首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Towards secure communications: Review of side channel attacks and countermeasures on ECC 迈向安全通信:侧信道攻击与ECC对抗综述
L. Tawalbeh, T. Al-Somani, Hilal Houssain
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.
最近在无线通信和网络方面有许多革命性的技术和进步,改变了我们周围数百万人的生活。互联网的广泛普及和配备无线技术接入互联网的智能移动设备,使人们能够彼此联系,而不受地理位置的限制。这些通信涉及共享和传输必须受到保护的敏感信息。因此,越来越需要保护个人和组织的数据,这被认为是当今通信和网络系统的一大挑战。加密算法用于提供许多安全服务,以确保通信通道和网络的安全,如身份验证、数据完整性和机密性。但是,最近出现了针对这些加密功能及其实现的网络攻击,主要是侧信道攻击。因此,危及这些算法的安全性意味着危及使用它们的通信系统的安全性。在最著名的非对称加密算法中,椭圆曲线加密算法被用于保护许多金融和政府应用中的敏感数据。在这项研究中,我们介绍了最新的椭圆曲线密码的侧信道攻击。此外,我们还讨论了用于保护这些网络攻击的适当有效对策,以获得更安全的通信系统。
{"title":"Towards secure communications: Review of side channel attacks and countermeasures on ECC","authors":"L. Tawalbeh, T. Al-Somani, Hilal Houssain","doi":"10.1109/ICITST.2016.7856673","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856673","url":null,"abstract":"There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geographic location. These communications involve sharing and transferring sensitive information that must be protected. Therefore, there is an increasing need to secure the individuals and organizations data which is considered a big challenge in communication and networking systems nowadays. The cryptographic algorithms are used to provide many security services to secure the communication channels and networks such as authentication, data integrity and confidentiality. But, recently, there are cyber attacks on these crypto-functions and their implementations, mainly Side Channel Attacks. So, compromising the security of these algorithms implies compromising the security of the communication systems that are using them. Among the most known asymmetric encryption algorithms is the Elliptic Curve Cryptography which is used to protect sensitive data in many financial and government applications. In this research, we present most recent Side channel attacks on Elliptic Curve Cryptography. Also, we discuss the suitable effective countermeasures used to protect from these cyber attacks towards obtaining more secure communication systems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114799849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling cloud applications for partition contingency 为分区偶然性建模云应用程序
Aspen Olmsted
The focus of this research work is to investigate the problem of providing partition tolerance in cloud-based applications while maintaining application data integrity. This study looks at developing a cloud application to track sales of admission tickets to a battlefield as a motivating example. Web browsers are run inside the premises of the enterprise selling the tickets, while the rest of the application architecture is stored in the cloud. The internet connection represents a single point of failure for the application. Often humanities attractions such as battlefields are physically located in rural areas where internet redundancy is expensive at best. Developing a cloud application that can tolerate network partitions needs to be considered in the modeling phase of cloud software project.
本研究工作的重点是研究在保持应用程序数据完整性的同时,在基于云的应用程序中提供分区容忍度的问题。这项研究着眼于开发一个云应用程序来跟踪战场门票的销售,作为一个激励的例子。Web浏览器在销售门票的企业内部运行,而应用程序架构的其余部分存储在云中。互联网连接代表了应用程序的单点故障。像战场这样的人文景点通常位于农村地区,那里的互联网冗余最多也就是昂贵的。在云软件项目的建模阶段,需要考虑开发能够容忍网络分区的云应用程序。
{"title":"Modeling cloud applications for partition contingency","authors":"Aspen Olmsted","doi":"10.1109/ICITST.2016.7856702","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856702","url":null,"abstract":"The focus of this research work is to investigate the problem of providing partition tolerance in cloud-based applications while maintaining application data integrity. This study looks at developing a cloud application to track sales of admission tickets to a battlefield as a motivating example. Web browsers are run inside the premises of the enterprise selling the tickets, while the rest of the application architecture is stored in the cloud. The internet connection represents a single point of failure for the application. Often humanities attractions such as battlefields are physically located in rural areas where internet redundancy is expensive at best. Developing a cloud application that can tolerate network partitions needs to be considered in the modeling phase of cloud software project.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User profiling from network traffic via novel application-level interactions 通过新颖的应用程序级交互对网络流量进行用户分析
Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell
Insider misuse has become a significant issue for organisations. Traditional information security has focussed upon threats from the outside rather than employees. A wide range of research has been undertaken to develop approaches to detect the insider - often referred to as Data Loss Prevention (DLP) tools. Unfortunately, the fundamental limitation of these tools is that they provide information resolved to IP addresses rather than people. This assumes the IP is static and linkable to an individual, which is often not the case. IPs are increasingly unreliable due to the mobile natural of devices and the dynamic allocation of IP addresses. This paper builds upon prior work to propose and investigate a biometric-based behavioural profile created from a novel feature extraction process that identifies user's application-level interactions (e.g. not simply that they are accessing Facebook but whether they are posting, reading or watching a video) from raw network traffic metadata. It also proceeds to describe various types of user's interactions that can be derived from applications. Validation of the model was conducted by collecting 62 GBs of metadata over a 2 months period from 27 participants. The average results of identifying users at first rank in the top three applications Skype, Hotmail and BBC are scored 98.1%, 96.2% and 81.8% respectively.
