Beruflich Dokumente
Kultur Dokumente
com
Abstract:
Cloud data center management is a key problem due to the numerous and
heterogeneous strategies that can be applied, ranging from the VM
placement to the federation with other clouds. Performance evaluation of
Cloud Computing infrastructures is required to predict and quantify the
cost-benefit of a strategy portfolio and the corresponding Quality of
Service (QoS) experienced by users. Such analyses are not feasible by
simulation or on-the-field experimentation, due to the great number of
parameters that have to be investigated. In this paper, we present an
analytical model, based on Stochastic Reward Nets (SRNs), that is both
scalable to model systems composed of thousands of resources and
flexible to represent different policies and cloud-specific strategies.
Several performance metrics are defined and evaluated to analyze the
behavior of a Cloud data center: utilization, availability, waiting time, and
responsiveness. A resiliency analysis is also provided to take into account
load bursts. Finally, a general approach is presented that, starting from the
concept of system capacity, can help system managers to opportunely set
the data center parameters under different working conditions.
Abstract:
The rapidly increasing power of personal mobile devices (smart phones,
tablets, etc.) is providing much richer contents and social interactions to
users on the move. This trend however is throttled by the limited battery
lifetime of mobile devices and unstable wireless connectivity, making the
highest possible quality of service experienced by mobile users not
feasible. The recent cloud computing technology, with its rich resources
to compensate for the limitations of mobile devices and connections, can
potentially provide an ideal platform to support the desired mobile
services. Tough challenges arise on how to effectively exploit cloud
resources to facilitate mobile services, especially those with stringent
interaction delay requirements. In this paper, we propose the design of a
Cloud-based, novel Mobile social TV system (CloudMoV). The system
effectively
utilizes
both
PaaS
(Platform-as-a-Service)
and
IaaS
Abstract:
Cloud computing allows business customers to scale up and down their
resource usage based on needs. Many of the touted gains in the cloud
model
come
from
resource
multiplexing
through
virtualization
Abstract:
virtual machine (VM) technology being increasingly mature, compute
resources in cloud systems can be partitioned in fine granularity and
allocated on demand. We make three contributions in this paper: 1) we
formulate a deadline-driven resource allocation problem based on the
cloud environment facilitated with VM resource isolation technology, and
also propose a novel solution with polynomial time, which could
minimize users payment in terms of their expected deadlines. 2) By
analyzing the upper bound of task execution length based on the possibly
inaccurate workload prediction, we further propose an error-tolerant
method to guarantee tasks completion within its deadline. 3) We validate
its effectiveness over a real VM-facilitated cluster environment under
different levels of competition. In our experiment, by tuning algorithmic
input deadline based on our derived bound, task execution length can
always be limited within its deadline in the sufficient-supply situation; the
mean execution length still keeps 70 percent as high as user specified
deadline under the severe competition. Under the original-deadline-based
solution, about 52.5 percent of tasks are completed within 0.95-1.0 as
high as their deadline, which still conforms to the deadline-guaranteed
requirement. Only 20 percent of tasks violate deadlines, yet most (17.5
percent) are still finished within 1.05 times of deadlines.
Abstract:
Cloud computing economically enables customers with limited
computational resources to outsource large-scale computations to the
cloud. However, how to protect customers confidential data involved in
the computations then becomes a major security concern. In this paper,
we present a secure outsourcing mechanism for solving large-scale
systems of linear equations (LE) in cloud. Because applying traditional
approaches like Gaussian elimination or LU decomposition (aka. direct
method) to such large- scale LEs would be prohibitively expensive, we
build the secure LE outsourcing mechanism via a completely different
approachiterative method, which is much easier to implement in
practice and only demands relatively simpler matrix-vector operations.
Specifically, our mechanism enables a customer to securely harness the
cloud for iteratively finding successive approximations to the LE
solution, while keeping both the sensitive input and output of the
computation private. For robust cheating detection, we further explore the
algebraic property of matrix-vector operations and propose an efficient
result verification mechanism, which allows the customer to verify all
answers received from previous iterative approximations in one batch
with high probability. Thorough security analysis and prototype
experiments on Amazon EC2 demonstrate the validity and practicality of
our proposed design.
Abstract:
Cloud computing provides an economical and efficient solution for
sharing group resource among cloud users. Unfortunately, sharing data in
a multi-owner manner while preserving data and identity privacy from an
untrusted cloud is still a challenging issue, due to the frequent change of
the membership. In this paper, we propose a secure multi owner data
sharing scheme, named Mona, for dynamic groups in the cloud. By
leveraging group signature and dynamic broadcast encryption techniques,
any cloud user can anonymously share data with others. Meanwhile, the
storage overhead and encryption computation cost of our scheme are
independent with the number of revoked users. In addition, we analyze
the security of our scheme with rigorous proofs, and demonstrate the
efficiency of our scheme in experiments.
7.PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
Abstract:
In this paper, we present PACK (Predictive ACKs), a novel end-to-end
traffic redundancy elimination (TRE) system, designed for cloud
computing customers. Cloud-based TRE needs to apply a judicious use of
cloud resources so that the bandwidth cost reduction combined with the
additional cost of TRE computation and storage would be optimized.
PACKs main advantage is its capability of offloading the cloud-server
TRE effort to end clients, thus minimizing the processing costs induced
by the TRE algorithm. Unlike previous solutions, PACK does not require
the server to continuously maintain clients status. This makes PACK
very suitable for pervasive computation environments that combine client
mobility and server migration to maintain cloud elasticity. PACK is based
on a novel TRE technique, which allows the client to use newly received
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Using cloud storage, users can remotely store their data and enjoy the ondemand high-quality applications and services from a shared pool of
configurable computing resources, without the burden of local data
storage and maintenance. However, the fact that users no longer have
physical possession of the outsourced data makes the data integrity
protection in cloud computing a formidable task, especially for users with
constrained computing resources. Moreover, users should be able to just
use the cloud storage as if it is local, without worrying about the need to
verify its integrity. Thus, enabling public auditability for cloud storage is
of critical importance so that users can resort to a third-party auditor
(TPA) to check the integrity of outsourced data and be worry free. To
securely introduce an effective TPA, the auditing process should bring in
no new vulnerabilities toward user data privacy, and introduce no
additional online burden to user. In this paper, we propose a secure cloud
storage system supporting privacy-preserving public auditing. We further
extend our result to enable the TPA to perform audits for multiple users
simultaneously and efficiently. Extensive security and performance
analysis show the proposed schemes are provably secure and highly
efficient. Our preliminary experiment conducted on Amazon EC2
instance further demonstrates the fast performance of the design.
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Personal health record (PHR) is an emerging patient-centric model of
health information exchange, which is often outsourced to be stored at a
third party, such as cloud providers. However, there have been wide
privacy concerns as personal health information could be exposed to
those third party servers and to unauthorized parties. To assure the
patients control over access to their own PHRs, it is a promising method
to encrypt the PHRs before outsourcing. Yet, issues such as risks of
privacy exposure, scalability in key management, flexible access, and
efficient user revocation, have remained the most important challenges
toward achieving fine-grained, cryptographically enforced data access
control. In this paper, we propose a novel patient-centric framework and a
suite of mechanisms for data access control to PHRs stored in semitrusted
servers. To achieve fine-grained and scalable data access control for
PHRs, we leverage attribute-based encryption (ABE) techniques to
encrypt each patients PHR file. Different from previous works in secure
data outsourcing, we focus on the multiple data owner scenario, and
divide the users in the PHR system into multiple security domains that
greatly reduces the key management complexity for owners and users. A
high degree of patient privacy is guaranteed simultaneously by exploiting
multiauthority ABE. Our scheme also enables dynamic modification of
access policies or file attributes, supports efficient on-demand
user/attribute revocation and break-glass access under emergency
scenarios. Extensive analytical and experimental results are presented
Abstract:
Storage-as-a-Service offered by cloud service providers (CSPs) is a paid
facility that enables organizations to outsource their sensitive data to be
stored on remote servers. In this paper, we propose a cloud-based storage
scheme that allows the data owner to benefit from the facilities offered by
the CSP and enables indirect mutual trust between them. The proposed
scheme has four important features: (i) it allows the owner to outsource
sensitive data to a CSP, and perform full block-level dynamic operations
on the outsourced data, i.e., block modification, insertion, deletion, and
append, (ii) it ensures that authorized users (i.e., those who have the right
to access the owners file) receive the latest version of the outsourced
data, (iii) it enables indirect mutual trust between the owner and the CSP,
and (iv) it allows the owner to grant or revoke access to the outsourced
data. We discuss the security issues of the proposed scheme. Besides, we
justify its performance through theoretical analysis and a prototype
implementation on Amazon cloud platform to evaluate storage,
communication, and computation overheads.
11.A Load Balancing Model Based on Cloud Partitioning for the Public
Cloud
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Distributed file systems are key building blocks for cloud computing
applications based on the MapReduce programming paradigm. In such
file systems, nodes simultaneously serve computing and storage
functions; a file is partitioned into a number of chunks allocated in
distinct nodes so that MapReduce tasks can be performed in parallel over
the nodes. However, in a cloud computing environment, failure is the
norm, and nodes may be upgraded, replaced, and added in the system.
Files can also be dynamically created, deleted, and appended. This results
in load imbalance in a distributed file system; that is, the file chunks are
not distributed as uniformly as possible among the nodes. Emerging
distributed file systems in production systems strongly depend on a
central node for chunk reallocation. This dependence is clearly inadequate
in a large-scale, failure-prone environment because the central load
balancer is put under considerable workload that is linearly scaled with
the system size, and may thus become the performance bottleneck and the
single point of failure. In this paper, a fully distributed load rebalancing
algorithm is presented to cope with the load imbalance problem. Our
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Current approaches to enforce fine-grained access control on confidential
data hosted in the cloud are based on fine-grained encryption of the data.
