Browsing by Author "Zeydan, E."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Open Access ALACA: a platform for dynamic alarm collection and alert notification in network management systems(John Wiley and Sons Ltd., 2017) Solmaz, S. E.; Gedik, B.; Ferhatosmanoğlu, H.; Sözüer, S.; Zeydan, E.; Etemoğlu, Ç. Ö.Mobile network operators run Operations Support Systems that produce vast amounts of alarm events. These events can have different significance levels and domains and also can trigger other ones. Network operators face the challenge to identify the significance and root causes of these system problems in real time and to keep the number of remedial actions at an optimal level, so that customer satisfaction rates can be guaranteed at a reasonable cost. In this paper, we propose a scalable streaming alarm management system, referred to as Alarm Collector and Analyzer, that includes complex event processing and root cause analysis. We describe a rule mining and root cause analysis solution for alarm event correlation and analyses. The solution includes a dynamic index for matching active alarms, an algorithm for generating candidate alarm rules, a sliding window–based approach to save system resources, and a graph-based solution to identify root causes. Alarm Collector and Analyzer is used in the network operation center of a major mobile telecom provider. It helps operators to enhance the design of their alarm management systems by allowing continuous analysis of data and event streams and predict network behavior with respect to potential failures by using the results of root cause analysis. We present experimental results that provide insights on performance of real-time alarm data analytics systems. Copyright © 2017 John Wiley & Sons, Ltd.Item Open Access A demonstration of privacy-preserving aggregate queries for optimal location selection(IEEE, 2018) Eryonucu, Cihan; Ayday, Erman; Zeydan, E.In recent years, service providers, such as mobile operators providing wireless services, collected location data in enormous extent with the increase of the usages of mobile phones. Vertical businesses, such as banks, may want to use this location information for their own scenarios. However, service providers cannot directly provide these private data to the vertical businesses because of the privacy and legal issues. In this demo, we show how privacy preserving solutions can be utilized using such location-based queries without revealing each organization's sensitive data. In our demonstration, we used partially homomorphic cryptosystem in our protocols and showed practicality and feasibility of our proposed solution.Item Open Access Entropy service for secure real-time missioncritical communications(John Wiley and Sons, Ltd, 2022-08-05) Turk, Y.; Tasbag, Yaman Yagiz; Zeydan, E.Real Time Mission Critical Communication (RTMCC) in emergency situations can include real-time video and audio calls between peers and first responders all occurring simultaneously. RTMCC also requires secure end-to-end (E2E) group communication (GC) sessions against potential security threats during such incidents. In this paper, we explore all aspects of the possible methods that are suitable for a software implementation of for session key change during GC in E2E encryption of RTMCC. Later, we introduce our Entropy Service concept, which can be very effective in secure E2E RTMCC sessions. The proposed method ensures E2E security in real-time communication systems while allowing very fast session key change for clients involved in an RTMCC session with a computational complexity of 𝒪(1). Our experimental results show that the proposed Entropy Service can reduce total time by 99.6% and 99.2%, the idle time by 99.4% and 98.99%, and the number of messages by 51.4% and 35.33% compared to the key refreshing and hash methods, respectively, when the number of users in the system increases to 45. These results show that both communication and computation complexity are significantly reduced with the proposed RTMCC session key change.