Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00018
Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao
Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.
块存储是IaaS (infrastructure as a service)云计算系统中必不可少的资源。它用于存储虚拟机的映像。它提供持久的存储服务,即使虚拟机是关闭的。分布式存储系统用于提供IaaS中的块存储服务,如Amazon EBS、Cinder、Ceph、Sheepdog等。Ceph作为OpenStack平台的后端块存储服务被广泛使用。它将块设备转换成具有相同大小的对象,并保存在本地文件系统中。在很多情况下,Ceph提供的块设备的性能只有硬盘的30%。影响Ceph性能的关键问题之一是容错的三个副本。但我们的研究发现,副本并不是降低性能的真正原因。在本文中,我们提出了一种加速IO操作的新方法。实验结果表明,通过使用我们的存储引擎,Ceph在大多数情况下可以提供比硬盘更快的IO性能。我们的新存储引擎提供的容量是原来的三倍以上。
{"title":"A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing","authors":"Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao","doi":"10.1109/ICDIS.2019.00018","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00018","url":null,"abstract":"Block storage resources are essential in an Infrastructure-as-a-Service(IaaS) cloud computing system. It is used for storing virtual machines’ images. It offers persistent storage service even the virtual machine is off. Distribute storage systems are used to provide block storage services in IaaS, such as Amazon EBS, Cinder, Ceph, Sheepdog. Ceph is widely used as the backend block storage service of OpenStack platform. It converts block devices into objects with the same size and saves them on the local file system. The performance of block devices provided by Ceph is only 30% of hard disks in many cases. One of the key issues that affect the performance of Ceph is the three replicas for fault tolerance. But our research finds that replicas are not the real reason slow down the performance. In this paper, we present a new approach to accelerate the IO operations. The experiment results show that by using our storage engine, Ceph can offer faster IO performance than the hard disk in most cases. Our new storage engine provides more than three times up than the original one.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00041
Faruk Ahmed, M. Mahmud, M. Yeasin
Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.
{"title":"RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired","authors":"Faruk Ahmed, M. Mahmud, M. Yeasin","doi":"10.1109/ICDIS.2019.00041","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00041","url":null,"abstract":"Way-finding is crucial for visually impaired as well as sighted persons. Already navigated way is useful for the visually impaired if reused. In this research, we present an assistive technology solution of reusable way-finding with obstacle avoidance for the visually impaired. We trained a recurrent neural network (RNN) model to predict the navigation activities. These activities are used as the building blocks of reusable way. A fine-tuned convolution neural network (CNN) model is used to detect obstacle. Both models are incorporated in a smart phone application to construct, share, and reuse a navigation way. The evaluation shows that using the application the visually impaired were able to navigate 95% times accurately without external help.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00017
S. Mohammadi, M. Papa, E. Pereyra, C. Sarica
A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.
{"title":"Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm","authors":"S. Mohammadi, M. Papa, E. Pereyra, C. Sarica","doi":"10.1109/ICDIS.2019.00017","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00017","url":null,"abstract":"A genetic algorithm is used to help determine the best set of closure relationships to model multiphase flow behavior in pipes. This modeling is typically done through a mechanistic approach that uses conservation equations of mass and momentum. In addition, a set of closure relationships are required to complete the system of equations which are developed based on experimental data. Owing to a large number of possible closures, the size of the search space suffers from a combinatorial explosion problem and subject matter experts are often used to select the best solution. This paper presents a genetic algorithm, implemented in R, that is used to automate the process. Preliminary results show that it has the ability to select combinations as good as or better than those of a human expert in a reasonable amount of time.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00009
Sanjeev Kumar, Harsh Kumar, G. Gunnam
Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.
