首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking 软件定义网络中基于熵的分布式DDoS检测机制
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.389
Rui Wang, Zhiping Jia, Lei Ju
Software-Defined Networking (SDN) and OpenFlow (OF) protocol have brought a promising architecture for the future networks. However, the centralized control and programmable characteristics also bring a lot of security challenges. Distributed denial-of-service (DDoS) attack is still a security threat to SDN. To detect the DDoS attack in SDN, many researches collect the flow tables from the switch and do the anomaly detection in the controller. But in the large scale network, the collecting process burdens the communication overload between the switches and the controller. Sampling technology may relieve this overload, but it brings a new tradeoff between sampling rate and detection accuracy. In this paper, we first extend a copy of the packet number counter of the flow entry in the OpenFlow table. Based on the flow-based nature of SDN, we design a flow statistics process in the switch. Then, we propose an entropy-based lightweight DDoS flooding attack detection model running in the OF edge switch. This achieves a distributed anomaly detection in SDN and reduces the flow collection overload to the controller. We also give the detailed algorithm which has a small calculation overload and can be easily implemented in SDN software or programmable switch, such as Open vSwitch and NetFPGA. The experimental results show that our detection mechanism can detect the attack quickly and achieve a high detection accuracy with a low false positive rate.
软件定义网络(SDN)和OpenFlow (OF)协议为未来的网络带来了一种很有前景的架构。然而,集中控制和可编程的特点也带来了许多安全挑战。分布式拒绝服务(DDoS)攻击仍然是SDN的安全威胁。为了检测SDN网络中的DDoS攻击,很多研究从交换机上采集流量表,在控制器上进行异常检测。但在大规模网络中,采集过程给交换机和控制器之间的通信负担过重。采样技术可以缓解这种过载,但它带来了采样率和检测精度之间的新的权衡。在本文中,我们首先扩展了OpenFlow表中流条目的包数计数器的副本。基于SDN基于流量的特性,我们设计了交换机中的流量统计流程。然后,我们提出了一种基于熵的轻量级DDoS洪水攻击检测模型,该模型运行在OF边缘交换机中。实现了SDN的分布式异常检测,减少了对控制器的流量采集过载。该算法计算负荷小,易于在SDN软件或Open vSwitch、NetFPGA等可编程交换机中实现。实验结果表明,我们的检测机制能够快速检测出攻击,检测精度高,假阳性率低。
{"title":"An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking","authors":"Rui Wang, Zhiping Jia, Lei Ju","doi":"10.1109/Trustcom.2015.389","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.389","url":null,"abstract":"Software-Defined Networking (SDN) and OpenFlow (OF) protocol have brought a promising architecture for the future networks. However, the centralized control and programmable characteristics also bring a lot of security challenges. Distributed denial-of-service (DDoS) attack is still a security threat to SDN. To detect the DDoS attack in SDN, many researches collect the flow tables from the switch and do the anomaly detection in the controller. But in the large scale network, the collecting process burdens the communication overload between the switches and the controller. Sampling technology may relieve this overload, but it brings a new tradeoff between sampling rate and detection accuracy. In this paper, we first extend a copy of the packet number counter of the flow entry in the OpenFlow table. Based on the flow-based nature of SDN, we design a flow statistics process in the switch. Then, we propose an entropy-based lightweight DDoS flooding attack detection model running in the OF edge switch. This achieves a distributed anomaly detection in SDN and reduces the flow collection overload to the controller. We also give the detailed algorithm which has a small calculation overload and can be easily implemented in SDN software or programmable switch, such as Open vSwitch and NetFPGA. The experimental results show that our detection mechanism can detect the attack quickly and achieve a high detection accuracy with a low false positive rate.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 188
uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme uCentive:一个高效、匿名和不可链接的激励计划
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.423
Milica Milutinovic, Italo Dacosta, A. Put, B. Decker
Incentives systems are widely adopted to encourage user actions or contributions that benefit a service provider or a community. In exchange for their actions, users receive incentive points that can be used to obtain benefits or reputation. However, these systems require users to have a central account associated with all their activities. This approach allows providers to collect vast amounts of users' private information, even if pseudonyms are used. In this paper, we present uCentive, a flexible and efficient incentives scheme that allows users to earn and redeem incentives (uCents) that cannot be linked to their identities or actions. In addition, users can prove, if requested, ownership of their incentives without breaking unlinkability guarantees. uCentive also offers perfect forward unlinkability -- even if the user's secrets are compromised, redeemed uCents cannot be linked together or to the user's identity. Even though our scheme relies on heavy cryptography, experimental evaluation shows that it is adequate for mobile devices such as smartphones. We have also made our uCentive library and prototype apps publicly available for further assessment. In short, we provide a practical privacy-preserving incentives scheme that can eliminate users' growing privacy concerns when using such systems.
