{"title":"IoT Standardization - The Approach in the Field of Data Protection as a Model for Ensuring Compliance of IoT Applications?","authors":"K. Stuurman, Irene Kamara","doi":"10.1109/W-FiCloud.2016.74","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.74","url":null,"abstract":"The IoT applications will have an unprecedented influence on our private and professional lives. IoT promises, next to advanced machine-to-machine interaction, delivery of a next level of man-to-machine communication based on a smart, global communications infrastructure. One of the characteristics setting the IoT apart is a broad range of critical issues that can be associated with the use, and hence development of IoT applications. Next to data protection and security issues, this could include ethics, responsibility, liability, insurance, accountability and autonomy, to issues relating to conditions for market access. To the extent standards play a role, it is of utmost importance to choose the right regulatory model, given the fundamental issues at stake. The existing New Approach, being the dominant regulatory model for applying standards in relation to EU product legislation, has been criticized for lacking legitimacy of standard-setting procedures and lacking judicial review. The global nature of IoT standardization will put further pressure on the role of the European Standardization System and give rise to further concerns regarding these issues. Recently, the General Data Protection Regulation, a legal instrument to regulate the processing of personal data, was adopted in the European Union. The Regulation endorses standardization, both explicitly and implicitly, but in a different way from the New Approach model. One could speak of a 'data protection model' in that respect, given the 'sensitive' nature of data protection on the one hand and ethics, liability, accountability issues in the IoT context on the other, the new model might prove to be appropriate for using standards in regulating those critical issues as well.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Ghafir, Václav Přenosil, Jakub Svoboda, Mohammad Hammoudeh
{"title":"A Survey on Network Security Monitoring Systems","authors":"Ibrahim Ghafir, Václav Přenosil, Jakub Svoboda, Mohammad Hammoudeh","doi":"10.1109/W-FiCloud.2016.30","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.30","url":null,"abstract":"Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time, productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. There are several approaches to network security monitoring. This paper provides the readers with a critical review of the prominent implementations of the current network monitoring approaches.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124017853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. A. Sarraj, Khalid M. Kahloot, Ashraf Y. A. Maghari, Mahmoud M. Abu-Ghosh
{"title":"A Social Network Analysis of Tweets during the Gaza War, Summer 2014","authors":"W. A. Sarraj, Khalid M. Kahloot, Ashraf Y. A. Maghari, Mahmoud M. Abu-Ghosh","doi":"10.1109/W-FiCloud.2016.54","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.54","url":null,"abstract":"The platforms of social Networks play a growing role in influencing the public opinion. In addition, social Networks can describe the reaction of communities towards the reigning conflicts in the world. As a matter of fact, analysis of Social Networks has been used widely for a better understanding how communities address prominent and influential events. As for Twitter, it has used as a platform for exchanging opinions and showing support for either of parties of a conflict. For instance, Twitter witnessed trending of hashtags such as #Gazawar #GazaUnderAttack or #IsraelUnderFire. In this paper, we discuss the role of Social Networks, particularly Twitter, in influencing the Israeli war on Gaza Strip - Palestine during summer 2014. This study shows the mode of public opinion and its reflections on what is trending on Twitter. We construct a dataset drawn from Social Networks sources to examine the behavior of Israeli, Palestinian and foreigner universe. Moreover, we analyze the dataset including tweets as reactions to Gaza War 2014. The results illustrate the important insight of the Social Networks. As regards influencing, it affects perspective of the international universe as well how they address the conflict.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114895917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spar(k)ql: SPARQL Evaluation Method on Spark GraphX","authors":"G. Gombos, G. Rácz, A. Kiss","doi":"10.1109/W-FiCloud.2016.48","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.48","url":null,"abstract":"RDF is a flexible data representation model. Due to its flexibility and simplicity it has become a popular framework, hence the amount of RDF data is increasing fast. Querying massive amount of data is a serious challenge in general and it is true for RDF data as well. In this paper we investigating how to evaluate SPARQL queries on a distributed system. We propose a novel method for evaluating SPARQL queries using the GraphX graph analytical tool. GraphX is built on the top of Spark that is an in-memory data processing system for distributive computation. With this tool we managed to utilize the graph-like structure of the RDF statements which are in form of subject-predicate-object.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors","authors":"M. Iqbal, M. Bayoumi","doi":"10.1109/W-FiCloud.2016.70","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.70","url":null,"abstract":"Secrecy and integrity of communication, as well as the authenticity of messages must be ensured by the security primitives and is critical element in Internet of Things (IoT). Devices in IoT applications such as smart healthcare applications deal with sensitive data of our health and daily lives and thus can execute malicious actuating commands with serious safety consequences. Therefore, it is important to ensure secure communication channel establishment among the medical sensors or devices and the remote servers. In this work, we propose a novel authentication and key agreement protocol that is lightweight for resource-constrained sensors and suitable to protect sensitive health related data in the context of IoT. The protocol is based on cooperation by offloading the heavy cryptographic functions of resource-constrained sensors to the trustful neighboring sensors. This trust verification is ensured by finding the data correlations from the data of embedded accelerometers in the smartphone acting as gateway and the sensors installed on the body. Security analysis and performance evaluation results show that the proposed protocol is secure and is energy efficient.