首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Insider Threat Detection Through Attributed Graph Clustering 基于属性图聚类的内部威胁检测
Pub Date : 2018-09-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.227
A. Gamachchi, S. Boztaş
While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far reaching damage to financial stability, national security and brand reputation for both public and private sector organizations. Growing exposure and impact of the whistleblower community and concerns about job security with changing organizational dynamics has further aggravated this situation. The unpredictability of malicious attackers, as well as the complexity of malicious actions, necessitates the careful analysis of network, system and user parameters correlated with insider threat problem. Thus it creates a high dimensional, heterogeneous data analysis problem in isolating suspicious users. This research work proposes an insider threat detection framework, which utilizes the attributed graph clustering techniques and outlier ranking mechanism for enterprise users. Empirical results also confirm the effectiveness of the method by achieving the best area under curve value of 0.7648 for the receiver operating characteristic curve.
虽然大多数组织继续投资传统的网络防御,但在他们自己的边界内已经酝酿了一个巨大的安全挑战。恶意的内部人士伪装成可信来源,拥有特权访问权限,实施了许多攻击,对公共和私营部门组织的金融稳定、国家安全和品牌声誉造成了深远的损害。告密者群体越来越多的曝光和影响,以及对组织动态变化带来的工作保障的担忧,进一步加剧了这种情况。由于恶意攻击者的不可预测性和恶意行为的复杂性,需要仔细分析与内部威胁问题相关的网络、系统和用户参数。因此,它在隔离可疑用户时产生了高维异构数据分析问题。本研究提出了一种针对企业用户的内部威胁检测框架,该框架利用了属性图聚类技术和离群值排序机制。实验结果也证实了该方法的有效性,获得了受试者工作特性曲线的最佳曲线下面积为0.7648。
{"title":"Insider Threat Detection Through Attributed Graph Clustering","authors":"A. Gamachchi, S. Boztaş","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.227","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.227","url":null,"abstract":"While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far reaching damage to financial stability, national security and brand reputation for both public and private sector organizations. Growing exposure and impact of the whistleblower community and concerns about job security with changing organizational dynamics has further aggravated this situation. The unpredictability of malicious attackers, as well as the complexity of malicious actions, necessitates the careful analysis of network, system and user parameters correlated with insider threat problem. Thus it creates a high dimensional, heterogeneous data analysis problem in isolating suspicious users. This research work proposes an insider threat detection framework, which utilizes the attributed graph clustering techniques and outlier ranking mechanism for enterprise users. Empirical results also confirm the effectiveness of the method by achieving the best area under curve value of 0.7648 for the receiver operating characteristic curve.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"101 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Vehicle Incident Hot Spots Identification: An Approach for Big Data 车辆事故热点识别:基于大数据的方法
Pub Date : 2017-09-11 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.329
I. Triguero, G. Figueredo, M. Mesgarpour, J. Garibaldi, R. John
In this work we introduce a fast big data approach for road incident hot spot identification using Apache Spark. We implement an existing immuno-inspired mechanism, namely SeleSup, as a series of MapReduce-like operations. SeleSup is composed of a number of iterations that remove data redundancies and result in the detection of areas of high likelihood of vehicles incidents. It has been successfully applied to large datasets, however, as the size of the data increases to millions of instances, its performance drops significantly. Our objective therefore is to re-conceptualise the method for big data. In this paper we present the new implementation, the challenges faced when converting the method for the Apache Spark platform as well as the outcomes obtained. For our experiments we employ a large dataset containing hundreds of thousands of Heavy Good Vehicles incidents, collected via telematics. Results show a significant improvement in performance with no detriment to the accuracy of the method.