内部人员滥用已成为企业面临的一个重大问题。传统的信息安全关注的是来自外部的威胁,而不是员工。人们已经开展了广泛的研究,以开发检测内部人员的方法——通常被称为数据丢失预防(DLP)工具。不幸的是,这些工具的基本限制是它们提供的信息解析为IP地址而不是人。这假设IP是静态的,并且可以链接到个人,但通常情况并非如此。由于设备的移动特性和IP地址的动态分配,IP地址越来越不可靠。本文以先前的工作为基础,提出并研究了一种基于生物特征的行为配置文件,该行为配置文件是从原始网络流量元数据中识别用户的应用级交互(例如,不仅仅是他们正在访问Facebook,而是他们是否正在发布,阅读或观看视频)的新特征提取过程中创建的。它还继续描述可以从应用程序派生的各种类型的用户交互。通过在2个月的时间里从27名参与者那里收集62 gb的元数据来验证该模型。在前三名应用中,识别第一名用户的平均得分分别为:Skype、Hotmail和BBC,分别为98.1%、96.2%和81.8%。
{"title":"User profiling from network traffic via novel application-level interactions","authors":"Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell","doi":"10.1109/ICITST.2016.7856712","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856712","url":null,"abstract":"Insider misuse has become a significant issue for organisations. Traditional information security has focussed upon threats from the outside rather than employees. A wide range of research has been undertaken to develop approaches to detect the insider - often referred to as Data Loss Prevention (DLP) tools. Unfortunately, the fundamental limitation of these tools is that they provide information resolved to IP addresses rather than people. This assumes the IP is static and linkable to an individual, which is often not the case. IPs are increasingly unreliable due to the mobile natural of devices and the dynamic allocation of IP addresses. This paper builds upon prior work to propose and investigate a biometric-based behavioural profile created from a novel feature extraction process that identifies user's application-level interactions (e.g. not simply that they are accessing Facebook but whether they are posting, reading or watching a video) from raw network traffic metadata. It also proceeds to describe various types of user's interactions that can be derived from applications. Validation of the model was conducted by collecting 62 GBs of metadata over a 2 months period from 27 participants. The average results of identifying users at first rank in the top three applications Skype, Hotmail and BBC are scored 98.1%, 96.2% and 81.8% respectively.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"63 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120888133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An adaptive security framework with extensible computational complexity for cipher systems 一种具有可扩展计算复杂度的密码系统自适应安全框架
Prathap Siddavaatam, R. Sedaghat, M. Cheng
Algebraic cryptanalysis, uses a range of algebraic tools and techniques to assess the security of cryptosystems, which are essential for trusted communications over open networks. Recent trends in algebraic cryptanalysis tend to use Modular Addition 2n over logic Exclusive-OR as a mixing operator to guard against security threats. We propose a newly designed framework for Modular Addition over field GF(2) satisfying the algebraic properties of regular Modular Addition 2n albeit with cumulative security enhancements and increased complexity to address these challenges. Nevertheless, it has been observed that the complexity of Modular Addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. In this article we propose a new extended design framework for advanced Modular Addition and it is characterized by user-specified extendable security which does not impose additional changes in existing layout of ciphers including both stream and block ciphers. This framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn it thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of Modular Addition 2n.
