首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
A New Fill-in Strategy for IC Factorization Preconditioning Considering SIMD Instructions 一种考虑SIMD指令的集成电路分解预处理新填充策略
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.610
T. Iwashita, Naokazu Takemura, Akihiro Ida, H. Nakashima
Most of current processors are equipped with single instruction multiple data (SIMD) instructions that are used to increase the performance of application programs. In this paper, we analyze the effective use of SIMD instructions in the Incomplete Cholesky (IC) preconditioned Conjugate Gradient (CG) solver, which we employ in a variety of simulations. A new fill-in strategy in the IC factorization is proposed for the SIMD vectorization of the preconditioning step and to increase the convergence rate. Our numerical results confirm that the proposed method has better solver performance than the conventional IC(0)-CG method.
当前大多数处理器都配备了单指令多数据(SIMD)指令,用于提高应用程序的性能。在本文中,我们分析了SIMD指令在不完全Cholesky (IC)预条件共轭梯度(CG)解算器中的有效使用,我们在各种模拟中使用了该解算器。提出了一种新的IC分解填充策略,用于预处理步骤的SIMD矢量化,提高了收敛速度。数值结果表明,该方法比传统的IC(0)-CG方法具有更好的求解性能。
{"title":"A New Fill-in Strategy for IC Factorization Preconditioning Considering SIMD Instructions","authors":"T. Iwashita, Naokazu Takemura, Akihiro Ida, H. Nakashima","doi":"10.1109/Trustcom.2015.610","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.610","url":null,"abstract":"Most of current processors are equipped with single instruction multiple data (SIMD) instructions that are used to increase the performance of application programs. In this paper, we analyze the effective use of SIMD instructions in the Incomplete Cholesky (IC) preconditioned Conjugate Gradient (CG) solver, which we employ in a variety of simulations. A new fill-in strategy in the IC factorization is proposed for the SIMD vectorization of the preconditioning step and to increase the convergence rate. Our numerical results confirm that the proposed method has better solver performance than the conventional IC(0)-CG method.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms 基于风险度量的社交云平台协作访问控制
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.458
Ahmed Bouchami, Elio Goettelmann, O. Perrin, C. Godart
Cloud computing promotes the exchange of information, resources and tasks between different organizations by facilitating the deployment and adoption of centralized collaboration platforms: Professional Social Networking (PSN). However, issues concerning security management are preventing their widespread use, as organizations still need to protect some of their sensitive data. Traditional access control policies, defined over the triplet (User, Action, Resource) are difficult to put in place in such highly dynamic environments. In this paper, we introduce risk metrics in existing access control systems to combine the fine-grained policies defined at the user level, with a global risk-policy defined at the organization's level. Experiments show the impact of our approach when deployed on traditional systems.
云计算通过促进集中式协作平台:专业社交网络(PSN)的部署和采用,促进了不同组织之间信息、资源和任务的交换。然而,有关安全管理的问题阻碍了它们的广泛使用,因为组织仍然需要保护一些敏感数据。在三元组(用户、操作、资源)上定义的传统访问控制策略很难在这种高度动态的环境中实施。在本文中,我们在现有的访问控制系统中引入风险度量,将用户级别定义的细粒度策略与组织级别定义的全局风险策略结合起来。实验证明了我们的方法在传统系统上部署时的影响。
{"title":"Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms","authors":"Ahmed Bouchami, Elio Goettelmann, O. Perrin, C. Godart","doi":"10.1109/Trustcom.2015.458","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.458","url":null,"abstract":"Cloud computing promotes the exchange of information, resources and tasks between different organizations by facilitating the deployment and adoption of centralized collaboration platforms: Professional Social Networking (PSN). However, issues concerning security management are preventing their widespread use, as organizations still need to protect some of their sensitive data. Traditional access control policies, defined over the triplet (User, Action, Resource) are difficult to put in place in such highly dynamic environments. In this paper, we introduce risk metrics in existing access control systems to combine the fine-grained policies defined at the user level, with a global risk-policy defined at the organization's level. Experiments show the impact of our approach when deployed on traditional systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RFID Secure Application Revocation for IoT in 5G 5G物联网下RFID安全应用撤销
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.372
K. Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang
As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. To facilitate users to use the multi-application RFID tag and revoke some applications in the tag securely and efficiently, an RFID secure application revocation scheme is proposed in this paper. Users are anonymous completely in the scheme. The proposed scheme cannot only be used in multi-application RFID tag but also be used in one-application RFID tag. Furthermore, compared with other existing schemes, the scheme provides a higher level of security and has an advantage of performance.
