ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
Filtering by
- Creators: Doupe, Adam
- Creators: Abbaszadegan, Morteza
This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.
This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.
In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
This study focuses on one such pathogen Legionella pneumophila which is resistant to environmental stressors and treatment conditions. It is also responsible for Legionnaires' disease outbreak through drinking water thus attracting attention of regulatory agencies. The work assessed the attachment and colonization of Legionella and heterotrophic bacteria in lab scale GAC media column filters. Quantification of Legionella and HPC in the influent, effluent, column's biofilms and on the GAC particles was performed over time using fluorescent microscopy and culture based techniques.
The results indicated gradual increase in the colonization of the GAC particles with HPC bacteria. Initially high number of Legionella cells were detected in the column effluent and were not detected on GAC suggesting low attachment of the cells to the particles potentially due to lack of any previous biofilms. With the initial colonization of the filter media by other bacteria the number of Legionella cells on the GAC particles and biofilms also increased. Presence of Legionella was confirmed in all the samples collected from the columns spiked with Legionella. Significant increase in the Legionella was observed in column's inner surface biofilm (0.25 logs up to 0.52 logs) and on GAC particles (0.42 logs up to 0.63 logs) after 2 months. Legionella and HPC attached to column's biofilm were higher than that on GAC particles indicating the strong association with biofilms. The bacterial concentration slowly increased in the effluent. This may be due to column's wall effect decreasing filter efficiency, possible exhaustion of GAC capacity over time and potential bacterial growth.
The pilot-scale, column study produced novel results which demonstrated the mechanism for Legionella to be transported through recharge basin soil. E. coli was transported, through 122 cm of the media in under 6 hours, whereas, Legionella was transported, through the same distance, in under 30 hours. Legionella has been shown to survive in low nutrient conditions for over a year. Given the novel results of this proof of concept study, a claim can be made for the transport of Legionella into groundwater aquifers through engineering recharge basin conditions, in Central Arizona.