BigDataSecurity/HPSC/IDSPub Date : 1900-01-01DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00008
Cheng Zhang, Keke Gai, Jihe Wang
{"title":"Message from the Program Chairs HPSC 2022","authors":"Cheng Zhang, Keke Gai, Jihe Wang","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00008","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00008","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang
{"title":"A Trust Model for Secure and Reliable Cloud Service Systems","authors":"Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang","doi":"10.1109/BDS/HPSC/IDS18.2018.00032","DOIUrl":"https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00032","url":null,"abstract":"With the ever-increasing popularity of cloud computing technology, many enterprises and organizations have migrated their business applications to the cloud platform, thus forming a cloud service system that hosts various cloud services. A user can browse, select and invoke his/her interested services from the cloud service system and rate the service quality through online feedback or ratings. Such user ratings contribute much to the healthy running of the cloud service system. However, the fake ratings from potential malicious users can affect the fairness of cloud service system's trust model negatively and severely, even misleading the future users' service selection decisions. Therefore, it is becoming a necessity to build a find-grained trust model that can effectively punish the malicious ratings, for the security and reliability of the cloud service system. In view of this challenge, in this paper, we put forward a novel punishment approach for malicious ratings based on three criteria, i.e., cost, profit and risk. More concretely, we analyze each criterion as well as its influencing factors and put forward a unified model that integrates the three criteria quantitatively.","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
BigDataSecurity/HPSC/IDSPub Date : 1900-01-01DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00010
Han Qiu, Luna Li, L. Kong
{"title":"Message from the Program Chairs IDS 2022","authors":"Han Qiu, Luna Li, L. Kong","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00010","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00010","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. A. Kumari, G. Sadasivam, S. Gowri, S. A. Akash, E. G. Radhika
{"title":"An Approach for End-to-End (E2E) Security of 5G Applications","authors":"K. A. Kumari, G. Sadasivam, S. Gowri, S. A. Akash, E. G. Radhika","doi":"10.1109/BDS/HPSC/IDS18.2018.00038","DOIUrl":"https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00038","url":null,"abstract":"As 5G transitions from an industrial vision to a tangible, next-generation mobile technology, security remains key business driver. Heterogeneous environment, new networking paradigms and novel use cases makes 5G vulnerable to new security threats. This in turn necessitates a flexible and dependable security mechanism. End-to-End (E2E) data protection provides better security, avoids repeated security operations like encryption/decryption and provides differentiated security based on the services. E2E security deals with authentication, integrity, key management and confidentiality. The attack surface of a 5G system is larger as 5G aims for a heterogeneous networked society. Hence attack resistance needs to be a design consideration when defining new 5G protocols. This framework has been designed for accessing the manifold applications with high security and trust by offering E2E security for various services. The proposed framework is evaluated based on computation complexity, communication complexity, attack resistance rate and security defensive rate. The protocol is also evaluated for correctness, and resistance against passive, active and dictionary attacks using random oracle model and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
BigDataSecurity/HPSC/IDSPub Date : 1900-01-01DOI: 10.1109/BigDataSecurityHPSCIDS54978.2022.00006
Yonghao Wang, Shui Yu, Yongxin Zhu
{"title":"Message from the Program Chairs BigDataSecurity 2022","authors":"Yonghao Wang, Shui Yu, Yongxin Zhu","doi":"10.1109/BigDataSecurityHPSCIDS54978.2022.00006","DOIUrl":"https://doi.org/10.1109/BigDataSecurityHPSCIDS54978.2022.00006","url":null,"abstract":"","PeriodicalId":404434,"journal":{"name":"BigDataSecurity/HPSC/IDS","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}