首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators 基于概率和同态消息验证器的加密数据可检索性证明
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.462
Dongxi Liu, J. Zic
When users store their data on a cloud, they may concern on whether their data is stored correctly and can be fully retrieved. Proofs of Retrivability (PoR) is a cryptographic concept that allows users to remotely check the integrity of their data without downloading. This check is usually done by attaching data with message authenticators that contain data integrity information. The existing PoR schemes consider only the retrievability of unencrypted data and their message authenticators are usually deterministic. In this paper, we propose a PoR scheme that is built over homomorphic encryption schemes. Our PoR scheme can prove the retrievability of homomorphically encrypted data by generating probabilistic and homomorphic message authenticators. Moreover, the homomorphically encrypted data can be processed by the cloud directly and our PoR scheme can verify the integrity of such outsourced computations over ciphertexts. A prototype of our scheme is implemented to evaluate its performance.
当用户将数据存储在云上时,他们可能会关心他们的数据是否存储正确,是否可以完全检索。可检索性证明(PoR)是一种密码学概念,允许用户在不下载的情况下远程检查其数据的完整性。这种检查通常是通过将数据附加到包含数据完整性信息的消息验证器中来完成的。现有的PoR方案只考虑未加密数据的可检索性,其消息验证器通常是确定性的。在本文中,我们提出了一种基于同态加密方案的PoR方案。我们的PoR方案通过生成概率和同态消息验证器来证明同态加密数据的可检索性。此外,同态加密的数据可以直接由云处理,我们的PoR方案可以在密文上验证这种外包计算的完整性。实现了该方案的原型,以评估其性能。
{"title":"Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators","authors":"Dongxi Liu, J. Zic","doi":"10.1109/Trustcom.2015.462","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.462","url":null,"abstract":"When users store their data on a cloud, they may concern on whether their data is stored correctly and can be fully retrieved. Proofs of Retrivability (PoR) is a cryptographic concept that allows users to remotely check the integrity of their data without downloading. This check is usually done by attaching data with message authenticators that contain data integrity information. The existing PoR schemes consider only the retrievability of unencrypted data and their message authenticators are usually deterministic. In this paper, we propose a PoR scheme that is built over homomorphic encryption schemes. Our PoR scheme can prove the retrievability of homomorphically encrypted data by generating probabilistic and homomorphic message authenticators. Moreover, the homomorphically encrypted data can be processed by the cloud directly and our PoR scheme can verify the integrity of such outsourced computations over ciphertexts. A prototype of our scheme is implemented to evaluate its performance.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Parallel H4MSA for Multiple Sequence Alignment 并行H4MSA多序列比对
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.639
Á. Rubio-Largo, M. A. Vega-Rodríguez, D. L. González-Álvarez
Multiple Sequence Alignment (MSA) is the process of aligning three or more nucleotides/amino-acids sequences at the same time. It is an NP-complete optimization problem where the time complexity of finding an optimal alignment raises exponentially when the number of sequences to align increases. In the multiobjective version of the MSA problem, we simultaneously optimize the alignment accuracy and conservation. In this work, we present a parallel scheme for a multiobjective version of a memetic metaheuristic: Hybrid Multiobjective Memetic Metaheuristics for Multiple Sequence Alignment (H4MSA). In order to evaluate the parallel performance of H4MSA, we use several datasets with different number of sequences (up to 1000 sequences) and compare its parallel performance against other well-known parallel approaches published in the literature, such as MSAProbs, T-Coffee, Clustal O and MAFFT. On the other hand, the results reveals that parallel H4MSA is around 25 times faster than the sequential version with 32 cores.
