2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing最新文献

筛选
英文 中文
An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption 基于属性加密和匿名多接收方身份加密的高效云个人健康记录系统
Chang-ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-Long Lin
{"title":"An Efficient Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption","authors":"Chang-ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-Long Lin","doi":"10.1109/3PGCIC.2014.38","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.38","url":null,"abstract":"As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In this paper, we propose a novel patient-centric cloud-based secure PHR system, which allows patients to securely store their PHR data on the semi-trusted cloud service providers, and selectively share their PHR data with a wide range of users, including health care provider like doctors and nurses, family members or friends. To reduce the key management complexity for owners and users, we divide the users in the cloud-based PHR system into two security domains named public domain and personal domain. Different from previous cloud-based PHR system, PHR owners encrypt their PHR data for the public domain using cipher text-policy attribute-based encryption scheme, while they encrypt their PHR data for the personal domain using anonymous multi-receiver identity-based encryption scheme. Only authorized users whose credentials satisfy the specified cipher text-policy or whose identities belong to dedicated identities can decrypt the encrypted PHR data, where cipher text-policy or dedicated identities are embedded in the encrypted PHR data. Extensive analytical and experimental results are presented which show the patient-centric cloud-based secure PHR system is secure, scalable and efficient.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Encrypted Botnet Detection Scheme 加密僵尸网络检测方案
Wang Ying
{"title":"Encrypted Botnet Detection Scheme","authors":"Wang Ying","doi":"10.1109/3PGCIC.2014.110","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.110","url":null,"abstract":"Botnets have started using Information obfuscation techniques include encryption to evade detection. In order to detect encrypted botnet traffic, in this paper we see detection of encrypted botnet traffic from normal network traffic as traffic classification problem. After analyses features of encrypted botnet traffic, we propose a novel meta-level classification algorithm based on content features and flow features of traffic. The content features consist of information entropy and byte frequency distribution, and the flow features consist of port number, payload length and protocol type of application layer. Then we use Naive Bayes classification algorithms to detect botnet traffic. The related experiment shows that our method has good detection effect.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps 基于多线性映射的可验证多接收者加密方案
Zhengjun Jing, Guoping Jiang, Chunsheng Gu
{"title":"A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps","authors":"Zhengjun Jing, Guoping Jiang, Chunsheng Gu","doi":"10.1109/3PGCIC.2014.49","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.49","url":null,"abstract":"Multi-recipient encryption is an important public key cryptosystem, which can be applied for a variety of purposes, such as broadcasting data. In order to design an secure multi-recipient public key encryption (MRPKE) in post-quantum era, in this paper, we construct a novel MRPKE scheme base on Garg-Gentry-Halevi (GGH) framework which is a graded algebras analogue of multilinear maps from ideal lattice. Under the grade decisional Diffie-Hellman (GDDH) assumption of GGH, the proposed scheme has semantically safety against chosen plaintext attack (CPA). At the same time, each recipient, without first decrypting, can verify whether the message to be received is from a legitimate sender. Furthermore, the encryption and decryption only involves the polynomial modular addition and multiplication in polynomial ring, so the efficiency of the proposed scheme is higher.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Algorithm of Video Network Transmission Based on Unbalanced Multiple Description Coding 基于不平衡多重描述编码的视频网络传输算法
Shanguo Lv, Yiqin Cao
{"title":"An Algorithm of Video Network Transmission Based on Unbalanced Multiple Description Coding","authors":"Shanguo Lv, Yiqin Cao","doi":"10.1109/3PGCIC.2014.143","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.143","url":null,"abstract":"In order to reduce video network transmission delay, congestion and packet loss rate, the authors propose an algorithm of video network transmission based on unbalanced multiple description coding. Based on the detection of network link available bandwidth, we predict congestion state of the network link according to Markov model, then adjust video transmission path. Comparing with the random early detection (RED) algorithm, experimental results show that the algorithm can more effectively estimate network congestion, reduce video packet loss rate and network latency, and ensure the quality of the video network transmission effectively.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125367651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vinyl Acetate Polymerization Rate Prediction Based on FOA GNN 基于FOA GNN的醋酸乙烯酯聚合速率预测
Yang Jing, Zeng Hui, H. Jiangping
{"title":"Vinyl Acetate Polymerization Rate Prediction Based on FOA GNN","authors":"Yang Jing, Zeng Hui, H. Jiangping","doi":"10.1109/3PGCIC.2014.61","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.61","url":null,"abstract":"The vinyl acetate polymerization rate is an important quality index in the production of polyvinyl alcohol. However, for it can not be measured online, the polyvinyl alcohol quality can not be controlled effectively. As a novel meta-heuristic and evolutional algorithm, the fruit fly optimization algorithm (FOA) has several merits such as having few parameters to be adjusted and able to achieve global optimum. Therefore, to improve the prediction performance, this paper proposes a grey neural network prediction mode that uses FOA to optimize the \"whitening\" parameters of this grey neural network. Simulation and experimental results show that the grey neural network prediction model combined with FOA (FOA_GNN) is an effective method to predict the vinyl acetate polymerization rate, and it outperforms other alternative methods, namely single the grey neural network model (GNN), the adaptive compete genetic neural network prediction model (ACGA) and radial basic function neural network model (RBF).","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators 利用云基础设施和硬件加速器的移动流量分析
M. Barbareschi, Alessandra De Benedictis, A. Mazzeo, Antonino Vespoli
