首页 > 最新文献

2020 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Kubernetes-based Workload Allocation Optimizer for Minimizing Power Consumption of Computing System with Neural Network 基于kubernetes的神经网络计算系统功耗最小化的工作负载分配优化器
Ryuki Douhara, Ying-Feng Hsu, T. Yoshihisa, Kazuhiro Matsuda, Morito Matsuoka
Edge computing has been attracting attention due to the spread of the Internet of Things. For edge computing, containerized applications are deployed on multiple machines, and Kubernetes is an essential platform for container orchestration. In this paper, we introduce a Kubernetes based power consumption centric workload allocation optimizer (WAO), including scheduler and load balancer. By using WAO built with power consumption and response time models for actual edge computing system, 9.9% power consumption was reduced compared to original Kubernetes load balancer. This result indicates that the WAO developed in this study exhibits promising potential for task allocation modules as a micro service platform.
随着物联网的普及,边缘计算备受关注。对于边缘计算,容器化的应用程序部署在多台机器上,Kubernetes是容器编排的基本平台。本文介绍了一种基于Kubernetes的以功耗为中心的工作负载分配优化器(WAO),包括调度器和负载平衡器。通过在实际边缘计算系统中使用功耗和响应时间模型构建的WAO,与原始Kubernetes负载均衡器相比,功耗降低了9.9%。这一结果表明,本研究开发的WAO作为一个微服务平台,在任务分配模块方面具有很大的潜力。
{"title":"Kubernetes-based Workload Allocation Optimizer for Minimizing Power Consumption of Computing System with Neural Network","authors":"Ryuki Douhara, Ying-Feng Hsu, T. Yoshihisa, Kazuhiro Matsuda, Morito Matsuoka","doi":"10.1109/CSCI51800.2020.00238","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00238","url":null,"abstract":"Edge computing has been attracting attention due to the spread of the Internet of Things. For edge computing, containerized applications are deployed on multiple machines, and Kubernetes is an essential platform for container orchestration. In this paper, we introduce a Kubernetes based power consumption centric workload allocation optimizer (WAO), including scheduler and load balancer. By using WAO built with power consumption and response time models for actual edge computing system, 9.9% power consumption was reduced compared to original Kubernetes load balancer. This result indicates that the WAO developed in this study exhibits promising potential for task allocation modules as a micro service platform.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Low Cost LoRa-based IoT Big Data Capture and Analysis System for Indoor Air Quality Monitoring 基于lora的低成本物联网室内空气质量监测大数据采集与分析系统
Matthew Meli, E. Gatt, O. Casha, I. Grech, J. Micallef
This paper presents a low cost LoRa-based IoT big data capture and analysis system for indoor air quality monitoring. This system is presented as an alternative solution to expensive and bulky indoor air quality monitors. It enables multiple low cost nodes to be distributed within a building such that extensive location-based indoor air quality data is generated. This data is captured by a gateway and forwarded to a cloud-based LoRaWAN network which in turn publishes the received data via MQTT. A cloud-based data forwarding server is used to capture, format and store this big data on a cloud-based document-oriented database. Cloud-based services are used for data visualization and analysis. Periodic indoor air quality graphs along with air quality index and thermal comfort index heat maps are generated.