广泛采用奖励制度来鼓励有益于服务提供者或社区的用户行动或贡献。作为他们行为的交换,用户可以获得奖励积分,这些积分可以用来获得利益或声誉。然而,这些系统要求用户拥有一个与其所有活动相关联的中央帐户。这种方法允许提供商收集大量用户的私人信息,即使使用假名。在本文中,我们提出了uCentive,这是一种灵活有效的激励方案,允许用户赚取和兑换不能与其身份或行为相关联的激励(ucent)。此外,如果需要,用户可以在不破坏不可链接性保证的情况下证明其奖励的所有权。uCentive还提供了完美的前向不可链接性——即使用户的秘密被泄露,被赎回的ucent也不能链接在一起,也不能链接到用户的身份。尽管我们的方案依赖于大量的加密,但实验评估表明,它适用于智能手机等移动设备。我们还公开了我们的uCentive库和原型应用程序,以供进一步评估。简而言之,我们提供了一个实用的隐私保护激励方案,可以消除用户在使用此类系统时日益增长的隐私担忧。
{"title":"uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme","authors":"Milica Milutinovic, Italo Dacosta, A. Put, B. Decker","doi":"10.1109/Trustcom.2015.423","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.423","url":null,"abstract":"Incentives systems are widely adopted to encourage user actions or contributions that benefit a service provider or a community. In exchange for their actions, users receive incentive points that can be used to obtain benefits or reputation. However, these systems require users to have a central account associated with all their activities. This approach allows providers to collect vast amounts of users' private information, even if pseudonyms are used. In this paper, we present uCentive, a flexible and efficient incentives scheme that allows users to earn and redeem incentives (uCents) that cannot be linked to their identities or actions. In addition, users can prove, if requested, ownership of their incentives without breaking unlinkability guarantees. uCentive also offers perfect forward unlinkability -- even if the user's secrets are compromised, redeemed uCents cannot be linked together or to the user's identity. Even though our scheme relies on heavy cryptography, experimental evaluation shows that it is adequate for mobile devices such as smartphones. We have also made our uCentive library and prototype apps publicly available for further assessment. In short, we provide a practical privacy-preserving incentives scheme that can eliminate users' growing privacy concerns when using such systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Enhanced GPU Resource Utilization through Fairness-aware Task Scheduling 通过公平感知任务调度提高GPU资源利用率
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.611
Ayman Tarakji, Alexander Gladis, Tarek Anwar, R. Leupers
Underutilization as well as oversubscription of processing resources are common problems in current accelerator-based computing systems. Facing these challenges will require intelligent algorithms for scheduling parallel workloads on accelerators. The general aim of this paper is to achieve fair distribution of the tremendous computation power of modern devices among running applications towards enhancing resource utilization. Given a set of real applications, we evaluate our model and explore the advantages of multi-tasking and concurrency on current GPUs.
