51,383 research outputs found
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices
In this paper a homomorphic privacy preserving association rule mining
algorithm is proposed which can be deployed in resource constrained devices
(RCD). Privacy preserved exchange of counts of itemsets among distributed
mining sites is a vital part in association rule mining process. Existing
cryptography based privacy preserving solutions consume lot of computation due
to complex mathematical equations involved. Therefore less computation involved
privacy solutions are extremely necessary to deploy mining applications in RCD.
In this algorithm, a semi-trusted mixer is used to unify the counts of itemsets
encrypted by all mining sites without revealing individual values. The proposed
algorithm is built on with a well known communication efficient association
rule mining algorithm named count distribution (CD). Security proofs along with
performance analysis and comparison show the well acceptability and
effectiveness of the proposed algorithm. Efficient and straightforward privacy
model and satisfactory performance of the protocol promote itself among one of
the initiatives in deploying data mining application in RCD.Comment: IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST
Recommended from our members
Towards an aspect weaving BPEL engine
This position paper proposes the use of dynamic aspects and
the visitor design pattern to obtain a highly configurable and
extensible BPEL engine. Using these two techniques, the
core of this infrastructural software can be customised to
meet new requirements and add features such as debugging,
execution monitoring, or changing to another Web Service
selection policy. Additionally, it can easily be extended to
cope with customer-specific BPEL extensions. We propose
the use of dynamic aspects not only on the engine itself
but also on the workflow in order to tackle the problems of
Web Service hot deployment and hot fixes to long running
processes. In this way, composing aWeb Service "on-the-fly"
means weaving its choreography interface into the workflow
Social Welfare Maximization Auction in Edge Computing Resource Allocation for Mobile Blockchain
Blockchain, an emerging decentralized security system, has been applied in
many applications, such as bitcoin, smart grid, and Internet-of-Things.
However, running the mining process may cost too much energy consumption and
computing resource usage on handheld devices, which restricts the use of
blockchain in mobile environments. In this paper, we consider deploying edge
computing service to support the mobile blockchain. We propose an auction-based
edge computing resource market of the edge computing service provider. Since
there is competition among miners, the allocative externalities (positive and
negative) are taken into account in the model. In our auction mechanism, we
maximize the social welfare while guaranteeing the truthfulness, individual
rationality and computational efficiency. Based on blockchain mining experiment
results, we define a hash power function that characterizes the probability of
successfully mining a block. Through extensive simulations, we evaluate the
performance of our auction mechanism which shows that our edge computing
resources market model can efficiently solve the social welfare maximization
problem for the edge computing service provider
Remittance flows to post-conflict states: perspectives on human security and development
This repository item contains a single issue of the Pardee Center Task Force Reports, a publication series that began publishing in 2009 by the Boston University Frederick S. Pardee Center for the Study of the Longer-Range Future.Migrant remittances – that is, money or other goods sent to relatives in the country of origin– play an increasingly central role in post-conflict reconstruction and national development of conflict-affected states. Private remittances are of central importance for restoring stability and enhancing human security in post-conflict countries. Yet the dynamics of conflict-induced remittance flows and the possibilities of leveraging remittances for post-conflict development have been sparsely researched to date.
This Pardee Center Task Force Report is the outcome of an interdisciplinary research project organized by the Boston University Center for Finance, Law & Policy, in collaboration with The Frederick S. Pardee Center for the Study of the Longer-Range Future. The Task Force was convened by Boston University development economist John R. Harris and international banking expert Donald F. Terry, and social anthropologist Daivi Rodima-Taylor, Visiting Researcher at the Boston University African Studies Center, served as lead researcher and editor for the report. The Task Force was asked to research, analyze, and propose policy recommendations regarding the role of remittances in post-conflict environments and their potential to serve as a major source of development funds. The report’s authors collectively suggest a broader approach to remittance institutions that provides flexibility to adapt to specific local practices and to make broader institutional connections in an era of growing population displacement and expanding human and capital flows. Conditions for more productive use of migrants’ remittances are analyzed while drawing upon case studies from post-conflict countries in Africa, Asia and Latin America.
The papers in this Task Force Report establish the importance of remittances for sustaining local livelihoods as well as rehabilitating institutional infrastructures and improving financial inclusion in post-conflict environments. Highlighting the increasing complexity of global remittance systems, the report examines the growing informality of conflict-induced remittance flows and explores solutions for more efficient linkages between financial institutions of different scales and degrees of formality. It discusses challenges to regulating international remittance transfers in the context of growing concerns about transparency, and documents the increasing role of diaspora networks and migrant associations in post-conflict co-development initiatives. The Task Force Report authors outline the main challenges to leveraging remittances for post-conflict development and make recommendations for further research and policy applications
- …