Pub Date : 2018-04-02DOI: 10.1109/NTMS.2018.8328714
Sara Ramezanian, Tommi Meskanen, Valtteri Niemi
In this work, a trust relation determines whether a certain user (at source-host) has permission to access another user (at target-host) by utilising an authentication key with unique fingerprint F. These trust relations can be interpreted as a directed graph, where nodes are user-host pairs and edges are fingerprints. We study the problem of constructing a privacy preserving trust relation data structure. Moreover, we design and prototype a querying mechanism for this data structure and show that it is feasible in practice. We validate our design by utilising real world data.
{"title":"Privacy Preserving Queries on Directed Graph","authors":"Sara Ramezanian, Tommi Meskanen, Valtteri Niemi","doi":"10.1109/NTMS.2018.8328714","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328714","url":null,"abstract":"In this work, a trust relation determines whether a certain user (at source-host) has permission to access another user (at target-host) by utilising an authentication key with unique fingerprint F. These trust relations can be interpreted as a directed graph, where nodes are user-host pairs and edges are fingerprints. We study the problem of constructing a privacy preserving trust relation data structure. Moreover, we design and prototype a querying mechanism for this data structure and show that it is feasible in practice. We validate our design by utilising real world data.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-02DOI: 10.1109/NTMS.2018.8328673
Keltoum Bendiab, S. Shiaeles, Samia Boucherkha
With the proliferation of Cloud-based services, Federated Identity Management (FIM) has gained considerable attention in recent years. It is considered as a promising approach to facilitate secure resource sharing between collaborating partners in the Cloud. However, current FIM frameworks such as OpenID, SAML, Liberty Alliance, Shibboleth and WS-Federation do not define a suitable trust model to allow dynamic and agile federation establishment. Hence, they cannot be deployed in dynamic and open environments like Cloud Computing. In this paper, we address this issue by presenting a new dynamic trust model that fulfils Cloud requirements. The proposed model introduces the theory of Fuzzy Cognitive Maps (FCM) into modelling and evaluating unknown entities trustworthiness in FIM systems.
{"title":"A New Dynamic Trust Model for \"On Cloud\" Federated Identity Management","authors":"Keltoum Bendiab, S. Shiaeles, Samia Boucherkha","doi":"10.1109/NTMS.2018.8328673","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328673","url":null,"abstract":"With the proliferation of Cloud-based services, Federated Identity Management (FIM) has gained considerable attention in recent years. It is considered as a promising approach to facilitate secure resource sharing between collaborating partners in the Cloud. However, current FIM frameworks such as OpenID, SAML, Liberty Alliance, Shibboleth and WS-Federation do not define a suitable trust model to allow dynamic and agile federation establishment. Hence, they cannot be deployed in dynamic and open environments like Cloud Computing. In this paper, we address this issue by presenting a new dynamic trust model that fulfils Cloud requirements. The proposed model introduces the theory of Fuzzy Cognitive Maps (FCM) into modelling and evaluating unknown entities trustworthiness in FIM systems.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-29DOI: 10.1109/NTMS.2018.8328719
Outi-Marja Latvala, Chengyuan Peng, P. Honkamaa, Kimmo Halunen
User authentication is a long-standing problem in need of a comprehensive solution. As technology progresses towards more ubiquitous connectivity and digital services, there is a need for new methods that are usable in these new contexts. One direction of progress has been in virtual and augmented reality technologies. Augmented reality provides tools also for better user authentication. We have developed a system, where user authentication can be done with the help of augmented reality, visual cryptography and speech recognition. This type of authentication can be used in untrusted environments and in scenarios, where the hands of the user are not available for inputting a password with some keyboard.