在当前基于加速器的计算系统中,处理资源的利用不足和超额认购是常见的问题。面对这些挑战将需要智能算法来调度加速器上的并行工作负载。本文的总体目标是实现现代设备巨大的计算能力在运行中的应用程序之间的公平分配,以提高资源利用率。给出了一组实际应用,我们评估了我们的模型,并探索了当前gpu上多任务和并发的优势。
{"title":"Enhanced GPU Resource Utilization through Fairness-aware Task Scheduling","authors":"Ayman Tarakji, Alexander Gladis, Tarek Anwar, R. Leupers","doi":"10.1109/Trustcom.2015.611","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.611","url":null,"abstract":"Underutilization as well as oversubscription of processing resources are common problems in current accelerator-based computing systems. Facing these challenges will require intelligent algorithms for scheduling parallel workloads on accelerators. The general aim of this paper is to achieve fair distribution of the tremendous computation power of modern devices among running applications towards enhancing resource utilization. Given a set of real applications, we evaluate our model and explore the advantages of multi-tasking and concurrency on current GPUs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
M-PCA Binary Embedding for Approximate Nearest Neighbor Search 近似最近邻搜索的M-PCA二值嵌入
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.554
Ezgi C. Ozan, S. Kiranyaz, M. Gabbouj
Principal Component Analysis (PCA) is widely used within binary embedding methods for approximate nearest neighbor search and has proven to have a significant effect on the performance. Current methods aim to represent the whole data using a single PCA however, considering the Gaussian distribution requirements of PCA, this representation is not appropriate. In this study we propose using Multiple PCA (M-PCA) transformations to represent the whole data and show that it increases the performance significantly compared to methods using a single PCA.
主成分分析(PCA)在二值嵌入方法中广泛应用于近似最近邻搜索,并已被证明对性能有显著影响。目前的方法旨在使用单个主成分分析来表示整个数据,但考虑到主成分分析的高斯分布要求,这种表示并不合适。在本研究中,我们提出使用多个主成分(M-PCA)变换来表示整个数据,并表明与使用单个主成分的方法相比,它显着提高了性能。
{"title":"M-PCA Binary Embedding for Approximate Nearest Neighbor Search","authors":"Ezgi C. Ozan, S. Kiranyaz, M. Gabbouj","doi":"10.1109/Trustcom.2015.554","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.554","url":null,"abstract":"Principal Component Analysis (PCA) is widely used within binary embedding methods for approximate nearest neighbor search and has proven to have a significant effect on the performance. Current methods aim to represent the whole data using a single PCA however, considering the Gaussian distribution requirements of PCA, this representation is not appropriate. In this study we propose using Multiple PCA (M-PCA) transformations to represent the whole data and show that it increases the performance significantly compared to methods using a single PCA.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114459588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance of Cooperative Firewalls in Real-World Deployments 协作防火墙在实际部署中的性能
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.359
Nishant Patanaik, A. Goulart
The concept of cooperative firewalls or customer edge switching (CES) has been proposed to establish secure communication sessions between public and private domains in the global Internet. It allows public (or private) domains to initiate a trusted communication session with a private domain, by using the private host's fully qualified domain name (FQDN) instead of its IP addresses. However, this concept requires further evaluation in real-world scenario deployments that could benefit from having cooperative firewalls. The scenario addressed in this paper is Internet of Things (IoT). An analytical model was developed to estimate the performance in terms of session setup delays and number of servers required for the Customer Edge Traversal Protocol (CETP) to support a large number of IP-based devices.