作为5G的核心技术之一,物联网(IoT)比以往任何时候都更受关注。此外,无线射频识别(RFID)在物联网发展中起着至关重要的作用。随着RFID的广泛应用,单一RFID标签集成多种应用已成为主流。为了方便用户使用多用途RFID标签并安全高效地撤销标签中的部分应用,本文提出了一种RFID安全应用撤销方案。在该方案中,用户是完全匿名的。该方案不仅适用于多用途RFID标签,也适用于单用途RFID标签。此外,与现有的其他方案相比,该方案具有更高的安全性和性能优势。
{"title":"RFID Secure Application Revocation for IoT in 5G","authors":"K. Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang","doi":"10.1109/Trustcom.2015.372","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.372","url":null,"abstract":"As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. To facilitate users to use the multi-application RFID tag and revoke some applications in the tag securely and efficiently, an RFID secure application revocation scheme is proposed in this paper. Users are anonymous completely in the scheme. The proposed scheme cannot only be used in multi-application RFID tag but also be used in one-application RFID tag. Furthermore, compared with other existing schemes, the scheme provides a higher level of security and has an advantage of performance.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125183124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Near Field Communication(NFC) Security Model Based on OSI Reference Model 基于OSI参考模型的近场通信(NFC)安全模型
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.525
Weiping Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun
As NFC is popularized, its security vulnerabilities and protection methods have been widely addressed. This paper sets up a NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, then the results show a high protection level. And the NFC security model will be perfected continually with the development of the NFC technology.
随着NFC技术的普及,其安全漏洞和防护方法得到了广泛的关注。本文建立了基于OSI模型的NFC安全模型。描述了安全模型各层的安全风险和对策,是前面工作的基础。提出了对安全模型进行评估的方法,结果表明该模型具有较高的防护水平。随着NFC技术的发展,NFC安全模型将不断完善。
{"title":"A Near Field Communication(NFC) Security Model Based on OSI Reference Model","authors":"Weiping Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun","doi":"10.1109/Trustcom.2015.525","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.525","url":null,"abstract":"As NFC is popularized, its security vulnerabilities and protection methods have been widely addressed. This paper sets up a NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, then the results show a high protection level. And the NFC security model will be perfected continually with the development of the NFC technology.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Inferring User Actions from Provenance Logs 从来源日志推断用户操作
Pub Date : 2015-08-20 DOI: 10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.442
Xin Li, Chaitanya Joshi, Yu Shyang Tan, R. Ko
Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs.
