2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE...

26
IEEE Catalog Number: ISBN: CFP15TRU-POD 978-1-4673-7953-3 2015 IEEE Trustcom/BigDataSE/ISPA Helsinki, Finland 20 – 22 August 2015 Volume 1 Pages 1-709 1/4

Transcript of 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE...

Page 1: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

IEEE Catalog Number: ISBN:

CFP15TRU-POD 978-1-4673-7953-3

2015 IEEE Trustcom/BigDataSE/ISPA

Helsinki, Finland 20 – 22 August 2015

Volume 1 Pages 1-709

1/4

Page 2: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

2015 IEEE Trustcom/BigDataSE/ISPA

Trustcom-BigDataSE-ISPA 2015

Table of Contents

Volume - 1

Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs..............................................................................xx

Message from the IEEE TrustCom 2015 Program Chairs..........................................................................................................xxi

TrustCom 2015 Organizing Committee.......................................................................................................................................xxii

TrustCom 2015 and RATSP 2015 Program Committee...........................................................................................................xxiii

TrustCom 2015 External Reviewers..........................................................................................................................................xxviii

Message from the RATSP 2015 Symposium Chairs..................................................................................................................xxix

Message from the Workshop Chairs of IEEE TSCloud 2015....................................................................................................xxx

TSCloud 2015 Organizing and Program Committees...............................................................................................................xxxi

Message from the TrustSoft 2015 Workshop Chairs................................................................................................................xxxii

TrustSoft 2015 Organizing and Program Committees............................................................................................................xxxiii

Message from the IW5GS 2015 Workshop Chairs..................................................................................................................xxxiv

IW5GS Organizing and Program Committees..........................................................................................................................xxxv

Message from the SpaIoT 2015 Workshop Chairs ..................................................................................................................xxxvi

SpaIoT 2015 Organizing and Program Committees...............................................................................................................xxxvii

Message from the TrustWSN 2015 Workshop Chairs..........................................................................................................xxxviii

Message from the UbiSafe 2015 Workshop Chairs................................................................................................................... N/A

UbiSafe 2015 Organizing and Program Committees.....................................................................................................................xl

Keynote Abstracts............................................................................................................................................................................xli

Organizers, Patrons, and Partners.............................................................................................................................................xlviii

14th IEEE International Conference on Trust, Security and Privacy in Computingand Communications

TrustCom Trust Track 1: Trust Evaluation, Reputation and Recommender Systems

DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid Dynamics ......................................................1

Huanyang Zheng and Jie Wu

CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS

Management ........................................................................................................................................................................................9

Wei Tang and Zheng Yan

v

Page 3: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags ...........................................................17

Jiageng Chen, Atsuko Miyaj, Hiroyuki Sato, and Chunhua Su

Trust Evaluation in Mobile Devices: An Empirical Study ................................................................................................................25

Richard Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard,

Albert Rafetseder, Tao Li, and Justin Cappos

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor .............................................................................33

Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, and Zhiyong Feng

TrustCom Trust Track 2: Trusted Environments

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using

TrustZone ..........................................................................................................................................................................................41

Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, and Dengguo Feng

On Rehoming the Electronic ID to TEEs ..........................................................................................................................................49

Sandeep Tamrakar, Jan-Erik Ekberg, and Pekka Laitinen

Trusted Execution Environment: What It is, and What It is Not ......................................................................................................57

Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface ..................................................................65

Mordechai Guri, Yuri Poliak, Bracha Shapira, and Yuval Elovici

Performance of Cooperative Firewalls in Real-World Deployments ................................................................................................74

Nishant Patanaik and Ana Goulart

TrustCom Trust Track 3: Trust in Wireless and Sensor Networks

Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents ........................................................................................82

Po-Hung Yang and Sung-Ming Yen

Mobility Increases the Risk of Malware Propagations in Wireless Networks ..................................................................................90

Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, and Tom H. Luan

Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust

for Securing Wireless Sensor Networks ............................................................................................................................................96

Ming Xiang, William Liu, Quan Bai, and Adnan Al-Anbuky

Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference

in Two-Hop Wireless Networks ......................................................................................................................................................104

Weidong Yang, Le Xiao, Limin Sun, and Qing Li

Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures .......................................................111

Chuanyou Li, Michel Hurfin, and Yun Wang

TrustCom Trust Track 4: Trust in Social and Cloud Computing

Contextual Sub-network Extraction in Contextual Social Networks ..............................................................................................119

Xiaoming Zheng, Yan Wang, and Mehmet A. Orgun

Trust-Based Formal Delegation Framework for Enterprise Social Networks ................................................................................127

Ahmed Bouchami, Olivier Perrin, and Ehtesham Zahoor

vi

Page 4: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Trust-Aware Elastic Social Compute Units ....................................................................................................................................135

Mirela Riveni, Hong-Linh Truong, and Schahram Dustdar

Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage ....................................................143

Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, and Minghui Zheng

TrustCom Security Track 1: Key Management

Research on Key Management for Multi-privileged Group Communications ...............................................................................151

Wei Zhou, Yang Xu, and Guojun Wang

Attainable Unconditional Security for Shared-Key Cryptosystems ................................................................................................159

Fabrizio Biondi, Thomas Given-Wilson, and Axel Legay

Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance

and Re-generateability .....................................................................................................................................................................167

Keita Emura, Le Trieu Phong, and Yohei Watanabe

RFID Secure Application Revocation for IoT in 5G .......................................................................................................................175

Kai Fan, Yuanyuan Gong, Zhao Du, Hui Li, and Yintang Yang

TrustCom Security Track 2: Software and OS Security

Identifying Unknown Android Malware with Feature Extractions and Classification Techniques ...............................................182

Ludovic Apvrille and Axelle Apvrille

Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses ...............................................................190

Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, and Qingkai Zeng

Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes .....................................................198

Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche,

Amaury Lendasse, and Juha Karhunen

A First Look at Android Malware Traffic in First Few Minutes ....................................................................................................206

Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, and Jin Li

Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware ............................................................................214

Marian Kühnel, Manfred Smieschek, and Ulrike Meyer

TrustCom Security Track 3: Data and Application Security

Secure Block Device—Secure, Flexible, and Efficient Data Storage for ARM TrustZone

