Features of cloud services that users' data is remotely in obscure machine is neither owned nor controlled by user. For adoption of services, from users' point of view, cloud security and arbitration are signi...
详细信息
ISBN:
(纸本)9789811031533;9789811031526
Features of cloud services that users' data is remotely in obscure machine is neither owned nor controlled by user. For adoption of services, from users' point of view, cloud security and arbitration are significant. security gap among different tiers causes privacy issues, customer concern about losing sensitive data available in a cloud computing infrastructure. Disagreement among different components of cloud can be mitigated by Online Dispute Resolution (ODR) to great extent. In this paper, we are focusing mainly on three factors, first trying to identify the customer threats, concerns and cross-border conflicts while using cloud computing. Second on ODR (Online Dispute Resolution) and its mechanisms. Finally on required regulatory framework between consumer, industry, and geographic boundaries. An accepted regulatory framework across participants/consumers/providers is currently at a premature stage but as imperative adoption to cloud computing increases across industry there will be paradigm shift in effort sooner than later to build the same.
the proceedings contain 12 papers. the special focus in this conference is on Annual privacy Forum. the topics include: Preface;the GDPR and big data: Leading the way for big genetic data?;privacyScore: Improving priv...
ISBN:
(纸本)9783319672793
the proceedings contain 12 papers. the special focus in this conference is on Annual privacy Forum. the topics include: Preface;the GDPR and big data: Leading the way for big genetic data?;privacyScore: Improving privacy and security via crowd-sourced benchmarks of websites;privacydata management and awareness for public administrations: A case study from the healthcare domain;better data Protection by Design through Multicriteria Decision Making: On False Tradeoffs Between privacy and Utility;towards a privacy-preserving reliable European identity ecosystem;forget me, forget me not - Redefining the boundaries of the right to be forgotten to address current problems and areas of criticism;a refinement approach for the reuse of privacy risk analysis results;a gamified approach to explore techniques of neutralization of threat actors in cybercrime;privacy by design data exchange between CSIRTs;mr X vs;Mr Y: the emergence of externalities in differential privacy;diffix: High-utility database anonymization;towards a principled approach for engineering privacy by design.
Some machine learning applications involve training datathat is sensitive, such as the medical histories of patients in a clinical trial. A model may inadvertently and implicitly store some of its training data;caref...
详细信息
Traffic classification, i.e. associating network traffic to the applicationthat generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D)....
详细信息
ISBN:
(纸本)9780988304536
Traffic classification, i.e. associating network traffic to the applicationthat generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). this process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source, the destination, and the nature of the communication. In this paper, leveraging a public dataset released in 2017, we provide (repeatable) classification results withthe aim of investigating to what degree the specific anonymity tool (and the traffic it hides) can be identified, when compared to the traffic of the other considered anonymity tools, using machine learning approaches based on the sole statistical features. To this end, four classifiers are trained and tested on the dataset: (i) Naive Bayes, (ii) Bayesian Network, (iii) C4.5, and (iv) Random Forest. Results show that the three considered anonymity networks (Tor, I2P, JonDonym) can be easily distinguished (with an accuracy of 99.99%), telling even the specific application generating the traffic (with an accuracy of 98.00%).
the growing adoption of distributed data processing frameworks in a wide diversity of application domains challenges end-to-end integration of properties like security, in particular when considering deployments in th...
详细信息
the SQL injection is a predominant type of attack and threat to web applications. this attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valua...
详细信息
ISBN:
(纸本)9789811031533;9789811031526
the SQL injection is a predominant type of attack and threat to web applications. this attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valuable data and automated tools on web, attackers are motivated to launch high profile attacks on targeted websites. this paper is an effort to know the current state of SQL injection attacks. Different Researchers have proposed various solutions to address SQL injection problems. In this research work, those countermeasures are identified and applied to a vulnerable application and database system, then result are illustrated.
the proceedings contain 51 papers. the topics discussed include: a run time technique for handling error in user-estimated execution times on systems processing MapReduce jobs with deadlines;the effect of workload com...
ISBN:
(纸本)9781538620748
the proceedings contain 51 papers. the topics discussed include: a run time technique for handling error in user-estimated execution times on systems processing MapReduce jobs with deadlines;the effect of workload computational demand variability on the performance of a SaaS cloud with a multi-tier SLA;a Markov-based prediction model for host load detection in live VM migration;service assignment in federated cloud environments based on multi-objective optimization of security;a JSON token-based authentication and access management schema for cloud SaaS applications;ensuring information security for Internet of things;proposal of adaptive data rate algorithm for LoRaWAN-based infrastructure;improve IoT/M2M data organization based on stream patterns;GreenCloudTax: a flexible IaaS tax approach as stimulus for green cloud computing;energy-aware mobile edge computing for low-latency visual data processing;security in lightweight network function virtualisation for federated cloud and IoT;concept for increasing security of national information technology infrastructure and private clouds;an approach to failure prediction in a cloud based environment;performance modelling and analysis of an OpenStack IaaS cloud computing platform;iDoRemind: a location-based reminder application for Android;an integrated platform for dynamic adaptation of multi-tenant single instance SaaS applications;a Raspberry Pi based scalable software defined network infrastructure for disaster relief communication;and converging mobile edge computing, fog computing, and IoT quality requirements.
the proceedings contain 39 papers. the special focus in this conference is on Computer Safety, Reliability, and security. the topics include: Making the case for safety of machine learning in highly automated driving;...
ISBN:
(纸本)9783319662831
the proceedings contain 39 papers. the special focus in this conference is on Computer Safety, Reliability, and security. the topics include: Making the case for safety of machine learning in highly automated driving;a thought experiment on evolution of assurance cases —from a logical aspect;a thought experiment on evolution of assurance cases from a logical aspect;uniform model interface for assurance case integration with system models;integrated model-based development of system and safety cases;a web based GSN editor for multiple stakeholders;towards combined safety and security constraints analysis;reconciling systems-theoretic and component-centric methods for safety and security co-analysis;reconciling systems-theoretic and component-centric methods for safety and security co-analysis;increasing dependability in safety critical CPSs using reflective statecharts;a survey of hardware technologies for mixed-critical integration explored in the project EMC2;a model-based design approach;GSN support of mixed-criticality systems certification;concepts for reliable communication in a software-defined network architecture and combining safety and security analysis for industrial collaborative automation systems.
Withthe continuous development of various technologies, the future power grid is moving in a highly automated and intelligent development. Such a huge system will constantly produce massive data in the power generati...
详细信息
ISBN:
(纸本)9781921712555
Withthe continuous development of various technologies, the future power grid is moving in a highly automated and intelligent development. Such a huge system will constantly produce massive data in the power generation, transmission, transformation, distribution, consumption, dispatch or other links, which need a powerful information platform as a support. Big data add into new vitality for the development of smart grid, cloud computing technology has the advantage of high security and large data processing capacity. Based on the analysis of big data, cloud computing and smart grid, this paper gives the general framework of power data platform and summarizes the application of cloud computing in the big data of smart grid, and then puts forward an information platform based on the cloud computing, constructs a data cloud model based on smart grid. Finally the paper puts forward several unsolved problems based on the whole text.
暂无评论