Secure Biometric-Based Authentication for Cloud Computing

Size: px
Start display at page:

Download "Secure Biometric-Based Authentication for Cloud Computing"

Transcription

1 Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, Seol Korea {kswong,kmh}@ss.ac.kr Abstract. Over the past several years, many companies have gained benefits from the implementation of clod soltions within the organization. De to the advantages sch as flexibility, mobility, and costs saving, the nmber of clod sers is expected to grow rapidly. Conseqently, organizations need a secre way to athenticate its sers in order to ensre the fnctionality of their services and data stored in the clod storages are managed in a private environment. In the crrent approaches, the ser athentication in clod compting is based on the credentials sbmitted by the ser sch as password, token and digital certificate. Unfortnately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based athentication protocol to spport the ser athentication for the clod environment. Or soltion can be sed as the second factor for the clod sers to send their athentication reqests. In or design, we incorporate several players (client, service agent and service provider) to collaborate together to perform the matching operation between the qery featre vector and the biometric template of the ser. In particlar, we consider a distribted scenario where the biometric templates are stored in the clod storage while the ser athentication is performed withot the leakage of any sensitive information. Keywords: Biometric-based Athentication, Clod Athentication System, Privacy Preserving Sqared Eclidean Distance, Data Protection. 1 Introdction Clod compting is an emerging technology which allows sers to reqest for services and resorces from their service providers in an on-demand environment. It is a complex yet resorce saving infrastrctre for today s modern bsiness needs, providing the means throgh which services are delivered to the end sers via Internet access. In the clod environment, sers can access services based on their needs withot knowing how the services are delivered and where the service are hosted. The US National Institte of Standards and Technology (NIST) has defined clod compting as follows [1]: Clod compting is a model for enabling biqitos, convenient, on-demand network access to a shared pool of configrable compting * This work was spported by the Soongsil University Research Fnd. I. Ivanov et al. (Eds.): CLOSER 2012, CCIS 367, pp , Springer International Pblishing Switzerland 2013

2 Secre Biometric-Based Athentication for Clod Compting 87 resorces (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Hardware devices, software, storage and network infrastrctre are made available to ser throgh Internet access. Rather than prchasing expensive bt powerfl resorces, sers lease these resorces from the service providers. With clod compting, ser can access the services via Internet access regardless of time and location. They also get rid of software installation in their local machine and able to enjoy high availability of services. Frthermore, high efficiency and fast deployment benefits are also the attractions for company and individal who moves to clod services. De to the advantages sch as flexibility, mobility, and costs saving, the nmber of clod ser has increased tremendosly. Indstry analysts have made projections that entire compting indstry will be transformed into Clod environment [2]. In this Clod-driven era, secrity and privacy concerns are becoming growing problems for the ser and the service provider. User athentication is often the key isse in the Clod environment. It is an important operation for the service provider to verify who can access their services and to identify the grop of each ser. Some commonly sed athentication services inclde Kerberos [3] and OpenID [4]. The service provider athenticates its sers based on the credential sbmitted sch as password, token and digital certificate. Unfortnately, these credentials can often be stolen, accidentally revealed or hard to remember. In view of this, we propose a biometric-based athentication protocol that can be sed as the second factor for the clod sers to send their athentication reqests. Biometric athentication can improve the qality of athentication (QοA) in clod environment. Or soltion ensres both secrity in the athentication and the privacy protection for all sensitive information. 1.1 Problem Statement Clod compting is becoming an emerging technology in many organizations especially those who reqire extra resorces (i.e., processing power and storage) with a lower cost. Recently, the adoption of clod services within the organization raises a significant secrity concerns among data owners when the data stored in the clod are sensitive data to the pblic or shared environment. For example, the cstomer details are considered as sensitive data to the company and the data owner. The leakage of sensitive information will compromise the individal privacy and allows the competitors to gain the competitive advantages. Therefore, ser athentication for clod compting is becoming important and need to be addressed when considering sensitive data. In this paper, we consider the ser athentication for clod compting in a distribted environment where the biometric templates of the sers are stored in the clod storage. To verify a ser, several players will collaborate together to compare the qery featre vector of the ser and the template stored in the clod storage. Biometric templates are niqely representing strong identity information of its owner. Althogh it provides a higher degree of secrity as compared with password or secrity token, it cold be stolen or exchanged. Hence, we mst be carefl when