{"title":"Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack","authors":"Sanjeev Kumar, Harsh Kumar, G. Gunnam","doi":"10.1109/ICDIS.2019.00009","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00009","url":null,"abstract":"Cyber security has been a top concern for electric power companies deploying smart meters and smart grid technology. Despite the well-known advantages of smart grid technology and the smart meters, it is not yet very clear how and to what extent, the Cyber attacks can hamper the operation of the smart meters, and remote data collections regarding the power usage from the customer sites. To understand these questions, we conducted experiments in a controlled lab environment of our cyber security lab to test a commercial grade smart meter. In this paper, we present results of our investigation for a commercial grade smart meter and measure the operation integrity of the smart meter under cyber-attack conditions.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00008
Xinchi He, Ethan Robards, R. Gamble, M. Papa
Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.
{"title":"Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System","authors":"Xinchi He, Ethan Robards, R. Gamble, M. Papa","doi":"10.1109/ICDIS.2019.00008","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00008","url":null,"abstract":"Timely detection of network traffic anomalies in oil and gas wells is critical to support operations. This paper describes a network sensor that has been specifically designed to operate within an existing well-monitoring infrastructure. Network traffic and flow features are extracted in real-time and compared against pre-set and moving averages to detect and report anomalies. A prototype has been tested using the Modbus protocol and network traffic covering several months of operations. In order to avoid potential impact on the production environment, scripts captured network packets that were then replayed on the IMUNES network emulator. Preliminary results have identified useful metrics for anomaly detection in a production environment.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00020
Zachary Hill, J. Hale, M. Papa, P. Hawrylak
Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.
{"title":"Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols","authors":"Zachary Hill, J. Hale, M. Papa, P. Hawrylak","doi":"10.1109/ICDIS.2019.00020","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00020","url":null,"abstract":"Simulations are a useful tool for developing and testing security solutions for SCADA systems. However, these simulations can require significant modifications to reflect proposed changes in the system, such as a change in register structure or communication protocol. This paper presents a specification language that can be used to allow the communication protocol within a simulation to be easily modified by allowing key details such as packet and register structure to be modified outside of the simulation's code.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00042
Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar
With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.
随着当今网络和联网设备的发展和扩大,信息安全问题日益受到关注。机密性是数字通信系统网络安全的焦点之一,其中大数据块通过带有密钥的加密算法,从而增加了输出密文的安全性和复杂性。在过去的几年中,在数据加密过程中开发和使用了多种安全算法,如数据加密标准DES (data encryption Standard)、三重数据加密标准3DES (Triple data encryption Standard),以及目前由美国国家标准与技术研究院(NIST)指定的高级加密标准AES (Advanced encryption Standard)。AES是一种对称加密算法,其最小输入数据块大小为128位,在几轮中经历一系列排列、替换和数字逻辑操作。加密算法在密文复杂度、所需硬件存储分配和执行时间等方面一直在不断改进。现场可编程门阵列(FPGA)是加密算法实现的硬件替代方案,因为尽管其中的逻辑单元是固定的,但它们之间的功能和互连是基于用户的设计,允许改进。研究重点是在Altera Cyclone IV FPGA上使用Intel Quartus II软件和Verilog硬件描述语言开发和分析有效的AES-128 Mix Columns算法实现,该算法用于数据块加密轮。
{"title":"Improved Mix Column Computation of Cryptographic AES","authors":"Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar","doi":"10.1109/ICDIS.2019.00042","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00042","url":null,"abstract":"With today's development and expansion of networks and internet-connected devices, information security is an issue of increasing concern. Confidentiality is one of the focuses in network security for digital communication systems, where large data blocks go through a cryptographic algorithm with a cipher key that increases the security and complexity of the output ciphertext. For the past several years, multiple security algorithms have been developed and utilized in the data encryption process, such as the Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and the current one, designated by the U.S. National Institute of Standards and Technology (NIST), the Advanced Encryption Standard (AES). AES is a symmetric encryption algorithm that has a minimum input data block size of 128-bits which undergo a series of permutations, substitutions, and digital logic operations over several rounds. Encryption algorithms are always improving on ciphertext complexity, required hardware storage allocation, and execution time. Field Programmable Gate Arrays (FPGA's) are a hardware alternative for encryption algorithm implementation because, although the logic units in it are fixed, the functions and interconnections between them are based on the user's design which allow for improvement. The research presented focuses on the development and analysis of an efficient AES-128 Mix Columns algorithm implementation, utilized in the data block encryption rounds, on an Altera Cyclone IV FPGA using the Intel Quartus II software and Verilog Hardware Description Language.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00028
Lee B. Hinkle, K. Khoshhal, V. Metsis
In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.