Under such approaches, data owners are in charge of encrypting the data
before uploading them on the cloud and re-encrypting the data whenever
user credentials change. Data owners thus incur high communication and
computation costs. A better approach should delegate the enforcement
offline-grained access control to the cloud, so to minimize the overhead at
the data owners, while assuring data confidentiality from the cloud. We
propose an approach, based on two layers of encryption that addresses
such requirement. Under our approach, the data owner performs a coarsegrained encryption, whereas the cloud performs a fine-grained encryption
on top of the owner encrypted data. A challenging issue is how to
decompose access control policies (ACPs) such that the two layer
encryption can be performed. We show that this problem is NP-complete
and propose novel optimization algorithms. We utilize an efficient group
key management scheme that supports expressive ACPs. Our system
assures the confidentiality of the data and preserves the privacy of users
from the cloud while delegating most of the access control enforcement
to the cloud.
15.Attribute-Based Encryption With Verifiable Outsourced Decryption
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
A cloud storage system, consisting of a collection of storage servers,
provides long-term storage services over the Internet. Storing data in a
third
partys cloud
system
causes
serious
concern over
data
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Personal health record (PHR) is an emerging patient-centric model of
health information exchange, which is often outsourced to be stored at a
third party, such as cloud providers. However, there have been wide
privacy concerns as personal health information could be exposed to
those third party servers and to unauthorized parties. To assure the
patients control over access to their own PHRs, it is a promising method
to encrypt the PHRs before outsourcing. Yet, issues such as risks of
privacy exposure, scalability in key management, flexible access, and
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Cloud computing enables highly scalable services to be easily consumed
over the Internet on an as-needed basis. A major feature of the cloud
services is that users data are usually processed remotely in unknown
machines that users do not own or operate. While enjoying the
convenience brought by this new emerging technology, users fears of
losing control of their own data (particularly, financial and health data)
can become a significant barrier to the wide adoption of cloud services.
To address this problem, in this paper, we propose a novel highly
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Provable data possession (PDP) is a technique for ensuring the integrity of
data in storage outsourcing. In this paper, we address the construction of
an efficient PDP scheme for distributed cloud storage to support the
scalability of service and data migration, in which we consider the
existence of multiple cloud service providers to cooperatively store and
maintain the clients data. We present a cooperative PDP (CPDP) scheme
based on homomorphic verifiable response and hash index hierarchy. We
prove the security of our scheme based on multi-prover zero-knowledge
proof system, which can satisfy completeness, knowledge soundness, and
zero-knowledge properties. In addition, we articulate performance
optimization mechanisms for our scheme, and in particular present an
efficient method for selecting optimal parameter values to minimize the
computation costs of clients and storage service providers. Our
Abstract:
Cloud computing has emerged as one of the most influential paradigms in
the IT industry in recent years. Since this new computing technology
requires users to entrust their valuable data to cloud providers, there have
been increasing security and privacy concerns on outsourced data.
Several schemes employing attribute-based encryption (ABE) have been
proposed for access control of outsourced data in cloud computing;
however, most of them suffer from inflexibility in implementing complex
access control policies. In order to realize scalable, flexible, and finegrained access control of outsourced data in cloud computing, in this
paper, we propose hierarchical attribute-set-based encryption (HASBE)
by extending ciphertext-policy attribute-set-based encryption (ASBE)
with a hierarchical structure of users. The proposed scheme not only
achieves scalability due to its hierarchical structure, but also inherits
flexibility and fine-grained access control in supporting compound
attributes of ASBE. In addition, HASBE employs multiple value
assignments for access expiration time to deal with user revocation more
efficiently than existing schemes. We formally prove the security of
HASBE based on security of the cipher text-policy attribute-based
encryption (CP-ABE) scheme by Bethencourt et al. and analyze its
performance and computational complexity. We implement our scheme
and show that it is both efficient and flexible in dealing with access
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
This paper considers a cloud computing setting in which similarity
querying of metric data is outsourced to a service provider. The data is to
be revealed only to trusted users, not to the service provider or anyone
else. Users query the server for the most similar data objects to a query
example. Outsourcing offers the data owner scalability and a low-initial
investment. The need for privacy may be due to the data being sensitive
(e.g., in medicine), valuable (e.g., in astronomy), or otherwise
confidential. Given this setting, the paper presents techniques that
transform the data prior to supplying it to the service provider for
similarity queries on the transformed data. Our techniques provide
interesting trade-offs between query cost and accuracy. They are then
further extended to offer an intuitive privacy guarantee. Empirical studies
with real data demonstrate that the techniques are capable of offering
privacy while enabling efficient and accurate processing of similarity
queries.
Abstract:
Cloud storage enables users to remotely store their data and enjoy the ondemand high quality cloud applications without the burden of local
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
hardware and software management. Though the benefits are clear, such a
service is also relinquishing users physical possession of their outsourced
data, which inevitably poses new security risks toward the correctness of
the data in cloud. In order to address this new problem and further
achieve a secure and dependable cloud storage service, we propose in this
paper a flexible distributed storage integrity auditing mechanism,
utilizing the homomorphic token and distributed erasure-coded data. The
proposed design allows users to audit the cloud storage with very
lightweight communication and computation cost. The auditing result not
only ensures strong cloud storage correctness guarantee, but also
simultaneously achieves fast data error localization, i.e., the identification
of misbehaving server. Considering the cloud data are dynamic in nature,
the proposed design further supports secure and efficient dynamic
operations on outsourced data, including block modification, deletion,
and append. Analysis shows the proposed scheme is highly efficient and
resilient against Byzantine failure, malicious data modification attack,
and even server colluding attacks.
DATA MINING
24.A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
Abstract:
Feature selection involves identifying a subset of the most useful features
that produces compatible results as the original entire set of features. A
feature selection algorithm may be evaluated from both the efficiency and
effectiveness points of view. While the efficiency concerns the time
required to find a subset of features, the effectiveness is related to the
quality of the subset of features. Based on these criteria, a fast clusteringMindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
For a broad-topic and ambiguous query, different users may have
different search goals when they submit it to a search engine. The
inference and analysis of user search goals can be very useful in
improving search engine relevance and user experience. In this paper, we
propose a novel approach to infer user search goals by analyzing search
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
An increasing number of databases have become web accessible through
HTML form-based search interfaces. The data units returned from the
underlying database are usually encoded into the result pages
dynamically for human browsing. For the encoded data units to be
machine process able, which is essential for many applications such as
deep web data collection and Internet comparison shopping, they need to
be extracted out and assigned meaningful labels. In this paper, we present
an automatic annotation approach that first aligns the data units on a
result page into different groups such that the data in the same group have
the same semantic. Then, for each group we annotate it from different
aspects and aggregate the different annotations to predict a final
annotation label for it. An annotation wrapper for the search site is
automatically constructed and can be used to annotate new result pages
from the same web database. Our experiments indicate that the proposed
approach is highly effective.
27.Anomaly Detection via Online Over-Sampling Principal Component
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Analysis
Abstract:
Anomaly detection has been an important research topic in data mining
and machine learning. Many real-world applications such as intrusion or
credit card fraud detection require an effective and efficient framework to
identify deviated data instances. However, most anomaly detection
methods are typically implemented in batch mode, and thus cannot be
easily extended to large-scale problems without sacrificing computation
and memory requirements. In this paper, we propose an online oversampling principal component analysis (osPCA) algorithm to address this
problem, and we aim at detecting the presence of outliers from a large
amount of data via an online updating technique. Unlike prior PCA based
approaches, we do not store the entire data matrix or covariance matrix,
and thus our approach is especially of interest in online or large-scale
problems. By over-sampling the target instance and extracting the
principal direction of the data, the proposed osPCA allows us to
determine the anomaly of the target instance according to the variation of
the resulting dominant eigenvector. Since our osPCA need not perform
eigen analysis explicitly, the proposed framework is favored
for online applications which have computation or memory limitations.
Compared with the well-known power method for PCA and other popular
anomaly detection algorithms, our experimental results verify the
feasibility of our proposed method in terms of both accuracy and
efficiency.
28.Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
In this paper, we introduce the notion of sufficient set and necessary set
for distributed processing of probabilistic top-k queries in cluster-based
wireless sensor networks. These two concepts have very nice properties
that can facilitate localized data pruning in clusters. Accordingly, we
develop a suite of algorithms, namely, sufficient set-based (SSB),
necessary set-based (NSB), and boundary-based (BB), for intercluster
query processing with bounded rounds of communications. Moreover, in
responding to dynamic changes of data distribution in the network, we
develop an adaptive algorithm that dynamically switches among the three
proposed algorithms to minimize the transmission cost. We show the
applicability of sufficient set and necessary set to wireless sensor
networks with both two-tier hierarchical and tree-structured network
topologies. Experimental results show that the proposed algorithms
reduce data transmissions significantly and incur only small constant
rounds of data communications. The experimental results also
demonstrate the superiority of the adaptive algorithm, which achieves a
near-optimal performance under various conditions.
29.m-Privacy for Collaborative Data Publishing
Abstract:
In this paper, we consider the collaborative data publishing problem for
anonymizing horizontally partitioned data at multiple data providers. We
consider a new type of insider attack by colluding data providers who
may use their own data records (a subset of the overall data) to infer the
data records contributed by other data providers. The paper addresses this
new threat, and makes several contributions. First, we introduce the
notion of m-privacy, which guarantees that the anonymized data satisfies
a given privacy constraint against any group of up to m colluding data
providers. Second, we present heuristic algorithms exploiting the
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Twitter has received much attention recently. An important characteristic
of Twitter is its real-time nature. We investigate the real-time interaction
of events such as earthquakes in Twitter and propose an algorithm to
monitor tweets and to detect a target event. To detect a target event, we
devise a classifier of tweets based on features such as the keywords in a
tweet, the number of words, and their context. Subsequently, we produce
a probabilistic spatiotemporal model for the target event that can find the
center of the event location. We regard each Twitter user as a sensor and
apply particle filtering, which are widely used for location estimation.
