{"title":"Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model","authors":"Jizhong Wang, Chunxiao Wang","doi":"10.1109/3PGCIC.2015.33","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.33","url":null,"abstract":"Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in this paper. A public matrices chosen rule that has been used in a known efficient lattice-based chosen ciphtertext secure encryption scheme is used in this paper to reduce the public key size and the message-to ciphtertext expanse factor. Under the hardness of the decision variant of the learning with errors (LWE) problem, we prove that the proposed IBE scheme is indistinguishable against the adaptive chosen identities and chosen-plaintext attack in the standard model. Since a new public key chosen rule is used in our design scheme, the public key size of the proposed scheme would be short. Moreover, the message-to-ciphtertext expanse factor of this scheme is also controlled efficiently which is nearly closed to that of Gentry's scheme. Due to the quantum intractability of the LWE problem on which the scheme is based, the proposed IBE scheme is secure even in quantum-era.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121173289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter","authors":"Jiuru Wang, Haifeng Wang, Xu An Wang, Yunpeng Cao","doi":"10.1109/3PGCIC.2015.119","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.119","url":null,"abstract":"In terms of the problems of security, scalability and communication cost existing in the scheme, which is proposed by Qin et al., of identity-based key management using bloom filter (IBKM), this paper designs an authentication key agreement scheme for heterogeneous sensor network based on improved counting bloom filter. This scheme analyzes the problem of authentication key agreement in heterogeneous sensor networks from the viewpoint of Set theory and improves the algorithm of counting bloom filter to be adapted to the authentication key agreement of heterogeneous sensor networks. The experimental results show that the proposed scheme can resist brute force attack during a node capture and has better network scalability and lower communication cost compared with the IBKM scheme.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128583155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Notification System for Mobile Devices to Support Collaborative Learning","authors":"S. Caballé, F. Xhafa","doi":"10.1109/3PGCIC.2015.8","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.8","url":null,"abstract":"Presently, the combination of wireless technology and the advances of mobile devices are transforming the form in which people, companies and organisations communicate. In particular, virtual organizations in the education sector have shown the possibilities of remote training, which provides similar pedagogical benefits to face-to-face training. However, this group of technologies and initiatives have not been yet fully exploited to extract all their potential for remote education. In other words, no sufficient research has been conducted to conjugate these technologies so as to improve the teaching-learning process, informal and social communication in a virtual campus. This paper presents an attempt towards this direction by reporting the experience of developing and prototyping a notification system for mobile devices to support collaborative work in on-line learning. In particular, the main research objectives are: (i) definition of an event model to manage notifications of group work, (ii) adaptation and integration of the notification system based on the event model into mobile devices, (iii) development and prototyping of the system to support collaborative learning.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock","authors":"M. Piekarczyk, M. Ogiela","doi":"10.1109/3PGCIC.2015.148","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.148","url":null,"abstract":"Nowadays, the crypto-biometric schemes are commonly studied to deal with the key management problem existing in cryptographic systems. In the paper we consider a well-known fuzzy vault scheme working on non-standard biometric data associated with palm-oriented gestures. We discuss the usefulness of the touch-less palm tracking system focused on handling the biomechanical characteristics of one's hand to protect the cryptographic key or other secret data. As a behavioral template the fixed finger-based gesture is applied. In order to generate unordered sets for fuzzy vault we use the global approach where features are decoded from fingertip position and velocity. Both the raw and DCT-calculated time series are preprocessed to solve the instability and variability problem strictly related to behavioral character of the data. We provide the experimental results and discuss the security issues.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services","authors":"Luis Gómez-Miralles, J. Arnedo-Moreno","doi":"10.1109/3PGCIC.2015.57","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.57","url":null,"abstract":"Smartphones and mobile devices nowadays accompany each of us in our pockets, holding vast amounts of personal data. The iOS platform has gained popularity in the last years, in particular in enterprise deployments, due to its supposed higher level of security. Recent research has pinpointed a number of mechanisms that are being abused today in order to compromise the security of iOS devices. In this paper, we present Lockup, a proof of concept tool that applies various mitigation measures in order to protect iOS devices against those attacks.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raffaele Pizzolante, Arcangelo Castiglione, B. Carpentieri, A. D. Santis, Aniello Castiglione
