首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
A Framework for Securing EHR Management in the Era of Internet of Things 物联网时代电子病历管理安全框架
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096788
Waad Y. Bin Saleem, Hanan Ali, Nouf AlSalloom
Nowadays the internet of things (IoT) is one of the most arising obvious technologies which plays an important role in healthcare systems. Healthcare systems including stored Electronic healthcare records (EHR), which are vulnerable to intentional and unintentional security threats. therefore; the need for strong EHR security protection is essential. In this paper we display and analyze some of the proposed IoT-based security solutions for healthcare, and also outline a new platform that secures and enhances the process of accessing and managing EHR in hospitals databases.
如今,物联网(IoT)是最新兴的明显技术之一,在医疗保健系统中发挥着重要作用。医疗保健系统,包括存储的电子医疗记录(EHR),容易受到有意和无意的安全威胁。因此;需要强有力的电子病历安全保护是必不可少的。在本文中,我们展示和分析了一些拟议的基于物联网的医疗保健安全解决方案,并概述了一个新的平台,该平台可以保护和增强医院数据库中EHR的访问和管理过程。
{"title":"A Framework for Securing EHR Management in the Era of Internet of Things","authors":"Waad Y. Bin Saleem, Hanan Ali, Nouf AlSalloom","doi":"10.1109/ICCAIS48893.2020.9096788","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096788","url":null,"abstract":"Nowadays the internet of things (IoT) is one of the most arising obvious technologies which plays an important role in healthcare systems. Healthcare systems including stored Electronic healthcare records (EHR), which are vulnerable to intentional and unintentional security threats. therefore; the need for strong EHR security protection is essential. In this paper we display and analyze some of the proposed IoT-based security solutions for healthcare, and also outline a new platform that secures and enhances the process of accessing and managing EHR in hospitals databases.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126311961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network 认知无线电网络协同频谱感知与硬决策规则
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096740
Gerges M. Salama, Sarah A. Taha
Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.
认知无线电是无线通信和移动计算的发展。频谱是有限的资源。建议授权频谱只供频谱拥有者使用。认知无线电是一种以非许可方式回收许可频谱的新观点。认知无线网络的主要条件是感知频谱空洞。认知无线电可以检测到未使用的频谱。它共享这一点,而不会对许可频谱产生干扰。它可以是一种感官信号。它通过以自组织的方式进行合作,在多个用户之间进行可行的通信。能量检测器方法对信号的数据进行拒绝处理,是一种隐性信号检测器。本文在MATLAB Simulink中实现了频谱感知认知无线电的Simulink能量检测,利用频谱漏洞,避免对授权频谱和非授权频谱的破坏性干扰。隐藏的主用户问题会因为衰落或阴影而发生。当认知无线电由于其位置而无法被初级使用者检测到时,就会发生这种情况。协同感知频谱感知是解决隐性问题的最佳方法。
{"title":"Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network","authors":"Gerges M. Salama, Sarah A. Taha","doi":"10.1109/ICCAIS48893.2020.9096740","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096740","url":null,"abstract":"Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Validation of Jaya Algorithm to The Most Well-known Testbench Problem Jaya算法对最著名的测试台问题的性能验证
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096739
Mostafa A. Elhosseini
Soft computing algorithms are population-based, probabilistic, that have the same common controlling parameters such as population size, number of generations, elite size. In addition to the regular control parameters, the different algorithms need specific control parameters for their algorithm. A good tuning of different algorithm parameters is an integral factor that affects the efficacy of the algorithm. The inappropriate tuning of the algorithm parameters increases the computational effort or adheres to local limits. Teaching Learning-based Optimization (TLBO) algorithms are algorithms that need no algorithm-specific parameter. Jaya is a kind of TLBO algorithm but has only one-step and is user-friendly. The main aims of this paper are to present the Jaya algorithm and its application to the most prominent engineering problem. The validation and monitoring of existing technology in the presented Jaya include case studies, ranging from the recent CEC 2016 workbench to the common engineering challenges for the gear train, welded beam, three-bar truss system. The results achieved reflect the significance of the algorithms in comparison with most popular modern algorithms.
