ADVANCE PROGRAM - FiCloud

Transcription

ADVANCE PROGRAMIEEE FiCloud 2017The IEEE 5th International Conference on Future Internetof Things and CloudMobiWis 2017The 14th International Conference on Mobile Web andIntelligent Information SystemsLecture Notes in Computer Science (LNCS), SpringerInnovate-Data 2017The 3rd International Conference on Big Data Innovationsand Applications, IEEE-CS TCICo-located Symposia/Workshops:ICI, BigR&I, MobiApps, PMECT, SNAMS, SP4SC, AKEH,DS4IDS, AWMA, 5GET21-23 August 2017Prague, Czech RepublicWith support of: Charles University, Czech Republic1

KEYNOTE TALK IIoT Security: The Gathering StormAndrew MartinUniversity of OxfordUKAbstract:The Internet of Things (IoT) has begun to touch the lives of many already, and weare reaping benefits in convenience and economic value. Much has been invested inIoT security - and yet examples of insecure IoT devices and configurations arereported almost daily. Relatively few of these reports have come from tangibleexamples of loss or disruption by malice so far. Is this the calm before thestorm? Will the threats be contained, or will they overwhelm the IoT venture? Wewill consider some of the possible future scenarios, and the possible professionalresponses to these. It is clear that some profound improvement is needed: but iseffort best focused on engineering, design, law, regulation, consumer awareness, orall of these? We will ask what can realistically be achieved, and whether that willbe enough?Biography:Andrew Martin is a Professor of Systems Security and Director of Centre forDoctoral Training in Cyber Security at the Department of Computer Science,University of Oxford, UK. Prof. Martin undertakes research and teaching in the areaof Systems Security, in the University of Oxford. He was instrumental in setting upthe University's Cyber Security Network and helps to lead it, heading Oxford'sEPSRC/GCHQ-recognised Academic Centre of Excellence in Cyber SecurityResearch. He directs the Centre for Doctoral Training in Cyber Security, whichadmits 16 students each year for inter-disciplinary education and research. Hisrecent research focus has been on the technologies of Trusted Computing,exploring how they can be applied in large-scale distributed systems, particularlycloud computing, mobile devices, and the Internet of Things. He has publishedextensively in this area, hosting several related international events in Oxford andspeaking on the subject all over the world.2

KEYNOTE TALK IIBig Data Security and Privacy: Developments and DirectionsBhavani ThuraisinghamThe University of Texas at DallasUSAAbstract:The collection, storage, manipulation and retention of massive amounts of datahave resulted in serious security and privacy considerations. Various regulations arebeing proposed to handle big data so that the privacy of the individuals is notviolated. For example, even if personally identifiable information is removed fromthe data, when data is combined with other data, an individual can be identified.This is essentially the inference and aggregation problem that data securityresearchers have been exploring for the past four decades. This problem isexacerbated with the management of big data as different sources of data nowexist that are related to various individuals. While collecting massive amounts ofdata causes security and privacy concerns, big data analytics applications in cybersecurity is exploding. For example, an organization can outsource activities such asidentity management, email filtering and intrusion detection to the cloud. This isbecause massive amounts of data are being collected for such applications and thisdata has to be analyzed. The question is, how can the developments in big datamanagement and analytics techniques be used to solve security problems? Theseproblems include malware detection, insider threat detection, and intrusiondetection. To address the challenges of big data security and privacy as well as bigdata analytics for cyber security applications, we organized a workshop sponsoredby the National Science Foundation in September 2014 and presented the results in2015 at an inter-agency workshop in Washington DC. Since then severaldevelopments have been reported on big data security and privacy as well as on bigdata analytics of cyber security. This talk will summarize the findings of theworkshop and discuss the developments and directions.Biography:Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. Distinguished Professor inthe Erik Jonsson School of Engineering and Computer Science at the University ofTexas, Dallas (UTD) and the executive director of UTD’s Cyber Security Researchand Education Institute. Her current research is on integrating cyber security, cloudcomputing and data science. Prior to joining UTD she worked at the MITRECorporation for 16 years including a three-year stint as a Program Director at theNSF. She initiated the Data and Applications Security program at NSF and was partof the Cyber Trust theme. Prior to MITRE, she worked for the commercial industryfor six years including Honeywell. She is the recipient of numerous awards includingthe IEEE CS1997 Technical Achievement Award, the ACM SIGSAC 2010 OutstandingContributions Award, 2012 SDPS Transformative Achievement Gold Medal, 20133

