{"title":"Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing","authors":"Hongyang Yan, Xuan Li, Jin Li","doi":"10.1109/3PGCIC.2014.138","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.138","url":null,"abstract":"Personal health record which is stored safely in the cloud computing platform has captured the attention of cryptographic researchers. In order to assure the security of data, anyone can't read and tamper it without permit. In this paper, we use attribute-based encryption(ABE) scheme which is an extension of identify-based encryption(IBE) to construct a system. In this system we adopt key-policy attribute-based encryption(KPABE) which can provide fine-grained access policy and better efficiency for user revocation.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface","authors":"T. Hachaj, M. Ogiela","doi":"10.1109/3PGCIC.2014.79","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.79","url":null,"abstract":"Our motivation for writing this paper was to present application of Gesture Description Language (GDL) methodology in the role of natural user interface (NUI) for immersive virtual reality (VR) environment. In order to do so we have adapted an existing so called voxel-engine framework by adding essential components. In order to apply NUI in VR environment we have implemented two types of interactions with the system: mouse - like two-dimensional point and click interface and movements commands that are used to travel through VR. The validation of our method was performed on group of twelve students of both sexes. Our experiment might be easily repeated by using our software modules.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1217 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Detection in Chinese Microblogs Using Hot Term Discovery and Adaptive Spectral Clustering","authors":"Chengxu Ye, Ping Yang, Shaopeng Liu","doi":"10.1109/3PGCIC.2014.44","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.44","url":null,"abstract":"Weibo is a popular Chinese microblogging service that counts with millions of users and allows them to share short text messages. As an information network, Weibo can tell people what they care about as it is happening in the society. Unfortunately, users are constantly struggling to keep up with the larger and larger amounts of messages published every day. In order to help users to get the big picture, an efficient and effective topic detection method is urgent in demand. Considering the sheer scale and rapid evolution of the microblog messages, we investigate a novel method for topic detection in Chinese Microblogs in a given time period. It is composed of two major steps. First, hot terms are extracted by a suffix array structure and a TF*SDF term weighting scheme. Second, based on the extracted hot terms, we calculate their co-occurrence information and then group the terms into clusters that represent topics using an adaptive spectral clustering. Extensive experimental results on real world data demonstrate that the proposed method is more effective and efficient for topic detection in Chinese microblogs than existing approaches.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer-Aided Enterprise Management","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/3PGCIC.2014.77","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.77","url":null,"abstract":"In this paper the semantic analysis procedures will be adopted for enterprise management and strategic-decision making tasks, using cognitive information systems. These systems are used to perform the semantic analysis of the enterprise financial condition. Semantic analysis is conducted on the basis of linguistic formalisms, defined according to the analyzed data sets. Essence of this approach is the use of semantic analysis to the task of understanding the actual situation of the company, and predict the future states. The good understanding of the situation of the enterprise (the status quo, the factors causing this condition, the future state, etc.) can take appropriate action and improve management processes.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Gentile, S. Marrone, N. Mazzocca, Roberto Nardone
{"title":"A Cost-Energy Trade-Off Model in Smart Energy Grids","authors":"U. Gentile, S. Marrone, N. Mazzocca, Roberto Nardone","doi":"10.1109/3PGCIC.2014.83","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.83","url":null,"abstract":"The growing application of ICT in the management of power generation and distribution plants is one of most sensitive case studies in the field of cyber-physical systems. At the date, several technologies and devices are present to improve the efficiency of these infrastructures giving to system engineers and practitioners a good set of mechanisms to optimise energy efficiency of the nodes. This paper defines a quantitative model that can be used to choose the smart-home logic able to maximise acquired/consumed energy and minimise costs. The model is based on the Fluid Stochastic Petri Net formalism and has been built according to compositional modelling approaches.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng
{"title":"New Data Publishing Framework in the Big Data Environments","authors":"Jun Yang, Zheli Liu, Chunfu Jia, Kai Lin, Zijing Cheng","doi":"10.1109/3PGCIC.2014.139","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.139","url":null,"abstract":"The traditional data publishing methods will remove the sensitive attributes and generate the abundant records to achieve the goal of privacy protection. In the big data environment, they cannot satisfy some data mining tasks with privacy considerations. This paper provides a new data publishing framework. It can preserve the data integrity, i.e., the original data structure is preserved, and it doesn't require deleting any attribute and adding k-times data to achieve anonymity.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Prevention of Rogue AP Based MitM in Wireless Network","authors":"Mengru Cai, Zhendong Wu, Jianwu Zhang","doi":"10.1109/3PGCIC.2014.105","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.105","url":null,"abstract":"Due to the wireless network is popularly used, the security of wireless network is more important than past. Wireless network is considerably more susceptible to MitM (man-in-the-middle) attack. This paper proposes a Rogue AP based MitM attack framework. In actual wireless network, the mobile terminals cannot properly validate the server due to their limitation. The attackers force the user to connect the Rogue AP so as to obtain the authentication credentials of the unauthorized users. Then the attackers use these credentials to connect to the legitimate AP. We test this MitM framework in the actual wireless network environment under the EAP-TTLS/MSCHAPv2 using different mobile terminals. Last we propose a two-factor based dynamic password technology to prevent this MitM attack.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129185202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoshimasa Ishi, Tomoya Kawakami, T. Yoshihisa, Y. Teranishi
{"title":"An Evaluation of a P2P Sensor Data Streaming System Considering the Number of Hops on the PIAX Testbed","authors":"Yoshimasa Ishi, Tomoya Kawakami, T. Yoshihisa, Y. Teranishi","doi":"10.1109/3PGCIC.2014.115","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.115","url":null,"abstract":"Our research team proposed some peer-to-peer technique based on sensor data streaming methods named LCF, LLF and LLF-H for distributing communication loads when delivering sensor data streams with different data collection cycles. The LCF method and the LLF method mainly focus on the fairness of communication load. However, when many distribution nodes have a same collection cycle, the number of hops to distribute becomes large, and the transmission delay increases by those techniques. To suppress the delay time, we proposed the LLF-H method which add a upper limit to the number of hops on delivering, and evaluated the LLF-H method by the simulation. In this paper, we evaluate the behavior of the transmission delay and the fairness on the LLF-H method with many destination nodes which require same collection cycle, by using the PIAX test bed. From the evaluation result, we confirmed that the transmission delay could be suppressed, without spoiling the fairness of load greatly as compared with the existing LLF method, even if the maximum number of hops was limited to several hops.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"55 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125709974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Trends of Big Data Analytics","authors":"Hui Li, Xin Lu","doi":"10.1109/3PGCIC.2014.136","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.136","url":null,"abstract":"This article provides an overview of the challenges of big data, in the aspects of data scale, data heterogeneity, data timeliness, and demand for deep analyzing, in correspondence with four features of big data. It also presents an overview of trends of big data analytics both in theory and technique, with the development of testing benchmark, visualization technology, advanced and mixed architecture, and a series of developing, testing and managing tools, which will contribute to big data analytics with larger scale, more variety and velocity.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"16 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131260342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi
{"title":"A Study of Robustness Enhancement Technique on P2P Sensor Data Stream Delivery System Using Distributed Hashing","authors":"Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi","doi":"10.1109/3PGCIC.2014.114","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.114","url":null,"abstract":"In recent years, sensor data stream delivery that collects sensor data periodically and delivers successively has been attracting great attention. As for this sensor data stream delivery, receivers are possible to require the same sensor data stream with different delivery cycles. Our researching team proposed methods to distribute communication loads by relay nodes in the case of delivering the sensor data streams that have different data delivery cycles. However, in the previous methods, since the specific node builds delivery paths and notifies to related nodes, the assigned node is required to be updated when the node leaves. Therefore, in this paper, we propose a method that enhances the robustness of delivery system.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}