提出了一种低成本的基于lora的物联网大数据采集与分析系统,用于室内空气质量监测。该系统被提出作为昂贵和笨重的室内空气质量监测器的替代解决方案。它使多个低成本节点能够分布在建筑物内,从而生成广泛的基于位置的室内空气质量数据。该数据由网关捕获并转发到基于云的LoRaWAN网络,该网络随后通过MQTT发布接收到的数据。基于云的数据转发服务器用于捕获、格式化并将这些大数据存储在基于云的面向文档的数据库中。基于云的服务用于数据可视化和分析。定期生成室内空气质量图以及空气质量指数和热舒适指数热图。
{"title":"A Low Cost LoRa-based IoT Big Data Capture and Analysis System for Indoor Air Quality Monitoring","authors":"Matthew Meli, E. Gatt, O. Casha, I. Grech, J. Micallef","doi":"10.1109/CSCI51800.2020.00070","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00070","url":null,"abstract":"This paper presents a low cost LoRa-based IoT big data capture and analysis system for indoor air quality monitoring. This system is presented as an alternative solution to expensive and bulky indoor air quality monitors. It enables multiple low cost nodes to be distributed within a building such that extensive location-based indoor air quality data is generated. This data is captured by a gateway and forwarded to a cloud-based LoRaWAN network which in turn publishes the received data via MQTT. A cloud-based data forwarding server is used to capture, format and store this big data on a cloud-based document-oriented database. Cloud-based services are used for data visualization and analysis. Periodic indoor air quality graphs along with air quality index and thermal comfort index heat maps are generated.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering County-Wise COVID-19 Dynamics in North Carolina 北卡罗来纳州县级COVID-19动态聚集
M. Park, Seong‐Tae Kim
The COVID-19 pandemic has caused unprecedented impacts along with an enormous number of confirmed cases and deaths in the U.S. This study aims to identify hidden clusters among counties in North Carolina using the COVID-19 data. Since individual states implement their own policies to cope with the COVID-19 pandemic, our study is limited to a single state, North Carolina. We incorporated two clustering techniques, dynamic time warping and deep learning autoeconder. These clustering techniques identified similar upper-level hierarchical clusters separating three metropolitan areas and other regions with slightly different sub-clusters in the county-wise COVID-19 data. Our findings further understanding of county-wise COVID-19 dynamics and its implication.
新冠肺炎疫情在美国造成了前所未有的影响,大量确诊病例和死亡病例。该研究旨在利用新冠肺炎数据识别北卡罗来纳州各县之间隐藏的群集。由于各州实施自己的政策来应对COVID-19大流行,我们的研究仅限于北卡罗来纳州一个州。我们结合了两种聚类技术,动态时间翘曲和深度学习自动思考。这些聚类技术确定了类似的上层分层聚类,将三个大都市区和其他地区分开,在县级COVID-19数据中,这些地区的子聚类略有不同。我们的研究结果进一步了解了国家层面的COVID-19动态及其含义。
{"title":"Clustering County-Wise COVID-19 Dynamics in North Carolina","authors":"M. Park, Seong‐Tae Kim","doi":"10.1109/CSCI51800.2020.00157","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00157","url":null,"abstract":"The COVID-19 pandemic has caused unprecedented impacts along with an enormous number of confirmed cases and deaths in the U.S. This study aims to identify hidden clusters among counties in North Carolina using the COVID-19 data. Since individual states implement their own policies to cope with the COVID-19 pandemic, our study is limited to a single state, North Carolina. We incorporated two clustering techniques, dynamic time warping and deep learning autoeconder. These clustering techniques identified similar upper-level hierarchical clusters separating three metropolitan areas and other regions with slightly different sub-clusters in the county-wise COVID-19 data. Our findings further understanding of county-wise COVID-19 dynamics and its implication.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomalous Detection System in Crowded Environment using Deep Learning 基于深度学习的拥挤环境异常检测系统
D. Esan, P. Owolawi, Chuling Tu
In recent years, surveillance systems have become very important due to security concerns. These systems are widely used in many applications such as airports, railway stations, shopping malls, crowded sports arenas, military etc., [1]. The wide deployment of surveillance systems has made the detection of anomalous behavioral patterns in video streams to become increasingly important. An anomalous event can be considered as a deviation from the regular scene; however, the distribution of normal and anomalous events is severely imbalanced, since the anomalous behavior events do not frequently occur, hence it is imperative to accurately detect anomalous behavioral pattern from a normal pattern in a surveillance system. This paper proposes a Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) technique. The CNN is used to extract the features from the image frames and the LSTM is used as a mechanism for remembrance to make quick and accurate detection. Experiments are done on the University of California San Diego dataset using the proposed anomalous behavioral pattern detection system. Compared with other existing methods, experimental analysis demonstrates that CNN-LSTM technique has high accuracy with better parameters tuning. Different analyses were conducted using the publicly available dataset repository that has been used by many researchers in the field of computer vision in the detection of anomalous behavior. The results obtained show that CNN-LSTM outperforms the others with overall F1-score of 0.94; AUC of 0.891 and accuracy of 89%. This result shows that the deployment of the proposed technique in a surveillance detection system can assist the security personnel to detect an anomalous behavioral pattern in a crowded environment.
