首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP CDRAS:一种在IP语音环境下处理中间人攻击的方法
S. Hofbauer, G. Quirchmayr, Christopher C. Wills
This paper describes the CDRAS (Call Detail Records Analysis System) system, the motivation behind it, its approach and its background. The system aims at dealing with the notorious Man-in-the-Middle attack in the context of VoIP. As the use of such a system constitutes leads to an interference with the privacy of users, the most relevant legal aspects related to this work are also briefly discussed.
本文介绍了CDRAS (Call Detail Records Analysis System)系统的开发动机、开发方法和开发背景。该系统旨在解决VoIP环境中臭名昭著的中间人攻击。由于使用这种系统会导致对用户隐私的干扰,因此还简要讨论了与这项工作相关的最相关的法律方面。
{"title":"CDRAS: An Approach to Dealing with Man-in-the-Middle Attacks in the Context of Voice over IP","authors":"S. Hofbauer, G. Quirchmayr, Christopher C. Wills","doi":"10.1109/ARES.2011.59","DOIUrl":"https://doi.org/10.1109/ARES.2011.59","url":null,"abstract":"This paper describes the CDRAS (Call Detail Records Analysis System) system, the motivation behind it, its approach and its background. The system aims at dealing with the notorious Man-in-the-Middle attack in the context of VoIP. As the use of such a system constitutes leads to an interference with the privacy of users, the most relevant legal aspects related to this work are also briefly discussed.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems 基于集成无监督和半监督学习的可靠云系统主动故障管理
Qiang Guan, Ziming Zhang, Song Fu
Cloud computing systems continue to grow in their scale and complexity. They are changing dynamically as well due to the addition and removal of system components, changing execution environments, frequent updates and upgrades, online repairs and more. In such large-scale complex and dynamic systems, failures are common. In this paper, we present a failure prediction mechanism exploiting both unsupervised and semi-supervised learning techniques for building dependable cloud computing systems. The unsupervised failure detection method uses an ensemble of Bayesian models. It characterizes normal execution states of the system and detects anomalous behaviors. After the anomalies are verified by system administrators, labeled data are available. Then, we apply supervised learning based on decision tree classier to predict future failure occurrences in the cloud. Experimental results in an institute-wide cloud computing system show that our proposed method can forecast failure dynamics with high accuracy.
云计算系统的规模和复杂性在持续增长。由于系统组件的添加和删除、执行环境的变化、频繁的更新和升级、在线维修等原因,它们也在动态变化。在这种大型复杂动态系统中,故障是常见的。在本文中,我们提出了一种利用无监督和半监督学习技术构建可靠云计算系统的故障预测机制。无监督故障检测方法使用贝叶斯模型的集合。它描述系统的正常执行状态并检测异常行为。经过系统管理员验证后,有标签的数据可用。然后,我们应用基于决策树分类器的监督学习来预测云中的未来故障发生。在一个研究院级云计算系统中的实验结果表明,该方法能够较准确地预测故障动态。
{"title":"Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems","authors":"Qiang Guan, Ziming Zhang, Song Fu","doi":"10.1109/ARES.2011.20","DOIUrl":"https://doi.org/10.1109/ARES.2011.20","url":null,"abstract":"Cloud computing systems continue to grow in their scale and complexity. They are changing dynamically as well due to the addition and removal of system components, changing execution environments, frequent updates and upgrades, online repairs and more. In such large-scale complex and dynamic systems, failures are common. In this paper, we present a failure prediction mechanism exploiting both unsupervised and semi-supervised learning techniques for building dependable cloud computing systems. The unsupervised failure detection method uses an ensemble of Bayesian models. It characterizes normal execution states of the system and detects anomalous behaviors. After the anomalies are verified by system administrators, labeled data are available. Then, we apply supervised learning based on decision tree classier to predict future failure occurrences in the cloud. Experimental results in an institute-wide cloud computing system show that our proposed method can forecast failure dynamics with high accuracy.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Security SLAs for Federated Cloud Services 联邦云服务的安全sla
K. Bernsmed, M. Jaatun, P. H. Meland, A. Undheim
The federated Cloud paradigm aims to provide flexible and reliable services composed of a mixture of internal and external mini-clouds, but this heterogeneous nature is also fuelling the security concerns of the customers. To allay the fears and deal with the threats associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents current work on Cloud Security Service Level Agreements and our approach on how to manage this in the context of hybrid clouds. The purpose is to facilitate rapid service composition and agreements based on the necessary security requirements and establish trust between the customer and provider. We also show how this can be applied on a realistic case study related to a hybrid Unified Communication service.