Systems ............................................................................................................................................................................................222

Daniel Hein, Johannes Winter, and Andreas Fitzek

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection .............................................................................................230

Jing Long, Dafang Zhang, Wei Liang, and Wenwei Li

Big Data Analytics for Detecting Host Misbehavior in Large Logs ...............................................................................................238

Daniel Gonçalves, João Bota, and Miguel Correia

DPBSV—An Efficient and Secure Scheme for Big Sensing Data Stream .....................................................................................246

Deepak Puthal, Surya Nepal, Rajiv Ranjan, and Jinjun Chen

vii

Page 5: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based

Development ...................................................................................................................................................................................254

Brahim Hamid

TrustCom Security Track 4: Network Security

RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries .....................................................263

Yue-Bin Luo, Bao-Sheng Wang, Xiao-Feng Wang, Xiao-Feng Hu, Gui-Lin Cai, and Hao Sun

MimicHunter: A General Passive Network Protocol Mimicry Detection Framework ...................................................................271

Zigang Cao, Gang Xiong, and Li Guo

An Analysis of TLS Handshake Proxying ......................................................................................................................................279

Douglas Stebila and Nick Sullivan

How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication .................................................287

Lars Baumgäertner, Jonas Höchst, Matthias Leinweber, and Bernd Freisleben

TrustCom Security Track 5: Network Security

Unsupervised Feature Selection Method for Intrusion Detection System ......................................................................................295

Mohammed A. Ambusaidi, Xiangjian He, and Priyadarsi Nanda

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach ......................................................302

Jiaojiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, and Yang Xiang

An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking ...................................................310

Rui Wang, Zhiping Jia, and Lei Ju

A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network .......................................................318

Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, and Ren Ping Liu

TrustCom Security Track 6: Information Security

Surveys of Daily Information Security of Citizens in Finland ........................................................................................................326

Jukka A. Koskinen

Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior

Prediction .........................................................................................................................................................................................334

Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu,

and Shyi-Ming Chen

Diversifying SQL to Prevent Injection Attacks ...............................................................................................................................344

Sampsa Rauti, Jukka Teuhola, and Ville Leppänen

Information Security Awareness in Educational Institution: An Analysis of Students’ Individual

Factors .............................................................................................................................................................................................352

Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni Isoaho

TrustCom Security Track 7: Authentication and Crypto

A Hybrid Mobile Authentication Model for Ubiquitous Networking .............................................................................................360

Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed Alhabeeb, and Waleed Alfehaid

viii

Page 6: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records ......................................................368

Sufian Hameed, Usman Murad Jamali, and Adnan Samad

An Instruction-Set Randomization Using Length-Preserving Permutation ....................................................................................376

Jianming Fu, Xu Zhang, and Yan Lin

Cut-and-Choose Bilateral Oblivious Transfer and Its Application .................................................................................................384

Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, and Minghao Zhao

A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based Cryptography ........................................................392

Chaohui Du and Guoqiang Bai

TrustCom Security Track 8: Secure Environments

Open-TEE—An Open Virtual Trusted Execution Environment .....................................................................................................400

Brian McGillion, Tanel Dettenborn, Thomas Nyman, and N. Asokan

Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal

ARM Hypervisor .............................................................................................................................................................................408

Julian Horsch and Sascha Wessel

NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment

and Predictive Requirements ...........................................................................................................................................................418

Nuno Teodoro, Luís Gonçalves, and Carlos Serrão

A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance

Management ....................................................................................................................................................................................426

Sivadon Chaisiri, Ryan K. L. Ko, and Dusit Niyato

TrustCom Security Track 9: Cloud Security

Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation ..............................................................434

Yuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, and Junquan Deng

Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS

Clouds ..............................................................................................................................................................................................443

Kenichi Kourai and Tatuya Kajiwara

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud ..............................................................451

Chang Liu, Liehuang Zhu, and Jinjun Chen

Achieving Lightweight and Secure Access Control in Multi-authority Cloud ...............................................................................459

Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, and Fangfang Shan

TrustCom Security Track 10: IoT and Wireless Security, Heterogeneous

Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things ....................................................467

Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent

Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network

Calculus ...........................................................................................................................................................................................475

Guowei Wu, Jie Wang, and Lin Yao

ix

Page 7: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their

Countermeasures .............................................................................................................................................................................483

Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, and Keith Mayes

On Using a Von Neumann Extractor in Heart-Beat-Based Security ..............................................................................................491

Robert Mark Seepers, Christos Strydis, Ioannis Sourdis, and Chris Innocentius De Zeeuw

TrustCom Privacy Track 2: User Privacy

WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems ...................................................499

Li Lu, Muhammad Jawad Hussain, and Hongzi Zhu

Effects of Contextual Properties on Users’ Privacy Preferences in Mobile Computing

Environments ...................................................................................................................................................................................507

Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, and Daeseon Choi

Private Membership Test for Bloom Filters ....................................................................................................................................515

Tommi Meskanen, Jian Liu, Sara Ramezanian, and Valtteri Niemi

You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental

Data .................................................................................................................................................................................................523

Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti,

and Sasu Tarkoma

TrustCom Privacy Track 3: Location Privacy and others

A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks ..................................................531

Matthew Bradbury, Matthew Leeke, and Arshad Jhumka

Time Distortion Anonymization for the Publication of Mobility Data with High Utility ..............................................................539

Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, and Lionel Brunie

Aligning the Conflicting Needs of Privacy, Malware Detection and Network Protection .............................................................547

Ian Oliver and Silke Holtmanns

Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor

Networks .........................................................................................................................................................................................555

Hui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, and Juru Zeng

TrustCom Privacy Track 4: Data Privacy

Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud .......................................................................563

Mark A. Will, Ryan K. L. Ko, and Ian H. Witten

PEAS: Private, Efficient and Accurate Web Search .......................................................................................................................571

Albin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, and Harald Kosch

Privacy-Preserving Mining of Frequent Routes in Cellular Network Data ....................................................................................581