The particle filter works better than other comparable methods for
estimating the locations of target events. As an application, we develop an
earthquake reporting system for use in Japan. Because of the numerous
earthquakes and the large number of Twitter users throughout the country,
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In computer forensic analysis, hundreds of thousands of files are usually
examined. Much of the data in those files consists of unstructured text,
whose analysis by computer examiners is difficult to be performed. In
this context, automated methods of analysis are of great interest. In
particular, algorithms for clustering documents can facilitate the
discovery of new and useful knowledge from the documents under
analysis. We present an approach that applies document clustering
algorithms to forensic analysis of computers seized in police
investigations. We illustrate the proposed approach by carrying out
extensive experimentation with six well-known clustering algorithms (Kmeans, K-medoids, Single Link, Complete Link, Average Link, and
CSPA) applied to five real-world datasets obtained from computers seized
in real-world investigations. Experiments have been performed with
different combinations of parameters, resulting in 16 different
instantiations of algorithms. In addition, two relative validity indexes
were used to automatically estimate the number of clusters. Related
studies in the literature are significantly more limited than our study. Our
experiments show that the Average Link and Complete Link algorithms
provide the best results for our application domain. If suitably initialized,
partitional algorithms (K-means and K-medoids) can also yield to very
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
good results. Finally, we also present and discuss several practical results
that can be useful for researchers and practitioners of forensic computing.
33.A Method for Mining Infrequent Causal Associations and Its
Application in Finding Adverse Drug Reaction Signal Pairs
Abstract:
In many real-world applications, it is important to mine causal
relationships where an event or event pattern causes certain outcomes
with low probability. Discovering this kind of causal relationships can
help us prevent or correct negative outcomes caused by their antecedents.
In this paper, we propose an innovative data mining framework and apply
it to mine potential causal associations in electronic patient data sets
where the drug-related events of interest occur infrequently. Specifically,
we created a novel interestingness measure, exclusive causal-leverage,
based on a computational, fuzzy recognition-primed decision (RPD)
model that we previously developed. On the basis of this new measure, a
data mining algorithm was developed to mine the causal relationship
between drugs and their associated adverse drug reactions (ADRs). The
algorithm was tested on real patient data retrieved from the Veterans
Affairs Medical Center in Detroit, Michigan. The retrieved data included
16,206 patients (15,605 male, 601 female). The exclusive causal-leverage
was employed to rank the potential causal associations between each of
the three selected drugs (i.e., enalapril, pravastatin, and rosuvastatin) and
3,954 recorded symptoms, each of which corresponded to a potential
ADR. The top10 drug-symptom pairs for each drug were evaluated by the
physicians on our project team. The numbers of symptoms considered as
likely real ADRs for enalapril, pravastatin, and rosuvastatin were 8, 7,
and 6, respectively. These preliminary results indicate the usefulness of
our method in finding potential ADR signal pairs for further analysis
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In comparison with hard clustering methods, in which a pattern belongs
to a single cluster, fuzzy clustering algorithms allow patterns to belong to
all clusters with differing degrees of membership. This is important in
domains such as sentence clustering, since a sentence is likely to be
related to more than one theme or topic present within a document or set
of documents. However, because most sentence similarity measures do
not represent sentences in a common metric space, conventional fuzzy
clustering approaches based on prototypes or mixtures of Gaussians are
generally not applicable to sentence clustering. This paper presents a
novel fuzzy clustering algorithm that operates on relational input data;
i.e., data in the form of a square matrix of pairwise similarities between
data objects. The algorithm uses a graph representation of the data, and
operates in an Expectation-Maximization framework in which the graph
centrality of an object in the graph is interpreted as a likelihood. Results
of applying the algorithm to sentence clustering tasks demonstrate that
the algorithm is capable of identifying overlapping clusters of
semantically related sentences, and that it is therefore of potential use in a
variety of text mining tasks. We also include results of applying the
algorithm to benchmark data sets in several other domains.
35.Crowd sourcing Predictors of Behavioral Outcomes
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
A large number of organizations today generate and share textual
descriptions of their products, services, and actions. Such collections of
textual data contain significant amount of structured information, which
remains buried in the unstructured text. While information extraction
algorithms facilitate the extraction of structured relations, they are often
expensive and inaccurate, especially when operating on top of text that
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
We focus on measuring relationships between pairs of objects in
Wikipedia whose pages can be regarded as individual objects. Two kinds
of relationships between two objects exist: in Wikipedia, an explicit
relationship is represented by a single link between the two pages for the
objects, and an implicit relationship is represented by a link structure
containing the two pages. Some of the previously proposed methods for
measuring
relationships
are
cohesion-based
methods,
which
Abstract:
One fundamental issue in todays Online Social Networks (OSNs) is to
give users the ability to control the messages posted on their own private
space to avoid that unwanted content is displayed. Up to now, OSNs
provide little support to this requirement. To fill the gap, in this paper, we
propose a system allowing OSN users to have a direct control on the
messages posted on their walls. This is achieved through a flexible rulebased system, which allows users to customize the filtering criteria to be
applied to their walls, and a Machine Learning-based soft classifier
automatically labeling messages in support of content-based filtering.
39.Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
Abstract:
We study the problem of privacy-preservation in social networks. We
consider the distributed setting in which the network data is split between
several data holders. The goal is to arrive at an anonymized view of the
unified network without revealing to any of the data holders information
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
about links between nodes that are controlled by other data holders. To
that end, we start with the centralized setting and offer two variants of an
anonymization algorithm which is based on sequential clustering (Sq).
Our algorithms significantly outperform the SaNGreeA algorithm due to
Campan and Truta which is the leading algorithm for achieving
anonymity in networks by means of clustering. We then devise secure
distributed versions of our algorithms. To the best of our knowledge, this
is the first study of privacy preservation in distributed social networks.
We conclude by outlining future research proposals in that direction.
40.Intrusion Detection Technique by using K-means, Fuzzy Neural
Network and SVM classifiers.
Abstract:
With the impending era of internet, the network security has become the
key foundation for lot of financial and business web applications.
Intrusion detection is one of the looms to resolve the problem of network
security. Imperfectness of intrusion detection systems (IDS) has given an
opportunity for data mining to make several important contributions to
the field of intrusion detection. In recent years, many researchers are
using data mining techniques for building IDS. Here, we propose a new
approach by utilizing data mining techniques such as neuro-fuzzy and
radial basis support vector machine (SVM) for helping IDS to attain
higher detection rate. The proposed technique has four major steps:
primarily, k-means clustering is used to generate different training
subsets. Then, based on the obtained training subsets, different neurofuzzy models are trained. Subsequently, a vector for SVM classification is
formed and in the end, classification using radial SVM is performed to
detect intrusion has happened or not. To illustrate the applicability and
capability of the new approach, the results of experiments on KDD CUP
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
This work deals with the approximate string search in large spatial
databases. Specically, we investigate range queries augmented with a
string similarity search predicate in both Euclidean space and road
networks. We dub this query the spatial approximate string (SAS) query.
In Euclidean space, we propose an approximate solution, the MHR-tree,
which embeds min-wise signatures into an R-tree. The min-wise
signature for an index node u keeps a concise representation of the union
of q-grams from strings under the sub-tree of u. We analyze the pruning
functionality of such signatures based on the set resemblance between the
query string and the q-grams from the sub-trees of index nodes. We also
discuss how to estimate the selectivity of a SAS query in Euclidean
space, for which we present a novel adaptive algorithm to nd balanced
partitions using both the spatial and string information stored in the tree.
For queries on road networks, we propose a novel exact method,
RSASSOL, which signicantly outperforms the baseline algorithm in
practice. The RSASSOL combines the q-gram based inverted lists and the
reference nodes based pruning. Extensive experiments on large real data
sets demonstrate the efciency and effectiveness of our approaches.
42.Preventing Private Information Inference Attacks on Social
Networks
Abstract:
Online social networks, such as Facebook, are increasingly utilized by
many people. These networks allow users to publish details about
themselves and to connect to their friends. Some of the information
revealed inside these networks is meant to be private. Yet it is possible to
use learning algorithms on released data to predict private information. In
this paper, we explore how to launch inference attacks using released
social networking data to predict private information. We then devise
three possible sanitization techniques that could be used in various
situations. Then, we explore the effectiveness of these techniques and
attempt to use methods of collective inference to discover sensitive
attributes of the data set. We show that we can decrease the effectiveness
of both local and relational classification algorithms by using the
sanitization methods we described.
43.Multiparty Access Control for Online Social Networks Model and
mechanisms
ABSTRACT:
Online social networks (OSNs) have experienced tremendous growth in
recent years and become a de facto portal for hundreds of millions of
Internet users. These OSNs offer attractive means for digital social
interactions and information sharing, but also raise a number of security
and privacy issues. While OSNs allow users to restrict access to shared
data, they currently do not provide any mechanism to enforce privacy
concerns over data associated with multiple users. To this end, we
propose an approach to enable the protection of shared data associated
with multiple users in OSNs. We formulate an access control model to
capture the essence of multiparty authorization requirements, along with a
multiparty policy specification scheme and a policy enforcement
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In many cases, competing parties who have private data may
collaboratively conduct privacy-preserving distributed data analysis
(PPDA) tasks to learn beneficial data models or analysis results. Most
often, the competing parties have different incentives. Although certain
PPDA techniques guarantee that nothing other than the final analysis
result is revealed, it is impossible to verify whether participating parties
are truthful about their private input data. Unless proper incentives are
set, current PPDA techniques cannot prevent participating parties from
modifying their private inputs. This raises the question of how to design
incentive compatible privacy-preserving data analysis techniques that
motivate participating parties to provide truthful inputs. In this paper, we
first develop key theorems, then base on these theorems, we analyze
certain important privacy-preserving data analysis tasks that could be
conducted in a way that telling the truth is the best choice for any
participating party.
