51,383 research outputs found

    Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices

    Get PDF
    In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD). Privacy preserved exchange of counts of itemsets among distributed mining sites is a vital part in association rule mining process. Existing cryptography based privacy preserving solutions consume lot of computation due to complex mathematical equations involved. Therefore less computation involved privacy solutions are extremely necessary to deploy mining applications in RCD. In this algorithm, a semi-trusted mixer is used to unify the counts of itemsets encrypted by all mining sites without revealing individual values. The proposed algorithm is built on with a well known communication efficient association rule mining algorithm named count distribution (CD). Security proofs along with performance analysis and comparison show the well acceptability and effectiveness of the proposed algorithm. Efficient and straightforward privacy model and satisfactory performance of the protocol promote itself among one of the initiatives in deploying data mining application in RCD.Comment: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain

    Full text link
    Blockchain, an emerging decentralized security system, has been applied in many applications, such as bitcoin, smart grid, and Internet-of-Things. However, running the mining process may cost too much energy consumption and computing resource usage on handheld devices, which restricts the use of blockchain in mobile environments. In this paper, we consider deploying edge computing service to support the mobile blockchain. We propose an auction-based edge computing resource market of the edge computing service provider. Since there is competition among miners, the allocative externalities (positive and negative) are taken into account in the model. In our auction mechanism, we maximize the social welfare while guaranteeing the truthfulness, individual rationality and computational efficiency. Based on blockchain mining experiment results, we define a hash power function that characterizes the probability of successfully mining a block. Through extensive simulations, we evaluate the performance of our auction mechanism which shows that our edge computing resources market model can efficiently solve the social welfare maximization problem for the edge computing service provider

    Remittance flows to post-conflict states: perspectives on human security and development

    Full text link
    This repository item contains a single issue of the Pardee Center Task Force Reports, a publication series that began publishing in 2009 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future.Migrant remittances – that is, money or other goods sent to relatives in the country of origin– play an increasingly central role in post-conflict reconstruction and national development of conflict-affected states. Private remittances are of central importance for restoring stability and enhancing human security in post-conflict countries. Yet the dynamics of conflict-induced remittance flows and the possibilities of leveraging remittances for post-conflict development have been sparsely researched to date. This Pardee Center Task Force Report is the outcome of an interdisciplinary research project organized by the Boston University Center for Finance, Law & Policy, in collaboration with The Frederick S. Pardee Center for the Study of the Longer-Range Future. The Task Force was convened by Boston University development economist John R. Harris and international banking expert Donald F. Terry, and social anthropologist Daivi Rodima-Taylor, Visiting Researcher at the Boston University African Studies Center, served as lead researcher and editor for the report. The Task Force was asked to research, analyze, and propose policy recommendations regarding the role of remittances in post-conflict environments and their potential to serve as a major source of development funds. The report’s authors collectively suggest a broader approach to remittance institutions that provides flexibility to adapt to specific local practices and to make broader institutional connections in an era of growing population displacement and expanding human and capital flows. Conditions for more productive use of migrants’ remittances are analyzed while drawing upon case studies from post-conflict countries in Africa, Asia and Latin America. The papers in this Task Force Report establish the importance of remittances for sustaining local livelihoods as well as rehabilitating institutional infrastructures and improving financial inclusion in post-conflict environments. Highlighting the increasing complexity of global remittance systems, the report examines the growing informality of conflict-induced remittance flows and explores solutions for more efficient linkages between financial institutions of different scales and degrees of formality. It discusses challenges to regulating international remittance transfers in the context of growing concerns about transparency, and documents the increasing role of diaspora networks and migrant associations in post-conflict co-development initiatives. The Task Force Report authors outline the main challenges to leveraging remittances for post-conflict development and make recommendations for further research and policy applications
    • …
    corecore