多序列比对(Multiple Sequence Alignment, MSA)是指同时对三个或三个以上的核苷酸/氨基酸序列进行比对的过程。这是一个np完全优化问题,当需要对齐的序列数量增加时,寻找最优对齐的时间复杂度呈指数增长。在多目标版本的MSA问题中,我们同时优化了对准精度和守恒。在这项工作中,我们提出了一个模因元启发式的多目标版本的并行方案:混合多目标模因元启发式多序列比对(H4MSA)。为了评估H4MSA的并行性能,我们使用了几个具有不同序列数(最多1000个序列)的数据集,并将其并行性能与文献中发表的其他知名并行方法(如MSAProbs, T-Coffee, Clustal O和MAFFT)进行了比较。另一方面,结果显示并行H4MSA比32核的顺序版本快25倍左右。
{"title":"Parallel H4MSA for Multiple Sequence Alignment","authors":"Á. Rubio-Largo, M. A. Vega-Rodríguez, D. L. González-Álvarez","doi":"10.1109/Trustcom.2015.639","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.639","url":null,"abstract":"Multiple Sequence Alignment (MSA) is the process of aligning three or more nucleotides/amino-acids sequences at the same time. It is an NP-complete optimization problem where the time complexity of finding an optimal alignment raises exponentially when the number of sequences to align increases. In the multiobjective version of the MSA problem, we simultaneously optimize the alignment accuracy and conservation. In this work, we present a parallel scheme for a multiobjective version of a memetic metaheuristic: Hybrid Multiobjective Memetic Metaheuristics for Multiple Sequence Alignment (H4MSA). In order to evaluate the parallel performance of H4MSA, we use several datasets with different number of sequences (up to 1000 sequences) and compare its parallel performance against other well-known parallel approaches published in the literature, such as MSAProbs, T-Coffee, Clustal O and MAFFT. On the other hand, the results reveals that parallel H4MSA is around 25 times faster than the sequential version with 32 cores.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone TrustTokenF:使用TrustZone的移动双因素身份验证的通用安全框架
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.355
Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, D. Feng
We give a detail analysis of the security issues when using mobile devices as a substitution of dedicated hardware tokens in two-factor authentication (2FA) schemes and propose TrustTokenF, a generic security framework for mobile 2FA schemes, which provides comparable security assurance to dedicated hardware tokens, and is more flexible for token management. We first illustrate how to leverage the Trusted Execution Environment(TEE) based on ARM TrustZone to provide essential security features for mobile 2FA applications, i.e., runtime isolated execution and trusted user interaction, which resist software attackers who even compromise the entire mobile OS. We also use the SRAM Physical Unclonable Functions (PUFs) to provide persistent secure storage for the authentication secrets, which achieves both high-level security and low cost. Based on these security features, we design a series of secure protocols for token deployment, migration and device key updating. We also introduce TPM2.0 policy-based authorization mechanism to enhance the security of the interface from outside world into the trusted tokens. Finally, we implement the prototype system on real TrustZone-enabled hardware. The experiment results show that TrustTokenF is secure, flexible, economical and efficient for mobile 2FA applications.
我们详细分析了在双因素身份验证(2FA)方案中使用移动设备替代专用硬件令牌时的安全问题,并提出了TrustTokenF,这是一种用于移动2FA方案的通用安全框架,它提供了与专用硬件令牌相当的安全保证,并且对于令牌管理更加灵活。我们首先说明如何利用基于ARM TrustZone的可信执行环境(TEE)为移动2FA应用程序提供基本的安全特性,即运行时隔离执行和可信用户交互,从而抵御甚至危及整个移动操作系统的软件攻击者。我们还使用SRAM物理不可克隆功能(puf)为认证秘密提供持久的安全存储,实现了高安全性和低成本。基于这些安全特性,我们设计了一系列用于令牌部署、迁移和设备密钥更新的安全协议。我们还引入了基于TPM2.0策略的授权机制,以增强从外部进入可信令牌的接口的安全性。最后,我们在启用trustzone的真实硬件上实现了原型系统。实验结果表明,TrustTokenF在移动2FA应用中具有安全、灵活、经济、高效的特点。
{"title":"TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone","authors":"Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, D. Feng","doi":"10.1109/Trustcom.2015.355","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.355","url":null,"abstract":"We give a detail analysis of the security issues when using mobile devices as a substitution of dedicated hardware tokens in two-factor authentication (2FA) schemes and propose TrustTokenF, a generic security framework for mobile 2FA schemes, which provides comparable security assurance to dedicated hardware tokens, and is more flexible for token management. We first illustrate how to leverage the Trusted Execution Environment(TEE) based on ARM TrustZone to provide essential security features for mobile 2FA applications, i.e., runtime isolated execution and trusted user interaction, which resist software attackers who even compromise the entire mobile OS. We also use the SRAM Physical Unclonable Functions (PUFs) to provide persistent secure storage for the authentication secrets, which achieves both high-level security and low cost. Based on these security features, we design a series of secure protocols for token deployment, migration and device key updating. We also introduce TPM2.0 policy-based authorization mechanism to enhance the security of the interface from outside world into the trusted tokens. Finally, we implement the prototype system on real TrustZone-enabled hardware. The experiment results show that TrustTokenF is secure, flexible, economical and efficient for mobile 2FA applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Virtualization and Cyber Security: Arming Future Security Practitioners 虚拟化和网络安全:武装未来的安全从业者
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.537
Midhun Babu Tharayanil, G. Whitney, Mahdi Aiash, Chafika Benzaid
In the past five years cybercrime has grown to become one of the most significant threats to the safety of the nation and its economy. The government's call to arms has been eagerly accepted by business enterprises and academia. But training cyber security professionals raises a unique set of challenges. Cost, space, time and scalability are among the issues identified and possible solutions proposed. As a cyber-security professionals, we have realized the importance of practical experience which can be hard to deliver in a lecture based environment. The primary aim of this project is to evaluate and recommend a platform for Virtual handson Labs which may be used to provide a secure environment for cyber security students to evaluate and receive hands-on experience on possible threats and countermeasures. There are similar labs setup in different universities across the world but we have not been able to find any studies evaluating the virtualization platforms for their merit in order to run a virtual lab. Hence we study three of the most popular virtualization platforms and recommendations are provided to guide anyone who desires to setup such a lab.