联邦云范式旨在提供由内部和外部迷你云混合组成的灵活可靠的服务,但这种异构性也加剧了客户的安全担忧。为了减轻这种担忧,并处理与将数据和应用程序外包到云相关的威胁,迫切需要新的安全保证方法。本文介绍了当前在云安全服务水平协议方面的工作,以及我们在混合云环境下如何管理它的方法。其目的是促进基于必要安全需求的快速服务组合和协议,并在客户和提供者之间建立信任。我们还将展示如何将其应用于与混合统一通信服务相关的实际案例研究。
{"title":"Security SLAs for Federated Cloud Services","authors":"K. Bernsmed, M. Jaatun, P. H. Meland, A. Undheim","doi":"10.1109/ARES.2011.34","DOIUrl":"https://doi.org/10.1109/ARES.2011.34","url":null,"abstract":"The federated Cloud paradigm aims to provide flexible and reliable services composed of a mixture of internal and external mini-clouds, but this heterogeneous nature is also fuelling the security concerns of the customers. To allay the fears and deal with the threats associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents current work on Cloud Security Service Level Agreements and our approach on how to manage this in the context of hybrid clouds. The purpose is to facilitate rapid service composition and agreements based on the necessary security requirements and establish trust between the customer and provider. We also show how this can be applied on a realistic case study related to a hybrid Unified Communication service.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Compositional Synthesis of Temporal Fault Trees from State Machines 基于状态机的时间故障树合成
Pub Date : 2011-08-22 DOI: 10.1145/2185395.2185444
Nidhal Mahmud, M. Walker, Y. Papadopoulos
Dependability analysis of a dynamic system which is embedded with several complex interrelated components raises two main problems. First, it is difficult to represent in a single coherent and complete picture how the system and its constituent parts behave in conditions of failure. Second, the analysis can be unmanageable due to a considerable number of failure events which increases with the number of components involved. To remedy this problem, in this paper we outline a scalable analysis approach that converts failure behavioural models -- state machines (SMs) -- to temporal fault trees (TFTs), which can then be analysed using Pandora (a recent technique for introducing temporal logic to fault trees). The improved scalability of the approach stems from a compositional synthesis of the TFTs (generated from the individual component SMs) for Pandora analysis. We show, by using a Generic Triple Redundant (GTR) system, how the approach enables a more accurate and full analysis of an increasingly complex system.