本文介绍了一种基于Apache Spark的道路事故热点快速大数据识别方法。我们实现了一个现有的免疫启发机制,即SeleSup,作为一系列类似mapreduce的操作。SeleSup由多次迭代组成,可以消除数据冗余,从而检测出车辆事故的高可能性区域。它已经成功地应用于大型数据集,但是,当数据的大小增加到数百万个实例时,它的性能会显著下降。因此,我们的目标是重新定义大数据的方法。在本文中,我们介绍了新的实现,在将该方法转换为Apache Spark平台时所面临的挑战以及所获得的结果。在我们的实验中,我们使用了一个大型数据集,其中包含数十万个重型车辆事故,这些事故是通过远程信息处理收集的。结果表明,在不损害该方法的准确性的情况下,性能有了显著改善。
{"title":"Vehicle Incident Hot Spots Identification: An Approach for Big Data","authors":"I. Triguero, G. Figueredo, M. Mesgarpour, J. Garibaldi, R. John","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.329","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.329","url":null,"abstract":"In this work we introduce a fast big data approach for road incident hot spot identification using Apache Spark. We implement an existing immuno-inspired mechanism, namely SeleSup, as a series of MapReduce-like operations. SeleSup is composed of a number of iterations that remove data redundancies and result in the detection of areas of high likelihood of vehicles incidents. It has been successfully applied to large datasets, however, as the size of the data increases to millions of instances, its performance drops significantly. Our objective therefore is to re-conceptualise the method for big data. In this paper we present the new implementation, the challenges faced when converting the method for the Apache Spark platform as well as the outcomes obtained. For our experiments we employ a large dataset containing hundreds of thousands of Heavy Good Vehicles incidents, collected via telematics. Results show a significant improvement in performance with no detriment to the accuracy of the method.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation SEEAD:一种基于语义的自动二进制代码去混淆方法
Pub Date : 2017-09-11 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.246
Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Z. Wang
Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs. As a result, these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel and generic semantic-based de-obfuscation system. When building SEEAD, we try to rely on as few assumptions about the structure of the obfuscation tool as possible, so that the system can keep pace with the fast evolving code obfuscation techniques. To increase the code coverage, SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic profiling scheme is rife with taint and control dependence analysis to reduce the search overhead, and a carefully designed protection scheme to bring the program to an error free status should any error happens during dynamic profile runs. As a result, the increased code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional dynamic analysis based de-obfuscation approaches. We evaluate SEEAD on a range of benign and malicious obfuscated programs. Our experimental results show that SEEAD is able to successfully recover the original logic from obfuscated binaries.
越来越复杂的代码混淆技术被恶意软件开发人员迅速采用,以逃避恶意软件检测并挫败安全分析人员的逆向工程努力。最先进的去混淆方法依赖于动态分析,但是面临低代码覆盖率的挑战,因为不是所有的软件执行路径和行为都将在特定的分析运行中暴露出来。因此,这些方法往往无法发现隐藏的恶意模式。介绍了一种新型的通用的基于语义的去混淆系统SEEAD。在构建SEEAD时,我们尝试尽可能少地依赖于混淆工具结构的假设,以便系统能够与快速发展的代码混淆技术保持同步。为了增加代码覆盖率,SEEAD动态地指导目标程序在不同的运行中执行不同的路径。这种动态分析方案充满了污染和控制依赖分析,以减少搜索开销,并且精心设计了保护方案,以便在动态分析运行期间发生任何错误时使程序处于无错误状态。因此,增加的代码覆盖率使我们能够发现隐藏的恶意行为,这些行为是传统的基于去混淆方法的动态分析无法检测到的。我们在一系列良性和恶意混淆程序上评估SEEAD。实验结果表明,SEEAD能够成功地从混淆的二进制文件中恢复原始逻辑。
{"title":"SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation","authors":"Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Z. Wang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.246","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.246","url":null,"abstract":"Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs. As a result, these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel and generic semantic-based de-obfuscation system. When building SEEAD, we try to rely on as few assumptions about the structure of the obfuscation tool as possible, so that the system can keep pace with the fast evolving code obfuscation techniques. To increase the code coverage, SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic profiling scheme is rife with taint and control dependence analysis to reduce the search overhead, and a carefully designed protection scheme to bring the program to an error free status should any error happens during dynamic profile runs. As a result, the increased code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional dynamic analysis based de-obfuscation approaches. We evaluate SEEAD on a range of benign and malicious obfuscated programs. Our experimental results show that SEEAD is able to successfully recover the original logic from obfuscated binaries.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes 在数据库审计记录中实施监管链规定,以供司法鉴定之用
Pub Date : 2017-09-11 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.299
Denys A. Flores, A. Jhumka
During forensic database investigations, audit records become a crucial evidential element; particularly, when certain events can be attributed to insider activity. However, traditional reactive forensic methods may not be suitable, urging the adoption of proactive approaches that can be used to ensure accountability through audit records whilst satisfying Chain of Custody (CoC) requirements for forensic purposes. In this paper, role segregation, evidence provenance, event timeliness and causality are considered as CoC requirements in order to implement a forensically ready architecture for the proactive generation, collection and preservation of database audit records that can be used as digital evidence for the investigation of insider activity. Our proposal implements triggers and stored procedures as forensic routines in order to build a vector-clock-based timeline for explaining causality in transactional events recorded in audit tables. We expect to encourage further work in the field of proactive digital forensics and forensic readiness; in particular, for justifying admissibility of audit records under CoC restrictions.