SECURE COMPUTING
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
The migration to wireless network from wired network has been a global
trend in the past few decades. The mobility and scalability brought by
wireless network made it possible in many applications. Among all the
contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is
one of the most important and unique applications. On the contrary to
traditional network architecture, MANET does not require a fixed
network infrastructure; every single node works as both a transmitter and
a receiver. Nodes communicate directly with each other when they are
both within the same communication range. Otherwise, they rely on their
neighbors to relay messages. The self-configuring ability of nodes in
MANET made it popular among critical mission applications like
military use or emergency recovery. However, the open medium and wide
distribution of nodes make MANET vulnerable to malicious attackers. In
this case, it is crucial to develop efficient intrusion-detection mechanisms
to protect MANET from attacks. With the improvements of the
technology and cut in hardware costs, we are witnessing a current trend
of expanding MANETs into industrial applications. To adjust to such
trend, we strongly believe that it is vital to address its potential security
issues. In this paper, we propose and implement a new intrusion-detection
system named Enhanced Adaptive Acknowledgment (EAACK) specially
designed for MANETs. Compared to contemporary approaches, EAACK
demonstrates higher malicious-behavior-detection rates in certain
circumstances while does not greatly affect the network performances.
Abstract:
Secure distributed data storage can shift the burden of maintaining a large
number of files from the owner to proxy servers. Proxy servers can
convert encrypted files for the owner to encrypted files for the receiver
without the necessity of knowing the content of the original files. In
practice, the original files will be removed by the owner for the sake of
space efficiency. Hence, the issues on confidentiality and integrity of the
outsourced data must be addressed carefully. In this paper, we propose
two identity-based secure distributed data storage (IBSDDS) schemes.
Our schemes can capture the following properties: (1) The file owner can
decide the access permission independently without the help of the
private key generator (PKG); (2) For one query, a receiver can only
access one file, instead of all files of the owner; (3) Our schemes are
secure against the collusion attacks, namely even if the receiver can
compromise the proxy servers, he cannot obtain the owners secret key.
Although the first scheme is only secure against the chosen plaintext
attacks (CPA), the second scheme is secure against the chosen cipher text
attacks (CCA). To the best of our knowledge, it is the first IBSDDS
schemes where an access permissions is made by the owner for an exact
file and collusion attacks can be protected in the standard model.
47.Modeling the Pair-wise Key Pre-distribution Scheme in the Presence
of Unreliable Links
Abstract:
We investigate the secure connectivity of wireless sensor networks under
the random pairwise key predistribution scheme of Chan, Perrig, and
Song. Unlike recent work carried out under the assumption of full
visibility, here we assume a (simplified) communication model where
unreliable wireless links are represented as independent on/off
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Cloud security is one of most important issues that have attracted a lot of
research and development effort in past few years. Particularly, attackers
can explore vulnerabilities of a cloud system and compromise virtual
machines to deploy further large-scale Distributed Denial-of-Service
(DDoS). DDoS attacks usually involve early stage actions such as multistep
exploitation,
low
frequency
vulnerability
scanning,
and
Abstract:
An algorithm for anonymous sharing of private data among parties is
developed. This technique is used iteratively to assign these nodes ID
numbers ranging from 1 to N. This assignment is anonymous in that the
identities received are unknown to the other members of the group.
Resistance to collusion among other members is verified in an
information theoretic sense when private communication channels are
used. This assignment of serial numbers allows more complex data to be
shared and has applications to other problems in privacy preserving data
mining, collision avoidance in communications and distributed database
access. The required computations are distributed without using a trusted
central authority. Existing and new algorithms for assigning anonymous
IDs are examined with respect to trade-offs between communication and
computational requirements. The new algorithms are built on top of a
secure sum data mining operation using Newtons identities and Sturms
theorem. An algorithm for distributed solution of certain polynomials
over finite fields enhances the scalability of the algorithms. Markov chain
representations are used to find statistics on the number of iterations
required, and computer algebra gives closed form results for the
completion rates.
50.Securing Class Initialization in Java-like Languages
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
The Single sign-on (SSO) is a new authentication mechanism that enables
a legal user with a single credential to be authenticated by multiple
service providers in a distributed computer network. Recently, Chang and
Lee proposed a new SSO scheme and claimed its security by providing
well-organized security arguments. In this paper, however, we
demonstrative that their scheme is actually insecure as it fails to meet
credential privacy and soundness of authentication. Specifically, we
present two impersonation attacks. The first attack allows a malicious
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Open nature of peer-to-peer systems exposes them to malicious activity.
Building trust relationships among peers can mitigate attacks of malicious
peers. This paper presents distributed algorithms that enable a peer to
reason about trustworthiness of other peers based on past interactions and
recommendations. Peers create their own trust network in their proximity
by using local information available and do not try to learn global trust
information. Two contexts of trust, service, and recommendation contexts
are defined to measure trustworthiness in providing services and giving
recommendations. Interactions and recommendations are evaluated based
on importance, recentness, and peer satisfaction parameters. Additionally,
recommenders trustworthiness and confidence about a recommendation
are
considered
while
evaluating
recommendations.
Simulation
Abstract:
Twitter is prone to malicious tweets containing URLs for spam, phishing,
and malware distribution. Conventional Twitter spam detection schemes
utilize account features such as the ratio of tweets containing URLs and
the account creation date, or relation features in the Twitter graph. These
detection schemes are ineffective against feature fabrications or consume
much time and resources. Conventional suspicious URL detection
schemes utilize several features including lexical features of URLs, URL
redirection, HTML content, and dynamic behavior. However, evading
techniques such as time-based evasion and crawler evasion exist. In this
paper, we propose WARNINGBIRD, a suspicious URL detection system
for Twitter. Our system investigates correlations of URL redirect chains
extracted from several tweets. Because attackers have limited resources
and usually reuse them, their URL redirect chains frequently share the
same URLs. We develop methods to discover correlated URL redirect
chains using the frequently shared URLs and to determine their
suspiciousness. We collect numerous tweets from the Twitter public
timeline and build a statistical classifier using them. Evaluation results
show that our classifier accurately and efficiently detects suspicious
URLs. We also present WARNINGBIRD as a near real-time system for
classifying suspicious URLs in the Twitter stream.
54.Two tales of privacy in online social networks
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
While OSNs today provide some form of privacy controls to protect a
users shared content from other users, these controls are not sufficiently
expressive to provide fine grained protection. In this article, we introduce
Twitsper, to support fine-grained control over who sees a users
messages. Twitsper provides privacy controls to the users of Twitter today
without relying on Twitter to make changes. This is because it is a
wrapper around Twitter that enables private group communication while
preserving Twitters commercial interests. It preserves privacy both from
the Twitsper server as well as from undesired Twitsper users.
57.Combining Cryptographic Primitives to Prevent Jamming Attacks in
Wireless Networks
Abstract:
The Open Nature of wireless medium leaves an intentional interference
attack, typically referred to as jamming. This intentional interference with
wireless transmission launch pad for mounting Denial-Of- Service attack
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Firewalls have been widely deployed on the Internet for securing private
networks. A firewall checks each incoming or outgoing packet to decide
whether to accept or discard the packet based on its policy. Optimizing
firewall policies is crucial for improving network performance. Prior
work on firewall optimization focuses on either intra-firewall or inter
firewall optimization within one administrative domain where the privacy
of firewall policies is not a concern. This paper explores inter firewall
optimization across administrative domains for the first time. The key
technical challenge is that firewall policies cannot be shared across
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
firewall.
The
optimization
process
involves
cooperative
computation between the two firewalls without any party disclosing its
policy to the other. We implemented our protocol and conducted
extensive experiments. The results on real firewall policies show that our
protocol can remove as many as 49% of the rules in a firewall, whereas
the average is 19.4%. The communication cost is less than a few hundred
kilobytes. Our protocol incurs no extra online packet processing
overhead, and the offline processing time is less than a few hundred
seconds.
Networking
59.A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor
Networks
Abstract:
Given the sensitivity of the potential WSN applications and because of
resource limitations, key management emerges as a challenging issue for
WSNs. One of the main concerns when designing a key management
scheme is the network scalability. Indeed, the protocol should support a
large number of nodes to enable a large scale deployment of the network.
In this paper, we propose a new scalable key management scheme for
WSNs which provides a good secure connectivity coverage. For this
purpose, we make use of the unital design theory. We show that the basic
mapping from unitals to key pre-distribution allows us to achieve high
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
It is well known that max-weight policies based on a queue backlog index
can be used to stabilize stochastic networks, and that similar stability
results hold if a delay index is used. Using Lyapunov optimization, we
extend this analysis to design a utility maximizing algorithm that uses
explicit delay information from the head-of-line packet at each user. The
resulting policy is shown to ensure deterministic worst-case delay
guarantees and to yield a throughput utility that differs from the optimally
fair value by an amount that is inversely proportional to the delay
guarantee. Our results hold for a general class of 1-hop networks,
including packet switches
61.Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In Delay Tolerant Networks (DTNs) the core challenge is to cope with
lack of persistent connectivity and yet be able to deliver messages from
source to destination. In particular, routing schemes that leverage relays
memory and mobility are a customary solution in order to improve
message delivery delay. When large files need to be transferred from
source to destination, not all packets may be available at the source prior
to the first transmission. This motivates us to study general packet
arrivals at the source, derive performance analysis of replication based
routing policies and study their optimization under two hop routing. In
particular, we determine the conditions for optimality in terms of
probability of successful delivery and mean delay and we devise optimal
policies, so-called piecewise-threshold policies. We account for linear
block-codes and rate less random linear coding to efficiently generate
redundancy, as well as for an energy constraint in the optimization. We
numerically assess the higher efficiency of piecewise-threshold policies
compared with other policies by developing heuristic optimization of the
thresholds for all flavors of coding considered.
