首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS 在多租户SaaS中利用NoSQL进行可扩展和动态数据加密
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.327
A. Rafique, D. Landuyt, Vincent Reniers, W. Joosen
In the context of multi-tenant SaaS applications, data confidentiality support is increasingly being offered from within the application layer instead of the database layer or the storage layer to accommodate continuously changing requirements of multiple tenants. Application-level data management middleware platforms are becoming increasingly compelling for dealing with the complexity of a multi-cloud or a federated cloud storage architecture as well as multi-tenant SaaS applications.However, these platforms typically support traditional data mapping strategies that are created under the assumption of a fixed and rigorous database schema. Thus, mapping data objects while supporting varying data confidentiality requirements, therefore, leads to fragmentation of data over distributed storage nodes. This introduces significant performance overhead at the level of individual database transactions (e.g., CRUD transactions) and negatively affects the overall scalability.To address these challenges, we present a dedicated data mapping strategy that leverages the data schema flexibility of columnar NoSQL databases to accomplish dynamic and fine-grained data encryption in a more efficient and scalable manner. We validate these solutions in the context of an industrial multi-tenant SaaS application and conduct a comprehensive performance evaluation. The results confirm that the proposed data mapping strategy indeed yields scalability and performance improvements.
在多租户SaaS应用程序的上下文中,数据机密性支持越来越多地从应用层而不是数据库层或存储层提供,以适应多个租户不断变化的需求。应用程序级数据管理中间件平台在处理多云或联合云存储架构以及多租户SaaS应用程序的复杂性方面正变得越来越有吸引力。然而,这些平台通常支持传统的数据映射策略,这些策略是在固定且严格的数据库模式的假设下创建的。因此,在映射数据对象的同时支持不同的数据机密性需求,会导致分布式存储节点上的数据碎片化。这在单个数据库事务(例如,CRUD事务)级别上引入了显著的性能开销,并对整体可伸缩性产生负面影响。为了应对这些挑战,我们提出了一种专用的数据映射策略,该策略利用列式NoSQL数据库的数据模式灵活性,以更有效和可扩展的方式完成动态和细粒度的数据加密。我们在工业多租户SaaS应用程序的上下文中验证了这些解决方案,并进行了全面的性能评估。结果证实,所提出的数据映射策略确实产生了可伸缩性和性能改进。
{"title":"Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS","authors":"A. Rafique, D. Landuyt, Vincent Reniers, W. Joosen","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.327","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.327","url":null,"abstract":"In the context of multi-tenant SaaS applications, data confidentiality support is increasingly being offered from within the application layer instead of the database layer or the storage layer to accommodate continuously changing requirements of multiple tenants. Application-level data management middleware platforms are becoming increasingly compelling for dealing with the complexity of a multi-cloud or a federated cloud storage architecture as well as multi-tenant SaaS applications.However, these platforms typically support traditional data mapping strategies that are created under the assumption of a fixed and rigorous database schema. Thus, mapping data objects while supporting varying data confidentiality requirements, therefore, leads to fragmentation of data over distributed storage nodes. This introduces significant performance overhead at the level of individual database transactions (e.g., CRUD transactions) and negatively affects the overall scalability.To address these challenges, we present a dedicated data mapping strategy that leverages the data schema flexibility of columnar NoSQL databases to accomplish dynamic and fine-grained data encryption in a more efficient and scalable manner. We validate these solutions in the context of an industrial multi-tenant SaaS application and conduct a comprehensive performance evaluation. The results confirm that the proposed data mapping strategy indeed yields scalability and performance improvements.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advancing Trust Visualisations for Wider Applicability and User Acceptance 为更广泛的适用性和用户接受推进信任可视化
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285
O. Kulyk, B. Reinheimer, Paul Gerber, Florian Volk, M. Volkamer, M. Mühlhäuser
There are only a few visualisations targeting the communication of trust statements. Even though there are some advanced and scientifically founded visualisations—like, for example, the opinion triangle, the human trust interface, and T-Viz—the stars interface known from e-commerce platforms is by far the most common one. In this paper, we propose two trust visualisations based on T-Viz, which was recently proposed and successfully evaluated in large user studies. Despite being the most promising proposal, its design is not primarily based on findings from human-computer interaction or cognitive psychology. Our visualisations aim to integrate such findings and to potentially improve decision making in terms of correctness and efficiency. A large user study reveals that our proposed visualisations outperform T-Viz in these factors.
