Robert Wenger, Xiru Zhu, J. Krishnamurthy, Muthucumaru Maheswaran
{"title":"A Programming Language and System for Heterogeneous Cloud of Things","authors":"Robert Wenger, Xiru Zhu, J. Krishnamurthy, Muthucumaru Maheswaran","doi":"10.1109/CIC.2016.033","DOIUrl":"https://doi.org/10.1109/CIC.2016.033","url":null,"abstract":"Cloud of Things (CoT) is a computing model that combines the widely popular cloud computing with Internet of Things (IoT). One of the major problems with CoT is the latency of accessing distant cloud resources from the devices, where the data is captured. To address this problem, paradigms such as fog computing and Cloudlets have been proposed to interpose another layer of computing between the clouds and devices. Such a three-layered cloud-fog-device computing architecture is touted as the most suitable approach for deploying many next generation ubiquitous computing applications. Programming applications to run on such a platform is quite challenging because disconnections between the different layers are bound to happen in a large-scale CoT system, where the devices can be mobile. This paper presents a programming language and system for a three-layered CoT system. We illustrate how our language and system addresses some of the key challenges in the three-layered CoT. A proof-of-concept prototype compiler and runtime have been implemented and several example applications are developed using it.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Biased Social Samples for Disaster Response: Extended Abstract","authors":"Fred Morstatter","doi":"10.1109/CIC.2016.067","DOIUrl":"https://doi.org/10.1109/CIC.2016.067","url":null,"abstract":"Social media is an important data source. Every day, billions of posts, likes, and connections are created by people around the globe. By monitoring social media platforms, we can observe important topics, as well as find new topics of discussion as they emerge. This is never more apparent than in disaster scenarios, where people post in real-time about what is unfolding on the ground. Social media posts have been used in many disaster scenarios such as Hurricane Sandy to monitor the needs of, and to relay important information to those effected. However, within this source of information there are natural forms of bias. While these platforms are critically important, the way social media platforms divulge their data can cause bias to those studying information produced on that site, and can completely skew what those studying the platform can see. This is a problem as critical information may not reach first responders, or may also be skewed when it does. We will discuss the different types of bias that can occur on social media data as well as different strategies to mitigate that bias.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Attribute Based Encryption as an Internet Service","authors":"Runhua Xu, J. Joshi","doi":"10.1109/CIC.2016.061","DOIUrl":"https://doi.org/10.1109/CIC.2016.061","url":null,"abstract":"Internet enabled services and technologies are changing the way we use and manage massive amounts of data. More and more users and organizations are increasingly relying on cloud storage services for data management. In such Internet enabled environments, protecting sensitive data is increasingly becoming very crucial. Attribute-based Encryption (ABE) based approaches have been recognized as very promising for data protection in such environments. ABE approaches support data confidentiality and fine-grained access control in Internet-based environments, which include Internet of things (IoTs) and a plethora of heterogeneous mobile devices that enable large scale applications. However, in IoTs and mobile applications the limited computational resources and finite battery power of devices make it very difficult to use ABE schemes because of their heavy computational requirements. Although outsourced computational techniques have been applied in partial ABE schemes to address such issues, a unified platform that supports all aspects of data protection in an Internet-based open environment as well as fast cryptographic operations and decentralized authorities, etc., is still lacking. In this paper, we propose a novel Attribute Based Encryption as a Service (ABEaaS) that can be leveraged for data protection in the Internet environments. We propose an ABEaaS framework that can be easily deployed and present related security and performance analysis.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin
{"title":"TrustZone Explained: Architectural Features and Use Cases","authors":"Bernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin","doi":"10.1109/CIC.2016.065","DOIUrl":"https://doi.org/10.1109/CIC.2016.065","url":null,"abstract":"ARM TrustZone is a hardware security extension technology, which aims to provide secure execution environment by splitting computer resources between two execution worlds, namely normal world and secure world. TrustZone is supported on different flavors of ARM architectures, that include architecture deployed on targets running regular applications, such as mobile devices and architecture for micro-controllers. As ARM is widely deployed on the majority of mobile and micro-controller devices, TrustZone's goal is to provide security for those platforms. In this paper, we will discuss details of different ARM architectures that support TrustZone technology. Then, we will review how TrustZone is implemented in the hardware and software of ARM products. We will also compare TrustZone with other implementations of trusted execution environments on the market.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131907608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social-PPM: Personal Experience Sharing and Recommendation","authors":"A. Ngu, Shawn Fang, Helen Paik","doi":"10.1109/CIC.2016.018","DOIUrl":"https://doi.org/10.1109/CIC.2016.018","url":null,"abstract":"The rise in popularity of various social network applications has brought the opportunities for Internet users to share and reuse a plethora of things like images, videos, datasets, ideas, interests, reviews etc. However, currently there is no effective way of sharing personal experiences such as the process of filing a personal income tax return or applying for a visa. We propose a social-aware process model and its implementation as a social network application that empowers users to create, to execute, and to share personal experiences within a social network at anytime and anywhere. As a social-aware process management system, it is important to have an effective recommender that predicts personal processes that a specific user may not be aware of and yet have the opportunity to enhance his/her life experiences. We adapt an existing collaborative filtering algorithm with emphasis on social context, the interaction history, and the type of interactions in processes for effective process recommendation. The assumption is that if two users have been copying and following same processes then it is likely that those two users have similar life goals, and this would be reflected in their future usage of the system as both of them will engage in similar processes.