首页 > 最新文献

2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints 具有资源约束的传感系统多媒体大数据安全多级智能选择加密控制模型
Chen Xiao, Lifeng Wang, Zhu Jie, Tiemeng Chen
The multimedia big data in multimedia sensing and other IoT (Internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned limited resources. Hence, the confidentiality of multimedia big data under resources constraints is investigated in this paper. Firstly, the growth trend of data volume compared with computational resources is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a series of intelligent selective encryption control models are proposed. Fourthly, the performance of proposed schemes is evaluated by experimental analyses and proves that schemes are effective enough to support real-time encryption of multimedia big data. Additionally, in the age of big data and cloud computing, the aforementioned analysis method can also be applied to other systems with limited resources.
多媒体传感等物联网系统中的多媒体大数据具有大容量、实时性、动态性和异构性。这些特点给数据安全带来了新的挑战。当一些物联网节点的计算和电力资源非常稀缺时,多媒体数据的复杂数据安全处理受到上述有限资源的制约,这些挑战变得更加严重。因此,本文研究了资源约束下多媒体大数据的保密性问题。首先,讨论了数据量相对于计算资源的增长趋势,提出了多媒体数据加密优化的分析模型。其次,介绍了一种通用的轻量级速度可调视频加密方案。第三,提出了一系列智能选择性加密控制模型。第四,通过实验分析对所提方案的性能进行了评价,证明了所提方案的有效性足以支持多媒体大数据的实时加密。此外,在大数据和云计算时代,上述分析方法也可以应用于其他资源有限的系统。
{"title":"A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints","authors":"Chen Xiao, Lifeng Wang, Zhu Jie, Tiemeng Chen","doi":"10.1109/CSCloud.2016.37","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.37","url":null,"abstract":"The multimedia big data in multimedia sensing and other IoT (Internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned limited resources. Hence, the confidentiality of multimedia big data under resources constraints is investigated in this paper. Firstly, the growth trend of data volume compared with computational resources is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a series of intelligent selective encryption control models are proposed. Fourthly, the performance of proposed schemes is evaluated by experimental analyses and proves that schemes are effective enough to support real-time encryption of multimedia big data. Additionally, in the age of big data and cloud computing, the aforementioned analysis method can also be applied to other systems with limited resources.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127070000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Consolidation Strategy Supporting Resources Oversubscription in Cloud Computing 支持云计算中资源超额订阅的整合策略
Y. Liu
Consolidation is an approach that optimizes the utilization of the computing resources. Many datacenter virtualization solutions employ it to reduce the number of physical machines (PMs), and thus save money on hardware, cooling, and electricity. Resources oversubscription, as an effective resource management policy is used to free idle resource in cloud. More virtual machines (VMs) can host in the same PM. However, the limited underlying resource (such as last level cache or I/O bandwidth) provided by PM cannot support much more VMs. The performance of VMs may not be guaranteed due to the underlying resources starvation. Meanwhile, the oversubscription strategy is failure for some VMs when they are migrated to a new PM according to consolidation strategy. In this paper, we present a performance-aware consolidation strategy targeting the oversubscribed cloud. It constructs a performance alarm and the corresponding threshold to control the density of consolidation and maintain the performance isolation among the co-hosting VMs. It also finds the appropriate combination of VMs hosting in the same PM to better support oversubscription. We performed our evaluation on a virtual datacenter simulated by Xen. Our evaluation results show that performance alarm effectively stop the performance isolation destroyed. Furthermore, the policy of VM placement reduces the number of used PMs and also protects maximum oversubscription for each VM.
