Engineering Trustcom/Bigdatase 2018

Engineering Trustcom/Bigdatase 2018

2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE 2018) New York, New York, USA 31 July - 3 August 2018 Pages 1-650 IEEE Catalog Number: CFP18TRU-POD ISBN: 978-1-5386-4389-1 1/3 Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP18TRU-POD ISBN (Print-On-Demand): 978-1-5386-4389-1 ISBN (Online): 978-1-5386-4388-4 ISSN: 2324-898X Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering TrustCom/BigDataSE 2018 Table of Contents Message from the IEEE TrustCom/BigDataSE 2018 General Chairs xli Message from the IEEE TrustCom 2018 Program Chairs xlii TrustCom 2018 Committee Members xliv TrustCom 2018 Technical Program Committee xlv Message from the BigDataSE 2018 Program Chairs xlviii BigDataSE 2018 Committee Members xlix IEEE TrustCom 2018 Track 1: Trust Track 1 Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust 1 Scot Tucker (US Air Force Research Laboratory) A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing 10 Yubiao Wang (Chongqing University, China), Junhao Wen (Chongqing University, China), Wei Zhou (Shenzhen Institutes of Advanced Technology, China), and Fengji Luo (The University of Sydney, Australia) One Secure Access Scheme Based on Trusted Execution Environment 16 Yongkai Fan (China University of Petroleum), Shengle Liu (China University of Petroleum), Gang Tan (Penn State University), Xiaodong Lin (China University of Petroleum), Guanqun Zhao (China University of Petroleum), and Jianrong Bai (China University of Petroleum) v Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks 22 Tianao Ma (Wuhan University of Science and Technology, China), Wei Hu (Wuhan University of Science and Technology, China), Yonghao Wang (DMT Lab, Birmingham City University, UK), Dalia El-Banna (DMT Lab, Birmingham City University, UK), John Grant (Nine Tiles Networks Ltd, Cambridge, UK), and Hongjun Dai (Shandong University, Jinan, P.R. China) Track 1: Trust Track 2 Understanding Trust, Privacy and Financial Fears in Online Payment 28 Ghada El Haddad (University of Montreal, Montreal, Canada), Esma Aïmeur (University of Montreal, Montreal, Canada), and Hicham Hage (Notre Dame University, Zouk Mosbeh, Lebanon) DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts 37 Sebastian Friebe (Karlsruhe Institute of Technology), Ingo Sobik (esentri AG), and Martina Zitterbart (Karlsruhe Institute of Technology) Reputation Prediction Using Influence Conversion 43 Monika Ewa Rakoczy (SAMOVAR, CNRS, Telecom SudParis), Amel Bouzeghoub (SAMOVAR, CNRS, Telecom SudParis), Alda Lopes Gancarski (SAMOVAR, CNRS, Telecom SudParis), and Katarzyna Wegrzyn-Wolska (Efrei Paris) Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments 49 Mostafa Kahla (Alexandria University, Egypt), Mohamed Azab (Informatics Research Institute, Egypt), and Ahmed Mansour (Alexandria University, Egypt) Track 1: Trust Track 3 Repoxy: Replication Proxy for Trustworthy SDN Controller Operation 55 Mohamed Azab (Informatics Research Institute, Egypt), Ahmed Hamdy (Department of Computer and Communications Engineering, Faculty of Engineering, Alexandria, Egypt), and Ahmed Mansour (Department of Electrical and Communication, Faculty of Engineering, Alexandria, Egypt) A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks 61 Concepcion Sanchez Aleman (Florida International University), Niki Pissinou (Florida International University), Sheila Alemany (Florida International University), and Georges Kamhoua (Florida International University) vi Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking 68 Jian Chen (Sun Yat-sen University, China), Ziyang Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University, China), and Jiwu Huang (Shenzhen University, China) TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things 74 Bumjin Gwak (KAIST), Jin-Hee Cho (Army Research Laboratory), Dongman Lee (KAIST), and Heesuk Son (KAIST) Track 1: Trust Track 4 A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection 86 Jian Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University), and Jiwu Huang (Fudan University, China) Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies 92 Manu Elappila (National Institute of Technology Rourkela) and Suchismita Chinara (National Institute of Technology Rourkela) BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs 98 Zhaojun Lu (Huazhong University of Science and Technology, Wuhan, China), Qian Wang (University of Maryland, College Park), Gang Qu (University of Maryland, College Park), and Zhenglin Liu (Huazhong University of Science and Technology, Wuhan, China) Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure 104 Abu Shohel Ahmed (Aalto University) and Tuomas Aura (Aalto University) Track 1: Trust Track 5 N-Combat: A Nuisance Call Combating Framework for Internet Telephony 112 Ibrahim Javed (Institut Mines-Télécom, Télécom SudParis), Khalifa Toumi (Telecom SudParis, Institute Mines Telecom), and Noel Crespi (Telecom SudParis, Institute Mines Telecom) A Comprehensive Analysis of Packet Loss in MANETs 118 Muhammad Saleem Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan), Saira Waris (COMSATS Institute of Information Technology, Islamabad, Pakistan), Idrees Ahmed (COMSATS Institute of Information Technology, Islamabad, Pakistan), and Majid Iqbal Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan) Trust4App: Automating Trustworthiness Assessment of Mobile Applications 124 Sheikh Mahbub Habib (Technische Universitaet Darmstadt, Germany), Nikolaos Alexopoulos (Technische Universitaet Darmstadt, Germany), Md Monirul Islam (Technische Universitaet Darmstadt, Germany), Jens Heider (Fraunhofer SIT, Darmstadt, Germany), Stephen Marsh (University of Ontario -- Institute of Technology, Ontario, Canada), and Max Müehlhäeuser (Technische Universitaet Darmstadt, Germany) vii Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment 136 Shunan Ma (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Xunbo Shuai (PetroChina Research Institute of Petroleum Exploration & Development), Zhaohua Zhou (PetroChina Research Institute of Petroleum Exploration & Development), and Kechun Qiao (61516 Troops) Track 1: Trust Track 6 A Universal Secret Sharing Scheme with General Access Structure Based on CRT 142 Keju Meng (University of Science and Technology of China), Fuyou Miao (University of Science and Technology of China), Yue Yu (University of Science and Technology of China), and Changbin Lu (University of Science and Technology of China) ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning 149 Gaosheng Liu (Tianjin University), Xin Wang (Tianjin University), Xiaohong Li (Tianjin University), Jianye Hao (Tianjin University), and Zhiyong Feng (Tianjin University) Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation 156 Antonio Caliò (DIMES, University of Calabria, Italy) and Andrea Tagarelli (DIMES, University of Calabria, Italy) Securing the Internet of Things (IoT): A Security Taxonomy for IoT 163 Syed Rizvi (Pennsylvania State University), Andrew Kurtz (Pennsylvania State University), Joseph Pfeffer (Pennsylvania State University), and Mohammad Rizvi (PricewaterhouseCoopers (PWC)) Track 1: Trust Track 7 A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks 169 Dapeng Qu (Liaoning University), Dengyu Liang (Liaoning University), Songlin Wu (Liaoning University), Jie Li (University of Tsukuba), Weihong Xuan (Liaoning University), and Xingwei Wang (Northeastern University) Testing Sequence Generation Method Based on Unrelated Behaviors Serializing 177 Tao Sun (Inner Mongolia University), Xin Guo (Inner Mongolia University), and Ting Zhang (Inner Mongolia

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    38 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us