IBM Faculty Award, 2017 ACM CODASPY Research Award, and 2017 IEEE CSServices Computing Technical Committee Research Innovation Award. She is a2003 Fellow of the IEEE and the AAAS and a 2005 Fellow of the British ComputerSociety. She has published over 120 journal articles, 250 conference papers, 15books, has delivered over 130 keynote addresses, and is the inventor of fivepatents. She has chaired conferences and workshops for women in her fieldincluding on Women in Cyber Security, Women in Data Science, and Women inServices Computing/Cloud and has delivered featured addresses at SWE, WITI, andCRA-W.4

KEYNOTE TALK IIIBig Data 2.0 Processing EnginesSherif SakrKing Saud bin Abdulaziz University for Health Sciences, Saudi ArabiaUniversity of New South Wales, AustraliaAbstract:For a decade, the MapReduce framework, and its open source realization, Hadoop,has emerged as a highly successful framework that has created a lot of momentumsuch that it has become the de facto standard of big data processing platforms.However, in recent years, academia and industry have started to recognize thelimitations of the Hadoop framework in several application domains and big dataprocessing scenarios such as large scale processing of structured data, graph dataand streaming data. Thus, we have witnessed an unprecedented interest to tacklethese challenges with new solutions which constituted a new wave of mostlydomain-specific, optimized big data processing engines. This talk refers to this newwave of systems as "Big Data 2.0 processing systems". It provides a taxonomy andanalysis of the state-of-the-art in this domain. In addition, it identifies a set of thecurrent open research challenges and discusses promising directions for futureresearch.Biography:Sherif Sakr is a Professor of Computer Science at King Saud bin AbdulazizUniversity for Health Sciences. He is also affiliated with the School of ComputerScience and Engineering (CSE) at University of New South Wales (UNSW Australia)and Data61/CSIRO (formerly NICTA). He received his PhD degree in Computer andInformation Science from Konstanz University, Germany in 2007. He has hold avisiting Researcher/Professor appointments at Macquarie University (2008-2009),Microsoft Research, Redmond, USA (2011), Nokia Bell Labs, Ireland - FormerlyAlcatel-Lucent Bell Labs (2012), Humboldt-Universität zu Berlin, Germany (2015),University of Zurich, Switzerland (2016), and Technical University of Dresden,Germany (2016). In 2013, he has been awarded the Stanford Innovation andEntrepreneurship Certificate. Prof. Sakr's research interests include, data andinformation management, big data processing and analytics, data science and bigdata management in cloud computing. He is an Associate Editor of the ClusterComputing Journal and Transactions on Large-Scale Data and Knowledge-CenteredSystems. He is an IEEE Distinguished Speaker.5

MONDAY 21 AUGUST 201708:00 am:Registration9:00-9:30Conference Opening (Room: Prague A B)09:30-10:30Plenary Session: Keynote IIoT Security: The Gathering StormAndrew Martin, University of OxfordSession Chair: Michel Kadoch, École de Technologie SupérieureRoom: Prague A B10:30-11:00Coffee Break11:00-12:30Parallel SessionsFiCloud Session 1: Performance Evaluation and ModellingSession Chair: Peter Bull, Birmingham City UniversityRoom: Prague A BA Run Time Technique for Handling Error in User-estimated Execution Timeson Systems Processing MapReduce Jobs with DeadlinesNorman Lim, Shikharesh Majumdar, and Peter Ashwood-SmithThe Effect of Workload Computational DemandPerformance of a SaaS Cloud with a Multi-Tier SLAGeorgios L. Stavrinides and Helen D. KaratzaVariabilityonthePerformance Evaluation of Framed Slotted ALOHA with Reservation Packetsfor M2M NetworksVicente Casares-Giner and Jorge Martinez-BausetAn Intersection Dynamic VANET Routing Protocol for a grid scenarioAhmad Abuashour and Michel KadochA Markov-based Prediction Model for Host Load Detection in Live VMMigrationSuhib Bani Melhem, Anjali Agarwal, Nishith Goel and Marzia Zaman6

