1 The Technical Program 8:30 – 10:00 Opening and Keynote, Chair

advertisement
The Technical Program
8:30 – 10:00 Opening and Keynote, Chair Dr Shui Yu, Deakin University, Australia
Dr Wenjin Lou, Toward Privacy-Assured Searchable Cloud Data Services
10:00- 10:30 Coffee break
10:30 – 12:00 Security in Big Data 1, Chair Xiaodong Lin, University of Ontario Institute
of Technology, Canada
Tackling the Big Data 4
Vs for Anomaly Detection
José Camacho (University of Granada, Spain); Gabriel
Maciá-Fernández (University of Granada, Spain); Jesús
E. Díaz-Verdejo (Universidad de Granada, Spain); Pedro
García-Teodoro (University of Granada, Spain)
Behavioral Analytics for
Inferring Large-Scale
Orchestrated Probing
Events
Elias Bou-Harb (National Cyber-Forensics and Training
Alliance & Concordia University, Canada); Mourad
Debbabi (Concordia University, Montreal, Canada);
Chadi Assi (Concordia University, Canada)
Loxin -- A Solution to
Password-less Universal
Login
Bo Zhu (University of Waterloo, Canada); Xinxin Fan
(University of Waterloo, Canada); Guang Gong
(University of Waterloo, Canada)
Hashdoop: A MapReduce
Framework for Network
Anomaly Detection
Romain Fontugne (National Institute of Informatics,
Japan); Johan Mazel (National Institute of Informatics,
Japan); Kensuke Fukuda (National Institute of
Informatics, Japan)
12:00- 13:30 Lunch break
13:30 – 15:00 Privacy in Big Data, Chair Dr Peng Li, The University of Aizu, Japan
Achieving Big Data
Privacy via Hybrid Cloud
Xueli Huang (Temple University, USA); Xiaojiang Du
(Temple University, USA)
MACA: A PrivacyPreserving Multi-factor
Cloud Authentication
System Utilizing Big Data
Wenyi Liu (Georgia Tech, USA); A. Selcuk Uluagac
(Georgia Institute of Technology, USA); Raheem Beyah
(Georgia Institute of Technology, USA)
1
Load Balancing for
Privacy-Preserving Access
to Big Data in Cloud
Peng Li (The University of Aizu, Japan); Song Guo (The
University of Aizu, Japan)
HVSTO: Efficient Privacy
Preserving Hybrid Storage
in Cloud Data Center
Mianxiong Dong (National Institute of Information and
Communications Technology, Japan); He Li (Huazhong
University of Science and Technology, P.R. China);
Kaoru Ota (Muroran Institute of Technology, Japan);
Haojin Zhu (Shanghai Jiao Tong University, P.R. China)
15:00 – 15:30 Coffee break
15:30 – 17:30 Security in Big Data 2, Prof Jun Shao, Zhejiang Gongshang University,
China
Active Deception Model
for Securing Cloud
Infrastructure
Albert Brzeczko, Jr (Georgia Institute of Technology,
USA); A. Selcuk Uluagac (Georgia Institute of
Technology, USA); Raheem Beyah (Georgia Institute of
Technology, USA); John A. Copeland (Georgia Institute
of Techonology, USA)
Conditional Proxy ReEncryption for Secure
Big Data Group Sharing
in Cloud Environment
Junggab Son (Hanyang university, Korea); Donghyun
Kim (North Carolina Central University, USA); Rasheed
Hussain (Hanyang University, Korea); Heekuck Oh
(Hanyang University, Korea)
Characterising User
Targeting For In-App
Mobile Ads
Imdad Ullah (University of New South Wales, Australia);
Roksana Boreli (National ICT Australia, Australia);
Mohamed-Ali Kaafar (INRIA France, France); Salil
Kanhere (The University of New South Wales, Australia)
Automatic Objects
Removal for Scene
Completion
Jianjun Yang (University of North Georgia, USA); Yin
Wang (Lawrence Technological University, USA);
Honggang Wang (University of Massachusetts,
Dartmouth, USA); Kun Hua (Lawrence Technological
University, USA); Wei Wang (South Dakota State
University, USA); Ju Shen (University of Kentucky,
USA)
A Hierarchical
Clustering Method For
Big Data Oriented
Ciphertext Search
Chi Chen (Institute of Information Engineering, P.R.
China); Xiaojie Zhu (Institute of Information
Engineering, CAS, P.R. China); Peisong Shen (Institute
of Information Engineering, Chinese Academy of
Sciences, P.R. China); Jiankun Hu (University of New
South Wales, Australia)
2
Download