代数密码分析使用一系列代数工具和技术来评估密码系统的安全性,这对于开放网络上的可信通信至关重要。在代数密码分析中,最近的趋势倾向于使用模加法2n而不是逻辑异或作为混合算子来防范安全威胁。我们提出了一个新设计的域GF(2)上的模加法框架,满足常规模加法2n的代数性质,尽管具有累积安全性增强和增加的复杂性来解决这些挑战。然而,已经观察到,在多项式方程和概率条件的适当表述下,模加法的复杂性可以大大降低。在本文中,我们提出了一个新的扩展设计框架,用于高级模块化加法,它的特点是用户指定的可扩展安全性,它不会对现有的密码布局(包括流密码和分组密码)施加额外的变化。该框架可以快速扩展到使用特定的需求,从而提高了整体结构的代数程度。反过来,它通过保留原始硬件复杂性而无需对模块化加法2n进行关键修改来阻止概率条件。
{"title":"An adaptive security framework with extensible computational complexity for cipher systems","authors":"Prathap Siddavaatam, R. Sedaghat, M. Cheng","doi":"10.1109/ICITST.2016.7856683","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856683","url":null,"abstract":"Algebraic cryptanalysis, uses a range of algebraic tools and techniques to assess the security of cryptosystems, which are essential for trusted communications over open networks. Recent trends in algebraic cryptanalysis tend to use Modular Addition 2n over logic Exclusive-OR as a mixing operator to guard against security threats. We propose a newly designed framework for Modular Addition over field GF(2) satisfying the algebraic properties of regular Modular Addition 2n albeit with cumulative security enhancements and increased complexity to address these challenges. Nevertheless, it has been observed that the complexity of Modular Addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. In this article we propose a new extended design framework for advanced Modular Addition and it is characterized by user-specified extendable security which does not impose additional changes in existing layout of ciphers including both stream and block ciphers. This framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn it thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of Modular Addition 2n.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122889778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital divide impact on e-voting adoption in middle eastern country 数字鸿沟对中东国家电子投票采用的影响
M. Alomari
To ensure a high level of participation by voters and their trust in the election process when using an e-voting system, the voters who are on the other side of the digital divide must be considered. Although the Jordanian government runs a campaign promoting voting in parliamentary elections, the voters' turnout to elections is not high. This research paper therefore introduces the concept of the digital divide and its impact on e-voting system adoption. A framework for e-voting digital divide factors is proposed which presents the main factors that would influence voters' intentions to use an online voting (e-voting) system. These factors comprise: age, education, income, and internet use. With the impact of these factors articulated, this research paper is significant in helping the Jordanian government to develop a strategy to ensure higher participation by voters in selecting their candidates. This research paper also provides a foundation for future empirical research on the influence of the digital divide on e-voting adoption.
在使用电子投票系统时,为了确保选民的高度参与和他们对选举过程的信任,必须考虑到处于数字鸿沟另一边的选民。虽然约旦政府在议会选举中开展了促进投票的运动,但选民的投票率并不高。因此,本文介绍了数字鸿沟的概念及其对电子投票系统采用的影响。提出了一个电子投票数字鸿沟因素的框架,该框架提出了影响选民使用在线投票(电子投票)系统意愿的主要因素。这些因素包括:年龄、教育程度、收入和互联网使用情况。随着这些因素的影响,这篇研究论文在帮助约旦政府制定一项战略,以确保选民在选择候选人时的更高参与度方面具有重要意义。本研究也为未来数字鸿沟对电子投票采用影响的实证研究提供了基础。
{"title":"Digital divide impact on e-voting adoption in middle eastern country","authors":"M. Alomari","doi":"10.1109/ICITST.2016.7856741","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856741","url":null,"abstract":"To ensure a high level of participation by voters and their trust in the election process when using an e-voting system, the voters who are on the other side of the digital divide must be considered. Although the Jordanian government runs a campaign promoting voting in parliamentary elections, the voters' turnout to elections is not high. This research paper therefore introduces the concept of the digital divide and its impact on e-voting system adoption. A framework for e-voting digital divide factors is proposed which presents the main factors that would influence voters' intentions to use an online voting (e-voting) system. These factors comprise: age, education, income, and internet use. With the impact of these factors articulated, this research paper is significant in helping the Jordanian government to develop a strategy to ensure higher participation by voters in selecting their candidates. This research paper also provides a foundation for future empirical research on the influence of the digital divide on e-voting adoption.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated penetration testing based on a threat model 基于威胁模型的自动渗透测试
N. A. Almubairik, G. Wills
The aim of this work is to propose a systematic penetration testing algorithm guided by a threat model. The use of the threat model in penetration testing ensures that all existing threats are checked and no threat is overlooked through the penetration test process. The objectives of this work are as follows: assembling a package of penetration testing tools (toolkit) to test the security of a equation system. Moreover, considering standard methodologies to design the automated penetration testing. A number of methodologies have been followed during the design of the algorithm. First, a threat model designed at the IT Innovation Centre was used extract threats. These threats were used as a starting point for the penetration testing. Second, the NIST 800-115 standard for penetration testing was followed. Applying the proposed automated penetration testing algorithm to a real system contributes to the reduction of consequences which can result from malicious attacks.
