首页 > 最新文献

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs 利用传播图提供及时、可靠、经济的互联网传输服务
Amy Babay, Emily Wagner, M. Dinitz, Y. Amir
Emerging applications such as remote manipulation and remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet. To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. We conduct an extensive analysis of real-world network data, finding that a routing approach using two disjoint paths performs well in most cases, and that cases where two disjoint paths do not perform well typically involve problems around a source or destination. Based on this analysis, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. This approach can cover over 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme, while two dynamic disjoint paths cover about 70% of this gap, and two static disjoint paths cover about 45%. This performance improvement is obtained at a cost increase of about 2% over two disjoint paths.
诸如远程操作和远程机器人手术等新兴应用要求通信既及时又可靠,但是Internet本身只支持通信,要么是完全可靠的,没有时效性保证(例如TCP),要么是及时的,尽最大努力的可靠性(例如UDP)。我们提供了一种覆盖传输服务,可以提供高度可靠的通信,同时满足严格的时效性保证(例如,在美国的往返延迟为130毫秒)。为了使路由方案能够支持必要的时效性和可靠性,我们引入了传播图,为指定路由方案提供了统一的框架,范围从单一路径到多个不相交路径,再到任意图。我们对现实世界的网络数据进行了广泛的分析,发现使用两条不相交路径的路由方法在大多数情况下表现良好,而两条不相交路径表现不佳的情况通常涉及源或目标周围的问题。在此基础上,我们开发了一种及时的基于传播图的路由方法,可以在网络的问题区域中添加目标冗余。这种方法可以弥补传统单路径方法和最优方案(但代价高昂)之间99%以上的性能差距,而两条动态不相交路径可以弥补大约70%的差距,两条静态不相交路径可以弥补大约45%的差距。这种性能改进是在两个不相交路径上的成本增加约2%的情况下获得的。
{"title":"Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs","authors":"Amy Babay, Emily Wagner, M. Dinitz, Y. Amir","doi":"10.1109/ICDCS.2017.63","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.63","url":null,"abstract":"Emerging applications such as remote manipulation and remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet. To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. We conduct an extensive analysis of real-world network data, finding that a routing approach using two disjoint paths performs well in most cases, and that cases where two disjoint paths do not perform well typically involve problems around a source or destination. Based on this analysis, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. This approach can cover over 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme, while two dynamic disjoint paths cover about 70% of this gap, and two static disjoint paths cover about 45%. This performance improvement is obtained at a cost increase of about 2% over two disjoint paths.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Adversary-Centric Behavior Modeling of DDoS Attacks 以对手为中心的DDoS攻击行为建模
An Wang, Aziz Mohaisen, Songqing Chen
Distributed Denial of Service (DDoS) attacks are some of the most persistent threats on the Internet today. The evolution of DDoS attacks calls for an in-depth analysis of those attacks. A better understanding of the attackers’ behavior can provide insights to unveil patterns and strategies utilized by attackers. The prior art on the attackers’ behavior analysis often falls in two aspects: it assumes that adversaries are static, and makes certain simplifying assumptions on their behavior, which often are not supported by real attack data. In this paper, we take a data-driven approach to designing and validating three DDoS attack models from temporal (e.g., attack magnitudes), spatial (e.g., attacker origin), and spatiotemporal (e.g., attack inter-launching time) perspectives. We design these models based on the analysis of traces consisting of more than 50,000 verified DDoS attacks from industrial mitigation operations. Each model is also validated by testing its effectiveness in accurately predicting future DDoS attacks. Comparisons against simple intuitive models further show that our models can more accurately capture the essential features of DDoS attacks.