只有几个可视化的目标是信任语句的沟通。尽管有一些先进的、有科学依据的可视化方法,比如意见三角、人际信任界面和t - viz,但电子商务平台上的明星界面是迄今为止最常见的一种。在本文中,我们提出了两种基于T-Viz的信任可视化,这是最近在大型用户研究中提出并成功评估的。尽管这是最有希望的提议,但它的设计主要不是基于人机交互或认知心理学的发现。我们的可视化旨在整合这些发现,并潜在地提高决策的正确性和效率。一项大型用户研究表明,我们提出的可视化在这些因素上优于T-Viz。
{"title":"Advancing Trust Visualisations for Wider Applicability and User Acceptance","authors":"O. Kulyk, B. Reinheimer, Paul Gerber, Florian Volk, M. Volkamer, M. Mühlhäuser","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.285","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.285","url":null,"abstract":"There are only a few visualisations targeting the communication of trust statements. Even though there are some advanced and scientifically founded visualisations—like, for example, the opinion triangle, the human trust interface, and T-Viz—the stars interface known from e-commerce platforms is by far the most common one. In this paper, we propose two trust visualisations based on T-Viz, which was recently proposed and successfully evaluated in large user studies. Despite being the most promising proposal, its design is not primarily based on findings from human-computer interaction or cognitive psychology. Our visualisations aim to integrate such findings and to potentially improve decision making in terms of correctness and efficiency. A large user study reveals that our proposed visualisations outperform T-Viz in these factors.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization 基于多特征和聚类集成的恶意软件自动分类方法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.222
Yunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang
Automatic malware categorization plays an important role in combating the current large volume of malware and aiding the corresponding forensics. Generally, there are lot of sample information could be extracted with the static tools and dynamic sandbox for malware analysis. Combine these obtained features effectively for further analysis would provides us a better understanding. On the other hand, most current works on malware analysis are based on single category of machine learning algorithm to categorize samples. However, different clustering algorithms have their own strengths and weaknesses. And then, how to combine the merits of the multiple categories of features and algorithms to further improve the analysis result is very critical. In this paper, we propose a novel scalable malware analysis framework to exploit the complementary nature of different features and algorithms to optimally integrate their results. By using the concept of clustering ensemble, our system combines partitions from individual category of feature and algorithm to obtain better quality and robustness. Our system composed of the following three parts: (1) extract multiple categories of static and dynamic features; (2) use the k-means and hierarchical clustering algorithms to construct the base clustering; (3) proposed an efficient method based on mixture model clustering ensemble to conduct an effective clustering analysis. We have evaluated our method on two malware datasets, namely the Microsoft malware dataset and our own malware dataset which contained 10868 and 53760 samples respectively. Our experiment results show that our method could categorize malware with better quality and robustness. Also, our method has certain advantages in the system run time and memory consumption compared with the state-of-the art malware analysis works
恶意软件自动分类在对抗当前大量的恶意软件和辅助相应的取证方面起着重要的作用。通常,静态工具和动态沙箱可以提取大量样本信息,用于恶意软件分析。将这些获得的特征有效地结合起来进行进一步的分析,将使我们更好地理解。另一方面,目前大多数恶意软件分析工作都是基于单一类别的机器学习算法对样本进行分类。然而,不同的聚类算法都有自己的优缺点。然后,如何结合多类特征和算法的优点来进一步改进分析结果是非常关键的。在本文中,我们提出了一种新的可扩展的恶意软件分析框架,以利用不同特征和算法的互补性来优化集成它们的结果。系统采用聚类集成的概念,将特征的分类与算法相结合,获得了更好的质量和鲁棒性。我们的系统由以下三个部分组成:(1)提取多类静态和动态特征;(2)利用k-means和分层聚类算法构建基聚类;(3)提出了一种基于混合模型聚类集成的高效聚类分析方法。我们在两个恶意软件数据集上评估了我们的方法,即微软恶意软件数据集和我们自己的恶意软件数据集,分别包含10868和53760个样本。实验结果表明,该方法对恶意软件的分类具有较好的质量和鲁棒性。此外,与现有的恶意软件分析方法相比,该方法在系统运行时间和内存消耗方面具有一定的优势
