Download: Final Program(PDF).

 

 

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

 

FINAL PROGRAM

 

 

1618 November 2016

Zhangjiajie, Hunan Province, China

 

Copyright © Trusted Computing Institute, Central South University, China

http://trust.csu.edu.cn

 


 

Introduction to Central South University

 

 

Central South University (CSU) is a comprehensive and national key university under the direct administration of the Ministry of Education in China. CSU is among the first group of top universities in China admitted into “Project 211”, which is a project of building national key universities and colleges for the 21st century, and “Project 985”, which is a joint constructive project of building world-class universities co-sponsored by the Chinese central government and the local governments, and “Project 2011”, which is targeted for promoting the capability and capacity of cooperative creativity in top universities in China. Mr. Zhang Yaoxue, a member of the Chinese Academy of Engineering, and the inventor of Transparent Computing (TC), is the President of CSU.

 

Approved by the State Council, CSU was established on April 29, 2000, by merging three separate universities, including Hunan Medical University (HMU), Changsha Railway University (CRU), and Central South University of Technology (CSUT). CSU covers an area of around 5,117 mu (341 hectares).

 

CSU boasts a high-quality group of faculty, comprising of many famous scholars and experts with great influence both at home and abroad. Among them, there are 2 members of the Chinese Academy of Sciences, 15 academicians who are members of Chinese Academy of Engineering, 9 are members of the Discipline Assessment Group of the Academic Degrees Committee of the State Council, 23 scientific and technological experts have been recognized at a national level for their outstanding achievements, 545 experts have been awarded special subsidies from the Government, more than 1000 are doctorate supervisors and 33 are Special-term Professors funded by the Changjiang Scholar Program. In addition, CSU has appointed a number of well-known Chinese and international scholars as honorary professors, visiting professors, or adjunct professors.

 

CSU covers 12 fields of study, including engineering, science, medicine, management, literature, law, economics, philosophy, education, history, agriculture, and art, and offers military science as well. It consists of 30 colleges offering 92 programs for bachelors’ degrees, and a graduate school comprising of a number of national key disciplines, including 6 at first-level (ranking 8th in China), 12 at second-level and one in development. 91 first-level disciplines are authorized to confer masters and doctoral degrees. 191 programs are offered for doctoral degrees, 307 programs for masters’ degrees and 19 programs for professional masters’ degrees. CSU also has 42 post-doctoral exchange centers, ranking 9th among Chinese universities and colleges.

 

At present, more than 55,000 full-time students are studying at CSU, including 20,000 graduate students and 800 foreign students, from 31 provinces and municipalities of the mainland China, as well as 80 countries and regions of the rest of the world. CSU is a leading and top ranking Chinese university in the following aspects: one of the universities first starting an eight-year medical program ( M.D.), the first university running a pilot class for training innovation-oriented senior engineering talents, the first civilian university offering master degree in military command and technique for officers, boasting five national talents training and teaching bases, six national centers for experimental teaching, 57 national exemplary courses, six bilingual national exemplary courses, six “excellent teachers” and eight teaching teams highly recognized by the state, 15 National Top 100 Doctoral Dissertations produced by its graduates since 2000. CSU also possesses three national first-class affiliated hospitals equipped with state-of-the-art medical facilities.

 

 

http://www.csu.edu.cn/

 


 

Introduction to Guangzhou University

 

 

Guangzhou University (GU) is a comprehensive and key public university dually affiliated to Guangzhou Municipal Government and Guangdong Provincial Government with a history of over 70 years. The university has two campuses covering a total area of 153.3 hectares. The major campus is located in the south western part of Guangzhou Higher Education Mega Center (Xiao Gu Wei Island) and the other one is located in downtown (Gui Hua Gang) of Guangzhou.

