decision Support Systems in respect of migrating to the cloud, and analyses three models that proposed support for the migration processes. This paper identifies the need for a coherent approach for supporting the whole decision-making process. Further, it explores possible new approaches for addressing the complex issues involved in decision-making for migrating to the cloud.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA","authors":"A. Bhattacharjya, Xiaofeng Zhong, Jing Wang","doi":"10.1145/2896387.2896431","DOIUrl":"https://doi.org/10.1145/2896387.2896431","url":null,"abstract":"Rivest- Shamir-Adleman (RSA) algorithm is the widespread encryption scheme that promises confidentiality and authenticity over an insecure communication channel. The RSA has drawbacks of various attacks like Brute force key search, Mathematical attacks, Timing attacks and Chosen Ciphertext attacks etc. So here a Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA for an active networked environment is proposed. The main peer to peer personal messaging architecture will be strong, efficient and reliable, and communication protocol will allow only one authenticated person to converse with the person who is in the server end, multiple chat clients can be connected to the server but has to wait for authenticated connection with secure server one by one. Also multiple servers with multiple clients can run for distributed strong, efficient and reliable messaging. As at the key exchange level, the Miller-Rabin test is done with pseudo random numbers generated and changing the keys synchronously with predefined time frames, these mechanisms make the keys absolutely strong and main RSA integration with shared RSA gives more statistical complexity here. In the decryption process, The Chinese Remainder Theorem (CRT) is used with shadows along with the strong prime of RSA criterion extended into domain of Gaussian Integer for very high efficiency. The Shared RSA adds more complexity in decryption. Public Key Cryptography Standards (PKCS) version 5 is used to tackle the Chosen cipher text attack when messaging is going on. The Efficient RSA with Rabin-Miller strong Primality test integration and pohligHellmanEncipher with salt and padding integration makes it strong and reliable.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}