分布式拒绝服务(DDoS)攻击是当今Internet上最持久的威胁之一。DDoS攻击的演变需要对这些攻击进行深入的分析。更好地理解攻击者的行为可以为揭示攻击者使用的模式和策略提供见解。关于攻击者行为分析的现有技术通常落在两个方面:假设对手是静态的,并对其行为进行某些简化假设,而这些假设通常没有真实的攻击数据支持。在本文中,我们采用数据驱动的方法,从时间(例如,攻击规模)、空间(例如,攻击者起源)和时空(例如,攻击相互启动时间)的角度设计和验证三种DDoS攻击模型。我们基于对来自工业缓解操作的超过50,000次经过验证的DDoS攻击的痕迹分析来设计这些模型。每个模型还通过测试其准确预测未来DDoS攻击的有效性来验证。与简单直观模型的对比进一步表明,我们的模型可以更准确地捕捉到DDoS攻击的基本特征。
{"title":"An Adversary-Centric Behavior Modeling of DDoS Attacks","authors":"An Wang, Aziz Mohaisen, Songqing Chen","doi":"10.1109/ICDCS.2017.213","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.213","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are some of the most persistent threats on the Internet today. The evolution of DDoS attacks calls for an in-depth analysis of those attacks. A better understanding of the attackers’ behavior can provide insights to unveil patterns and strategies utilized by attackers. The prior art on the attackers’ behavior analysis often falls in two aspects: it assumes that adversaries are static, and makes certain simplifying assumptions on their behavior, which often are not supported by real attack data. In this paper, we take a data-driven approach to designing and validating three DDoS attack models from temporal (e.g., attack magnitudes), spatial (e.g., attacker origin), and spatiotemporal (e.g., attack inter-launching time) perspectives. We design these models based on the analysis of traces consisting of more than 50,000 verified DDoS attacks from industrial mitigation operations. Each model is also validated by testing its effectiveness in accurately predicting future DDoS attacks. Comparisons against simple intuitive models further show that our models can more accurately capture the essential features of DDoS attacks.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering 层次轨迹聚类的自组织映射
P. Dewan, R. Ganti, M. Srivatsa
Trajectory clustering techniques help discover interesting insights from moving object data, including common routes for people and vehicles, anomalous sub-trajectories, etc. Existing trajectory clustering techniques fail to take in to account the uncertainty present in location data. In this paper, we investigate the problem of clustering trajectory data and propose a novel algorithm for clustering similar full and sub-trajectories together while modeling uncertainty in this data. We describe the necessary pre-processing techniques for clustering trajectory data, namely techniques to discretize raw location data using Possible World semantics to capture the inherent uncertainty in location data, and to segment full trajectories in to meaningful sub-trajectories. As a baseline, we extend the well known K-means algorithm to cluster trajectory data. We then describe and evaluate a new trajectory clustering algorithm, SOM-TC (Self-Organizing Map Based Trajectory Clustering), that is inspired from the self-organizing map technique and is at least 4x faster than the baseline K-means and current density based clustering approaches.
轨迹聚类技术有助于从移动对象数据中发现有趣的见解,包括人员和车辆的共同路线,异常子轨迹等。现有的轨迹聚类技术没有考虑到位置数据的不确定性。本文研究了轨迹数据的聚类问题,提出了一种基于不确定性建模的全轨迹和子轨迹聚类算法。我们描述了聚类轨迹数据的必要预处理技术,即使用可能世界语义对原始位置数据进行离散化以捕获位置数据中固有的不确定性,并将完整轨迹分割为有意义的子轨迹的技术。作为基线,我们将众所周知的K-means算法扩展到聚类轨迹数据。然后,我们描述并评估了一种新的轨迹聚类算法SOM-TC(基于自组织地图的轨迹聚类),该算法受到自组织地图技术的启发,比基线K-means和当前基于密度的聚类方法至少快4倍。
{"title":"SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering","authors":"P. Dewan, R. Ganti, M. Srivatsa","doi":"10.1109/ICDCS.2017.244","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.244","url":null,"abstract":"Trajectory clustering techniques help discover interesting insights from moving object data, including common routes for people and vehicles, anomalous sub-trajectories, etc. Existing trajectory clustering techniques fail to take in to account the uncertainty present in location data. In this paper, we investigate the problem of clustering trajectory data and propose a novel algorithm for clustering similar full and sub-trajectories together while modeling uncertainty in this data. We describe the necessary pre-processing techniques for clustering trajectory data, namely techniques to discretize raw location data using Possible World semantics to capture the inherent uncertainty in location data, and to segment full trajectories in to meaningful sub-trajectories. As a baseline, we extend the well known K-means algorithm to cluster trajectory data. We then describe and evaluate a new trajectory clustering algorithm, SOM-TC (Self-Organizing Map Based Trajectory Clustering), that is inspired from the self-organizing map technique and is at least 4x faster than the baseline K-means and current density based clustering approaches.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control 质量控制众包中异构工人的动态契约设计