Progger是一个内核间隔的云数据来源记录器,它提供细粒度的数据活动记录,最近被开发出来,使云利益相关者能够跟踪云内部和跨云的数据生命周期。程序日志有可能允许分析人员推断用户的操作,并在云计算环境中创建以数据为中心的行为历史。然而,Progger测井数据复杂且噪声大,因此目前还无法实现这一潜力。本文提出了一种从Progger日志中有效推断用户行为的统计方法。推断在内核级粒度上捕获活动的日志并不是一件简单的事情。本文通过一种精度较高的方法克服了这一挑战。该方法的关键方面是确定数据预处理步骤和属性选择。然后,我们使用四种标准分类模型,并确定对用户行为提供最准确推断的模型。据我们所知,这是同类作品中的第一部。我们还讨论了这项工作的一些可能的扩展。未来可能的应用包括在异常安全活动发生之前预测异常安全活动的能力。
{"title":"Inferring User Actions from Provenance Logs","authors":"Xin Li, Chaitanya Joshi, Yu Shyang Tan, R. Ko","doi":"10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.442","DOIUrl":"https://doi.org/10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.442","url":null,"abstract":"Progger, a kernel-spaced cloud data provenance logger which provides fine-grained data activity records, was recently developed to empower cloud stakeholders to trace data life cycles within and across clouds. Progger logs have the potential to allow analysts to infer user actions and create a data-centric behaviour history in a cloud computing environment. However, the Progger logs are complex and noisy and therefore, currently this potential can not be met. This paper proposes a statistical approach to efficiently infer the user actions from the Progger logs. Inferring logs which capture activities at kernel-level granularity is not a straightforward endeavour. This paper overcomes this challenge through an approach which shows a high level of accuracy. The key aspects of this approach are identifying the data preprocessing steps and attribute selection. We then use four standard classification models and identify the model which provides the most accurate inference on user actions. To our best knowledge, this is the first work of its kind. We also discuss a number of possible extensions to this work. Possible future applications include the ability to predict an anomalous security activity before it occurs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"7 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks 无线社区网络中转发故障的协调检测
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.441
E. López, L. Navarro
Wireless Community Networks (WCN) are grassroot initiatives that leverage the connectivity gap by providing an alternative ownership model for IP-networks, where every piece of equipment is managed and owned in a decentralized fashion by members from the community. However, WCN have three intrinsic characteristics that make forwarding faults more likely: inexpensive equipment, non-expert administration and openness. These characteristics hinder the robustness of network connectivity. Here we present KDet, a distributed protocol for the detection of forwarding faults by establishing overlapping logical boundaries that monitor the behavior of the routers within them. KDet is designed to be collusion resistant, ensuring that compromised routers cannot cover for others to avoid detection. Another important characteristic of KDet is that it does not rely on path information: monitoring nodes do not have to know the complete path a packet follows, just the previous and next hop. As a result, KDet can be deployed as an independent daemon without imposing any change in the network, and it will bring improved network robustness. Results from theoretical analysis and simulation show the correctness of the algorithm, its accuracy in detecting forwarding faults, and a comparison in terms of cost and advantages over previous work.
无线社区网络(WCN)是一项草根计划,它通过为ip网络提供另一种所有权模式来利用连接差距,在这种模式下,每台设备都以分散的方式由社区成员管理和拥有。然而,WCN有三个固有的特点,使转发故障更容易发生:廉价的设备,非专家管理和开放性。这些特征阻碍了网络连接的健壮性。在这里,我们介绍了KDet,这是一种分布式协议,通过建立重叠的逻辑边界来检测转发故障,该逻辑边界监视其中的路由器的行为。KDet被设计为抗合谋,确保受损的路由器不能掩盖其他路由器以避免被发现。KDet的另一个重要特征是它不依赖于路径信息:监视节点不必知道数据包经过的完整路径,只需要知道上一跳和下一跳。因此,KDet可以作为一个独立的守护进程部署,而无需对网络进行任何更改,并且它将带来改进的网络健壮性。理论分析和仿真结果表明了该算法的正确性,检测转发故障的准确性,以及与以往工作相比在成本和优势方面的比较。
{"title":"KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks","authors":"E. López, L. Navarro","doi":"10.1109/Trustcom.2015.441","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.441","url":null,"abstract":"Wireless Community Networks (WCN) are grassroot initiatives that leverage the connectivity gap by providing an alternative ownership model for IP-networks, where every piece of equipment is managed and owned in a decentralized fashion by members from the community. However, WCN have three intrinsic characteristics that make forwarding faults more likely: inexpensive equipment, non-expert administration and openness. These characteristics hinder the robustness of network connectivity. Here we present KDet, a distributed protocol for the detection of forwarding faults by establishing overlapping logical boundaries that monitor the behavior of the routers within them. KDet is designed to be collusion resistant, ensuring that compromised routers cannot cover for others to avoid detection. Another important characteristic of KDet is that it does not rely on path information: monitoring nodes do not have to know the complete path a packet follows, just the previous and next hop. As a result, KDet can be deployed as an independent daemon without imposing any change in the network, and it will bring improved network robustness. Results from theoretical analysis and simulation show the correctness of the algorithm, its accuracy in detecting forwarding faults, and a comparison in terms of cost and advantages over previous work.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121807605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Instruction-Set Randomization Using Length-Preserving Permutation 基于保长置换的指令集随机化
