2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)最新文献

筛选
英文 中文
A Programming Language and System for Heterogeneous Cloud of Things 异构物云的编程语言与系统
Robert Wenger, Xiru Zhu, J. Krishnamurthy, Muthucumaru Maheswaran
{"title":"A Programming Language and System for Heterogeneous Cloud of Things","authors":"Robert Wenger, Xiru Zhu, J. Krishnamurthy, Muthucumaru Maheswaran","doi":"10.1109/CIC.2016.033","DOIUrl":"https://doi.org/10.1109/CIC.2016.033","url":null,"abstract":"Cloud of Things (CoT) is a computing model that combines the widely popular cloud computing with Internet of Things (IoT). One of the major problems with CoT is the latency of accessing distant cloud resources from the devices, where the data is captured. To address this problem, paradigms such as fog computing and Cloudlets have been proposed to interpose another layer of computing between the clouds and devices. Such a three-layered cloud-fog-device computing architecture is touted as the most suitable approach for deploying many next generation ubiquitous computing applications. Programming applications to run on such a platform is quite challenging because disconnections between the different layers are bound to happen in a large-scale CoT system, where the devices can be mobile. This paper presents a programming language and system for a three-layered CoT system. We illustrate how our language and system addresses some of the key challenges in the three-layered CoT. A proof-of-concept prototype compiler and runtime have been implemented and several example applications are developed using it.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using Biased Social Samples for Disaster Response: Extended Abstract 使用有偏差的社会样本进行灾难响应:扩展摘要
Fred Morstatter
{"title":"Using Biased Social Samples for Disaster Response: Extended Abstract","authors":"Fred Morstatter","doi":"10.1109/CIC.2016.067","DOIUrl":"https://doi.org/10.1109/CIC.2016.067","url":null,"abstract":"Social media is an important data source. Every day, billions of posts, likes, and connections are created by people around the globe. By monitoring social media platforms, we can observe important topics, as well as find new topics of discussion as they emerge. This is never more apparent than in disaster scenarios, where people post in real-time about what is unfolding on the ground. Social media posts have been used in many disaster scenarios such as Hurricane Sandy to monitor the needs of, and to relay important information to those effected. However, within this source of information there are natural forms of bias. While these platforms are critically important, the way social media platforms divulge their data can cause bias to those studying information produced on that site, and can completely skew what those studying the platform can see. This is a problem as critical information may not reach first responders, or may also be skewed when it does. We will discuss the different types of bias that can occur on social media data as well as different strategies to mitigate that bias.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Attribute Based Encryption as an Internet Service 启用基于属性的加密作为互联网服务
Runhua Xu, J. Joshi
{"title":"Enabling Attribute Based Encryption as an Internet Service","authors":"Runhua Xu, J. Joshi","doi":"10.1109/CIC.2016.061","DOIUrl":"https://doi.org/10.1109/CIC.2016.061","url":null,"abstract":"Internet enabled services and technologies are changing the way we use and manage massive amounts of data. More and more users and organizations are increasingly relying on cloud storage services for data management. In such Internet enabled environments, protecting sensitive data is increasingly becoming very crucial. Attribute-based Encryption (ABE) based approaches have been recognized as very promising for data protection in such environments. ABE approaches support data confidentiality and fine-grained access control in Internet-based environments, which include Internet of things (IoTs) and a plethora of heterogeneous mobile devices that enable large scale applications. However, in IoTs and mobile applications the limited computational resources and finite battery power of devices make it very difficult to use ABE schemes because of their heavy computational requirements. Although outsourced computational techniques have been applied in partial ABE schemes to address such issues, a unified platform that supports all aspects of data protection in an Internet-based open environment as well as fast cryptographic operations and decentralized authorities, etc., is still lacking. In this paper, we propose a novel Attribute Based Encryption as a Service (ABEaaS) that can be leveraged for data protection in the Internet environments. We propose an ABEaaS framework that can be easily deployed and present related security and performance analysis.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TrustZone Explained: Architectural Features and Use Cases TrustZone解释:架构特性和用例
Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin
{"title":"TrustZone Explained: Architectural Features and Use Cases","authors":"Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin","doi":"10.1109/CIC.2016.065","DOIUrl":"https://doi.org/10.1109/CIC.2016.065","url":null,"abstract":"ARM TrustZone is a hardware security extension technology, which aims to provide secure execution environment by splitting computer resources between two execution worlds, namely normal world and secure world. TrustZone is supported on different flavors of ARM architectures, that include architecture deployed on targets running regular applications, such as mobile devices and architecture for micro-controllers. As ARM is widely deployed on the majority of mobile and micro-controller devices, TrustZone's goal is to provide security for those platforms. In this paper, we will discuss details of different ARM architectures that support TrustZone technology. Then, we will review how TrustZone is implemented in the hardware and software of ARM products. We will also compare TrustZone with other implementations of trusted execution environments on the market.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131907608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Social-PPM: Personal Experience Sharing and Recommendation 社会ppm:个人经验分享和推荐
A. Ngu, Shawn Fang, Helen Paik
{"title":"Social-PPM: Personal Experience Sharing and Recommendation","authors":"A. Ngu, Shawn Fang, Helen Paik","doi":"10.1109/CIC.2016.018","DOIUrl":"https://doi.org/10.1109/CIC.2016.018","url":null,"abstract":"The rise in popularity of various social network applications has brought the opportunities for Internet users to share and reuse a plethora of things like images, videos, datasets, ideas, interests, reviews etc. However, currently there is no effective way of sharing personal experiences such as the process of filing a personal income tax return or applying for a visa. We propose a social-aware process model and its implementation as a social network application that empowers users to create, to execute, and to share personal experiences within a social network at anytime and anywhere. As a social-aware process management system, it is important to have an effective recommender that predicts personal processes that a specific user may not be aware of and yet have the opportunity to enhance his/her life experiences. We adapt an existing collaborative filtering algorithm with emphasis on social context, the interaction history, and the type of interactions in processes for effective process recommendation. The assumption is that if two users have been copying and following same processes then it is likely that those two users have similar life goals, and this would be reflected in their future usage of the system as both of them will engage in similar processes.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake 跟踪2015年尼泊尔地震后的灾害响应和救援
Yue Su, Z. Lan, Y. Lin, L. Comfort, J. Joshi
{"title":"Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake","authors":"Yue Su, Z. Lan, Y. Lin, L. Comfort, J. Joshi","doi":"10.1109/CIC.2016.075","DOIUrl":"https://doi.org/10.1109/CIC.2016.075","url":null,"abstract":"It has been more than one year after the April 2015 Nepal Earthquake. Various support and aid flooded into the affected region, within the entire country and countries around the globe, with extensive media coverage and billion of dollars raised in support of relief/recover efforts. This paper presents analysis of various datasets related to this disaster, including GDELT dataset, showing the rise and fall of people's attention to this event. In addition, financial transaction flows reveal a lot about sources of funds and donations, flow of funds among various organizations or sources, and how these funds and donations have been spent or utilized for relief and recovery efforts. Surveys from citizens in affected areas along with the reconstruction dataset help us to capture the efforts of the international and local organizations and governments made on the post-earthquake relief.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud Security: A Review of Current Issues and Proposed Solutions 云安全:当前问题和建议解决方案的回顾
Napoleon Paxton