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake","authors":"Yue Su, Z. Lan, Y. Lin, L. Comfort, J. Joshi","doi":"10.1109/CIC.2016.075","DOIUrl":"https://doi.org/10.1109/CIC.2016.075","url":null,"abstract":"It has been more than one year after the April 2015 Nepal Earthquake. Various support and aid flooded into the affected region, within the entire country and countries around the globe, with extensive media coverage and billion of dollars raised in support of relief/recover efforts. This paper presents analysis of various datasets related to this disaster, including GDELT dataset, showing the rise and fall of people's attention to this event. In addition, financial transaction flows reveal a lot about sources of funds and donations, flow of funds among various organizations or sources, and how these funds and donations have been spent or utilized for relief and recovery efforts. Surveys from citizens in affected areas along with the reconstruction dataset help us to capture the efforts of the international and local organizations and governments made on the post-earthquake relief.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Security: A Review of Current Issues and Proposed Solutions","authors":"Napoleon Paxton","doi":"10.1109/CIC.2016.066","DOIUrl":"https://doi.org/10.1109/CIC.2016.066","url":null,"abstract":"Cloud technology has revolutionized the landscape of computing in the last decade. Benefits such as reduced costs, rapid application deployment, and elastic resources, have enticed many organizations to utilize cloud resources or host much of their data in the cloud. Recent studies have shown that over 70 percent of the world's businesses now operate at least some of their operations in the cloud, with many more expected to join in the coming years. In the past, security concerns deterred many organizations from using cloud computing services. In this paper a review of three critical cloud security threats is discussed, with the purpose of determining if the new widespread adoption of cloud computing is due to advances in security. The review revealed that although new security technologies have been introduced, many issues concerning the three threats are still present today. Because of this, continued widespread adoption of cloud computing will likely increase compromises until innovative techniques are created to address cloud computing threats.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, N. Adam
{"title":"Collaborative Differentially Private Outlier Detection for Categorical Data","authors":"H. Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, N. Adam","doi":"10.1109/CIC.2016.025","DOIUrl":"https://doi.org/10.1109/CIC.2016.025","url":null,"abstract":"Collaborative analytics is crucial to extract value from data collected by different organizations and stored in separate silos. However, privacy and legal concerns often inhibit the integration and joint analysis of data. One of the most important data analytics tasks is that of outlier detection, which aims to find abnormal entities that are significantly different from the remaining data. In this paper, we define privacy in the context of collaborative outlier detection and develop a novel method to find outliers from horizontally partitioned categorical data in a privacy-preserving manner. Our method is based on a scalable outlier detection technique that uses attribute value frequencies. We provide an end-to-end privacy guarantee by using the differential privacy model and secure multiparty computation techniques. Experiments on real data show that our proposed technique is both effective and efficient.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can a Government Use Social Media to Support Disadvantaged Citizens?","authors":"Cécile Paris, S. Nepal","doi":"10.1109/CIC.2016.059","DOIUrl":"https://doi.org/10.1109/CIC.2016.059","url":null,"abstract":"The Web2.0 has transformed online interactions. In particular, there are an increasing number of online support groups in which people in similar situations can offer each other both informational and emotional support. In some cases, these groups are also attended by experts who can both monitor the groups and provide tailored information. In our work, we investigated whether an online support group could be used by the government to provide support to disadvantaged citizens. We designed, implemented and deployed a secure online community, in which government staff served as moderators and information providers. The aim of the community was to provide its members with informational and emotional support, and we hoped that this support would come from both the moderators and the community members. In this paper, we present the findings of a qualitative analysis of the community forum to see if the community achieved its goal. The analysis was done by first manually annotating the forum posts for speech acts, topics and emotions. We found that the community achieved its aims. In addition, we observed that community members found the support they received welcome and useful, and, importantly, it enabled them to feel heard by the government.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black
{"title":"Towards Automated Threat Intelligence Fusion","authors":"Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black","doi":"10.1109/CIC.2016.060","DOIUrl":"https://doi.org/10.1109/CIC.2016.060","url":null,"abstract":"The volume and frequency of new cyber attacks have exploded in recent years. Such events have very complicated workflows and involve multiple criminal actors and organizations. However, current practices for threat analysis and intelligence discovery are still performed piecemeal in an ad-hoc manner. For example, a modern malware analysis system can dissect a piece of malicious code by itself. But, it cannot automatically identify the criminals who developed it or relate other cyber attack events with it. Consequently, it is imperative to automatically assemble the jigsaw puzzles of cybercrime events by performing threat intelligence fusion on data collected from heterogeneous sources, such as malware, underground social networks, cryptocurrency transaction records, etc. In this paper, we propose an Automated Threat Intelligence fuSion framework (ATIS) that is able to take all sorts of threat sources into account and discover new intelligence by connecting the dots of apparently isolated cyber events. To this end, ATIS consists of 5 planes, namely analysis, collection, controller, data and application planes. We discuss the design choices we made in the function of each plane and the interfaces between two adjacent planes. In addition, we develop two applications on top of ATIS to demonstrate its effectiveness.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}