{"title":"A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services","authors":"Ben Niu, Qinghua Li, Xiao-yan Zhu, Hui Li","doi":"10.1109/ICCCN.2014.6911813","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911813","url":null,"abstract":"In Location-Based Services (LBSs) mobile users submit location-related queries to the untrusted LBS server to get service. However, such queries increasingly induce privacy concerns from mobile users. To address this problem, we propose FGcloak, a novel fine-grained spatial cloaking scheme for privacy-aware mobile users in LBSs. Based on a novel use of modified Hilbert Curve in a particular area, our scheme effectively guarantees k-anonymity and at the same time provides larger cloaking region. It also uses a parameter σ for users to make fine-grained control on the system overhead based on the resource constraints of mobile devices. Security analysis and empirical evaluation results verify the effectiveness and efficiency of our scheme.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual network embedding: An optimal decomposition approach","authors":"Qian Hu, Yang Wang, Xiaojun Cao","doi":"10.1109/ICCCN.2014.6911723","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911723","url":null,"abstract":"In network virtualization, a traditional ISP collapses into two independent tiers, where the infrastructure provider (InP) manages the physical (or substrate) networks and the service provider (SP) operates the service (or virtual) networks. In this work, we investigate the virtual network embedding (VNE) problem, which bridges above two tiers by mapping the virtual network request to the substrate networks. Existing VNE approaches are either optimal Integer Linear Programming formulations that suffer from extensive computational time, or relaxation/heuristics (mostly decompose the VNE problem into link mapping (LM) and node assignment (NA) sub-problems) that are unable to provide an optimal solution or near-optimal solution with guaranteed quality. In this paper, we attempt to fill this gap with a new VNE solution, which relies on an iterative process enabling feedbacks between the NA, and LM sub-problems (obtained based on the Primal-dual analysis of the VNE problem). With our approach, one can reach either an optimal solution or a near optimal solution with a per-instance guarantee on its closeness to the optimal solution.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bingshuang Liu, Skyler Berg, Jun Yu Li, Tao Wei, Chao Zhang, Xinhui Han
{"title":"The store-and-flood distributed reflective denial of service attack","authors":"Bingshuang Liu, Skyler Berg, Jun Yu Li, Tao Wei, Chao Zhang, Xinhui Han","doi":"10.1109/ICCCN.2014.6911808","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911808","url":null,"abstract":"Distributed reflective denial of service (DRDoS) attacks, especially those based on UDP reflection and amplification, can generate hundreds of gigabits per second of attack traffic, and have become a significant threat to Internet security. In this paper we show that an attacker can further make the DRDoS attack more dangerous. In particular, we describe a new DRDoS attack called store-and-flood DRDoS, or SF-DRDoS. By leveraging peer-to-peer (P2P) file-sharing networks, SF-DRDoS becomes more surreptitious and powerful than traditional DRDoS. An attacker can store carefully prepared data on reflector nodes before the flooding phase to greatly increase the amplification factor of an attack. We implemented a prototype of SF-DRDoS on Kad, a popular Kademlia-based P2P file-sharing network. With real-world experiments, this attack achieved an amplification factor of 2400 on average, with the upper bound of attack bandwidth at 670 Gbps in Kad. Finally, we discuss possible defenses to mitigate the threat of SF-DRDoS.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying Mao, Jiayin Wang, Joseph Paul Cohen, B. Sheng
{"title":"PASA: Passive broadcast for smartphone ad-hoc networks","authors":"Ying Mao, Jiayin Wang, Joseph Paul Cohen, B. Sheng","doi":"10.1109/ICCCN.2014.6911820","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911820","url":null,"abstract":"Smartphones have become more and more popular in the past few years. Motivated by the fact that location plays an extremely important role in mobile applications, this paper develops an efficient local message dissemination system PASA based on a new communication model called passive broadcast. It is based on the method of overloading device names described in MDSRoB [14] and Bluejacking [23]. In this new model, each node does not maintain connection state and data delivery is initialized by a receiver via a `scan' operation. The representative carriers of passive broadcast include Bluetooth and WiFi-Direct, both of which define a mandatary `peer discovery' scan function. Passive broadcast features negligible cost for establishing and maintaining direct links and is extremely suitable for short message dissemination in the proximity. In this paper, we present PASA with complete protocols and in-depth analysis for optimization. We have prototyped our solution on commercial phones and evaluated it with comprehensive experiments and simulation.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology and migration-aware energy efficient virtual network embedding for green data centers","authors":"Xinjie Guan, Baek-Young Choi, Sejun Song","doi":"10.1109/ICCCN.2014.6911768","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911768","url":null,"abstract":"With the rapid proliferation of data centers, their energy consumption and green house gas emissions have significantly increased. Some efforts have been made to control and lower energy consumption of data centers such as proportional energy consuming hardware, dynamic provisioning and virtual-ization machine techniques. However, it is still common that many servers and network resources are often underutilized, and idle servers spend a large portion of their peak power consumption. We first built a novel model of a network virtualization in order to minimize energy usage in data centers for both computing and network resources by taking practical factors into consideration. Due to the NP-hardness of the proposed model, we have developed a heuristic algorithm for virtual network scheduling and mapping, considering expected energy consumption at different times, a data center architecture, and virtual network migration, as well as operation costs. Our evaluation results show that our algorithm could reduce energy consumption up to 40%, and take up to 57% higher number of virtual network requests over other existing virtual mapping schemes.