ABSTRACT Test data generation is a significant part of software and/or hardware testing. It is a ... more ABSTRACT Test data generation is a significant part of software and/or hardware testing. It is a complex problem and researchers have proposed various solutions to generate optimum number of test data in an acceptable polynomial time. However, most of the solutions are highly complex (NP-hard), interaction limitation and takes substantial time to generate test data set. Therefore, it is an open challenge to propose the best solution. This paper proposes a novel technique called MTTG (Multi-Tuple based T-way Test Generator) which relies on Kid's Card game strategy. The proposed technique finds optimum matching value by searching through all possible combination of similarity matching, based on data generation principle. Our empirical results demonstrate that the proposed MTTG is very efficient in test data generation based on time and interaction strength/level, compared to other existing strategies.
ABSTRACT In this paper, we present a novel framework to predict events through time-series analys... more ABSTRACT In this paper, we present a novel framework to predict events through time-series analysis of sensor data streams. The framework is capable of producing and visualizing event prediction probabilities, uncertainties around the predictions, and the actual decision being taken based on the prediction. We have tested the analytical framework on predicting closure events in shellfish farms in Tasmania. Reasonably high prediction accuracy is achieved. The visualization was able to capture prediction, uncertainty, and actual decision being taken (i.e., three-in-one).
2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), 2015
Stream clustering in healthcare industry can carry significant importance by discovering disease ... more Stream clustering in healthcare industry can carry significant importance by discovering disease patterns or by providing better clinical supports. Online stream clustering has several applications associated with it like news filtering, ad filtering, and topic detection. However, clustering particularly for health care industry has not come into consideration yet. In addition, existing clustering methods rarely consider the variety of continuous data and may lead to unsatisfactory results. As a result, implementing existing stream clustering for healthcare industry may not be sustainable for the long run. Motivated from the problem, we propose a clustering algorithm for sensory data in healthcare organisation based on dynamic feature selection known as PCEHRClust. Using a qualitative analysis we show that PCEHRClust is a suitable algorithm for health care industry.
ABSTRACT Code injection attacks are considered serious threats to the Internet users. In this typ... more ABSTRACT Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (fist in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.
Advances in Intelligent Systems and Computing, 2017
In recent years, the electronic health record (eHR) system is regarded as one of the biggest deve... more In recent years, the electronic health record (eHR) system is regarded as one of the biggest developments in healthcare domains. A personally controlled electronic health record (PCEHR) system, offered by the Australian government makes the health system more agile, reliable, and sustainable. Although the existing PCEHR system is proposed to be fully controlled by the patients, however there are ways for healthcare professionals and database/system operators to reveal the records for corruption as system operators are assumed to be trusted by default. Moreover, as a consequence of increased threats to security of electronic health records, an actual need for a strong and effective authentication and access control methods has raised. Furthermore, due to the sensitive nature of eHRs, the most important challenges towards fine-grained, cryptographically implemented access control schemes which guarantee data privacy and reliability, verifying that only authorized people can access the corresponding health records. Moreover, an uninterrupted application of the security principle of electronic data files necessitates encrypted databases. In this paper we concentrates the above limitations together by proposing a robust authentication scheme and a hybrid access control model to enhance the security and privacy of eHRs. Homomorphic encryption technique is applied in storing and working with the eHRs in the proposed cloud-based PCEHR framework. The proposed model ensures the control of both security and privacy of eHRs accumulated in the cloud database.
2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020
The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating thes... more The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating these two technologies can have a significant impact across multiple industries. In this paper, a sample use case related to safe-work has been discussed. A group mutual exclusion (GME) protocol has been proposed for the consensus operation of different authorities/stakeholder to update the distributed ledger of the hybrid system. The protocol utilises a single token to enable various processes of different stakeholders to enter into a common session to reach the consensus among themselves. In other words, we have introduced a novel consensus protocol-proof of presence. The protocol offers a crucial characteristic-the concurrency, throughput, and waiting time can be tailored by adjusting the period for which a session is declared. The protocol also ensures no starvation in the system. Furthermore, this algorithm works out for the Extended Group Mutual Exclusion problem as well.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2015
ABSTRACT Despite economic pressure for business to cut costs and fervent assurances from cloud se... more ABSTRACT Despite economic pressure for business to cut costs and fervent assurances from cloud service providers, security remains a top barrier to cloud adoption. Interests in cloud computing are high and many organisations say they are planning to move in that direction. However, the reality is that only 20% of UK organisations are using infrastructure-as-a-service and only 36% are using software-as-a-service, according to the National Computing Centre (NCC, UK) research. Lack of trust in cloud computing is slowing broader adoption of cloud services. Therefore, it is important to understand the consumers' perspective on cloud security concerns, especially data security issues. This allows the future research to proceed in the right direction to alleviate users' concerns. In this paper, we present an empirical analysis of IT experts and professionals viewpoint related to security issues in clouds. The study is based on the surveys conducted by three different groups in the time period from 2010 to 2013. Qualitative research analysis is used to collect perception of IT experts and professionals by using interviewing technique. The viewpoints of the experts are then analysed and a qualitative and thematic analysis is presented. The study presents most critical threats, possible causes, and fundamental strategies to avoid them.
