Matching Items (79)
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
149949-Thumbnail Image.png
Description
The green building movement has been an effective catalyst in reducing energy demands of buildings and a large number of `green' certified buildings have been in operation for several years. Whether these buildings are actually performing as intended, and if not, identifying specific causes for this discrepancy falls into the

The green building movement has been an effective catalyst in reducing energy demands of buildings and a large number of `green' certified buildings have been in operation for several years. Whether these buildings are actually performing as intended, and if not, identifying specific causes for this discrepancy falls into the general realm of post-occupancy evaluation (POE). POE involves evaluating building performance in terms of energy-use, indoor environmental quality, acoustics and water-use; the first aspect i.e. energy-use is addressed in this thesis. Normally, a full year or more of energy-use and weather data is required to determine the actual post-occupancy energy-use of buildings. In many cases, either measured building performance data is not available or the time and cost implications may not make it feasible to invest in monitoring the building for a whole year. Knowledge about the minimum amount of measured data needed to accurately capture the behavior of the building over the entire year can be immensely beneficial. This research identifies simple modeling techniques to determine best time of the year to begin in-situ monitoring of building energy-use, and the least amount of data required for generating acceptable long-term predictions. Four analysis procedures are studied. The short-term monitoring for long-term prediction (SMLP) approach and dry-bulb temperature analysis (DBTA) approach allow determining the best time and duration of the year for in-situ monitoring to be performed based only on the ambient temperature data of the location. Multivariate change-point (MCP) modeling uses simulated/monitored data to determine best monitoring period of the year. This is also used to validate the SMLP and DBTA approaches. The hybrid inverse modeling method-1 predicts energy-use by combining a short dataset of monitored internal loads with a year of utility-bills, and hybrid inverse method-2 predicts long term building performance using utility-bills only. The results obtained show that often less than three to four months of monitored data is adequate for estimating the annual building energy use, provided that the monitoring is initiated at the right time, and the seasonal as well as daily variations are adequately captured by the short dataset. The predictive accuracy of the short data-sets is found to be strongly influenced by the closeness of the dataset's mean temperature to the annual average temperature. The analysis methods studied would be very useful for energy professionals involved in POE.
ContributorsSingh, Vipul (Author) / Reddy, T. Agami (Thesis advisor) / Bryan, Harvey (Committee member) / Addison, Marlin (Committee member) / Arizona State University (Publisher)
Created2011
149921-Thumbnail Image.png
Description
Arizona has an abundant solar resource and technologically mature systems are available to capture it, but solar energy systems are still considered to be an innovative technology. Adoption rates for solar and wind energy systems rise and fall with the political tides, and are relatively low in most rural areas

Arizona has an abundant solar resource and technologically mature systems are available to capture it, but solar energy systems are still considered to be an innovative technology. Adoption rates for solar and wind energy systems rise and fall with the political tides, and are relatively low in most rural areas in Arizona. This thesis tests the hypothesis that a consumer profile developed to characterize the adopters of renewable energy technology (RET) systems in rural Arizona is the same as the profile of other area residents who performed renovations, upgrades or additions to their homes. Residents of Santa Cruz and Cochise Counties who had obtained building permits to either install a solar or wind energy system or to perform a substantial renovation or upgrade to their home were surveyed to gather demographic, psychographic and behavioristic data. The data from 133 survey responses (76 from RET adopters and 57 from non-adopters) provided insights about their decisions regarding whether or not to adopt a RET system. The results, which are statistically significant at the 99% level of confidence, indicate that RET adopters had smaller households, were older and had higher education levels and greater income levels than the non-adopters. The research also provides answers to three related questions: First, are the energy conservation habits of RET adopters the same as those of non-adopters? Second, what were the sources of information consulted and the most important factors that motivated the decision to purchase a solar or wind energy system? And finally, are any of the factors which influenced the decision to live in a rural area in southeastern Arizona related to the decision to purchase a renewable energy system? The answers are provided, along with a series of recommendations that are designed to inform marketers and other promoters of RETs about how to utilize these results to help achieve their goals.
ContributorsPorter, Wayne Eliot (Author) / Reddy, T. Agami (Thesis advisor) / Pasqualetti, Martin (Committee member) / Larson, Kelli (Committee member) / Kennedy, Linda (Committee member) / Arizona State University (Publisher)
Created2011
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
Description
Buildings in the United States, account for over 68 percent of electricity consumed, 39 percent of total energy use, and 38 percent of the carbon dioxide emissions. By the year 2035, about 75% of the U.S. building sector will be either new or renovated. The energy efficiency requirements of current