近年来,出于安全考虑,监控系统变得非常重要。这些系统广泛应用于机场、火车站、商场、人流密集的运动场、军事场所等。监控系统的广泛部署使得视频流中异常行为模式的检测变得越来越重要。异常事件可以被认为是对正常场景的偏离;然而,由于异常行为事件并不经常发生,正常和异常事件的分布严重不平衡,因此在监控系统中准确地从正常模式中检测出异常行为模式是势在必行的。本文提出了一种卷积神经网络与长短期记忆(CNN-LSTM)技术。利用CNN从图像帧中提取特征,利用LSTM作为记忆机制进行快速准确的检测。在加州大学圣地亚哥分校的数据集上,使用所提出的异常行为模式检测系统进行了实验。实验分析表明,CNN-LSTM技术具有较高的精度和较好的参数整定效果。使用公开可用的数据集存储库进行不同的分析,该存储库已被计算机视觉领域的许多研究人员用于检测异常行为。结果表明,CNN-LSTM的综合f1得分为0.94,优于其他算法;AUC为0.891,准确度为89%。结果表明,在监控检测系统中部署所提出的技术可以帮助安全人员在拥挤的环境中检测异常行为模式。
{"title":"Anomalous Detection System in Crowded Environment using Deep Learning","authors":"D. Esan, P. Owolawi, Chuling Tu","doi":"10.1109/CSCI51800.2020.00012","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00012","url":null,"abstract":"In recent years, surveillance systems have become very important due to security concerns. These systems are widely used in many applications such as airports, railway stations, shopping malls, crowded sports arenas, military etc., [1]. The wide deployment of surveillance systems has made the detection of anomalous behavioral patterns in video streams to become increasingly important. An anomalous event can be considered as a deviation from the regular scene; however, the distribution of normal and anomalous events is severely imbalanced, since the anomalous behavior events do not frequently occur, hence it is imperative to accurately detect anomalous behavioral pattern from a normal pattern in a surveillance system. This paper proposes a Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) technique. The CNN is used to extract the features from the image frames and the LSTM is used as a mechanism for remembrance to make quick and accurate detection. Experiments are done on the University of California San Diego dataset using the proposed anomalous behavioral pattern detection system. Compared with other existing methods, experimental analysis demonstrates that CNN-LSTM technique has high accuracy with better parameters tuning. Different analyses were conducted using the publicly available dataset repository that has been used by many researchers in the field of computer vision in the detection of anomalous behavior. The results obtained show that CNN-LSTM outperforms the others with overall F1-score of 0.94; AUC of 0.891 and accuracy of 89%. This result shows that the deployment of the proposed technique in a surveillance detection system can assist the security personnel to detect an anomalous behavioral pattern in a crowded environment.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"121 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recursive MaxSquare: Cache-friendly, Parallel, Scalable in situ Rectangular Matrix Transposition 递归MaxSquare:缓存友好,并行,可伸缩的原位矩形矩阵转置
Claudio A. Parra, Travis Yu, Kyu Seon Yum, Arturo Garza, I. Scherson
An in situ rectangular matrix transposition algorithm is presented based on recursively partitioning an original rectangular matrix into a maximum size square matrix and a remaining rectangular sub-matrix. To transpose the maximum size square sub-matrix, a novel cache-friendly, parallel (multithreaded) and scalable in-place square matrix transposition procedure is proposed: it requires a total of Θ(n2/2) simple memory swaps, a single element temporary storage per thread, and does not make use of complex index arithmetic in the main transposition loop. Recursion is used to transpose the remaining rectangular sub-matrix. Dubbed Recursive MaxSquare, the novel proposed rectangular matrix in-place transposition algorithm uses a generalization of the perfect shuffle/unshuffle data permutation to stitch together the recursively transposed square matrices. The shuffle/unshuffle permutations are shown to be efficiently decomposed using basic vector/segment swaps, exchanges and/or cyclic shifts (rotations). A balanced parallel cycles-based transposition is also proposed for comparison.