对一个由多个相互关联的复杂部件组成的动态系统进行可靠性分析,提出了两个主要问题。首先,很难用一幅连贯完整的图像来表示系统及其组成部分在故障条件下的行为。其次,由于大量的故障事件随着所涉及的组件数量的增加而增加,分析可能无法管理。为了解决这个问题,我们在本文中概述了一种可扩展的分析方法,该方法将故障行为模型——状态机(SMs)——转换为时间故障树(tft),然后可以使用Pandora(一种将时间逻辑引入故障树的最新技术)对其进行分析。该方法的改进可扩展性源于用于Pandora分析的tft(由单个组件SMs生成)的组合合成。通过使用通用三重冗余(GTR)系统,我们展示了该方法如何能够对日益复杂的系统进行更准确和全面的分析。
{"title":"Compositional Synthesis of Temporal Fault Trees from State Machines","authors":"Nidhal Mahmud, M. Walker, Y. Papadopoulos","doi":"10.1145/2185395.2185444","DOIUrl":"https://doi.org/10.1145/2185395.2185444","url":null,"abstract":"Dependability analysis of a dynamic system which is embedded with several complex interrelated components raises two main problems. First, it is difficult to represent in a single coherent and complete picture how the system and its constituent parts behave in conditions of failure. Second, the analysis can be unmanageable due to a considerable number of failure events which increases with the number of components involved. To remedy this problem, in this paper we outline a scalable analysis approach that converts failure behavioural models -- state machines (SMs) -- to temporal fault trees (TFTs), which can then be analysed using Pandora (a recent technique for introducing temporal logic to fault trees). The improved scalability of the approach stems from a compositional synthesis of the TFTs (generated from the individual component SMs) for Pandora analysis. We show, by using a Generic Triple Redundant (GTR) system, how the approach enables a more accurate and full analysis of an increasingly complex system.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"126 50","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Enhance Data Privacy in Service Compositions through a Privacy Proxy 通过隐私代理增强服务组合中的数据隐私
Zhendong Ma, Juergen Mangler, C. Wagner, T. Bleier
Web services are loosely coupled Web-enabled applications that can be dynamically invoked to facilitate business interactions through well-defined interfaces over the Internet. However, since personal data will be exchanged between nested Web services, the question how to preserve a user's data privacy becomes a challenging issue. In this paper we aim to minimize personal data disclosure in service composition that consists several nested Web services. To do so, we propose a practical, scalable and light-weight privacy-enhanced design that uses a privacy proxy to achieve data privacy. We furthermore show that by utilizing the privacy proxy in combination with advertising its capabilities and requirements as service level agreements (SLA's), it is possible to enhance data privacy in existing service infrastructure in a minimal invasive manner.
Web服务是松散耦合的支持Web的应用程序,可以动态调用这些应用程序,以便通过Internet上定义良好的接口促进业务交互。然而,由于个人数据将在嵌套的Web服务之间交换,因此如何保护用户的数据隐私成为一个具有挑战性的问题。在本文中,我们的目标是尽量减少由几个嵌套的Web服务组成的服务组合中的个人数据泄露。为此,我们提出了一种实用的、可扩展的、轻量级的隐私增强设计,该设计使用隐私代理来实现数据隐私。我们进一步表明,通过结合使用隐私代理并将其功能和需求作为服务水平协议(SLA)进行宣传,可以以最小的侵入方式增强现有服务基础设施中的数据隐私。
{"title":"Enhance Data Privacy in Service Compositions through a Privacy Proxy","authors":"Zhendong Ma, Juergen Mangler, C. Wagner, T. Bleier","doi":"10.1109/ARES.2011.94","DOIUrl":"https://doi.org/10.1109/ARES.2011.94","url":null,"abstract":"Web services are loosely coupled Web-enabled applications that can be dynamically invoked to facilitate business interactions through well-defined interfaces over the Internet. However, since personal data will be exchanged between nested Web services, the question how to preserve a user's data privacy becomes a challenging issue. In this paper we aim to minimize personal data disclosure in service composition that consists several nested Web services. To do so, we propose a practical, scalable and light-weight privacy-enhanced design that uses a privacy proxy to achieve data privacy. We furthermore show that by utilizing the privacy proxy in combination with advertising its capabilities and requirements as service level agreements (SLA's), it is possible to enhance data privacy in existing service infrastructure in a minimal invasive manner.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132700750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Smatch Model: Extending RBAC Sessions in Virtualization Environment Smatch模型:虚拟化环境下RBAC会话的扩展
N. Cuppens-Boulahia, F. Cuppens, Marie Nuadi
This paper extends RBAC sessions with share ability, reusability and switch ability properties. We define the Smatch (Secure Management of switch) model in which authorized users can join, leave, reopen and reuse dynamic sessions. In Smatch, subjects can also share sessions and dynamically switch their role or function with other subjects from the same or die rent organizations. Subjects can authenticate using their function which will automatically activate the set of roles associated with this function. The Smatch model is based on first order logic with actions. It provides means to specify contextual access control and authentication policies which apply to control functional behavior of dynamic sessions. We suggest an implementation of Smatch using virtual machines.
