2021
Authors
Pontes, R; Portela, B; Barbosa, M; Vilaca, R;
Publication
2021 40TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2021)
Abstract
Encrypted databases systems and searchable encryption schemes still leak critical information (e.g.: access patterns) and require a choice between privacy and efficiency. We show that using ORAM schemes as a black-box is not a panacea and that optimizations are still possible by improving the data structures. We design an ORAM-based secure database that is built from the ground up: we replicate the typical data structure of a database system using different optimized ORAM constructions and derive a new solution for oblivious searches on databases. Our construction has a lower bandwidth overhead than state-of-the-art ORAM constructions by moving client-side computations to a proxy with an intermediate (rigorously defined) level of trust, instantiated as a server-side isolated execution environment. We formally prove the security of our construction and show that its access patterns depend only on public information. We also provide an implementation compatible with SQL databases (PostgresSQL). Our system is 1.2 times to 4 times faster than state-of-the-art ORAM-based solutions.
2021
Authors
Silva, C; Sousa, B; Vilela, JP;
Publication
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I
Abstract
Software Defined Networking (SDN) facilitates the orchestration and configuration of network resources in a flexible and scalable form, where policies are managed by controller components that interact with network elements through multiple interfaces. The ubiquitous adoption of SDN leads to the availability of multiple SDN controllers, which have different characteristics in terms of performance and security support. SDN controllers are a common target in network attacks since their compromise leads to the capability of impairing the entire network. Thus, the choice of a SDN controller must be a meticulous process from early phases (design to production). CROCUS, herein proposed, provides a mechanism to enable an objective assessment of the security support of SDN controllers. CROCUS relies on the information provided by the Common Vulnerability Scoring System (CVSS) and considers security features derived from scenarios with stringent security requirements. Considering a vehicular communication scenario supported by multiple technologies, we narrow the selection of SDN controllers to OpenDayLight and ONOS choices. The results put in evidence that both controllers have security features relevant for demanding scenarios with ONOS excelling in some aspects.
2021
Authors
Sousa, D; Coelho, A; Bernardes, G; Correia, N;
Publication
INTED2021 Proceedings
Abstract
2021
Authors
Paulino, D; Correia, A; Barroso, J; Liberato, M; Paredes, H;
Publication
Trends and Applications in Information Systems and Technologies - Volume 2, WorldCIST 2021, Terceira Island, Azores, Portugal, 30 March - 2 April, 2021.
Abstract
The harsh impacts of extreme weather events like cyclones or precipitation extremes are increasingly being felt with hazardous consequences. These extreme events are exceptions to well-known weather patterns and therefore are not forecasted with current automatic computational methods. In this context, the use of human computation to annotate extreme atmospheric phenomena could provide novel insights for computational forecasting algorithms and a step forward in climate change research by enabling the early detection of abnormal weather conditions. However, existing crowd computing solutions have technological limitations and show several gaps when involving expert crowds. This paper presents a research approach to fulfill some of the technological and knowledge gaps for expert crowds’ participation. A case study on expert annotation of extreme atmospheric phenomena is used as a baseline for an innovative architecture able to support expert crowdsourcing. The full stack service-oriented architecture ensures interoperability and provides an end-to-end approach able to fetch weather data from international databases, generating experts’ visualizations (weather maps), annotating data by expert crowds, and delivering annotated data for processing weather forecasts. An implementation of the architecture suggests that it can deliver an effective mechanism for expert crowd work while solving some of the identified issues with extant platforms. Therefore, we conclude that the proposed architecture has the potential to contribute as an effective annotation solution for extreme weather events. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2021
Authors
Ferreira, S; Antunes, M; Correia, ME;
Publication
DATA
Abstract
Deepfake and manipulated digital photos and videos are being increasingly used in a myriad of cybercrimes. Ransomware, the dissemination of fake news, and digital kidnapping-related crimes are the most recurrent, in which tampered multimedia content has been the primordial disseminating vehicle. Digital forensic analysis tools are being widely used by criminal investigations to automate the identification of digital evidence in seized electronic equipment. The number of files to be processed and the complexity of the crimes under analysis have highlighted the need to employ efficient digital forensics techniques grounded on state-of-the-art technologies. Machine Learning (ML) researchers have been challenged to apply techniques and methods to improve the automatic detection of manipulated multimedia content. However, the implementation of such methods have not yet been massively incorporated into digital forensic tools, mostly due to the lack of realistic and well-structured datasets of photos and videos. The diversity and richness of the datasets are crucial to benchmark the ML models and to evaluate their appropriateness to be applied in real-world digital forensics applications. An example is the development of third-party modules for the widely used Autopsy digital forensic application. This paper presents a dataset obtained by extracting a set of simple features from genuine and manipulated photos and videos, which are part of state-of-the-art existing datasets. The resulting dataset is balanced, and each entry comprises a label and a vector of numeric values corresponding to the features extracted through a Discrete Fourier Transform (DFT). The dataset is available in a GitHub repository, and the total amount of photos and video frames is 40,588 and 12,400, respectively. The dataset was validated and benchmarked with deep learning Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) methods; however, a plethora of other existing ones can be applied. Generically, the results show a better F1-score for CNN when comparing with SVM, both for photos and videos processing. CNN achieved an F1-score of 0.9968 and 0.8415 for photos and videos, respectively. Regarding SVM, the results obtained with 5-fold cross-validation are 0.9953 and 0.7955, respectively, for photos and videos processing. A set of methods written in Python is available for the researchers, namely to preprocess and extract the features from the original photos and videos files and to build the training and testing sets. Additional methods are also available to convert the original PKL files into CSV and TXT, which gives more flexibility for the ML researchers to use the dataset on existing ML frameworks and tools.
2021
Authors
Neves, F; Vilaca, R; Pereira, J;
Publication
APPLIED COMPUTING REVIEW
Abstract
Modern containerized distributed systems, such as big data storage and processing stacks or micro-service based applications, are inherently hard to monitor and optimize, as resource usage does not directly match hardware resources due to multiple virtualization layers. For instance, inter-application traffic is an important factor in as it directly indicates how components interact, it has not been possible to accurately monitor it in an application independent way and without severe overhead, thus putting it out of reach of cloud platforms. In this paper we present an efficient black-box monitoring approach for gathering detailed structural information of collaborating processes in a distributed system that can be queried for various purposes, as it includes both information about processes, containers, and hosts, as well as resource usage and amount of data exchanged. The key to achieving high detail and low overhead without custom application instrumentation is to use a kernel-aided event driven strategy. We validate a prototype implementation by applying it to multi-platform microservice deployments, evaluate its performance with micro-benchmarks, and demonstrate its usefulness for container placement in a distributed data storage and processing stack (i.e., Cassandra and Spark).
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.