Shiping Chen | The University of New South Wales (original) (raw)

Papers by Shiping Chen

Research paper thumbnail of A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem

Trustworthy service recommendation has become indispensable for the success of the service ecosys... more Trustworthy service recommendation has become indispensable for the success of the service ecosystem. However, traditional trustworthy methods somehow overlook the service equality which result into a "rich-get-richer" effect and become a barrier for the novice services to startup and grow. This paper addresses this problem through a novel equitable trustworthy mechanism, which distinguished the difference between the novice and mature services over the trustworthy service recommendation. The results based on the real-world service ecosystem, i.e. ProgrammableWeb, show that our method achieves a better performance in equality guarantee and white-washing prevention. Thus it can promote the service ecosystem's healthy growth in a fair manner.

Research paper thumbnail of An Event-Based Monitoring Tool for Parallel and Distributed Applications on Transputer Networks

With the increase in scale and complexity of parallel and distributed applications, the monitorin... more With the increase in scale and complexity of parallel and distributed applications, the monitoring system becomes a crucial tool in the development of these applications. Typically the monitoring tool is used for evaluating system performance, studying system real-time behavior and debugging high-level code. This paper presents an event-based monitoring tool for parallel/distributed applications on a transputer network. Without adding any hardware or learning complicated software commands, developers can use the tool to monitor multiple processes distributed on an arbitrary topology. All monitored events can be visualized from multiple viewpoints in both an off-line and on-line mode.

Research paper thumbnail of An approach to tiling imperfect loop nests directly

Research paper thumbnail of An expert control system for gas furnace pressure

Research paper thumbnail of Optimal tiling for loops with parallelogram iteration spaces

Research paper thumbnail of Communication Overhead on Distributed Memory Machines

Research paper thumbnail of A Contract Language for Service-Oriented Dynamic Collaborations

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

Dynamic collaborations involve contributed resources across the organisational boundaries that ar... more Dynamic collaborations involve contributed resources across the organisational boundaries that are subjected to different set of policies. The management of such resources for dynamic collaborations including negotiation, validation, instantiation and termination is difficult. Existing approaches for collaborations using Web Services such as WSLA are designed to deal with scenarios involving two parties: a service provider and a service consumer. These approaches do not scale well to multiparty nature of dynamic collaborations. To address this problem, we propose a framework for a language called Web Service Collaborative Context Definition Language for dynamic collaborations. The language itself has been defined using XML Schema and has been implemented in a dynamic collaboration platform.

Research paper thumbnail of A Smart User Interface for Service-Oriented Web

Lecture Notes in Computer Science, 2011

The Web enters a new era where contents are to take the back seat and services will take the driv... more The Web enters a new era where contents are to take the back seat and services will take the driver seat to form a service-oriented web. In this paper, we present a smart user interface design for this emerging serviceoriented web. The design leverages the advances of semantic web and service composition technologies to provide an intelligent and generic user interface to query, compose and execute web services for a variety of user tasks. First we develop a simple cost model for estimating the development and learning overheads of web service interfaces for service-oriented applications as the motivation of this work. Then, we present the design of the service-oriented browser and discuss the enabling technologies. A prototype system is developed using existing technologies and standards as proof of concept.

Research paper thumbnail of Cloud Docs: Secure Scalable Document Sharing on Public Clouds

2015 IEEE 8th International Conference on Cloud Computing, 2015

Secure cloud storage solutions such as TrustStore, SecCloud, HPISecure, and TwinCloud have primar... more Secure cloud storage solutions such as TrustStore, SecCloud, HPISecure, and TwinCloud have primarily focused on securing persistent data while storing it in public cloud services. Though data sharing has been recognized as an important security feature, these storage solutions mostly focus on three key properties: confidentiality, integrity and availability. Modern enterprise applications demand data is able to be shared within or across organizations. The challenge is how to securely share data in public clouds without increasing data movement and computation costs. This problem has been addressed in recent times by utilizing or developing new data encryption techniques such as identity-based encryption, attribute-based encryption and proxy-re-encryption. However, these techniques suffer from scalability and flexibility problems when dealing with big data and support for dynamic access control rules. This paper presents a novel architecture and corresponding protocols to provide secure sharing of documents on public cloud services: CloudDocs. This system uses AES for data encryption to achieve scalability and supports identity based access control rules using private-public key pairs to provide flexibility.