Chenxi Qiu, A. Squicciarini, S. Rajtmajer, James Caverlee
Crowdsourcing sites heavily rely on paid workers to ensure completion of tasks. Yet, designing a pricing strategies able to incentivize users' quality and retention is non trivial. Existing payment strategies either simply set a fixed payment per task without considering changes in workers' behaviors, or rule out poor quality responses and workers based on coarse criteria. Hence, task requesters may be investing significantly in work that is inaccurate or even misleading. In this paper, we design a dynamic contract to incentivize high-quality work. Our proposed approach offers a theoretically proven algorithm to calculate the contract for each worker in a cost-efficient manner. In contrast to existing work, our contract design is not only adaptive to changes in workers' behavior, but also adjusts pricing policy in the presence of malicious behavior. Both theoretical and experimental analysis over real Amazon review traces show that our contract design can achieve a near optimal solution. Furthermore, experimental results demonstrate that our contract design 1) can promote high-quality work and prevent malicious behavior, and 2) outperforms the intuitive strategy of excluding all malicious workers in terms of the requester's utility.
众包网站严重依赖有偿工人来确保任务的完成。然而,设计一个能够激励用户质量和留存率的定价策略并非易事。现有的薪酬策略要么是简单地设定固定的每项任务的薪酬,而不考虑员工行为的变化,要么是根据粗略的标准排除低质量的回应和员工。因此,任务请求者可能会在不准确甚至误导的工作中投入大量资金。在本文中,我们设计了一个动态契约来激励高质量的工作。我们提出的方法提供了一个理论上经过验证的算法,以一种经济有效的方式计算每个工人的合同。与现有工作相比,我们的合同设计不仅可以适应工人行为的变化,而且可以在存在恶意行为的情况下调整定价政策。对真实亚马逊评论痕迹的理论和实验分析表明,我们的契约设计可以实现接近最优的解决方案。此外,实验结果表明,我们的合约设计1)可以促进高质量的工作并防止恶意行为,2)在请求者的效用方面优于排除所有恶意工作者的直观策略。
{"title":"Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control","authors":"Chenxi Qiu, A. Squicciarini, S. Rajtmajer, James Caverlee","doi":"10.1109/ICDCS.2017.187","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.187","url":null,"abstract":"Crowdsourcing sites heavily rely on paid workers to ensure completion of tasks. Yet, designing a pricing strategies able to incentivize users' quality and retention is non trivial. Existing payment strategies either simply set a fixed payment per task without considering changes in workers' behaviors, or rule out poor quality responses and workers based on coarse criteria. Hence, task requesters may be investing significantly in work that is inaccurate or even misleading. In this paper, we design a dynamic contract to incentivize high-quality work. Our proposed approach offers a theoretically proven algorithm to calculate the contract for each worker in a cost-efficient manner. In contrast to existing work, our contract design is not only adaptive to changes in workers' behavior, but also adjusts pricing policy in the presence of malicious behavior. Both theoretical and experimental analysis over real Amazon review traces show that our contract design can achieve a near optimal solution. Furthermore, experimental results demonstrate that our contract design 1) can promote high-quality work and prevent malicious behavior, and 2) outperforms the intuitive strategy of excluding all malicious workers in terms of the requester's utility.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Pythia: A System for Online Topic Discovery of Social Media Posts 一个社交媒体帖子的在线主题发现系统
Juliana Litou, V. Kalogeraki
Social media constitute nowadays one of the most common communication mediums. Millions of users exploit them daily to share information with their community in the network via messages, referred as posts. The massive volume of information shared is extremely diverse and covers a vast spectrum of topics and interests. Automatically identifying the topics of the posts is of particular interest as this can assist in a variety of applications, such as event detection, trends discovery, expert finding etc. However, designing an automated system that requires no human agent participation to identify the topics covered in posts published in Online Social Networks (OSNs) presents manifold challenges. First, posts are unstructured and commonly short, limited to just a few characters. This prevents existing classification schemes to be directly applied in such cases, due to sparseness of the text. Second, new information emerges constantly, hence building a learning corpus from past posts may fail to capture the ever evolving information emerging in OSNs. To overcome the aforementioned limitations we have designed Pythia, an automated system for short text classification that exploits the Wikipedia structure and articles to identify the topics of the posts. The topic discovery is performed in two phases. In the first step, the system exploits Wikipedia categories and articles of the corresponding categories to build the training corpus for the suppervised learning. In the second step, the text of a given post is augmented using a text enrichment mechanism that extends the post with relevant Wikipedia articles. After the initial steps are performed, we deploy k-NN classifier to determine the topic(s) covered in the original post.