本文扩展了RBAC会话,使其具有共享性、可重用性和切换性。我们定义了Smatch(交换机安全管理)模型,其中授权用户可以加入、离开、重新打开和重用动态会话。在Smatch中,主体还可以共享会话,并与来自相同组织或租用组织的其他主体动态切换其角色或功能。主体可以使用其函数进行身份验证,该函数将自动激活与此函数关联的角色集。Smatch模型基于带有动作的一阶逻辑。它提供了指定上下文访问控制和身份验证策略的方法,这些策略应用于控制动态会话的功能行为。我们建议使用虚拟机实现Smatch。
{"title":"Smatch Model: Extending RBAC Sessions in Virtualization Environment","authors":"N. Cuppens-Boulahia, F. Cuppens, Marie Nuadi","doi":"10.1109/ARES.2011.13","DOIUrl":"https://doi.org/10.1109/ARES.2011.13","url":null,"abstract":"This paper extends RBAC sessions with share ability, reusability and switch ability properties. We define the Smatch (Secure Management of switch) model in which authorized users can join, leave, reopen and reuse dynamic sessions. In Smatch, subjects can also share sessions and dynamically switch their role or function with other subjects from the same or die rent organizations. Subjects can authenticate using their function which will automatically activate the set of roles associated with this function. The Smatch model is based on first order logic with actions. It provides means to specify contextual access control and authentication policies which apply to control functional behavior of dynamic sessions. We suggest an implementation of Smatch using virtual machines.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Declassification Policy Management in Dynamic Information Systems 动态信息系统中的解密策略管理
Julien A. Thomas, N. Cuppens-Boulahia, F. Cuppens
Standard multilevel security (MLS) poli- cies lack flexibility as data classification is consid- ered static. Previous works have addressed this issue and defined declassification requirements, especially in programming languages using a language-based security approach. In this paper, we suggest a dif- ferent approach. We show how to define and enforce declassification policies in databases, seen as sets of logical facts. We first define an information flow con- trol model where data classification may dynamically change. This model combines both confidentiality and integrity requirements to enforce security. We then specify how to enforce declassification policies. Our approach relies on Event-Condition-Action (ECA) rules and provides means to manage the four basic di- mensions of declassification, namely the what?, who?, where? and when? which respectively refer to model- ing information to be declassified, entities responsible for declassification, localization of the declassification and contextual conditions that control declassifica- tion. We formalize and specify our declassification policies and prove it safe and secure with respect to the information flow control model.
由于数据分类被认为是静态的,标准的多层安全策略缺乏灵活性。以前的工作已经解决了这个问题并定义了解密要求,特别是在使用基于语言的安全方法的编程语言中。在本文中,我们提出了一种不同的方法。我们将展示如何在数据库中定义和执行解密策略,将其视为一组逻辑事实。我们首先定义了一个信息流控制模型,其中数据分类可以动态变化。该模型结合了机密性和完整性需求来增强安全性。然后我们指定如何执行解密策略。我们的方法依赖于事件-条件-行动(ECA)规则,并提供了管理解密的四个基本维度的方法,即什么?,谁?,在哪里?当吗?其中分别指待解密的建模信息、负责解密的实体、解密的定位和控制解密的上下文条件。我们形式化并指定我们的解密策略,并证明它在信息流控制模型方面是安全可靠的。
{"title":"Declassification Policy Management in Dynamic Information Systems","authors":"Julien A. Thomas, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1109/ARES.2011.30","DOIUrl":"https://doi.org/10.1109/ARES.2011.30","url":null,"abstract":"Standard multilevel security (MLS) poli- cies lack flexibility as data classification is consid- ered static. Previous works have addressed this issue and defined declassification requirements, especially in programming languages using a language-based security approach. In this paper, we suggest a dif- ferent approach. We show how to define and enforce declassification policies in databases, seen as sets of logical facts. We first define an information flow con- trol model where data classification may dynamically change. This model combines both confidentiality and integrity requirements to enforce security. We then specify how to enforce declassification policies. Our approach relies on Event-Condition-Action (ECA) rules and provides means to manage the four basic di- mensions of declassification, namely the what?, who?, where? and when? which respectively refer to model- ing information to be declassified, entities responsible for declassification, localization of the declassification and contextual conditions that control declassifica- tion. We formalize and specify our declassification policies and prove it safe and secure with respect to the information flow control model.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"19 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132434090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis 基于成本的IT投资决策的初步思考:一个问题分析