MobiWis Session 1: Advanced Web and Mobile SystemsSession Chair: Peter Barth, Rheinmain UniversityRoom: Prague DRoute Recommendations to Business Travelers Exploiting Crowd-SourcedDataThomas Collerton, Andrea Marrella, Massimo Mecella, and Tiziana CatarciAudio Story and AR Platform for Youth EngagementKari Salo, Merja Bauters, and Tommi MikkonenShort and Reliable Path Selection for Automatic Evacuation Guiding Based onInteractions between Evacuees and Their Mobile DevicesTakanori Hara, Masahiro Sasabe, and Shoji KasaharaExploring Behavior Change Features for Mobile Workout ApplicationsPerin Ünal, Seyma Kucukozer Cavdar, Tuğba Taşkaya Temizel, P. Erhan Erenand Sriram Iyengar12:30-13:3013:30-15:00LunchParallel SessionsFiCloud Session 2: Security, Privacy and Trust 1Session Chair: Jonny Karlsson, Arcada University of Applied SciencesRoom: Prague A BService Assignment in Federated Cloud Environments based on MultiObjective Optimization of SecurityTalal Halabi and Martine BellaicheA JSON Token-Based Authentication and Access Management Schema forCloud SaaS ApplicationsObinna Ethelbert, Faraz Fatemi Moghaddam, Philipp Wieder, RaminYahyapourHow to adapt Authentication and Authorization Infrastructure of applicationsfor the CloudTri Hoang Vo, Woldemar Fuhrmann and Klaus-Peter Fischer-HellmannEnsuring Information Security for Internet of ThingsNatalia Miloslavskaya and Alexander TolstoyAn Empirical Study of Cultural Dimensions and Cybersecurity DevelopmentAristotle Onumo, Andrea Cullen and Irfan Awan7

MobiWis Session 2: Mobile Web - Practice and Experience ISession Chair: Markus Aleksy, ABB Corporate ResearchRoom: Prague DPrediction of Conditions for Drying Clothes based on Area and TemperatureDataMarketa Stastna, Jan Dvorak, Ali Selamat and Ondrej KrejcarGoogle Glass Used as Assistive Technology Its Utilization for Blind andVisually Impaired PeopleAles Berger, Andrea Vokalova, Filip Maly and Petra PoulovaAn Approach of Solid Waste Monitoring with Smart Dumpsters and DisposalPınar Kirci, Lutfu Çagatay Agca and Muhammed Fatih AksuIntelligent Notepad for Windows Phone that Uses GPS DataMilan Kostak, Jan Dvorak, Ali Selamat and Ondrej KrejcarBigR&I Session 1: Big Data Research and Innovation 1Session Chair: Esa Hämäläinen, University of TurkuRoom: Vienna I IIDistributed knowledge acquisition basing on integration of Data Mining andText Mining methods and their usage with AT-TECHNOLOGY workbenchGalina V. Rybina, Yury M. Blokhin and Elena S. SergienkoSecurity Intelligence Centers for Big Data ProcessingNatalia MiloslavskayaBig Data, cost and emission reporting in process industryEsa Hämäläinen and Elen TwrdyUse of Data Mining Algorithms While Determining Threshold Values ofEconomic Security IndicesZhukov A. N., Leonov P. Y., Evsikov K. V., Domashova J. V. & Morozov N. V.15:00-15:30Coffee Break15:30-17:00Parallel SessionsFiCloud Session 3: IoT Services and ApplicationsSession Chair: Ron Austin, Birmingham City UniversityRoom: Prague A B8