本文提出了一种基于威胁模型的系统渗透测试算法。在渗透测试中使用威胁模型可以确保检查所有现有的威胁,并且在渗透测试过程中不会忽略任何威胁。本工作的目标如下:组装一套渗透测试工具(toolkit)来测试方程系统的安全性。此外,考虑标准的方法来设计自动化渗透测试。在算法的设计过程中,遵循了许多方法。首先,利用IT创新中心设计的威胁模型提取威胁。这些威胁被用作渗透测试的起点。其次,遵循NIST 800-115渗透测试标准。将所提出的自动渗透测试算法应用于实际系统,有助于减少恶意攻击可能导致的后果。
{"title":"Automated penetration testing based on a threat model","authors":"N. A. Almubairik, G. Wills","doi":"10.1109/ICITST.2016.7856742","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856742","url":null,"abstract":"The aim of this work is to propose a systematic penetration testing algorithm guided by a threat model. The use of the threat model in penetration testing ensures that all existing threats are checked and no threat is overlooked through the penetration test process. The objectives of this work are as follows: assembling a package of penetration testing tools (toolkit) to test the security of a equation system. Moreover, considering standard methodologies to design the automated penetration testing. A number of methodologies have been followed during the design of the algorithm. First, a threat model designed at the IT Innovation Centre was used extract threats. These threats were used as a starting point for the penetration testing. Second, the NIST 800-115 standard for penetration testing was followed. Applying the proposed automated penetration testing algorithm to a real system contributes to the reduction of consequences which can result from malicious attacks.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Formal security assessment of Modbus protocol Modbus协议的正式安全评估
Roberto Nardone, R. Rodríguez, S. Marrone
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed, unroutable networks, making them an easy target for cybercriminals. In this regard, Modbus is a widely adopted protocol in control systems. Modbus protocol, however, lacks for security properties and is vulnerable to plenty of attacks (as spoofing, flooding, or replay, to name a few). In this paper, we propose a formal modeling of Modbus protocol using an extension of hierarchical state-machines that is automatically transformed to a Promela model. This model allows us to find counterexamples of security properties by model-checking. In particular, the original contribution of this paper is the formal demonstration of the existence of man-in-the-middle attacks in Modbus-based systems. Our approach also allows to formally evaluate security properties in future extensions of Modbus protocols.