62.Minimum Cost Blocking Problem in Multi-path Wireless Routing
Protocols
Abstract:
We present a class of Minimum Cost Blocking (MCB) problems in
Wireless Mesh Networks (WMNs) with multi-path wireless routing
protocols. We establish the provable superiority of multi-path routing
protocols over conventional protocols against blocking, node-isolation
and network-partitioning type attacks. In our attack model, an adversary
is considered successful if he is able to capture/isolate a subset of nodes
such that no more than a certain amount of traffic from source nodes
reaches the gateways. Two scenarios, viz. (a) low mobility for network
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
nodes, and (b) high degree of node mobility, are evaluated. Scenario (a) is
proven to be NP-hard and scenario (b) is proven to be #P-hard for the
adversary to realize the goal. Further, several approximation algorithms
are presented which show that even in the best case scenario it is at least
exponentially hard for the adversary to optimally succeed in such
blocking-type attacks. These results are verified through simulations
which demonstrate the robustness of multi-path routing protocols against
such attacks. To the best of our knowledge, this is the first work that
theoretically evaluates the attack-resiliency and performance of multipath protocols with network node mobility.
Abstract:
Wireless sensor networks are vulnerable to the node clone, and several
distributed protocols have been proposed to detect this attack. However,
they require too strong assumptions to be practical for large-scale,
randomly deployed sensor networks. In this paper, we propose two novel
node clone detection protocols with different tradeoffs on network
conditions and performance. The first one is based on a distributed hash
table (DHT), by which a fully decentralized, key-based caching and
checking system is constructed to catch cloned nodes effectively. The
protocol performance on efficient storage consumption and high security
level is theoretically deducted through a probability model, and the
resulting equations, with necessary adjustments for real application, are
supported by the simulations. Although the DHT-based protocol incurs
similar communication cost as previous approaches, it may be considered
a little high for some scenarios. To address this concern, our second
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Opportunistic mobile ad hoc networks (MANETs) are a special class of
sparse and disconnected MANETs where data communication exploits
sporadic contact opportunities among nodes. We consider opportunistic
MANETs where nodes move independently at random over a square of
the plane. Nodes exchange data if they are at a distance at most within
each other, where is the node transmission radius. The flooding time is
the number of time-steps required to broadcast a message from a source
node to every node of the network. Flooding time is an important
measure of how fast information can spread in dynamic networks. We
derive the first upper bound on the flooding time, which is a decreasing
function of the maximal speed of the nodes. The bound holds with high
probability, and it is nearly tight. Our bound shows that, thanks to node
mobility, even when the network is sparse and disconnected, information
spreading can be fast.
65.Back-Pressure-Based Packet-by-Packet Adaptive Routing in
Communication Networks
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
The problem of efficiently and securely broadcasting to a remote
cooperative group occurs in many newly emerging networks. A major
challenge in devising such systems is to overcome the obstacles of the
potentially limited communication from the group to the sender, the
unavailability of a fully trusted key generation center, and the dynamics
of the sender. The existing key management paradigms cannot deal with
these challenges effectively. In this paper, we circumvent these obstacles
and close this gap by proposing a novel key management paradigm. The
new paradigm is a hybrid of traditional broadcast encryption and group
key agreement. In such a system, each member maintains a single
public/secret key pair. Upon seeing the public keys of the members, a
remote sender can securely broadcast to any intended subgroup chosen in
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Participatory sensing is an emerging computing paradigm that enables the
distributed collection of data by self-selected participants. It allows the
increasing number of mobile phone users to share local knowledge
acquired by their sensor-equipped devices (e.g., to monitor temperature,
pollution level, or consumer pricing information). While research
initiatives and prototypes proliferate, their real-world impact is often
bounded to comprehensive user participation. If users have no incentive,
or feel that their privacy might be endangered, it is likely that they will
not participate. In this article, we focus on privacy protection in
participatory sensing and introduce a suitable privacy-enhanced
infrastructure. First, we provide a set of definitions of privacy
requirements for both data producers (i.e., users providing sensed
information) and consumers (i.e., applications accessing the data). Then
we propose an efficient solution designed for mobile phone users, which
Abstract:
In view of the fast-growing Internet traffic, this paper propose a
distributed traffic management framework, in which routers are deployed
with intelligent data rate controllers to tackle the traffic mass. Unlike
other explicit traffic control protocols that have to estimate network
parameters (e.g., link latency, bottleneck bandwidth, packet loss rate, or
the number of flows) in order to compute the allowed source sending rate,
our fuzzy-logic-based controller can measure the router queue size
directly; hence it avoids various potential performance problems arising
from parameter estimations while reducing much consumption of
computation and memory resources in routers. As a network parameter,
the queue size can be accurately monitored and used to proactively decide
if action should be taken to regulate the source sending rate, thus
increasing the resilience of the network to traffic congestion. The
communication QoS (Quality of Service) is assured by the good
performances of our scheme such as max-min fairness, low queueing
delay and good robustness to network dynamics. Simulation results and
comparisons have verified the effectiveness and showed that our new
traffic management scheme can achieve better performances than the
existing protocols that rely on the estimation of network parameters.
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In a decentralized attribute-based encryption (ABE) system, any party can
act as an authority by creating a public key and issuing private keys to
different users that reflect their attributes without any collaboration. Such
an ABE scheme can eliminate the burden of heavy communication and
collaborative computation in the setup phase of multi-authority ABE
schemes, thus is considered more preferable. Recently in IEEE Trans.
Parallel Distrib. Syst., Han et al. [3] proposed an interesting privacypreserving decentralized key-policy ABE scheme, which was claimed to
achieve better privacy for users and to be provably secure in the standard
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Most
IP-geolocation
mapping
schemes
take
delay-measurement
Abstract:
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Video sharing has been an increasingly popular application in online
social networks (OSNs). However, its sustainable development is
severely hindered by the intrinsic limit of the client/server architecture
deployed in current OSN video systems, which is not only costly in terms
of server bandwidth and storage but also not scalable with the soaring
amount of users and video content. The peer-assisted Video-on-Demand
(VoD) technique, in which participating peers assist the server in
delivering video content has been proposed recently. Unfortunately,
videos can only be disseminated through friends in OSNs. Therefore,
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
current VoD works that explore clustering nodes with similar interests or
close location for high performance are suboptimal, if not entirely
inapplicable, in OSNs. Based on our long-term real-world measurement
of over 1,000,000 users and 2,500 videos on Facebook, we propose
SocialTube, a novel peer-assisted video sharing system that explores
social relationship, interest similarity, and physical location between
peers in OSNs. Specifically, SocialTube incorporates four algorithms: a
social network (SN)-based P2P overlay construction algorithm, a SNbased chunk prefetching algorithm, chunk delivery and scheduling
algorithm, and a buffer management algorithm. Experimental results from
a prototype on PlanetLab and an event-driven simulator show that
SocialTube can improve the quality of user experience and system
scalability over current P2P VoD techniques.
74.A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
Abstract:
Interconnected systems, such as Web servers, database servers, cloud
computing servers etc, are now under threads from network attackers. As
one of most common and aggressive means, Denial-of-Service (DoS)
attacks cause serious impact on these computing systems. In this paper,
we present a DoS attack detection system that uses Multivariate
Correlation Analysis (MCA) for accurate network traffic characterization
by extracting the geometrical correlations between network traffic
features. Our MCA-based DoS attack detection system employs the
principle of anomaly-based detection in attack recognition. This makes
our solution capable of detecting known and unknown DoS attacks
effectively by learning the patterns of legitimate network traffic only.
Furthermore, a triangle-area-based technique is proposed to enhance and
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
MOBILE COMPUTING
75.DCIM: Distributed Cache Invalidation Method for Maintaining
Cache Consistency in Wireless Mobile Networks
Abstract:
This paper proposes distributed cache invalidation mechanism (DCIM), a
client-based cache consistency scheme that is implemented on top of a
previously proposed architecture for caching data items in mobile ad hoc
networks (MANETs), namely COACS, where special nodes cache the
queries and the addresses of the nodes that store the responses to these
queries. We have also previously proposed a server-based consistency
scheme, named SSUM, whereas in this paper, we introduce DCIM that is
totally client-based. DCIM is a pull-based algorithm that implements
adaptive time to live (TTL), piggybacking, and prefetching, and provides
near strong consistency capabilities. Cached data items are assigned
adaptive TTL values that correspond to their update rates at the data
source, where items with expired TTL values are grouped in validation
requests to the data source to refresh them, whereas unexpired ones but
with high request rates are prefetched from the server. In this paper,
DCIM is analyzed to assess the delay and bandwidth gains (or costs)
when compared to polling every time and push-based schemes. DCIM
was also implemented using ns2, and compared against client-based and
server-based schemes to assess its performance experimentally. The
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
consistency ratio, delay, and overhead traffic are reported versus several
variables, where DCIM showed to be superior when compared to the
other systems.
76.Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
Abstract:
A growing number of ad hoc networking protocols and location-aware
services require that mobile nodes learn the position of their neighbors.
However, such a process can be easily abused or disrupted by adversarial
nodes. In absence of a priori trusted nodes, the discovery and verification
of neighbor positions presents challenges that have been scarcely
investigated in the literature. In this paper, we address this open issue by
proposing a fully distributed cooperative solution that is robust against
independent and colluding adversaries, and can be impaired only by an
overwhelming presence of adversaries. Results show that our protocol
can thwart more than 99 percent of the attacks under the best possible
conditions for the adversaries, with minimal false positive rates.