在司法数据库调查中,审计记录成为重要的证据要素;特别是当某些事件可以归因于内部活动时。然而,传统的被动法证方法可能不适合,敦促采用积极主动的方法,可以通过审计记录来确保问责制,同时满足法务目的的监管链(CoC)要求。在本文中,角色隔离、证据来源、事件时效性和因果关系被认为是CoC的要求,以便实现一个法医就绪的架构,用于主动生成、收集和保存数据库审计记录,这些记录可以用作调查内幕活动的数字证据。我们的建议将触发器和存储过程实现为取证例程,以构建基于矢量时钟的时间轴,用于解释审计表中记录的事务事件中的因果关系。我们希望鼓励在主动数字取证和取证准备领域进一步开展工作;特别是为了证明在CoC限制下审计记录的可接受性。
{"title":"Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes","authors":"Denys A. Flores, A. Jhumka","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.299","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299","url":null,"abstract":"During forensic database investigations, audit records become a crucial evidential element; particularly, when certain events can be attributed to insider activity. However, traditional reactive forensic methods may not be suitable, urging the adoption of proactive approaches that can be used to ensure accountability through audit records whilst satisfying Chain of Custody (CoC) requirements for forensic purposes. In this paper, role segregation, evidence provenance, event timeliness and causality are considered as CoC requirements in order to implement a forensically ready architecture for the proactive generation, collection and preservation of database audit records that can be used as digital evidence for the investigation of insider activity. Our proposal implements triggers and stored procedures as forensic routines in order to build a vector-clock-based timeline for explaining causality in transactional events recorded in audit tables. We expect to encourage further work in the field of proactive digital forensics and forensic readiness; in particular, for justifying admissibility of audit records under CoC restrictions.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"53 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Authenticating Compromisable Storage Systems 验证易入侵存储系统
Pub Date : 2017-09-11 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.216
Jiangshan Yu, M. Ryan, Liqun Chen
A service may be implemented over several servers, and those servers may become compromised by an attacker, e.g. through software vulnerabilities. When this happens, the service manager will remove the vulnerabilities and re-instate the server. Typically, this will involve regenerating the public key by which clients authenticate the service, and revoking the old one. This paper presents a scheme which allows a storage service composed of several servers to create a group public key in a decentralised manner, and maintain its security even when such compromises take place. By maintaining keys for a long term, we reduce the reliance on public-key certification. The storage servers periodically update the decryption secrets corresponding to a public key, in such a way that secrets gained by an attacker are rendered useless after an update takes place. An attacker would have to compromise all the servers within a short period lying between two updates in order to fully compromise the system.
