{"title":"More Than Old Wine in New Bottles: A Secure Live Virtual Machine Job Migration Framework for Cloud Systems Integrity","authors":"Hanif Deylami, Jairo Gutiérrez, R. Sinha","doi":"10.23919/ICMU.2018.8653611","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653611","url":null,"abstract":"Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing information technology services over the Internet. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance.While existing cloud computing threat detection and prevention techniques are improving, they are still not effective enough to meet the needs of next-generation systems, such as secure dynamic resource pools, high usability, and secure virtual machine migration. This paper aims to provide an understanding of the different potential attack vectors created by virtualization in a public Infrastructure-as-a-Service cloud, in particular, the security associated with the live virtual machine migration of jobs. The vectors will be investigated, concentrating on the threats emerging from various potential attackers (internal/external) to cloud systems. The overarching aim of this study, therefore, is to design and develop a secure live virtual machine migration framework that enables a virtual trusted platform module for multiple virtual machines running on a hardware platform while maintaining the cloud system’s integrity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa
{"title":"Development of Secure Safety Confirmation System Using Virtual Private Cloud","authors":"M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa","doi":"10.23919/ICMU.2018.8653589","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653589","url":null,"abstract":"A safety confirmation system is a system intended to enable users to share information about the extent of damage in the event of a disaster. In recent years, these systems have generally been implemented as a Web system using cloud computing. The configuration used for the safety confirmation system included a Web server and DB server, amongst others, and these resources can be easily procured by cloud computing. In addition, implementation in the cloud has many merits such as a shortened development period and accelerated service start time. However, cloud computing is a system on the Internet; thus, there is concern about the risk of illegal access from the outside and information leakage. The safety confirmation system requires a secure system infrastructure in which to store attribute information and users’ personal information. Therefore, a cloud-based safety confirmation system would need to be convenient to use and secure. In this paper, we propose to improve the safety by constructing the safety confirmation system in a virtual private cloud environment. The evaluation of the system showed that it was possible to prevent external illegal access and information leakage and to operate the safety confirmation system such that it was highly convenient to use.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmit Power and Carrier Sense Control for Massive Machine-to-Machine Communication in Wireless Ultra-dense Networks","authors":"Yu Yu, Yuto Lim, Yasuo Tan","doi":"10.23919/ICMU.2018.8653615","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653615","url":null,"abstract":"Besides the traditional voice and data services, 5G is expected to support new communication paradigm, i.e., Internet of Things (IoT) and Machine-to-Machine (M2M) services. Nonetheless, the system designs of transmit power control (TPC) and carrier sense threshold (CST) will be crucial when the huge number of these user equipment (UE) are densely engaged in vast number of data traffic transmissions. One practical and effective approach is to study the system design through numerical simulation. In this paper, we formalize the problem of minimizing the energy consumption and maximizing the average end-to-end throughput of massive M2M communication by optimally using a proposed consensus TPC scheme. To validate the effectiveness of our proposed scheme, we also focus the impact of the CST on the trade-off in between UE experienced data rate and network energy efficiency.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto
{"title":"Adaptive Congestion Control for Handover in Heterogeneous Mobile Content-Centric Networking","authors":"Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto","doi":"10.23919/ICMU.2018.8653625","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653625","url":null,"abstract":"CCN (Content-Centric Networking) is receiver-driven architecture whose communication is triggered by consumer requests. When a consumer changes its access point (handover), it cannot receive requested Data packets. However, the consumer can retransmit in-flight Interest packets to a new route and reconstruct its route to obtain corresponding Data packets. Each consumer has its own parameters for congestion control, e.g. congestion window size, congestion threshold and timeout value. In the case of a handover to a heterogeneous network, e.g. from LTE to Wi-Fi, when congestion parameters set just before the handover are carried over, they probably are inadequate for new network environments. In this paper, we propose an effective receiver-driven control, Congestion Parameter Initialization. Our policy is quite simple and a consumer initializes its congestion parameters just after the handover. Our simulation results show that our proposal can adapt its congestion parameters to new network environment quickly.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fall Detection Using Smartphones to Enhance Safety and Security of Older Adults at Home","authors":"H. Nguyen, F. Zhou, Farhaan Mirza, M. Naeem","doi":"10.23919/ICMU.2018.8653613","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653613","url":null,"abstract":"Falling is a global common health problem among older adults which causes minor to serious injuries such as fracture or even death. In recent years, many falls detection systems have been developed to support early detection and timely care to eliminate grave consequences. This research evaluates the potential of using smartphones for fall detection. In this research, two smartphones were used to collect acceleration data. Threshold approaches were applied on the collected data to detect potential falls. Evaluation results show that with proper chosen thresholds, the tested fall detection algorithm performs well with both sensitivity and specificity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Access Network Integrated with Radio-over-Fiber and Passive Optical Network","authors":"Liwei Yang, Junning Zhang, Wenjie Zhang","doi":"10.23919/ICMU.2018.8653623","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653623","url":null,"abstract":"A RoF system based on the OCS modulation for WDM-PON is presented and experimentally evaluated as a solution for next generation broadband access networks. 