D. E. Boubiche, F. Hidoussi, Lyamine Guezouli, A. Bounceur, Homero Toral Cruz
{"title":"Proceedings of the International Conference on Internet of things and Cloud Computing","authors":"D. E. Boubiche, F. Hidoussi, Lyamine Guezouli, A. Bounceur, Homero Toral Cruz","doi":"10.1145/2896387","DOIUrl":"https://doi.org/10.1145/2896387","url":null,"abstract":"The volume contains the proceedings of the international conference on Internet of things and Cloud Computing (ICC'2016). The international conference on Internet of things and Cloud Computing (ICC'2016) represents an ideal opportunity for the students and the researchers from both industrial and academic domains having as main objective to present their latest ideas and research results in any one of the ICC'2016 topics.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129119705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Habibur Rahman, S. Sharmin, Sheikh Muhammad Sarwar, M. Shoyaib
{"title":"Software Defect Prediction Using Feature Space Transformation","authors":"Md. Habibur Rahman, S. Sharmin, Sheikh Muhammad Sarwar, M. Shoyaib","doi":"10.1145/2896387.2900324","DOIUrl":"https://doi.org/10.1145/2896387.2900324","url":null,"abstract":"In software quality estimation research, software defect prediction is a key topic. A defect prediction model is generally constructed using a variety of software attributes and each attribute may have positive, negative or neutral effect on a specific model. Selection of an optimal set of attributes for model development remains a vital yet unexplored issue. In this paper, we have introduced a new feature space transformation process with a normalization technique to improve the defect prediction accuracy. We proposed a feature space transformation technique and classify the instances using Support Vector Machine (SVM) with its histogram intersection kernel. The proposed method is evaluated using the data sets from NASA metric data repository and its application demonstrates acceptable accuracy.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balanced Cooperative Linear Data Exchange with Physical Layer Network Coding","authors":"Nyan Lin, B. Kurkoski, Yuto Lim, Yasuo Tan","doi":"10.1145/2896387.2896413","DOIUrl":"https://doi.org/10.1145/2896387.2896413","url":null,"abstract":"In this paper, we consider a group of nearby wireless end devices such as mobile phones cooperating to exchange their received packets from a common base station in order to fulfill the lost packets in other members. This problem can be solved by the linear coding in which each client transmits linear combinations of the received packets to minimize total number of transmissions. As the end devices have the limited energy resources, fairness should be a desirable property for each of them to support each other until all members in the group satisfy their needs. We introduce a cooperative algorithm that will maintain the fairness among nodes by distributing the number of transmissions they make. In this algorithm, each client changes the role of transmitter and receiver based on the information they keep in each round of data transmission. Moreover, we also incorporate physical layer network coding into this problem domain in order to further reduce the required transmission time slots and accomplish the data exchange process as quickly as possible.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hajoon Ko, Jatinder Singh, Thomas Pasquier, Changyu Dong, D. Eyers, J. Bacon
{"title":"Information Flow Control with Minimal Tag Disclosure","authors":"Hajoon Ko, Jatinder Singh, Thomas Pasquier, Changyu Dong, D. Eyers, J. Bacon","doi":"10.1145/2896387.2896402","DOIUrl":"https://doi.org/10.1145/2896387.2896402","url":null,"abstract":"Information Flow Control (IFC) extends conventional access control beyond application boundaries, and allows control of data flows after a point of authorised data disclosure. In a deployment of IFC within a cloud operating system (OS), the IFC implementation can be trusted by applications running over the same OS instance. In an IFC deployment within a widely distributed system, such as in the Internet of Things, the potential for trustworthy enforcement of IFC must be ascertained during connection establishment. IFC is based on tagging data in line with data management requirements. When audit is included as part of IFC, it can be shown that a system complies with these requirements. In this paper, we consider the possibility that some tags may be sensitive and discuss the use of Private Set Intersection (PSI) to prevent unnecessary disclosure of IFC tags during the establishment of communication channels. The proposed approach guarantees that on authorised flows, only the tags necessary for that interaction are disclosed and that no tags are disclosed for prevented flows. This functionality is particularly important in contexts such as healthcare, where privacy and confidentiality are paramount.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Implementing Trust in Cloud Computing","authors":"Ankita Sharma, H. Banati","doi":"10.1145/2896387.2896391","DOIUrl":"https://doi.org/10.1145/2896387.2896391","url":null,"abstract":"Cloud has gained a wide acceptance across the globe. Despite wide acceptance and adoption of cloud computing, certain apprehensions and diffidence, related to safety and security of data still exists. The service provider needs to convince and demonstrate to the client, the confidentiality of data on the cloud. This can be broadly translated to issues related to the process of identifying, developing, maintaining and optimizing trust with clients regarding the services provided. Continuous demonstration, maintenance and optimization of trust of the agreed upon services affects the relationship with a client. The paper proposes a framework of integration of trust at the IAAS level in the cloud. It proposes a novel method of generation of trust index factor, considering the performance and the agility of the feedback received using fuzzy logic.