77.Efficient Rekeying Framework for Secure Multicast with DiverseSubscription-Period Mobile Users
Abstract:
Group key management (GKM) in mobile communication is important to
enable access control for a group of users. A major issue in GKM is how
to minimize the communication cost for group rekeying. To design the
optimal GKM, researchers have assumed that all group members have the
same leaving probabilities and that the tree is balanced and complete to
simplify analysis. In the real mobile computing environment, however,
these assumptions are impractical and may lead to a large gap between
the impractical analysis and the measurement in real-life situations, thus
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
In certain applications, the locations of events reported by a sensor
network need to remain anonymous. That is, unauthorized observers must
be unable to detect the origin of such events by analyzing the network
traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks,
with variety of techniques based on different adversarial assumptions
being proposed. In this work, we present a new framework for modeling,
analyzing, and evaluating anonymity in sensor networks. The novelty of
the proposed framework is twofold: first, it introduces the notion of
interval indistinguishability and provides a quantitative measure to
model anonymity in wireless sensor networks; second, it maps source
anonymity to the statistical problem of binary hypothesis testing with
nuisance parameters. We then analyze existing solutions for designing
anonymous sensor networks using the proposed model. We show how
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Wireless Sensor Networks (WSNs) are increasingly used in dataintensive applications such as microclimate monitoring, precision
agriculture, and audio/video surveillance. A key challenge faced by dataintensive WSNs is to transmit all the data generated within an
applications lifetime to the base station despite the fact that sensor nodes
have limited power supplies. We propose using lowcost disposable
mobile relays to reduce the energy consumption of data-intensive WSNs.
Our approach differs from previous work in two main aspects. First, it
does not require complex motion planning of mobile nodes, so it can be
implemented on a number of low-cost mobile sensor platforms. Second,
we integrate the energy consumption due to both mobility and wireless
transmissions into a holistic optimization framework. Our framework
consists of three main algorithms. The first algorithm computes an
optimal routing tree assuming no nodes can move. The second algorithm
improves the topology of the routing tree by greedily adding new nodes
exploiting mobility of the newly added nodes. The third algorithm
improves the routing tree by relocating its nodes without changing its
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Todays location-sensitive service relies on users mobile device to
determine the current location. This allows malicious users to access a
restricted resource or provide bogus alibis by cheating on their locations.
To address this issue, we propose A Privacy-Preserving Location proof
Updating System (APPLAUS) in which co-located Bluetooth enabled
mobile devices mutually generate location proofs and send updates to a
location proof server. Periodically changed pseudonyms are used by the
mobile devices to protect source location privacy from each other, and
from the untrusted location proof server. We also develop user-centric
location privacy model in which individual users evaluate their location
privacy levels and decide whether and when to accept the location proof
requests. In order to defend against colluding attacks, we also present
betweens ranking-based and correlation clustering-based approaches for
outlier detection. APPLAUS can be implemented with existing network
infrastructure, and can be easily deployed in Bluetooth enabled mobile
devices with little computation or power cost. Extensive experimental
results show that APPLAUS can effectively provide location proofs,
significantly preserve the source location privacy, and effectively detect
colluding attacks.
Abstract:
This paper proposes a novel temporal knowledge representation and
learning framework to perform large-scale temporal signature mining of
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Service-Oriented Computing (SOC) is emerging as a paradigm for
developing distributed applications. A critical issue of utilizing SOC is to
have a scalable, reliable, and robust service discovery mechanism.
However, traditional service discovery methods using centralized
registries can easily suffer from problems such as performance bottleneck
and vulnerability to failures in large scalable service networks, thus
functioning abnormally. To address these problems, this paper proposes a
peer-to-peer-based decentralized service discovery approach named
Chord4S. Chord4S utilizes the data distribution and lookup capabilities of
the popular Chord to distribute and discover services in a decentralized
manner. Data availability is further improved by distributing published
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
With the proliferation of web services, effective QoS-based approach to
service recommendation is becoming more and more important. Although
service recommendation has been studied in the recent literature, the
performance of existing ones is not satisfactory, since 1) previous
approaches fail to consider the QoS variance according to users
locations; and 2) previous recommender systems are all black boxes
providing limited information on the performance of the service
candidates. In this paper, we propose a novel collaborative filtering
algorithm designed for large-scale web service recommendation.
Different from previous work, our approach employs the characteristic of
QoS and achieves considerable improvement on the recommendation
accuracy. To help service users better understand the rationale of the
recommendation and remove some of the mystery, we use a
recommendation visualization technique to show how a recommendation
is grouped with other choices. Comprehensive experiments are conducted
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
using more than 1.5 million QoS records of real-world web service
invocations. The experimental results show the efficiency and
effectiveness of our approach.
85.Privacy-Enhanced Web Service Composition
Abstract:
Data as a Service (DaaS) builds on service-oriented technologies to
enable fast access to data resources on the Web. However, this paradigm
raises several new privacy concerns that traditional privacy models do not
handle. In addition, DaaS composition may reveal privacy-sensitive
information. In this paper, we propose a formal privacy model in order to
extend DaaS descriptions with privacy capabilities. The privacy model
allows a service to define a privacy policy and a set of privacy
requirements. We also propose a privacy-preserving DaaS composition
approach allowing verifying the compatibility between privacy
requirements and policies in DaaS composition. We propose a negotiation
mechanism that makes it possible to dynamically reconcile the privacy
capabilities of services when incompatibilities arise in a composition. We
validate the applicability of our proposal through a prototype
implementation and a set of experiments.
SOFTWARE ENGINEERING
86.Whole Test Suite Generation
Abstract:
Not all bugs lead to program crashes, and not always is there a formal
specification to check the correctness of a software tests outcome. A
common scenario in software testing is therefore that test data are
generated, and a tester manually adds test oracles. As this is a difficult
task, it is important to produce small yet representative test sets, and this
representativeness is typically measured using code coverage. There is,
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
MULTIMEDIA
87.Understanding the External Links of Video Sharing Sites:
Measurement and Analysis
Abstract:
Recently, many video sharing sites provide external links so that their
video or audio contents can be embedded into external web sites. For
example, users can copy the embedded URLs of the videos of YouTube
and post the URL links on their own blogs. Clearly, the purpose of such
function is to increase the distribution of the videos and the associated
advertisement. Does this function fulfill its purpose and what is the
quantification? In this paper, we provide a comprehensive measurement
study and analysis on these external links to answer these two questions.
With the traces collected from two major video sharing sites, YouTube
and Youku of China, we show that the external links have various impacts
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
on the popularity of the video sharing sites. More specifically, for videos
that have been uploaded for eight months in Youku, around 15% of views
can come from external links. Some contents are densely linked. For
example, comedy videos can attract more than 800 external links on
average. We also study the relationship between the external links and the
internal links. We show that there are correlations; for example, if a video
is popular itself, it is likely to have a large number of external links.
Another observation we find is that the external links usually have a
higher impact on Youku than that of YouTube. We conjecture that it is
more likely that the external links have higher impact for a regional site
than a worldwide site.
88.Learn and Personalized Image Search
Abstract:
Increasingly developed social sharing websites, like Flickr and Youtube,
allow users to create, share, annotate and comment medias. The largescale user-generated meta-data not only facilitate users in sharing and
organizing multimedia content, but provide useful information to improve
media retrieval and management. Personalized search serves as one of
such examples where the web search experience is improved by
generating the returned list according to the modified user search intents.
In this paper, we exploit the social annotations and propose a novel
framework simultaneously considering the user and query relevance to
learn to personalized image search. The basic premise is to embed the
user preference and query-related search intent into user-specific topic
spaces. Since the users original annotation is too sparse for topic
modeling, we need to enrich users annotation pool before user-specific
topic spaces construction. The proposed framework contains two
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
SERVICE COMPUTING
89.Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
Abstract:
The multihop routing in wireless sensor networks (WSNs) offers little
protection
against
identity
deception
through
replaying
routing
Abstract:
The open nature of the wireless medium leaves it vulnerable to
intentional interference attacks, typically referred to as jamming. This
intentional interference with wireless transmissions can be used as a
launch pad for mounting Denial-of-Service attacks on wireless networks.
Typically, jamming has been addressed under an external threat model.
However, adversaries with internal knowledge of protocol specifications
and network secrets can launch low-effort jamming attacks that are
difficult to detect and counter. In this work, we address the problem of
selective jamming attacks in wireless networks. In these attacks, the
adversary is active only for a short period of time, selectively targeting
messages of high importance. We illustrate the advantages of selective
jamming in terms of network performance degradation and adversary
effort by presenting two case studies; a selective attack on TCP and one
on routing. We show that selective jamming attacks can be launched by
performing real-time packet classification at the physical layer. To
mitigate these attacks, we develop three schemes that prevent real-time
packet classification by combining cryptographic primitives with
physical-layer attributes. We analyze the security of our methods and
evaluate their computational and communication overhead.
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Mobile Ad hoc Networks (MANET) have been highly vulnerable to
attacks due to the dynamic nature of its network infrastructure. Among
these attacks, routing attacks have received considerable attention since it
could cause the most devastating damage to MANET. Even though there
exist several intrusion response techniques to mitigate such critical
attacks, existing solutions typically attempt to isolate malicious nodes
based on binary or nave fuzzy response decisions. However, binary
responses may result in the unexpected network partition, causing
additional damages to the network infrastructure, and nave fuzzy
responses could lead to uncertainty in countering routing attacks in
MANET. In this paper, we propose a risk-aware response mechanism to
systematically cope with the identified routing attacks. Our risk-aware
approach is based on an extended Dempster-Shafer mathematical theory
of evidence introducing a notion of importance factors. In addition, our
experiments demonstrate the effectiveness of our approach with the
consideration of several performance metrics.