软计算算法是基于群体的、概率的,它们具有相同的共同控制参数,如群体规模、代数、精英规模。除了常规的控制参数外,不同的算法还需要特定的控制参数。不同算法参数的合理调优是影响算法有效性的重要因素。算法参数的不适当调优会增加计算量或受局部限制。TLBO (Teaching - Learning-based Optimization)算法是一种不需要特定算法参数的算法。Jaya是TLBO算法的一种,但只有一步,并且用户友好。本文的主要目的是介绍Jaya算法及其在最突出的工程问题中的应用。在Jaya中,现有技术的验证和监测包括案例研究,从最近的CEC 2016工作台到轮系、焊接梁、三杆桁架系统的常见工程挑战。与大多数流行的现代算法相比,所获得的结果反映了该算法的意义。
{"title":"Performance Validation of Jaya Algorithm to The Most Well-known Testbench Problem","authors":"Mostafa A. Elhosseini","doi":"10.1109/ICCAIS48893.2020.9096739","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096739","url":null,"abstract":"Soft computing algorithms are population-based, probabilistic, that have the same common controlling parameters such as population size, number of generations, elite size. In addition to the regular control parameters, the different algorithms need specific control parameters for their algorithm. A good tuning of different algorithm parameters is an integral factor that affects the efficacy of the algorithm. The inappropriate tuning of the algorithm parameters increases the computational effort or adheres to local limits. Teaching Learning-based Optimization (TLBO) algorithms are algorithms that need no algorithm-specific parameter. Jaya is a kind of TLBO algorithm but has only one-step and is user-friendly. The main aims of this paper are to present the Jaya algorithm and its application to the most prominent engineering problem. The validation and monitoring of existing technology in the presented Jaya include case studies, ranging from the recent CEC 2016 workbench to the common engineering challenges for the gear train, welded beam, three-bar truss system. The results achieved reflect the significance of the algorithms in comparison with most popular modern algorithms.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autismworld: an Arabic Application for Autism Spectrum Disorder 自闭症世界:自闭症谱系障碍的阿拉伯语应用
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096811
N. Alnaghaimshi, A. Alhazmi, S. A. Alqanwah, M. Aldablan, M. A. Almossa
Autism Spectrum Disorder (ASD) is one of the most-prevalent neurodevelopmental disorder. ASD is defined by impaired social communication along with unusual restricted and repetitive behaviours. However, each child diagnosed with ASD presents with a unique range of behavioural, communication and social skills problems. As result, the burden on parents who are raising a child with ASD is too high, especially in countries that suffer from a lack or shortages of skilled specialists, supportive services and special centres that deal with such conditions. Extensive research has proven the efficiency of technologies as support tools for ASD children and their families. Since technologies and telehealth services have recently been introduced in KSA, we proposed with this application (app) to provide an innovative opportunity for assisting and supporting children with ASD and their parents in our context. The proposed application aims to extend and enhance care delivery in numerous ways: it will provide parents with a handy tool to help to detect signs of autism in their child and give them updated resources for education and training on how to care for their ASD child. Moreover, this application aims to improve access to specialists for parents and help to establish a space in which to share information and experiences among parents of children with ASD. Moreover, the app employs an innovative feature to simplify ASD data collection through conducting short and simple surveys and conduct interviews via text messaging.
自闭症谱系障碍(ASD)是最常见的神经发育障碍之一。ASD的定义是社会沟通障碍以及不寻常的限制和重复行为。然而,每个被诊断患有自闭症谱系障碍的孩子都表现出一系列独特的行为、沟通和社交技能问题。因此,抚养自闭症儿童的父母负担过重,特别是在缺乏或短缺熟练专家、支持性服务和处理这类情况的特殊中心的国家。广泛的研究已经证明了技术作为ASD儿童及其家庭支持工具的有效性。由于KSA最近引入了技术和远程医疗服务,我们提出了这个应用程序(app),以提供一个创新的机会,帮助和支持我们背景下的ASD儿童及其父母。该应用程序旨在以多种方式扩展和加强护理服务:它将为父母提供一个方便的工具,帮助他们检测孩子的自闭症迹象,并为他们提供有关如何照顾自闭症儿童的最新教育和培训资源。此外,该应用程序旨在改善父母与专家的联系,并帮助建立一个空间,在这个空间中,自闭症儿童的父母可以分享信息和经验。此外,该应用程序还采用了一项创新功能,通过进行简短的调查和通过短信进行访谈来简化ASD数据收集。
{"title":"Autismworld: an Arabic Application for Autism Spectrum Disorder","authors":"N. Alnaghaimshi, A. Alhazmi, S. A. Alqanwah, M. Aldablan, M. A. Almossa","doi":"10.1109/ICCAIS48893.2020.9096811","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096811","url":null,"abstract":"Autism Spectrum Disorder (ASD) is one of the most-prevalent neurodevelopmental disorder. ASD is defined by impaired social communication along with unusual restricted and repetitive behaviours. However, each child diagnosed with ASD presents with a unique range of behavioural, communication and social skills problems. As result, the burden on parents who are raising a child with ASD is too high, especially in countries that suffer from a lack or shortages of skilled specialists, supportive services and special centres that deal with such conditions. Extensive research has proven the efficiency of technologies as support tools for ASD children and their families. Since technologies and telehealth services have recently been introduced in KSA, we proposed with this application (app) to provide an innovative opportunity for assisting and supporting children with ASD and their parents in our context. The proposed application aims to extend and enhance care delivery in numerous ways: it will provide parents with a handy tool to help to detect signs of autism in their child and give them updated resources for education and training on how to care for their ASD child. Moreover, this application aims to improve access to specialists for parents and help to establish a space in which to share information and experiences among parents of children with ASD. Moreover, the app employs an innovative feature to simplify ASD data collection through conducting short and simple surveys and conduct interviews via text messaging.