提出了一种基于将原始矩形矩阵递归划分为最大尺寸方阵和剩余矩形子矩阵的原位矩形矩阵转置算法。为了置换最大大小的方阵子矩阵,提出了一种新的缓存友好,并行(多线程)和可扩展的就地方阵置换过程:它需要总共Θ(n2/2)个简单的内存交换,每个线程一个元素临时存储,并且在主置换循环中不使用复杂的索引算法。递归用于对剩余的矩形子矩阵进行转置。被称为递归MaxSquare的新提出的矩形矩阵就地转置算法使用完美的洗牌/非洗牌数据排列的泛化来将递归转置的方阵拼接在一起。shuffle/unshuffle排列显示可以使用基本向量/段交换、交换和/或循环移位(旋转)有效地分解。为了进行比较,还提出了一种基于平衡并联周期的转置方法。
{"title":"Recursive MaxSquare: Cache-friendly, Parallel, Scalable in situ Rectangular Matrix Transposition","authors":"Claudio A. Parra, Travis Yu, Kyu Seon Yum, Arturo Garza, I. Scherson","doi":"10.1109/CSCI51800.2020.00228","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00228","url":null,"abstract":"An in situ rectangular matrix transposition algorithm is presented based on recursively partitioning an original rectangular matrix into a maximum size square matrix and a remaining rectangular sub-matrix. To transpose the maximum size square sub-matrix, a novel cache-friendly, parallel (multithreaded) and scalable in-place square matrix transposition procedure is proposed: it requires a total of Θ(n2/2) simple memory swaps, a single element temporary storage per thread, and does not make use of complex index arithmetic in the main transposition loop. Recursion is used to transpose the remaining rectangular sub-matrix. Dubbed Recursive MaxSquare, the novel proposed rectangular matrix in-place transposition algorithm uses a generalization of the perfect shuffle/unshuffle data permutation to stitch together the recursively transposed square matrices. The shuffle/unshuffle permutations are shown to be efficiently decomposed using basic vector/segment swaps, exchanges and/or cyclic shifts (rotations). A balanced parallel cycles-based transposition is also proposed for comparison.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"18 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG Signal Analysis for Patient with Metabolic Syndrome based on 1D-Convolution Neural Network 基于一维卷积神经网络的代谢综合征心电信号分析
Chhayly Lim, Jung-Yeon Kim, Yunyoung Nam
Metabolic syndrome (MetS) is a cluster of metabolic disorders associated with medical conditions: abdominal obesity, high blood pressure, insulin resistance, etc. People with MetS have a higher risk of cardiovascular diseases and type 2 diabetes mellitus. Hence, early detection of MetS can be useful in the field of healthcare. In this paper, we propose a 1D-Convolution Neural Network (1D-CNN) model for classifying the electrocardiogram (ECG) signals of the GBBANet online database into two classes: a group of people with the medical condition (MetS [n=15]) and a control group (CG [n=10]). The dataset consists of 5 ECG recordings per person. The proposed 1D-CNN model has achieved an overall accuracy of 88.32%.
代谢综合征(MetS)是一组与腹部肥胖、高血压、胰岛素抵抗等疾病相关的代谢紊乱。患有MetS的人患心血管疾病和2型糖尿病的风险更高。因此,MetS的早期检测在医疗保健领域是有用的。在本文中,我们提出了一种1d -卷积神经网络(1D-CNN)模型,用于将GBBANet在线数据库的心电图(ECG)信号分为两类:一类是有医疗状况的人群(MetS [n=15]),另一类是对照组(CG [n=10])。该数据集由每人5次心电图记录组成。本文提出的1D-CNN模型总体准确率达到了88.32%。
{"title":"ECG Signal Analysis for Patient with Metabolic Syndrome based on 1D-Convolution Neural Network","authors":"Chhayly Lim, Jung-Yeon Kim, Yunyoung Nam","doi":"10.1109/CSCI51800.2020.00134","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00134","url":null,"abstract":"Metabolic syndrome (MetS) is a cluster of metabolic disorders associated with medical conditions: abdominal obesity, high blood pressure, insulin resistance, etc. People with MetS have a higher risk of cardiovascular diseases and type 2 diabetes mellitus. Hence, early detection of MetS can be useful in the field of healthcare. In this paper, we propose a 1D-Convolution Neural Network (1D-CNN) model for classifying the electrocardiogram (ECG) signals of the GBBANet online database into two classes: a group of people with the medical condition (MetS [n=15]) and a control group (CG [n=10]). The dataset consists of 5 ECG recordings per person. The proposed 1D-CNN model has achieved an overall accuracy of 88.32%.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying an Energy-Aware Security Mechanism in Healthcare Internet of Things 能源感知安全机制在医疗物联网中的应用
M. Tavakolan, Ismaeel A. Faridi
The security risks associated with healthcare Internet of things (HIoT) devices and medical devices includes patient privacy, data confidentiality, and data security. Insecure medical devices allow hackers to infiltrate systems and control medical devices to potentially harm patients and hospitals. HIoT devices have computational and memory limitations, energy limitations, mobility and scalability limitations. Therefore, securing HIoT devices is immensely aggravated due to their resource constrained. Finding a security solution that minimizes resource consumption and thus maximizes security performance is a challenging task in HIoT. This paper proposes adaptive security mechanism that is considering energy level of HIoT devices. This energy-efficient security mechanism considers the residual energy to apply security mechanism and improve lifetime of HIoT devices.