整合是一种优化计算资源利用的方法。许多数据中心虚拟化解决方案都使用它来减少物理机器(pm)的数量,从而节省硬件、冷却和电力方面的费用。资源超订阅是一种有效的资源管理策略,用于释放云中的闲置资源。同一个PM中可以容纳更多的虚拟机。但是,PM提供的有限的底层资源(如最后一级缓存或I/O带宽)无法支持更多的vm。由于底层资源不足,虚拟机的性能可能无法得到保证。同时,根据整合策略将一些vm迁移到新的PM时,过度订阅策略会失败。在本文中,我们提出了一种针对超额订阅云的性能感知整合策略。通过构建性能告警和相应的阈值来控制整合密度,保持协同托管虚拟机之间的性能隔离。它还发现在同一个PM中托管的vm的适当组合,以更好地支持超额订阅。我们在Xen模拟的虚拟数据中心上执行了我们的评估。我们的评估结果表明,性能报警有效地阻止了性能隔离的破坏。此外,虚拟机放置策略减少了已使用的pm数量,并保护每个虚拟机的最大超额订阅。
{"title":"A Consolidation Strategy Supporting Resources Oversubscription in Cloud Computing","authors":"Y. Liu","doi":"10.1109/CSCloud.2016.21","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.21","url":null,"abstract":"Consolidation is an approach that optimizes the utilization of the computing resources. Many datacenter virtualization solutions employ it to reduce the number of physical machines (PMs), and thus save money on hardware, cooling, and electricity. Resources oversubscription, as an effective resource management policy is used to free idle resource in cloud. More virtual machines (VMs) can host in the same PM. However, the limited underlying resource (such as last level cache or I/O bandwidth) provided by PM cannot support much more VMs. The performance of VMs may not be guaranteed due to the underlying resources starvation. Meanwhile, the oversubscription strategy is failure for some VMs when they are migrated to a new PM according to consolidation strategy. In this paper, we present a performance-aware consolidation strategy targeting the oversubscribed cloud. It constructs a performance alarm and the corresponding threshold to control the density of consolidation and maintain the performance isolation among the co-hosting VMs. It also finds the appropriate combination of VMs hosting in the same PM to better support oversubscription. We performed our evaluation on a virtual datacenter simulated by Xen. Our evaluation results show that performance alarm effectively stop the performance isolation destroyed. Furthermore, the policy of VM placement reduces the number of used PMs and also protects maximum oversubscription for each VM.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing 云计算中大数据的隐私感知自适应数据加密策略
Keke Gai, Meikang Qiu, Hui Zhao, Jian Xiong
Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.
随着大数据在云计算中的应用迅速发展,隐私问题已经成为一个相当大的问题。实现这些新兴技术的好处是改进或改变了服务模型,并从多个角度提高了应用程序的性能。然而,数据量的显著增长也在实践中带来了许多挑战。加密数据的执行时间是数据处理和传输过程中的重要问题之一。许多当前的应用程序为了达到可采用的性能水平而放弃了数据加密,同时也考虑到了隐私问题。本文主要针对隐私问题,提出了一种新的数据加密方法——动态数据加密策略(D2ES)。我们提出的方法旨在在时间约束下使用隐私分类方法选择性地加密数据。该方法旨在通过在所需的执行时间要求内使用选择性加密策略来最大化隐私保护范围。我们的实验对D2ES的性能进行了评估,为隐私增强提供了证据。
{"title":"Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing","authors":"Keke Gai, Meikang Qiu, Hui Zhao, Jian Xiong","doi":"10.1109/CSCloud.2016.52","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.52","url":null,"abstract":"Privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. The benefits us implementing these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The time execution of encrypting data is one of the serious issues during the processes of data processing and transmissions. Many current applications abandon data encryptions in order to reach an adoptive performance level, companions with privacy concerns. In this paper, we concentrate on privacy issue and propose a novel data encryption approach, named as Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data using privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements. The performance of D2ES has been evaluated in our experiments, which provides the proof of the privacy enhancement.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
SensIaas: A Sensor-Cloud Infrastructure with Sensor Virtualization senaas:具有传感器虚拟化的传感器云基础设施
Sunanda Bose, N. Mukherjee
In this paper, we propose a sensor-cloud environment which incorporates remotely located physical sensor devices in the generic resource family along with other resources like CPU, memory etc. The environment enables ubiquitous and on-demand access to virtual sensors which are abstractions of physical devices with enhanced capabilities. An architecture of the sensor-cloud environment is discussed in this paper that spans multiple infrastructures hosting local and remote resources. Responsibilities of each of the components in the sensor-cloud architecture are defined and algorithms for provisioning these components are discussed along with some proposed enhancements with respect to our earlier work. As forwarding data traffic is an important task, a high performance I/O redirection algorithm is also proposed to deliver sensed traffic to multiple instances of virtual sensors that is accumulated from one or multiple physical sensors. Performance of the I/O redirection algorithm is observed and the experimental results are presented in this paper.