 

GU has a teaching and research staff of 2400 people, including three academicians and 7 double-hired academicians. It has approximately 1400 full-time faculty members, including 351 professors. The number of the current full-time undergraduates of GU is over 30000. The University has 27 colleges, offering 81undergraduate majors, doctoral degree programs in 3 Level-I disciplines, master degree programs in 26 Level-I and 95 Level-II disciplines as well as 9 professional Master’s degree programs, and is authorized to run 3 Post-Doctoral programs. All of its majors require students’ scores to be above the one for entering first-class universities in college entrance examination.

 

In the new age, the university is engaged in making a contribution to the community. The goal of the university is to mold itself as a comprehensive university with a characteristic and ranks in a leading position among the universities of similar type.

 

 

http://www.gzhu.edu.cn/

 

Introduction to Jishou University

 

 

Jishou University (JSU) is a public university in the western part of Hunan Province and the only comprehensive university in the border area of Hunan, Hubei, Chongqing and Guizhou provinces. Founded in September 1958, the University is composed of two campuses in Jishou and Zhangjiajie cities, with the main campus in Jishou City, the capital city of Xiangxi Autonomous Prefecture.

 

In 2003, the university was entitled the right to confer master’s degrees. In October 2006, the university successfully passed the undergraduate education evaluation on regular institutions of higher learning organized by the Ministry of Education with a comment of “Excellent”. The year of 2012 saw the university rank among “universities of capacity construction project in mid-west”. At the same year, the university was approved to carry out “Ph. D program catering for special demands of our country”.

 

The university covers an area of 1.29 million square meters with the total building area of 600,000 square meters. Presently, the university has been equipped with various teaching and scientific researching instruments and equipments with a total value of over RMB 170 million as well as a book and literature collection of over 2.3million volumes. The university currently has over 1000 full-time teachers, of which 86% are provided with doctor’s or master’s degree.

 

At present, there are 70 undergraduate majors offered by the university, among which 3 are national characteristic majors, 8 are provincial characteristic majors.8 are provincial key majors. The university is now operating 1 Ph.D program catering for special demands of our county,14 first-grade disciplines for master’ a degree, 1 professional master degree program and 1characteristic, advanced and key discipline, covering 11 main disciplines. In addition, there are 14 provincial and ministerial level key research bases,1 national experimental teaching demonstration center,5 provincial practice teaching demonstration centers.

 

The students of various types total over 30,000, of which over 18,000 are full-time undergraduate students, over 800 are graduate students. The number of undergraduates in the independent college is almost 8,000, and that of adult diploma education students is over 7,000.

 

Over half a century, the university adheres to the educational philosophy of “Populace University”, regards it as its own duty to serve for the regional economic and social development, fulfills irreplaceable educational function in the west of Hunan and in the border area of Hunan, Hubei, Chongqing and Guizhou provinces, forming distinguished schooling-running characteristics and being widely approved by all sectors of the society.

 

 

http://www.jsu.edu.cn/

 


 

TABLE OF CONTENTS


 

 

Introduction to Central South University (CSU)

Cover Page 02

Introduction to Guangzhou University (GU)

Cover Page 03

Introduction to Jishou University (JSU)

Cover Page 04

Final Program at a Glance

Page 01

Quick Guide to Rooms for Keynote / Technical Sessions

Page 02

Keynote Speeches

Page 03

Technical Sessions and Papers

Page 06

Conference Venue

Page 12

Sponsors, Organizers, and Publishers

Page 14


 

FINAL PROGRAM of SpaCCS 2016 AT A GLANCE

 

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

(SpaCCS 2016)

Nov. 16-18, 2016

 

Zhangjiajie International Hotel

No. 145, Sanjiaoping, Yongding District, Zhangjiajie, Hunan Province, China

 

Nov. 15

14:00-18:00

Registration, Reception

Nov. 16

08:30-18:00

Opening, Keynote (1), Paper Presentation

12:30-14:00

Lunch

18:30-20:30

Dinner

Nov. 17

08:30-17:30

Paper Presentation

12:30-14:00

Lunch

18:30-20:30

Banquet

Nov. 18

08:30-12:00

Keynote (2,3)

12:00-14:00

Lunch

 