在过去的五年中,网络犯罪已经发展成为对国家安全和经济的最重大威胁之一。商业企业和学术界热切地接受了政府的武装号召。但培训网络安全专业人员带来了一系列独特的挑战。成本、空间、时间和可扩展性是确定的问题和可能的解决方案。作为一名网络安全专业人士,我们已经意识到实践经验的重要性,而在讲座式的环境中,实践经验是很难传授的。该项目的主要目的是评估和推荐一个虚拟动手实验室平台,该平台可用于为网络安全学生提供一个安全的环境,以评估和获得关于可能的威胁和对策的实践经验。世界各地的大学都建立了类似的实验室,但我们还没有找到任何研究来评估虚拟化平台的优点,以便运行一个虚拟实验室。因此,我们研究了三个最流行的虚拟化平台,并提供了建议,以指导希望建立这样一个实验室的任何人。
{"title":"Virtualization and Cyber Security: Arming Future Security Practitioners","authors":"Midhun Babu Tharayanil, G. Whitney, Mahdi Aiash, Chafika Benzaid","doi":"10.1109/Trustcom.2015.537","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.537","url":null,"abstract":"In the past five years cybercrime has grown to become one of the most significant threats to the safety of the nation and its economy. The government's call to arms has been eagerly accepted by business enterprises and academia. But training cyber security professionals raises a unique set of challenges. Cost, space, time and scalability are among the issues identified and possible solutions proposed. As a cyber-security professionals, we have realized the importance of practical experience which can be hard to deliver in a lecture based environment. The primary aim of this project is to evaluate and recommend a platform for Virtual handson Labs which may be used to provide a secure environment for cyber security students to evaluate and receive hands-on experience on possible threats and countermeasures. There are similar labs setup in different universities across the world but we have not been able to find any studies evaluating the virtualization platforms for their merit in order to run a virtual lab. Hence we study three of the most popular virtualization platforms and recommendations are provided to guide anyone who desires to setup such a lab.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133180862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trusted Tamper-Evident Data Provenance 可信的可篡改数据来源
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.430
M. Taha, Sivadon Chaisiri, R. Ko
Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM). Our framework also stores provenance logs in trusted and backup servers to guarantee the availability of data provenance. Tampered provenance logs can be discovered and consequently recovered by retrieving the original logs from the servers. Leveraging on TPM's technical capability, our framework guarantees data provenance collected to be admissible, complete, and confidential. More importantly, this framework can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities. We applied our framework to provide tamper-evidence for Progger, a cloud-based, kernel-space logger. Our results demonstrate the ability to conduct remote attestation of Progger logs' integrity, and uphold the completeness, confidential and admissible requirements.