关键的基础设施,如水处理、配电或电信,为我们的生活方式提供了必不可少的日常服务。任何服务的中断都会对我们的社会甚至我们的安全产生很大的影响。因此,必须保证这些系统免受故意威胁的安全。然而,这些系统中的许多都是基于最初设计在封闭的、不可路由的网络上运行的协议,这使得它们很容易成为网络犯罪分子的目标。在这方面,Modbus是一种被广泛采用的控制系统协议。然而,Modbus协议缺乏安全属性,容易受到大量攻击(如欺骗、泛洪或重放等)。在本文中,我们提出了一种Modbus协议的形式化建模方法,该方法使用层次状态机的扩展,该扩展可以自动转换为Promela模型。这个模型允许我们通过模型检查找到安全属性的反例。特别是,本文的原始贡献是正式证明了基于modbus的系统中存在中间人攻击。我们的方法还允许在Modbus协议的未来扩展中正式评估安全属性。
{"title":"Formal security assessment of Modbus protocol","authors":"Roberto Nardone, R. Rodríguez, S. Marrone","doi":"10.1109/ICITST.2016.7856685","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856685","url":null,"abstract":"Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed, unroutable networks, making them an easy target for cybercriminals. In this regard, Modbus is a widely adopted protocol in control systems. Modbus protocol, however, lacks for security properties and is vulnerable to plenty of attacks (as spoofing, flooding, or replay, to name a few). In this paper, we propose a formal modeling of Modbus protocol using an extension of hierarchical state-machines that is automatically transformed to a Promela model. This model allows us to find counterexamples of security properties by model-checking. In particular, the original contribution of this paper is the formal demonstration of the existence of man-in-the-middle attacks in Modbus-based systems. Our approach also allows to formally evaluate security properties in future extensions of Modbus protocols.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128878963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Anonymous authentication scheme in e-Health Cloud environment 电子健康云环境下的匿名认证方案
Amina Djellalbia, N. Badache, S. Benmeziane, Sihem Bensimessaoud
The adoption of an e-Health Cloud has different advantages especially allowing sharing and exchanging information between medical institutions, availability of information, reducing costs, etc. However, preserving identity privacy is a significant challenge of security in all environments, and constitutes particularly a very serious concern in Cloud environments. Indeed, an important barrier to the adoption of Cloud is user fear of privacy loss in the Cloud, particularly in an e-Health Cloud where users are patients. Users may not want to disclose their identities to the Cloud Service Provider, a way to protect them is making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy of patients in an e-Health Cloud through an anonymous authentication scheme.
采用电子保健云具有不同的优势,特别是允许在医疗机构之间共享和交换信息、获取信息、降低成本等。然而,在所有环境中,保持身份隐私都是一个重大的安全挑战,在云环境中更是一个非常严重的问题。实际上,采用云的一个重要障碍是用户担心在云中失去隐私,特别是在用户是患者的电子健康云中。用户可能不想向云服务提供商透露他们的身份,一种保护他们的方法是使他们匿名。在本文中,我们将提出一种自适应和灵活的方法,通过匿名认证方案来保护电子健康云中患者的身份隐私。
{"title":"Anonymous authentication scheme in e-Health Cloud environment","authors":"Amina Djellalbia, N. Badache, S. Benmeziane, Sihem Bensimessaoud","doi":"10.1109/ICITST.2016.7856664","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856664","url":null,"abstract":"The adoption of an e-Health Cloud has different advantages especially allowing sharing and exchanging information between medical institutions, availability of information, reducing costs, etc. However, preserving identity privacy is a significant challenge of security in all environments, and constitutes particularly a very serious concern in Cloud environments. Indeed, an important barrier to the adoption of Cloud is user fear of privacy loss in the Cloud, particularly in an e-Health Cloud where users are patients. Users may not want to disclose their identities to the Cloud Service Provider, a way to protect them is making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy of patients in an e-Health Cloud through an anonymous authentication scheme.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cost to serve of large scale online systems 大型在线系统的服务成本
A. Sampedro, Shantanu Srivastava
Online systems typically provide a variety of different service offerings. For example, an internet search engine provides the service of searching web pages, videos, images, news, maps etc. Each offering can utilize different physical and/or virtual systems, networks, data centers, and so forth. Thus, a request to search videos may use some, but not all, of the resources used by a request to search images. Also, each video query will not use the same number of resources due to caching and ranking algorithms. Due to this it can become extremely difficult to ascertain the Cost to Serve (CTS) of an offering. CTS is required to understand cost of the product offerings for request per second (RPS), create rate card for partner deals, target efficiency areas and decide ROI of services. In this paper, we define the CTS methodology for Bing. In this methodology, CTS is calculated by determining operational RPS of each platform in Bing and the average number of times a type of request touches those platforms. Prior to this work, CTS was calculated by manually tagging capacity used by each offering and number of observed queries. The methodology described here can be applied to any other large scale online distributed system.