20-GHz subcarrier system over 25 km transmission is established and verified. Suppressing the optical carrier enables the baseband signals and radio frequency (RF) signals to be detected by photodiode. Experimental results demonstrate BER of 10-4 at the received Rx 3.25dBm with the link length of about 25km. A technique for source-less upstream transmission is also experimentally demonstrated, as downstream transmission channels can transfer the baseband signals and RF signals simultaneously.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126987140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki
{"title":"Interactive Video CAPTCHA for Better Resistance to Automated Attack","authors":"Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki","doi":"10.23919/ICMU.2018.8653624","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653624","url":null,"abstract":"A “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA’s resistance to relay and automated attacks. Our results show that, if our CAPTHCA’s parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128275229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sidewalk-level People Flow Estimation Using Dashboard Cameras Based on Deep Learning","authors":"Yusuke Hara, A. Uchiyama, T. Umedu, T. Higashino","doi":"10.23919/ICMU.2018.8653595","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653595","url":null,"abstract":"In future smart cities, understanding people flow is essential for a wide variety of applications such as urban planning and event detection. In this paper, we propose a method to estimate low of pedestrians walking on the sidewalks. Our goal is to achieve high accuracy with wide area coverage at low cost. For this purpose, we use dashboard cameras (dashcams) recently wide-spreading for providing evidence on accidents, etc.Our method combines Deep Learning-based pedestrian detection and model-based tracking to overcome the challenges of frequent occlusion (overlaps of objects in images) and false positives. In pedestrian detection, faces and backs of heads are separately detected to understand moving directions of pedestrians as well as their existence by applying CNN (Convolutional Neural Networks) and LSTM (Long-Short-Term-Memory). Then, the trajectories of the detected bounding boxes are estimated based on location and color similarities with the knowledge about moving speeds of vehicles and pedestrians.Through the evaluation using real dashcam videos, we have confirmed that our method works well, showing within ±13.6% mean absolute error rate of bi-directional people low estimation.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Garbage Collections Delays on Java GUIs","authors":"Panagiotis Patros, Michael H. Dawson, K. Kent","doi":"10.23919/ICMU.2018.8653592","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653592","url":null,"abstract":"Tablets, smartphones, wearables, etc. project a (usually graphical) interface to their human users that offloads the majority of the computation to a cloud/fog system. Graphical User Interface (GUI) applications are frequently written in high-level programming languages, which provide automatic memory management: placement and deletion of memory objects is not performed manually; instead, an underlying software component called a Garbage Collector (GC) handles this. Nevertheless, the GC policies and algorithms that are best suited for large datacenters are not necessarily ideal for a small, embedded device. Therefore, in this paper, we present GUI GC, a JavaFX GUI benchmark, which we use to compare the performance of the four GC policies of the IBM J9 Java runtime on a resource-constrained environment. Overall, our experiments suggest that the default policy Gencon, outperformed its counterparts. Additionally, the region-based policy, Balanced, did not fully utilize blocking times; thus, using GUI GC, we conducted experiments with explicit GC invocations that measured significant improvements of up to 13.22% when multiple CPUs were available.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto
{"title":"Investigating User Reactions to Interactive-signage-based Stimulation Toward Behavior Change","authors":"Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto","doi":"10.23919/ICMU.2018.8653587","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653587","url":null,"abstract":"In recent years, many research and developments of behavior change have been conducted. The purpose of behavior change is to improve people’s lifestyle pattern or to maintain the improvement for a long time aiming to achieve a goal of promoting health condition improvement. In order to achieve the foundation of a new lifestyle, it is necessary to recognize the daily life patterns of users and give triggers to users in their daily life for behavior change. To realize this, in this study, we construct an interactive signage which is able to positively talk to the passing user and try to induce behavior change by sending visual stimulation and auditory stimulation. In this paper, we report the result of the investigation on users’ reactions and feelings to the proposed interactive signage. As a survey experiment, we set up 4 interactive signage on a floor of our university and asked 15 participants to carry a name tag with a BLE beacon during their daily life. There are 4 different dialogue scenarios and a scenario is posted to the participants when he/she approaches the interactive signage. Participants can respond to these scenarios through a touchscreen. Based on the result of the experiment, it is found that the interactive signage can induce behavior change effectively.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}