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Best-Worst Method for Resource Allocation and Task Scheduling in Cloud Computing 云计算中资源分配和任务调度的最佳-最差方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096877
Abdulaziz Alhubaishy, Abdulmajeed Aljuhani
In cloud computing, service providers and service consumers often pursue conflicting benefits. The task-scheduling problem in particular requires the consideration of all characteristics affecting the scheduling process that are related to the two parties involved. The literature proposes that scheduling tasks and resource allocation problems can be structured and mathematically represented by adopting Multi-Criteria Decision-Making (MCDM) methods. This paper introduces a model to effectively prioritize tasks in a cloud environment based on consumer preferences and pre-defined criteria. The model adopts the Best-Worst Method (BWM) as a light MCDM method for structuring task-scheduling problems, accommodating consumer preferences, and providing reliable and scientific results for prioritizing tasks in the cloud. Furthermore, the model gives consumers the flexibility to change their preferences and offers a dynamic way to deal with the task-scheduling problem. The paper also provides a step-by-step example to guide consumers on the benefits of the proposed model.
在云计算中,服务提供者和服务消费者经常追求相互冲突的利益。任务调度问题尤其需要考虑影响调度过程的所有特征,这些特征与所涉及的双方有关。文献提出采用多准则决策(Multi-Criteria Decision-Making, MCDM)方法对任务调度和资源分配问题进行结构化和数学表示。本文介绍了一个基于消费者偏好和预定义标准的模型,可以在云环境中有效地对任务进行优先级排序。该模型采用Best-Worst Method (BWM)作为一种轻量级的MCDM方法,用于结构化任务调度问题,适应消费者偏好,并为云中的任务优先级排序提供可靠和科学的结果。此外,该模型使消费者能够灵活地改变他们的偏好,并提供了一种动态的方法来处理任务调度问题。本文还提供了一个循序渐进的例子,以指导消费者对拟议模式的好处。
{"title":"The Best-Worst Method for Resource Allocation and Task Scheduling in Cloud Computing","authors":"Abdulaziz Alhubaishy, Abdulmajeed Aljuhani","doi":"10.1109/ICCAIS48893.2020.9096877","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096877","url":null,"abstract":"In cloud computing, service providers and service consumers often pursue conflicting benefits. The task-scheduling problem in particular requires the consideration of all characteristics affecting the scheduling process that are related to the two parties involved. The literature proposes that scheduling tasks and resource allocation problems can be structured and mathematically represented by adopting Multi-Criteria Decision-Making (MCDM) methods. This paper introduces a model to effectively prioritize tasks in a cloud environment based on consumer preferences and pre-defined criteria. The model adopts the Best-Worst Method (BWM) as a light MCDM method for structuring task-scheduling problems, accommodating consumer preferences, and providing reliable and scientific results for prioritizing tasks in the cloud. Furthermore, the model gives consumers the flexibility to change their preferences and offers a dynamic way to deal with the task-scheduling problem. The paper also provides a step-by-step example to guide consumers on the benefits of the proposed model.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ICCAIS 2020 Keynote Speaker ICCAIS 2020主题演讲
Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096858
{"title":"ICCAIS 2020 Keynote Speaker","authors":"","doi":"10.1109/iccais48893.2020.9096858","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096858","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking 命名数据网络的随机最少使用缓存替换策略
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096733
Najla Alzakari, Alanoud Bin Dris, Saad Al-Ahmadi
To accommodate the rapidly changing Internet requirements, Information-Centric Networking (ICN) was recently introduced as a promising architecture for the future Internet. One of the ICN primary features is ‘in-network caching’; due to its ability to minimize network traffic and respond faster to users’ requests. Therefore, various caching algorithms have been presented that aim to enhance the network performance using different measures, such as cache hit ratio and cache hit distance. Choosing a caching strategy is critical, and an adequate replacement strategy is also required to decide which content should be dropped. Thus, in this paper, we propose a content replacement scheme for ICN, called Randomized LFU that is implemented with respect to content popularity taking the time complexity into account. We use Abilene and Tree network topologies in our simulation models. The proposed replacement achieves encouraging results in terms of the cache hit ratio, inner hit, and hit distance and it outperforms FIFO, LRU, and Random replacement strategies.