Olof Görnerup, Nima Dokoohaki, and Andrea Hess

uCentive: An Efficient, Anonymous and Unlinkable Incentives Scheme ......................................................................................588

Milica Milutinovic, Italo Dacosta, Andreas Put, and Bart De Decker

x

Page 8: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

TrustCom Privacy Track 5: Identity Privacy

(l1, ..., lq)-diversity for Anonymizing Sensitive Quasi-Identifiers .................................................................................................596

Yuichi Sei, Takao Takenouchi, and Akihiko Ohsuga

Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid ....................................................604

Neetesh Saxena, Bong Jun Choi, and Shinyoung Cho

A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols

for Low-Cost RFID Tags ................................................................................................................................................................612

Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram,

and Konstantinos Markantonakis

Group Sparsity Tensor Factorization for De-anonymization of Mobility Traces ...........................................................................621

Takao Murakami, Atsunori Kanemura, and Hideitsu Hino

The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacyin Computing and Communications (RATSP)

RATSP Trust Track 1

Provenance-Based Attestation for Trustworthy Computing ...........................................................................................................630

Jiun Yi Yap and Allan Tomlinson

A Framework for Evaluating the End-to-End Trustworthiness ......................................................................................................638

Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis,

and Thorsten Weyer

Trusted Tamper-Evident Data Provenance .....................................................................................................................................646

Mohammad M. Bany Taha, Sivadon Chaisiri, and Ryan K. L. Ko

Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic

Inference ..........................................................................................................................................................................................654

Igor Kotenko, Igor Saenko, and Sergey Ageev

RATSP Trust Track 2

Trust Metrics Based on a Trusted Network Element ......................................................................................................................660

Jouni Hiltunen and Jarkko Kuusijärvi

Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria

Analysis ...........................................................................................................................................................................................668

Zhengping Wu and Lifeng Wang

Formal Modeling and Verification of Opportunity-enabled Risk Management .............................................................................676

Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi,

and Jonathan Guislain

xi

Page 9: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

RATSP Trust Track 3

Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous

Networks .........................................................................................................................................................................................685

Andrew Bolster and Alan Marshall

RLTE: A Reinforcement Learning Based Trust Establishment Model ...........................................................................................694

Abdullah Aref and Thomas Tran

In Certificates We Trust—Revisited ...............................................................................................................................................702

Florian Reimair, Peter Teufl, and Bernd Prünster

Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named

Data Networking .............................................................................................................................................................................710

Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, and Hiroshi Shigeno

RATSP Trust Track 4

Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation ......................................................................718

Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, and Elisa Bertino

Trust-Aware Review Spam Detection .............................................................................................................................................726

Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti

KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks ...............................................................734

Ester López and Leandro Navarro

Inferring User Actions from Provenance Logs ...............................................................................................................................742

Xin Li, Chaitanya Joshi, Alan Yu Shyang Tan, and Ryan Kok Leong Ko

RATSP Security Track 1

Data Mobility Management Model for Active Data Cubes ............................................................................................................750

Thanh Dat Dang, Doan Hoang, and Priyadarsi Nanda

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected

Hosts ................................................................................................................................................................................................758

Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, and Shigeki Goto

Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection ..........................................................766

Nada Alruhaily, Behzad Bordbar, and Tom Chothia

A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models .....................................................774

Subil Abraham and Suku Nair

eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering

Infrastructure in Smart Grid ............................................................................................................................................................782

Mourad Benmalek and Yacine Challal

RATSP Security Track 2

Implementing Authentication Systems Based on Physical Unclonable Functions .........................................................................790

John Ross Wallrabenstein

xii

Page 10: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Save Our Passwords ........................................................................................................................................................................797

Martin Boonk, Ronald Petrlic, and Christoph Sorge

Partial Data Protection via Structure-Preserving Document Partitioning .......................................................................................801

Luigi Lo Iacono

Enhancing EMV Online PIN Verification ......................................................................................................................................808

Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos,

and Keith Mayes

A Formalization of Fingerprinting Techniques ...............................................................................................................................818

Fabian Lanze, Andriy Panchenko, and Thomas Engel

RATSP Security Track 3

Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular

Connectivity ....................................................................................................................................................................................826

Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey Andreev,

and Yevgeni Koucheryavy

A Secure Northbound Interface for SDN Applications ...................................................................................................................834

Christian Banse and Sathyanarayanan Rangarajan

Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc Networks .................................................................840

Yuri Ohata, Sayaka Umeda, Takashi Kamimoto, and Hiroshi Shigeno

A Study of IEEE 802.15.6 Association Protocols ...........................................................................................................................848

Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, and Zheng Yan

RATSP Security Track 4

Access Control for the Cloud Based on Multi-device Authentication ............................................................................................856

L. Gonzalez-Manzano, J.M. de Fuentes, and A. Orfila

Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms ........................................................864

Ahmed Bouchami, Elio Goettelmann, Olivier Perrin, and Claude Godart

RESCUE: Resilient Secret Sharing Cloud-Based Architecture ......................................................................................................872

Elochukwu Ukwandu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo

On the Resource Consumption of Secure Data Sharing ..................................................................................................................880

Holger Kuehner and Hannes Hartenstein

Secure Location Validation with Wi-Fi Geo-fencing and NFC ......................................................................................................890

Maksim Avdyushkin and Musfiq Rahman

RATSP Security Track 5

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message

Authenticators .................................................................................................................................................................................897

Dongxi Liu and John Zic

A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos .......................................................................................905

Gyan Singh Yadav and Aparajita Ojha

xiii

Page 11: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Detecting Data Semantic: A Data Leakage Prevention Approach ..................................................................................................910

Sultan Alneyadi, Elankayer Sithirasenan, and Vallipuram Muthukkumarasamy

A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC Redundancy ......................................................918

Shigui Qi, Dan Feng, Nan Su, Wenguo Liu, and Jingning Liu

CaptureMe: Attacking the User Credential in Mobile Banking Applications ................................................................................924

Mohamed El-Serngawy and Chamseddine Talhi

RATSP Privacy Track 1

Watch Your Mobile Payment: An Empirical Study of Privacy Disclosure ....................................................................................934