数据来源,即数据的起源和派生历史,通常用于安全审计、取证和数据分析。虽然溯源日志记录器提供数据更改的证据,但溯源日志的完整性对于取证过程的完整性也至关重要。然而,据我们所知,很少有解决方案能够完全满足这种信任要求。在本文中,我们提出了一个框架来启用篡改证据,并使用可信平台模块(TPM)保持数据来源的机密性和完整性。我们的框架还将来源日志存储在可信和备份服务器中,以保证数据来源的可用性。通过从服务器检索原始日志,可以发现被篡改的来源日志,并随后恢复这些日志。利用TPM的技术能力,我们的框架保证收集的数据来源是可接受的、完整的和机密的。更重要的是,该框架可以应用于在系统、网络和应用程序粒度的大规模云环境中捕获篡改证据。我们应用我们的框架为Progger(一个基于云的内核空间记录器)提供篡改证据。我们的结果表明,能够对Progger日志的完整性进行远程认证,并维护完整性、机密性和可接受的要求。
{"title":"Trusted Tamper-Evident Data Provenance","authors":"M. Taha, Sivadon Chaisiri, R. Ko","doi":"10.1109/Trustcom.2015.430","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.430","url":null,"abstract":"Data provenance, the origin and derivation history of data, is commonly used for security auditing, forensics and data analysis. While provenance loggers provide evidence of data changes, the integrity of the provenance logs is also critical for the integrity of the forensics process. However, to our best knowledge, few solutions are able to fully satisfy this trust requirement. In this paper, we propose a framework to enable tamper-evidence and preserve the confidentiality and integrity of data provenance using the Trusted Platform Module (TPM). Our framework also stores provenance logs in trusted and backup servers to guarantee the availability of data provenance. Tampered provenance logs can be discovered and consequently recovered by retrieving the original logs from the servers. Leveraging on TPM's technical capability, our framework guarantees data provenance collected to be admissible, complete, and confidential. More importantly, this framework can be applied to capture tampering evidence in large-scale cloud environments at system, network, and application granularities. We applied our framework to provide tamper-evidence for Progger, a cloud-based, kernel-space logger. Our results demonstrate the ability to conduct remote attestation of Progger logs' integrity, and uphold the completeness, confidential and admissible requirements.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133305600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations Fingerprint and EEM 基于亚结构关系指纹图谱和EEM的大型不平衡数据集化合物活性预测
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.581
Wojciech M. Czarnecki, Krzysztof Rataj
Modern drug design procedures involve the process of virtual screening, a highly efficient filtering step used for maximizing the efficiency of the preselection of compounds which are valuable drug candidates. Recent advances in introduction of machine learning models to this process can lead to significant increase in the overall quality of the drug designing pipeline. Unfortunately, for many proteins it is still extremely hard to come up with a valid statistical model. It is a consequence of huge classes disproportion (even 1000:1), large datasets (over 100,000 of samples) and restricted data representation (mostly high-dimensional, sparse, binary vectors). In this paper, we try to tackle this problem through three important innovations. First we represent compounds with 2-dimensional, graph representation. Second, we show how one can provide extremely fast method for measuring similarity of such data. Finally, we use the Extreme Entropy Machine which shows increase in balanced accuracy over Extreme Learning Machines, Support Vector Machines, one-class Support Vector Machines as well as Random Forest. Proposed pipeline brings significantly better results than all considered alternative, state-of-the-art approaches. We introduce some important novel elements and show why they lead to better model. Despite this, it should still be considered as a proof of concept and further investigations in the field are needed.
现代药物设计程序涉及虚拟筛选过程,这是一种高效的过滤步骤,用于最大化预选有价值的候选药物化合物的效率。在这一过程中引入机器学习模型的最新进展可以显著提高药物设计管道的整体质量。不幸的是,对于许多蛋白质来说,仍然很难提出一个有效的统计模型。这是巨大的类不比例(甚至1000:1),大型数据集(超过100,000个样本)和有限的数据表示(主要是高维,稀疏,二进制向量)的结果。在本文中,我们试图通过三个重要的创新来解决这个问题。首先,我们用二维图形表示化合物。其次,我们展示了如何提供一种非常快速的方法来测量这些数据的相似性。最后,我们使用了极端熵机,它比极端学习机、支持向量机、一类支持向量机和随机森林的平衡精度更高。拟议的管道比所有考虑过的最先进的替代方法带来了明显更好的结果。我们介绍了一些重要的新元素,并说明了为什么它们会导致更好的模型。尽管如此,它仍应被视为概念的证明,需要在实地进行进一步的调查。