3 88 Kok-Seng Wong * and Myng Ho Kim dealing with the biometric data. There are several concerns shold be addressed sch as which party the biometric data can be revealed and whether the biometric matching operation is performed by the athentication server or the external trsted party. It is therefore clear that designing a privacy preserved protocol to spport the biometric matching operation wold have a great impact on the template protection and preventing the leakage of biometric featre vector. 1.2 Organization The rest of this paper is organized as follows: The backgrond for this research is in Section 2 and the technical preliminaries are described in Section 3. We present or proposed soltion in Section 4 followed by the analysis in Section 5. Or conclsion is in Section 6. 2 Backgrond 2.1 Clod Compting Models Clod services are delivered in three fndamental models [5]: Infrastrctre as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS is the lowest level which is closest to the hardware devices whereas, SaaS is the highest level that provides services to the end-sers. The Amazon web service is one type of IaaS which has been widely sed since 2006 while the Salesforce.com CRM system is an example of SaaS. PaaS level provides an application platform in the clod. Windows Azre platform is one example of PaaS which enable the developers to bild, host and scale their applications in the Microsoft data centers. Recently, a new concept called Everything as a Service (XaaS) has been adopted as the new trend in clod compting. Several vendors sch as Microsoft and Hewlett Packard [6] have been associated with it. Biometric Athentication as a Service (BioAaaS) has been defined as an approach for strong athentication in web environments based on the SaaS model [7]. 2.2 User Athentication When performing athentication over the Internet, credential will be sbmitted by the principal (the ser, machine, or service reqesting access) [8]. If the credentials match, the ser is allowed to access the services it sbscribed from the service providers. In this paper, we only consider ser as the principal who sbmits its credential for athentication over the clod. There are several types of credential the sers can sbmit as proof of their identity. Shared-key is typically password sed protocols sch as Password Athentication Protocol (PAP) [9] and Challenge Handshake Athentication Protocol (CHAP) [10].

4 Secre Biometric-Based Athentication for Clod Compting 89 Fig. 1. General design for biometric-based athentication systems Digital certificate is second type of credential which can provide strong athentication in the clod environment. It is an electronic docment which ses a trsted Certificate Athority (CA) to blind the encryption key with an identity [11]. Decryption key is the only way to validate the signed certificate. Another type of credential is the commonly sed one-time-password (OTP) [12, 13]. The end-ser obtains the OTP from the token (hardware or software) dring the login time. The token can generate a randomized password string based on a complex algorithm in real time. Since the password generated is niqe and can only be sed once, OTP is possible to be sed in the Clod environment. For example, Amazon Web Services (AMW) has already started to se its OTP token for se with individal AWS acconts [14]. Recently, a German company BioID proposes the world s first biometric athentication service for clod compting [15]. In their soltion, biometric athentication as a service (BaaS) has been proposed to provide single sign-on for ser athentication. 2.3 Biometric-Based Athentication Biometric characteristics sch as iris patterns, face, fingerprints, palm prints and voice will be sbmitted by the ser as the credential for athentication over the clod. Biometric-based athentication systems provide a higher degree of secrity as compared with conventional athentication systems. Frthermore, it allows the system to keep track of the ser s activities becase individal biometric characteristics cannot be shared with others. Generally, biometric athentication systems consist of five modles, namely, the biometric sensor, featre extractor, template storage, matching modle, and the decision modle. Fig. 1 illstrates the general design for the biometric-based athentication systems. Dring the enrolment process, the biometric sensor scans the biometric traits of the ser while the featre extractor extracts the featre vector from the scanned biometric data. The featre vector is then stored in the template storage. At the verification stage, the biometric sensor and the featre extractor perform the same tasks as in the enrolment process. However, the extracted featre vector

5 90 Kok-Seng Wong * and Myng Ho Kim (qery featre vector) will not be stored in the storage. Instead, it will be sed by the matching modle to compare with the templates stored in the storage. The matching operation otpts a similarity score which will be sed by the decision modle in making the decision (accept or reject). The matching reslt is then compares with a threshold vale determined by the system administrator. Biometric matching is the key operation in the biometric-based athentication systems to verify the sers. In practical, the same biometric trait will not prodce two identical featre vectors de to some noises or variations in the ser s interaction with the biometric sensor. Hence, the biometric-based systems do not necessary to have perfect match as reqired in the password-based athentication systems. The distance between two featre vectors originating from the same ser is typically greater than zero (zero distance means both featre vectors are identical). 3 Technical Preliminaries In this section, we describe some technical preliminaries for or protocol design. 3.1 Definition Secrity Definition. In a generic sense, secrity is the prevention of nathorized party from gaining access to confidential information and system resorces. A secre athentication system needs to ensre only the athorized sers can access to the system. Therefore, we mst prevent any adversary party from impersonate as an enrolled ser in or soltion. Or protocol is secre if no adversary party can gain access to the sensitive information. Hereafter in this section, we refer sensitive information as the biometric featre vectors (i.e., template and qery featre vector), the verification code, and the shffle protocol. Dring the athentication process, the protocol mst prevents the adversary party from reconstrcting the original featre vector of the ser based on the verification code and the template stored in the clod. Also, the network intrder who watches the traffic on the network mst not learn any sensitive information. Privacy Definition. Information or data privacy is referring to the ability of an individal or system to prevent the leakage of any sensitive information to any nathorized party. A privacy-preserved system shold ensre that nathorized party does not improperly access confidential information. In this paper, we particlarly consider the privacy isses on the biometric template and the verification code protections. The intermediate reslt dring the athentication process shold not leak any sensitive information and the decision modle shold not be able to distingish whether two athentication reqests belong to the same ser.