{"title":"Cloud Security: A Review of Current Issues and Proposed Solutions","authors":"Napoleon Paxton","doi":"10.1109/CIC.2016.066","DOIUrl":"https://doi.org/10.1109/CIC.2016.066","url":null,"abstract":"Cloud technology has revolutionized the landscape of computing in the last decade. Benefits such as reduced costs, rapid application deployment, and elastic resources, have enticed many organizations to utilize cloud resources or host much of their data in the cloud. Recent studies have shown that over 70 percent of the world's businesses now operate at least some of their operations in the cloud, with many more expected to join in the coming years. In the past, security concerns deterred many organizations from using cloud computing services. In this paper a review of three critical cloud security threats is discussed, with the purpose of determining if the new widespread adoption of cloud computing is due to advances in security. The review revealed that although new security technologies have been introduced, many issues concerning the three threats are still present today. Because of this, continued widespread adoption of cloud computing will likely increase compromises until innovative techniques are created to address cloud computing threats.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Collaborative Differentially Private Outlier Detection for Categorical Data 分类数据的协同差分私有离群点检测
H. Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, N. Adam
{"title":"Collaborative Differentially Private Outlier Detection for Categorical Data","authors":"H. Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, N. Adam","doi":"10.1109/CIC.2016.025","DOIUrl":"https://doi.org/10.1109/CIC.2016.025","url":null,"abstract":"Collaborative analytics is crucial to extract value from data collected by different organizations and stored in separate silos. However, privacy and legal concerns often inhibit the integration and joint analysis of data. One of the most important data analytics tasks is that of outlier detection, which aims to find abnormal entities that are significantly different from the remaining data. In this paper, we define privacy in the context of collaborative outlier detection and develop a novel method to find outliers from horizontally partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Can a Government Use Social Media to Support Disadvantaged Citizens? 政府能否利用社交媒体支持弱势公民?
Cécile Paris, S. Nepal
{"title":"Can a Government Use Social Media to Support Disadvantaged Citizens?","authors":"Cécile Paris, S. Nepal","doi":"10.1109/CIC.2016.059","DOIUrl":"https://doi.org/10.1109/CIC.2016.059","url":null,"abstract":"The Web2.0 has transformed online interactions. In particular, there are an increasing number of online support groups in which people in similar situations can offer each other both informational and emotional support. In some cases, these groups are also attended by experts who can both monitor the groups and provide tailored information. In our work, we investigated whether an online support group could be used by the government to provide support to disadvantaged citizens. We designed, implemented and deployed a secure online community, in which government staff served as moderators and information providers. The aim of the community was to provide its members with informational and emotional support, and we hoped that this support would come from both the moderators and the community members. In this paper, we present the findings of a qualitative analysis of the community forum to see if the community achieved its goal. The analysis was done by first manually annotating the forum posts for speech acts, topics and emotions. We found that the community achieved its aims. In addition, we observed that community members found the support they received welcome and useful, and, importantly, it enabled them to feel heard by the government.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated Threat Intelligence Fusion 迈向自动化威胁情报融合
Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black
{"title":"Towards Automated Threat Intelligence Fusion","authors":"Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black","doi":"10.1109/CIC.2016.060","DOIUrl":"https://doi.org/10.1109/CIC.2016.060","url":null,"abstract":"The volume and frequency of new cyber attacks have exploded in recent years. Such events have very complicated workflows and involve multiple criminal actors and organizations. However, current practices for threat analysis and intelligence discovery are still performed piecemeal in an ad-hoc manner. For example, a modern malware analysis system can dissect a piece of malicious code by itself. But, it cannot automatically identify the criminals who developed it or relate other cyber attack events with it. Consequently, it is imperative to automatically assemble the jigsaw puzzles of cybercrime events by performing threat intelligence fusion on data collected from heterogeneous sources, such as malware, underground social networks, cryptocurrency transaction records, etc. In this paper, we propose an Automated Threat Intelligence fuSion framework (ATIS) that is able to take all sorts of threat sources into account and discover new intelligence by connecting the dots of apparently isolated cyber events. To this end, ATIS consists of 5 planes, namely analysis, collection, controller, data and application planes. We discuss the design choices we made in the function of each plane and the interfaces between two adjacent planes. In addition, we develop two applications on top of ATIS to demonstrate its effectiveness.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信