{"title":"\"Speak, Friend, and Enter\" - Secure, Spoken One-Time Password Authentication","authors":"Outi-Marja Latvala, Chengyuan Peng, P. Honkamaa, Kimmo Halunen","doi":"10.1109/NTMS.2018.8328719","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328719","url":null,"abstract":"User authentication is a long-standing problem in need of a comprehensive solution. As technology progresses towards more ubiquitous connectivity and digital services, there is a need for new methods that are usable in these new contexts. One direction of progress has been in virtual and augmented reality technologies. Augmented reality provides tools also for better user authentication. We have developed a system, where user authentication can be done with the help of augmented reality, visual cryptography and speech recognition. This type of authentication can be used in untrusted environments and in scenarios, where the hands of the user are not available for inputting a password with some keyboard.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-29DOI: 10.1109/NTMS.2018.8328725
Y. Fukushima, I. Goda, T. Murase, T. Yokohira
A server migration service (SMS) has been proposed as a means of improving communication QoS of network application (NW-Apps) operated on Infrastructure as a Service (IaaS)-type cloud services. In SMS, computers called workplaces (WPs) are distributed across the network, and a server-side application (server) of a NW-App can migrate among the WPs in order to improve the communication QoS of NW-Apps. In this paper, we tackle a WP capacity design problem where we determine where WPs should be placed within a NW, and what capacity they should have. We propose two methods for the problem. Method 1 seeks to place higher capacity WPs at locations where more servers are likely to stay. Method 2 tries to position WPs such that the required level of communication QoS for NW-Apps can be satisfied with at least one WP at any location in the NW. This is accomplished by formulating the WP capacity design problem as a minimum dominating set (MDS) problem and solving it.
{"title":"Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services","authors":"Y. Fukushima, I. Goda, T. Murase, T. Yokohira","doi":"10.1109/NTMS.2018.8328725","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328725","url":null,"abstract":"A server migration service (SMS) has been proposed as a means of improving communication QoS of network application (NW-Apps) operated on Infrastructure as a Service (IaaS)-type cloud services. In SMS, computers called workplaces (WPs) are distributed across the network, and a server-side application (server) of a NW-App can migrate among the WPs in order to improve the communication QoS of NW-Apps. In this paper, we tackle a WP capacity design problem where we determine where WPs should be placed within a NW, and what capacity they should have. We propose two methods for the problem. Method 1 seeks to place higher capacity WPs at locations where more servers are likely to stay. Method 2 tries to position WPs such that the required level of communication QoS for NW-Apps can be satisfied with at least one WP at any location in the NW. This is accomplished by formulating the WP capacity design problem as a minimum dominating set (MDS) problem and solving it.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-29DOI: 10.1109/NTMS.2018.8328723
C. Papatsimpa, J. Linnartz
Presence detection is used in occupancy-based control to dynamically adjust energy-related appliances in smart buildings. Yet, practical applications typically suffer from high sensor unreliability. In our previous work, we suggested a Hidden Markov Model (HMM) for fusing information from multiple sources to better estimate the user state (presence/absence). We now extend this model and exploit information on the time-dependency of the probability of occupancy according to the time of the day. People generally have a typical working schedule, that is, occupants in an office arrive and leave every day at almost the same time. In this approach, we use our prior knowledge on office occupancy profiles to develop a time-dependent (in-homogeneous) HMM. Judging from our experiments, the algorithm shows improved performance, also, in a real-world test set-up where user presence and sensors error may not exactly follow our idealized model assumptions.
{"title":"Using Dynamic Occupancy Patterns for Improved Presence Detection in Intelligent Buildings","authors":"C. Papatsimpa, J. Linnartz","doi":"10.1109/NTMS.2018.8328723","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328723","url":null,"abstract":"Presence detection is used in occupancy-based control to dynamically adjust energy-related appliances in smart buildings. Yet, practical applications typically suffer from high sensor unreliability. In our previous work, we suggested a Hidden Markov Model (HMM) for fusing information from multiple sources to better estimate the user state (presence/absence). We now extend this model and exploit information on the time-dependency of the probability of occupancy according to the time of the day. People generally have a typical working schedule, that is, occupants in an office arrive and leave every day at almost the same time. In this approach, we use our prior knowledge on office occupancy profiles to develop a time-dependent (in-homogeneous) HMM. Judging from our experiments, the algorithm shows improved performance, also, in a real-world test set-up where user presence and sensors error may not exactly follow our idealized model assumptions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-27DOI: 10.1109/NTMS.2018.8328741
Andra Anoaica, H. Levard
One of the most popular platform based on blockchain technology is Ethereum. Internal activity on this public blockchain is analyzed both from a quantitative and qualitative point of view. In a first part, it is shown that the creation of the Ethereum Alliance consortium has been a game changer in the use of the technology. In a second part, the network robustness against attacks is investigated from a graph point of view, as well as the distribution of internal activity among users. Addresses of great influence were identified, and allowed to formulate conjectures on the current usage of this technology.
