首页 > 最新文献

2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)最新文献

英文 中文
QoSC: A QoS-Aware Storage Cloud Based on HDFS QoSC:基于HDFS的qos感知存储云
Bowei Yang, Guang-hua Song, Yao Zheng, Yue Wu
Storage QoS is a key issue for a storage cloud infrastructure. This paper presents QoSC, a QoS-aware storage cloud for storing massive data over the dynamic network, based on the Hadoop distributed file system (HDFS). QoSC employs a data redundancy policy based on recovery volumes and a QoS-aware data placement strategy. We consider the QoS of a storage node as a combination of the transfer bandwidth, the availability of service, the workload (CPU utilization), and the free storage space. We have deployed QoSC on the campus network of Zhejiang University, and have conducted a group of experiments on file storage and retrieval. The experimental results show that QoSC improves the performance of file storage and retrieval and balances the workload among DataNodes, by being aware of QoS of DataNodes.
存储QoS是存储云基础设施的一个关键问题。本文提出了一种基于Hadoop分布式文件系统(HDFS)的qos感知存储云,用于在动态网络上存储海量数据。QoSC采用基于恢复卷的数据冗余策略和qos感知的数据放置策略。我们认为存储节点的QoS是传输带宽、服务可用性、工作负载(CPU利用率)和可用存储空间的组合。我们在浙江大学校园网上部署了QoSC,并进行了一组文件存储和检索实验。实验结果表明,通过感知datanode的QoS, QoSC提高了文件存储和检索的性能,平衡了datanode之间的工作负载。
{"title":"QoSC: A QoS-Aware Storage Cloud Based on HDFS","authors":"Bowei Yang, Guang-hua Song, Yao Zheng, Yue Wu","doi":"10.1109/SocialSec2015.14","DOIUrl":"https://doi.org/10.1109/SocialSec2015.14","url":null,"abstract":"Storage QoS is a key issue for a storage cloud infrastructure. This paper presents QoSC, a QoS-aware storage cloud for storing massive data over the dynamic network, based on the Hadoop distributed file system (HDFS). QoSC employs a data redundancy policy based on recovery volumes and a QoS-aware data placement strategy. We consider the QoS of a storage node as a combination of the transfer bandwidth, the availability of service, the workload (CPU utilization), and the free storage space. We have deployed QoSC on the campus network of Zhejiang University, and have conducted a group of experiments on file storage and retrieval. The experimental results show that QoSC improves the performance of file storage and retrieval and balances the workload among DataNodes, by being aware of QoS of DataNodes.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"136 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121343156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach 基于位置的社交网络中的攻击与防御:一种启发式数论方法
Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, K. Ross
The rapid growth of location-based social network (LBSN) applications -- such as WeChat, Momo, and Yik Yak -- has in essence facilitated the promotion of anonymously sharing instant messages and open discussions. These services breed a unique anonymous atmosphere for users to discover their geographic neighborhoods and then initiate private communications. In this paper, we demonstrate how such location-based features of WeChat can be exploited to determine the user's location with sufficient accuracy in any city from any location in the world. Guided by the number theory, we design and implement two generic localization attack algorithms to track anonymous users' locations that can be potentially adapted to any other LBSN services. We evaluated the performance of the proposed algorithms using Matlab simulation experiments and also deployed real-world experiments for validating our methodology. Our results show that WeChat, and other LBSN services as such, have a potential location privacy leakage problem. Finally, k-anonymity based countermeasures are proposed to mitigate the localization attacks without significantly compromising the quality-of-service of LBSN applications. We expect our research to bring this serious privacy pertinent issue into the spotlight and hopefully motivate better privacy-preserving LBSN designs.