6 Secre Biometric-Based Athentication for Clod Compting Homomorphic Cryptosystem In this paper, we will tilize the additive property of the homomorphic cryptosystem (i.e., Paillier [16]) in or protocol. Let E ( ) a m 1 denote the encryption of message m 1 with encryption key, E a. The scheme spports the following operations in an encrypted form: Addition: Given two ciphertexts E ( ) a m 1 and E ( ) a m 2, there exists an efficient algorithm + h to compte Ea ( m1 + m2). Scalar mltiplication: Given a constant c and a ciphertext E ( ) a m 1, there exists an efficient algorithm to compte h E ( ) a c m1. Note that when a scheme spports the additive operation, it also spports scalar mltiplication becase E ( ) a c m1 can be achieved by smming E ( ) a m 1 sccessively c times. By sing the homomorphic cryptosystem, we can compte the additive operation directly on the encrypted data withot the decryption. This is a sefl featre becase the biometric template stored in the server does not reqire decryption dring the matching operation. 3.3 Notations Used In Table 1, we smmarize all the notations sed hereafter in this paper. X Y X Y X Y π Table 1. Common notations sed original featre vector extracted from the ser dring the enrolment process original featre vector extracted from the ser dring the verification process transformed vector dring the enrolment process transformed vector dring the verification process shffled vector dring the enrolment process shffled vector dring the verification process shffle protocol for the ser U x i i -th element of X y i i -th element of Y s n m sqared Eclidean distance length of the original featre vector length of the verification code k length of the transformed vector where, k = n+ m+ 4 TID template identification nmber VID verification code identification nmber E encryption key from the ser U

7 92 Kok-Seng Wong * and Myng Ho Kim D E p D p Table 1. Common notations sed (cont.) decryption key from the ser U encryption key from the service provider decryption key from the service provider E pk () encryption operation by sing the E pk D pk () decryption operation by sing the D pk ω random non-zero nmber 4 Proposed Soltion In or soltion, the athentication process is based on two credential information: (1) ser s biometric featre vector and (2) the verification code. Both parts mst be combined, transformed, and shffled correctly in order for the ser to sccessfl athenticate. Like most existing biometric-based athentication systems, or soltion reqires matching between the qery featre vector (Q) and the biometric template (T). As shown in Fig. 2, the matching operation is spported by the service provider and the service agent over the clod environment. The similarity measre fnction sed in biometric matching is based on the characteristics of the biometric featre vector. For example, Hamming distance is sed for iris-based comparison while the sqared Eclidean distance has been sed in finger codes matching. We consider the latter as or measrement metric in this paper. 4.1 Components We now formally describe the players in or proposed soltion as follow: (as illstrated in Fig. 2): Fig. 2. Overview of or proposed soltion User: individal who sends the athentication reqest. Client: compter or workstation with Internet access. Service provider: company or organization who provides clod services (SaaS, PaaS or IaaS) to the ser.

8 Secre Biometric-Based Athentication for Clod Compting 93 Service agent: separate entity which helps to transform the biometric featre vector. Unlike the conventional biometric systems, the template is the transformed featre vector and will be stored in the clod storage. The qery featre vector is a transformed featre vector. Like most existing biometric-based athentication systems, or soltion consists of both the enrolment and the verification processes. In the following sections, we will describe in details the components and the athentication workflows of or soltion. The Client has the Following Components: Biometric sensor: scans the biometric traits of the ser. Featre extractor: extracts the featre vector from the scanned biometric data. Encryption modle: encrypts the transformed and shffled featre vector with the correct encryption key (i.e., encrypts with the ser s key dring the enrolment process). Decryption modle: decrypts the comptation otpt. The Service Agent Reqires the Following Components: Transformation modle: transforms the original featre vector and shffles the transformed featre vector. Verification code generator: generates niqe verification code for the ser. Verification code retrieval: retrieves the verification code for the ser. Verification codes storage: stores the verification code for each ser. The Service Provider Reqires the Following Components: Comptation modle: performs the sqared Eclidean distance ( s ) comptation between the qery featre vector and the template. Decision modle: making the final decision by comparing the s with the given threshold τ. Templates storage: stores the template of each ser. 4.2 Enrolment The objective of the enrolment process is to process the scanned biometric data and extract a set of featre vector to be stored as the template for the ser. The enrolment process is reqired for the new ser who wants to join the clod. A sccessfl enrolment process enables the ser to receive the TID and the VID Transformation Let X = { x1, x2,..., xn}, n > 0 and V = { v1, v2,..., v m }, m > 0 be the featre vector of the ser and the verification code generated, respectively. We transform X into