92.DoubleGuard: Detecting Intrusions in Multitier Web Applications
Abstract:
Internet services and applications have become an inextricable part of
daily life, enabling communication and the management of personal
information from anywhere. To accommodate this increase in application
and data complexity, web services have moved to a multitier design
wherein the web server runs the application front-end logic and data are
outsourced to a database or file server. In this paper, we present Double
Guard, an IDS system that models the network behavior of user sessions
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
across both the front-end web server and the back-end database. By
monitoring both web and subsequent database requests, we are able to
ferret out attacks that independent IDS would not be able to identify.
Furthermore, we quantify the limitations of any multitier IDS in terms of
training sessions and functionality coverage. We implemented Double
Guard using an Apache web server with MySQL and lightweight
virtualization. We then collected and processed real-world traffic over a
15-day period of system deployment in both dynamic and static web
applications. Finally, using Double Guard, we were able to expose a wide
range of attacks with 100 percent accuracy while maintaining 0 percent
false positives for static web services and 0.6 percent false positives for
dynamic web services.
Image Processing
93.Adaptive Membership Functions for Hand-Written Character
Recognition by Voronoi-based Image Zoning
Abstract:
In the field of hand-written character recognition, image zoning is a
widespread technique for feature extraction since it is rightly considered
able to cope with hand-written pattern variability. As a matter of fact, the
problem of zoning design has attracted many researchers that have
proposed several image zoning topologies, according to static and
dynamic strategies. Unfortunately, little attention has been paid so far to
the role of feature-zone membership functions, that define the way in
which a feature influences different zones of the zoning method. The
results is that the membership functions defined to date follow nonadaptive, global approaches that are unable to model local information on
feature distributions. In this paper, a new class of zone-based membership
functions with adaptive capabilities is introduced and its effectiveness is
shown. The basic idea is to select, for each zone of the zoning method,
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Cloud Computing
94.A Gossip Protocol for Dynamic Resource Management in Large
Cloud Environments
Abstract:
We address the problem of dynamic resource management for a largescale cloud environment. Our contribution includes outlining a distributed
middleware architecture and presenting one of its key elements: a gossip
protocol that (1) ensures fair resource allocation among sites/applications,
(2) dynamically adapts the allocation to load changes and (3) scales both
in the number of physical machines and sites/applications. We formalize
the resource allocation problem as that of dynamically maximizing the
cloud utility under CPU and memory constraints. We first present a
protocol that computes an optimal solution without considering memory
constraints and prove correctness and convergence properties. Then, we
extend that protocol to provide an efficient heuristic solution for the
complete problem, which includes minimizing the cost for adapting an
allocation. The protocol continuously executes on dynamic, local input
and does not require global synchronization, as other proposed gossip
protocols do. We evaluate the heuristic protocol through simulation and
find its performance to be well-aligned with our design goals.
Abstract:
A wireless sensor network can get separated into multiple connected
components due to the failure of some of its nodes,which is called a
cut. In this article we consider the problem of detecting cuts by the
remaining nodes of a wireless sensor network.We propose an algorithm
that allows (i) every node to detect when the connectivity to a specially
designated node has been lost,and (ii) one or more nodes (that are
connected to the special node after the cut) to detect the occurrence of the
cut. The algorithm is distributed and asynchronous: every node needs to
communicate with only those nodes that are within its communication
range. The algorithm is based on the iterative computation of a fictitious
electrical potential of the nodes. The convergence rate of the underlying
iterative scheme is independent of the size and structure of the network.
Networking
98.Denial of Service Attacks in Wireless Networks: The Case of
Jammers
Abstract:
The shared nature of the medium in wireless networks makes it easy for
an adversary to launch a Wireless Denial of Service (WDoS) attack.
Recent studies, demonstrate that such attacks can be very easily
accomplished using off-the shelf equipment. To give a simple example, a
malicious node can continually transmit a radio signal in order to block
any legitimate access to the medium and/or interfere with reception. This
act is called jamming and the malicious nodes are referred to as jammers.
Jamming techniques vary from simple ones based on the continual
transmission of interference signals, to more sophisticated attacks that
aim at exploiting vulnerabilities of the particular protocol used. In this
survey, we present a detailed up-to-date discussion on the jamming
attacks recorded in the literature. We also describe various techniques
proposed for detecting the presence of jammers. Finally, we survey
numerous mechanisms which attempt to protect the network from
jamming attacks. We conclude with a summary and by suggesting future
directions.
99.Optimal Bandwidth Assignment for Multiple-Description-Coded
Video
Abstract:
In video streaming over multicast network, user bandwidth requirement is
often heterogeneous possibly with orders of magnitude difference (say,
from hundreds of kb/s for mobile devices to tens of Mb/s for highdefinition TV). Multiple descriptions coding (MDC) can be used to
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Mobile Computing
101.Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
Abstract:
While many protocols for sensor network security provide confidentiality
for the content of messages, contextual information usually remains
exposed. Such contextual information can be exploited by an adversary to
derive sensitive information such as the locations of monitored objects
and data sinks in the field. Attacks on these components can significantly
undermine any network application. Existing techniques defend the
leakage of location information from a limited adversary who can only
observe network traffic in a small region. However, a stronger adversary,
the global eavesdropper, is realistic and can defeat these existing
techniques. This paper first formalizes the location privacy issues in
sensor networks under this strong adversary model and computes a lower
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Several
anonymization
techniques,
such
as
generalization
and
of
information,
especially
for
high
dimensional
data.
confirm
that
slicing
preserves
better
utility
than
IMAGE PROCESSING
111. Linear Distance Coding for Image Classification
112. Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition
113. Log-Gabor Filters for Image-Based Vehicle Verification
114. Noise Reduction Based on Partial-Reference, Dual-Tree
Complex Wavelet Transform Shrinkage
115. Query-Adaptive Image Search With Hash Codes
116. Regional Spatially Adaptive Total Variation Super-Resolution
With Spatial Information Filtering and Clustering
117. Revealing the Traces of JPEG Compression Anti-Forensics
118. Reversible Data Hiding With Optimal Value Transfer
119. Reversible Watermarking Based on Invariant Image
Classification and Dynamic Histogram Shifting
120. Robust Hashing for Image Authentication Using Zernike
Moments and Local Features
121. Scene Text Detection via Connected Component Clustering and
Non- text Filtering
122. Robust Face Recognition for Uncontrolled Pose and Illumination
Changes
Face recognition has made significant advances in the last decade,
but robust commercial applications are still lacking. Current
authentication/identification applications are limited to controlled
settings, e.g., limited pose and illumination changes, with the user usually
aware of being screened and collaborating in the process. Among others,
pose and illumination changes are limited. To address challenges from
looser restrictions, this paper proposes a novel framework for real-world
face recognition in uncontrolled settings named Face Analysis for
Commercial Entities (FACE). Its robustness comes from normalization
(correction) strategies to address pose and illumination variations. In
addition, two separate image quality indices quantitatively assess pose
and illumination changes for each biometric query, before submitting it to
the classifier. Samples with poor quality are possibly discarded or
undergo a manual classification or, when possible, trigger a new capture.
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
are written in different languages, and use different fonts; some plates
may have a single color background and others have background images.
The license plates can be partially occluded by dirt, lighting, and towing
accessories on the car.
130. Context-Based Hierarchical Unequal Merging for SAR Image
Segmentation
This paper presents an image segmentation method named
Context-based Hierarchical Unequal Merging for Synthetic aperture radar
(SAR) Image Segmentation (CHUMSIS), which uses superpixels as the
operation units instead of pixels. Based on the Gestalt laws, three rules
that realize a new and natural way to manage different kinds of features
extracted from SAR images are proposed to represent superpixel context.
The rules are prior knowledge from cognitive science and serve as topdown constraints to globally guide the superpixel merging. The features,
including brightness, texture, edges, and spatial information, locally
describe the superpixels of SAR images and are bottom-up forces. While
merging superpixels, a hierarchical unequalmerging algorithm is
designed, which includes two stages: 1) coarse merging stage and 2) fine
merging stage. The merging algorithm unequally allocates computation
resources so as to spend less running time in the superpixels without
ambiguity and more running time in the superpixels with ambiguity.
131. Context-Dependent Logo Matching and Recognition
We contribute, through this paper, to the design of a novel
variational framework able to match and recognize multiple instances of
multiple reference logos in image archives. Reference logos and test
images are seen as constellations of local features (interest points,
regions, etc.) and matched by minimizing an energy function mixing: 1) a
fidelity term that measures the quality of feature matching, 2) a
neighborhood criterion that captures feature co-occurrence/geometry, and
3) a regularization term that controls the smoothness of the matching
solution.
132. Human Detection in Images via Piecewise Linear Support Vector
Machines
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
aim of this paper is to design the enhanced secure algorithm which uses
both steganography using Genetic Algorithm and Visual Cryptography to
ensure improved security and reliability.
136. Human Skeleton Identification Methods
Uncomfortable Light from a Digital Projector
to
Reduce
warping the images. The proposed approach results in reduced time and
computational when compared to existing methods.
138. Vertical-Edge-Based Car-License-Plate Detection Method
This paper proposes a fast method for car-licenseplate detection
(CLPD) and presents three main contributions. The first contribution is
that we propose a fast vertical edge detection algorithm (VEDA) based on
the contrast between the grayscale values, which enhances the speed of
the CLPD method. After binarizing the input image using adaptive
thresholding (AT), an unwanted-line elimination algorithm (ULEA) is
proposed to enhance the image, and then, the VEDA is applied. The
second contribution is that our proposed CLPD method processes verylow-resolution images taken by a web camera. After the vertical edges
have been detected by the VEDA, the desired plate details based on color
information are highlighted. Then, the candidate region based on
statistical and logical operations will be extracted. Finally, an LP is
detected. The third contribution is that we compare the VEDA to the
Sobel operator in terms of accuracy, algorithm complexity, and
processing time.