{"title":"Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization","authors":"Yunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.222","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.222","url":null,"abstract":"Automatic malware categorization plays an important role in combating the current large volume of malware and aiding the corresponding forensics. Generally, there are lot of sample information could be extracted with the static tools and dynamic sandbox for malware analysis. Combine these obtained features effectively for further analysis would provides us a better understanding. On the other hand, most current works on malware analysis are based on single category of machine learning algorithm to categorize samples. However, different clustering algorithms have their own strengths and weaknesses. And then, how to combine the merits of the multiple categories of features and algorithms to further improve the analysis result is very critical. In this paper, we propose a novel scalable malware analysis framework to exploit the complementary nature of different features and algorithms to optimally integrate their results. By using the concept of clustering ensemble, our system combines partitions from individual category of feature and algorithm to obtain better quality and robustness. Our system composed of the following three parts: (1) extract multiple categories of static and dynamic features; (2) use the k-means and hierarchical clustering algorithms to construct the base clustering; (3) proposed an efficient method based on mixture model clustering ensemble to conduct an effective clustering analysis. We have evaluated our method on two malware datasets, namely the Microsoft malware dataset and our own malware dataset which contained 10868 and 53760 samples respectively. Our experiment results show that our method could categorize malware with better quality and robustness. Also, our method has certain advantages in the system run time and memory consumption compared with the state-of-the art malware analysis works","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Adapting MapReduce for Efficient Watermarking of Large Relational Dataset 基于MapReduce的大型关系数据集高效水印
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.306
S. Rani, Dileep Kumar Koshley, Raju Halder
In the era of big-data when volume is increasing at an unprecedented rate, structured data is not an exception from this. A survey in 2013 by TDWI says that, for a quarter of organizations, big-data mostly takes the form of the relational and structured data that comes from traditional applications. In this reality, watermarking of large volume of structured relational dataset using existing watermarking techniques are highly inefficient, and even impractical in the situations when periodic rewatermarking after a certain time frame is necessary. As a remedy of this, in this paper, we adapt MapReduce as an effective distributive way of watermarking of large relational dataset. We show how existing algorithms can easily be converted into an equivalent form in MapReduce paradigm. We present experimental evaluation results on a benchmark dataset to establish the effectiveness of our approach. The results demonstrate significant improvements in watermark generation and detection times w.r.t. existing works in the literature.
在数据量以前所未有的速度增长的大数据时代,结构化数据也不例外。TDWI在2013年进行的一项调查显示,对于四分之一的组织来说,大数据主要是来自传统应用程序的关系数据和结构化数据。在这种情况下,使用现有的水印技术对大容量的结构化关系数据集进行水印是非常低效的,甚至在需要在一定时间框架后周期性地重新进行水印的情况下是不切实际的。为了解决这一问题,本文采用MapReduce作为一种有效的分布式方法对大型关系数据集进行水印处理。我们展示了如何将现有算法轻松转换为MapReduce范式中的等效形式。我们在一个基准数据集上给出了实验评估结果,以确定我们的方法的有效性。结果表明,与现有文献相比,该方法在水印生成和检测次数方面有显著提高。
{"title":"Adapting MapReduce for Efficient Watermarking of Large Relational Dataset","authors":"S. Rani, Dileep Kumar Koshley, Raju Halder","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.306","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.306","url":null,"abstract":"In the era of big-data when volume is increasing at an unprecedented rate, structured data is not an exception from this. A survey in 2013 by TDWI says that, for a quarter of organizations, big-data mostly takes the form of the relational and structured data that comes from traditional applications. In this reality, watermarking of large volume of structured relational dataset using existing watermarking techniques are highly inefficient, and even impractical in the situations when periodic rewatermarking after a certain time frame is necessary. As a remedy of this, in this paper, we adapt MapReduce as an effective distributive way of watermarking of large relational dataset. We show how existing algorithms can easily be converted into an equivalent form in MapReduce paradigm. We present experimental evaluation results on a benchmark dataset to establish the effectiveness of our approach. The results demonstrate significant improvements in watermark generation and detection times w.r.t. existing works in the literature.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deployment of Intrusion Detection System in Cloud: A Performance-Based Study 云环境下入侵检测系统部署:基于性能的研究