9 94 Kok-Seng Wong * and Myng Ho Kim E ( ) X X { TID, E ( X )} X V E ( ) V { VID, E ( V )} { i } Fig. 3. The overview of the enrolment process X = x i = 1, 2,..., n+ m+ 4 sch that xi = xi for 1 i n, xn+ j= vj for n 2 1 j m, x = x =, x = x and m x = v 2. n+ m+ 1 n+ m+ 2 1 n+ m+ 3 i= 1 i n+ m+ 4 j= 1 j Shffle Protocol We reqire a shffle protocol ( π ) to permte the order of elements in the transformed vector X. We se the same shffle protocol dring the verification process for the same ser Overview of the Enrolment Process We illstrate the overview of the enrolment process in Fig. 3 and the workflow as follow: 1. The biometric sensor scans the biometric trait of the ser. 2. The featre extractor processes the scanned biometric data to extract the featre vector of the ser, X = { x1, x2,..., x n }. 3. The featre extractor sends X to the transformation modle of the service agent. 4. The verification code generator of the service agent generates a niqe verification code V = { v, v 1 2,..., v m } for the ser. 5. The service agent comptes V = 2V and encrypts it by sing the encryption key of the ser. The encrypted data will be stored at the verification codes storage. 6. Next, the transformation modle transforms X into X. It shffles the transformed vector X i.e., X = π ( X ) before sending it to the encryption modle.

10 Secre Biometric-Based Athentication for Clod Compting The encryption modle encrypts X by sing the ser s encryption key. Finally, the client sends E ( X ) to the service provider. The service provider stores E ( X ) as the ser s template in the templates storage. 4.3 Verification When the ser wants to access data stored in the clod storages or ses the clod services, the ser mst be athenticated first. The verification process is responsible to verify the sers who they claim to be Transformation Let Y = { y1, y2,..., yn}, n > 0 and V = { v1, v2,..., v m }, m > 0 be the featre vector extracted from the ser and the verification code, respectively. The verification code sed mst be the same in both enrolment and verification processes. We transform Y into Y = { yi i = 1, 2,..., n+ m+ 4} sch that yi = 2yi for 1 i n, yn+ j= 2vj n 2 m 2 for 1 j m, yn+ m+ 1 = i= 1yi, yn+ m+ 2 = j= 1vj, yn+ m+ 3 = yn+ m+ 4 = 1. The length for Y mst be same as X which is k = n+ m Shffle Protocol We reqire the same shffle protocol sed in the enrolment process dring the verification process. The transformed featre vector Y needs to be shffled in the same order as X Overview of the Verification Process The workflow for the verification process is as follow (as illstrated in Fig. 4): 1. The biometric sensor scans the biometric trait of the ser. 2. The featre extractor processes the scanned biometric data to extract the featre vector of the ser, Y = { y1, y2,..., y n }. 3. The featre extractor sends Y to the transformation modle of the service agent. 4. Next, the service agent retrieves the verification code of the ser based on the ser s VID. 5. The verification code retrieval retrieves ( ) E V of the ser from the storage. 6. The transformation modle comptes D( E ( ) V ) and transforms Y into vector Y. Next, it shffles Y i.e., Y = π ( Y ) and sends Y to the encryption modle of the client. 7. The encryption modle encrypts Y with the service provider s encryption key E p. Next, the Ep ( Y ) is sent together with the TID to the comptation modle. 8. The comptation modle of the service provider retrieves E ( X ) from the templates storage which is associated with the TID.