Zakaria Sahnoune, Esma Aïmeur, Ghada El Haddad, and Rodrigue Sokoudjou

Disequilibrium: Tor’s Exit Node Selection under the Stereoscope .................................................................................................942

Robert Koch, Mario Golling, and Gabi Dreo Rodosek

Extended Model of Side-Information in Garbling ..........................................................................................................................950

Tommi Meskanen, Valtteri Niemi, and Noora Nieminen

A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential

Users ................................................................................................................................................................................................958

Ahmad Sabouri

Can On-line Social Network Users Trust That What They Designated as Confidential Data

Remains So? ....................................................................................................................................................................................966

Vladimir Estivill-Castro and David F. Nettleton

RATSP Privacy Track 2

Stylometric Anonymity: Is Imitation the Best Strategy? ................................................................................................................974

Mahmoud Khonji and Youssesf Iraqi

k-anonymity: Risks and the Reality ................................................................................................................................................983

Anirban Basu, Toru Nakamura, Seira Hidano, and Shinsaku Kiyomoto

A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device ...................................................................990

Dali Zhu, Zheming Fan, and Na Pang

The Pseudonym Broker Privacy Pattern in Medical Data Collection .............................................................................................999

Christiaan Hillen

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking ...............................................1006

Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, and Tansu Alpcan

RATSP Privacy Track 3

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile

Apps ...............................................................................................................................................................................................1014

Yen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, and Te-En Wei

Secure Two-Party Rank Correlation Computations for Recommender Systems ..........................................................................1022

Kok-Seng Wong, Minjie Seo, and Myung Ho Kim

The Role of Risk Perceptions in Privacy Concerns Evaluation ....................................................................................................1029

Anna Rohunen and Jouni Markkula

xiv

Page 12: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

A Language for the Composition of Privacy-Enforcement Techniques .......................................................................................1037

Ronan-Alexandre Cherrueau, Rémi Douence, and Mario Südholt

Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications ....................................................1045

Silvia Puglisi, David Rebollo-Monedero, and Jordi Forné

The Fifth IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud)

TSCloud Session I

A Review of Free Cloud-Based Anti-Malware Apps for Android ................................................................................................1053

Jason Walls and Kim-Kwang Raymond Choo

Forensic Collection and Analysis of Thumbnails in Android .......................................................................................................1059

Ming Di Leom, Christian Javier D’Orazio, Gaye Deegan, and Kim-Kwang Raymond Choo

EyeCloud: A BotCloud Detection System ....................................................................................................................................1067

Mohammad Reza Memarian, Mauro Conti, and Ville Leppänen

TSCloud Session II

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access

Control and Privileged Access Management ................................................................................................................................1073

Kin Suntana Tep, Ben Martini, Ray Hunt, and Kim-Kwang Raymond Choo

Cloud Security Audit for Migration and Continuous Monitoring .................................................................................................1081

Umar Mukhtar Ismail, Shareeful Islam, and Haralambos Mouratidis

Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement ....................................................................1088

Bob Duncan and Mark Whittington

Android Cache Taxonomy and Forensic Process ..........................................................................................................................1094

Felix Immanuel, Ben Martini, and Kim-Kwang Raymond Choo

TSCloud Session III

Secure Sketch Search for Document Similarity ............................................................................................................................1102

Cengiz Orencik, Mahmoud Alewiwi, and Erkay Savas

Architectural Model and Security Mechanisms for Cloud Federations ........................................................................................1108

Luciano Barreto, Joni Fraga, and Frank Siqueira

A Framework for Cryptography Based Accountability and Service Invocation Control

for Service Composition in a Multicloud Architecture .................................................................................................................1116

Gwan-Hwan Hwang, Kuh-Yih Huang, and Yu-Cheng Hsiao

Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm ............................................................................1122

Jose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, and Ruppa Thulasiram

The First IEEE International Workshop on Trustworthy Software Systems (TrustSoft)

xv

Page 13: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

TrustSoft Session I

A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications ..................................................................1129

Baden Delamore and Ryan K. L. Ko

Preventing Library Spoofing on Android ......................................................................................................................................1136

Dennis Titze and Julian Schütte

TrustSoft Session II

Issues in Trustworthy Software Systems .......................................................................................................................................1142

Mazen Ezzeddine and Haitham Akkary

Mission-Aware Vulnerability Assessment for Cyber-Physical Systems ......................................................................................1148

Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders

Alias Detection Across Multi-online Applications Based on User’s Behavior Characteristics ....................................................1154

Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, and Tao Yang

A Rejuvenation Model for Software System under Normal Attack ..............................................................................................1160

Haining Meng, Xinhong Hei, Yan Li, Yanning Du, and Guo Xie

The First IEEE International Workshop on 5G Security (IW5GS)

IW5GS Session I

Towards 5G Security .....................................................................................................................................................................1165

Peter Schneider and Günther Horn

Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting

the Relationship between IMEI and IMSI for EIR Access ...........................................................................................................1171

Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, and Tuomas Aura

Mobile Guard Demo: Network Based Malware Detection ...........................................................................................................1177

Vikramajeet Khatri and Joerg Abendroth

IW5GS Session II

Towards Secure Multi-tenant Virtualized Networks .....................................................................................................................1180

Nicolae Paladi and Christian Gehrmann

CRC-Based Message Authentication for 5G Mobile Technology ................................................................................................1186

Elena Dubrova, Mats Näslund, and Göran Selander

An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments

and Beyond ....................................................................................................................................................................................1192

Prajwol Kumar Nakarmi, Oscar Ohlsson, and Michael Liljenstam

IW5GS Session III

Security in D2D Communications: A Review ..............................................................................................................................1199

Mingjun Wang and Zheng Yan

xvi

Page 14: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy .......................................................................................1205

Jari Arkko, Karl Norrman, Mats Näslund, and Bengt Sahlin

The Eighth IEEE International Symposium on Security, Privacy and Anonymity in Internetof Things (SpaIoT)

SpaIoT Session I

Revocation Management in Vehicular Ad-hoc Networks .............................................................................................................1210

Francisco Martín-Fernández, Pino Caballero-Gil, and Cándido Caballero-Gil

Enhancing the Trajectory Privacy with Laplace Mechanism ........................................................................................................1218