服务可以在多个服务器上实现,这些服务器可能会被攻击者破坏,例如通过软件漏洞。发生这种情况时,服务管理器将删除漏洞并重新恢复服务器。通常,这将涉及重新生成客户端用来验证服务的公钥,并撤销旧的公钥。本文提出了一种方案,该方案允许由多个服务器组成的存储服务以分散的方式创建组公钥,并在发生此类妥协时保持其安全性。通过长期维护密钥,我们减少了对公钥认证的依赖。存储服务器定期更新与公钥相对应的解密秘密,这样在更新发生后,攻击者获得的秘密就变得无用了。攻击者必须在两次更新之间的短时间内破坏所有服务器,才能完全破坏系统。
{"title":"Authenticating Compromisable Storage Systems","authors":"Jiangshan Yu, M. Ryan, Liqun Chen","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.216","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.216","url":null,"abstract":"A service may be implemented over several servers, and those servers may become compromised by an attacker, e.g. through software vulnerabilities. When this happens, the service manager will remove the vulnerabilities and re-instate the server. Typically, this will involve regenerating the public key by which clients authenticate the service, and revoking the old one. This paper presents a scheme which allows a storage service composed of several servers to create a group public key in a decentralised manner, and maintain its security even when such compromises take place. By maintaining keys for a long term, we reduce the reliance on public-key certification. The storage servers periodically update the decryption secrets corresponding to a public key, in such a way that secrets gained by an attacker are rendered useless after an update takes place. An attacker would have to compromise all the servers within a short period lying between two updates in order to fully compromise the system.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Public Key Encryption Scheme for String Identification 用于字符串识别的公钥加密方案
Pub Date : 2017-09-11 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.226
I. G. Ray, M. Rajarajan
One of the major limitations of index based encrypted string search on big dataset is the inherent problem of big index generation, maintenance and update which stops it from being dynamic in a sense that one could not modify data or add or remove keywords. Also for a resource constraint client, to generate an index linear in the size of big dataset is difficult. In this paper, we provide an efficient easy-toimplement public key based searchable encryption scheme for string search which is adaptively secure and does not need any index. We provide concrete proof of the adaptive security of our scheme against honest-but-curious server. We validate our scheme against three different publicly available datasets.
在大数据集上基于索引的加密字符串搜索的主要限制之一是大索引生成、维护和更新的固有问题,这使得它无法动态地修改数据或添加或删除关键字。此外,对于资源受限的客户端,在大数据集的大小上生成一个线性索引是很困难的。本文提出了一种高效、易于实现的基于公钥的字符串搜索加密方案,该方案具有自适应安全性,且不需要任何索引。我们提供了针对诚实但好奇的服务器的自适应安全性的具体证明。我们针对三个不同的公开可用数据集验证我们的方案。
{"title":"A Public Key Encryption Scheme for String Identification","authors":"I. G. Ray, M. Rajarajan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.226","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.226","url":null,"abstract":"One of the major limitations of index based encrypted string search on big dataset is the inherent problem of big index generation, maintenance and update which stops it from being dynamic in a sense that one could not modify data or add or remove keywords. Also for a resource constraint client, to generate an index linear in the size of big dataset is difficult. In this paper, we provide an efficient easy-toimplement public key based searchable encryption scheme for string search which is adaptively secure and does not need any index. We provide concrete proof of the adaptive security of our scheme against honest-but-curious server. We validate our scheme against three different publicly available datasets.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are? 在线社交网络信息取证:对各种工具使用的调查和确定Facebook用户的谨慎程度?
Pub Date : 2017-09-07 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.364
Amber Umair, P. Nanda, Xiangjian He
Online Social Networks (OSN) such as Facebook, Twitter, LinkedIn, and Instagram are heavily used to socialize, entertain or gain insights on people behavior and their activities. Everyday terabytes of data is generated over these networks, which is then used by the businesses to generate revenue or misused by the wrongdoers to exploit vulnerabilities of these social network platforms. Specifically social network information helps in extracting various important features such as; user association, access pattern, location information etc. Recent research shows, many such features could be used to develop novel attack models and investigate further into defending the users from exposing their information to outsiders. This paper analyzes some of the available tools to extract OSN information and discusses research work on similar type of unstructured data. Recent research works, which focus on gathering bits and pieces of information to extract meaningful results for digital forensics, has been discussed. An online survey is conducted to gauge the cautiousness of users in social media usage in terms of personal information dissemination.