{"title":"Physiological Measurement for Emotion Recognition in Virtual Reality","authors":"Lee B. Hinkle, K. Khoshhal, V. Metsis","doi":"10.1109/ICDIS.2019.00028","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00028","url":null,"abstract":"In this work, various non-invasive sensors are used to collect physiological data during subject interaction with virtual reality environments. The collected data are used to recognize the subjects' emotional response to stimuli. The shortcomings and challenges faced during the data collection and labeling process are discussed, and solutions are proposed. A machine learning approach is adopted for emotion classification. Our experiments show that feature extraction is a crucial step in the classification process. A collection of general purpose features that can be extracted from a variety of physiological biosignals is proposed. Our experimental results show that the proposed feature set achieves better emotion classification accuracy compared to traditional domain-specific features used in previous studies.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00034
Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas
This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.
本文解决了数据库洗牌算法不能保持数据依赖关系的问题。我们介绍了一种在数据库洗牌过程中保留功能依赖关系和数据驱动关联的方法。我们使用Boyce-Codd范式(BCNF)分解来保持功能依赖。给定一个非BCNF形式的关系R,我们建议将R分解为BCNF关系R1,…Rn,。每个Ri (i = 1,…,n)被洗牌,然后重新连接以创建洗牌关系。我们的方法保证了无损性并保留了功能依赖性。数据驱动的关联也可能在数据库变换期间丢失。为此,我们生成关联属性的传递闭包。我们需要将相关的属性混在一起。我们还提出了我们的理论和实证结果。
{"title":"Data Dependencies Preserving Shuffle in Relational Database","authors":"Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, C. Farkas","doi":"10.1109/ICDIS.2019.00034","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00034","url":null,"abstract":"This paper addresses the problem that database shuffling algorithms do not preserve data dependencies. We introduce an approach for preserving functional dependencies and data-driven associations during database shuffle. We use Boyce-Codd Normal Form (BCNF) decomposition for preserving functional dependencies. Given a relation R that is not in BCNF form, we recommend to decompose R into BCNF relations R1, ..., Rn. Each Ri (i = 1, ...,n) is shuffled then rejoined to create the shuffled relation. Our approach guarantees losslessness and preserves functional dependencies. Data-driven associations may also be lost during database shuffling. For this, we generate the transitive closure of attributes that are associated. We require that the associated attributed are shuffled together. We also present our theoretical and empirical results.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.1109/ICDIS.2019.00039
Maryann Njorbuenwu, Bobby Swar, P. Zavarsky
Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.
{"title":"A Survey on the Impacts of Quantum Computers on Information Security","authors":"Maryann Njorbuenwu, Bobby Swar, P. Zavarsky","doi":"10.1109/ICDIS.2019.00039","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00039","url":null,"abstract":"Quantum computers differ from traditional computers because unlike traditional computers that use and process information in bits (0 or 1), the unit of information in quantum computers is the quantum bit, or qubit, that can represent additional states beyond ones and zeros at the same time. The additional states called superimposition and entanglement facilitate phenomenal processing speed of quantum computers. The emergence of quantum computers has raised many concerns in various areas of information security. This paper employs a literature survey methodology to elucidate the positive and negative impacts of quantum computers on information security. This paper further addresses the concern that quantum computers will negatively impact information security by examining all recommended information security and privacy controls of the NIST SP 800-53 Rev. 5 catalog of controls. Furthermore, the paper briefly outlines the recent work towards quantum-resistant standards.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}