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presence Analytics: Discovering Meaningful Patterns about Human Presence Using WLAN Digital Imprints","authors":"M. H. S. Eldaw, M. Levene, George Roussos","doi":"10.1145/2896387.2896438","DOIUrl":"https://doi.org/10.1145/2896387.2896438","url":null,"abstract":"In this paper we illustrates how aggregated WLAN activity traces provide anonymous information that reveals invaluable insight into human presence within a university campus. We show how technologies supporting pervasive services, such as WLAN, which have the potential to generate vast amounts of detailed information, provide an invaluable opportunity to understand the presence and movement of people within such an environment. We demonstrate how these aggregated mobile network traces offer the opportunity for human presence analytics in several dimensions: social, spatial, temporal and semantic dimensions. These analytics have real potential to support human mobility studies such as the optimisation of space use strategies. The analytics presented in this paper are based on recent WLAN traces collected at Birkbeck College of University of London, one of the participants in the Eduroam network.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach to Data Dynamic Integrity Control","authors":"Talal Albalawi, A. Melton, Michael Rothstein","doi":"10.1145/2896387.2896394","DOIUrl":"https://doi.org/10.1145/2896387.2896394","url":null,"abstract":"Proper access control is one of the most important issues in computer security. It consists of securing a system with respect to availability, confidentiality, and integrity. Integrity is about making sure that only proper modifications take place. Some integrity models are static in nature, which may limit their capabilities for better protection of a system. In some cases like in the collaborative authoring systems (e.g. Wikipedia), such static models are not desired because there is a need for continuous evaluations of posted work. This motivated us to present a dynamic integrity model based on a metric we call the modification factor to evaluate whether the integrity level should be changed up or down. Furthermore, our dynamic model allows us to establish a level of trustworthiness that an entity has as a source or destination of information.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134177642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Abdlhamed, K. Kifayat, Q. Shi, William Hurst
{"title":"A System for Intrusion Prediction in Cloud Computing","authors":"Mohamed Abdlhamed, K. Kifayat, Q. Shi, William Hurst","doi":"10.1145/2896387.2896420","DOIUrl":"https://doi.org/10.1145/2896387.2896420","url":null,"abstract":"Modern critical infrastructures have to process significantly large data sets. Intrusion-detection systems and unified threat management systems have the role of keeping critical infrastructures secure against cyber-attacks. However, in the world of big data, these systems are struggling to cope with overload and often become the bottle neck in the data network. To overcome this, our research investigates the use of deploying intrusion-detection and intrusion-prediction techniques in a cloud environment. Consequently, in this paper, a survey of existing intrusion-detection systems is presented and a discussion on how their deployment can enhance current security techniques in a cloud computing environment is put forward. A novel technique for intrusion prediction system is also put forward in this paper. Predictive statistical methods are used for proving the concepts put forward. The initial results show the necessity for using evolving statistical methods in prediction solutions; and the insufficiency of 'single-technique models' for building general solutions to predict intrusions. Furthermore, as this research shows, the concept of integrating multiple methods, such as game theory concepts and risk assessment methods, facilitates the development of a more efficient prediction model.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined Operations of Mobility and NAT Management on the Horizontal Model of Software-Defined Networking","authors":"Marnel S. Peradilla, Younchan Jung","doi":"10.1145/2896387.2896416","DOIUrl":"https://doi.org/10.1145/2896387.2896416","url":null,"abstract":"MIPv4 and MIPv6 protocols, which are based on the vertical mobility management model, are network layer functions providing pre-call and mid-call mobility management for mobile nodes. The presence of non-standardized Network Address Translation (NAT) devices and widespread use of private addresses cause NAT traversal issues when a mobile node, which operates with a vertical model of network functions, changes its private IP address during a session. The Software-Defined Networking (SDN) raises the horizontal model, where the network functions are integrated and controlled over control plane. In this dissertation, we propose an Overlay Network Controller-centric (ONC) horizontal model mobility management, which operates for mobile nodes behind NAT devices. The proposed ONC-centric horizontal model mobility management is an early adaptation of the horizontal model of network functions on the control layer, which has the combined functions of NAT management and mobility management. Also, the proposed ONC-centric horizontal model mobility management guarantees an easier way to handle the NAT management and mobility management together. Finally, this paper compares the proposed ONC-centric horizontal mobility management with the existing mobility management solutions with respect to advantages and layer 3 handover latency.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122363909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boubenia Mohamed, B. Abdelkader, Bouyakoub Fayçal M'hamed
{"title":"A multi-level approach for mobile recommendation of services","authors":"Boubenia Mohamed, B. Abdelkader, Bouyakoub Fayçal M'hamed","doi":"10.1145/2896387.2896425","DOIUrl":"https://doi.org/10.1145/2896387.2896425","url":null,"abstract":"This paper presents a new context-aware approach for the recommendation of services. We estimate that the recommendation of services can be viewed as a recommendation of structured items: the provider of service and the products or items proposed by the provider. We propose a multi-level approach for the recommendation of services. We introduce the adaptation of a similarity measure to support the user context during the calculation of similarity between the user profile and providers' profiles.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}