{"title":"Quantitative Description of Internal Activity on the Ethereum Public Blockchain","authors":"Andra Anoaica, H. Levard","doi":"10.1109/NTMS.2018.8328741","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328741","url":null,"abstract":"One of the most popular platform based on blockchain technology is Ethereum. Internal activity on this public blockchain is analyzed both from a quantitative and qualitative point of view. In a first part, it is shown that the creation of the Ethereum Alliance consortium has been a game changer in the use of the technology. In a second part, the network robustness against attacks is investigated from a graph point of view, as well as the distribution of internal activity among users. Addresses of great influence were identified, and allowed to formulate conjectures on the current usage of this technology.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-27DOI: 10.1109/NTMS.2018.8328737
Tesnim Abdellatif, Kei-Léo Brousmiche
Blockchain technology has attracted increasing attention in recent years. One reason of this new trend is the introduction of on-chain smart contracts enabling the implementation of decentralized applications in trust-less environments. Along with its adoption, attacks exploiting smart contract vulnerabilities are inevitably growing. To counter these attacks and avoid breaches, several approaches have been explored such as documenting vulnerabilities or model checking using formal verification. However, these approaches fail to capture the Blockchain and users behavior properties. In this paper, we propose a novel formal modeling approach to verify a smart contract behavior in its execution environment. We apply this formalism on a concrete smart contract example and analyze its breaches with a statical model checking approach.
{"title":"Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models","authors":"Tesnim Abdellatif, Kei-Léo Brousmiche","doi":"10.1109/NTMS.2018.8328737","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328737","url":null,"abstract":"Blockchain technology has attracted increasing attention in recent years. One reason of this new trend is the introduction of on-chain smart contracts enabling the implementation of decentralized applications in trust-less environments. Along with its adoption, attacks exploiting smart contract vulnerabilities are inevitably growing. To counter these attacks and avoid breaches, several approaches have been explored such as documenting vulnerabilities or model checking using formal verification. However, these approaches fail to capture the Blockchain and users behavior properties. In this paper, we propose a novel formal modeling approach to verify a smart contract behavior in its execution environment. We apply this formalism on a concrete smart contract example and analyze its breaches with a statical model checking approach.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129029129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-27DOI: 10.1109/NTMS.2018.8328733
Kei-Léo Brousmiche, Thomas Heno, C. Poulain, Antoine Dalmieres, Elyes Ben Hamida
Nowadays, vehicles odometer fraud is becoming a growing problem internationally, and is costing European consumers between 5.6 to 9.6 billion euros per year. This is partly due to the lack of unified vehicles life-cycle management, and to the fact that vehicles data are currently spread across multiple stakeholders that do not trust each other or collaborate together. In this paper, we propose a Blockchain- backed Vehicles Data and Processes Ledger framework to streamline the management of vehicles life-cycle and data history, and hence to provide more transparency and collaborations between the involved stakeholders. The architecture and lessons learned from the first implementation phase are discussed, followed by future research challenges.
