{"title":"A simple fully homomorphic encryption scheme available in cloud computing","authors":"Jian Li, DanJie Song, Sicong Chen, Xiaofeng Lu","doi":"10.1109/CCIS.2012.6664399","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664399","url":null,"abstract":"With continuous expansion of cloud computing, problems of third-party data security become increasingly prominent. However, effective retrieval of encrypted data and other operations are difficult to achieve by traditional cryptogram systems. Thus, a practical simple fully homomorphic encryption scheme, using only elementary modular arithmetic, derived from Gentry cryptosystem is put forward to ensure the privacy-preserving in cloud storage, in which encrypted data can be operated directly without affecting the confidentiality of the encryption systems, so that it can excellently realize the need of cipertext retrieval and other processing in untrusted servers. Compared with the previous protocols Marten van Dijk et al. proposed at Advances in Cryptology-EUROCRYPT 2010 and Craig Gentry proposed in the March 2010 issue of Communications of the ACM, especially in the aspect of cipertext retrieval, the proposed scheme is much more secure and feasible. And the performance evaluation and security analysis demonstrate the practice and validity of the proposed scheme.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pedestrian detection method based on Dirichlet distribution and histogram of components","authors":"Xu Li, Xiaoru Wang, Jia Long, Lingpu Gong","doi":"10.1109/CCIS.2012.6664318","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664318","url":null,"abstract":"Pedestrian detection is a hot topic in computer vision recently. It is a challenging issue to detect the pedestrian in images accurately and quickly. In this paper, we propose a quick and accurate pedestrian detection method based on Dirichlet distribution and histogram of components. This method can find out the pedestrian in images accurately. Because of the introduction of Dirichlet distribution and histogram of components, our method reduces the time cost on detecting pedestrian. The experiment also showed that it can detect the pedestrian sheltered from other object or in the complicated background.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research of a resource-aware cloud computing architecture based on web security","authors":"Xiaoni Wang, Xuedong Gao","doi":"10.1109/CCIS.2012.6664444","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664444","url":null,"abstract":"Web hosting has a lot of problems, such as low security, waste of bandwidth resource or sudden lack of resource. A self-adaptive cloud computing architecture - RA-Cloud architecture (Resource-aware Cloud Computing Architecture) based on web security in resource-aware situation is proposed. This architecture uses cloud computing technology and self-adaptive linear regression model to estimate the dynamic migration threshold and to search the most suitable neighbor node for data migration. This platform and algorithm distributes the huge amount of computing resource to many server “end” according to the resource constrained self-adaptive policy. The new method increases the user access speed, enhances the anti-attack ability, blocks the attacks effectively and improves the web site security.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui
{"title":"A security assessment method for Android applications based on permission model","authors":"Danyang Jiang, Xiangling Fu, Maoqiang Song, Yidong Cui","doi":"10.1109/CCIS.2012.6664265","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664265","url":null,"abstract":"Permission-based security model of Android restricts applications to access specific resources, but malicious applications can invade more easily in such user-centric pattern. Through the analysis of the Android Permission-based security model and the permission features of Android applications, we establish the permission model to quantify the functional characteristics of the application, and then provide an assessment method in which we use the network visualization techniques and clustering algorithm to determine whether the testing application is potentially malicious application or not so as to help users choose applications before installation. We test the assessment method on 873 applications available online and do the statistic and analysis of the results to find that this method can do efforts in finding potentially malicious applications.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que
{"title":"VNMC for network virtualization in OpenFlow network","authors":"Yang Chen, Xiangyang Gong, Wendong Wang, Xirong Que","doi":"10.1109/CCIS.2012.6664285","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664285","url":null,"abstract":"Network virtualization provides an efficient way to share physical network infrastructure so that multiple virtual slices can run concurrently. OpenFlow is a promising and successful future networking technology which enables network innovation efficiently. However, the existing network virtualization methods in OpenFlow network usually have limitations such as introducing a proxy, flow entry conflicts, lacking of extensibility. In this paper, we present VNMC, a Virtual Network Management Component for rapidly creating, configuring and managing virtual networks in OpenFlow network. It has the following features: VNMC is implemented in a single controller without a middle layer. VNMC provides bandwidth guarantee, topology isolation, flow isolation and control isolation. It resolves flow entry conflicts from different controllers using the multiple flow tables mechanism defined in the latest OpenFlow standard. It manages the virtual networks in a modular way, which brings great extensibility to add new functionalities to virtual networks.