在本文中,我们提出了一种传感器云环境,该环境结合了通用资源族中的远程物理传感器设备以及CPU,内存等其他资源。该环境支持无处不在的按需访问虚拟传感器,虚拟传感器是物理设备的抽象,具有增强的功能。本文讨论了一种传感器云环境的体系结构,它跨越多个托管本地和远程资源的基础设施。定义了传感器云架构中每个组件的职责,并讨论了提供这些组件的算法,以及针对我们早期工作提出的一些增强功能。由于数据流量转发是一项重要任务,本文还提出了一种高性能的I/O重定向算法,将感知到的流量从一个或多个物理传感器积累到虚拟传感器的多个实例中。本文观察了I/O重定向算法的性能,并给出了实验结果。
{"title":"SensIaas: A Sensor-Cloud Infrastructure with Sensor Virtualization","authors":"Sunanda Bose, N. Mukherjee","doi":"10.1109/CSCloud.2016.28","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.28","url":null,"abstract":"In this paper, we propose a sensor-cloud environment which incorporates remotely located physical sensor devices in the generic resource family along with other resources like CPU, memory etc. The environment enables ubiquitous and on-demand access to virtual sensors which are abstractions of physical devices with enhanced capabilities. An architecture of the sensor-cloud environment is discussed in this paper that spans multiple infrastructures hosting local and remote resources. Responsibilities of each of the components in the sensor-cloud architecture are defined and algorithms for provisioning these components are discussed along with some proposed enhancements with respect to our earlier work. As forwarding data traffic is an important task, a high performance I/O redirection algorithm is also proposed to deliver sensed traffic to multiple instances of virtual sensors that is accumulated from one or multiple physical sensors. Performance of the I/O redirection algorithm is observed and the experimental results are presented in this paper.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129620034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry 基于本体知识表示的金融网络安全保险网络事件分类
S. Elnagdy, Meikang Qiu, Keke Gai
As a recent emerging industry, cybersecurity insurance has been growing ambitiously fast, which mainly serves the financial industry and assists financial firms to reduce cybersecurity risks. Understanding the risk classification is an important hemisphere for operating cybersecurity insurance. However, the classification representation will be complicated when the service system becomes large. Improper presentation of the risks can result in financial loss or operational mistakes. This paper addresses this concern and proposes an approach using ontology-based knowledge representation for cybersecurity insurance. The approach is named as Semantic Cyber Incident Classification (SCIC) model, which uses knowledge representation deriving from semantic techniques. Our approach is specifically designed for targeting at cybersecurity insurance domain, which has been assessed by our experiments.
网络安全保险作为一个新兴行业,发展迅猛,主要服务于金融行业,帮助金融企业降低网络安全风险。了解风险分类是运营网络安全保险的一个重要方面。然而,当服务系统规模变大时,分类表示将变得复杂。风险表述不当可能导致财务损失或操作失误。本文解决了这一问题,并提出了一种基于本体的网络安全保险知识表示方法。该方法采用语义技术衍生的知识表示,称为语义网络事件分类(SCIC)模型。我们的方法是专门针对网络安全保险领域设计的,这已经通过我们的实验进行了评估。
{"title":"Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry","authors":"S. Elnagdy, Meikang Qiu, Keke Gai","doi":"10.1109/CSCloud.2016.45","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.45","url":null,"abstract":"As a recent emerging industry, cybersecurity insurance has been growing ambitiously fast, which mainly serves the financial industry and assists financial firms to reduce cybersecurity risks. Understanding the risk classification is an important hemisphere for operating cybersecurity insurance. However, the classification representation will be complicated when the service system becomes large. Improper presentation of the risks can result in financial loss or operational mistakes. This paper addresses this concern and proposes an approach using ontology-based knowledge representation for cybersecurity insurance. The approach is named as Semantic Cyber Incident Classification (SCIC) model, which uses knowledge representation deriving from semantic techniques. Our approach is specifically designed for targeting at cybersecurity insurance domain, which has been assessed by our experiments.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128126489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing 云计算环境下金融业网络安全保险的网络风险分类理解
S. Elnagdy, Meikang Qiu, Keke Gai
The dramatical development of Web-based technology has been empowering enormous change in various domains. Cloud-based solutions have remarkably widened business models with multiple value creation channels. The financial industry is a major beneficiary of leveraging these emerging new technologies, such as big data and cloud-related services. This great changing trend has also led to a great concern in cybersecurity. Under this background, cybersecurity insurance is a growing domain in the financial industry. However, cybersecurity insurance industry also encounters a variety of cyber concerns while the Web-based approaches are applied. This paper focuses on this issue and review a broad scope of materials to gain a deep understanding of taxonomy of cyber security risks for cybersecurity insurance. The findings of this work can guide the cybersecurity insurance practitioners to avoid as much risk as possible as well as create potential solutions to the possible risks.