微信、陌陌、Yik Yak等基于位置的社交网络(LBSN)应用程序的快速发展,从本质上促进了匿名分享即时消息和公开讨论的推广。这些服务为用户提供了一种独特的匿名氛围,使用户可以发现他们的地理邻居,然后发起私人通信。在本文中,我们展示了如何利用微信的这种基于位置的功能,从世界上的任何位置以足够的精度确定用户在任何城市的位置。在数论的指导下,我们设计并实现了两种通用的定位攻击算法来跟踪匿名用户的位置,这些算法可以潜在地适应任何其他LBSN服务。我们使用Matlab仿真实验评估了所提出算法的性能,并部署了真实世界的实验来验证我们的方法。我们的研究结果表明,微信和其他LBSN服务存在潜在的位置隐私泄露问题。最后,在不影响LBSN应用服务质量的前提下,提出了基于k-匿名的策略来缓解定位攻击。我们希望我们的研究能将这个严重的隐私相关问题带到聚光灯下,并希望能激发更好的保护隐私的LBSN设计。
{"title":"Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach","authors":"Jiawen Peng, Yan Meng, Minhui Xue, Xiaojun Hei, K. Ross","doi":"10.1109/SocialSec2015.19","DOIUrl":"https://doi.org/10.1109/SocialSec2015.19","url":null,"abstract":"The rapid growth of location-based social network (LBSN) applications -- such as WeChat, Momo, and Yik Yak -- has in essence facilitated the promotion of anonymously sharing instant messages and open discussions. These services breed a unique anonymous atmosphere for users to discover their geographic neighborhoods and then initiate private communications. In this paper, we demonstrate how such location-based features of WeChat can be exploited to determine the user's location with sufficient accuracy in any city from any location in the world. Guided by the number theory, we design and implement two generic localization attack algorithms to track anonymous users' locations that can be potentially adapted to any other LBSN services. We evaluated the performance of the proposed algorithms using Matlab simulation experiments and also deployed real-world experiments for validating our methodology. Our results show that WeChat, and other LBSN services as such, have a potential location privacy leakage problem. Finally, k-anonymity based countermeasures are proposed to mitigate the localization attacks without significantly compromising the quality-of-service of LBSN applications. We expect our research to bring this serious privacy pertinent issue into the spotlight and hopefully motivate better privacy-preserving LBSN designs.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks 无标度网络中个体局部与全局影响的关系
S. Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Y. Xiang, Wanlei Zhou
Large-degree nodes in scale-free networks are normally responsible for large cascades of epidemics. However, recent research shows small-degree nodes can also produce large-scale epidemics in the real world. In this letter, we investigate the relation between local and global influence of individuals in scale-free network in order to theoretically explain this real-world phenomenon. The local influence of an individual corresponds to the node degree, and the global influence of an individual reflects the expected number of individuals directly or indirectly influenced by this individual in epidemics. We formalize the later as the novel epidemic betweenness concept, to mathematically estimate the global influence of individuals. Our analysis shows that the global influence follows power-law distributions in scale-free networks. We also observe that the average global influence of individuals is power-law to the degree of nodes, which well explains the reason why large-degree nodes are more likely to produce large cascades of epidemics. In addition, we discover that some smalldegree nodes also possess large global influence in terms of epidemics betweenness. This well explains the counter-intuitive phenomenon in recent research.
无标度网络中的大程度节点通常会导致流行病的大级联。然而,最近的研究表明,小度节点也可以在现实世界中产生大规模的流行病。在这封信中,我们研究了个体在无标度网络中的局部和全局影响之间的关系,以便从理论上解释这一现实世界的现象。个体的局部影响对应于节点度,个体的全局影响反映了在流行病中受该个体直接或间接影响的个体的预期数量。我们将后者形式化为新的流行病之间概念,以数学方式估计个体的全球影响。我们的分析表明,在无标度网络中,全球影响遵循幂律分布。我们还观察到,个体的平均全球影响力与节点度呈幂律关系,这很好地解释了为什么大节点度更有可能产生大的流行病级联。此外,我们发现一些小程度节点在流行病之间也具有较大的全球影响。这很好地解释了最近研究中的反直觉现象。
{"title":"The Relation Between Local and Global Influence of Individuals in Scale-Free Networks","authors":"S. Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Y. Xiang, Wanlei Zhou","doi":"10.1109/SocialSec2015.20","DOIUrl":"https://doi.org/10.1109/SocialSec2015.20","url":null,"abstract":"Large-degree nodes in scale-free networks are normally responsible for large cascades of epidemics. However, recent research shows small-degree nodes can also produce large-scale epidemics in the real world. In this letter, we investigate the relation between local and global influence of individuals in scale-free network in order to theoretically explain this real-world phenomenon. The local influence of an individual corresponds to the node degree, and the global influence of an individual reflects the expected number of individuals directly or indirectly influenced by this individual in epidemics. We formalize the later as the novel epidemic betweenness concept, to mathematically estimate the global influence of individuals. Our analysis shows that the global influence follows power-law distributions in scale-free networks. We also observe that the average global influence of individuals is power-law to the degree of nodes, which well explains the reason why large-degree nodes are more likely to produce large cascades of epidemics. In addition, we discover that some smalldegree nodes also possess large global influence in terms of epidemics betweenness. This well explains the counter-intuitive phenomenon in recent research.