为了适应快速变化的Internet需求,最近引入了以信息为中心的网络(ICN),作为未来Internet的一种很有前途的体系结构。ICN的主要功能之一是“网络内缓存”;由于它能够最大限度地减少网络流量并更快地响应用户的请求。因此,各种缓存算法被提出,目的是通过不同的度量来提高网络性能,例如缓存命中率和缓存命中距离。选择缓存策略非常关键,还需要适当的替换策略来决定应该删除哪些内容。因此,在本文中,我们提出了一种ICN的内容替换方案,称为随机LFU,该方案在考虑时间复杂性的情况下,根据内容受欢迎程度实现。我们在仿真模型中使用了Abilene和Tree网络拓扑。所提出的替换在缓存命中率、内部命中和命中距离方面取得了令人鼓舞的结果,并且优于FIFO、LRU和Random替换策略。
{"title":"Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking","authors":"Najla Alzakari, Alanoud Bin Dris, Saad Al-Ahmadi","doi":"10.1109/ICCAIS48893.2020.9096733","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096733","url":null,"abstract":"To accommodate the rapidly changing Internet requirements, Information-Centric Networking (ICN) was recently introduced as a promising architecture for the future Internet. One of the ICN primary features is ‘in-network caching’; due to its ability to minimize network traffic and respond faster to users’ requests. Therefore, various caching algorithms have been presented that aim to enhance the network performance using different measures, such as cache hit ratio and cache hit distance. Choosing a caching strategy is critical, and an adequate replacement strategy is also required to decide which content should be dropped. Thus, in this paper, we propose a content replacement scheme for ICN, called Randomized LFU that is implemented with respect to content popularity taking the time complexity into account. We use Abilene and Tree network topologies in our simulation models. The proposed replacement achieves encouraging results in terms of the cache hit ratio, inner hit, and hit distance and it outperforms FIFO, LRU, and Random replacement strategies.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data and Location Privacy Issues in IoT Applications 物联网应用中的数据和位置隐私问题
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096837
Amani Abuladel, O. Bamasag
The Internet of Things (IoT) is an innovative interconnected framework where all objects can interact with each other and with other people. It enhances the quality of life, business growth and efficiency in multiple domains. However, the heterogeneity of the "Things" that can be associated in such conditions makes interoperability among them a difficult issue. Moreover, the data exchanged between IoT system components are normally not protected. This leads to users losing their privacy, hence, making it difficult to share and reuse data for purposes other than what they were originally set up for. In this paper, we address these challenges in the context of IoT applications considering user’s data and location privacy as not to be shared between these ‘Things’. We first describe two use case scenarios of IoT users in healthcare applications. The first scenario describes an attacker capturing the data traveling from/to the server. The second scenario describes the case of a server acting as a malicious party (i.e., an attacker). The two scenarios highlight data and location privacy issues of IoT users. Based on the use-case scenarios, the paper presents a generic framework for IoT data and location privacy, including a description of entities and interactions among them. The paper then analyzes potential privacy threats in this framework, in order to identify a set of general privacy requirements, with an emphasis on data and location privacy. These requirements will provide guidance to future solutions for secure IoT communication and/or risk assessment.