Buildings in the United States, account for over 68 percent of electricity consumed, 39 percent of total energy use, and 38 percent of the carbon dioxide emissions. By the year 2035, about 75% of the U.S. building sector will be either new or renovated. The energy efficiency requirements of current building codes would have a significant impact on future energy use, hence, one of the most widely accepted solutions to slowing the growth rate of GHG emissions and then reversing it involves a stringent adoption of building energy codes. A large number of building energy codes exist and a large number of studies which state the energy savings possible through code compliance. However, most codes are difficult to comprehend and require an extensive understanding of the code, the compliance paths, all mandatory and prescriptive requirements as well as the strategy to convert the same to energy model inputs. This paper provides a simplified solution for the entire process by providing an easy to use interface for code compliance and energy simulation through a spreadsheet based tool, the ECCO or the Energy Code COmpliance Tool. This tool provides a platform for a more detailed analysis of building codes as applicable to each and every individual building in each climate zone. It also facilitates quick building energy simulation to determine energy savings achieved through code compliance. This process is highly beneficial not only for code compliance, but also for identifying parameters which can be improved for energy efficiency. Code compliance is simplified through a series of parametric runs which generates the minimally compliant baseline building and 30% beyond code building. This tool is seen as an effective solution for architects and engineers for an initial level analysis as well as for jurisdictions as a front-end diagnostic check for code compliance.  
ContributorsGoel, Supriya (Author) / Bryan, Harvey J. (Thesis advisor) / Reddy, T. Agami (Committee member) / Addison, Marlin (Committee member) / Arizona State University (Publisher)
Created2011
150148-Thumbnail Image.png
Description
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.
ContributorsMabey, Michael Kent (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
151916-Thumbnail Image.png
Description
Through manipulation of adaptable opportunities available within a given environment, individuals become active participants in managing personal comfort requirements, by exercising control over their comfort without the assistance of mechanical heating and cooling systems. Similarly, continuous manipulation of a building skin's form, insulation, porosity, and transmissivity qualities exerts control over

Through manipulation of adaptable opportunities available within a given environment, individuals become active participants in managing personal comfort requirements, by exercising control over their comfort without the assistance of mechanical heating and cooling systems. Similarly, continuous manipulation of a building skin's form, insulation, porosity, and transmissivity qualities exerts control over the energy exchanged between indoor and outdoor environments. This research uses four adaptive response variables in a modified software algorithm to explore an adaptive building skin's potential in reacting to environmental stimuli with the purpose of minimizing energy use without sacrificing occupant comfort. Results illustrate that significant energy savings can be realized with adaptive envelopes over static building envelopes even under extreme summer and winter climate conditions; that the magnitude of these savings are dependent on climate and orientation; and that occupant thermal comfort can be improved consistently over comfort levels achieved by optimized static building envelopes. The resulting adaptive envelope's unique climate-specific behavior could inform designers in creating an intelligent kinetic aesthetic that helps facilitate adaptability and resiliency in architecture.
ContributorsErickson, James (Author) / Bryan, Harvey (Thesis advisor) / Addison, Marlin (Committee member) / Kroelinger, Michael D. (Committee member) / Reddy, T. Agami (Committee member) / Arizona State University (Publisher)
Created2013