Daiyong Quan, Lihua Yin, and Yunchuan Guo

A Simple RFID-Based Architecture for Privacy Preservation ......................................................................................................1224

Di Wu, Jingfu Du, Dali Zhu, and Siye Wang

Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUs .................................................1230

Chaohui Du, Guoqiang Bai, and Hongyi Chen

Towards Tracing of k-Anonymized Datasets ................................................................................................................................1237

Shinsaku Kiyomoto, Toru Nakamura, and Yutaka Miyake

SpaIoT Session II

WAVE: Secure Wireless Pairing Exploiting Human Body Movements ......................................................................................1243

Wei Wang, Zhan Wang, Wen Tao Zhu, and Lei Wang

Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System ...............................................1249

Naveen Kumar, Anish Mathuria, and Manik Lal Das

Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV

Reference Architecture ..................................................................................................................................................................1255

Bernd Jaeger

A Trustworthiness Model for Crowdsourced and Crowdsensed Data ..........................................................................................1261

Catia Prandi, Stefano Ferretti, Silvia Mirri, and Paola Salomoni

The First IEEE International Workshop on Trust and Security in Wireless Sensor Networks(TrustWSN)

TrustWSN Session I

Periodicity-and-Linear-Based Data Suppression Mechanism for WSN .......................................................................................1267

Yanchao Song, Juan Luo, Chang Liu, and Wenfeng He

Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor

Networks .......................................................................................................................................................................................1272

Hongsong Chen, Zhi Han, and Zhongchuan Fu

An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor

Networks .......................................................................................................................................................................................1279

Kyoungsoo Bok, Eunkyung Ryu, Junho Park, and Jaesoo Yoo

xvii

Page 15: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

TrustWSN Session II

A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection

and Energy Aware .........................................................................................................................................................................1284

Zuo Chen, Mengyuan Jia, Yan Wang, and Xiaolong Yan

A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless

Sensor Networks ............................................................................................................................................................................1292

Huan Zhao, Qian Zhang, Liang Zhang, and Yan Wang

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based

on Particle Swarm Optimization and Cuckoo Search ...................................................................................................................1298

Zuo Chen, Xue Li, Bin Lv, and Mengyuan Jia

TrustWSN Session III

Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement

Learning with Application to Prostate Cancer ..............................................................................................................................1306

Fei Zhu, Quan Liu, Xiaofang Zhang, and Bairong Shen

Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust ...........................................................................1312

Huan Zhao, Chaoming Hu, Rui Zheng, and Bin Lv

An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on

the Improved AGNES ...................................................................................................................................................................1318

Wei-qing Huang, Chang Ding, Si-ye Wang, and Shuang Hu

A Near Field Communication(NFC) Security Model Based on OSI Reference Model ...............................................................1324

Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, and Degang Sun

Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes

for Multiple Signers .......................................................................................................................................................................1329

Kenta Muranaka, Naoto Yanai, Shingo Okamura, and Toru Fujiwara

The Seventh IEEE International Symposium on UbiSafe Computing (UbiSafe)

UbiSafe Session I

A Method for Deriving and Testing Malicious Behavior Detection Rules ...................................................................................1337

Raimo Hilden and Kimmo Hätönen

Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust

Model .............................................................................................................................................................................................1343

Jorge López and Stephane Maag

A Distributed Reputation System for Certification Authority Trust Management .......................................................................1349

Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann,

and Max Mühlhäuser

xviii

Page 16: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

UbiSafe Session II

Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries ..................................................1357

Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, and Chan Yeob Yeuny

DDOS Mitigation Cloud-Based Service .......................................................................................................................................1363

Fouad Guenane, Michele Nogueira, and Ahmed Serhrouchni

Dynamic Game Access Control Based on Trust ...........................................................................................................................1369

Shunan Ma

Dynamic Security Policies Enforcement and Adaptation Using Aspects .....................................................................................1374

Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, and Frédéric Cuppens

The Second IEEE International Workshop on the Emerging Future Internet and Network Security(EFINS)

EFINS Session I

Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk

and Cybercrime Victimisation .......................................................................................................................................................1380

Ameer Al-Nemrat and Chafika Benzaid

From ZeuS to Zitmo: Trends in Banking Malware .......................................................................................................................1386

Najla Etaher, George R.S. Weir, and Mamoun Alazab

ARP Cache Poisoning Mitigation and Forensics Investigation ....................................................................................................1392

Heman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaïd, and Abdel-Rahman H. Tawil

EFINS Session II

Virtualization and Cyber Security: Arming Future Security Practitioners ...................................................................................1398

Midhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, and Chafika Benzaid

A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafe ................................................................1403

Florian Jacob, Jens Mittag, and Hannes Hartenstein

Automated Collection and Analysis of Malware Disseminated via Online Advertising ..............................................................1411

Muhammad N. Sakib and Chin-Tser Huang

Author Index - Volume I

xix

Page 17: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

IEEE Catalog Number: ISBN:

CFP15TRU-POD 978-1-4673-7953-3

2015 IEEE Trustcom/BigDataSE/ISPA

Helsinki, Finland 20 – 22 August 2015

Volume 2 Pages 1-246

3/4

Page 18: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

2015 IEEE Trustcom/BigDataSE/ISPA

Trustcom-BigDataSE-ISPA 2015

Table of Contents

Volume - 2

Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs ..............................................................................ix

Message from the IEEE BigDataSE 2015 General Chairs.............................................................................................................x

Message from the DTWSM 2015 Workshop Chairs ....................................................................................................................xii

DTWSM 2015 Organizing and Program Committees.................................................................................................................xiii

Message from the CPBD Chairs....................................................................................................................................................xiv

CPBD 2015 Organizing and Program Committees.......................................................................................................................xv

Message from the RTStreams 2015 Workshop Chairs................................................................................................................xvi

RTStreams 2015 Organizing and Program Committees............................................................................................................xvii

The Ninth IEEE International Conference on Big Data Science and Engineering

BigDataSE: Analytics I

M-PCA Binary Embedding for Approximate Nearest Neighbor Search ............................................................................................1