协作防火墙或客户边缘交换(CES)的概念已被提出,用于在全球互联网的公共和私有域之间建立安全通信会话。它允许公共(或私有)域通过使用私有主机的完全限定域名(FQDN)而不是其IP地址来发起与私有域的可信通信会话。然而,这个概念需要在实际场景部署中进行进一步评估,这些部署可能受益于协作防火墙。本文讨论的场景是物联网(IoT)。开发了一个分析模型,以根据会话设置延迟和客户边缘遍历协议(CETP)支持大量基于ip的设备所需的服务器数量来估计性能。
{"title":"Performance of Cooperative Firewalls in Real-World Deployments","authors":"Nishant Patanaik, A. Goulart","doi":"10.1109/Trustcom.2015.359","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.359","url":null,"abstract":"The concept of cooperative firewalls or customer edge switching (CES) has been proposed to establish secure communication sessions between public and private domains in the global Internet. It allows public (or private) domains to initiate a trusted communication session with a private domain, by using the private host's fully qualified domain name (FQDN) instead of its IP addresses. However, this concept requires further evaluation in real-world scenario deployments that could benefit from having cooperative firewalls. The scenario addressed in this paper is Internet of Things (IoT). An analytical model was developed to estimate the performance in terms of session setup delays and number of servers required for the Customer Edge Traversal Protocol (CETP) to support a large number of IP-based devices.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Risk Perceptions in Privacy Concerns Evaluation 风险认知在隐私问题评估中的作用
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.479
Anna Rohunen, Jouni Markkula
The collection of information on individual persons for personal data intensive systems and services poses the risk of privacy violations and raises privacy concerns. Individuals' privacy concerns and risk perceptions affect their decision-making on personal data disclosure for services. In the research presented in this paper, data subjects' privacy concerns and risk perceptions were studied by surveying drivers on the possibility of collecting driving data on their vehicles. The research sought to explore the following questions: (1) How are data subjects' risk perceptions related to their privacy concerns, (2) how do risk perceptions and privacy concerns jointly affect willingness to disclose data, (3) how should risk perceptions be incorporated into evaluation of data subjects' privacy behavior? The study's primary findings were as follows: (1) surprisingly, clear dependencies between risk perceptions and privacy concerns were not found, (2) data subjects risk perceptions and two privacy concerns-related factors independently affected their willingness to disclose data -- the two privacy concerns-related factors were the data subjects' perceptions of other drivers' privacy concerns and their discussing information privacy with other drivers, (3) risk perceptions, in combination with privacy concerns, should be incorporated into the data subjects' privacy behavior evaluations. The results of the study contribute to improving the validity of privacy behavior measurements and models.
为个人资料密集的系统和服务收集个人资料,会带来侵犯私隐的风险,并引起私隐关注。个人对隐私的关注和对风险的认知影响了他们为服务披露个人数据的决策。在本文中提出的研究中,通过调查司机收集驾驶数据的可能性,研究了数据主体的隐私问题和风险认知。本研究旨在探讨以下问题:(1)数据主体的风险认知与其隐私担忧之间的关系;(2)风险认知与隐私担忧如何共同影响数据披露意愿;(3)风险认知应如何纳入数据主体隐私行为的评估?研究的主要发现如下:(1)令人惊讶的是,风险感知和隐私关注之间没有明显的依赖关系;(2)数据主体的风险感知和两个与隐私关注相关的因素独立影响他们披露数据的意愿——这两个与隐私关注相关的因素是数据主体对其他司机隐私问题的感知以及他们与其他司机讨论信息隐私的感知;(3)风险感知与隐私关注相结合;应纳入数据主体隐私行为评估。研究结果有助于提高隐私行为测量和模型的有效性。
{"title":"The Role of Risk Perceptions in Privacy Concerns Evaluation","authors":"Anna Rohunen, Jouni Markkula","doi":"10.1109/Trustcom.2015.479","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.479","url":null,"abstract":"The collection of information on individual persons for personal data intensive systems and services poses the risk of privacy violations and raises privacy concerns. Individuals' privacy concerns and risk perceptions affect their decision-making on personal data disclosure for services. In the research presented in this paper, data subjects' privacy concerns and risk perceptions were studied by surveying drivers on the possibility of collecting driving data on their vehicles. The research sought to explore the following questions: (1) How are data subjects' risk perceptions related to their privacy concerns, (2) how do risk perceptions and privacy concerns jointly affect willingness to disclose data, (3) how should risk perceptions be incorporated into evaluation of data subjects' privacy behavior? The study's primary findings were as follows: (1) surprisingly, clear dependencies between risk perceptions and privacy concerns were not found, (2) data subjects risk perceptions and two privacy concerns-related factors independently affected their willingness to disclose data -- the two privacy concerns-related factors were the data subjects' perceptions of other drivers' privacy concerns and their discussing information privacy with other drivers, (3) risk perceptions, in combination with privacy concerns, should be incorporated into the data subjects' privacy behavior evaluations. The results of the study contribute to improving the validity of privacy behavior measurements and models.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trust Evaluation in Mobile Devices: An Empirical Study 移动设备信任评价的实证研究