在线系统通常提供各种不同的服务产品。例如,互联网搜索引擎提供搜索网页、视频、图像、新闻、地图等服务。每种产品都可以利用不同的物理和/或虚拟系统、网络、数据中心等等。因此,搜索视频的请求可以使用搜索图像的请求所使用的一些资源,但不是全部资源。此外,由于缓存和排序算法,每个视频查询将不会使用相同数量的资源。因此,要确定一个产品的服务成本(CTS)是非常困难的。CTS需要了解产品提供的每秒请求(RPS)成本,为合作伙伴交易创建费率卡,目标效率领域并决定服务的ROI。在本文中,我们为Bing定义了CTS方法。在这种方法中,CTS是通过确定Bing中每个平台的操作RPS和一种请求触及这些平台的平均次数来计算的。在此之前,CTS是通过手动标记每个产品使用的容量和观察到的查询数量来计算的。这里描述的方法可以应用于任何其他大规模在线分布式系统。
{"title":"Cost to serve of large scale online systems","authors":"A. Sampedro, Shantanu Srivastava","doi":"10.1109/ICITST.2016.7856738","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856738","url":null,"abstract":"Online systems typically provide a variety of different service offerings. For example, an internet search engine provides the service of searching web pages, videos, images, news, maps etc. Each offering can utilize different physical and/or virtual systems, networks, data centers, and so forth. Thus, a request to search videos may use some, but not all, of the resources used by a request to search images. Also, each video query will not use the same number of resources due to caching and ranking algorithms. Due to this it can become extremely difficult to ascertain the Cost to Serve (CTS) of an offering. CTS is required to understand cost of the product offerings for request per second (RPS), create rate card for partner deals, target efficiency areas and decide ROI of services. In this paper, we define the CTS methodology for Bing. In this methodology, CTS is calculated by determining operational RPS of each platform in Bing and the average number of times a type of request touches those platforms. Prior to this work, CTS was calculated by manually tagging capacity used by each offering and number of observed queries. The methodology described here can be applied to any other large scale online distributed system.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132092105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating IoT security threats with a trusted Network element 通过可信网络元素减轻物联网安全威胁
Jarkko Kuusijärvi, R. Savola, Pekka T. Savolainen, Antti Evesti
Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.
对于将物联网设备带入家中的最终用户以及将这些设备作为其服务或运营的一部分暴露在互联网上的企业和行业来说,保护越来越多的物联网设备是一项挑战。这些设备的暴露,通常配置不良和安全,为恶意行为者提供了一个容易访问其用户的私人信息,或者有可能利用这些设备进行进一步的活动,例如,通过分布式拒绝服务攻击其他设备。本文讨论了物联网设备当前面临的安全挑战,并提出了一种通过可信网络边缘设备保护这些设备的解决方案。NED将单个设备的安全对策卸载到可信网元中。这种方法的主要好处是系统可以使用用户定义的策略来保护物联网设备,这些策略可以应用于所有设备,而不受物联网标签中计算资源的限制。额外的好处是可以通过共享接口同时管理多个物联网设备/网关的对策,从而在很大程度上避免了每个设备的维护操作。
{"title":"Mitigating IoT security threats with a trusted Network element","authors":"Jarkko Kuusijärvi, R. Savola, Pekka T. Savolainen, Antti Evesti","doi":"10.1109/ICITST.2016.7856708","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856708","url":null,"abstract":"Securing the growing amount of IoT devices is a challenge for both the end-users bringing IoT devices into their homes, as well as the corporates and industries exposing these devices into the Internet as part of their service or operations. The exposure of these devices, often poorly configured and secured, offers malicious actors an easy access to the private information of their users, or potential to utilize the devices in further activities, e.g., attacks on other devices via Distributed Denial of Service. This paper discusses the current security challenges of IoT devices and proposes a solution to secure these devices via a trusted Network Edge Device. NED offloads the security countermeasures of the individual devices into the trusted network elements. The major benefit of this approach is that the system can protect the IoT devices with user-defined policies, which can be applied to all devices regardless of the constraints of computing resources in the IoT tags. Additional benefit is the possibility to manage the countermeasures of multiple IoT devices/gateways at once, via a shared interface, thus largely avoiding the per-device maintenance operations.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116345293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1