11 96 Kok-Seng Wong * and Myng Ho Kim E ( ) X E ( ω s) TID E ( ) p Y { TID, E ( X )} Y E ( ) p ω s Y E ( V) { VID, E ( V )} Fig. 4. The overview of the verification process 9. If both E ( X ) and Ep ( Y ) have the same size, the comptation modle comptes: i. Decryption: Dp ( Ep( Y )) = Y ii. Scalar mltiplication: Y E ( X ) = E ( X Y) n m 4 iii. Homomorphic additive operation: E() s = E + + i= 1 ( xi yi ) ( ) iv. Add noise: ω E( s) = E( ω s), where ω is a random non-zero nmber. The comptation modle sends E ( ω s) to the client. 10. The decryption modle of the client decrypts E ( ω s) and then encrypts ω s with E p. Then, the decryption modle sends Ep ( ω s) back to the decision modle of the service provider for making the decision. The decision modle decrypts Ep ( ω s) and makes the decision as follows ( τ is the threshold determined by the service provider): Acceptifs, < τ decision = Reject, if s > τ Note that for different athentication reqests, we may reqire different secrity levels. Hence, or system can assign different threshold vales for different sers. 5 Analysis In this section, we present the correctness, secrity, privacy and efficiency analysis for or proposed soltion.

12 Secre Biometric-Based Athentication for Clod Compting Correctness Analysis Or protocol correctly comptes the sqared Eclidean distance between the qery featre vector and the biometric template if all the players follow the protocol faithflly. Let X = { x1, x2,..., x n } be the extracted featre vector of ser A dring the enrolment process. It will be transformed into X as follows: x1,..., xn, v1,..., vm,1,1, X = n 2 m 2 ( i= 1xi ),( j= 1vj ) (1) Then, we randomly shffle the order of elements in X. Let X = π A( X ) be the shffled vector by sing the shffle protocol π A. Next, we encrypt X by sing the encryption key E A and store the following reslt as the template of the ser in the templates storage: EA( x1 ),..., EA( xn), EA( v1 ),..., EA( v ), m EA ( X ) = EA(1), EA(1), n 2 m 2 EA( i= 1xi ), EA( i= 1vj ) Note that for ease of explanation, we do not change the order of elements in Eq. (2). Assme that Y = { y1, y2,..., y n } is the qery featre vector dring the verification process. The client retrieves the verification code from the service provider and transforms Y into Y as follows: (2) 2 y1,..., 2 yn, 2 v1,..., 2 vm, Y = n 2 m 2 ( i= 1yi ),( j= 1vj ),1,1 (3) By sing the same shffle protocol Y = π ( Y) and encrypts Y with the encryption key A E P 1 P m P ( Y ) n m EP i xi EP i vj π A (if the ser is A ), the client comptes EP( 2 y1 ),..., EP( 2 yn), E ( 2 v ),..., E ( 2 v ), = 2 2 ( = 1 ), ( = 1 ), EP(1), EP(1) E P to prodce: For ease of explanation, we do not change the order of elements in Eq. (4). The sqared Eclidean distance is compted as follow: The service provider first decrypts EP ( Y ) to obtain Y and comptes the scalar mltiplication for each i -th element in Y and E ( X ) according to their index position: A (4)

13 98 Kok-Seng Wong * and Myng Ho Kim Y EA ( X ) = EA ( X Y) ( 2 y1 EA( x1),..., ) ( 2 yn EA( x ), ) n ( 2 v1 EA( v1) ),...,( 2 vm EA( vm) ), = n 2 m 2 ( i= 1yi EA(1) ), ( j= 1vj EA(1) ), n 2 m 2 ( 1 EA( i= 1xi )),( 1 EA( i= 1vj )) EA( 2 x1y1),..., EA( 2 xnyn), 2 2 EA( 2 v1 ),..., EA( 2 vm), = n 2 m 2 EA( i 1yi ), EA( j 1vj ), = = n 2 m 2 EA( i= 1xi ), EA( i= 1v j ) Next, the service provider comptes homomorphic additive operation for each ( xi yi ) ( X Y ) in Eq. (5): 2 2 ( n ) ( ) ( ) ( = = = = 1 2) n 2 m 2 + hea( i= 1xi ) + h EA( i= 1vj ) n 2 n ( = 1 ) ( = 1 2 ) 2 + ( hea i= 1yi ) n ( = ( 2 2 )) n 2 A i= 1 ( i i) E () s = E 2x y + E 2v + E y + E v A A i i i h A j j h A i i h A j j = E x + E x y A i i h A i i i = E x x y + y A i i i i i ( ) = E x y After we decipher the reslt in Eq. (6), we can obtain the sqared Eclidean n 2 distance s= ( ) i= 1 xi yi. Note that in Eq. (6), we eliminate the verification code and all additional featres. Hence, if the service provider retrieves the correct verification code and the client comptes Y correctly, or protocol otpts the correct sqared Eclidean distance for X and Y. If one of the parties (either the client or the service provider) is not following the protocol, the final otpt will not reflect the sqared Eclidean distance for the two vectors ( X and Y ). Sbseqently, the verification process will fail and the ser cannot access the system. The client or the service provider who is not following the protocol is considering as the malicios party in or protocol. The proof of this theorem is same as the proof in Theorem 3 and Theorem 4 nder the secrity analysis. (5) (6) 5.2 Secrity Analysis In this section, we will analyse two possible attacks: internal and external attack. Internal attack involves malicios party sch as employee at client who attempts to gain access into the clod. External attack involves external parties (intrders or