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.359
Varun Mahajan, S. K. Peddoju
The aim of Cloud Computing environment is to provide low cost, reliable, rapid, on-demand services to the users anywhere and anytime. But with its rapid development the security challenges are numerous. The capability of the malicious users to compromise cloud security from outside and inside has increased many folds. Hence organizations and users are skeptical about the security of cloud based services. To detect various attack patterns there are different deployment scenarios and detection methods of intrusion detection system( IDS) a cloud administrator can adopt. The Network IDS and Host IDS techniques have gone a long way in detection of known and unknown attacks in cloud infrastructure as a Service (IaaS). This paper focuses on deployment of signaturebased IDS for detection of intrusion at network level and cloud VM instances. It discusses the flow of traffic in provider and self-service provider network architecture in OpenStack environment and use of port mirroring to detect intrusion. The results evaluate the CPU and memory performance measure of IDS and management of the alerts generated due to malicious and non-malicious traffic at varying speed.
云计算环境的目标是随时随地为用户提供低成本、可靠、快速、按需的服务。但随着其快速发展,安全挑战也层出不穷。恶意用户从外部和内部破坏云安全的能力增加了许多倍。因此,组织和用户对基于云的服务的安全性持怀疑态度。为了检测各种攻击模式,云管理员可以采用不同的入侵检测系统部署场景和检测方法。网络IDS和主机IDS技术在检测云基础设施即服务(IaaS)中的已知和未知攻击方面已经取得了长足的进步。本文重点研究了基于签名的入侵检测系统在网络级和云虚拟机实例中的部署。讨论了OpenStack环境下提供商网络和自助服务提供商网络的流量结构,以及使用端口镜像检测入侵。结果评估了IDS的CPU和内存性能度量,以及由于不同速度的恶意和非恶意流量而生成的警报的管理。
{"title":"Deployment of Intrusion Detection System in Cloud: A Performance-Based Study","authors":"Varun Mahajan, S. K. Peddoju","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.359","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.359","url":null,"abstract":"The aim of Cloud Computing environment is to provide low cost, reliable, rapid, on-demand services to the users anywhere and anytime. But with its rapid development the security challenges are numerous. The capability of the malicious users to compromise cloud security from outside and inside has increased many folds. Hence organizations and users are skeptical about the security of cloud based services. To detect various attack patterns there are different deployment scenarios and detection methods of intrusion detection system( IDS) a cloud administrator can adopt. The Network IDS and Host IDS techniques have gone a long way in detection of known and unknown attacks in cloud infrastructure as a Service (IaaS). This paper focuses on deployment of signaturebased IDS for detection of intrusion at network level and cloud VM instances. It discusses the flow of traffic in provider and self-service provider network architecture in OpenStack environment and use of port mirroring to detect intrusion. The results evaluate the CPU and memory performance measure of IDS and management of the alerts generated due to malicious and non-malicious traffic at varying speed.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis 网络追踪:归因追踪分析的概率相关模式识别方法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.301
Jian Xu, Xiao-chun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Network attack prevention is a critical research area of information security. Network attacks would become choked if attribution techniques are capable of tracing back to the attacker after the hacking event. Therefore, attributing these attacks to a person or organization turns into one of the important tasks when analysts attempt to profile the attacker behind attack traces. To facilitate this process, we research on the connections among attribution traces and propose methods based on probabilistic relevance. First, we present a two-layer NetworkTrace frame, then based on relevance patterns, we propose the existence probability of concerned subjects. At last, we quantify the connection relevance between subjects through a Ref algorithm. By means of analyzing the attribution traces extracted from APT1 report, we illustrate the effectiveness of the existence probability algorithm. Then, we demonstrate Ref's effectiveness in quantifying the relevancies between organization and its affinitive partners by analyzing the relevancies and draw relevance matrix between APT1 inodes. The results show the proposed NetworkTrace facilitates the evaluation of the plausibility relevance between different traceable subjects.