 

 

 

Organized by: Central South University, Guangzhou University, Jishou University

 

 

          


 

Quick Guide to Rooms for Keynote/Technical Sessions

 

Room Number

Room Name

Floor

Room 1

Grand Hall

(多功能厅)

2

Room 2

Guoyan Hall

(国宴厅)

2

Room 3

Xiangjiang Hall

(湘江厅)

2

Room 4

Zijiang Hall

(资江厅)

2

Room 5

Lishui Hall

(澧水厅)

2

 


 

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Keynote 1: Flow-Net Accountable Logging and Applications

Speaker: Prof. Yang Xiao, The University of Alabama, USA

Chair: Peter Mueller, IBM Zurich Research, Switzerland

09:00-09:45, November 16, 2016 (Wednesday)

 

About the Keynote Speaker

Prof. Yang Xiao currently is a Professor of Department of Computer Science at the University of Alabama, Tuscaloosa, AL, USA. His current research interests include networking and computer/network security. He has published over 200 journal papers and over 200 conference papers. Dr. Xiao was a Voting Member of IEEE 802.11 Working Group from 2001 to 2004, involving IEEE 802.11 (WIFI) standardization work. He is a Fellow of IET. He currently serves as Editor-in-Chief for International Journal of Security and Networks, International Journal of Sensor Networks, and Journal of Communications. He had (s) been an Editorial Board or Associate Editor for 17 international journals. He served (s) as a Guest Editor for over 20 times for different international journals. Dr. Xiao has delivered over 30 keynote speeches at international conferences around the world and gave more than 60 invited talks at different international institutes.

Summary:

Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of larger chains of accountability. One of the goals of accountability is that once an event has transpired, the events that took place are traceable so that the causes can be determined afterward. The poor accountability provided by today's computers and networks wastes a great deal of money and effort. This is due to the simple fact that today's computing and network infrastructure was not built with accountability in mind. In this talk we introduce our previous work: accountable logging methodology called flow-net. We apply this methodology to many applications ranging from operating system design to computer networks.


 

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Keynote 2: Attribute-Based Access Control Status and Directions

Speaker: Prof. Indrakshi Ray, Colorado State University, USA

Chair: Chen Liu, North China University of Technology, China

09:00-10:00, November 18, 2016 (Friday)

 

About the Keynote Speaker

Prof. Indrakshi Ray is a Professor in the Computer Science Department at Colorado State University. She has been a visiting faculty at Air Force Research Laboratory, Naval Research Laboratory, and at INRIA, Rocquencourt, France. She obtained her Ph.D. in Information Technology from George Mason University. Dr. Ray's research interests include security and privacy, database systems, and formal methods for software assurance. She is on the editorial board of IEEE Transactions on Dependable and Secure Computing and Computer Standards and Interfaces. She has been a guest editor of ACM Transactions of Information Systems Security and Journal of Digital Library. She was the Program Chair of ACM SACMAT 2006, Program Co-Chair for ICISS 2013, CSS 2013, IFIP DBSec 2003, and General Chair of SACMAT 2008.

Summary:

Attribute-based access control (ABAC) appears to be a promising direction for futuristic applications. ABAC encompasses almost existing access control models, including Identity-Based Access Control, Role-Based Access Control. In this talk, we will look at two ABAC research efforts, namely, eXtensible Access Control Markup Language (XACML) and NIST Next Generation Access Control (NGAC) and provide a detailed comparison. We will demonstrate how these approaches satisfy the needs of some applications, including policies in the health care sector. We will also provide pointers to the open problems and some directions for future research in ABAC.