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.353
Richard S. Weiss, L. Reznik, Yanyan Zhuang, Andrew Hoffman, Darrel Pollard, Albert Rafetseder, Tao Li, Justin Cappos
Mobile devices today, such as smartphones and tablets, have become both more complex and diverse. This paper presents a framework to evaluate the trustworthiness of the individual components in a mobile system, as well as the entire system. The major components are applications, devices and networks of devices. Given this diversity and multiple levels of a mobile system, we develop a hierarchical trust evaluation methodology, which enables the combination of trust metrics and allows us to verify the trust metric for each component based on the trust metrics for others. The paper first demonstrates this idea for individual applications and Android-based smartphones. The methodology involves two stages: initial trust evaluation and trust verification. In the first stage, an expert rule system is used to produce trust metrics at the lowest level of the hierarchy. In the second stage, the trust metrics are verified by comparing data from components and a trust evaluation is produced for the combined system. This paper presents the results of two empirical studies, in which this methodology is applied and tested. The first study involves monitoring resource utilization and evaluating trust based on resource consumption patterns. We measured battery voltage, CPU utilization and network communication for individual apps and detected anomalous behavior that could be indicative of malicious code. The second study involves verification of the trust evaluation by comparing the data from two different devices: the GPS location from an Android smartphone in an automobile and the data from an on-board diagnostics (OBD) sensor of the same vehicle.
如今的移动设备,如智能手机和平板电脑,已经变得更加复杂和多样化。本文提出了一个评估移动系统中各个组件以及整个系统可信度的框架。其主要组成部分是应用程序、设备和设备网络。考虑到移动系统的多样性和多层次,我们开发了一种分层信任评估方法,该方法可以组合信任指标,并允许我们根据其他组件的信任指标验证每个组件的信任指标。这篇论文首先为个人应用程序和基于android的智能手机展示了这个想法。该方法包括初始信任评估和信任验证两个阶段。在第一阶段,使用专家规则系统在层次结构的最低级别生成信任度量。在第二阶段,通过比较来自组件的数据来验证信任度量,并为组合系统生成信任评估。本文介绍了两项实证研究的结果,并对该方法进行了应用和检验。第一项研究涉及基于资源消耗模式的资源利用监测和信任评价。我们测量了单个应用程序的电池电压、CPU利用率和网络通信,并检测到可能指示恶意代码的异常行为。第二项研究涉及通过比较来自两个不同设备的数据来验证信任评估:来自汽车中的Android智能手机的GPS位置和来自同一辆汽车的车载诊断(OBD)传感器的数据。
{"title":"Trust Evaluation in Mobile Devices: An Empirical Study","authors":"Richard S. Weiss, L. Reznik, Yanyan Zhuang, Andrew Hoffman, Darrel Pollard, Albert Rafetseder, Tao Li, Justin Cappos","doi":"10.1109/Trustcom.2015.353","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.353","url":null,"abstract":"Mobile devices today, such as smartphones and tablets, have become both more complex and diverse. This paper presents a framework to evaluate the trustworthiness of the individual components in a mobile system, as well as the entire system. The major components are applications, devices and networks of devices. Given this diversity and multiple levels of a mobile system, we develop a hierarchical trust evaluation methodology, which enables the combination of trust metrics and allows us to verify the trust metric for each component based on the trust metrics for others. The paper first demonstrates this idea for individual applications and Android-based smartphones. The methodology involves two stages: initial trust evaluation and trust verification. In the first stage, an expert rule system is used to produce trust metrics at the lowest level of the hierarchy. In the second stage, the trust metrics are verified by comparing data from components and a trust evaluation is produced for the combined system. This paper presents the results of two empirical studies, in which this methodology is applied and tested. The first study involves monitoring resource utilization and evaluating trust based on resource consumption patterns. We measured battery voltage, CPU utilization and network communication for individual apps and detected anomalous behavior that could be indicative of malicious code. The second study involves verification of the trust evaluation by comparing the data from two different devices: the GPS location from an Android smartphone in an automobile and the data from an on-board diagnostics (OBD) sensor of the same vehicle.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe 新兴p2p个人云平台MaidSafe的安全性分析
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.538
F. Jacob, Jens Mittag, H. Hartenstein
