{"title":"Confidentiality and privacy information security risk assessment for Android-based mobile devices","authors":"Irwan, Y. Asnar, B. Hendradjaya","doi":"10.1109/ICODSE.2015.7436972","DOIUrl":"https://doi.org/10.1109/ICODSE.2015.7436972","url":null,"abstract":"Increasing use of smartphones for work and private purposes have mingled both the valuable personal data to work data unintentionally. Android permission-based security model are used to restrict the ability of applications to access device resources, but it failed to provide an adequate control for users and a visibility of how third party applications using personal data of users. The permission warnings when installing applications do not help most users in taking right security decisions. This research aims at developing a risk assessment method to determine security posture, at Android smartphone The method can help users to increase the security level of a device, especially against sensitive data leakage. The design of risk assessment uses two approaches, security configuration level assessment and sensitive data risk assessment. Security configuration level assessment is based on built-in Android smartphone configurations, while sensitive data risk assessment is based on combination of permissions from all applications installed on the device. Design of risk assessment implemented on Android smartphone called Smartphone Risk Assessment (SRA). The evaluation has been done by a usability testing using the System Usability Scale (SUS) questionnaire. The result shows that the SRA is rated as \"Good\" by respondents based on SUS score. The SRA is considered to be helpful by users to determine potential threats of their smartphones and any applications that has potential to leak sensitive data.","PeriodicalId":374006,"journal":{"name":"2015 International Conference on Data and Software Engineering (ICoDSE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Replicated Block Device (DRDB) implementation on cluster storage data migration","authors":"M. Riasetiawan, A. Ashari, Irwan Endrayanto","doi":"10.1109/ICODSE.2015.7436978","DOIUrl":"https://doi.org/10.1109/ICODSE.2015.7436978","url":null,"abstract":"Data Center systems are required to have high availability in order to meet the continuing needs of the user. If the server or application in which a failure or require maintenance, the virtual machine will be migrated to another server in the cluster are still available. The role of shared storage is very important here to keep a virtual machine that can continue the work and do not lose data on the destination server. This study seeks to implement virtualization at the server cluster system uses a virtual machine on Proxmox VE and Distributed Replicated Block Device (DRBD) as shared storage. Implementation is done by using two nodes, and made a comparison with two other nodes in the cluster system that does not use shared storage. Shared storage works by synchronizing and replication of virtual machine data that can then migrate online. The use of shared storage will affect virtual machine performance, especially on the speed of the disk during the process of sending and receiving data, and the availability of services. Measurement of downtime during the migration to test the success of the system. Testing the TCP connection is made to ensure the network throughput and connection test results compared to test disk performance.","PeriodicalId":374006,"journal":{"name":"2015 International Conference on Data and Software Engineering (ICoDSE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116670529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of K-means algorithm for VM allocation in cloud computing","authors":"Bramantyo Adrian, Lukman Heryawan","doi":"10.1109/ICODSE.2015.7436970","DOIUrl":"https://doi.org/10.1109/ICODSE.2015.7436970","url":null,"abstract":"Cloud computing is known as dynamic service providers using physical resource or virtualized on the internet. Virtual machine technology is used by cloud computing client who do not require dedicated server. Important challenge in cloud computing is resource management to improve utilization. Virtual machine allocation method is one of the way to improve resource utilization in cloud computing. This research used a framework cloud simulator CloudSim version 3.0 and K-means clustering algorithm is used for virtual machine allocation method. Virtual machine allocation method using K-means clustering algorithm compared with existing FIFO algorithm on CloudSim. The test consists of two scenarios, first scenario each datacenter only has a host and the second scenario each datacenter has two hosts. In both scenarios have same amount of work. The analysis result obtained from both scenario is virtual machine allocation method using K-means is better than FIFO in virtual machine CPU utilization by reducing idle time and performing load balancing virtual machine in each datacenter.","PeriodicalId":374006,"journal":{"name":"2015 International Conference on Data and Software Engineering (ICoDSE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133209465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization weather parameters influencing rainfall prediction using Adaptive Network-Based Fuzzy Inference Systems (ANFIS) and linier regression","authors":"D. Munandar","doi":"10.1109/icodse.2015.7436990","DOIUrl":"https://doi.org/10.1109/icodse.2015.7436990","url":null,"abstract":"This paper conducted a study to investigate the ability of Adaptive Network-Based Fuzzy Inference System (ANFIS) in doing modeling to determine the weather parameters that influence the output parameters of rainfall (RF) and have good predictive ability. Plotting the data of the prediction is also made to the Linear Regression (LR). The data is tested daily at the weather station in Badau area, Belitung province, Indonesia. A total consisting of 433 pairs of data for 1 year containing seven weather parameters as input and one parameter as output. As for the performance evaluation criteria used indicator of the ability of ANFIS statistic model: Pearson correlation coefficient (r), coefficient of determination (R2) and root mean squared error (RMSE), from several input parameters in the analysis, 1-input RHmax most optimal influencing rainfall (RF) output, (RMSE = 1.8896 mm / day at the training phase and RMSE = 3.2370 mm / day at the checking phase). Plot the data ANFIS against Linear Regression, 1-input parameter RHmax has optimal value of the influence of rainfall (RF) output with optimal statistical indicator (R2 = 0.7065, r = 0.8405, RMSE = 0.8732 mm / day).","PeriodicalId":374006,"journal":{"name":"2015 International Conference on Data and Software Engineering (ICoDSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126060133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}