Ezgi Can Ozan, Serkan Kiranyaz, and Moncef Gabbouj

Large-Scale Classification by an Approximate Least Squares One-Class Support Vector

Machine Ensemble ..............................................................................................................................................................................6

Vasileios Mygdalis, Iosifidis Alexandros, Anastasios Tefas, and Ioannis Pitas

Nearest Class Vector Classification for Large-Scale Learning Problems .........................................................................................11

Alexandros Iosifidis, Anastasios Tefas, and Ioannnis Pitas

Class-Specific Nonlinear Projections Using Class-Specific Kernel Spaces .....................................................................................17

Alexandros Iosifidis, Moncef Gabbouj, and Petri Pekki

BigDataSE: Analytics II

Scalable Learning of k-dependence Bayesian Classifiers under MapReduce ...................................................................................25

Jacinto Arias, José A. Gámez, and José M. Puerta

Distributed Entropy Minimization Discretizer for Big Data Analysis under Apache Spark ............................................................33

Sergio Ramírez-Gallego, Salvador García, Héctor Mouriño-Talín, and David Martínez-Rego

Scalable Massively Parallel Learning of Multiple Linear Regression Algorithm with MapReduce ................................................41

Moufida Adjout Rehab and Faouzi Boufares

v

Page 19: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

An Algorithm for Identifying the Learning Patterns in Big Data .....................................................................................................48

Majed Farrash and Wenjia Wang

Goal-Based Analytic Composition for On-and Off-line Execution at Scale ....................................................................................56

Peter Coetzee and Stephen Jarvis

BigDataSE: Text Analytics

Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender

Systems ..............................................................................................................................................................................................66

Sepideh Seifzadeh and Ali Miri

Spatial-Temporal Aware Truth Finding in Big Data Social Sensing Applications ...........................................................................72

Chao Huang and Dong Wang

Similarity-Based Query-Focused Multi-document Summarization Using Crowdsourced

and Manually-built Lexical-Semantic Resources ..............................................................................................................................80

Muhidin A. Mohamed and Mourad Oussalah

Semi-Supervised Multiple Disambiguation ......................................................................................................................................88

Kambiz Ghoorchian, Fatemeh Rahimian, and Sarunas Girdzijauskas

BigDataSE: Big Data Technologies

Hadoop Characterization ...................................................................................................................................................................96

Icaro Alzuru, Kevin Long, Bhaskar Gowda, David Zimmerman, and Tao Li

Telemetry for Elastic Data (TED): Middleware for MapReduce Job Metering and Rating ...........................................................104

Soheil Qanbari, Ashkan Farivarmoheb, Parham Fazlali, Samira Mahdizadeh,

and Schahram Dustdar

Cost Models for Distributed Pattern Mining in the Cloud ..............................................................................................................112

Sabeur Aridhi, Laurent d’Orazio, Mondher Maddouri, and Engelbert Mephu Nguifo

Performance Evaluation of Enterprise Big Data Platforms with HiBench .....................................................................................120

Todor Ivanov, Raik Niemann, Sead Izberovic, Marten Rosselli, Karsten Tolle, and Roberto V. Zicari

Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework ...............................................128

Grazziela P. Figueredo, Christian Wagner, Jonathan M. Garibaldi, and Uwe Aickelin

The Second IEEE International Workshop on Data, Text, Web, and Social Network Mining(DTWSM)

DTWSM Session I

Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing

Behavior in Large-Scale e-Learning ...............................................................................................................................................136

Ni Xue, Huan He, Jun Liu, Qinghua Zheng, Tian Ma, Jianfei Ruan, and Bo Dong

Enhancing the Detection Rate of Inclined Faces .............................................................................................................................143

Jun-Horng Chen, I-Lin Tang, and Chun-Hsuan Chang

PPT Image Segmentation Based on Color Entropy ........................................................................................................................147

Feijuan He, Xuelu Chen, Dawei Xu, and Xianglin Miao

vi

Page 20: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Mining E-commerce Data from E-shop Websites ...........................................................................................................................153

Andrea Horch, Holger Kett, and Anette Weisbecker

Provision of Disk I/O Guarantee for MapReduce Applications ......................................................................................................161

Xuan Thi Tran, Tien Van Do, Nam H. Do, Lóránt Farkas, and Csaba Rotter

The First IEEE International Workshop on Classification Problems Embedded in the Nature of BigData (CPBD)

CPBD Session I

A MapReduce-Based k-Nearest Neighbor Approach for Big Data Classification .........................................................................167

Jesús Maillo, Isaac Triguero, and Francisco Herrera

Semantic HMC: A Predictive Model Using Multi-label Classification for Big Data .....................................................................173

Rafael Peixoto, Thomas Hassan, Christophe Cruz, Aurélie Bertaux, and Nuno Silva

Analysis of Data Preprocessing Increasing the Oversampling Ratio for Extremely Imbalanced

Big Data Classification ....................................................................................................................................................................180

Sara del Río, José Manuel Benítez, and Francisco Herrera

Feature Ranking Based on Information Gain for Large Classification Problems with MapReduce ..............................................186

Eftim Zdravevski, Petre Lameski, Andrea Kulakov, Boro Jakimovski, Sonja Filiposka,

and Dimitar Trajanov

Compounds Activity Prediction in Large Imbalanced Datasets with Substructural Relations

Fingerprint and EEM .......................................................................................................................................................................192

Wojciech Marian Czarnecki and Krzysztof Rataj

The First IEEE International Workshop on Real Time Data Stream Analytics (RTStreams)

CPBD Session II and RTStreams Session I

Incremental One-Class Bagging for Streaming and Evolving Big Data .........................................................................................193

Bartosz Krawczyk and Michał Woźniak

An Increment Decision Tree Algorithm for Streamed Data ...........................................................................................................199

Dariusz Jankowski and Konrad Jackowski

Multi-label Stream Classification Using Extended Binary Relevance Model ................................................................................205

Pawel Trajdos and Marek Kurzynski

Data Stream Classification Using Random Feature Functions and Novel Method Combinations .................................................211

Jesse Read and Albert Bifet

Symbolic Time Series Representation for Stream Data Processing ................................................................................................217