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123702805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlation of Weather and Moods of the Italy Residents through an Analysis of Their Tweets","authors":"G. Modoni, Davide Tosi","doi":"10.1109/W-FiCloud.2016.53","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.53","url":null,"abstract":"In the last years there has been a strong interest in the aggregated data extracted from social networks such as Twitter, Facebook or Instagram, whose contents provide streams of information about the users' behavior. Analyzing these large data sets reveals trends that can be utilized in various fields. An interesting field of application of these data is presented in this paper, which illustrates an approach to perform a psycholinguistic analysis of the Twitter contents written in Italian language by Italy residents. In this way the predisposition of the latter to mental disorders such as the depression can be in particular measured. Moreover, the results of this analysis can be then correlated with the conditions of the weather in order to understand whether the correlation between weather and health is a common cliché or it can be demonstrated in some way e.g. through a mathematical relationship.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimised QoS-Aware DBA Mechanisms in XG-PON for Upstream Traffic in LTE Backhaul","authors":"Jerome A. Arokkiam, Kenneth N. Brown, C. Sreenan","doi":"10.1109/W-FiCloud.2016.79","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.79","url":null,"abstract":"Passive Optical Networks (PON) are viewed as an attractive choice to provide flexible and cost-efficient backhaul for Long Term Evolution (LTE) cellular base stations (eNB). PONs, such as the 10-Gigabit capable PON (XG-PON), use a Dynamic Bandwidth Allocation (DBA) mechanism to multiplex the shared upstream medium between competing sending nodes. Due to the complex definitions of QoS for DBA in XG-PON, it is a challenge for the XG-PON to respect the Quality of Service (QoS) requirements for different aggregated upstream applications in the LTE backhaul, in particular voice, live video and best-effort Internet traffic. In this paper, we first evaluate two recent XG-PON-standard-compliant DBAs - XGIANT and Efficient Bandwidth Utilisation (EBU) - for mean queuing-delay performance, with regard to priority and fairness, when the realistically-generated upstream voice, video and best-effort applications are aggregated at the evolved Node B (eNB) in LTE. We show that neither XGIANT nor EBU satisfy the priority and fairness requirements for mean queuing-delay. We propose and evaluate two optimised DBAs - Deficit XGIANT (XGIANT-D) and Proportional XGIANT (XGIANT-P). Our evaluations of the optimised DBAs, in the ns-3 network simulator, show that both XGIANT-D and XGIANT-P are able to ensure strictly prioritised, low and fair mean-queuing-delays for eNB-aggregated voice, video and best-effort traffic in two loaded conditions in XG-PON upstream. XGIANT-D and XGIANT-P, when compared with XGIANT and EBU, also ensure lower packet losses for eNB-aggregated upstream traffic in the XG-PON-based LTE backhaul.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Microblogging Hash Tag Recommendation System Based on Semantic TF-IDF: Twitter Use Case","authors":"M. S. Tajbakhsh, J. Bagherzadeh","doi":"10.1109/W-FiCloud.2016.59","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.59","url":null,"abstract":"Limitation in the number of characters in microblogging systems, such as Twitter, forces users to use various terms for the same meaning, object, or concept. Sometimes the same term is used in a shorter form (e.g. #friend and #frnd) in a tweet. This problem makes finding similarities between such tags and their corresponding tweets harder. The classical text mining methods cannot be used efficiently in the short tweets. Thus tweets similarity and subsequently tag recommendation, as one of the problems in microblogging social networks, needs a new method with higher efficiency. In this paper we have defined a new semantic based method to find similarities among short messages. We have modeled each short message as a semantic vector which can be used along with any similarity method such as cosine similarity. Then we evaluated the accuracy of the new semantic similarity based tag recommendation system using various semantic based algorithms and compare their results. The semantic based algorithms used are: Shortest Path, Wu & Palmer, Lin, JiangConrath, Resnik, Lesk, LeacockChodorow, and Hirst-StOnge. Results are evaluated using 8396744 real English tweets and show around 6 times improvement in accuracy over normal TF-IDF.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AffinityFinder: A System for Deriving Hidden Affinity Relationships on Twitter Utilizing Sentiment Analysis","authors":"A. Rezgui, Daniel Fahey, Ian Smith","doi":"10.1109/W-FiCloud.2016.52","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.52","url":null,"abstract":"Twitter is one of the largest and most popular social networking sites. While it has many interesting features, Twitter has no direct way to determine the relationship status between users. For example, unlike other social networks (e.g., Facebook), Twitter does not have any features for marking users as friends. In this paper, we present AffinityFinder, a system for automatically inferring potential friendship relationships (in terms of affinity) amongst Twitter users. The system collects and analyzes tweets to derive relationship scores that reflect affinity degrees amongst Twitter users. We implemented our tool using the TextBlob Python text processing library and the MongoDB database. Our evaluation shows that the system is able to derive potential friendship relationships with high accuracy. This system could provide useful data both to users and companies.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provable Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol","authors":"A. Farouk, M. Fouad","doi":"10.1109/W-FiCloud.2016.32","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.32","url":null,"abstract":"Security and efficiency are the main grid authentication protocols objectives. Practical efficient certificate-less public key cryptography-based authentication protocol is widely acknowledged as a challenging issue in grid computing environment. Unfortunately, certificate-less authenticated key agreement protocols rely on bilinear pairing that is extremely computational expensive. A recently published protocol claims meeting some attacks, however, there are some shortcomings in such a protocol. In this paper, such a competing protocol is mathematically criticized. Then, a secure and efficient grid pairing-free certificate-less two-party authenticated key agreement protocol is proposed for grid computing. Finally, the proposed protocol is mathematically proved as secure and efficient in the Lippold model, a very strong security model, under the gap Diffie-Hellman assumption.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}