医疗物联网(HIoT)设备和医疗设备相关的安全风险包括患者隐私、数据机密性和数据安全性。不安全的医疗设备允许黑客渗透系统并控制医疗设备,从而潜在地伤害患者和医院。HIoT设备具有计算和内存限制、能量限制、移动性和可扩展性限制。因此,由于HIoT设备的资源限制,保护HIoT设备的问题大大加剧了。在HIoT中,寻找最小化资源消耗从而最大化安全性能的安全解决方案是一项具有挑战性的任务。本文提出了一种考虑HIoT设备能量等级的自适应安全机制。这种节能的安全机制考虑了剩余能量来应用安全机制,提高了HIoT设备的使用寿命。
{"title":"Applying an Energy-Aware Security Mechanism in Healthcare Internet of Things","authors":"M. Tavakolan, Ismaeel A. Faridi","doi":"10.1109/CSCI51800.2020.00192","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00192","url":null,"abstract":"The security risks associated with healthcare Internet of things (HIoT) devices and medical devices includes patient privacy, data confidentiality, and data security. Insecure medical devices allow hackers to infiltrate systems and control medical devices to potentially harm patients and hospitals. HIoT devices have computational and memory limitations, energy limitations, mobility and scalability limitations. Therefore, securing HIoT devices is immensely aggravated due to their resource constrained. Finding a security solution that minimizes resource consumption and thus maximizes security performance is a challenging task in HIoT. This paper proposes adaptive security mechanism that is considering energy level of HIoT devices. This energy-efficient security mechanism considers the residual energy to apply security mechanism and improve lifetime of HIoT devices.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124902846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Flow Control to Secure Data in the Cloud 信息流控制以保护云中的数据
F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon
Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.
对于考虑使用云服务来存储其机密的业务关键型数据的组织来说,数据安全仍然是一个主要问题。在本文中,我们研究了如何在云中使用信息流控制来增强企业的信心,从而使他们能够安全可靠地采用云解决方案来满足他们的数据存储需求。我们将讨论如何将不同的技术与CloudMonitor工具一起使用,以确保云中的数据得到保护。然后,我们概述了集中式和分散式信息流控制系统是如何运作的,以及每种方法的比较优势和劣势。我们的分析表明,CloudMonitor可以通过使用分散的信息流控制来实现更好的数据安全性。然后,我们讨论了应用于监控云中的数据的不同分散信息流跟踪工具。CloudMonitor使云服务的消费者和提供商能够就可接受的安全策略及其实现达成一致,以确保云中的数据存储安全。
{"title":"Information Flow Control to Secure Data in the Cloud","authors":"F. Alqahtani, Salahaldeen Duraibi, Predrag T. Tosic, Frederick T. Sheldon","doi":"10.1109/CSCI51800.2020.00241","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00241","url":null,"abstract":"Data security remains a major concern for organizations considering the use of cloud services to store their confidential, business-critical data. In this paper, we investigate how information flow control can be used in the cloud to enhance the confidence of enterprises, so they can safely and securely adopt cloud solutions for their data storage needs. We discuss how different techniques can be used with the CloudMonitor tool to guarantee the protection of data in the cloud. We then give an overview of how centralized and decentralized information flow control systems operate, and the comparative advantages and disadvantages of each approach. Our analysis suggests that CloudMonitor can achieve better data security with the use of decentralized information flow control. We then discuss different decentralized information flow tracking tools applied to monitoring data in the cloud. CloudMonitor enables the consumers and the providers of cloud services to agree on acceptable security policies as well as their implementation, to ensure secure data storage in the cloud.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry 基于三维随机几何的物联网物理层安全性性能分析
H. Chamkhia, A. Al-Ali, Amr M. Mohamed, M. Guizani, A. Erbad, A. Refaey
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day’s life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy aspects are mostly ignored in the initial system design. One of the proposed solutions to address the security threats from the physical layer perspective is physical-layer security (PLS). We propose the use of 3-D stochastic geometry to accurately model IoT systems in a realistic scenarios, where sensors, access points, and eavesdroppers are randomly located in a 3-D space. We use our model with realistic system deployment parameters to conduct rigorous performance analysis for critical security metrics, such as the successful transmission probability (STP) and the secrecy outage probability (SOP) in different potential IoT scenarios. We finally utilize simulation to validate the theoretical analysis.