Jakub Sevcech and Maria Bielikova

RTStreams Session II

A Platform for Real-Time Opinion Mining from Social Media and News Streams .......................................................................223

Nikos Tsirakis, Vasilis Poulopoulos, Panagiotis Tsantilas, and Iraklis Varlamis

Predicting Object Trajectories from High-Speed Streaming Data ..................................................................................................229

Nikolaos Zorbas, Dimitrios Zissis, Konstantinos Tserpes, and Dimosthenis Anagnostopoulos

vii

Page 21: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

The Technology of Processing Intensive Structured Dataflow on a Supercomputer ......................................................................235

Vladislav A. Shchapov, Grigorii F. Masich, and Aleksei G. Masich

Issues in Complex Event Processing Systems .................................................................................................................................241

Ioannis Flouris, Nikos Giatrakos, Minos Garofalakis, and Antonios Deligiannakis

Author Index - Volume II

viii

Page 22: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

IEEE Catalog Number: ISBN:

CFP15TRU-POD 978-1-4673-7953-3

2015 IEEE Trustcom/BigDataSE/ISPA

Helsinki, Finland 20 – 22 August 2015

Volume 3 Pages 1-320

4/4

Page 23: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

2015 IEEE Trustcom/BigDataSE/ISPA

Trustcom-BigDataSE-ISPA 2015

Table of Contents

Volume - 3

Message from the IEEE TrustCom-ISPA-BigDataSE 2015 General Chairs ..............................................................................ix

Message from the ISPA 2015 Program Committee Chairs............................................................................................................x

ISPA 2015 Organizing and Technical Program Committee.........................................................................................................xi

Message from the RePara 2015 Workshop Chairs......................................................................................................................xiii

RePara 2015 Organizing and Program Committees....................................................................................................................xiv

Message from the PBio 2015 Workshop Chairs............................................................................................................................xv

PBio 2015 Organizing and Program Committees........................................................................................................................xvi

Message from the DIAS 2015 Workshop Chairs ........................................................................................................................xvii

DIAS 2015 Organizing and Program Committees.....................................................................................................................xviii

The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications

ISPA Session I

Evaluating HTM for Pauseless Garbage Collectors in Java ................................................................................................................1

Maria Carpen-Amarie, Dave Dice, Patrick Marlier, Gael Thomas, and Pascal Felber

Selfish Self-Stabilizing Approach to Maximal Independent Sets .......................................................................................................9

Li-Hsing Yen and Jean-Yao Huang

Parallel SMT Solving and Concurrent Symbolic Execution .............................................................................................................17

Emil Rakadjiev, Taku Shimosawa, Hiroshi Mine, and Satoshi Oshima

Identifying Hierarchical Structures in Sequences on GPU ...............................................................................................................27

Prashant Jalan, Arihant Kumar Jain, and Subhajit Roy

ISPA Session II

A New Fill-in Strategy for IC Factorization Preconditioning Considering SIMD Instructions ........................................................37

Takeshi Iwashita, Naokazu Takemura, Akihiro Ida, and Hiroshi Nakashima

Enhanced GPU Resource Utilization through Fairness-aware Task Scheduling ..............................................................................45

Ayman Tarakji, Alexander Gladis, Tarek Anwar, and Rainer Leupers

v

Page 24: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

Exploiting Hyper-Loop Parallelism in Vectorization to Improve Memory Performance

on CUDA GPGPU .............................................................................................................................................................................53

Shixiong Xu and David Gregg

ISPA Session III

Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems

Using Console and Resource Usage Logs .........................................................................................................................................61

Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, and James Browne

Metaprogramming Dense Linear Algebra Solvers Applications to Multi and Many-Core

Architectures .....................................................................................................................................................................................69

Ian Masliah, Marc Baboulin, and Joel Falcou

Parallel Monte Carlo Tree Search from Multi-core to Many-core Processors ..................................................................................77

S. Ali Mirsoleimani, Aske Plaat, Jaap van den Herik, and Jos Vermaseren

Routing Algorithms for Recursively-Defined Data Centre Networks ..............................................................................................84

Alejandro Erickson, Abbas Kiasari, Javier Navaridas, and Iain A. Stewart

Petri Nets Formalization of Map/Reduce Paradigm to Optimise the Performance-Cost Tradeoff ...................................................92

M. Carmen Ruiz, Javier Calleja, and Diego Cazorla

ISPA Session IV

A Horizontally-Scalable Multiprocessing Platform Based on Node.js ...........................................................................................100

Ahmad Maatouki, Joerg Meyer, Marek Szuba, and Achim Streit

Performance Evaluations of Document-Oriented Databases Using GPU and Cache Structure .....................................................108

Shin Morishima and Hiroki Matsutani

Energy-Efficient Sorting with the Distributed Memory Architecture ePUMA ..............................................................................116

Andréas Karlsson, Joar Sohl, and Dake Liu

Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps ................................................................124

Lars Frydendal Bonnichsen, Christian Wilhelm Probst, and Sven Karlsson

Analysis of the Impact of CPU Virtualization on Parallel Applications in Xen .............................................................................132

Kenichi Kourai and Riku Nakata

The First IEEE International Workshop on Reengineering for Parallelism in HeterogeneousParallel Platforms (RePara)

RePara Session I

Parallelizing High-Frequency Trading Applications by Using C++11 Attributes ..........................................................................140

Marco Danelutto, Tiziano De Matteis, Gabriele Mencagli, and Massimo Torquati

AKI: Automatic Kernel Identification and Annotation Tool Based on C++ Attributes .................................................................148

Rafael Sotomayor, Luis Miguel Sanchez, Javier Garcia Blas, Alejandro Calderon,

and Javier Fernandez

MeterPU: A Generic Measurement Abstraction API Enabling Energy-Tuned Skeleton Backend

Selection ..........................................................................................................................................................................................154

Lu Li and Christoph Kessler

vi

Page 25: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

RePara Session II

Exploiting Task-Parallelism on GPU Clusters via OmpSs and rCUDA Virtualization ..................................................................160

