{"title":"Best of two worlds: Secure cloud federations meet eIDAS","authors":"Thomas Zefferer, Dominik Ziegler, Andreas Reiter","doi":"10.23919/ICITST.2017.8356430","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356430","url":null,"abstract":"The federation of information technology (IT) systems is a common approach to bundle capabilities and get the best results for all participants. Cloud computing and electronic identity (eID) are only two out of many domains, for which federated solutions have been a topic of scientific and corporate interest during the past years. Recently, the H2020 project SUNFISH has introduced a new cloud-federation approach called ‘Federation as a Service’ (FaaS). FaaS enables secure cloud federations, where data owners remain in full control of their data and workflows. In this paper, we identify shortcomings of the FaaS approach in terms of secure and reliable user authentication. In this sense, data security and protection mechanisms are only as good as the applied authentication measures. We solve this issue by proposing the integration of an existing pan-European federation of national eID systems into FaaS. This increases security guarantees of FaaS by using a trustworthy and liable eID solution that has a strong legal basis in the form of the EU eIDAS Regulation. A first successful implementation and deployment of the proposed solution demonstrates its feasibility and shows the great potential of combining federation solutions from the cloud domain and the eID domain.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models","authors":"Deepak Janardhanan, E. Barrett","doi":"10.23919/ICITST.2017.8356346","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356346","url":null,"abstract":"The advent of Data Science has led to data being evermore useful for an increasing number of organizations who want to extract knowledge from it for financial and research purposes. This has triggered data to be mined at an even faster pace causing the rise of Data Centers that host over thousands of machines together with thousands of jobs running in each of those machines. The growing complexities associated with managing such a huge infrastructure has caused the scheduling management systems to be inefficient at resource allocation across these machines. Hence, resource usage forecasting of machines in data centers is a growing area for research. This study focuses on the Time Series forecasting of CPU usage of machines in data centers using Long Short-Term Memory (LSTM) Network and evaluating it against the widely used and traditional autoregressive integrated moving average (ARIMA) models for forecasting. The final LSTM model had a forecasting error in the range of 17–23% compared to ARIMA model's 3742%. The results clearly show that LSTM models performed more consistently due to their ability to learn non-linear data much better than ARIMA models.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring darknet activities by using network telescope","authors":"Shaikha AlShehyari, C. Yeun, E. Damiani","doi":"10.23919/ICITST.2017.8356360","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356360","url":null,"abstract":"Today, many hosts are connected to the Internet worldwide. Those hosts are intentionally or even accidentally targeted in a daily basis by malicious activities. Thus, it is essential to monitor Internet traffic in order to acquire the knowledge of the threats that is targeting computers and network systems. Security experts initiated numerous approaches for monitoring traffic that includes malicious activities, and network telescope was one of them. Network telescopes are valuable in the term of monitoring and gathering data associated with Internet attack activities. Analysis of traffic captured by network telescopes has been shown as an effective measure in characterizing evil traffic caused by worm propagation and distributed denial of service attacks. This paper will discuss monitoring traffic coming from Darknet using network telescope. Additionally, we will identify the security issues and threats introduced if no monitored device is placed within a network infrastructure. The objective of this paper is to introduce the effect of such a technology on entities, provide successful solution, and encourage future research in this area of interest.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight signcryption scheme based on discrete Chebyshev maps","authors":"Ta Thi Kim Hue, T. Hoang, An Braeken","doi":"10.23919/ICITST.2017.8356343","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356343","url":null,"abstract":"Signcryption schemes are cryptographic mechanisms providing both encryption and signing in a very efficient way. This paper presents a lightweight signcryption scheme based on Chebyshev chaotic maps over finite fields. For that, complex dynamic properties of the Chebyshev map are investigated and shown to be adequate for the construction of a signcryption scheme. The proposed signcryption scheme is proven to be secure for both outsider and insider attacks. Moreover, its computational cost is low, and the lower hardware complexity in compared with others based on elliptic curves.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129304677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing cyber security awareness with mobile games","authors":"F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki","doi":"10.23919/ICITST.2017.8356361","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356361","url":null,"abstract":"The ever-increasing threats on cybersecurity has consequently increased the need for enhanced awareness about cybersecurity and its various threats among public. This paper presents the design aspects of the two mobile gaming applications including Malware Guardian game, and Password Protector game. Further, different mobile games concept developed during the course of the study is also presented. The malware Guardian was aimed at educating the users about different security threats, security issues, the risks associated with it and the tools to be used for preventing these attacks. The Password Protector is aimed at educating the users about the need for creating strong and complex passwords, remembering and changing them frequently. Both the games are in the final phase of design, and will be developed once the design specifications are outlined. The major design aspects of the two gaming applications are presented in this paper, which are carefully crafted after a peer review of functions and technologies to be associated with.