Research paper thumbnail of Protecting and Analysing Health Care Data on Cloud

2014 Second International Conference on Advanced Cloud and Big Data, 2014

Various health care devices owned by either hospitals or individuals are producing huge amount of... more Various health care devices owned by either hospitals or individuals are producing huge amount of health care data. The big health data may contain valuable knowledge and new business opportunities. Obviously, cloud is a good candidate to collect, store and analyse such big health care data. However, health care data is very sensitive for its owners, and thus should be well protected on cloud. This paper presents our solution to protecting and analyzing health care data stored on cloud. First, we develop novel technologies to protect data privacy and enable secure data sharing on cloud. Secondly, we show the methods and tools to conduct big health care data analysis. Finally, both the security technology and the data analysis methods are evaluated to show the usefulness and efficiency of our solution.

Research paper thumbnail of Automated Policy Combination for Data Sharing across Multiple Organizations

2015 IEEE International Conference on Services Computing, 2015

During business consolidation, multiple organizations need to share data for common interests. Ho... more During business consolidation, multiple organizations need to share data for common interests. However, these organizations may apply different or even conflicting policies, on account of different rules and rule combining algorithms chosen by them. Thus, it is necessary to combine policies from multiple organizations into a global one to manage the access to the shared data. Existing policy combining approaches are unable to automatically combine policies into a global one. In this paper, we propose an approach to address the issue of multiple policies combination. Its key idea is to first decompose the rules in each policy into various classes, and then combine the rules of the corresponding classes to a global compact policy. The latter ensures compliance with each of the original policies at the syntax and semantic levels. To validate our approach, we provide a proof-of-concept implementation of the automated policy combination.

Research paper thumbnail of TS3: A Trust Enhanced Secure Cloud Storage Service

Research paper thumbnail of Personalised Information Services in a Restricted Network Environment

More and more information is becoming available on the net. This is not just public information, ... more More and more information is becoming available on the net. This is not just public information, but also private or sensitive information. While there have been numerous studies on customised information delivery of public information, when it comes to private or sensitive information, the study of customised delivery is largely an unchartered territory. In this paper, we explore how to make use of both public and private/sensitive information in the delivery of customised information for the benefit of end users. In particular, we present our work on extending the Myriad customised delivery platform to deal with both types of information sources. We specifically focus on how to incorporate a role-based access-control mechanism into Myriad delivery platform such that information delivered to users not only matches their task context but also matches their security credentials.

Research paper thumbnail of A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem

Lecture Notes in Computer Science, 2014

Research paper thumbnail of Secure Multi-party Collaboration Systems in Supply Chain Management

As business expertise becomes more specialized and focused, the business scopes and processes are... more As business expertise becomes more specialized and focused, the business scopes and processes are becoming much larger and complicated. As a result, there are needs for multi-party business entities to collaborate with each other in order to complete a complicated business process in supply chains. In a supply chain, the participant can be collaborators, as well as competitors. As a result, some participants can be very concerned with the privacy of their. In this paper, we will use a real supply chain application to show the demand for secure multi-party collaboration systems.

Research paper thumbnail of A Unified Monitoring Framework for Distributed Information System Management

With the increasing complexity and scale of business processes, and the underlying information sy... more With the increasing complexity and scale of business processes, and the underlying information systems, there is a demand for monitoring the complicated business processes spanning multiple enterprise information systems distributed in a heterogeneous IT environment. This paper presents a unified monitoring framework for such distributed information system management. This framework utilizes Web service and messaging queue technologies to collect log data for business process visualization and monitoring and decouples the tight links between the monitoring tool and the components to be monitored. XML is used to define a universal data format for different types of information to be monitored. A prototype tool is implemented and presented to demonstrate the feasibility and usability of the proposed framework, and experiments are conducted to evaluate the performance overhead introduced by the monitoring.

Research paper thumbnail of Cooperative Data Management Services Based on Accountable Contract

Lecture Notes in Computer Science, 2008

Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for busines... more Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for businesses to "outsource" data management functionalities. However, to benefit from such services, subscribing businesses and data management service providers must trust each other for their data and operations. One cornerstone for establishing such mutual trust is accountability support, which enables misbehavior detections so that a service provider and consumer can independently validate data integrity and agreed performance metrics. Currently, the lack of accountability support limits the expansion of data management services. The paper proposes a new service model for building accountable data management services where service providers and consumers can use witnesses to audit their behaviors. As such accountability support comes at the cost of overall data service performance, the paper particularly tackles the challenge on how to balance data service performance and accountability.

