{"title":"A Secure Authentication Scheme of Health Care Based on the Cloud","authors":"Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu","doi":"10.1109/IMIS.2014.72","DOIUrl":"https://doi.org/10.1109/IMIS.2014.72","url":null,"abstract":"In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio
{"title":"Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing","authors":"Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio","doi":"10.1109/IMIS.2014.54","DOIUrl":"https://doi.org/10.1109/IMIS.2014.54","url":null,"abstract":"Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET","authors":"Ing-Chau Chang, Jacky Lo","doi":"10.1109/IMIS.2014.65","DOIUrl":"https://doi.org/10.1109/IMIS.2014.65","url":null,"abstract":"As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud","authors":"J. Becedas","doi":"10.1109/IMIS.2014.2","DOIUrl":"https://doi.org/10.1109/IMIS.2014.2","url":null,"abstract":"Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda
{"title":"Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)","authors":"T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda","doi":"10.1109/IMIS.2014.86","DOIUrl":"https://doi.org/10.1109/IMIS.2014.86","url":null,"abstract":"As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective","authors":"Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.45","DOIUrl":"https://doi.org/10.1109/IMIS.2014.45","url":null,"abstract":"Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han
{"title":"Efficient Identification of Windows Executable Programs to Prevent Software Piracy","authors":"Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han","doi":"10.1109/IMIS.2014.29","DOIUrl":"https://doi.org/10.1109/IMIS.2014.29","url":null,"abstract":"Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation Environment and Methodology for Automotive Media Streaming Applications","authors":"Robert Protzmann, Kay Massow, I. Radusch","doi":"10.1109/IMIS.2014.38","DOIUrl":"https://doi.org/10.1109/IMIS.2014.38","url":null,"abstract":"Media streaming in automotive environments is becoming more important with the proliferation of 3G/4G technologies and the general demand for consuming Internet content in cars. Especially the rising popularity of Music on Demand and Media Cloud Storage services pushes automotive manufactures efforts to provide decent music streaming capabilities in vehicles. Two major issues have to be tackled to achieve this goal. (1) Weak or even uncovered areas in tunnels, underpasses or urban canyons. (2) Exhausted mobile network capabilities at crowded spots. Buffering can help to overcome the first issue. However, it consequently worsens the second issue due to its additional bandwidth demand. For this reason, the implementation of reasonable music streaming solutions in the car needs novel prefetching algorithms which reduce caching to the minimum and optimize bandwidth sharing between users. In this paper, we present a comprehensive simulation environment and evaluation methodology to develop and assess such prefetching algorithms.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Sleep Scheduling Method for Data Collection from Sensor Networks Divided into Local Areas","authors":"Masato Nakamura, S. Kimura","doi":"10.1109/IMIS.2014.41","DOIUrl":"https://doi.org/10.1109/IMIS.2014.41","url":null,"abstract":"Various sleep scheduling methods have been proposed to achieve energy efficiency in wireless sensor networks. Although these methods can make most nodes sleep to save energy, they do not give adequate consideration to the amount of data originating in specific areas of the network. The authors proposed a sleep scheduling method that divided a sensor network into an adjustable number of areas to ensure that more than one node remained active in each area, but which required all nodes to be able to access the sink node. However, the conditions of simulation experiments displayed a problem in that all the active sensor nodes sent packets to the sink node at the same time. This paper reports how the problem was solved in fresh evaluations of the proposed method and shows that the proposed method also extends the network lifetime.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathan Ruiz de Garibay, Aitor Almeida, Szilard A. Kados, Adolfo Garcia Corcuera, D. López-de-Ipiña
{"title":"Codesign-Oriented Platform for Agile Internet of Things Prototype Development","authors":"Jonathan Ruiz de Garibay, Aitor Almeida, Szilard A. Kados, Adolfo Garcia Corcuera, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.52","DOIUrl":"https://doi.org/10.1109/IMIS.2014.52","url":null,"abstract":"The Internet of Things offers a growing market open to new products. To be able to take advantages of this opportunity companies need to be able to quickly create prototypes of their products. Given the difficulties that the development of embedded devices presents, both on the hardware and software parts, it is a necessity to create tools that ease this process. In this paper we present a codesign-oriented platform that will help developers to create their prototypes in an agile manner. The presented platform simplifies the usage and integration of standardized peripherals and reduces the complexity of the development process. We also present a prototype created using the platform, showcasing its capabilities.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}