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Find Referral Social Networks 寻找推荐社交网络
Hao Guo, Feng Wei, Shaoyin Cheng, Fan Jiang
With the generalizing of Electronic Medical Records lots of facilities such as hospitals, insurance companies and some other government sections, accumulate large amounts of electronic data. Generally, data analysis technologies used in health insurance claims data are statistical and data mining. To get some new information from the data, the social network analysis (SNA) is proposed as a new way to explore the patientstransferring data held by Medical Insurance Bureau. In this paper, we first describe the condition of the basic medical insurance for urban and rural residents in China, then we demonstrate that the method of SNA used in the health insurance claims data can better understand the corporation among hospitals relating to patients-transferring. Particularly, this paper applies social network analysis to mine the data in three aspects: (a) community detection of hospitals network using different models. (b) the relationship among networks characteristics and healthcare quality including Length of stay(Los) in hospital, medicare cost and treatment results. (c)some interesting rules about the patients-transferring correlated with the Los and Cost.
随着电子病历的推广,医院、保险公司和其他政府部门等机构积累了大量的电子病历数据。一般来说,用于健康保险索赔数据的数据分析技术是统计和数据挖掘。为了从这些数据中获得新的信息,本文提出了一种新的方法——社会网络分析(SNA),对医疗保险局持有的患者转移数据进行挖掘。本文首先描述了中国城乡居民基本医疗保险的现状,然后论证了在医疗保险理赔数据中使用SNA的方法可以更好地理解医院之间的转诊关系。具体而言,本文运用社会网络分析,从三个方面挖掘数据:(a)使用不同模型对医院网络进行社区检测。(b)网络特征与医疗保健质量(包括住院时间、医疗保险成本和治疗效果)之间的关系。(c)患者转移与损失和成本相关的一些有趣的规律。
{"title":"Find Referral Social Networks","authors":"Hao Guo, Feng Wei, Shaoyin Cheng, Fan Jiang","doi":"10.1109/SocialSec2015.8","DOIUrl":"https://doi.org/10.1109/SocialSec2015.8","url":null,"abstract":"With the generalizing of Electronic Medical Records lots of facilities such as hospitals, insurance companies and some other government sections, accumulate large amounts of electronic data. Generally, data analysis technologies used in health insurance claims data are statistical and data mining. To get some new information from the data, the social network analysis (SNA) is proposed as a new way to explore the patientstransferring data held by Medical Insurance Bureau. In this paper, we first describe the condition of the basic medical insurance for urban and rural residents in China, then we demonstrate that the method of SNA used in the health insurance claims data can better understand the corporation among hospitals relating to patients-transferring. Particularly, this paper applies social network analysis to mine the data in three aspects: (a) community detection of hospitals network using different models. (b) the relationship among networks characteristics and healthcare quality including Length of stay(Los) in hospital, medicare cost and treatment results. (c)some interesting rules about the patients-transferring correlated with the Los and Cost.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Robust Image-Hashing Method for Content Authentication 一种新的鲁棒图像哈希内容认证方法
Cuiling Jiang, Yilin Pang, Anwen Wu
Image hash functions find extensive application in content authentication, database search, and digital forensic. This paper develops a novel robust image-hashing method based on genetic algorithm (GA) and Back Propagation (BP) Neural Network for content authentication. Lifting wavelet transform is used to extract image low frequency coefficients to create the image feature matrix. A GA-BP network model is constructed to generate image-hashing code. Experimental results demonstrate that the proposed hashing method is robust against random attack, JPEG compression, additive Gaussian noise, and so on. Receiver operating characteristics (ROC) analysis over a large image database reveals that the proposed method significantly outperforms other approaches for robust image hashing.