在线社交网络(OSN),如Facebook、Twitter、LinkedIn和Instagram,被大量用于社交、娱乐或了解人们的行为和活动。这些网络每天都会产生数兆字节的数据,然后这些数据被企业用来创收,或者被不法分子滥用来利用这些社交网络平台的漏洞。具体来说,社交网络信息有助于提取各种重要特征,例如;用户关联、访问模式、位置信息等。最近的研究表明,许多这样的特征可以用来开发新的攻击模型,并进一步研究如何保护用户不向外界暴露他们的信息。本文分析了一些可用的OSN信息提取工具,并讨论了类似类型的非结构化数据的研究工作。讨论了最近的研究工作,重点是收集零碎的信息,以提取有意义的数字取证结果。我们进行了一项在线调查,以衡量用户在社交媒体使用中对个人信息传播的谨慎程度。
{"title":"Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?","authors":"Amber Umair, P. Nanda, Xiangjian He","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.364","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.364","url":null,"abstract":"Online Social Networks (OSN) such as Facebook, Twitter, LinkedIn, and Instagram are heavily used to socialize, entertain or gain insights on people behavior and their activities. Everyday terabytes of data is generated over these networks, which is then used by the businesses to generate revenue or misused by the wrongdoers to exploit vulnerabilities of these social network platforms. Specifically social network information helps in extracting various important features such as; user association, access pattern, location information etc. Recent research shows, many such features could be used to develop novel attack models and investigate further into defending the users from exposing their information to outsiders. This paper analyzes some of the available tools to extract OSN information and discusses research work on similar type of unstructured data. Recent research works, which focus on gathering bits and pieces of information to extract meaningful results for digital forensics, has been discussed. An online survey is conducted to gauge the cautiousness of users in social media usage in terms of personal information dissemination.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme 一种高效的析取查询排序可搜索加密方案
Pub Date : 2017-09-07 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.267
Shahzaib Tahir, S. Ruj, M. Rajarajan
Cloud computing motivates data owners to economically outsource large amounts of data to the cloud. To preserve the privacy and confidentiality of the documents, the documents need to be encrypted prior to being outsourced to the cloud. In this paper, we propose a lightweight construction that facilitates ranked disjunctive keyword (multi-keyword) searchable encryption based on probabilistic trapdoors. The security analysis yieldsthat the probabilistic trapdoors help resist distinguishability attacks. Through the computational complexity analysis we realize that our scheme outperforms similar existing schemes. We explore the use of searchable encryption in the telecom domain by implementing and deploying our proof of concept prototypeonto the British Telecommunication's Public Cloud offering and testing it over a real corpus of audio transcriptions. The extensive experimentation thereafter validates our claim that our scheme is lightweight.
云计算促使数据所有者将大量数据经济地外包到云上。为了保护文档的隐私性和机密性,文档需要在外包给云之前进行加密。在本文中,我们提出了一种基于概率陷阱门的轻量级结构,该结构便于排序析取关键字(多关键字)可搜索加密。安全性分析表明,概率陷阱门有助于抵御可识别性攻击。通过计算复杂度分析,我们发现我们的方案优于现有的类似方案。我们通过在英国电信的公共云产品上实施和部署我们的概念验证原型,并在真实的音频转录语料库上进行测试,探索在电信领域使用可搜索加密。此后的大量实验证实了我们的方案是轻量级的。
{"title":"An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme","authors":"Shahzaib Tahir, S. Ruj, M. Rajarajan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.267","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267","url":null,"abstract":"Cloud computing motivates data owners to economically outsource large amounts of data to the cloud. To preserve the privacy and confidentiality of the documents, the documents need to be encrypted prior to being outsourced to the cloud. In this paper, we propose a lightweight construction that facilitates ranked disjunctive keyword (multi-keyword) searchable encryption based on probabilistic trapdoors. The security analysis yieldsthat the probabilistic trapdoors help resist distinguishability attacks. Through the computational complexity analysis we realize that our scheme outperforms similar existing schemes. We explore the use of searchable encryption in the telecom domain by implementing and deploying our proof of concept prototypeonto the British Telecommunication's Public Cloud offering and testing it over a real corpus of audio transcriptions. The extensive experimentation thereafter validates our claim that our scheme is lightweight.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data 外包数据的安全和轻量级细粒度访问机制
Pub Date : 2017-09-07 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.238
Mosarrat Jahan, P. Roy, K. Sakurai, A. Seneviratne, Sanjay Jha
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation of CP-ABE is that users can modify the access policy specified by the data owner if write operations are introduced in the scheme. We propose a protocol for providing different levels of access to outsourced data that permits the authorized users to perform write operation without altering the access policy specified by the data owner. Our scheme provides fine-grained read/write access to the users, accompanied with a light weight signature scheme and computationally inexpensive user revocation mechanism suitable for resource-constrained mobile devices. The security analysis demonstrates the robustness of the proposed scheme.