The emergence of decentralized crypto currencies such as Bitcoin and the success of the anonymizing network TOR lead to an increased interest in peer-to-peer based technologies lately - not only due to the prevalent deployment of mass network surveillance technologies by authorities around the globe. While today's application services typically employ centralized client/server architectures that require the user to trust the service provider, new decentralized platforms that eliminate this need of trust are on their rise. In this paper we critically analyze a fully decentralized alternative to today's digital ecosystem - MaidSafe - that drops most of the commonly applied principles. The MaidSafe network implements a fully decentralized personal data storage platform on which user applications can be built. The network is made up by individual users who contribute storage, computing power and bandwidth. All communication between network nodes is encrypted, yet users only have to remember a username and password. To guarantee these objectives, MaidSafe combines mechanisms such as Self-Authentication, Self-Encryption, and a P2P-based public key infrastructure. This paper provides a condensed description of MaidSafe's key protocol mechanisms, derives the underlying identity and access management architecture, and evaluates it with respect to security and privacy aspects.
分散式加密货币(如比特币)的出现以及匿名网络TOR的成功,导致人们最近对基于点对点的技术的兴趣增加,这不仅是因为全球各地当局普遍部署了大规模网络监控技术。虽然今天的应用程序服务通常采用要求用户信任服务提供者的集中式客户机/服务器架构,但消除这种信任需求的新型分散平台正在兴起。在本文中,我们批判性地分析了当今数字生态系统的完全分散的替代方案- MaidSafe -它放弃了大多数常用原则。MaidSafe网络实现了一个完全分散的个人数据存储平台,用户可以在该平台上构建应用程序。网络是由贡献存储、计算能力和带宽的个人用户组成的。网络节点之间的所有通信都是加密的,而用户只需要记住用户名和密码。为了保证这些目标,MaidSafe结合了自认证、自加密和基于p2p的公钥基础设施等机制。本文简要描述了MaidSafe的密钥协议机制,导出了底层身份和访问管理架构,并从安全和隐私方面对其进行了评估。
{"title":"A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe","authors":"F. Jacob, Jens Mittag, H. Hartenstein","doi":"10.1109/Trustcom.2015.538","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.538","url":null,"abstract":"The emergence of decentralized crypto currencies such as Bitcoin and the success of the anonymizing network TOR lead to an increased interest in peer-to-peer based technologies lately - not only due to the prevalent deployment of mass network surveillance technologies by authorities around the globe. While today's application services typically employ centralized client/server architectures that require the user to trust the service provider, new decentralized platforms that eliminate this need of trust are on their rise. In this paper we critically analyze a fully decentralized alternative to today's digital ecosystem - MaidSafe - that drops most of the commonly applied principles. The MaidSafe network implements a fully decentralized personal data storage platform on which user applications can be built. The network is made up by individual users who contribute storage, computing power and bandwidth. All communication between network nodes is encrypted, yet users only have to remember a username and password. To guarantee these objectives, MaidSafe combines mechanisms such as Self-Authentication, Self-Encryption, and a P2P-based public key infrastructure. This paper provides a condensed description of MaidSafe's key protocol mechanisms, derives the underlying identity and access management architecture, and evaluates it with respect to security and privacy aspects.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A MapReduce-Based k-Nearest Neighbor Approach for Big Data Classification 基于mapreduce的k近邻大数据分类方法
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.577
Jesús Maillo, I. Triguero, F. Herrera
The k-Nearest Neighbor classifier is one of the most well known methods in data mining because of its effectiveness and simplicity. Due to its way of working, the application of this classifier may be restricted to problems with a certain number of examples, especially, when the runtime matters. However, the classification of large amounts of data is becoming a necessary task in a great number of real-world applications. This topic is known as big data classification, in which standard data mining techniques normally fail to tackle such volume of data. In this contribution we propose a MapReduce-based approach for k-Nearest neighbor classification. This model allows us to simultaneously classify large amounts of unseen cases (test examples) against a big (training) dataset. To do so, the map phase will determine the k-nearest neighbors in different splits of the data. Afterwards, the reduce stage will compute the definitive neighbors from the list obtained in the map phase. The designed model allows the k-Nearest neighbor classifier to scale to datasets of arbitrary size, just by simply adding more computing nodes if necessary. Moreover, this parallel implementation provides the exact classification rate as the original k-NN model. The conducted experiments, using a dataset with up to 1 million instances, show the promising scalability capabilities of the proposed approach.