14 Secre Biometric-Based Athentication for Clod Compting 99 network attackers) who watch the traffic on the network. They are interested in learning some knowledge from the comptation protocol or intercept the data in the network. Note that internal attack is more serios as compared to the external attack becase attackers are having more knowledge abot the protocol. Or protocol is secre against malicios ser who tries to gain access to the clod. Withot the knowledge of sensitive information and the decryption key, the athentication is not possible for attacker at the client side. Dring the enrolment process, the system generates the biometric template for each ser. Only the ser who enrolled into the clod has its template and the verification code stored in the clod storages. In the absence of the template, the system cannot athenticate the ser. In or protocol, any malicios ser who wants to pose as an enrolled ser mst gain access to three sensitive information: (1) the verification code, (2) the original featre vector and (3) the shffle protocol. Since the verification codes and the biometric templates are stored in an encrypted form, the attacker will not be able to access them withot the knowledge of the decryption key. If the attacker gains access to the original featre vector of the ser, he is not able to se it directly for the verification process becase the verification code and the shffle protocol are not accessible. In the worst scenario, if the attacker obtains the decryption key of any ser, the secrity for the ser is still can be garanteed. Hence, or protocol is secre against attacker who tries to gain access to the clod system. Or protocol is secre against malicios service provider who tries to gain access to the biometric templates stored in the clod storages. The malicios service provider is not able to reconstrct the original featre vector of any ser in the absent of the verification code. Frthermore, the templates are encrypted by sing the encryption key of each respective ser. The service provider has no knowledge abot the decryption key. Gaining access to these encrypted vector is as difficlt as attacking the encryption algorithm. Brte-force attack is also impossible since all the templates are different (after the encryption operation). Hence, or protocol is able to prevent the malicios service provider from reconstrct the original featre vector of the ser. Network attacker who listens to the traffic is not able to learn any sensitive information. In or protocol, all the data transmit over the network (between the client and the service provider) are in an encrypted form (either encrypts with the ser s encryption key or with the service provider s key). When the network attacker watches the network, he cannot learn any information becase he has no knowledge abot the decryption key. Dring the verification process, network attacker is not possible to be athenticated by the clod becase he has no knowledge abot any sensitive information. Hence, or protocol is secre against the network attacker. 5.3 Privacy Analysis The privacy concern in or soltion is the amont of information revealed dring the athentication process. Or protocol shold ensre the confidentiality of all sensitive information sch that the intermediate reslts and the athentication reslt will not compromise the privacy of the ser. In or soltion, both the verification codes and the biometric templates are stored in an encrypted form. The service provider is not able to learn anything becase it has no knowledge abot the decryption key from the ser. In the worst scenario, if the

15 100 Kok-Seng Wong * and Myng Ho Kim decryption key of the ser has been compromised, the service provider also not able to identify the original featre vector of the ser becase the template has been transformed with the verification code and being shffled dring the enrolment process. Dring the verification process, the service provider decrypts EP ( Y ) before performing the scalar mltiplication operation. After the decryption, the service provider is not able to distingish between the original featre vector and verification code. Hence, or protocol protects both the verification code and the template stored in the clod storages. The service provider is not able to distingish whether two athentication reqests belong to the same ser. In or protocol, the verification code and the template are stored separately by the service agent and the service provider, respectively. This design prevents the malicios party from knowing which verification code is associated with which template in the case when both storages are compromised. The decision modle makes the verification decision based on the similarity score (sqared Eclidean distance) and the threshold vale determined by the system. If the similarity score is lower than the threshold, it can reject the ser. Otherwise, the system verifies the ser and the athentication process is sccessfl. With only the similarity score, the decision modle is not able to distingish whether two athentication reqests belong to the same ser. 5.4 Efficiency Analysis The total commnication costs depend on the amont of data transferred dring the athentication process. Dring the enrolment process, the main comptation cost incrs is the generation of biometric template which reqires k = ( n+ m+ 4) encryption. The enrolment process only reqires 1 rond of commnication in order for the service provider to store the biometric template of the ser. Dring the verification process, the comptation cost is dominated by the comptation of the sqared Eclidean distance. The commnication complexity incrred by the protocol is O( k ). In terms of complexity, or protocol reqires O( k ) encryptions, O( k ) scalar mltiplications and O( k ) homomorphic additive operations. 6 Discssion and Conclsions The biometric-based athentication offers many advantages over other existing athentication methods. However, the processing time dring the verification process is a main concern in any biometric-based system. The integration of biometric-based athentication into the clod environment can benefit from the advantages of the clod compting sch as extra resorces and processing power. In this paper, we proposed a biometric-based athentication protocol for clod compting. Or target is to achieve secre athentication while protecting the sensitive information of sers. We incorporate the homomorphic encryption scheme into or matching protocol to compare both the qery featre vector and the template in an encrypted form. The measrement metric sed in or protocol is the Sqared