{"title":"Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons Learned","authors":"Kei-Léo Brousmiche, Thomas Heno, C. Poulain, Antoine Dalmieres, Elyes Ben Hamida","doi":"10.1109/NTMS.2018.8328733","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328733","url":null,"abstract":"Nowadays, vehicles odometer fraud is becoming a growing problem internationally, and is costing European consumers between 5.6 to 9.6 billion euros per year. This is partly due to the lack of unified vehicles life-cycle management, and to the fact that vehicles data are currently spread across multiple stakeholders that do not trust each other or collaborate together. In this paper, we propose a Blockchain- backed Vehicles Data and Processes Ledger framework to streamline the management of vehicles life-cycle and data history, and hence to provide more transparency and collaborations between the involved stakeholders. The architecture and lessons learned from the first implementation phase are discussed, followed by future research challenges.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-26DOI: 10.1109/NTMS.2018.8328720
Raouia Masmoudi
In this paper, we focus on a wireless flat fading channel in a Cognitive radio network composed of licensed users (primary) and unlicensed users (secondary). We propose a framework for analyzing the access strategy based on the received interference at the secondary receiver and analyzing the achievable capacity of the secondary under the average power and average interference constraints. The proposed approach to the spectrum sharing, based on the received interference at the secondary receiver, significantly reduces the system complexity. We categorize the spectrum sharing into two cases based on the maximum interference threshold. We obtain a critical system parameter to eliminate the interference threshold constraint.
{"title":"Spectrum Sharing in Cognitive Radio Systems","authors":"Raouia Masmoudi","doi":"10.1109/NTMS.2018.8328720","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328720","url":null,"abstract":"In this paper, we focus on a wireless flat fading channel in a Cognitive radio network composed of licensed users (primary) and unlicensed users (secondary). We propose a framework for analyzing the access strategy based on the received interference at the secondary receiver and analyzing the achievable capacity of the secondary under the average power and average interference constraints. The proposed approach to the spectrum sharing, based on the received interference at the secondary receiver, significantly reduces the system complexity. We categorize the spectrum sharing into two cases based on the maximum interference threshold. We obtain a critical system parameter to eliminate the interference threshold constraint.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchains, such as Bitcoin and Ethereum and their respective P2P networks have seen significant adoption in many sectors in the past few years. All these technologies that use the Blockchain pattern show that it is possible to rebuild any transactional system with better performance without relying on any trusted parties to manage transactions between peers. This insight has lead many companies to invest millions to understand the technology and to find a way to migrate from centralized to decentralized solutions. These solutions need to store large amounts of data in a secure and confidential way. Many distributed storage systems now exist using Blockchain technology (Cloud, FileSystems, etc.). But none of the tools proposed are able to manage the document life cycle nor archive documents based on regulatory compliance. In this paper, we describe our protocol named NFB (Notarizing Files over the Blockchain). This protocol ensures the communication between two systems: a permissive Blockchain and a secured centralized archiving Document Management System. The method described is used to allow users to archive, control, analyze and validate their transactions in a system that offers confidentiality, security and distribution features.
{"title":"NFB: A Protocol for Notarizing Files over the Blockchain","authors":"Haikel Magrahi, Nouha Omrane, Olivier Senot, Rakia Jaziri","doi":"10.1109/ntms.2018.8328740","DOIUrl":"https://doi.org/10.1109/ntms.2018.8328740","url":null,"abstract":"Blockchains, such as Bitcoin and Ethereum and their respective P2P networks have seen significant adoption in many sectors in the past few years. All these technologies that use the Blockchain pattern show that it is possible to rebuild any transactional system with better performance without relying on any trusted parties to manage transactions between peers. This insight has lead many companies to invest millions to understand the technology and to find a way to migrate from centralized to decentralized solutions. These solutions need to store large amounts of data in a secure and confidential way. Many distributed storage systems now exist using Blockchain technology (Cloud, FileSystems, etc.). But none of the tools proposed are able to manage the document life cycle nor archive documents based on regulatory compliance. In this paper, we describe our protocol named NFB (Notarizing Files over the Blockchain). This protocol ensures the communication between two systems: a permissive Blockchain and a secured centralized archiving Document Management System. The method described is used to allow users to archive, control, analyze and validate their transactions in a system that offers confidentiality, security and distribution features.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}