 


 

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Keynote 3: Network Attack and Defence: State-of-Art, Challenges, and Opportunities

Speaker: Prof. Shui Yu, Deakin University, Australia

Chair: Sabu M. Thampi, Indian Institute of Information Technology and Management, India

10:30-11:30, November 18, 2016 (Friday)

 

About the Keynote Speaker

 

Prof. Shui Yu is currently a Senior Lecturer of School of Information Technology, Deakin University. He is a member of Deakin University Academic Board (2015-2016), a Senior Member of IEEE, and a member of AAAS and ACM, the vice chair of Technical Subcommittee on Big Data Processing, Analytics, and Networking of IEEE Communication Society, and a member of IEEE Big Data Standardization Committee. Dr Yu's research interest includes Security and Privacy in Networking, Big Data, and Cyberspace, and mathematical modelling. He has published two monographs and edited two books, more than 150 technical papers, including top journals and top conferences, such as IEEE TPDS, IEEE TC, IEEE TIFS, IEEE TMC, IEEE TKDE, IEEE TETC, and IEEE INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 22. Dr Yu actively serves his research communities in various roles. He is currently serving the editorial boards of IEEE Communications Surveys and Tutorials, IEEE Access, and a number of other international journals. He has served more than 70 international conferences as a member of organizing committee, such as publication chair for IEEE Globecom 2015, IEEE INFOCOM 2016 and 2017, TPC co-chair for IEEE BigDataService 2015, IEEE ATNAC 2014 and 2015.

Summary:

Cyberspace is now a critical battle ground for attacks and defences at personal and national level. However, cybersecurity is a mainly uncharted territory, and we have far more questions than answers from applications all the way to theories. In this talk, we firstly present the state-of-art of the field based on our own research and extensive study in cybersecurity. We present the problems and challenges that we are facing, and discuss the possible directions in the field.


 

A. SESSIONS AND PAPERS IN SpaCCS 2016

The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Session 1Security I, 10:30-12:30, November 16 (Wednesday), Room 1

Chair: Md. Zakirul Alam Bhuiyan, Fordham University, USA

A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier

Zhicai Shi, Fei Wu, Changzhi Wang , and Shitao Ren

A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage

Huakang Li, Zhenyu Wang, Yitao Yang, and Guozi Sun

An Improved Asymmetric Searchable Encryption Scheme

Qi Wu

Big Data Security Analytic for Smart Grid with Fog Nodes

Wenlin Han, and Yang Xiao

Computation of Secure Consistency for Real Systems

Computation of Secure Consistency for Real Systems

A User Authentication Scheme Based on Trusted Platform for Cloud Computing

  Jiaqing Mo, Zhongwang Hu, and Yuhua Lin

          

          

Session 2: Security II, 14:00-15:20, November 16 (Wednesday), Room 1

Chair: Prof. Yang Xiao, The University of Alabama, USA

ROP-Hunt: Detecting Return-oriented Programming Attacks in Applications

Lu Si, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, and Shasha Li

On the Security of a Threshold Anonymous Authentication Protocol for VANETs

Jianhong Zhang, Zhibin Sun, Shuai Liu, and Pengyan Liu

The Encryption Scheme with Data Compression based on QC-LDPC

Yiliang Han

Defect Analysis and Risk Assessment of Mainstream File Access Control Policies

Li Luo, Hongjun He, and Jiao Zhu

 

 

Session 5: Anonymity I, 16:00-18:00, November 16 (Wednesday), Room 1

Chair: Sabu M. Thampi, Indian Institute of Information Technology and Management, India

Recommendation Systems in Real Applications: Algorithm and Parallel Architecture

Mengxian Li and Wenjun Jiang, and Kenli Li

A Reduction Method of Analyzing Data-liveness and Data-boundedness for a Class of E-commerce Business Process Nets

Wangyang Yu, Guanjun Liu, and Leifeng He

A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm

Jie Wang, and Jie Wu

Modeling and Propagation Analysis on Social Influence Using Social Big Data

Sancheng Peng, Shengyi Jiang, and Pengfei Yin

          User Preference-based Spamming Detection with Coupled Behavioral Analysis

           Frank Jiang, Mingdong Tang, and Quang Anh Tran

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-move Forgery Detection

    Fei Zhao, Wenchang Shi, Bo Qin, and Bin Liang

 

 