Bio-Medical Based Image Processing
139. Lossless medical image compression by IWT
The proposed work is to compress the medical data without any
loss(i.e. lossless). Medical information is either in multidimensional or
multi-resolution form, this creates enormous amount of data. Retrieval,
Efficient storage, management and transmission of this voluminous data
are highly complex. This technique combines integer transforms and
JPEGLS Prediction to enhance the performance of lossless compression.
140. Analyzing Macular Edema In Diabetic Patients
Diabetic macular edema (DME) is an advanced symptom of
diabetic retinopathy and can lead to irreversible vision loss. In this paper,
a two-stage methodology for the detection and classification of DME
severity from color fundus images is proposed. DME detection is carried
out via a supervised learning approach using the normal fundus images. A
feature extraction technique is introduced to capture the global
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
ANDROID
1. T-Drive: Enhancing Driving Directions with Taxi Drivers
Intelligence
Abstract
This paper presents a smart driving direction system leveraging the
intelligence of experienced drivers. In this system, GPS-equipped
taxis are employed as mobile sensors probing the traffic rhythm of
a city and taxi drivers intelligence in choosing driving directions in
the physical world. We propose a time-dependent landmark graph
to model the dynamic traffic pattern as well as the intelligence of
experienced drivers so as to provide a user with the practically
fastest route to a given destination at a given departure time. Then,
a Variance-Entropy-Based Clustering approach is devised to
estimate the distribution of travel time between two landmarks in
different time slots. Based on this graph, we design a two-stage
routing algorithm to compute the practically fastest and customized
route for end users. We build our system based on a real-world
trajectory data set generated by over 33,000 taxis in a period of
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Recommendation techniques are very important in the fields of Ecommerce and other Web-based services. One of the main
difficulties is dynamically providing high-quality recommendation
on sparse data. In this paper, a novel dynamic personalized
recommendation algorithm is proposed, in which information
contained in both ratings and profile contents are utilized by
exploring latent relations between ratings, a set of dynamic features
are designed to describe user preferences in multiple phases, and
finally a recommendation is made by adaptively weighting the
features. Experimental results on public datasets show that the
proposed algorithm has satisfying performance.
3. Spatial Query Integrity with Voronoi Neighbors
Abstract:
With the popularity of location-based services and the abundant
usage of smart phones and GPS-enabled devices, the necessity of
outsourcing spatial data has grown rapidly over the past few years.
Meanwhile, the fast a rising trend of cloud storage and cloud
computing services has provided a flexible and cost-effective
platform for hosting data from businesses and individuals, further
enabling many location-based applications. Nevertheless, in this
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
This paper aims to present a system that illustrates the social nature
of a human being the need to be always in touch with family and
friends taking into account facilities available on Android
platform. The role of this application is to create a social network
in which the users are being alerted when their friends are around.
This gives them the possibility to set up a meeting or to avoid one.
The users have the possibility to check in some locations and allow
their friends to follow their activity. Taking into account the
security of the users, we included in the facilities of the application
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
Abstract:
Caching valid regions of spatial queries at mobile clients is
effective in reducing the number of queries submitted by mobile
clients and query load on the server. However, mobile clients suffer
from longer waiting time for the server to compute valid regions.
We propose in this paper a proxy-based approach to continuous
nearest-neighbor (NN) and window queries. The proxy creates
estimated valid regions (EVRs) for mobile clients by exploiting
spatial and temporal locality of spatial queries. For NN queries, we
devise two new algorithms to accelerate EVR growth, leading the
proxy to build effective EVRs even when the cache size is small.
On the other hand, we propose to represent the EVRs of window
queries in the form of vectors, called estimated window vectors
(EWVs), to achieve larger estimated valid regions. This novel
representation and the associated creation algorithm result in more
effective EVRs of window queries. In addition, due to the distinct
characteristics, we use separate index structures, namely EVR-tree
and grid index, for NN queries and window queries, respectively.
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
ABSTRACT:
We propose a personalized mobile search engine (PMSE) that
captures the users preferences in the form of concepts by mining
their click through data. Due to the importance of location
information in mobile search, PMSE classifies these concepts into
content concepts and location concepts. In addition, users
locations (positioned by GPS) are used to supplement the location
concepts in PMSE. The user preferences are organized in an
ontology-based, multifaceted user profile, which are used to adapt
a personalized ranking function for rank adaptation of future search
results. To characterize the diversity of the concepts associated
with a query and their relevance to the users need, four entropies
are introduced to balance the weights between the content and
location facets. Based on the client-server model, we also present a
detailed architecture and design for implementation of PMSE. In
our design, the client collects and stores locally the click through
data to protect privacy, whereas heavy tasks such as concept
extraction, training, and re-ranking are performed at the PMSE
server. Moreover, we address the privacy issue by restricting the
information in the user profile exposed to the PMSE server with
two privacy parameters. We prototype PMSE on the Google
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
ABSTRACT:
Smart phones are nowadays equipped with a number of sensors,
such as WiFi, GPS, accelerometers, etc. This capability allows
smart phone users to easily engage in crowd sourced computing
services, which contribute to the solution of complex problems in a
distributed manner. In this work, we leverage such a computing
paradigm to solve efficiently the following problem: comparing a
query trace Q against a crowd of traces generated and stored on
distributed smart phones. Our proposed framework, coined Smart
Trace, provides an effective solution without disclosing any part
of the crowd traces to the query processor. Smart Trace, relies on
an in-situ data storage model and intelligent top-K query
processing algorithms that exploit distributed trajectory similarity
measures, resilient to spatial and temporal noise, in order to derive
the most relevant answers to Q. We evaluate our algorithms on both
synthetic and real workloads. We describe our prototype system
developed on the Android OS. The solution is deployed over our
own Smart Lab test bed of 25 smart phones. Our study reveals that
computations over Smart Trace result in substantial energy
conservation; in addition, results can be computed faster than
competitive approaches.
8. Twitsper: Tweeting Privately
ABSTRACT:
While OSNs today provide some form of privacy controls to
protect a users shared content from other users, these controls are
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
ABSTRACT:
Android based Smartphone are now a days getting more
popularity. With the use of Smartphone user must always concern
about the security breaching and malicious attacks. Here we
introduce an approach for proactive malware detection working by
abstraction of program behaviors.
approaches
to
categories,
based
upon
the detection
principles,
ABSTRACT:
Smart phones are becoming enriched with confidential information
due to their powerful computational capabilities and attractive
communications features. The Android smart phone is one of the
most widely used platforms by businesses and users alike. This is
partially because Android smart phones use the free, open-source
Linux as the underlying operating system, which allows
development of applications by any software developer. This
research study aims to explore security risks associated with the
use of Android smart phones and the sensitive information they
contain; the researcher devised a survey questionnaire to
investigate and further understand security threats targeting
Android smart phones. The survey also intended to study the scope
of malware attacks targeting Android phones and the effectiveness
of existing defense measures. The study surveyed the average
Android users as the target population to understand how they
perceive security and what security controls they use to protect
their smart phones.
11.Secure
Encounter-based
Mobile
Social
Networks:
ABSTRACT:
Encounter-based social networks and encounter-based systems link
users who share a location at the same time, as opposed to the
traditional social network paradigm of linking users who have an
offline friendship. This new approach presents challenges that are
fundamentally different from those tackled by previous social
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
FTP: A Case
Study
of
Migrating
Traditional
ABSTRACT:
The cloud computing is growing rapidly for it offers on-demand
computing power and capacity. The power of cloud enables
dynamic scalability of applications facing various business
requirements. However, challenges arise when considering the
Mindsoft: 2nd Floor, 2nd Main, Service Road, Vijayanagara, Bangalore-40.
Landmark: Near Hotel New Santhi Sagar or BSVP School
ABSTRACT:
Policy based management is a very effective method to protect
sensitive information. However, the over claim of privileges is
widespread in emerging applications, including mobile applications
and social network services, because the applications users
involved in policy administration have little knowledge of policy
based management. The over claim can be leveraged by malicious
applications, then lead to serious privacy leakages and financial
loss. To resolve this issue, this paper proposes a novel policy
administration mechanism, referred to as Collaborative Policy
Administration
(CPA for
short),
to
simplify
the
policy
ABSTRACT:
Personal health record (PHR) is an emerging patient-centric model
of health information exchange, which is often outsourced to be
stored at a third party, such as cloud providers. However, there
have been wide privacy concerns as personal health information
could be exposed to those third party servers and to unauthorized
parties. To assure the patients control over access to their own
PHRs, it is a promising method to encrypt the PHRs before
outsourcing. Yet, issues such as risks of privacy exposure,
scalability in key management, flexible access and efficient user
revocation, have remained the most important challenges toward
achieving fine-grained, cryptographically enforced data access
control. In this paper, we propose a novel patient-centric
framework and a suite of mechanisms for data access control to
PHRs stored in semi-trusted servers. To achieve fine-grained and
scalable data access control for PHRs, we leverage attribute based
encryption (ABE) techniques to encrypt each patients PHR file.
Different from previous works in secure data outsourcing, we focus
on the multiple data owner scenario, and divide the users in the
PHR system into multiple security domains that greatly reduces the
key management complexity for owners and users. A high degree
of patient privacy is guaranteed simultaneously by exploiting
multi-authority
ABE.
Our
scheme
also
enables
dynamic
ABSTRACT:
The quantitative and qualitative increase in mobile devices that
reach the average user opens more and more topics for research. In
education, m-Learning has been an interesting topic for several
years. However, the smart phones, that today display an
unprecedented mix of computing capability, connectivity and
interactivity,
leverage
new
possibilities
for
m-Learning