物联网(IoT)是一个创新的互联框架,所有物体都可以相互作用,也可以与其他人互动。它提高了多个领域的生活质量、业务增长和效率。然而,在这种情况下可以关联的“事物”的异质性使得它们之间的互操作性成为一个困难的问题。此外,物联网系统组件之间交换的数据通常不受保护。这将导致用户失去他们的隐私,因此,很难共享和重用数据,而不是他们最初设置的目的。在本文中,我们在物联网应用的背景下解决了这些挑战,考虑到用户的数据和位置隐私不能在这些“事物”之间共享。我们首先描述了医疗保健应用中物联网用户的两个用例场景。第一个场景描述攻击者捕获从服务器传入/传入服务器的数据。第二个场景描述了服务器充当恶意方(即攻击者)的情况。这两个场景突出了物联网用户的数据和位置隐私问题。基于用例场景,本文提出了物联网数据和位置隐私的通用框架,包括实体和它们之间的交互描述。然后,本文分析了该框架中潜在的隐私威胁,以确定一套通用的隐私要求,重点是数据和位置隐私。这些要求将为安全物联网通信和/或风险评估的未来解决方案提供指导。
{"title":"Data and Location Privacy Issues in IoT Applications","authors":"Amani Abuladel, O. Bamasag","doi":"10.1109/ICCAIS48893.2020.9096837","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096837","url":null,"abstract":"The Internet of Things (IoT) is an innovative interconnected framework where all objects can interact with each other and with other people. It enhances the quality of life, business growth and efficiency in multiple domains. However, the heterogeneity of the \"Things\" that can be associated in such conditions makes interoperability among them a difficult issue. Moreover, the data exchanged between IoT system components are normally not protected. This leads to users losing their privacy, hence, making it difficult to share and reuse data for purposes other than what they were originally set up for. In this paper, we address these challenges in the context of IoT applications considering user’s data and location privacy as not to be shared between these ‘Things’. We first describe two use case scenarios of IoT users in healthcare applications. The first scenario describes an attacker capturing the data traveling from/to the server. The second scenario describes the case of a server acting as a malicious party (i.e., an attacker). The two scenarios highlight data and location privacy issues of IoT users. Based on the use-case scenarios, the paper presents a generic framework for IoT data and location privacy, including a description of entities and interactions among them. The paper then analyzes potential privacy threats in this framework, in order to identify a set of general privacy requirements, with an emphasis on data and location privacy. These requirements will provide guidance to future solutions for secure IoT communication and/or risk assessment.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114772489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Ontological Model to Predict Dropout Students Using Machine Learning Techniques 利用机器学习技术预测辍学学生的本体论模型
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096743
Alla Abd El-Rady
E-learning systems become more popular than it has ever been. However the popularity of e-learning systems, they still suffer from some problems related to the completion rate of online courses and the learners’ failures. Nowadays, a lot of educational institutions are concentrating on how to solve those problems in order to improve the quality of learning process. This paper presents an ontological model based on machine learning techniques to predict learners coming performance using data produced by learners through their interaction with Learning Management System and Facebook groups. It also presents two different approaches to evaluate ontology model in terms of completeness and correctness.
电子学习系统比以往任何时候都更受欢迎。然而,随着电子学习系统的普及,它们仍然存在一些与在线课程完成率和学习者失败相关的问题。如何解决这些问题,提高学生的学习质量,是当前许多教育机构关注的问题。本文提出了一个基于机器学习技术的本体论模型,该模型使用学习者通过与学习管理系统和Facebook组的交互产生的数据来预测学习者的表现。本文还从完整性和正确性两方面提出了两种不同的本体模型评价方法。
{"title":"An Ontological Model to Predict Dropout Students Using Machine Learning Techniques","authors":"Alla Abd El-Rady","doi":"10.1109/ICCAIS48893.2020.9096743","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096743","url":null,"abstract":"E-learning systems become more popular than it has ever been. However the popularity of e-learning systems, they still suffer from some problems related to the completion rate of online courses and the learners’ failures. Nowadays, a lot of educational institutions are concentrating on how to solve those problems in order to improve the quality of learning process. This paper presents an ontological model based on machine learning techniques to predict learners coming performance using data produced by learners through their interaction with Learning Management System and Facebook groups. It also presents two different approaches to evaluate ontology model in terms of completeness and correctness.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring 基于网络对象监控的入侵检测系统资源控制
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096741
N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.
本文研究了在对一组网络对象进行监控时,入侵检测系统资源的优化问题。本文提出的方法的应用使得基于这些对象的可用先验信息在网络基础设施的多个对象之间优化分配信息系统的计算资源成为可能。科学的新颖性在于,所提出的方法使我们能够将观测控制理论的数学装置适应于为通信网络提供信息保护的任务。
{"title":"Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring","authors":"N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov","doi":"10.1109/ICCAIS48893.2020.9096741","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096741","url":null,"abstract":"The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1