Research paper thumbnail of Cost-effective Cloud Services for HPC in the Cloud-1

In the scientific research domain, traditional High Performance Computing (HPC) refers to the use... more In the scientific research domain, traditional High Performance Computing (HPC) refers to the use of supercomputers, grid environments and/or clusters of computers to solve computation-intensive and/or data-intensive problems. The traditional HPC systems are expensive and sometimes require huge start-up investment, technical and administrative support and job queuing. With the benefits of cloud computing, cloud services such as Infrastructure as a Service (IaaS) and Hardware as a Service (HaaS), enables scientists and researchers to run their HPC applications in the cloud without upfront investment associated with the traditional HPC infrastructure. In this paper we analyze the computational performance and dollar cost of running HPC applications in the cloud when IaaS or HaaS is leased. We find that HaaS significantly reduces the cost of running HPC application in the cloud by 20% compare to IaaS without significant impact to application's performance. We also found that there is a substantial improvement in computational performance in HaaS compare to IaaS.

Research paper thumbnail of 2013-J-CPX-A performance evaluation of distributed database architectures

The globally integrated contemporary business environment has prompted new challenges to database... more The globally integrated contemporary business environment has prompted new challenges to database architectures in order to enable organizations to improve database applications performance, scalability, reliability and data privacy in adapting to the evolving nature of business. Although a number of distributed database architectures are available for choice, there is a lack of an in-depth understanding of the performance characteristics of these database architectures in a comparison way. In this paper, we report a performance study of three typical (centralized, partitioned and replicated) database architectures. We used the TPC-C as the evaluation benchmark to simulate a contemporary business environment, and a commercially available database management system that supports the three architectures. We compared the performance of the partitioned and replicated architectures against the centralized database, which results in some interesting observations and practical experience. The findings and the practice presented in this paper provide useful information and experience for the enterprise architects and database administrators in determining the appropriate database architecture in moving from centralized to distributed environments.

Research paper thumbnail of 2010-ACM-CCGrid-Cloud-TrustStore - Making Amazon S3 Trustworthy with Services Composition

The enormous amount of data generated in daily operations and the increasing demands for data acc... more The enormous amount of data generated in daily operations and the increasing demands for data accessibility across organizations are pushing individuals and organizations to outsource their data storage to cloud storage services. However, the security and the privacy of the outsourced data goes beyond the data owners' control. In this paper, we propose a service composition approach to preserve privacy for data stored in untrusted storage service. A virtual file system, called TrustStore, is prototyped to demonstrate this concept. It allows users utilize untrusted storage service provider with confidentiality and integrity of the data preserved. We deployed the prototype with Amazon S3 and evaluate its performance.

Research paper thumbnail of A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem

Trustworthy service recommendation has become indispensable for the success of the service ecosys... more Trustworthy service recommendation has become indispensable for the success of the service ecosystem. However, traditional trustworthy methods somehow overlook the service equality which result into a "rich-get-richer" effect and become a barrier for the novice services to startup and grow. This paper addresses this problem through a novel equitable trustworthy mechanism, which distinguished the difference between the novice and mature services over the trustworthy service recommendation. The results based on the real-world service ecosystem, i.e. ProgrammableWeb, show that our method achieves a better performance in equality guarantee and white-washing prevention. Thus it can promote the service ecosystem's healthy growth in a fair manner.

Research paper thumbnail of An Event-Based Monitoring Tool for Parallel and Distributed Applications on Transputer Networks

With the increase in scale and complexity of parallel and distributed applications, the monitorin... more With the increase in scale and complexity of parallel and distributed applications, the monitoring system becomes a crucial tool in the development of these applications. Typically the monitoring tool is used for evaluating system performance, studying system real-time behavior and debugging high-level code. This paper presents an event-based monitoring tool for parallel/distributed applications on a transputer network. Without adding any hardware or learning complicated software commands, developers can use the tool to monitor multiple processes distributed on an arbitrary topology. All monitored events can be visualized from multiple viewpoints in both an off-line and on-line mode.

Research paper thumbnail of An approach to tiling imperfect loop nests directly

Research paper thumbnail of An expert control system for gas furnace pressure

Research paper thumbnail of Optimal tiling for loops with parallelogram iteration spaces

Research paper thumbnail of Communication Overhead on Distributed Memory Machines

Research paper thumbnail of A Contract Language for Service-Oriented Dynamic Collaborations

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

Dynamic collaborations involve contributed resources across the organisational boundaries that ar... more Dynamic collaborations involve contributed resources across the organisational boundaries that are subjected to different set of policies. The management of such resources for dynamic collaborations including negotiation, validation, instantiation and termination is difficult. Existing approaches for collaborations using Web Services such as WSLA are designed to deal with scenarios involving two parties: a service provider and a service consumer. These approaches do not scale well to multiparty nature of dynamic collaborations. To address this problem, we propose a framework for a language called Web Service Collaborative Context Definition Language for dynamic collaborations. The language itself has been defined using XML Schema and has been implemented in a dynamic collaboration platform.