网络攻击防范是信息安全的一个重要研究领域。如果归因技术能够在黑客攻击事件发生后追踪到攻击者,那么网络攻击就会被阻断。因此,当分析人员试图分析攻击痕迹背后的攻击者时,将这些攻击归因于个人或组织就变成了重要的任务之一。为了促进这一过程,我们研究了归因痕迹之间的联系,并提出了基于概率关联的方法。首先,我们提出了一个两层的网络跟踪框架,然后基于相关模式,我们提出了相关主题的存在概率。最后,我们通过Ref算法量化主题之间的连接相关性。通过分析从APT1报告中提取的归因痕迹,验证了存在概率算法的有效性。然后,我们通过分析关联并绘制APT1节点之间的关联矩阵来证明Ref在量化组织与其亲和性伙伴之间的关联方面的有效性。结果表明,所提出的网络追踪方法有助于评估不同可追踪对象之间的可信性相关性。
{"title":"NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis","authors":"Jian Xu, Xiao-chun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.301","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301","url":null,"abstract":"Network attack prevention is a critical research area of information security. Network attacks would become choked if attribution techniques are capable of tracing back to the attacker after the hacking event. Therefore, attributing these attacks to a person or organization turns into one of the important tasks when analysts attempt to profile the attacker behind attack traces. To facilitate this process, we research on the connections among attribution traces and propose methods based on probabilistic relevance. First, we present a two-layer NetworkTrace frame, then based on relevance patterns, we propose the existence probability of concerned subjects. At last, we quantify the connection relevance between subjects through a Ref algorithm. By means of analyzing the attribution traces extracted from APT1 report, we illustrate the effectiveness of the existence probability algorithm. Then, we demonstrate Ref's effectiveness in quantifying the relevancies between organization and its affinitive partners by analyzing the relevancies and draw relevance matrix between APT1 inodes. The results show the proposed NetworkTrace facilitates the evaluation of the plausibility relevance between different traceable subjects.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Large-Scale Multi-label Ensemble Learning on Spark 基于Spark的大规模多标签集成学习
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.328
Jorge Gonzalez-Lopez, Alberto Cano, S. Ventura
Multi-label learning is a challenging problem which has received growing attention in the research community over the last years. Hence, there is a growing demand of effective and scalable multi-label learning methods for larger datasets both in terms of number of instances and numbers of output labels. The use of ensemble classifiers is a popular approach for improving multi-label model accuracy, especially for datasets with high-dimensional label spaces. However, the increasing computational complexity of the algorithms in such ever-growing high-dimensional label spaces, requires new approaches to manage data effectively and efficiently in distributed computing environments. Spark is a framework based on MapReduce, a distributed programming model that offers a robust paradigm to handle large-scale datasets in a cluster of nodes. This paper focuses on multi-label ensembles and proposes a number of implementations through the use of parallel and distributed computing using Spark. Additionally, five different implementations are proposed and the impact on the performance of the ensemble is analyzed. The experimental study shows the benefits of using distributed implementations over the traditional single-node single-thread execution, in terms of performance over multiple metrics as well as significant speedup tested on 29 benchmark datasets.