图像哈希函数在内容认证、数据库搜索和数字取证等方面有着广泛的应用。提出了一种基于遗传算法(GA)和BP神经网络的鲁棒图像哈希认证方法。采用提升小波变换提取图像低频系数,生成图像特征矩阵。构造了GA-BP网络模型来生成图像哈希码。实验结果表明,该方法对随机攻击、JPEG压缩、加性高斯噪声等具有较强的鲁棒性。在大型图像数据库上的接收者工作特征(ROC)分析表明,该方法明显优于其他鲁棒图像哈希方法。
{"title":"A Novel Robust Image-Hashing Method for Content Authentication","authors":"Cuiling Jiang, Yilin Pang, Anwen Wu","doi":"10.1109/SocialSec2015.15","DOIUrl":"https://doi.org/10.1109/SocialSec2015.15","url":null,"abstract":"Image hash functions find extensive application in content authentication, database search, and digital forensic. This paper develops a novel robust image-hashing method based on genetic algorithm (GA) and Back Propagation (BP) Neural Network for content authentication. Lifting wavelet transform is used to extract image low frequency coefficients to create the image feature matrix. A GA-BP network model is constructed to generate image-hashing code. Experimental results demonstrate that the proposed hashing method is robust against random attack, JPEG compression, additive Gaussian noise, and so on. Receiver operating characteristics (ROC) analysis over a large image database reveals that the proposed method significantly outperforms other approaches for robust image hashing.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122586492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Insecurity of Anonymous Login with German Personal Identity Cards 德国个人身份证匿名登录的不安全性
L. Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski
One of the major inventions of the new personal identity cards in Germany is supporting anonymous authentication. The Restricted Identification protocol enables to authenticate in an unlimited number of domains with passwords created with strong asymmetric cryptography and not using the insecure login-password mechanism. Moreover, the RI scheme guarantees unlinkability of user's authentication in different domains. The Achilles Heel of the RI scheme is Chip Authentication procedure. The terminal must make sure that it is talking with a genuine identification card and authentication via so-called group key is used. The group key is shared by many ID's in order to create a sufficiently large anonymity set. We present an attack, where the party holding the group key and eavesdropping the communication between a card and a terminal can learn the pseudonym and later authenticate as this user in this domain. In this way the party issuing the cards may get an unlimited access to citizens accounts. We show how to solve the problem by slight changes in the protocol.
德国新型个人身份证的一大发明是支持匿名认证。限制标识协议允许在无限数量的域中使用使用强非对称加密创建的密码进行身份验证,并且不使用不安全的登录密码机制。此外,RI方案还保证了用户在不同域中身份验证的不可链接性。RI方案的致命弱点是芯片认证程序。终端必须确保使用的是真正的身份证,并使用所谓的组密钥进行认证。为了创建一个足够大的匿名集,组密钥由许多ID共享。我们提出了一种攻击方法,其中持有组密钥并窃听卡与终端之间的通信的一方可以学习假名,然后在该域中验证该用户。通过这种方式,发卡方可以无限制地使用公民账户。我们将展示如何通过对协议进行细微更改来解决这个问题。
{"title":"Insecurity of Anonymous Login with German Personal Identity Cards","authors":"L. Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski","doi":"10.1109/SocialSec2015.12","DOIUrl":"https://doi.org/10.1109/SocialSec2015.12","url":null,"abstract":"One of the major inventions of the new personal identity cards in Germany is supporting anonymous authentication. The Restricted Identification protocol enables to authenticate in an unlimited number of domains with passwords created with strong asymmetric cryptography and not using the insecure login-password mechanism. Moreover, the RI scheme guarantees unlinkability of user's authentication in different domains. The Achilles Heel of the RI scheme is Chip Authentication procedure. The terminal must make sure that it is talking with a genuine identification card and authentication via so-called group key is used. The group key is shared by many ID's in order to create a sufficiently large anonymity set. We present an attack, where the party holding the group key and eavesdropping the communication between a card and a terminal can learn the pseudonym and later authenticate as this user in this domain. In this way the party issuing the cards may get an unlimited access to citizens accounts. We show how to solve the problem by slight changes in the protocol.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud 混合云中具有委派功能的安全高效数据共享框架
Xuejiao Liu, Yingjie Xia, Yang Xiang, M. Hassan, Abdulhameed Alelaiwi
Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the public cloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement.