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance vs. security: Implementing an immutable database in MySQL","authors":"Thomas Nash, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356402","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356402","url":null,"abstract":"Maintaining transactional history is crucial to unraveling the changes any unauthorized user makes to a system, and this logging database is often a prime target for attackers. One common approach to maintaining this security is through an immutable database. There are many ways to implement such a database which maintains appropriate security requirements, each ranging in the complexity and effort required to configure. What remains constant amongst all the methods is that the database is available only to a restricted, defined set of users and that records may only be inserted and not updated or deleted to maintain a proper history. We demonstrate two of these methods in the MySQL database system and compare performance and capabilities amongst them.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile business performance metrics: Framework and case study","authors":"Ahyoung Kim, Junwoo Lee","doi":"10.23919/ICITST.2017.8356372","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356372","url":null,"abstract":"The increases in mobile-phone users changed paradigms in mobile business and extended business area and its applications. Therefore, various attempts have been made to succeed in mobile business. In this study, performance indicators for measuring business performance are proposed, also using proposed performance indicators framework for analyzing usage-focused mobile business is suggested. Based on the characteristics of mobile business, performance indicators are classified to Customer Retention and Product Engagement. The customer's usage data automatically collected from mobile application is analyzed by 2 performance indicators. In this paper, we will suggest the mobile business analysis framework for performance indicators, and introduce the result of analysis through case-study. The suggestion and mobile business analysis framework from this study support decision making in mobile business area such as mobile marketing and mobile commerce.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection","authors":"F. Ernawan, M. Kabir, Z. Mustaffa","doi":"10.23919/ICITST.2017.8356354","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356354","url":null,"abstract":"This work presents a blind watermarking technique based on a psychovisual threshold for a robust copyright protection. Psychovisual threshold can provide a trade-off between imperceptibility and robustness of the watermark. This paper proposes a new watermarking scheme where watermarks are embedded on some selected coefficients of DCT frequencies considering psychovisual threshold. The embedding regions are determined using a modified entropy to indicate less distortion areas. Furthermore, the watermark image is scrambled before embedding to provide additional security. The proposed scheme is tested under different types of signal-processing and geometric attack. The experimental results show that our scheme produces higher imperceptibility and robustness of the watermark than the existing schemes.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj
{"title":"On blockchain-based authorization architecture for beyond-5G mobile services","authors":"S. Kiyomoto, A. Basu, Mohammad Shahriar Rahman, S. Ruj","doi":"10.23919/ICITST.2017.8356363","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356363","url":null,"abstract":"This paper proposes a new conceptual architecture for authorization of mobile services based on blockchain technologies, and presents a design of procedures for heterogeneous mobile communication services. Furthermore, an extension of the procedures is considered in order to enhance privacy protection for users. The new architecture realizes the separation of mobile communication infrastructure and billing functions and multiple use of several mobile communication services under a single contract with a billing operator.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluate action primitives for human activity recognition using unsupervised learning approach","authors":"Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356374","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356374","url":null,"abstract":"Smartphones and wearable devices are in the frontlines when it comes to the field of Human Activity Recognition (HAR). There have been numerous attempts to use motion sensors in smartphones and wearables to recognize human activity. Most of these studies apply supervised learning techniques, which requires them to use labeled datasets. In this work, we take a sample of these labels, or action primitives (sit, stand, run, walk, jump, lie down), and evaluate them against the resulting labels of several clustering algorithms. We built two datasets (labeled and unlabeled) using accelerometer, gyroscope, and pedometer readings from two fixed-position devices, a smartphone in the side pocket, and a smartwatch strapped onto the left-hand wrist. Ultimately, we want to determine whether these action primitives commonly used in HAR are optimal, and suggest a better set of primitives if not.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}