多标签学习是一个具有挑战性的问题,近年来在研究界受到越来越多的关注。因此,在实例数量和输出标签数量方面,对于更大数据集的有效和可扩展的多标签学习方法的需求不断增长。使用集成分类器是提高多标签模型精度的一种流行方法,特别是对于具有高维标签空间的数据集。然而,在这种不断增长的高维标签空间中,算法的计算复杂性不断增加,需要新的方法来有效地管理分布式计算环境中的数据。Spark是一个基于MapReduce的框架,MapReduce是一个分布式编程模型,提供了一个健壮的范例来处理节点集群中的大规模数据集。本文重点研究了多标签集成,并提出了一些使用Spark并行和分布式计算的实现方法。此外,还提出了五种不同的实现方法,并分析了它们对集成性能的影响。实验研究表明,就多个指标的性能以及在29个基准数据集上测试的显著加速而言,使用分布式实现优于传统的单节点单线程执行。
{"title":"Large-Scale Multi-label Ensemble Learning on Spark","authors":"Jorge Gonzalez-Lopez, Alberto Cano, S. Ventura","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.328","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.328","url":null,"abstract":"Multi-label learning is a challenging problem which has received growing attention in the research community over the last years. Hence, there is a growing demand of effective and scalable multi-label learning methods for larger datasets both in terms of number of instances and numbers of output labels. The use of ensemble classifiers is a popular approach for improving multi-label model accuracy, especially for datasets with high-dimensional label spaces. However, the increasing computational complexity of the algorithms in such ever-growing high-dimensional label spaces, requires new approaches to manage data effectively and efficiently in distributed computing environments. Spark is a framework based on MapReduce, a distributed programming model that offers a robust paradigm to handle large-scale datasets in a cluster of nodes. This paper focuses on multi-label ensembles and proposes a number of implementations through the use of parallel and distributed computing using Spark. Additionally, five different implementations are proposed and the impact on the performance of the ensemble is analyzed. The experimental study shows the benefits of using distributed implementations over the traditional single-node single-thread execution, in terms of performance over multiple metrics as well as significant speedup tested on 29 benchmark datasets.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Base Extent Optimization for RNS Montgomery Algorithm RNS Montgomery算法的基本范围优化
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.344
Yifeng Mo, Shuguo Li
Base extent (BE) is the most costly operation in classic RNS Montgomery multiplication. In this paper, we propose a method to optimize Chinese Remainder Theorem (CRT)- based BE, where some common factors are extracted that the precomputed parameters of BEs can be adjusted to some forms with a small Hamming weight if modulo selected properly. Four modulo are selected to demonstrate the advantage of the proposed method. Using the proposed method and four modulo, the 32 multiplications of BEs can be replaced with 40 additions. The most efficient algorithm state of the art requires 48 multiplication for a system of four modulo while the proposed method reduced the number of the required multiplications from 48 to 20. Our method allows faster computation of RNS Montgomery multiplication.
基数范围(BE)是经典RNS蒙哥马利乘法中最昂贵的运算。本文提出了一种基于中国剩余定理(CRT)的BE优化方法,该方法提取了一些共同因子,通过选取适当的模,可以将预先计算的BE参数调整为具有较小汉明权值的形式。选择了四个模来证明该方法的优越性。利用所提出的方法和4模,32个乘法可以用40个加法代替。目前最有效的算法对于四模系统需要48次乘法,而所提出的方法将所需的乘法次数从48次减少到20次。我们的方法可以更快地计算RNS Montgomery乘法。
{"title":"Base Extent Optimization for RNS Montgomery Algorithm","authors":"Yifeng Mo, Shuguo Li","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.344","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.344","url":null,"abstract":"Base extent (BE) is the most costly operation in classic RNS Montgomery multiplication. In this paper, we propose a method to optimize Chinese Remainder Theorem (CRT)- based BE, where some common factors are extracted that the precomputed parameters of BEs can be adjusted to some forms with a small Hamming weight if modulo selected properly. Four modulo are selected to demonstrate the advantage of the proposed method. Using the proposed method and four modulo, the 32 multiplications of BEs can be replaced with 40 additions. The most efficient algorithm state of the art requires 48 multiplication for a system of four modulo while the proposed method reduced the number of the required multiplications from 48 to 20. Our method allows faster computation of RNS Montgomery multiplication.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SOMR: Towards a Security-Oriented MapReduce Infrastructure SOMR:面向安全的MapReduce基础设施
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.281
Rui Zhao, Z. Meng, Yan Zheng, Qiangguo Jin, Anbang Ruan, Hanglun Xie
MapReduce system over a cloud computing infrastructure has made an extensive use in the field of finance, medical health, scientific research, traffic, energy and so on which attracts more and more attention on the security of the platform. Due to the sensitivity of the data in these fields, the user suffers great threat on their privacy and security. And the wrong results produced by the MapReduce platform may mislead the user to a big disaster. Current solutions mainly focus on the procedure of encryption before transmission and storage and decryption when processing. However, these solutions cannot prevent the user data stolen by the data processing program and the wrong result produced by the platform. In this paper, we propose a Security-Oriented MapReduce (SOMR) infrastructure that integrates the big-data processing framework, key management system and trusted computing infrastructure to ensure the security of every operation. While big data processing framework controls the life cycle of the cloud computing platform, key management system provides the trust assurance of encryption and trusted computing infrastructure makes measurable verification on the platform, SOMR presents a persistent security guarantee on the user data and processing results. We implemented SOMR on the infrastructure of OpenStack with Sahara, Barbican and OAT. The evaluations on our prototype showed that the platform can resist many typical attacker behaviors, and the overheads can be reduced to a very low level.