混合云是大公司中广泛使用的云架构,它可以将数据外包到公共云,同时仍然支持各种客户端,如移动设备。然而,这种公有云数据外包引发了严重的安全问题,例如如何保持数据机密性以及如何规范对公有云存储数据的访问策略。为了解决这个问题,我们设计了一种混合云架构,即使在资源有限的设备上也能安全有效地支持数据共享,其中私有云充当公共云和数据用户之间的网关。在此架构下,我们提出了一种改进的基于属性的加密结构,该结构具有委托加/解密计算的能力,在云中实现了灵活的访问控制,即使在移动设备上也能实现数据化的隐私保护。大量的实验表明,该方案可以进一步降低用户端的计算成本和空间开销,对于移动设备有限的用户来说是非常有效的。在将大部分加/解密计算委托给私有云的过程中,用户不能向私有云泄露任何信息。我们还考虑了通信安全性,一旦发生频繁的属性撤销,我们的方案可以通过采用匿名密钥协议抵御私有云和数据用户之间的一些攻击。
{"title":"A Secure and Efficient Data Sharing Framework with Delegated Capabilities in Hybrid Cloud","authors":"Xuejiao Liu, Yingjie Xia, Yang Xiang, M. Hassan, Abdulhameed Alelaiwi","doi":"10.1109/SocialSec2015.13","DOIUrl":"https://doi.org/10.1109/SocialSec2015.13","url":null,"abstract":"Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the public cloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of the Performance of Hadoop Applications on Eucalyptus Cloud Hadoop应用在Eucalyptus Cloud上的性能分析
Yiping Wang, Xiaoyong Li
In cloud computing, enterprises and individual consumers can have access to storage, computing and bandwidth resources through network terminal, and do not need to install applications. Cloud computing can be divided into three categories: Software as a Service (SaaS) and Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Eucalyptus is the most widely deployed IaaS cloud service software platform in the world. It builds a cloud service layer as IaaS by using the existing infrastructure. In this article, we built the Eucalyptus cloud platform on the server, and the deployment of software Dev C++ on the Eucalyptus platform. Consumers can have remote access to the software through the Internet without installing the software in the local. Over the last few years, Big Data analysis has attracted huge attention from enterprises and research institutions. Hadoop is considered as one of the most important tools in computing development in order to tackle the Big Data. It is very convenient for Eucalyptus to create and deploy the VM instances which is provided the distributed environment on demand, where the Hadoop applications are going to be executed. So we implement Hadoop platform on Eucalyptus cloud infrastructure, and evaluate the Hadoop applications running on Eucalyptus cloud under different stressing conditions.
在云计算中,企业和个人消费者可以通过网络终端访问存储、计算和带宽资源,而不需要安装应用程序。云计算可以分为三类:软件即服务(SaaS)和平台即服务(PaaS)以及基础设施即服务(IaaS)。Eucalyptus是目前全球部署最广泛的IaaS云服务软件平台。它利用现有的基础设施构建一个IaaS的云服务层。在本文中,我们在服务器上构建了Eucalyptus云平台,并在Eucalyptus平台上部署了Dev c++软件。用户无需在本地安装软件,即可通过Internet远程访问该软件。在过去的几年里,大数据分析引起了企业和研究机构的极大关注。Hadoop被认为是处理大数据的计算开发中最重要的工具之一。对于Eucalyptus来说,创建和部署VM实例非常方便,VM实例是按需提供的分布式环境,Hadoop应用程序将在其中执行。因此,我们在Eucalyptus云基础设施上实现了Hadoop平台,并在不同的压力条件下对运行在Eucalyptus云上的Hadoop应用进行了评估。
{"title":"Analysis of the Performance of Hadoop Applications on Eucalyptus Cloud","authors":"Yiping Wang, Xiaoyong Li","doi":"10.1109/SocialSec2015.17","DOIUrl":"https://doi.org/10.1109/SocialSec2015.17","url":null,"abstract":"In cloud computing, enterprises and individual consumers can have access to storage, computing and bandwidth resources through network terminal, and do not need to install applications. Cloud computing can be divided into three categories: Software as a Service (SaaS) and Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Eucalyptus is the most widely deployed IaaS cloud service software platform in the world. It builds a cloud service layer as IaaS by using the existing infrastructure. In this article, we built the Eucalyptus cloud platform on the server, and the deployment of software Dev C++ on the Eucalyptus platform. Consumers can have remote access to the software through the Internet without installing the software in the local. Over the last few years, Big Data analysis has attracted huge attention from enterprises and research institutions. Hadoop is considered as one of the most important tools in computing development in order to tackle the Big Data. It is very convenient for Eucalyptus to create and deploy the VM instances which is provided the distributed environment on demand, where the Hadoop applications are going to be executed. So we implement Hadoop platform on Eucalyptus cloud infrastructure, and evaluate the Hadoop applications running on Eucalyptus cloud under different stressing conditions.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination 利用特征选择和组合增强Twitter情感分析
