The 1st International Conference on

Future Data and Security Engineering 2014

FDSE 2014 (LNCS - Springer Verlag)

Ho Chi Minh City, Vietnam, November 19-21, 2014

Keynote speakers



  Speaker: Professor Atsuko Miyaji
Topic: Further Application on RFID with Privacy-Preserving.
Abstract: Wireless technologies are being developed rapidly to construct smart communications with digital data. Networked devices automatically communicates among themselves in order to carry out efficient information transaction.
A Radio Frequency IDentification (RFID) tag with a unique identification numbers uses radio waves to transmit data at a distance. RFID is going to support new technologies such as Internet of Things (IoT), Machine-to-Machine (M2M)
RFID system actuates various security and privacy issues concerning its owners and holders without any knowledge of users. Preventing unauthorized access to the owner data (confidentiality), tag tracing (link-ability), identification of the owners (anonymity) are some necessary privacy-protection of RFID systems.
A Supply Chain Management (SCM) controls and manages all of materials and information in the logistics process from acquisition of raw materials to product delivery to the end user. It is crucial to construct protocols that enable the end user to verify the security and privacy not only of the tags but also the path that the tag passes through, which means path authentication. Path authentication is one of further application of RFID.
In this talk, we summarize previous works to realize authentication schemes, and, then redefine a privacy notion of RFID. We present a new direction that enable the end user to verify the security and privacy not only of tags but also paths that tags goes through. More clearly, if a path-authenticated tag reaches to the end of its supply chain, then the path ensures no intermediate reader was omitted (or selected wrongly) by a tag, either deliberately or not. This would yield not only convenience and efficiency of delivery but also quality of product.
  • Dr. Sc. degree from Osaka University (1997)
  • Specialties: Information Security, Number-theoretic Algorithms, Cryptology
  • Research Keywords: Cloud Security, Big Data Privacy, Cryptanalysis, Protocol Design, Sensor NW
  • Research Interests:
    • Information security: New threats like hackers, computer crimes, tapping, forgeries, etc. have become serious problems. Information security aims at protecting electronic information against such threats. I have been studying information security, especially in cryptographic protocols such as signatures, and key agreements. My interests also include its applications like network security and copy protection.
    • Number-theoretic Algorithms: Number-theoretic algorithms are an important base of public key cryptography, which concerns both its efficiency and its security. I have studied arithmetic algorithms like addition chain and security about the discrete logarithm problem and the elliptic curve discrete logarithm problem.
  • Homepage: http://www.jaist.ac.jp/profiles/info_e.php?profile_id=58

  Speaker: Professor M-Tahar Kechadi
Topic: Data Mining on Forensic Data: Challenges and Opportunities.
Abstract: The success of the current ICT technologies has reached a level in which we generate huge amount of data outpacing our ability to process it and learn from it. Moreover, the future of these technologies depends heavily on the way security threats, trust, and privacy within this “cloudy” environment are dealt with. Current computing environments are exposing their customers to huge risks for their business and reputation, as attacks and cybercrimes are becoming of huge concerns. Therefore, these customers need to have confidence in their providers in following accredited security and privacy practices. For instance, over the last decade, the number of crimes that involve computers and Internet has grown at a rapid pace and the problem of scale will only escalade the cybercrime phenomenon. Without doubt, the next generation of computing will depend highly on the way large-scale cybercrimes are dealt with, both in developing appropriate and efficient approaches to this problem and also on the amount of effort we put to tackle this phenomenon. In this presentation, we discuss how the investigators can store evidential data and conduct forensics analysis. We will focus on the data mining aspect for automatically pre-processing, analysing the data, and extracting evidence. This will involve redesigning the data mining process to deal with forensic data that is noisy, dispersive, incomplete, and inconstant, which are very challenging.
  • Research Keywords: Artificial Neural Networks, Dynamic Load Balancing, Heterogeneous Distributed Systems, High Performance, Scientific Computing, Multi-stage Interconnection Networks, Optimisation Techniques, Parallel Architectures, Parallel Processing, Scheduling.
  • Research Interests: My current research interests are primary in:
    • Grid computing and Grid software,
    • Distributed data mining on Grid platforms,
    • Data mining in Digital Forensics and Cybercrime investigations.
    My current research projects’ goals are twofold:
    • Design, develop and implement innovative distributed data mining techniques for real-world data intensive applications, such as digital forensics and cybercrime, telecommunication systems, banking and finance.
    • Provide these techniques with services and middleware tools in order to take advantage of the available distributed platforms such as the Grid.
    I did my postgraduate research in the area of the architecture of vector machines and their performance. After completing my PhD, I moved into the field of the development of efficient algorithms and tools for real-world applications. My initial research in the area was on the design of efficient parallel algorithms for protein folding applications. These algorithms were implemented on a Maspar MPP with 16K processors. I gained significant experience from these data-intensive real-word applications. The problem then is how to manage and process all these huge volumes of data. Both the analysis of large datasets and the computing environments created new problems and challenges for efficient execution and optimal system performance. This brought me to look at the challenges of the data mining in the distributed environment. Recently, I am specifically looking at these issues from computer forensics and cybercrime investigation and finance perspectives.
  • Homepage: http://www.csi.ucd.ie/users/tahar-kechadi