R. Gitzel, Christian Cuske, Carsten Munch
IT investments are evaluated using varying criteria, in which financial aspects play a central role. Today a financial estimation of the Total Cost of Ownership (TCO) or the Life Cycle Cost (LCC) is one of the pillars of IT investment decisions. While this approach works well for known cost factors, we argue that the existing cost-based approaches are insufficient for handling cost associated with stochastic elements (risks). In this paper, we present a short review of existing cost-based investment evaluations and use an example to illustrate why we feel that these approaches do not cover all necessary aspects of the consequences triggered by IT investments. We also suggest a rough outline for a solution to this problem as a roadmap for our future work.
IT投资使用不同的标准进行评估,其中财务方面起着中心作用。今天,对总拥有成本(TCO)或生命周期成本(LCC)的财务估计是IT投资决策的支柱之一。虽然这种方法对已知的成本因素很有效,但我们认为现有的基于成本的方法不足以处理与随机因素(风险)相关的成本。在本文中,我们对现有的基于成本的投资评估进行了简短的回顾,并使用一个例子来说明为什么我们认为这些方法没有涵盖由IT投资引发的后果的所有必要方面。我们还提出了一个解决这个问题的粗略大纲,作为我们未来工作的路线图。
{"title":"Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis","authors":"R. Gitzel, Christian Cuske, Carsten Munch","doi":"10.1109/ARES.2011.64","DOIUrl":"https://doi.org/10.1109/ARES.2011.64","url":null,"abstract":"IT investments are evaluated using varying criteria, in which financial aspects play a central role. Today a financial estimation of the Total Cost of Ownership (TCO) or the Life Cycle Cost (LCC) is one of the pillars of IT investment decisions. While this approach works well for known cost factors, we argue that the existing cost-based approaches are insufficient for handling cost associated with stochastic elements (risks). In this paper, we present a short review of existing cost-based investment evaluations and use an example to illustrate why we feel that these approaches do not cover all necessary aspects of the consequences triggered by IT investments. We also suggest a rough outline for a solution to this problem as a roadmap for our future work.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132035747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining 同构协同关联规则挖掘中隐私保护机制的优化
M. Gorawski, Zacheusz Siedlecki
This article focuses on optimization of cryptographic mechanisms used in association rules multiparty mining algorithms with preserving data privacy. The major part of attention is focused on increasing the performance because the computation expense can be prohibitive when applying to large databases. We introduce how to use a Common Decrypting Key for commutative encryption in Secure Set Union to improve performance. As an example of the above mentioned mechanism application, the article presents a new algorithm of mining association rules on horizontally partitioned data with preserving data privacy-CDKSU (Secure Union with Common Decrypting Key). CDKSU is an application of the Common Decrypting Key for a commutative encryption in a Secure Set Union. This algorithm is compared to the KCS scheme (referenced as HPSU also) since they are both based on FDM. As far as the performance optimization is concerned, the application of Elliptic Curve Cryptography versus Exponential Cryptography is presented as well. We believe that this is the first description of application of the Elliptic Curve Pohlig-Hellman Cipher. The system implementing given algorithms is described and subjected to performance tests. Finally, the results of these tests are presented and analyzed.