{"title":"Mobile Traffic Analysis Exploiting a Cloud Infrastructure and Hardware Accelerators","authors":"M. Barbareschi, Alessandra De Benedictis, A. Mazzeo, Antonino Vespoli","doi":"10.1109/3PGCIC.2014.86","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.86","url":null,"abstract":"Recently, traffic analysis and measurements have been used to characterize, from a security point of view, applications' and network behavior to avoid intrusion attempts, malware injections and data theft. Since most of the generated data traffic is from the embedded mobile devices, the analysis techniques have to cope on the one hand with the scarce computing capabilities and battery limitation of the devices, and on the other hand with tight performance constraints due to the huge generated traffic. In recent years, several machine learning approaches have been proposed in the literature, providing different levels of accuracy and requiring high computation resources to extract the analytic model from available training set. In this paper, we discuss a traffic analysis architecture that exploits FPGA technology to efficiently implement a hardware traffic analyzer on mobile devices, and a cloud infrastructure for the dynamic generation and updating of the data model based on ongoing mis-classification events. Finally, we provide a case study based on the implementation of the proposed traffic analyzer on a Xilinx Zynq 7000 architecture and Android OS, and show an overview of the proposed cloud infrastructure.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic Generation Algorithm of Penetration Graph in Penetration Testing 穿透测试中穿透图的自动生成算法
Xue Qiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv
{"title":"Automatic Generation Algorithm of Penetration Graph in Penetration Testing","authors":"Xue Qiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv","doi":"10.1109/3PGCIC.2014.104","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.104","url":null,"abstract":"Penetration graph is a kind of attack graph which is widely used in penetration testing. It is an import tool to analyze security vulnerabilities in the network. However, the previous research on the generation methods of penetration graph have met a lot of challenges. Some methods are out of date and not applicable for practical scenarios, some may possibly leave out the import attack paths, some do not consider the probability of exploitation of each attack path and some failed to solve the problem of circle path and combination exploitation. We propose an automatic generation algorithm of penetration graph that optimizes the network topology before generating the penetration graph, which can reduce the redundant information effectively. We combine the penetration graph generation method with the CVSS (Common Vulnerability Scoring System) information together, increase the reliability of each attack path. Experiment result shows that the method can generates multi-path correctly and effectively, which can clearly show the structure of network, facilitates the testers' analysis of the target network, and provides reference for executing penetration testing.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Research of Wireless Sensor Network Channel Propagation Model in the Wild Environment 野外环境下无线传感器网络信道传播模型的研究
Yueshun He, Wei Zhang, N. Jiang, Xiaoyan Luo
{"title":"The Research of Wireless Sensor Network Channel Propagation Model in the Wild Environment","authors":"Yueshun He, Wei Zhang, N. Jiang, Xiaoyan Luo","doi":"10.1109/3PGCIC.2014.66","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.66","url":null,"abstract":"The survey shows that for the layout environment of wireless network, channel propagation model of wireless network still needs to be improved, especially low altitude propagation channel. In order to effectively study and design any random layout of wireless sensor node on the wild environment, several classic application scenes of wireless network are tested and improved in this paper. Since sample data are fitted by linear regression algorithm based on the method of least square, some meaningful conclusions about low-altitude path loss model are obtained. When antenna height is fully close to surface, thus the loss model of single broken line can be adopted. When antenna height is higher and LOS exists, the double broken line model can be adopted. At the same time other channel parameters related with network design are also measured. Those data provide an important scientific basis for the research of wireless sensor network.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments HPC云药丸:在云环境中按需部署和执行HPC应用程序
P. Ruiu, O. Terzo, G. Carlino, Rossella Prandi, A. Falzone, P. Maggi, Livia Torterolo, E. Usai, G. Perego
{"title":"HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments","authors":"P. Ruiu, O. Terzo, G. Carlino, Rossella Prandi, A. Falzone, P. Maggi, Livia Torterolo, E. Usai, G. Perego","doi":"10.1109/3PGCIC.2014.39","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.39","url":null,"abstract":"High Performance Computing (HPC) is a valuable instrument in many areas of scientific research and industrial production. However, due to the high investment costs for its implementation, its diffusion is often restricted to large research centres or medium to large size industrial companies. The project HPC CloudPills aimed at exploring how the technologies of Cloud Computing can help to reduce the cost and complexity associated with creating, maintaining and managing IT infrastructure for high performance computing. The objective is to make the high performance computing accessible to reality today not capable of supporting the high initial costs and management that it involves. In this paper the general architecture of HPC CloudPills will be described and some tests performed on the system with SPRAY (an HPC application).","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Analysis of Compressive Sensing Theory 压缩感知理论分析
Jia Yu
{"title":"The Analysis of Compressive Sensing Theory","authors":"Jia Yu","doi":"10.1109/3PGCIC.2014.67","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.67","url":null,"abstract":"Compressive sensing (CS) is an emerging field that has attracted considerable research interest over the past few years. Compressive sensing is a new type of sampling theory, which predicts that sparse signals and images can be reconstructed from what was previously believed to be incomplete information. As a main feature, efficient algorithms such as l1-minimization can be used for recovery. The theory has many potential applications in signal processing and imaging. This paper gives an introduction and overview on both theoretical and numerical aspects of compressive sensing and introduce the recent work on CS at present.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信