物联网(IoT)正在成为支持日常生活中各种服务的基础设施的一部分。由于具有异构设备的物联网系统的复杂性,在最初的系统设计中往往忽略了所需的安全和隐私方面。从物理层的角度解决安全威胁的建议解决方案之一是物理层安全(PLS)。我们建议在现实场景中使用三维随机几何来精确建模物联网系统,其中传感器,接入点和窃听器随机位于三维空间中。我们使用具有现实系统部署参数的模型对关键安全指标进行严格的性能分析,例如不同潜在物联网场景中的成功传输概率(STP)和保密中断概率(SOP)。最后通过仿真验证了理论分析的正确性。
{"title":"Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry","authors":"H. Chamkhia, A. Al-Ali, Amr M. Mohamed, M. Guizani, A. Erbad, A. Refaey","doi":"10.1109/CSCI51800.2020.00191","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00191","url":null,"abstract":"The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day’s life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy aspects are mostly ignored in the initial system design. One of the proposed solutions to address the security threats from the physical layer perspective is physical-layer security (PLS). We propose the use of 3-D stochastic geometry to accurately model IoT systems in a realistic scenarios, where sensors, access points, and eavesdroppers are randomly located in a 3-D space. We use our model with realistic system deployment parameters to conduct rigorous performance analysis for critical security metrics, such as the successful transmission probability (STP) and the secrecy outage probability (SOP) in different potential IoT scenarios. We finally utilize simulation to validate the theoretical analysis.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Three Dimensional Regions with Stereo Vision 用立体视觉保护三维区域
Leonard D. Litvak, L. Deligiannidis
Although there exist many different solutions for securing volumes of space with various kinds of security cameras such as conventional monocular or thermal cameras, using stereo vision has not been attempted as an alternative method. By combining motion detection via image subtraction and range-finding via stereoscopic vision, a single stereo camera can secure a large three-dimensional volume within its field of view. With this, many individual areas can be secured by a single stereo camera placed further away that would otherwise have to be secured by many conventional or thermal cameras placed near areas of interest. Our solution works well for depth-ranges of up to 20 feet. At ranges beyond 20 feet, the disparity map becomes too noisy. Within the 20 feet range, the depth detection is highly accurate with only 0.18% error.
虽然有许多不同的解决方案来保护空间的各种安全摄像机,如传统的单目或热摄像机,使用立体视觉还没有尝试作为一种替代方法。通过结合图像减法的运动检测和立体视觉的测距,单个立体相机可以在其视野内确保大的三维体积。有了它,许多单独的区域可以通过放置在更远的地方的单个立体摄像机来保护,否则必须由放置在感兴趣区域附近的许多传统或热成像摄像机来保护。我们的解决方案在20英尺的深度范围内效果很好。当距离超过20英尺时,视差图就变得太吵了。在20英尺范围内,深度探测精度很高,误差仅为0.18%。
{"title":"Securing Three Dimensional Regions with Stereo Vision","authors":"Leonard D. Litvak, L. Deligiannidis","doi":"10.1109/CSCI51800.2020.00297","DOIUrl":"https://doi.org/10.1109/CSCI51800.2020.00297","url":null,"abstract":"Although there exist many different solutions for securing volumes of space with various kinds of security cameras such as conventional monocular or thermal cameras, using stereo vision has not been attempted as an alternative method. By combining motion detection via image subtraction and range-finding via stereoscopic vision, a single stereo camera can secure a large three-dimensional volume within its field of view. With this, many individual areas can be secured by a single stereo camera placed further away that would otherwise have to be secured by many conventional or thermal cameras placed near areas of interest. Our solution works well for depth-ranges of up to 20 feet. At ranges beyond 20 feet, the disparity map becomes too noisy. Within the 20 feet range, the depth detection is highly accurate with only 0.18% error.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122931617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1