Adrián Castelló, Rafael Mayo, Judit Planas, and Enrique S. Quintana-Ortí

Parallel Pipeline on Heterogeneous Multi-processing Architectures ..............................................................................................166

Andrés Rodríguez, Angeles Navarro, Rafael Asenjo, Antonio Vilches, Francisco Corbera,

and María Garzarán

The Loop-of-Stencil-Reduce Paradigm ...........................................................................................................................................172

Marco Aldinucci, Marco Danelutto, Maurizio Drocco, Peter Kilpatrick, Guilherme Peretti Pezzi,

and Massimo Torquati

Prediction Models for Performance, Power, and Energy Efficiency of Software Executed

on Heterogeneous Hardware ...........................................................................................................................................................178

Dénes Bán, Rudolf Ferenc, István Siket, and Ákos Kiss

The Third IEEE International Workshop on Parallelism in Bioinformatics (PBio)

PBio: Cluster Computing in Bioinformatics

Parallel Computation of Voxelized Macromolecular Surfaces by Spatial Slicing ..........................................................................184

Sebastian Daberdaku and Carlo Ferrari

Scalable RNA Sequencing on Clusters of Multicore Processors ....................................................................................................190

Héctor Martínez, Sergio Barrachina, Maribel Castillo, Joaquín Tárraga, Ignacio Medina,

Joaquín Dopazo, and Enrique S. Quintana-Ortí

A Parallel Algorithm for Compression of Big Next-Generation Sequencing Datasets ..................................................................196

Sandino Vargas Pérez and Fahad Saeed

Assessment of a Black-Box Approach for a Parallel Finite Elements Solver in Computational

Hemodynamics ................................................................................................................................................................................202

Ferdinando Auricchio, Marco Ferretti, Adrien Lefieux, Mirto Musci, Alessandro Reali,

Santi Trimarchi, and Alessandro Veneziani

PBio: Hardware Accelerators in Bioinformatics

Smith-Waterman Protein Search with OpenCL on an FPGA .........................................................................................................208

Enzo Rucci, Carlos García, Guillermo Botella, Armando De Giusti, Marcelo Naiouf,

and Manuel Prieto-Matias

Accelerating Phylogenetic Inference on Heterogeneous OpenCL Platforms .................................................................................214

Lídia Kuan, Leonel Sousa, and Pedro Tomás

Accelerating DNA Sequence Analysis Using Intel(R) Xeon Phi(TM) ...........................................................................................222

Suejb Memeti and Sabri Pllana

Fast Epistasis Detection in Large-Scale GWAS for Intel Xeon Phi Clusters .................................................................................228

Glenn R. Luecke, Nathan T. Weeks, Brandon M. Groth, Marina Kraeva, Li Ma, Luke M. Kramer,

James E. Koltes, and James M. Reecy

vii

Page 26: 2015 IEEE Trustcom/BigDataSE/ISPA - Proceedingstoc.proceedings.com/28225webtoc.pdf2015 IEEE Trustcom/BigDataSE/ISPA Trustcom-BigDataSE-ISPA 2015 Table of Contents Volume - 1 Message

PBio: Many-core, Multi-core, and Distributed Computing in Bioinformatics

On the Performance of BWA on NUMA Architectures .................................................................................................................236

Josefina Lenis and Miquel Angel Senar

Parallel H4MSA for Multiple Sequence Alignment .......................................................................................................................242

Álvaro Rubio-Largo, Miguel A. Vega-Rodríguez, and David L. González-Álvarez

Discovering Candidates for Gene Network Expansion by Distributed Volunteer Computing .......................................................248

Francesco Asnicar, Luca Erculiani, Francesca Galante, Caterina Gallo, Luca Masera,

Paolo Morettin, Nadir Sella, Stanislau Semeniuta, Thomas Tolio, Giulia Malacarne,

Kristof Engelen, Andrea Argentini, Valter Cavecchia, Claudio Moser, and Enrico Blanzieri

The First IEEE International Workshop on Distributed Intelligent Automation Systems (DIAS)

DIAS Session I: Models and Applications for Industrial Cyber-physical Systems

Cyber-physical Design of Data Centers Cooling Systems Automation ..........................................................................................254

Arash Mousavi, Valeriy Vyatkin, Yulia Berezovskaya, and Xiaojing Zhang

Fuzzy Logic Based Prosumer Agent in a Modular Smart Grid Prosumer Architecture .................................................................261

Chen-Wei Yang, Kashif Gulzar, Seppo Sierla, and Valeriy Vyatkin

Adaptation of Material Flows in Mechanical Transportation Systems Based on Observation

Experience .......................................................................................................................................................................................269

Stanislav Belyakov, Marina Savelyeva, Jeffrey Yan, and Valeriy Vyatkin

An OPC UA Based Architecture for Testing Tracking Simulation Methods .................................................................................275

Gerardo Santillán Martínez, Tommi Karhela, Valeriy Vyatkin, Tuomas Miettinen, and Cheng Pang

Model-Driven Runtime Embedded Monitoring for Industrial Controllers .....................................................................................281

Pavel Kustarev, Sergei Bykovskii, Vasiliy Milin, and Alexander Antonov

DIAS Session II: Distributed Design Architectures

Synthesis of Safety Controllers for Distributed Automation Systems on the Basis of Reverse

Safe Net Condition/Event Systems .................................................................................................................................................287

Victor Dubinin, Valeriy Vyatkin, and Hans-Michael Hanisch

A Formal Perspective on IEC 61499 Execution Control Chart Semantics .....................................................................................293

Per Lindgren, Marcus Lindner, David Pereira, and Luís Miguel Pinho

Formal Modeling of Testing Software for Cyber-Physical Automation Systems ..........................................................................301

Igor Buzhinsky, Cheng Pang, and Valeriy Vyatkin

Inferring Automata Logic from Manual Control Scenarios: Implementation in Function Blocks .................................................307

Daniil Chivilikhin, Anatoly Shalyto, and Valeriy Vyatkin

Formal Verification of IEC61499 Function Blocks with Abstract State Machines

and SMV—Modelling .....................................................................................................................................................................313

Sandeep Patil, Victor Dubinin, and Valeriy Vyatkin

Author Index - Volume III

viii