{"title":"Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations Fingerprint and EEM","authors":"Wojciech M. Czarnecki, Krzysztof Rataj","doi":"10.1109/Trustcom.2015.581","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.581","url":null,"abstract":"Modern drug design procedures involve the process of virtual screening, a highly efficient filtering step used for maximizing the efficiency of the preselection of compounds which are valuable drug candidates. Recent advances in introduction of machine learning models to this process can lead to significant increase in the overall quality of the drug designing pipeline. Unfortunately, for many proteins it is still extremely hard to come up with a valid statistical model. It is a consequence of huge classes disproportion (even 1000:1), large datasets (over 100,000 of samples) and restricted data representation (mostly high-dimensional, sparse, binary vectors). In this paper, we try to tackle this problem through three important innovations. First we represent compounds with 2-dimensional, graph representation. Second, we show how one can provide extremely fast method for measuring similarity of such data. Finally, we use the Extreme Entropy Machine which shows increase in balanced accuracy over Extreme Learning Machines, Support Vector Machines, one-class Support Vector Machines as well as Random Forest. Proposed pipeline brings significantly better results than all considered alternative, state-of-the-art approaches. We introduce some important novel elements and show why they lead to better model. Despite this, it should still be considered as a proof of concept and further investigations in the field are needed.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks 无线传感器网络中多媒体数据的高能效拥塞控制方案
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.518
Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaesoo Yoo
Wireless sensor networks have enabled multimedia data collection such as video or audio with the advancement of computer technology. In this paper, we propose an energy efficient congestion control scheme for multimedia data in wireless sensor networks. The proposed scheme extracts and transfers dynamic regions by considering monitoring characteristics over multimedia data to reduce the transferred data. Furthermore, it can reduce the packet size by deleting and transferring low-priority bit data by considering multimedia data characteristics during congestion situations to minimize packet loss.
随着计算机技术的进步,无线传感器网络使视频或音频等多媒体数据采集成为可能。本文针对无线传感器网络中的多媒体数据,提出了一种节能的拥塞控制方案。该方案通过考虑多媒体数据的监控特征提取和传输动态区域,以减少传输数据量。此外,它还可以在拥塞情况下考虑多媒体数据的特点,通过删除和传输低优先级位数据来减小数据包的大小,从而最大限度地减少数据包的丢失。
{"title":"An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor Networks","authors":"Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaesoo Yoo","doi":"10.1109/Trustcom.2015.518","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.518","url":null,"abstract":"Wireless sensor networks have enabled multimedia data collection such as video or audio with the advancement of computer technology. In this paper, we propose an energy efficient congestion control scheme for multimedia data in wireless sensor networks. The proposed scheme extracts and transfers dynamic regions by considering monitoring characteristics over multimedia data to reduce the transferred data. Furthermore, it can reduce the packet size by deleting and transferring low-priority bit data by considering multimedia data characteristics during congestion situations to minimize packet loss.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable Massively Parallel Learning of Multiple Linear Regression Algorithm with MapReduce 基于MapReduce的多元线性回归算法的可扩展大规模并行学习
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.560
Moufida Rehab Adjout, F. Boufarès
The large volumes of information emerging by the progress of technology and the growing individual needs of data mining, makes training of very large scale of data a challenging task. However, this information cannot be practically analyzed on a single machine due to the sheer size of the data to fit in memory. For this purpose, the process of such data requires the use of high-performance analytical systems running on distributed environments. To this end standard analytics algorithms need to be adapted to take advantage of cloud computing models which provide scalability and flexibility. This paper introduces a new distributed training method, which combines the widely used framework, MapReduce, for Multiple Linear Regression which will be based on the QR decomposition and the ordinary least squares method adapted to MapReduce. Our platform is deployed on Cloud Amazon EMR service. Experimental results demonstrate that our parallel version of the Multiple Linear Regression can efficiently handle very large datasets with different parameter settings (number, size and structure of machines).