本文重点研究了在保护数据隐私的前提下,对关联规则多方挖掘算法中使用的加密机制进行优化。关注的主要部分集中在提高性能上,因为在应用于大型数据库时,计算费用可能会令人望而却步。介绍了如何在安全集联合中使用公共解密密钥进行交换加密以提高性能。作为上述机制应用的一个实例,本文提出了一种新的水平分区数据关联规则挖掘算法——cdksu (Secure Union with Common Decrypting Key)。CDKSU是安全集合联合中交换加密的公共解密密钥的一种应用。该算法与KCS方案(也称为HPSU)进行了比较,因为它们都是基于FDM的。在性能优化方面,还介绍了椭圆曲线密码与指数密码的应用。我们认为这是椭圆曲线波利-赫尔曼密码应用的第一个描述。描述了实现给定算法的系统,并进行了性能测试。最后,给出了试验结果并进行了分析。
{"title":"Optimization of Privacy Preserving Mechanisms in Homogeneous Collaborative Association Rules Mining","authors":"M. Gorawski, Zacheusz Siedlecki","doi":"10.1109/ARES.2011.58","DOIUrl":"https://doi.org/10.1109/ARES.2011.58","url":null,"abstract":"This article focuses on optimization of cryptographic mechanisms used in association rules multiparty mining algorithms with preserving data privacy. The major part of attention is focused on increasing the performance because the computation expense can be prohibitive when applying to large databases. We introduce how to use a Common Decrypting Key for commutative encryption in Secure Set Union to improve performance. As an example of the above mentioned mechanism application, the article presents a new algorithm of mining association rules on horizontally partitioned data with preserving data privacy-CDKSU (Secure Union with Common Decrypting Key). CDKSU is an application of the Common Decrypting Key for a commutative encryption in a Secure Set Union. This algorithm is compared to the KCS scheme (referenced as HPSU also) since they are both based on FDM. As far as the performance optimization is concerned, the application of Elliptic Curve Cryptography versus Exponential Cryptography is presented as well. We believe that this is the first description of application of the Elliptic Curve Pohlig-Hellman Cipher. The system implementing given algorithms is described and subjected to performance tests. Finally, the results of these tests are presented and analyzed.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications Web应用安全配置错误漏洞的早期检测
Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam
This paper presents a web-based tool to supplement defense against security misconfiguration vulnerabilities in web applications. The tool automatically audits security configuration settings of server environments in web application development and deployment. It also offers features to automatically adjust security configuration settings and quantitatively rates level of safety for server environments before deploying web applications. Using the tool, we were able to evaluate eleven server packages for Apache, PHP and MySQL across three operating system platforms. Our evaluation revealed that the tool is able to audit current security configuration settings and alert users to fix the server environment to achieve the level of safety of security configuration with respect to recommended configurations for real-life web application deployment.
本文提出了一种基于web的工具,以补充对web应用程序中安全错误配置漏洞的防御。该工具自动审计web应用程序开发和部署中服务器环境的安全配置设置。它还提供了在部署web应用程序之前自动调整安全配置设置和定量评估服务器环境安全级别的功能。使用该工具,我们能够跨三个操作系统平台评估11个Apache、PHP和MySQL服务器包。我们的评估显示,该工具能够审计当前的安全配置设置,并提醒用户修复服务器环境,以达到与实际web应用程序部署的推荐配置相关的安全配置级别。
{"title":"Early Detection of Security Misconfiguration Vulnerabilities in Web Applications","authors":"Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam","doi":"10.1109/ARES.2011.31","DOIUrl":"https://doi.org/10.1109/ARES.2011.31","url":null,"abstract":"This paper presents a web-based tool to supplement defense against security misconfiguration vulnerabilities in web applications. The tool automatically audits security configuration settings of server environments in web application development and deployment. It also offers features to automatically adjust security configuration settings and quantitatively rates level of safety for server environments before deploying web applications. Using the tool, we were able to evaluate eleven server packages for Apache, PHP and MySQL across three operating system platforms. Our evaluation revealed that the tool is able to audit current security configuration settings and alert users to fix the server environment to achieve the level of safety of security configuration with respect to recommended configurations for real-life web application deployment.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1