基于云计算基础设施的MapReduce系统在金融、医疗卫生、科研、交通、能源等领域得到了广泛的应用,其平台的安全性越来越受到人们的关注。由于这些领域数据的敏感性,用户的隐私和安全受到很大的威胁。而MapReduce平台产生的错误结果可能会误导用户走向大灾难。目前的解决方案主要集中在传输前加密、存储和处理后解密的过程上。然而,这些解决方案并不能防止用户数据被数据处理程序窃取和平台产生错误的结果。在本文中,我们提出了一种面向安全的MapReduce (SOMR)基础设施,该基础设施集成了大数据处理框架、密钥管理系统和可信计算基础设施,以确保每个操作的安全性。大数据处理框架控制着云计算平台的生命周期,密钥管理系统提供了加密的信任保证,可信计算基础设施对平台进行了可度量的验证,SOMR对用户数据和处理结果提供了持久的安全保障。我们在OpenStack的基础设施上使用Sahara、Barbican和OAT实现了SOMR。对我们的原型进行的评估表明,该平台可以抵御许多典型的攻击者行为,并且可以将开销降低到非常低的水平。
{"title":"SOMR: Towards a Security-Oriented MapReduce Infrastructure","authors":"Rui Zhao, Z. Meng, Yan Zheng, Qiangguo Jin, Anbang Ruan, Hanglun Xie","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.281","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.281","url":null,"abstract":"MapReduce system over a cloud computing infrastructure has made an extensive use in the field of finance, medical health, scientific research, traffic, energy and so on which attracts more and more attention on the security of the platform. Due to the sensitivity of the data in these fields, the user suffers great threat on their privacy and security. And the wrong results produced by the MapReduce platform may mislead the user to a big disaster. Current solutions mainly focus on the procedure of encryption before transmission and storage and decryption when processing. However, these solutions cannot prevent the user data stolen by the data processing program and the wrong result produced by the platform. In this paper, we propose a Security-Oriented MapReduce (SOMR) infrastructure that integrates the big-data processing framework, key management system and trusted computing infrastructure to ensure the security of every operation. While big data processing framework controls the life cycle of the cloud computing platform, key management system provides the trust assurance of encryption and trusted computing infrastructure makes measurable verification on the platform, SOMR presents a persistent security guarantee on the user data and processing results. We implemented SOMR on the infrastructure of OpenStack with Sahara, Barbican and OAT. The evaluations on our prototype showed that the platform can resist many typical attacker behaviors, and the overheads can be reduced to a very low level.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning 车辆队列中使用车辆投影进行位置验证的可行性
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.239
Tasnuva Tithi, Chris Winstead, Ryan M. Gerdes
This work investigates the viability of using the visible shadows cast by vehicles to verify position claims made by vehicles in a platoon. Platooning is a method of guiding a group of vehicles whereby a lead vehicle determines the speed/velocity of the vehicles that follow. A cooperative following strategy is then employed by the followers to maintain a desired separation between themselves. In this way a group of vehicles acts as a single unit, which has been shown to have many safety and efficiency benefits. Existing work, however, demonstrates that a disruptive member of a platoon is capable of causing the rest of the platoon to increase its total energy expenditure, or even destabilizing the platoon, which could result in catastrophic accidents. Knowledge about the position and velocity of each vehicle can help deter such attacks by attributing the disruption to the specific vehicle causing it.One way to achieve this is to assume that the lead vehicle is trusted and equipped with a camera so as to watch over the platoon and identify deviations from reported positions/velocities. As platoons often move in a straight line, it might be impossible for the leader to obtain a direct view of all the vehicles in the platoon. Under a broad range of circumstances, however, a direct view of the vehicle or the shadows of the vehicles are visible to the leader. In this work we investigate whether the differential distance between shadows, as viewed through a monocular camera, can reveal that the distance between two vehicles has changed over time, and thus serve as a mechanism to verify positions claims. When a direct view of the vehicle is not achievable, the use of shadows to detect the relative positions of vehicles under a variety of weather and daylight conditions are considered. Our analysis finds that shadow analysis can be used in sequential images to detect practical changes in the distance between two vehicles for visible shadows in non-light-of-sightscenarios. We also present the analysis to efficiently use the technique as the position of the Sun changes through out the day for a given site location.
