{"title":"Developing a Conceptual National Information Sharing Security Framework to Combat Cybercrimes in Jordan","authors":"Mohammad A. A. Alhawamdeh","doi":"10.1109/CSCloud.2017.57","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.57","url":null,"abstract":"from the viewpoint of new malicious code signatures, Symantec created 2,895,802, Countermeasures against these cyber security threats. Consequently, an organization in one country may be attacked by malware whose countermeasures are already known and implemented within another organization in another country. Such incidents occur due to the lack of exchanging of information among organizations. This paper aims to develop a framework for information-sharing policy in order to combat cybercrime, on the national institutions level not the general public and it must not be burdensome to participate in the information sharing framework.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
{"title":"Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC","authors":"Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya","doi":"10.1109/CSCloud.2017.47","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.47","url":null,"abstract":"Searchable Symmetric Encryption (SSE) is a technique to securely outsource the data, which is encrypted using symmetric key primitives, while maintaining search functionality. While several solutions have been proposed to realize SSE over various data structures, the efficient solution using inverted index is due to Curtmola et.al. Hwang et.al. introduced a SSE scheme based on bitmaps in order to reduce the index size. In this paper, we consider Searchable Symmetric Encryption (SSE) in the presence of a Semi-Honest-But-Curious Cloud Service Provider (SHBC-CSP). We have defined a new security notion for SSE in presence of SHBC-CSP, contrived two new SSE schemes and proved their security formally in the proposed security notion. Dynamic Verifiable Encrypted Keyword Search (DVSSE), is the first SSE scheme to the best of our knowledge, which is both dynamic and verifiable. We have implemented our schemes, compared their performance and complexity with existing schemes.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CIRA Perspective on Risks Within UnRizkNow — A Case Study","authors":"V. Agrawal, Adam Szekeres","doi":"10.1109/CSCloud.2017.14","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.14","url":null,"abstract":"UnRizkNow is a community of practice for cyber security practitioners in Norway. It is imperative for the establishment of UnRizkNow to identify the underlying risks that can affect the normal operation of the community. This paper presents a study to carry out a risk assessment of UnRizkNow CoP using conflicting incentives risk analysis (CIRA) method. The main contribution of this research work is to identify and analyze the risks that can be obtained from the conflicts in the incentives of members and organizer in UnRizkNow. This paper also presents risk treatment plan regarding incentives as suggested by CIRA method. The findings of this study are helpful to establish UnRizkNow community, and also for the researchers who want to analyze human risks in a system.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Precision and Bandwidth in Cloud Computing: Implementation of a Novel Floating-Point Format on FPGA","authors":"Junjie Hou, Yongxin Zhu, Yulan Shen, Mengjun Li, Qian Wu, Han Wu","doi":"10.1109/CSCloud.2017.22","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.22","url":null,"abstract":"Cloud computing is a type of Internet-based service computing that provides computing, storage and networking services to multiple users. With the increase of data size, computing capacity runs out quickly in cloud computing services. To fill the shortage of computation capacity, we propose to adopt variable precision by implementing unum (universal number), which is a number format different from IEEE Standard for Floating-Point Arithmetic - IEEE 754 floats. Compared with IEEE 754 floats, the outstanding features of unum are clearance of rounding errors, high information-per-bit and variable precision. As a candidate replacement of IEEE 754 floats, the application of unum can improve the precision in computing, decrease the bit width for high precision numbers. However, unum was only implemented in software model before due to technical complexity, in order to validate the performance on chip, we implement this arithmetic on FPGA for the first time. We also implement an unum based 16-point FFT on FPGA. We validate the design and compare the bit width in computing with IEEE 754 floats, evaluate the power dissipation on FPGA. The experimental results of comparison show that unum arithmetic can ensure correctness even in some extreme arithmetic cases in which IEEE 754 floats cannot work properly, furthermore the bit width of unum is much less than IEEE 754 floats in the same precision.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Thayananthan, O. Abdulkader, K. Jambi, A. Bamhdi
{"title":"Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments","authors":"V. Thayananthan, O. Abdulkader, K. Jambi, A. Bamhdi","doi":"10.1109/CSCloud.2017.32","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.32","url":null,"abstract":"Industrial networking has many issues based on the type of industries, data storage, data centers, and cloud computing, etc. Green data storage improves the scientific, commercial and industrial profile of the networking. Future industries are looking for cybersecurity solution with the low-cost resources in which the energy serving is the main problem in the industrial networking. To improve these problems, green data storage will be the priority because data centers and cloud computing deals with the data storage. In this analysis, we have decided to use solar energy source and different light rays as methodologies include a prism and the Li-Fi techniques. In this approach, light rays sent through the prism which allows us to transmit the data with different frequencies. This approach provides green energy and maximum protection within the data center. As a result, we have illustrated that cloud services within the green data center in industrial networking will achieve better protection with the low-cost energy through this analysis. Finally, we have to conclude that Li-Fi enhances the use of green energy and protection which are advantages to current and future industrial networking.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122094082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arya Sahadevan, D. Mathew, Jairam Mookathana, B. Jose
