Alexandra Mihaita Mocanu, C. Dobre, Bogdan-Costel Mocanu, Florin Pop, V. Cristea
{"title":"Analysis of Security Approaches for Vehicular Ad-Hoc Networks","authors":"Alexandra Mihaita Mocanu, C. Dobre, Bogdan-Costel Mocanu, Florin Pop, V. Cristea","doi":"10.1109/3PGCIC.2015.184","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.184","url":null,"abstract":"In the last years, the number of vehicles has increased up to a point where the road infrastructure cannot easily cope anymore, and congestion in cities becomes the norm rather then exception. Smart technologies are vastly employed to cope with advanced scheduling mechanisms -- from intelligent traffic lights designed to control traffic, up to applications running inside the car to provide updated information to the driver, or simply keep him socially connected. The time for such smart technologies is right: the power of computation along with the memory size of microprocessors have increased, while price per computation, storage and networking power decreased. What few years ago might have sounded rather futuristic, like technologies designed to facilitate communication between cars and automate the exchange of data about traffic, accidents or congestion, is now becoming reality. But the implications of these ideas have only recently become relevant; in particular, security and trust-related implications are just now arising as critical topics for such new applications. The reason is that drivers face new challenges, from their personal data being stolen or applications being fed with false information about traffic conditions, to technology being exposed to all kind of hijacking attacks. A practitioner developing a smart traffic application is faced with an important problem: what security technology or algorithm to use to better cope with these challenges. In this paper, we first present an analysis of various cryptographic algorithms in the context of vehicular scenarios. Our scope is to analyze the designs and approaches for securing networks formed between vehicles. In particular, we are interested in the security layers able to provide strong cryptographic algorithms implementation that can guarantee high levels of trust and security for vehicular applications. The analysis exploits the realistic simulator being developed at the University Politehnica of Bucharest.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130230881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Parallel Algorithm with the Search Space Partition for the Pickup and Delivery with Time Windows","authors":"J. Nalepa, Miroslaw Blocho","doi":"10.1109/3PGCIC.2015.12","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.12","url":null,"abstract":"The pickup and delivery problem with time windows (PDPTW) is an NP-hard optimization problem of serving transportation requests using a limited number of vehicles. Its main objective is to minimize the number of delivering trucks, whereas the secondary objective is to decrease the distance traveled during the service. A feasible routing schedule must satisfy the time window, capacity and precedence constraints. In this paper, we propose to partition the search space in our parallel guided ejection search algorithm (P-GES) to minimize the fleet size in the PDPTW. The introduced techniques help decrease the convergence time of the algorithm without affecting the quality of results. An extensive experimental study (comprising nearly 52,000 CPU hours on an SMP cluster) performed on the Li and Lim's benchmark set shows that the parallel algorithm is effective, and is able to retrieve very high-quality results. We report 10 new world's best solutions obtained using P-GES enhanced with the proposed search space partition approaches.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Control the Water Treatment Using the Electro-Flotation Technology That is Based on the Pervasive Computing with the Internet Connection","authors":"A. Antonyova, P. Antony","doi":"10.1109/3PGCIC.2015.10","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.10","url":null,"abstract":"Managing the manufacturing process remotely through an Internet connection allows, inter alia, to avoid, for example, many negative phenomena affecting the environment, which become sometimes necessary in the ambient surrounding of the production facility. In a company, where decoration the boxes leads to a massive water pollution with the disperse colorants, there was installed the waste water purifier to recycle sewage water using the technology of electro-flotation. Originally the control system enables to control devices only using the infrared remote controller. But due to the noisy operations during the box production, the waste water purifier was placed closer to the waste channels of sewers, farther away from the office for the sewage control center of the company and also there has been implemented TCP/IP control system using an Internet connection. This enables remote monitoring and displaying the current status directly on the monitor screen. If necessary, thus it is possible to implement the remote service access also to the main operating functions of the device.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-inspired Algorithms in Data Management Processes","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/3PGCIC.2015.137","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.137","url":null,"abstract":"In this paper will be describe the bio-inspired and personal interpretation algorithms. These algorithms are based on biometrics and individual characteristics features. These algorithms will be dedicated for data analysis processes and data management support. Also cognitive aspects of data analysis processes will be shown in this paper. The data analysis aspects will be described by individual/personal algorithms and cognitive aspects.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133349826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinyelu Philomena Udeagwu, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati
{"title":"Analysis of Techniques for Visualizing Security Risks and Threats","authors":"Chinyelu Philomena Udeagwu, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati","doi":"10.1109/3PGCIC.2015.59","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.59","url":null,"abstract":"The aim of this work is to explore the potential of visualization in order to visualize and manage risks and threats by performing security data analysis. We perform a an analysis of data visualization for identifying and understanding security threat and identify data set(s) to be used with a visualization library in order to visualize activities or threats, analyze data and gain deeper understanding and uncover hidden patterns. The basic structure of the data visualization will be fabricated and visual attributes assigned to the resulting elements. The study utilizes the D3 JavaScript library to visualize detected compromises, threats and attacks existing in a network environment. In particular, the library could visually represent the evidence of several security events such as port sweeps, port scans, malware/worm traffic and clear compromise of the system.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"70 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115820166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang
{"title":"Research on Identification and Addressing of the Internet of Things","authors":"Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang","doi":"10.1109/3PGCIC.2015.40","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.40","url":null,"abstract":"It is a key issue that identification and addressing the entity which access the Internet through the wireless network with various short distance transmission protocols. To solve the problem, combining with the existing identification and addressing technology of the Internet and the IOT, this paper proposes a method based on distributed ID. This method can be divided into two stages. It first designs the structure of distributed ID. Using the distributed address allocation algorithm, it implements the automatic allocation of the distributed ID as well as the distributed ID resolution among the global IOT. After that, an addressing scheme is designed to meet demands of the IOT addressing. It first defines the structure of addressing and then implements the routing addressing algorithm which combines Cluster-Tree with Ad-hoc On-demand Distance Vector Routing. This scheme could improve the routing efficiency as well as achieve lower cost, lower energy consumption and higher reliability of the addressing. By the simulation on NS-2 platform, the experimental results highlight the feasibility and effectiveness of the proposed method from three aspects: the correctness of identification allocation, the effectiveness of addressing scheme, and the stability of data transmission.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Business Analysis of Cloud Computing: Data Security and Contract Lock-In Issues","authors":"Justice Opara-Martins, R. Sahandi, Feng Tian","doi":"10.1109/3PGCIC.2015.62","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.62","url":null,"abstract":"The widespread adoption of cloud computing services has a wide range of sourcing issues that companies must take into consideration when they standardize and automate their IT service delivery. In this respect, our paper identifies risks and opportunities of cloud computing which affect organisations' cloud adoption decisions. The research method used is based on a quantitative online survey questionnaire of 114 UK business respondents including IT professionals, managers, and decision-makers. The study results show that despite the business benefits for moving IT service consumption and delivery from on-premise to the cloud environment, the following risks are exacerbated: security, data privacy and contract lock-in. The outcome of the survey suggests that related concerns can be strategically mitigated. This can be done by negotiating cloud contracts to be more closely aligned to address business specific security and lock-in risks in cloud-based sourcing. Based on the outcome, the paper provides guidance to support the decision-making process on investment into cloud computing implementation to meet the organisations' business objectives with related concerns.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Compact Sets of Features for Question Classification in Cognitive Systems: A Comparative Study","authors":"Marco Pota, Angela Fuggi, M. Esposito, G. Pietro","doi":"10.1109/3PGCIC.2015.118","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.118","url":null,"abstract":"Question Classification is one of the key tasks of Cognitive Systems based on the Question Answering paradigm. It aims at identifying the type of the possible answer for a question expressed in natural language. Machine learning techniques are typically employed for this task, and exploit a high number of features extracted from labelled questions of benchmark training sets in order to achieve good classification results. However, the high dimensionality of the feature space often limits the possibility of applying more efficient classification approaches, due to high training costs. In this work, more compact sets of lexical and syntactic features are proposed to distinguish question classes. In particular, the widely used unigrams are substituted with a smaller number of features, extracted by modifying typical Natural Language Processing procedures for question analysis. The accuracy values gained on a benchmark dataset by using these different sets of features are compared among them and with the state-of-the-art, taking into account the required complexity at the same time. The new sets of extracted features show a good trade-off between accuracy and complexity.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Glenn Ergeerts, Maciej Nikodem, Dragan Subotic, T. Surmacz, B. Wojciechowski, P. D. Meulenaere, M. Weyn
{"title":"DASH7 Alliance Protocol in Monitoring Applications","authors":"Glenn Ergeerts, Maciej Nikodem, Dragan Subotic, T. Surmacz, B. Wojciechowski, P. D. Meulenaere, M. Weyn","doi":"10.1109/3PGCIC.2015.93","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.93","url":null,"abstract":"In this paper we introduce important aspects of the recently published DASH7 Alliance Protocol v1.0 specification for wireless sensor and actuator networks. The main contribution of this paper is the discussion of the different communication schemes and the accompanying trade-offs which can be used when designing a DASH7 network. Finally, we describe two practical use cases as examples of how DASH7 can be used to efficiently solve specific problems as well as the hardware developed that uses energy harvesting.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao
{"title":"A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data","authors":"Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao","doi":"10.1109/3PGCIC.2015.48","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.48","url":null,"abstract":"As the cloud computing becomes prevalent, data owners are motivated to outsource a large number of documents to the cloud for the great flexibility and convenience. Although encryption before outsourcing can keep user's data confidential, it raises a new challenge for users to retrieve some of the encrypted files containing specific keywords from the cloud. In this paper, we propose a novel privacy preserving keyword search scheme over encrypted cloud data to address this problem. To enable users to search over encrypted data, we firstly adopt a structure named as Inverted Matrix (IM) to build search index. The IM is consisted of a number of index vectors, each of which is associated with a keyword. Then we map a keyword to a value as an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an Encrypted Enlarged Inverted Matrix (EEIM) to preserve the privacy of users. Through the security analysis, we show that our proposed scheme is secure.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127495155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}