基于web的技术的迅猛发展已经给各个领域带来了巨大的变化。云解决方案显著拓宽了商业模式,创造了多种价值渠道。金融行业是利用这些新兴技术(如大数据和云相关服务)的主要受益者。这种巨大的变化趋势也引起了人们对网络安全的高度关注。在这样的背景下,网络安全保险在金融行业是一个不断发展的领域。然而,网络安全保险行业在应用基于web的方法的同时,也遇到了各种各样的网络问题。本文将重点关注这一问题,并回顾了广泛的材料,以深入了解网络安全保险的网络安全风险分类。本研究结果可以指导网络安全保险从业者尽可能多地规避风险,并为可能存在的风险创造潜在的解决方案。
{"title":"Understanding Taxonomy of Cyber Risks for Cybersecurity Insurance of Financial Industry in Cloud Computing","authors":"S. Elnagdy, Meikang Qiu, Keke Gai","doi":"10.1109/CSCloud.2016.46","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.46","url":null,"abstract":"The dramatical development of Web-based technology has been empowering enormous change in various domains. Cloud-based solutions have remarkably widened business models with multiple value creation channels. The financial industry is a major beneficiary of leveraging these emerging new technologies, such as big data and cloud-related services. This great changing trend has also led to a great concern in cybersecurity. Under this background, cybersecurity insurance is a growing domain in the financial industry. However, cybersecurity insurance industry also encounters a variety of cyber concerns while the Web-based approaches are applied. This paper focuses on this issue and review a broad scope of materials to gain a deep understanding of taxonomy of cyber security risks for cybersecurity insurance. The findings of this work can guide the cybersecurity insurance practitioners to avoid as much risk as possible as well as create potential solutions to the possible risks.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing Environment 云计算环境下CPU密集型应用的资源优化策略
Jun-jie Peng, Jinbao Chen, Shuai Kong, Danxu Liu, Meikang Qiu
Traditionally resource utilization on physical servers in cloud data center is uncertain. On one hand, resources will be wasted if the assignment of tasks are not enough. On the other hand it will cause overload if the assignment of tasks are too much. This is especially obvious when the applications are the same type. To solve this issue and considering CPU intensive application is one of the most common type of application in cloud, we have studied the optimization strategy for this kind of applications on the same server. According to resource preferences of different types of applications, we analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can make a prediction of execution time for this case. Extensive experiments show that the model is suitable for CPU intensive applications, and it can accurately predict their execution time. In order to improve the execution efficiency of applications, we propose a scheduling model for CPU intensive applications. Experiments show that the scheduling model can improve the execution efficiency of applications effectively and optimize the resource utilization.