社交媒体是当今最常见的交流媒介之一。数以百万计的用户每天利用微博通过消息(即帖子)与他们在网络上的社区分享信息。共享的大量信息极其多样化,涵盖了广泛的主题和兴趣。自动识别帖子的主题是特别有趣的,因为这可以帮助各种应用程序,如事件检测,趋势发现,专家寻找等。然而,设计一个不需要人工参与的自动化系统来识别在线社交网络(OSNs)上发布的帖子所涵盖的主题,面临着多方面的挑战。首先,帖子没有结构,通常很短,只有几个字。由于文本的稀疏性,这阻止了现有的分类方案直接应用于这种情况。其次,新信息不断出现,因此从过去的帖子中构建学习语料库可能无法捕获osn中不断发展的信息。To overcome the aforementioned limitations we have designed Pythia, an automated system for short text classification that exploits the Wikipedia structure and articles to identify the topics of the posts. 主题发现分两个阶段进行。In the first step, the system exploits Wikipedia categories and articles of the corresponding categories to build the training corpus for the suppervised learning. 在第二步中,使用文本充实机制对给定文章的文本进行扩充,该机制用相关的Wikipedia文章扩展文章。在执行初始步骤之后,我们部署k-NN分类器来确定原始帖子中涵盖的主题。
{"title":"Pythia: A System for Online Topic Discovery of Social Media Posts","authors":"Juliana Litou, V. Kalogeraki","doi":"10.1109/ICDCS.2017.289","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.289","url":null,"abstract":"Social media constitute nowadays one of the most common communication mediums. Millions of users exploit them daily to share information with their community in the network via messages, referred as posts. The massive volume of information shared is extremely diverse and covers a vast spectrum of topics and interests. Automatically identifying the topics of the posts is of particular interest as this can assist in a variety of applications, such as event detection, trends discovery, expert finding etc. However, designing an automated system that requires no human agent participation to identify the topics covered in posts published in Online Social Networks (OSNs) presents manifold challenges. First, posts are unstructured and commonly short, limited to just a few characters. This prevents existing classification schemes to be directly applied in such cases, due to sparseness of the text. Second, new information emerges constantly, hence building a learning corpus from past posts may fail to capture the ever evolving information emerging in OSNs. To overcome the aforementioned limitations we have designed Pythia, an automated system for short text classification that exploits the Wikipedia structure and articles to identify the topics of the posts. The topic discovery is performed in two phases. In the first step, the system exploits Wikipedia categories and articles of the corresponding categories to build the training corpus for the suppervised learning. In the second step, the text of a given post is augmented using a text enrichment mechanism that extends the post with relevant Wikipedia articles. After the initial steps are performed, we deploy k-NN classifier to determine the topic(s) covered in the original post.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"75 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs manet广播算法的密度和移动性评估
Raziel Carvajal Gómez, I. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, E. Rivière
Broadcast is a fundamental operation in Mobile Ad-Hoc Networks (MANETs). A large variety of broadcast algorithms have been proposed. They differ in the way message forwarding between nodes is controlled, and in the level of information about the topology that this control requires. Deployment scenarios for MANETs vary widely, in particular in terms of nodes density and mobility. The choice of an algorithm depends on its expected coverage and energy cost, which are both impacted by the deployment context. In this work, we are interested in the comprehensive comparison of the costs and effectiveness of broadcast algorithms for MANETs depending on target environmental conditions. We describe the results of an experimental study of five algorithms, representative of the main design alternatives. Our study reveals that the best algorithm for a given situation, such as a high density and a stable network, is not necessarily the most appropriate for a different situation such as a sparse and mobile network. We identify the algorithms characteristics that are correlated with these differences and discuss the pros and cons of each design.