{"title":"Reversible Copyright Protection for DNA Microarray Images","authors":"Raffaele Pizzolante, Arcangelo Castiglione, B. Carpentieri, A. D. Santis, Aniello Castiglione","doi":"10.1109/3PGCIC.2015.139","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.139","url":null,"abstract":"The ability of the DNA microarray images of being used in several application domains, such as computer science, medical sciences, biololgy, toxicology, chemistry, ecology, environmental studies and statistics has enabled the collaboration among scientists belonging to different research fields. For this reason, the use/management of such images may be sometimes controlled by ethical or proprietary rules. In this paper, we address the problem of DNA microarray images protection by means of visible watermarking techniques, where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original DNA microarray image. In particular, to the best of our knowledge, we introduce the first reversible visible watermarking scheme explicitly addressed for such type of images. The proposed scheme ensures copyright protection, besides enabling the binding of that image with other information related to it. The visible watermark is securely embedded based on a user-key-controlled embedding mechanism. We remark that by using our scheme it is possible to store only the watermarked copy of a DNA microarray image, without the original one, and then to restore exactly the original image. Finally, we have implemented a working prototype of the scheme we proposed and its validity has been proven through testing.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of Pixels","authors":"Yixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin","doi":"10.1109/3PGCIC.2015.111","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.111","url":null,"abstract":"This paper proposes a watermark algorithm for image content authentication and correcting errors in terms of pixels. There are two characteristics: first, aiming at defects of poor safety and the complicated calculation which are exiting in image encryption algorithm based on chaotic sequences, a new image chaotic encryption algorithm based on sampling without replacement is put forward. Second, the application of combination mapping technique supplies a gap which is exiting in image content authentication watermark. Using the authentication, digital image can be corrected in terms of pixels, and with the minimum embedded capacity and the maximum SNR. The image is divided into blocks by 8×8, image content authentication and correcting errors is done on blocks. In the scheme, chaotic encryption not only ensures the safety, but also advances correcting rate.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent-Based Model for Autonomous Planning in Distrubuted Critical Systems","authors":"F. Amato, Francesco Moscato, Dario Pianese","doi":"10.1109/3PGCIC.2015.112","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.112","url":null,"abstract":"Critical distributed systems are usually employed in situation where automation is appealing when dealing with dangerous situations. Anyway, the complexity of these systems is growing up faster and faster. Distributed autonomous elements like sensors networks, drones etc. are now widely used in critical system. In this systems, each autonomous element must implement procedures in order to reach their goals in a distributed, usually collaborative environments. New planning algorithms have to be coped with existing ones in order to fulfil performance and soundness requirements. In this paper we propose an autonomous planning methodology that is based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems. We also describe a framework we implemented in order to enact the methodology and we will present results from the study of a critical distributed system.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage Domain","authors":"Giuseppe Caggianese, Luigi Gallo, Pietro Neroni","doi":"10.1109/3PGCIC.2015.90","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.90","url":null,"abstract":"The recent availability of low cost wearable augmented reality (WAR) technologies, is leveraging the design of applications in many different domains in order to support users in their daily activities. For most of these domains, the large amount of information displayable on top of the reality, directly in the user's field of view, represents an important challenge for designers. In this paper we present a view management technique for placing touristic/cultural information, in the form of points of interest (POIs), in an AR system that works in the absence of a priori knowledge of the real environment. The user-driven view management technique, designed as a remote service, improves representation and displacement of the digital information each time the user manifests an interest in a particular area of the real space. The proposed approach includes a layout algorithm, which exploits the user's local position and her/his point of view direction, to correctly set the POI height in the user's view avoiding overlapping and cluttering, together with an adaptive rendering method, using information about the brightness of the area, that computes the visual appearance parameters of each virtual POI in order to improve its readability over the background.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133056392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display Environment","authors":"Yasuo Ebara","doi":"10.1109/3PGCIC.2015.129","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.129","url":null,"abstract":"As effective application method of the large-scale and the high-resolution display system, it is considered to product new technique of information utilization by simultaneous display of enormous multimedia contents by utilizing the ultra-wide display area. In previous studies, we have studied the availability for intuitive operation and understanding by implementing various collaborative applications for the effective display of high-resolution contents as well as developing interaction techniques for enormous visual contents in tiled display wall. However, it is pointed out the issue which interfere with the browsing of contents and each work by viewers, because tiled display wall is displayed hiding a part of each contents inforamtion by bezel exist in each LCD. In this paper, we have worked the fundamental study on technique of effective simultaneous display by use of enormous multimedia contents in ultra-resolution display environment.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}