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"57 32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attacks/faults detection and isolation in the Smart Grid using Kalman Filter","authors":"K. Manandhar, Xiaojun Cao","doi":"10.1109/ICCCN.2014.6911809","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911809","url":null,"abstract":"In this paper, attacks/faults detection and isolation in the Smart Grid system are studied. First, a mathematical model of the power grid system is derived. Then, detection and isolation of attacks/faults using Generalized Observer Scheme (GOS) implementing Kalman Filter are discussed. The attack assessment is performed using χ2-detector. Even though, GOS is effective in isolating attacks/faults on a single sensor, it is unable to isolate simultaneous attacks/faults on multiple sensors. In order to isolate simultaneous attacks on multiple sensors, an Iterative Observer Scheme (IOS) is proposed. The proposed (IOS) scheme divides the set of sensors providing measurements in the power grid system into subsets and performs the tests on the subsets iteratively, eventually isolating the region/sensors under attack. Simulation results show the effectiveness of the proposed scheme in detecting and isolating attacks or faults in the power grid system.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121629241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-time symmetric key based cloud supported secure smart meter reading","authors":"Kewei Sha, Chenguang Xu, Zhiwei Wang","doi":"10.1109/ICCCN.2014.6911854","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911854","url":null,"abstract":"With wide deployments of Smart Grid systems, a large amount of energy usage and grid status data have been collected by smart meters. To secure those critical and sensitive data, it is crucial to prevent unauthorized readings to smart meters. Many authentication protocols have been proposed to control the access to the smart meters that are a part of Smart Grid data communication network, but authentication protocols to control readings to the isolated smart meters are mostly ignored. In this paper, we design a one-time symmetric key based cloud supported protocol to enable secure data reading from the isolated smart meters. The protocol mainly consists of two steps. First, an asymmetric key based authentication is designed for the reader-cloud authentication. Then, the cloud assists the meter reader to generate a new one-time symmetric key which is shared with the smart meter. Second, a symmetric key based authentication is designed for the reader-meter authentication. Security analysis shows that our protocol is reliable under most typical attacks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective online scheme for detecting Android malware","authors":"Shuang Liang, Xiaojiang Du, C. C. Tan, Wei Yu","doi":"10.1109/ICCCN.2014.6911740","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911740","url":null,"abstract":"The growing popularity of Android-based smart-phones have led to the rise of Android based malware. In particular, profit-motivated malware is becoming increasingly popular in Android malware distribution. These malware typically profit by sending premium-rate SMS messages and/or make premium-rate phone calls from infected devices without user consent. In this paper, we investigate the telephony framework of the Android operating system and propose a novel process user-identification (UID) based online detection scheme. Our scheme can effectively detect premium-rate and background SMS messages as well as premium-rate phone calls initiated by malware. We implemented our detection system on a Samsung Google Nexus 4 running Android Jelly Bean and tested the effectiveness of detecting real malware from Android markets. The experimental results show that our scheme is efficient and effective in detecting background messages and premium-rate messages and phone calls. Our scheme can detect and block all the background and premium-rate SMS messages and phone calls initiated by popular malware.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quangang Li, Jinqiao Shi, Tingwen Liu, Li Guo, Zhiguang Qin
{"title":"A probabilistic approach towards modeling email network with realistic features","authors":"Quangang Li, Jinqiao Shi, Tingwen Liu, Li Guo, Zhiguang Qin","doi":"10.1109/ICCCN.2014.6911760","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911760","url":null,"abstract":"Email plays a very important role in our daily life. Much work have been put into practice on email network. Those studies mostly require real email network datasets and reliable models to analyze user information and understand the mechanisms of network evolution. However, much research work is constrained by the absence of real large-scale email datasets. Although email communication is ubiquitous, there are very few large-scale available email datasets satisfied different research purposes. Due to privacy policy and restricted permissions, it is arduous to collect a real large-scale email dataset in a short time. Various social network models are usually used to create synthetic email networks. However, these models focus on modeling several structural properties of network without considering user behaviour patterns. They are not appropriate to generate large-scale realistic synthetic email network datasets. Towards this end, we propose a probabilistic model by which we can construct large-scale synthetic email datasets with a small captured email log. What is more important is that the generated synthetic dataset matches real email network properties and individual communication patterns. Moreover, it has linear complexity, and can be paralleled easily. Experimental results on Enron dataset demonstrate the above benefits of our model.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An online mechanism for dynamic instance allocation in reserved instance marketplace","authors":"Min Yao, Chuang Lin","doi":"10.1109/ICCCN.2014.6911763","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911763","url":null,"abstract":"As one of the pricing model offered by Amazon, reserved instance enables users to reserve capacities for their EC2 instances and lowers their average instance cost. To attract more users to adopt the reserved instance, Amazon has provided a platform named Reserved Instance Marketplace to give users the flexibility to sell the remainder of their reserved instances as their needs change. However, the present trading mechanism inside the Reserved Instance Marketplace requires the reserved instance sellers to sell their reserved capacities at month level and set the upfront fee by themselves, which is not flexible enough and hard for an inexperienced seller to specify a suitable upfront fee. To address this problem, this paper proposes an online mechanism for the Reserved Instance Marketplace. Our online mechanism tries to maximize the sellers' revenue by dynamically allocating the reserved capacities among various buyers without the need of specifying upfront fee in advance. The competitive ratio of the online allocation algorithm inside our mechanism is proved to be within a small constant factor of optimal competitive ratio in theory. To evaluate the performance of our online mechanism, we conduct simulations on synthetic data and real data trace from one of Google clusters. The simulation results show that our online mechanism can achieve at least 55% of the offline optimal algorithm in most cases.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}