传统上,云数据中心物理服务器上的资源利用率是不确定的。一方面,如果任务分配不够,资源将被浪费。另一方面,如果任务分配太多,则会导致过载。当应用程序是同一类型时,这一点尤其明显。为了解决这个问题,并考虑到CPU密集型应用程序是云计算中最常见的应用程序类型之一,我们研究了同一服务器上这类应用程序的优化策略。根据不同类型应用程序的资源偏好,分析了多个CPU密集型应用程序同时运行的情况,并提出了一个可以预测这种情况下执行时间的模型。大量的实验表明,该模型适用于CPU密集型应用程序,可以准确地预测其执行时间。为了提高应用程序的执行效率,提出了一种CPU密集型应用程序的调度模型。实验表明,该调度模型能有效提高应用程序的执行效率,优化资源利用率。
{"title":"Resource Optimization Strategy for CPU Intensive Applications in Cloud Computing Environment","authors":"Jun-jie Peng, Jinbao Chen, Shuai Kong, Danxu Liu, Meikang Qiu","doi":"10.1109/CSCloud.2016.29","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.29","url":null,"abstract":"Traditionally resource utilization on physical servers in cloud data center is uncertain. On one hand, resources will be wasted if the assignment of tasks are not enough. On the other hand it will cause overload if the assignment of tasks are too much. This is especially obvious when the applications are the same type. To solve this issue and considering CPU intensive application is one of the most common type of application in cloud, we have studied the optimization strategy for this kind of applications on the same server. According to resource preferences of different types of applications, we analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can make a prediction of execution time for this case. Extensive experiments show that the model is suitable for CPU intensive applications, and it can accurately predict their execution time. In order to improve the execution efficiency of applications, we propose a scheduling model for CPU intensive applications. Experiments show that the scheduling model can improve the execution efficiency of applications effectively and optimize the resource utilization.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors Environments 在室内环境中使用Wi-Fi保护被盗移动设备的通用算法
Wei Ding, Jose Arriaga
A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This paradigm concentrates primarily on safeguarding the security and privacy of individual users. An extra security layer, which is similar to the protection offered by biometrics techniques, is added. With this augmented defense, the user can considerably enhance both confidentiality and integrity of her information on the mobile device. At minimum the permanent deletion should thwart illegal access. More effective protections can also be implemented as similar ease. Furthermore, easy to use algorithms have been created to simplify and streamline the pattern generation and selection procedures of traditional general system problem solving framework. Experiments on Android smartphone have proved effectiveness and efficiency of this paradigm.
提出了一种新的智能手机物理捕获攻击检测范式。该范式利用接收信号强度指标和一般系统问题求解框架,识别手机用户的室内运动模式。大多数现有的检测物理捕获攻击的方法侧重于保护网络而不是设备。这种模式主要集中于保护个人用户的安全和隐私。增加了一个额外的安全层,类似于生物识别技术提供的保护。有了这种增强的防御,用户可以大大提高其移动设备上信息的保密性和完整性。至少永久删除应该能阻止非法访问。更有效的保护措施也可以同样容易地实施。此外,还创建了易于使用的算法,以简化和精简传统的通用系统问题求解框架的模式生成和选择过程。在Android智能手机上的实验证明了这种模式的有效性和效率。
{"title":"A Universal Algorithm to Secure Stolen Mobile Devices Using Wi-Fi in Indoors Environments","authors":"Wei Ding, Jose Arriaga","doi":"10.1109/CSCloud.2016.54","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.54","url":null,"abstract":"A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This paradigm concentrates primarily on safeguarding the security and privacy of individual users. An extra security layer, which is similar to the protection offered by biometrics techniques, is added. With this augmented defense, the user can considerably enhance both confidentiality and integrity of her information on the mobile device. At minimum the permanent deletion should thwart illegal access. More effective protections can also be implemented as similar ease. Furthermore, easy to use algorithms have been created to simplify and streamline the pattern generation and selection procedures of traditional general system problem solving framework. Experiments on Android smartphone have proved effectiveness and efficiency of this paradigm.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116147820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks IEEE802.15.4e网络时间同步的安全漏洞及对策
Wei Yang, Qin Wang, Yadong Wan, Jie He
Time synchronization is very important in the IEEE802.15.4e network which aim to industrial automation applications. It enabled high end-to-end reliability and low power wireless networking. If an adversary launches time synchronization attacks to the IEEE802.15.4e networks, the whole network communications will be paralyzed. In this paper, we present two types of attacks: 1) ASN and 2) time synchronization tree attack. In ASN attack the legitimate nodes may get an incorrect ASN value and thus can't synchronize to the normal network, while in time synchronization tree attack, the attacker can damage the structure of time synchronization tree by faking DIO packets. We propose some countermeasures which include intrusion detection algorithms, Encryption and Authentication methods to defend against these attacks. Finally, we perform time synchronization tree attack experiments. The experiment results show that the proposed mechanisms can defend against the attack.