Research paper thumbnail of A Smart User Interface for Service-Oriented Web

Lecture Notes in Computer Science, 2011

The Web enters a new era where contents are to take the back seat and services will take the driv... more The Web enters a new era where contents are to take the back seat and services will take the driver seat to form a service-oriented web. In this paper, we present a smart user interface design for this emerging serviceoriented web. The design leverages the advances of semantic web and service composition technologies to provide an intelligent and generic user interface to query, compose and execute web services for a variety of user tasks. First we develop a simple cost model for estimating the development and learning overheads of web service interfaces for service-oriented applications as the motivation of this work. Then, we present the design of the service-oriented browser and discuss the enabling technologies. A prototype system is developed using existing technologies and standards as proof of concept.

Research paper thumbnail of Cloud Docs: Secure Scalable Document Sharing on Public Clouds

2015 IEEE 8th International Conference on Cloud Computing, 2015

Secure cloud storage solutions such as TrustStore, SecCloud, HPISecure, and TwinCloud have primar... more Secure cloud storage solutions such as TrustStore, SecCloud, HPISecure, and TwinCloud have primarily focused on securing persistent data while storing it in public cloud services. Though data sharing has been recognized as an important security feature, these storage solutions mostly focus on three key properties: confidentiality, integrity and availability. Modern enterprise applications demand data is able to be shared within or across organizations. The challenge is how to securely share data in public clouds without increasing data movement and computation costs. This problem has been addressed in recent times by utilizing or developing new data encryption techniques such as identity-based encryption, attribute-based encryption and proxy-re-encryption. However, these techniques suffer from scalability and flexibility problems when dealing with big data and support for dynamic access control rules. This paper presents a novel architecture and corresponding protocols to provide secure sharing of documents on public cloud services: CloudDocs. This system uses AES for data encryption to achieve scalability and supports identity based access control rules using private-public key pairs to provide flexibility.

Research paper thumbnail of Protecting and Analysing Health Care Data on Cloud

2014 Second International Conference on Advanced Cloud and Big Data, 2014

Various health care devices owned by either hospitals or individuals are producing huge amount of... more Various health care devices owned by either hospitals or individuals are producing huge amount of health care data. The big health data may contain valuable knowledge and new business opportunities. Obviously, cloud is a good candidate to collect, store and analyse such big health care data. However, health care data is very sensitive for its owners, and thus should be well protected on cloud. This paper presents our solution to protecting and analyzing health care data stored on cloud. First, we develop novel technologies to protect data privacy and enable secure data sharing on cloud. Secondly, we show the methods and tools to conduct big health care data analysis. Finally, both the security technology and the data analysis methods are evaluated to show the usefulness and efficiency of our solution.

Research paper thumbnail of Automated Policy Combination for Data Sharing across Multiple Organizations

2015 IEEE International Conference on Services Computing, 2015

During business consolidation, multiple organizations need to share data for common interests. Ho... more During business consolidation, multiple organizations need to share data for common interests. However, these organizations may apply different or even conflicting policies, on account of different rules and rule combining algorithms chosen by them. Thus, it is necessary to combine policies from multiple organizations into a global one to manage the access to the shared data. Existing policy combining approaches are unable to automatically combine policies into a global one. In this paper, we propose an approach to address the issue of multiple policies combination. Its key idea is to first decompose the rules in each policy into various classes, and then combine the rules of the corresponding classes to a global compact policy. The latter ensures compliance with each of the original policies at the syntax and semantic levels. To validate our approach, we provide a proof-of-concept implementation of the automated policy combination.

Research paper thumbnail of TS3: A Trust Enhanced Secure Cloud Storage Service

Research paper thumbnail of Personalised Information Services in a Restricted Network Environment

More and more information is becoming available on the net. This is not just public information, ... more More and more information is becoming available on the net. This is not just public information, but also private or sensitive information. While there have been numerous studies on customised information delivery of public information, when it comes to private or sensitive information, the study of customised delivery is largely an unchartered territory. In this paper, we explore how to make use of both public and private/sensitive information in the delivery of customised information for the benefit of end users. In particular, we present our work on extending the Myriad customised delivery platform to deal with both types of information sources. We specifically focus on how to incorporate a role-based access-control mechanism into Myriad delivery platform such that information delivered to users not only matches their task context but also matches their security credentials.