Technologies for a Thing-Centric Internet of ThingsElisabetta Farella, Manuele Rusci, Bojan Milosevic and Amy L. MurphyProposal of Adaptive Data Rate Algorithm for LoRaWAN-based InfrastructureVojtech Hauser and Tomáš HégrEnergy efficient design of a pasture sensor networkLuís Nóbrega, Paulo Pedreiras, Pedro Gonçalves and Sérgio SilvaIoT-Based Real-Time Telemetry System Design: An ApproachAhmet AlbayrakImprove IoT/M2M data organization based on stream patternsMário Antunes, Ricardo Jesus, Diogo Gomes, and Rui L. AguiarMobiWis Session 3: Mobile Web - Practice and Experience 2Session Chair: Aneta Poniszewska-Maranda, Lodz University of TechnologyRoom: Prague DCalculating the Optimal Price of Products in an Online StoreOndrej Sukala, Petra Maresova, Jan Dvorak, Ali Selamat and Ondrej KrejcarSmart Security System based on Android PlatformPavel Zubr, Jan Dvorak, Ali Selamat and Ondrej KrejcarMobile Health Application Running on Public Cloud during HajjIbtehal NafeaMobile Devices and Mobile Applications Used in Parkinson’s DiseaseBlanka KlimovaBigR&I Session 2: Big Data Research and Innovation 2Session Chair: Natalia Miloslavskaya, MEPhIRoom: Vienna I IIInvestigation of money laundering and extremism indicators relationshipAidaralieva Alina A. and Krylov Grigory O.A systematic approach to describing the source code of a cloud platform withassured securityDmitry DemidovDeriving Cognitive Map Concepts on the Basis of Social Media DataClusteringVasiliy S. Kireev9

The Use of Clustering Algorithms Ensemble with Variable Distance Metrics inSolving Problems of Web MiningPyotr V. Bochkaryov and Anna I. Guseva17:00-18:30Parallel SessionsFiCloud Session 4: Energy EfficiencySession Chair: Filipe Portela, University of Minho, PortugalRoom: Prague A BGreenCloudTax: A flexible IaaS Tax Approach as Stimulus for Green CloudComputing Benedikt Pittl, Werner Mach and Erich SchikutaAutomatic Inference of Energy Models for Peripheral Components inEmbedded SystemsNadir Cherifi, Thomas Vantroys, Alexandre boe, Colombe Herault and GillesGrimaudEnergy-aware Mobile Edge Computing for Low-Latency Visual DataProcessingHuy Trinh, Dmitrii Chemodanov, Shizeng Yao, Qing Lei, Bo Zhang, Fan Gao,Prasad Calyam, and Kannappan PalaniapSupporting Energy-EfficientArchitecturesKyle Siehl and Xinghui ZhaoComputingonHeterogeneousCPU-GPUModeling the Affects of Independent Components on Mobile Device ChargingTimesMathew Schlichting and Jason SawinMobiWis Session 4: Security and Mobile Network SystemsSession Chair: Dwaine Clarke, University of the West IndiesRoom: Prague DAn Authentication Mechanism for Accessing Mobile Web ServicesKamal Eldin Mohamed, Duminda Wijesekera, and Paulo Cesar CostaAspects of application security for Internet of Things systemsAneta Poniszewska-Maranda and Bartosz WieczorekTrack & Trace System with Serialization Prototyping Methodology forPharmaceutical Industry in EUJosef Horalek and Vladimir Sobeslav10

Visual Moving Objects Tracking Using Shape Detectors and Object ModelsYin-Tien Wang and Chin-An ShenResearch of the Mobile CDMA Network for the Operation of an IntelligentInformation System of Earth-Moving and Construction MachinesTatyana Golubeva, Viktor Pokussov, Sergey Konshin, Boris Tshukin andEvgeniy ZaytcevBigR&I Session 2: Big Data Research and Innovation 3Session Chair: Natalia Miloslavskaya, MEPhIRoom: Vienna I IIThe Use of Entropy Measure for Higher Quality Machine Learning Algorithmsin Text Data ProcessingAnna I.Guseva and Igor A. KuznetsovThe analysis of big data a nd the accuracy of financial reportsViktor P. Suyts, Alexander S. Shadrin and Pavel Y. LeonovAdaptation of Cluster Analysis Methods in Respect to Vector Space of SocialNetwork Analysis Indicators for Revealing Suspicious Government ContractsDavydenko V. I., Morozov N. V., and Burmistrov M. I.19:30-21:30Reception Party(at Vienna House Diplomat Hotel - conference venue)11