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.397
Jianming Fu, Xu Zhang, Yan Lin
Traditional instruction randomization using XOR operator or AES encryption is lack of instruction semantics after transforming and is not beneficial to the fast implementation on hardware, and its security only relies on a random key. This paper proposes an Instruction-Set Randomization using Length-preserving Permutation (LP-ISR). This approach can defend against code-injection attacks by transforming the instruction-set using multidimensional-hash instruction tables, instruction permutation tables and a random key. Simultaneously, the instruction semantics has been preserved after transformation, which is suitable to the fast implementation on hardware. In contrast with traditional approaches, the security of LP-ISR depends on the multidimensional-hash instruction tables, the size of instruction-set, the instruction permutation tables and the random key, which extends the security of LP-ISR from a simple key to efficient data structure. Finally, we have implemented LP-ISR using a dynamic binary instrumentation tool Pin and our experimental results demonstrate that our approach is feasible and acceptable.
使用异或运算符或AES加密的传统指令随机化变换后缺乏指令语义,不利于硬件上的快速实现,其安全性仅依赖于一个随机密钥。提出了一种基于保长置换的指令集随机化方法。这种方法可以通过使用多维哈希指令表、指令排列表和随机键转换指令集来防御代码注入攻击。同时,转换后的指令语义得以保留,适合于在硬件上的快速实现。与传统方法相比,LP-ISR的安全性取决于多维哈希指令表、指令集大小、指令排列表和随机密钥,这将LP-ISR的安全性从简单的密钥扩展到高效的数据结构。最后,我们使用动态二进制仪器工具Pin实现了LP-ISR,实验结果表明我们的方法是可行和可接受的。
{"title":"An Instruction-Set Randomization Using Length-Preserving Permutation","authors":"Jianming Fu, Xu Zhang, Yan Lin","doi":"10.1109/Trustcom.2015.397","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.397","url":null,"abstract":"Traditional instruction randomization using XOR operator or AES encryption is lack of instruction semantics after transforming and is not beneficial to the fast implementation on hardware, and its security only relies on a random key. This paper proposes an Instruction-Set Randomization using Length-preserving Permutation (LP-ISR). This approach can defend against code-injection attacks by transforming the instruction-set using multidimensional-hash instruction tables, instruction permutation tables and a random key. Simultaneously, the instruction semantics has been preserved after transformation, which is suitable to the fast implementation on hardware. In contrast with traditional approaches, the security of LP-ISR depends on the multidimensional-hash instruction tables, the size of instruction-set, the instruction permutation tables and the random key, which extends the security of LP-ISR from a simple key to efficient data structure. Finally, we have implemented LP-ISR using a dynamic binary instrumentation tool Pin and our experimental results demonstrate that our approach is feasible and acceptable.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics 基于用户行为特征的多在线应用别名检测
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.497
Zhaoli Liu, Tao Qin, X. Guan, Xiaoqiang Niu, Tao Yang
The quickly development of many online applications benefit our daily life. But on the other hand, user usually holds several aliases in different online applications. The aliases across multi-online applications detection are becoming more and more important for E-marketing and user's behavior monitoring. In this paper, we propose a method for detecting aliases across multi-online applications. Firstly, we employ the active and positive methods to collect the user's alias and behavior information from several famous applications, including Email, RenRen and etc. Then we analyzed the user's behavior characteristics in specific applications, and some interesting findings are proposed. Finally, we perform the alias detection based on user's behavior profiles, including the similarity of the ID and the number of appearance in specific IP address. According to user's behavior habit, the aliases belong to the same physical users are usually similar with each other. Furthermore, one specific user usually use the same computer to login into different applications, thus the IP addresses used for accessing those applications usually same with each other. Based on those assumptions we employ the Bayesian Network to perform alias detection. Empirical results based on actual data verify the efficiency and correctness of the proposed methods.