Session 8: Privacy I, 09:00-10:00, November 17 (Thursday), Room 1

Chair: Wang Tian, Huaqiao University, China

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services

Tao Peng, Qin Liu, Guojun Wang, and Yang Xiang

Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS

Jiayi Gan, Hongyun Xu, Mengzhen Xu, Kai Tian, Yaohui Zheng, and Yong Zhang

Location Privacy Preserving Scheme Based on Attribute Encryption

Xi Lin, Yiliang Han, Yan Ke, and Xiaoyuan Yang

 

 

Session 10: Security III, 10:30-12:10, November 17 (Thursday), Room 1

Chair: Zhitao Guan, North China Electric Power University, China

Ghost Train for Anonymous Communication

Przemysław Bła´skiewicz, Mirosław Kutyłowski, Jakub Lemiesz, and Małgorzata Sulkowska

Efficient Detection Method for Data Integrity Attacks in Smart Grid

Peixiu An, and Zhitao Guan

Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption Scheme

Changji Wang, Jian Fang, and Jianguo Xie

          FASRP: A Fully Anonymous Security Routing Protocol in MANETs

            Jun Pan, Lin Ma, and Kai Yu

          Security in Software-Defined-Networking: A Survey

          Zhen Yao, and Zheng Yan

 

 

Session 12: Privacy II, 14:00-15:00, November 17 (Thursday), Room 1

Chair: Sancheng Peng, Guangdong University of Foreign Studies, China

Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare

Dacheng Meng, Wenbo Wang, Entao Luo, and Guojun Wang

A Privacy Preserving Friend Discovery Strategy using Proxy Re-encryption in Mobile Social Networks

Entao Luo, Wenbo Wang, Dacheng Meng, and Guojun Wang

A Comprehensive Survey of Privacy-Preserving in Smart Grid

Guanlin Si, Zhitao Guan, Jing Li, Peng Liu, and Hong Yao

 

 

Session 13: Privacy III, 14:00-15:00, November 17 (Thursday), Room 4

Chair: Xiaofei Xing, Guangzhou University, China

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data

Qiang Zhang, Qin Liu, and Guojun Wang

Privacy Protection in Mobile Recommender Systems: A Survey

Kun Xu, and Zheng Yan

On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services

Hanni Cheng, Shiling Mao, Minhui Xue, and Xiaojun Hei

 

 

Session 15: Security IV, 15:30-17:10, November 17 (Thursday), Room 1

Chair: Peter Mueller, IBM Zurich Research, Switzerland

Building Root of Trust for Report with Virtual AIK and Virtual PCR Usage for Cloud

Qiang Huang, Dehua Zhang, Le Chang, and Jinhua Zhao

Service-oriented Workflow Executability from a Security Perspective

Sardar Hussain, Richard O. Sinnott, and Ron Poet

Distributed Multi-Authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks

Wenbo Wang, Fang Qi, and Quan Luo

          Modeling Attack Process of Advanced Persistent Threat

            Weina Niu, Xiaosong Zhan, Kenli Li, Guowu Yang, and Ruidong Chen

          A New Image Encryption Scheme Using a Hyperchaotic System

            Chong Fu, Ming Tie, Jian-lin Wang, Shao-ting Chen, and Hui-yan Jiang

 

 

Session 16: Security V, 15:30-17:10, November 17 (Thursday), Room 4

Chair: Jinjun Chen, University of Technology, Sydney, Australia

Architectural Patterns for Security-oriented Workflows in Collaborative Environments

Sardar Hussain, Richard O. Sinnott, and Ron Poet

Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known Attack

Mimi Wang, Guanjun Liu, Chungang Yan, and Changjun Jiang

Authentication and Transaction Verification using QR Codes with a Mobile Device

Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, and Cong Wang

          Secure and Efficient Mobile Payment Using QR code in an Environment with Dishonest Authority

            Xiaoling Zhu, Zhengfeng Hou, Donghui Hu, and Jing Zhang

          Encryption Scheme based on Hyperelliptic Curve Cryptography

            Asha Liza John, and Sabu M Thampi

 