这项工作调查了使用车辆投射的可见阴影来验证车辆在排中的位置声明的可行性。队列是一种引导一组车辆的方法,其中领头的车辆决定后面车辆的速度/速度。然后,追随者采用合作跟随策略来保持他们之间的期望分离。以这种方式,一组车辆作为一个单一的单位,这已被证明有许多安全和效率的好处。然而,现有的研究表明,队列中的破坏性成员能够导致队列中的其他成员增加其总能量消耗,甚至破坏队列的稳定,这可能导致灾难性事故。了解每辆车的位置和速度可以帮助阻止这种攻击,将破坏归因于造成破坏的特定车辆。实现这一目标的一种方法是假设领队车辆是可信的,并配备了摄像头,以便监视整个排并识别与报告位置/速度的偏差。由于排通常在直线上移动,领队可能无法直接看到排中的所有车辆。然而,在广泛的情况下,车辆的直接视图或车辆的阴影对领导者是可见的。在这项工作中,我们研究了通过单目摄像机观察到的阴影之间的差异距离是否可以揭示两辆车之间的距离随着时间的推移而变化,从而作为验证位置声明的机制。当无法直接看到车辆时,可以考虑使用阴影来检测车辆在各种天气和日光条件下的相对位置。我们的分析发现,阴影分析可以在连续图像中使用,以检测两辆车之间距离的实际变化,因为在非视觉场景中可见阴影。我们还提供了分析,以有效地使用该技术,因为太阳的位置在给定的地点全天变化。
{"title":"Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle Platooning","authors":"Tasnuva Tithi, Chris Winstead, Ryan M. Gerdes","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.239","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.239","url":null,"abstract":"This work investigates the viability of using the visible shadows cast by vehicles to verify position claims made by vehicles in a platoon. Platooning is a method of guiding a group of vehicles whereby a lead vehicle determines the speed/velocity of the vehicles that follow. A cooperative following strategy is then employed by the followers to maintain a desired separation between themselves. In this way a group of vehicles acts as a single unit, which has been shown to have many safety and efficiency benefits. Existing work, however, demonstrates that a disruptive member of a platoon is capable of causing the rest of the platoon to increase its total energy expenditure, or even destabilizing the platoon, which could result in catastrophic accidents. Knowledge about the position and velocity of each vehicle can help deter such attacks by attributing the disruption to the specific vehicle causing it.One way to achieve this is to assume that the lead vehicle is trusted and equipped with a camera so as to watch over the platoon and identify deviations from reported positions/velocities. As platoons often move in a straight line, it might be impossible for the leader to obtain a direct view of all the vehicles in the platoon. Under a broad range of circumstances, however, a direct view of the vehicle or the shadows of the vehicles are visible to the leader. In this work we investigate whether the differential distance between shadows, as viewed through a monocular camera, can reveal that the distance between two vehicles has changed over time, and thus serve as a mechanism to verify positions claims. When a direct view of the vehicle is not achievable, the use of shadows to detect the relative positions of vehicles under a variety of weather and daylight conditions are considered. Our analysis finds that shadow analysis can be used in sequential images to detect practical changes in the distance between two vehicles for visible shadows in non-light-of-sightscenarios. We also present the analysis to efficiently use the technique as the position of the Sun changes through out the day for a given site location.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115891848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1