许多在线应用程序的快速发展使我们的日常生活受益。但另一方面,用户通常在不同的在线应用程序中使用多个别名。跨多在线应用的别名检测在网络营销和用户行为监控中变得越来越重要。在本文中,我们提出了一种跨多在线应用程序检测别名的方法。首先,我们采用主动和主动的方法,从几个著名的应用程序中收集用户的别名和行为信息,包括Email,人人网等。然后,我们分析了用户在特定应用中的行为特征,并提出了一些有趣的发现。最后,我们根据用户的行为特征,包括ID的相似度和特定IP地址的出现次数,执行别名检测。根据用户的行为习惯,属于同一物理用户的别名通常彼此相似。此外,一个特定的用户通常使用同一台计算机登录到不同的应用程序,因此用于访问这些应用程序的IP地址通常彼此相同。基于这些假设,我们使用贝叶斯网络来执行别名检测。基于实际数据的实证结果验证了所提方法的有效性和正确性。
{"title":"Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics","authors":"Zhaoli Liu, Tao Qin, X. Guan, Xiaoqiang Niu, Tao Yang","doi":"10.1109/Trustcom.2015.497","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.497","url":null,"abstract":"The quickly development of many online applications benefit our daily life. But on the other hand, user usually holds several aliases in different online applications. The aliases across multi-online applications detection are becoming more and more important for E-marketing and user's behavior monitoring. In this paper, we propose a method for detecting aliases across multi-online applications. Firstly, we employ the active and positive methods to collect the user's alias and behavior information from several famous applications, including Email, RenRen and etc. Then we analyzed the user's behavior characteristics in specific applications, and some interesting findings are proposed. Finally, we perform the alias detection based on user's behavior profiles, including the similarity of the ID and the number of appearance in specific IP address. According to user's behavior habit, the aliases belong to the same physical users are usually similar with each other. Furthermore, one specific user usually use the same computer to login into different applications, thus the IP addresses used for accessing those applications usually same with each other. Based on those assumptions we employ the Bayesian Network to perform alias detection. Empirical results based on actual data verify the efficiency and correctness of the proposed methods.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocation Management in Vehicular Ad-hoc Networks 车载自组网中的撤销管理
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.507
Francisco Martín-Fernández, P. Caballero-Gil, C. Caballero-Gil
This paper describes a solution for the efficient and methodical management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect k-ary tree, together with a new version of the SHA-3 hash function. This combination allows optimizing search and insertion operations in the tree. Consequently, the proposal is very useful both when vehicular networks are widely used, and in urban environments. Simulation results, obtained through the combination of NS-2 and SUMO performs, are promising and confirm this hypothesis.