6th Annual Communication Networks and Services Research Conference (cnsr 2008), 2008
Resource-constraint nature of wireless sensor network (WSN) turns the security issue certainly in... more Resource-constraint nature of wireless sensor network (WSN) turns the security issue certainly into a big challenge. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present two versions of a secured key management protocol (SecCOSEN) adopted on COSEN, a chain oriented sensor network, which is used for periodic data collection. SecCOSEN uses
ABSTRACT Test data generation is a significant part of software and/or hardware testing. It is a ... more ABSTRACT Test data generation is a significant part of software and/or hardware testing. It is a complex problem and researchers have proposed various solutions to generate optimum number of test data in an acceptable polynomial time. However, most of the solutions are highly complex (NP-hard), interaction limitation and takes substantial time to generate test data set. Therefore, it is an open challenge to propose the best solution. This paper proposes a novel technique called MTTG (Multi-Tuple based T-way Test Generator) which relies on Kid's Card game strategy. The proposed technique finds optimum matching value by searching through all possible combination of similarity matching, based on data generation principle. Our empirical results demonstrate that the proposed MTTG is very efficient in test data generation based on time and interaction strength/level, compared to other existing strategies.
ABSTRACT In this paper, we present a novel framework to predict events through time-series analys... more ABSTRACT In this paper, we present a novel framework to predict events through time-series analysis of sensor data streams. The framework is capable of producing and visualizing event prediction probabilities, uncertainties around the predictions, and the actual decision being taken based on the prediction. We have tested the analytical framework on predicting closure events in shellfish farms in Tasmania. Reasonably high prediction accuracy is achieved. The visualization was able to capture prediction, uncertainty, and actual decision being taken (i.e., three-in-one).
2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), 2015
Stream clustering in healthcare industry can carry significant importance by discovering disease ... more Stream clustering in healthcare industry can carry significant importance by discovering disease patterns or by providing better clinical supports. Online stream clustering has several applications associated with it like news filtering, ad filtering, and topic detection. However, clustering particularly for health care industry has not come into consideration yet. In addition, existing clustering methods rarely consider the variety of continuous data and may lead to unsatisfactory results. As a result, implementing existing stream clustering for healthcare industry may not be sustainable for the long run. Motivated from the problem, we propose a clustering algorithm for sensory data in healthcare organisation based on dynamic feature selection known as PCEHRClust. Using a qualitative analysis we show that PCEHRClust is a suitable algorithm for health care industry.
ABSTRACT Code injection attacks are considered serious threats to the Internet users. In this typ... more ABSTRACT Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (fist in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.
Advances in Intelligent Systems and Computing, 2017
In recent years, the electronic health record (eHR) system is regarded as one of the biggest deve... more In recent years, the electronic health record (eHR) system is regarded as one of the biggest developments in healthcare domains. A personally controlled electronic health record (PCEHR) system, offered by the Australian government makes the health system more agile, reliable, and sustainable. Although the existing PCEHR system is proposed to be fully controlled by the patients, however there are ways for healthcare professionals and database/system operators to reveal the records for corruption as system operators are assumed to be trusted by default. Moreover, as a consequence of increased threats to security of electronic health records, an actual need for a strong and effective authentication and access control methods has raised. Furthermore, due to the sensitive nature of eHRs, the most important challenges towards fine-grained, cryptographically implemented access control schemes which guarantee data privacy and reliability, verifying that only authorized people can access the corresponding health records. Moreover, an uninterrupted application of the security principle of electronic data files necessitates encrypted databases. In this paper we concentrates the above limitations together by proposing a robust authentication scheme and a hybrid access control model to enhance the security and privacy of eHRs. Homomorphic encryption technique is applied in storing and working with the eHRs in the proposed cloud-based PCEHR framework. The proposed model ensures the control of both security and privacy of eHRs accumulated in the cloud database.
2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020
The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating thes... more The Blockchain empowers IoT ecosystems more secure and transparent. AS a result, integrating these two technologies can have a significant impact across multiple industries. In this paper, a sample use case related to safe-work has been discussed. A group mutual exclusion (GME) protocol has been proposed for the consensus operation of different authorities/stakeholder to update the distributed ledger of the hybrid system. The protocol utilises a single token to enable various processes of different stakeholders to enter into a common session to reach the consensus among themselves. In other words, we have introduced a novel consensus protocol-proof of presence. The protocol offers a crucial characteristic-the concurrency, throughput, and waiting time can be tailored by adjusting the period for which a session is declared. The protocol also ensures no starvation in the system. Furthermore, this algorithm works out for the Extended Group Mutual Exclusion problem as well.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2015
ABSTRACT Despite economic pressure for business to cut costs and fervent assurances from cloud se... more ABSTRACT Despite economic pressure for business to cut costs and fervent assurances from cloud service providers, security remains a top barrier to cloud adoption. Interests in cloud computing are high and many organisations say they are planning to move in that direction. However, the reality is that only 20% of UK organisations are using infrastructure-as-a-service and only 36% are using software-as-a-service, according to the National Computing Centre (NCC, UK) research. Lack of trust in cloud computing is slowing broader adoption of cloud services. Therefore, it is important to understand the consumers' perspective on cloud security concerns, especially data security issues. This allows the future research to proceed in the right direction to alleviate users' concerns. In this paper, we present an empirical analysis of IT experts and professionals viewpoint related to security issues in clouds. The study is based on the surveys conducted by three different groups in the time period from 2010 to 2013. Qualitative research analysis is used to collect perception of IT experts and professionals by using interviewing technique. The viewpoints of the experts are then analysed and a qualitative and thematic analysis is presented. The study presents most critical threats, possible causes, and fundamental strategies to avoid them.
6th Annual Communication Networks and Services Research Conference (cnsr 2008), 2008
Resource-constraint nature of wireless sensor network (WSN) turns the security issue certainly in... more Resource-constraint nature of wireless sensor network (WSN) turns the security issue certainly into a big challenge. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present two versions of a secured key management protocol (SecCOSEN) adopted on COSEN, a chain oriented sensor network, which is used for periodic data collection. SecCOSEN uses
Uploads
Papers