{"title":"An Offline Online Strategy for IoT Using MQTT","authors":"Arya Sahadevan, D. Mathew, Jairam Mookathana, B. Jose","doi":"10.1109/CSCloud.2017.34","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.34","url":null,"abstract":"Internet of Things is capturing attention of consumer and enterprise electronics market with rapid implementations in home automation, smart cities, etc. Several power efficient, low cost sensors have been made available to developers to build these applications. A common theme here is the mode of communication where the computationally intensive work is being done at server side and the sensor-actuator work in done at client side. This requires networking infrastructure to be robust which is not the case across the world. To reduce the risk of failure, we propose an offline online strategy for IoT applications where MQTT protocol is used for asynchronous communication. We implement a portable e-voting system on Intel Galileo to demonstrate the feasibility of such an extension without compromising on functionality.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Secure Storage Scheme Based on Information Fragmentation","authors":"Han Qiu, G. Memmi, H. Noura","doi":"10.1109/CSCloud.2017.44","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.44","url":null,"abstract":"In this paper, an efficient secure storage scheme is presented which aims to provide security to end-user's data while mostly storing it to public clouds. This proposed scheme is based on the invertible Discrete Wavelet Transform (DWT) to fragment data into two or three fragments with different levels of importance and protected accordingly. As a matter of fact, the most important fragment takes the smallest amount of storage space and can be stored in a user trusted area while the less important fragments take most of the storage space and are uploaded to public clouds. In order to reduce the required execution time, General Purpose Graphic Processing Unit (GPGPU) is employed for accelerating computation. Additionally, a benchmark was realized to compare between the proposed scheme and AES algorithm applied to the entire data.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128534492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang
{"title":"Fuzzing the Font Parser of Compound Documents","authors":"Hongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang","doi":"10.1109/CSCloud.2017.42","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.42","url":null,"abstract":"Currently, complex software (e.g. PDF readers) usually takes various inputs embedded with multiple objects (e.g. fonts, pictures), which may result in bugs. It is a challenge to generate suitable test cases to support fine-grained test to the PDF readers. Compared with the traditional blind fuzzing which does not utilize the information of input grammars, fuzzing with the model of the file format is an effective technique. In this paper, we leverage the structure information of the font files to select seed files among the heterogeneous fonts. A general construction method for generating suitable test cases is proposed. By this means, we can obtain test cases with low overhead. Moreover, to improve the expression ability of the font template in fuzzing PDF readers, we combine file reconstruction and template description. Our methods are evaluated on five common-used PDF readers, and proved effective in triggering crashes.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Analysis Method for Supercomputing Users’ Behavior","authors":"Guanghui Zhu, Yunhui Zeng, Meng Guo","doi":"10.1109/CSCloud.2017.19","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.19","url":null,"abstract":"Supercomputers are widely applied in various domains, which have advantage of high processing capability and mass storage. With growing supercomputing users, the system security receives comprehensive attentions, and becomes more and more important. In this paper, according to the characteristics of supercomputing environment, we perform an in-depth analysis of existing security problems in the process of using resources. To solve these problems, we propose a security analysis method and a prototype system for supercomputing users' behavior. The basic idea is to restore the complete users' behavior paths and operation records based on the supercomputing business process and track the use of resources. Finally, the method is evaluated and the results show that the security analysis method of users' behavior can help administrators detect security incidents in time and respond quickly. The final purpose is to optimize and improve the security level of the whole system.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"328 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Agentless Cloud Network Monitoring","authors":"Morgan Brattstrom, Patricia Morreale","doi":"10.1109/CSCloud.2017.11","DOIUrl":"https://doi.org/10.1109/CSCloud.2017.11","url":null,"abstract":"With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable agentless system which can be configured, setup, and begin monitoring network health within minutes. The architecture utilizes a polling script to query Simple Network Monitoring Protocol (SNMP) demon for metrics, Prometheus Time Series Database instances for storage, and a Grafana Dashboard for metric presentation and alerting. The system design removes the learning curve necessary for most open source monitoring systems, while still providing similar metrics. The approach demonstrated here shows the ease and security with which specific site network monitoring can be deployed in a cloud configuration. Data from the network monitoring can be forwarded to a central analysis site for assessment and correlation. The proposed system is scalable, extensible for use in most cloud hosting environments, and provides network managers with direct control over the monitoring process and dashboard.","PeriodicalId":436299,"journal":{"name":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}