在本文中,我们探讨了在一个支持来自多个域的用户的环境中,为使用移动设备的客户提供对外包数据的选择性读/写访问的问题,其中属性由多个权威生成。我们考虑了基于密文策略属性的加密(CP-ABE)方案,因为它可以对加密的外包数据提供访问控制。CP-ABE的一个限制是,如果在方案中引入了写操作,用户可以修改数据所有者指定的访问策略。我们提出了一种协议,用于提供对外包数据的不同级别的访问,允许授权用户在不更改数据所有者指定的访问策略的情况下执行写操作。我们的方案为用户提供了细粒度的读/写访问,伴随着轻量级的签名方案和计算成本低廉的用户撤销机制,适合资源受限的移动设备。安全性分析证明了该方案的鲁棒性。
{"title":"Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data","authors":"Mosarrat Jahan, P. Roy, K. Sakurai, A. Seneviratne, Sanjay Jha","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.238","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238","url":null,"abstract":"In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation of CP-ABE is that users can modify the access policy specified by the data owner if write operations are introduced in the scheme. We propose a protocol for providing different levels of access to outsourced data that permits the authorized users to perform write operation without altering the access policy specified by the data owner. Our scheme provides fine-grained read/write access to the users, accompanied with a light weight signature scheme and computationally inexpensive user revocation mechanism suitable for resource-constrained mobile devices. The security analysis demonstrates the robustness of the proposed scheme.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks 6LoWPAN无线传感器网络的轻量级认证协议(LAUP)
Pub Date : 2017-09-07 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.260
Annie Gilda Roselin, P. Nanda, S. Nepal
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor for secure key distribution. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool for authentication properties such as Aliveness, Secrecy, Non-Injective Agreement and Non-Injective Synchronization. We simulated and evaluated the proposed LAUP protocol using COOJA simulator with ContikiOS and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES.
涉及无线传感器的lowpan网络由资源匮乏的微型传感器节点组成。由于这些资源受限传感器的安全身份验证是通信过程中的重要考虑因素之一,因此使用非对称密钥分发方案可能不是实现安全身份验证的完美选择。最近的研究表明,幸运十三攻击已经破坏了采用密码块链(CBC)模式建立密钥的数据报传输层安全(DTLS)。尽管用于密钥建立的EAKES6Lo和S3K技术遵循对称密钥建立方法,但它们强烈依赖远程服务器和信任锚来进行安全密钥分发。我们提出的轻量级认证协议(LAUP)使用无预共享密钥的对称密钥方法,由四个航班组成,在6LoWPAN环境中建立传感器和边缘路由器之间的认证和会话密钥分配。每个航班都使用从现有信息中获取的新密钥,如PAN ID(个人区域网络识别)和设备身份。我们使用Scyther安全协议验证工具对我们的方案进行了正式验证,验证属性包括活动性、保密性、非内射协议和非内射同步。我们使用COOJA模拟器和ContikiOS对提出的LAUP协议进行了仿真和评估,与现有的认证协议(如EAKES6Lo和SAKES)相比,实现了更少的计算时间和更低的功耗。
{"title":"Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks","authors":"Annie Gilda Roselin, P. Nanda, S. Nepal","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.260","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.260","url":null,"abstract":"6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor for secure key distribution. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool for authentication properties such as Aliveness, Secrecy, Non-Injective Agreement and Non-Injective Synchronization. We simulated and evaluated the proposed LAUP protocol using COOJA simulator with ContikiOS and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1