 

B. SESSIONS AND PAPERS IN TrustData 2016

The 7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)

Session 4: TrustData 2016-I, 14:00-15:20, November 16 (Wednesday), Room 5

Chair: Wenjun Jiang, Hunan University, China

Security and Privacy in Big Data Lifetime: A Review

Hanlu Chen, and Zheng Yan

Community-based Adaptive Buffer Management Strategy in Opportunistic Network

Junhai Zhou, Yapin Lin, Siwang Zhou, and Qin Liu

Energy-Aware Location Privacy Routing for Wireless Sensor Networks

Jingjing Zhang, and Zhengping Jin

ChainMR Crawler: A Distributed Vertical Crawler Based on MapReduce

Xixia Liu, and Zhengping Jin

 

 

Session 18: TrustData 2016-II, 16:10- 17:30, November 17 (Thursday), Room 5

Chair: Qin Liu, Hunan University, China

An Improved Ring-Based Model for Big Data Storage and Retrieval in Wireless Sensor Networks

Hongling Chen, Quangang Wen, and Xiaoyang Fu

Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File

Saba Awan, and Nazar Abbas Saqib

Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis

Xiaofeng Song, Zhiyuan Li, Liju Chen, and Jiong Liu

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services

Shaobo Zhang, Qin Liu, and Guojun Wang

 

 

C. SESSIONS AND PAPERS IN TSP 2016

The 6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)

Session 7: TSP 2016, 16:00-18:00, November 16 (Wednesday), Room 5

Chair: Wenjun Jiang, Hunan University, China

AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking along the Eventdependency Graph

Tianjun Wu, and Yuexiang Yang

CapaDroid: Detecting Capability Leak for Android Applications

Tianjun Wu, and Yuexiang Yang

Research and Implementation Key Technology of Security Mobile Office

Feng Qiu, and Xiaoqian Li

Makespan Minimization for Batch Tasks in Data Centers

Xin Li, and Cui Tang

Opportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center

Guoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian

A Software Detection Mechanism Based on SMM in Network Computing

Lei Zhou, Yang Shu, and Guojun Wang

 

 

D. SESSIONS AND PAPERS IN NOPE 2016

The 4th International Workshop on Network Optimization and Performance Evaluation (NOPE 2016)

Session 11: NOPE 2016, 10:30-12:10, November 17 (Thursday), Room 4

Chair: Gaocai Wang, Guangxi University, China

Optimizing Propagation Network of Certificate Revocation in VANET with Meet-Table

Baohua Huang, Jiawei Mo, Qi Lu, and Wei Cheng

Game Theoretical Analysis on System Adoption and Acceptance: A Review

Xueqin Liang, Zheng Yan, and Peng Zhang

An Energy-efficient Caching Strategy based on Coordinated Caching for Green Content-centric Network

Huiqing Xu, Hengjie Huang, and Gaocai Wang

Characterizing the Scalability and Performance of Analytic Database System

Yishui Li, Hui Li, Mei Chen, Zhenyu Dai, and Ming Zhu

An Analysis of the Survivability in SEER Breast Cancer Data Using Association Rule Mining

Fangfang Li, and Yu Duan

 

 

E. SESSIONS AND PAPERS IN DependSys 2016

The 2nd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2016)

Session 3: DependSys 2016-I, 14:00-15:20, November 16 (Wednesday), Room 4

Chair: Md. Zakirul Alam Bhuiyan, Fordham University, USA

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users

Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Hui Tian, and Yonghong Chen

Greedy Probability-based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network

Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, and Christian Esposito

A Real-time Processing System for Anonymization of Mobile Core Network Traffic

Mian Cheng, Baokang Zhao, and Jinshu Su

A New Classification Process for Network Anomaly Detection Based on Negative Selection Mechanism

Naila Belhadj Aissa, and Mohamed Guerroumi

 

 