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining and analyzing the characteristic of projects collaborative relationship in open source software","authors":"Bai Wang, Meng Shi","doi":"10.1109/CCIS.2012.6664590","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664590","url":null,"abstract":"This paper focus on the relationship between projects that have same participants. A definition of projects collaborative relationship has been presented, and a projects collaborative network model is constructed. By mining and analyzing more than 10000 projects from sourceforge.net, we find that the projects collaborative relationship of software has a great impact on software trustworthiness. The number of project's collaborative project and the proportion of project's participants, who also join in other projects, are mostly important factors of projects collaborative network.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130507824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure network coding based on homomorpuic signature against pollution attacks","authors":"Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li","doi":"10.1109/CCIS.2012.6664551","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664551","url":null,"abstract":"The network coding systems are vulnerable to pollution attacks, in which the adversary forwarders can inject polluted or forged messages into networks. In this paper, we propose a homomorphic signature scheme to provide security protection against pollution attacks, which mainly uses the homomorphic property of signature based on Paillier cryptosystem. On one hand, it guarantees the forwarders to verify the received messages effectively. If the verification is failed, the message is assumed to be polluted and should be discarded. On the other hand, the proposed scheme can generate the valid signatures for its output messages from the signatures of input ones without knowing the source's private key such that extra secure channels are not needed. We also make the security analysis and prove that our signature scheme is secure enough to defend against pollution attacks.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic evaluation on the performance of network coordinate systems","authors":"Yifei Zhang, Hongli Zhang","doi":"10.1109/CCIS.2012.6664253","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664253","url":null,"abstract":"Network coordinate systems can improve the performance of large distributed applications on the Internet. However, the current methods for performance evaluation on network coordinate systems are based on static and individual indicators, which cannot fully show their performance. In this paper, we firstly study some evaluation indicators on network distance prediction, and point out their disadvantages. Then, a synthetic evaluation indicator is proposed to evaluate the performance of network coordinate systems. At last we give an example to show how the synthetic evaluation indicator works.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-learning algorithm for predicting bus arrival time based on historical data model","authors":"Jian Pan, X. Dai, Xiaoqi Xu, Yanjun Li","doi":"10.1109/CCIS.2012.6664555","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664555","url":null,"abstract":"The provision of timely and accurate bus arrive time information is very important. It helps to attract additional ridership and increase the satisfaction of transit users. In this paper, a self-learning prediction algorithm is proposed based on historical data model. Locations and speeds of the bus are periodically obtained from GPS senor installed on the bus and stored in database. Historical travel time in all road sections is collected. These historical data are trained using BP neural network to predict the average speed and arrival time of the road sections. Experimental results indicate that the proposed algorithm achieves outstanding prediction accuracy compared with general solutions based on historical travel time.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A clustering routing algorithm in wireless sensor netwroks","authors":"Han Li, Qiuxin Wu","doi":"10.1109/CCIS.2012.6664543","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664543","url":null,"abstract":"Wireless sensor networks (WSNs) pose new research challenges related to the design of algorithms, network protocols, and software that will enable the development of applications based on sensor devices. In this paper, we propose a clustering routing algorithm to reduce the energy consumption and prolong network lifetime. In order to avoid nodes with low residual energy becoming cluster heads, CRA selects residual energy as an energy-control factor to balance the energy consumption. Through the introduction of CH-weight, non-CH nodes select appropriate CH and join the corresponding cluster. After cluster formation, a CH routing tree over all of the cluster heads is constructed. Through the multi-hop transmission way, it reduces the number of CHs to connect directly with BS in communication. Simulation results show CRA is more efficient to reduce and balance energy consumption and hence prolong the lifetime of WSN.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132897861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}