在针对工业自动化应用的IEEE802.15.4e网络中,时间同步是非常重要的。它支持高端到端可靠性和低功耗无线网络。如果攻击者对IEEE802.15.4e网络进行时间同步攻击,将导致整个网络的通信瘫痪。本文提出了两种类型的攻击:1)ASN和2)时间同步树攻击。在ASN攻击中,合法节点可能会得到错误的ASN值,从而无法同步到正常网络,而在时间同步树攻击中,攻击者可以通过伪造DIO报文破坏时间同步树的结构。针对这些攻击,我们提出了入侵检测算法、加密和认证方法等防御措施。最后,我们进行了时间同步树攻击实验。实验结果表明,所提出的机制能够有效防御攻击。
{"title":"Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks","authors":"Wei Yang, Qin Wang, Yadong Wan, Jie He","doi":"10.1109/CSCloud.2016.44","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.44","url":null,"abstract":"Time synchronization is very important in the IEEE802.15.4e network which aim to industrial automation applications. It enabled high end-to-end reliability and low power wireless networking. If an adversary launches time synchronization attacks to the IEEE802.15.4e networks, the whole network communications will be paralyzed. In this paper, we present two types of attacks: 1) ASN and 2) time synchronization tree attack. In ASN attack the legitimate nodes may get an incorrect ASN value and thus can't synchronize to the normal network, while in time synchronization tree attack, the attacker can damage the structure of time synchronization tree by faking DIO packets. We propose some countermeasures which include intrusion detection algorithms, Encryption and Authentication methods to defend against these attacks. Finally, we perform time synchronization tree attack experiments. The experiment results show that the proposed mechanisms can defend against the attack.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128682198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Survey on Data Integrity in Cloud 云中的数据完整性调查
K. N. Sevis, Ensar Seker
In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages, on the other hand, nothing interesting is ever completely one-sided. Security and integrity of the data which is stored in untrustworthy server is critically important and raises concerns about it. The data can be modified, removed, corrupted or even stolen since it is in the remote server. These kinds of malicious activities can be done either by untrusted server or unauthorized user(s). Therefore, various integrity checking methods have been offered for cloud computing systems. This survey aims to analyze and compare different researches about data integrity proofs for these systems.
近年来,云计算越来越受到人们的关注。在外包硬件和软件资源的同时,仍然能够远程管理它们,并具有高计算能力、竞争力、成本效率、可伸缩性、灵活性、可访问性和可用性等优势,这是革命性的。另一方面,尽管有趣的事情有很多优点,但没有什么是完全片面的。存储在不可信服务器上的数据的安全性和完整性至关重要,并引起了人们的关注。数据可以被修改、删除、损坏甚至被盗,因为它在远程服务器上。这些类型的恶意活动可以由不受信任的服务器或未经授权的用户完成。因此,为云计算系统提供了各种完整性检查方法。本调查旨在分析和比较这些系统的数据完整性证明的不同研究。
{"title":"Survey on Data Integrity in Cloud","authors":"K. N. Sevis, Ensar Seker","doi":"10.1109/CSCloud.2016.35","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.35","url":null,"abstract":"In recent years cloud computing is getting more and more attention every day. While outsourcing the hardware and software resources, still being able to manage them remotely with benefits like high computing power, competitiveness, cost efficiency, scalability, flexibility, accessibility and availability are revolutionary. For all of its advantages, on the other hand, nothing interesting is ever completely one-sided. Security and integrity of the data which is stored in untrustworthy server is critically important and raises concerns about it. The data can be modified, removed, corrupted or even stolen since it is in the remote server. These kinds of malicious activities can be done either by untrusted server or unauthorized user(s). Therefore, various integrity checking methods have been offered for cloud computing systems. This survey aims to analyze and compare different researches about data integrity proofs for these systems.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133977027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1