Session 6: DependSys 2016-II, 16:00-18:00, November 16 (Wednesday), Room 4

Chair: Shuhong Chen, Hunan Institute Of Engineering, China

Integrated Heterogeneous Infrastructure for Indoor Positioning

Yi-Wei Ma, Jiann-Liang Chen, Yao-Hong Tsai, Pen-Chan Chou, Shyue-Kung Lu, and Sy-Yen Kuo

Optimal Data Replica Placement in Large-scale Federated Architectures

Zhusong Liu, Jin Li, Christian Esposito, Aniello Castiglione, and Francesco Palmieri

A Cost-E ective Criticality-Aware Virtual Machine Placement Approach in Clouds

Na Wu, Decheng Zuo, Zhan Zhang, and Yan Zhao

Accelerating Concurrent Analytic Tasks with Cost-conscious Result Set Replacement Algorithm

Shengtian Min, Hui Li, Mei Chen, Zhenyu Dai, and Ming Zhu

An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network

Changji Wang, Jiayuan Wu, and Shengyi Jiang

Forecasting Availability of Virtual Machine Based on Grey-Exponential Curve Combination Model

Jionghao Jia, Ningjiang Chen, and Shuo Zhang

 

 

Session 17: DependSys 2016-III, 15:30-16:10, November 17 (Thursday), Room 5

Chair: Xiangyong Liu, Central South University, China

Scalable Iterative Implementation of Mondrian for Big Data Multidimensional Anonymisation

Xuyun Zhang, Lianyong Qi, Qiang He, and Wanchun Dou

Flexible Schema for Prediction of Collaborator´s Credits

Li Weigang

 

 

F. SESSIONS AND PAPERS IN BigDataSPT 2016

Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2016)

Session 9: BigDataSPT 2016, 9:00-10:00, November 17 (Thursday), Room 4

Chair: Zheng Xu, Shanghai University, China

Effective Task Scheduling for Large-Scale Video Processing

Jie Dai, and Xin Wang

Fuzzy and Semantic Search over Encrypted Data in the Cloud

Xiaoyu Zhu, Guojun Wang, and Dongqing Xie

A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts

Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, and Wee-Chiat Chai

 

 

G. SESSIONS AND PAPERS IN WCSSC 2016

The 1st International Workshop on Cloud Storage Service and Computing (WCSSC 2016)

Session 14: WCSSC 2016, 14:00-15:00, November 17 (Thursday), Room 5

Chair: Yupeng Hu, Hunan University, China

A Weighted Frequency based Cache Memory Replacement Policy for Named Data Networking

You Liao, Yupeng Hu, Linjun Wu, and Zheng Qin

An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing

Hongyun Xu, Jiesi Jiang, and Cheng Xu

A Cost-effective Cloud Storage Caching Strategy Utilizing Local Desktop-based Storage

Li Zhang, and Bing Tan


Map of Conference Venue

 

Zhangjiajie International Hotel, Zhangjiajie, China - A Quasi Five-Star Hotel

(张家界国际大酒店)

Address: 145 Sanjiao Ping, Zhangjiajie, Hunan, China

http://www.zjjihotel.com/

 

Public Transportation

 

(1) From Zhangjiajie Hehua Airport (also called Dayong Airport, IATA code: DYG) to Zhangjiajie International Hotel: Take a taxi (around RMB40); or first take a bus #4 (get off at BIANMAO station), then take a bus #2 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

 

张家界荷花国际机场到张家界国际大酒店:大约8公里,乘坐4路公交车到边贸,再转乘2路公交车到三角坪,再步行600米到酒店,或乘坐的士(约40元);返程类似。

 

(2) From Zhangjiajie Railway Station to Zhangjiajie International Hotel: Take a taxi (around RMB35-40); or take a bus #6 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

 

张家界火车站到张家界国际大酒店:大约10公里,乘坐6路公交车到三角坪,再步行600米到酒店,或乘坐的士(约35-40元);返程类似。


 

SpaCCS 2016 Sponsors and Organizers