随着技术的进步和个人对数据挖掘的需求不断增长,大量的信息出现,使得训练非常大规模的数据成为一项具有挑战性的任务。然而,这些信息不能在一台机器上进行实际分析,因为内存中的数据非常大。为此,这些数据的处理需要使用运行在分布式环境上的高性能分析系统。为此,需要对标准分析算法进行调整,以利用提供可伸缩性和灵活性的云计算模型。本文介绍了一种新的分布式训练方法,该方法结合了广泛使用的MapReduce框架,将QR分解和适用于MapReduce的普通最小二乘法相结合,用于多元线性回归。我们的平台部署在亚马逊云电子病历服务上。实验结果表明,我们的并行版本的多元线性回归可以有效地处理具有不同参数设置(机器数量,大小和结构)的非常大的数据集。
{"title":"Scalable Massively Parallel Learning of Multiple Linear Regression Algorithm with MapReduce","authors":"Moufida Rehab Adjout, F. Boufarès","doi":"10.1109/Trustcom.2015.560","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.560","url":null,"abstract":"The large volumes of information emerging by the progress of technology and the growing individual needs of data mining, makes training of very large scale of data a challenging task. However, this information cannot be practically analyzed on a single machine due to the sheer size of the data to fit in memory. For this purpose, the process of such data requires the use of high-performance analytical systems running on distributed environments. To this end standard analytics algorithms need to be adapted to take advantage of cloud computing models which provide scalability and flexibility. This paper introduces a new distributed training method, which combines the widely used framework, MapReduce, for Multiple Linear Regression which will be based on the QR decomposition and the ordinary least squares method adapted to MapReduce. Our platform is deployed on Cloud Amazon EMR service. Experimental results demonstrate that our parallel version of the Multiple Linear Regression can efficiently handle very large datasets with different parameter settings (number, size and structure of machines).","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134485410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication 如何滥用SMTP over TLS:电子邮件服务器通信的安全性研究
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.386
Lars Baumgärtner, Jonas Höchst, M. Leinweber, Bernd Freisleben
Electronic mail is one of the oldest and widely used services in the Internet. In this paper, an empirical study of the security properties of email server communication within the German IP address space range is presented. Instead of investigating end-user security or end-to-end encryption, we focus on the connections between SMTP servers relying on transport layer security. We analyze the involved ciphers suites, the certificates used and certificate authorities, and the behavior of email providers when communicating with improperly secured email servers. Conclusions drawn from this analysis lead to several recommendations to mitigate the security issues currently present in the email system as it is deployed in the Internet.
电子邮件是互联网上最古老和最广泛使用的服务之一。本文对德国IP地址空间范围内电子邮件服务器通信的安全特性进行了实证研究。我们没有研究终端用户的安全性或端到端加密,而是关注依赖于传输层安全性的SMTP服务器之间的连接。我们分析了所涉及的密码套件、使用的证书和证书颁发机构,以及电子邮件提供商在与不适当保护的电子邮件服务器通信时的行为。从这个分析中得出的结论导致了一些建议,以减轻目前在互联网上部署的电子邮件系统中存在的安全问题。
{"title":"How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication","authors":"Lars Baumgärtner, Jonas Höchst, M. Leinweber, Bernd Freisleben","doi":"10.1109/Trustcom.2015.386","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.386","url":null,"abstract":"Electronic mail is one of the oldest and widely used services in the Internet. In this paper, an empirical study of the security properties of email server communication within the German IP address space range is presented. Instead of investigating end-user security or end-to-end encryption, we focus on the connections between SMTP servers relying on transport layer security. We analyze the involved ciphers suites, the certificates used and certificate authorities, and the behavior of email providers when communicating with improperly secured email servers. Conclusions drawn from this analysis lead to several recommendations to mitigate the security issues currently present in the email system as it is deployed in the Internet.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133441252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access 利用SS7-MAP漏洞解锁被盗移动设备:利用IMEI和IMSI之间的关系进行EIR访问
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.500
S. Rao, S. Holtmanns, Ian Oliver, T. Aura
The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side with stolen devices. In this paper, we present how the SS7- MAP protocol can be misused to help an attacker to unblock the device from the stolen list and use it normally.
移动电话使用的增加和移动电话盗窃数量的相对增加给安全地找回被盗或丢失的设备带来了额外的费用。当移动安全研究人员试图找出各种机制来跟踪这些设备时,另一方面,攻击者则试图利用移动网络系统的弱点,带着被盗设备消失在黑暗中。在本文中,我们介绍了如何滥用SS7- MAP协议来帮助攻击者从被盗列表中解锁设备并正常使用它。
{"title":"Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access","authors":"S. Rao, S. Holtmanns, Ian Oliver, T. Aura","doi":"10.1109/Trustcom.2015.500","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.500","url":null,"abstract":"The increase in usage of mobile phones and the relative increase in the number of mobile phone thefts have imposed an overhead on securely retrieving the stolen or missing devices. While the mobile security researchers try to figure out various mechanisms to track such devices, attackers on the other hand are trying to exploit weaknesses in the mobile network system to dissipate into the dark side with stolen devices. In this paper, we present how the SS7- MAP protocol can be misused to help an attacker to unblock the device from the stolen list and use it normally.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1