Research paper thumbnail of A Novel Equitable Trustworthy Mechanism for Service Recommendation in the Evolving Service Ecosystem

Lecture Notes in Computer Science, 2014

Research paper thumbnail of Secure Multi-party Collaboration Systems in Supply Chain Management

As business expertise becomes more specialized and focused, the business scopes and processes are... more As business expertise becomes more specialized and focused, the business scopes and processes are becoming much larger and complicated. As a result, there are needs for multi-party business entities to collaborate with each other in order to complete a complicated business process in supply chains. In a supply chain, the participant can be collaborators, as well as competitors. As a result, some participants can be very concerned with the privacy of their. In this paper, we will use a real supply chain application to show the demand for secure multi-party collaboration systems.

Research paper thumbnail of A Unified Monitoring Framework for Distributed Information System Management

With the increasing complexity and scale of business processes, and the underlying information sy... more With the increasing complexity and scale of business processes, and the underlying information systems, there is a demand for monitoring the complicated business processes spanning multiple enterprise information systems distributed in a heterogeneous IT environment. This paper presents a unified monitoring framework for such distributed information system management. This framework utilizes Web service and messaging queue technologies to collect log data for business process visualization and monitoring and decouples the tight links between the monitoring tool and the components to be monitored. XML is used to define a universal data format for different types of information to be monitored. A prototype tool is implemented and presented to demonstrate the feasibility and usability of the proposed framework, and experiments are conducted to evaluate the performance overhead introduced by the monitoring.

Research paper thumbnail of Cooperative Data Management Services Based on Accountable Contract

Lecture Notes in Computer Science, 2008

Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for busines... more Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for businesses to "outsource" data management functionalities. However, to benefit from such services, subscribing businesses and data management service providers must trust each other for their data and operations. One cornerstone for establishing such mutual trust is accountability support, which enables misbehavior detections so that a service provider and consumer can independently validate data integrity and agreed performance metrics. Currently, the lack of accountability support limits the expansion of data management services. The paper proposes a new service model for building accountable data management services where service providers and consumers can use witnesses to audit their behaviors. As such accountability support comes at the cost of overall data service performance, the paper particularly tackles the challenge on how to balance data service performance and accountability.

Research paper thumbnail of Cost-effective Cloud Services for HPC in the Cloud-1

In the scientific research domain, traditional High Performance Computing (HPC) refers to the use... more In the scientific research domain, traditional High Performance Computing (HPC) refers to the use of supercomputers, grid environments and/or clusters of computers to solve computation-intensive and/or data-intensive problems. The traditional HPC systems are expensive and sometimes require huge start-up investment, technical and administrative support and job queuing. With the benefits of cloud computing, cloud services such as Infrastructure as a Service (IaaS) and Hardware as a Service (HaaS), enables scientists and researchers to run their HPC applications in the cloud without upfront investment associated with the traditional HPC infrastructure. In this paper we analyze the computational performance and dollar cost of running HPC applications in the cloud when IaaS or HaaS is leased. We find that HaaS significantly reduces the cost of running HPC application in the cloud by 20% compare to IaaS without significant impact to application's performance. We also found that there is a substantial improvement in computational performance in HaaS compare to IaaS.

Research paper thumbnail of 2013-J-CPX-A performance evaluation of distributed database architectures

The globally integrated contemporary business environment has prompted new challenges to database... more The globally integrated contemporary business environment has prompted new challenges to database architectures in order to enable organizations to improve database applications performance, scalability, reliability and data privacy in adapting to the evolving nature of business. Although a number of distributed database architectures are available for choice, there is a lack of an in-depth understanding of the performance characteristics of these database architectures in a comparison way. In this paper, we report a performance study of three typical (centralized, partitioned and replicated) database architectures. We used the TPC-C as the evaluation benchmark to simulate a contemporary business environment, and a commercially available database management system that supports the three architectures. We compared the performance of the partitioned and replicated architectures against the centralized database, which results in some interesting observations and practical experience. The findings and the practice presented in this paper provide useful information and experience for the enterprise architects and database administrators in determining the appropriate database architecture in moving from centralized to distributed environments.

Research paper thumbnail of 2010-ACM-CCGrid-Cloud-TrustStore - Making Amazon S3 Trustworthy with Services Composition

The enormous amount of data generated in daily operations and the increasing demands for data acc... more The enormous amount of data generated in daily operations and the increasing demands for data accessibility across organizations are pushing individuals and organizations to outsource their data storage to cloud storage services. However, the security and the privacy of the outsourced data goes beyond the data owners' control. In this paper, we propose a service composition approach to preserve privacy for data stored in untrusted storage service. A virtual file system, called TrustStore, is prototyped to demonstrate this concept. It allows users utilize untrusted storage service provider with confidentiality and integrity of the data preserved. We deployed the prototype with Amazon S3 and evaluate its performance.