Ang Yang, Jun Zhang, Lei Pan, Yang Xiang
Tweet sentiment analysis is an important research topic. An accurate and timely analysis report could give good indications on the general public's opinions. After reviewing the current research, we identify the need of effective and efficient methods to conduct tweet sentiment analysis. This paper aims to achieve a high level of performance for classifying tweets with sentiment information. We propose a feasible solution which improves the level of accuracy with good time efficiency. Specifically, we develop a novel feature combination scheme which utilizes the sentiment lexicons and the extracted tweet unigrams of high information gain. We evaluate the performance of six popular machine learning classifiers among which the Naive Bayes Multinomial (NBM) classifier achieves the accuracy rate of 84.60% and takes a few minutes to complete classifying thousands of tweets.
微博情感分析是一个重要的研究课题。一份准确及时的分析报告可以很好地反映公众的意见。在回顾了目前的研究之后,我们发现需要有效和高效的方法来进行推文情感分析。本文的目标是实现具有情感信息的推文分类的高水平性能。我们提出了一种可行的解决方案,既提高了精度水平,又具有良好的时间效率。具体而言,我们开发了一种新的特征组合方案,该方案利用情感词汇和提取的高信息增益的推文图。我们评估了六种流行的机器学习分类器的性能,其中朴素贝叶斯多项式(NBM)分类器的准确率达到84.60%,只需几分钟即可完成数千条推文的分类。
{"title":"Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination","authors":"Ang Yang, Jun Zhang, Lei Pan, Yang Xiang","doi":"10.1109/SocialSec2015.9","DOIUrl":"https://doi.org/10.1109/SocialSec2015.9","url":null,"abstract":"Tweet sentiment analysis is an important research topic. An accurate and timely analysis report could give good indications on the general public's opinions. After reviewing the current research, we identify the need of effective and efficient methods to conduct tweet sentiment analysis. This paper aims to achieve a high level of performance for classifying tweets with sentiment information. We propose a feasible solution which improves the level of accuracy with good time efficiency. Specifically, we develop a novel feature combination scheme which utilizes the sentiment lexicons and the extracted tweet unigrams of high information gain. We evaluate the performance of six popular machine learning classifiers among which the Naive Bayes Multinomial (NBM) classifier achieves the accuracy rate of 84.60% and takes a few minutes to complete classifying thousands of tweets.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection T-HIBE: OSN隐私保护的可信HIBE方案
Peixin Chen, Xiaofeng Wang, Jinshu Su
The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks. However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys. We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model.
基于层次身份的加密(HIBE)方案可以有效地为在线社交网络提供保密通信和隐私保护。然而,固有的密钥托管问题和安全密钥分发问题是阻碍该加密方案在实践中广泛采用的主要因素。为了解决密钥托管问题,本文引入了一个可证明安全的无托管模型,该模型在HIBE方案中使用多个密钥隐私授权机构(KPAs)来限制公钥生成器(pkg)的权力。为了实现密钥安全分发的目标,本文提出了一种有效的机制,在分发私钥时施加用户计算的盲因子。我们将所提出的模型实例化为一个可信的、安全的HIBE方案T-HIBE方案,并证明了该方案在标准模型下是IND-ID-CCA安全的。
{"title":"T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection","authors":"Peixin Chen, Xiaofeng Wang, Jinshu Su","doi":"10.1109/SocialSec2015.11","DOIUrl":"https://doi.org/10.1109/SocialSec2015.11","url":null,"abstract":"The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks. However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys. We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1