16 Secre Biometric-Based Athentication for Clod Compting 101 Eclidean distance. Or soltion preserves the privacy of the sensitive information and secrely performs the athentication process in the clod environment. References 1. Mell, P., Grance, T.: The NIST Definition of Clod Compting. National Institite of Standards and Technology (2009) 2. Byya, R., Yeo, C.S., Vengopal, S., Broberg, J., Brandic, I.: Clod compting and emerging IT platforms: Vision, hype, and reality for delivering compting as the 5th tility. Ftre Gener. Compt. Syst. 25, (2009) 3. Neman, B.C., Ts o, T.: Kerberos: An Athentication Service for Open Network Systems. IEEE Commnications 32, (1994) 4. Recordon, D., Reed, D.: OpenID 2.0: a platform for ser-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, pp ACM, Alexandria (2006) 5. Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What s inside the Clod? An architectral map of the Clod landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Clod Compting, pp IEEE Compter Society (2009) 6. Fiveash, K.: HP sells clod vision amidst economic downpor. Will cstomers get soaked on transformation jorneys? King s College London (2008) 7. Senk, C., Dotzler, F.: Biometric Athentication as a Service for Enterprise Identity Management Deployment: A Data Protection Perspective. In: Sixth International Conference on Availability, Reliability and Secrity, Vienna Astria, pp (2011) 8. Convery, S.: Network Athentication, Athorization, and Acconting Part One: Concepts, Elements, and Approaches. The Internet Protocol Jornal 10, 2 11 (2007) 9. Lloyd, B., Simpson, W.: PPP Athentication Protocols. RFC Editor (1992) 10. Simpson, W.: PPP Challenge Handshake Athentication Protocol (CHAP). RFC Editor (1996) 11. Canetti, R.: Universally Composable Signatre, Certification, and Athentication. In: Proceedings of the 17th IEEE Workshop on Compter Secrity Fondations, p IEEE Compter Society (2004) 12. Haller, N.: The S/KEY One-Time Password System. In: Internet Society Symposim on Network and Distribted Systems, pp (1994) 13. Rbin, A.D.: Independent one-time passwords. In: Proceedings of the 5th Conference on USENIX UNIX Secrity Symposim, vol. 5, p. 15. USENIX Association, Salt Lake City (1995) 14. Brooks, C.: Amazon adds onetime password token to entice the wary. SearchClodCompting (2009) Paillier, P.: Pblic-key cryptosystems based on composite degree residosity classes. In: Stern, J. (ed.) EUROCRYPT LNCS, vol. 1592, pp Springer, Heidelberg (1999)

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

dss-ip Manual digitalstrom Server-IP Operation & Settings

dss-ip Manual digitalstrom Server-IP Operation & Settings dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Verification of Data Location in Cloud Networking

Verification of Data Location in Cloud Networking 2011 Forth IEEE International Conference on Utility and Clod Compting Verification of Data Location in Clod Networking Thorsten Ries, Volker Fsenig, Christian Vilbois and Thomas Engel Interdisciplinary

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

ICMS3 Integrated Corrosion Management System

ICMS3 Integrated Corrosion Management System Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE www.mysprintrelay.com/login n Log-in Go to www.mysprintrelay.com/login. If yo don t have a sername or password, click the gray men btton Cstomer New Profile/Call

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Doctor Web. All rights reserved

Doctor Web. All rights reserved Enterprise Site 2004-2009 Doctor Web. All rights reserved This docment is the property of Doctor Web. No part of this docment may be reprodced, pblished or transmitted in any form or by any means for any

More information

EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE

EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE A PROPOSAL FOR DOCTORAL RESEARCH by Haimonti Dtta SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Local Run Manager Generate FASTQ Analysis Module

Local Run Manager Generate FASTQ Analysis Module Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report

More information

Cryptanalysis of Password Authentication Scheme Using Smart Cards

Cryptanalysis of Password Authentication Scheme Using Smart Cards Jornal of Internet Technology an Secre Transactions (JITST, Volme 1, Isse 1, March 2012 Cryptanalysis of Passwor Athentication Scheme Using Smart Cars Sattar J Abo Department of Information Technology

More information

Access Professional Edition 2.1

Access Professional Edition 2.1 Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification

More information

Diagnostics is evolving

Diagnostics is evolving Diagnostics is evolving Vector India Conference, 208-07-8 V.0 208-07-3 Agenda AUTOSAR Development Remote Diagnostics and OTA Secrity 2 AUTOSAR Development DEXT Diagnostic Extract Template (=DEXT) Part

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

RKP6200 S32 Server License

RKP6200 S32 Server License Engineered Soltions RKP6200 S32 Server License RKP6200 S32 Server License wwwboschsecritycom Enhanced Imaging Image export Spport for 64 bit credential nmbers iclass integration with Smart Card encoding

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless By Mitchell Ross TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless Several crrent trends give case to rethink the design of wireless systems in medical bildings. Increasingly, patients are

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 2: Historical Perspective Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time What is an OS?

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Workshop. Improving the Bus Network

Workshop. Improving the Bus Network Workshop Improving the Bs Network Workshop Objectives To consider a range of objectives and proposals that cold improve the bs system in Brisbane to contribte to pblic (inclding RACQ members ) mobility

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Microsoft Private Cloud Computing

Microsoft Private Cloud Computing Microsoft Private Clod Compting Microsoft Private Clod Compting Aidan Finn Hans Vredevoort Patrick Lownds Damian Flynn Acqisitions Editors: Agatha Kim and Mariann Barsolo Development Editor: Richard Mateosian

More information

Nortel DECT Handset 4025 User Guide

Nortel DECT Handset 4025 User Guide DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

LWIP and Wi-Fi Boost Flow Control

LWIP and Wi-Fi Boost Flow Control LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP

More information

Overview of Security Support in Vector Tools

Overview of Security Support in Vector Tools Overview of Secrity Spport in Vector Tools Secrity Manager V0.2 2017-09-22 Agenda Motivation Challenges Secrity Manager Otlook 2 Motivation Secrity protects Featres and Bsiness Models Secrity Goals: Integrity

More information

Analog Telephones. User Guide. BusinessPhone Communication Platform

Analog Telephones. User Guide. BusinessPhone Communication Platform Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

CYBER INSURANCE: A DEEP DIVE

CYBER INSURANCE: A DEEP DIVE CYBER INSURANCE: A DEEP DIVE Jdy Selby Febrary 24, 2017 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by garantee, and forms

More information

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization Thein T, Park J S. Availability analysis of application servers sing software rejvenation and virtalization. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(2): 339 346 Mar. 2009 Availability Analysis of

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V Vector Logger Clod VECTOR GB Ltd Conference, 28th Sept, 2017 V1.0 2017-09-27 Agenda Challenges Vector Logger Clod Secrity Aspects Data Acqisition Policy Conclsion 2 Vector Logger Clod Challenges Growing

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

DPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017

DPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017 DPDK s Best Kept Secret: Micro-benchmarks M Jay Mthrajan.Jayakmar@intel.com DPDK Smmit - San Jose 2017 Legal Information Optimization Notice: Intel s compilers may or may not optimize to the same degree

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

EMC ViPR. Controller REST API Developer Guide. Version

EMC ViPR. Controller REST API Developer Guide. Version EMC ViPR Version 1.1.0 Controller REST API Developer Gide 302-000-496 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in

More information

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02 EMC M&R (Watch4net ) Version 6.4 Installation and Configration Gide P/N 302-001-045 REV 02 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Ma Lesson 18 Section 1.7

Ma Lesson 18 Section 1.7 Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC.

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC. Introdction to Windows Server 2008 1 Learning Objectives Identify the key featres of each Windows Server 2008 edition Understand client systems that can be sed with Windows Server 2008 Identify important

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

A Certificateless and Across Administrative Domains Authenticated Key Exchange Scheme for E-payment

A Certificateless and Across Administrative Domains Authenticated Key Exchange Scheme for E-payment JOURNAL OF SOFTWARE OL 6 NO 0 OTOBER 20 985 A ertificateless and Across Administrative Domains Athenticated Key Exchange Scheme for E-payment Ming hen Kaigi W and Jiann D honging University/ollege of ompter

More information

Sketch-Based Aesthetic Product Form Exploration from Existing Images Using Piecewise Clothoid Curves

Sketch-Based Aesthetic Product Form Exploration from Existing Images Using Piecewise Clothoid Curves Sketch-Based Aesthetic Prodct Form Exploration from Existing Images Using Piecewise Clothoid Crves Günay Orbay, Mehmet Ersin Yümer, Levent Brak Kara* Mechanical Engineering Department Carnegie Mellon University

More information

Putting the dynamic into software security testing

Putting the dynamic into software security testing Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V1.1 2018-03-05 Code ahead! 2 Atomated vlnerability detection and triage + = 3 How did we get here? Vector was

More information