k近邻分类器是数据挖掘中最著名的方法之一,因为它的有效性和简单性。由于其工作方式,该分类器的应用可能仅限于具有一定数量的示例的问题,特别是在运行时很重要的情况下。然而,在大量实际应用中,对大量数据进行分类正成为一项必要的任务。这个主题被称为大数据分类,在这个主题中,标准的数据挖掘技术通常无法处理如此大量的数据。在这篇文章中,我们提出了一种基于mapreduce的k-最近邻分类方法。这个模型允许我们同时根据一个大的(训练)数据集对大量看不见的案例(测试示例)进行分类。为此,映射阶段将在数据的不同分割中确定k个最近的邻居。然后,reduce阶段将从映射阶段获得的列表中计算最终邻居。设计的模型允许k-最近邻分类器扩展到任意大小的数据集,只需在必要时添加更多的计算节点。此外,这种并行实现提供了与原始k-NN模型相同的分类率。使用多达100万个实例的数据集进行的实验表明,所提出的方法具有良好的可扩展性。
{"title":"A MapReduce-Based k-Nearest Neighbor Approach for Big Data Classification","authors":"Jesús Maillo, I. Triguero, F. Herrera","doi":"10.1109/Trustcom.2015.577","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.577","url":null,"abstract":"The k-Nearest Neighbor classifier is one of the most well known methods in data mining because of its effectiveness and simplicity. Due to its way of working, the application of this classifier may be restricted to problems with a certain number of examples, especially, when the runtime matters. However, the classification of large amounts of data is becoming a necessary task in a great number of real-world applications. This topic is known as big data classification, in which standard data mining techniques normally fail to tackle such volume of data. In this contribution we propose a MapReduce-based approach for k-Nearest neighbor classification. This model allows us to simultaneously classify large amounts of unseen cases (test examples) against a big (training) dataset. To do so, the map phase will determine the k-nearest neighbors in different splits of the data. Afterwards, the reduce stage will compute the definitive neighbors from the list obtained in the map phase. The designed model allows the k-Nearest neighbor classifier to scale to datasets of arbitrary size, just by simply adding more computing nodes if necessary. Moreover, this parallel implementation provides the exact classification rate as the original k-NN model. The conducted experiments, using a dataset with up to 1 million instances, show the promising scalability capabilities of the proposed approach.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity 保护网络辅助直接通信:不可靠蜂窝连接的情况
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.453
A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, Y. Koucheryavy
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.
网络辅助设备到设备(D2D)通信是下一代无线技术,可在蜂窝基础设施控制下在邻近用户设备之间实现直接连接。它将集中式和分布式网络体系结构耦合在一起,因此需要各自支持安全、私有和可信的数据交换,特别是在蜂窝控制链路不是始终可用的情况下。在这项工作中,我们进行了最先进的概述,并提出了一种新的算法,以在蜂窝连接不可靠的情况下维持邻近设备的安全功能,无论新设备加入用户的安全组还是现有设备离开它。我们提出的解决方案及其在这项工作中详细介绍的严格的数学实现为未来无线通信系统中新一代安全的基于邻近的服务和应用打开了大门。
{"title":"Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity","authors":"A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, Y. Koucheryavy","doi":"10.1109/Trustcom.2015.453","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.453","url":null,"abstract":"Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1