TUESDAY 22 AUGUST 201709:00-10:30Plenary Session: Keynote IIBig Data Security and Privacy: Developments and DirectionsBhavani Thuraisingham, The University of Texas at DallasSession Chair: Eleni Karatza, Aristotle University of ThessalonikiRoom: Prague A B10:30-11:00Coffee Break11:00-12:30Parallel SessionsFiCloud Session 5: Security, Privacy and Trust 2Session Chair: Martine Bellaiche, École Polytechnique de MontréalRoom: Prague A BSecurity in Lightweight Network Function Virtualisation for Federated Cloudand IoTPhilippe Massonet, Laurent Deru, Amel Achour, Sebastien Dupont, LouisMarie Croisez, Anna Levin and Massimo VillariConcept for Increasing Security of National Information TechnologyInfrastructure and Private CloudsMelnikov D.A. Durakovsky A.P., Dvoryankin S.V., and Gorbatov V.S.Secure Self-Destruction of Shared Data in Multi-Cloud IoTFarida Ali Guechi and Ramdane MaamriSecure and Reliable Internet of Things Systems for HealthcareGöran Pulkkis, Magnus Westerlund, Jonny Karlsson and Jonas TanaA Framework for Trust Assessment of Security Systems on Flexible NetworksSerif Bahtiyar, Orhan Ermis ̧, M. Ufuk CaglayanMobiWis Session 5: Mobile and Wireless NetworkingSession Chair: Tor-Morten Groenli, Oslo School of Arts, Communication &TechnologyRoom: Prague DBlaubot - Hassle-free Multi-Device ApplicationsPeter Barth and Henning Groß12

Overhead Analysis of Inter-Domain Mobility Management in MulticastingSupported FPMIPv6 NetworksHanjun Cho and Jongpil JeongSoftware Techniques for Implementing Dynamic Network-Aware Energy-Ecient Download ManagersLouis Soleyn and Dwaine ClarkeNew Formulations for an Optimal Connectivity Approach for Mobile Ad-HocNetworksPablo Adasme, Ismael Soto and Fabian SeguelOn Cost-E ective Inter-LMA Domain Handover Scheme in NEMO-PMIPv6NetworksShinyeol Park, Changyong Um, and Jongpil JeongIndustry Session: Invited Industry TalksSession Chair: Marcin Bajer, ABB Corporate ResearchRoom: Vienna I IIWhat does the future hold for Data Intensive Computing and the ModernData & Analytics platform?Richard L. Harman, Cloudera Inc.Simulation on HadoopJustin Lyon, Simudyne LtdEngineering Augmented Reality Applications in Industrial SettingsMarkus Aleksy, ABB Corporate Research12:30-13:3013.30-15:00LunchParallel SessionsFiCloud Session 6: Software Architecture and MiddlewareSession Chair: Stefan Bosse, Universität BremenRoom: Prague A BProduction Deployment Tools for IaaSes: an Overall Model and SurveyHélène Coullon, Dimitri Pertin and Christian PerezAn approach to failure prediction in a cloud based environmentHussaini Adamu, Bashir Mohammed, Ali Bukar Maina, Andrea Cullen, HassanUgail, Irfan Awan13

Performance Modelling and Analysis of an OpenStack IaaS Cloud ComputingPlatformK.M. Maiyama, Bashir Mohammed, M. A. Kamala, D. D. Kouvatsos and M.KiranSelf-Healing in Dynamic Web Service CompositionVenushini Rajendran, Fang-Fang Chua and Gaik-Yee ChanP-Spar(k)ql: SPARQL evaluation method on Spark GraphX with parallelquery planGergo Gombos and Attila KissMobiWis Session 6: Web, Cloud and Distributed SystemsSession Chair: Kari Salo, Metropolia University of Applied SciencesRoom: Prague DAdopting SOA in public service provisionGebremariam Mesfin, Tor-Morten Grønli, Gheorghita Ghinea and MuhammadYounasLinux Server Monitoring and Self-Healing System using NagiosTanapat Anusas-amornkul and Sirasit SangratPerformance Analysis of Cloud Computing InfrastructureAles Komarek, Jakub Pavlik, and Vladimir SobeslavAnalysis and Solution Model ofCalculationsJosef Horalek and Vladimír SoběslavDistributedComputinginScientificAnalysis and Dynamical Simulation of Heart Rate Influence upon PhysicalLoadJan Kubicek, Martin Augustynek, Marek Penhaker, Martin Cerny, and IvetaBryjovaInnovate-Data Session 1: Big Data Innovat

Texas, Dallas (UTD) and the executive director of UTD’s Cyber Security Research and Education Institute. Hercurrent research is on integrating cyber security, cloud computing and data science. Prior to joining UTD she worked at the MITRE Corporation for 16 years inclu