针对基于证书和基于身份的认证,本文描述了一种在车载自组织网络中有效和系统地管理吊销的解决方案。它提出使用基于动态哈希树的认证数据结构,这是一个完美的k-ary树,以及一个新版本的SHA-3哈希函数。这种组合允许优化树中的搜索和插入操作。因此,当车辆网络被广泛使用时,以及在城市环境中,该建议都非常有用。结合NS-2和SUMO性能的仿真结果证实了这一假设。
{"title":"Revocation Management in Vehicular Ad-hoc Networks","authors":"Francisco Martín-Fernández, P. Caballero-Gil, C. Caballero-Gil","doi":"10.1109/Trustcom.2015.507","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.507","url":null,"abstract":"This paper describes a solution for the efficient and methodical management of revocation in vehicular ad-hoc networks, for both certificate-based and identity-based authentication. It proposes the use of an authenticated data structure based on a dynamic hash tree, which is a perfect k-ary tree, together with a new version of the SHA-3 hash function. This combination allows optimizing search and insertion operations in the tree. Consequently, the proposal is very useful both when vehicular networks are widely used, and in urban environments. Simulation results, obtained through the combination of NS-2 and SUMO performs, are promising and confirm this hypothesis.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Petri Nets Formalization of Map/Reduce Paradigm to Optimise the Performance-Cost Tradeoff Map/Reduce范式的Petri网形式化以优化性能-成本权衡
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.617
M. Ruiz, Javier L. Calleja, D. Cazorla
Nowadays, the world around us is built up on more and more unstructured data every day. However, performing a longitudinal analysis of these data becomes a Big-Data problem that cannot be tackled with traditional tools, storage or processing infrastructures. One of the main contributions to address this matter has been the Hadoop framework (which implements the Map/Reduce paradigm), especially when used in conjunction with Cloud computing environments. This paper presents a formalization of the Map/Reduce paradigm which is used to evaluate performance parameters and make a trade-off analysis of the number of workers versus processing time and resource cost. We have used Prioritised -- Timed Coloured Petri Nets to obtain complete and unambiguous models of the system behaviour as well as CPNTools to evaluate the correctness of the system using state space exploration and for performance evaluation. The resulting formal model is evaluated with a real social media data Hadoop-based application and it is validated by carrying out experiments on a real private Cloud environment. Results show that the proposed model enables to determine in advance both the performance of a Map/Reduce-based application within Cloud environments and the best performance-cost agreement.
如今,我们周围的世界每天都建立在越来越多的非结构化数据之上。然而,对这些数据进行纵向分析成为一个大数据问题,无法用传统的工具、存储或处理基础设施来解决。解决这个问题的主要贡献之一是Hadoop框架(它实现了Map/Reduce范式),特别是在与云计算环境结合使用时。本文提出了Map/Reduce范式的形式化,该范式用于评估性能参数,并对工人数量与处理时间和资源成本进行权衡分析。我们使用了优先-定时彩色Petri网来获得系统行为的完整和明确的模型,以及使用状态空间探索和性能评估来评估系统的正确性的CPNTools。使用基于hadoop的真实社交媒体数据应用程序对生成的正式模型进行评估,并通过在真实私有云环境上进行实验来验证模型。结果表明,所提出的模型能够提前确定基于Map/ reduce的应用程序在云环境中的性能和最佳性能成本协议。
{"title":"Petri Nets Formalization of Map/Reduce Paradigm to Optimise the Performance-Cost Tradeoff","authors":"M. Ruiz, Javier L. Calleja, D. Cazorla","doi":"10.1109/Trustcom.2015.617","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.617","url":null,"abstract":"Nowadays, the world around us is built up on more and more unstructured data every day. However, performing a longitudinal analysis of these data becomes a Big-Data problem that cannot be tackled with traditional tools, storage or processing infrastructures. One of the main contributions to address this matter has been the Hadoop framework (which implements the Map/Reduce paradigm), especially when used in conjunction with Cloud computing environments. This paper presents a formalization of the Map/Reduce paradigm which is used to evaluate performance parameters and make a trade-off analysis of the number of workers versus processing time and resource cost. We have used Prioritised -- Timed Coloured Petri Nets to obtain complete and unambiguous models of the system behaviour as well as CPNTools to evaluate the correctness of the system using state space exploration and for performance evaluation. The resulting formal model is evaluated with a real social media data Hadoop-based application and it is validated by carrying out experiments on a real private Cloud environment. Results show that the proposed model enables to determine in advance both the performance of a Map/Reduce-based application within Cloud environments and the best performance-cost agreement.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1