广播是移动自组织网络(manet)的一项基本操作。各种各样的广播算法已经被提出。它们的不同之处在于控制节点之间消息转发的方式,以及这种控制所需的拓扑信息级别。manet的部署场景变化很大,特别是在节点密度和移动性方面。算法的选择取决于其预期的覆盖范围和能源成本,这两者都受到部署上下文的影响。在这项工作中,我们感兴趣的是根据目标环境条件对manet广播算法的成本和有效性进行全面比较。我们描述了五种算法的实验研究结果,代表了主要的设计方案。我们的研究表明,对于给定情况(例如高密度和稳定的网络)的最佳算法不一定是最适合于其他情况(例如稀疏和移动网络)的算法。我们确定了与这些差异相关的算法特征,并讨论了每种设计的优缺点。
{"title":"Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs","authors":"Raziel Carvajal Gómez, I. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, E. Rivière","doi":"10.1109/ICDCS.2017.240","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.240","url":null,"abstract":"Broadcast is a fundamental operation in Mobile Ad-Hoc Networks (MANETs). A large variety of broadcast algorithms have been proposed. They differ in the way message forwarding between nodes is controlled, and in the level of information about the topology that this control requires. Deployment scenarios for MANETs vary widely, in particular in terms of nodes density and mobility. The choice of an algorithm depends on its expected coverage and energy cost, which are both impacted by the deployment context. In this work, we are interested in the comprehensive comparison of the costs and effectiveness of broadcast algorithms for MANETs depending on target environmental conditions. We describe the results of an experimental study of five algorithms, representative of the main design alternatives. Our study reveals that the best algorithm for a given situation, such as a high density and a stable network, is not necessarily the most appropriate for a different situation such as a sparse and mobile network. We identify the algorithms characteristics that are correlated with these differences and discuss the pros and cons of each design.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities 智慧城市中高效雾到云数据管理的新架构
Amir Sinaeepourfard, Jordi García, X. Masip-Bruin, E. Marín-Tordera
Traditional smart city resources management rely on cloud based solutions to provide a centralized and rich set of open data. The advantages of cloud based frameworks are their ubiquity, (almost) unlimited resources capacity, cost efficiency, as well as elasticity. However, accessing data from the cloud implies large network traffic, high data latencies, and higher security risks. Alternatively, fog computing emerges as a promising technology to absorb these inconveniences. The use of devices at the edge provides closer computing facilities, reduces network traffic and latencies, and improves security. We have defined a new framework for data management in the context of smart city through a global fog to cloud management architecture; in this paper we present the data acquisition block. As a first experiment we estimate the network traffic during data collection, and compare it with a traditional real system. We also show the effectiveness of some basic data aggregation techniques in the model, such as redundant data elimination and data compression.
传统的智慧城市资源管理依赖于基于云的解决方案来提供集中而丰富的开放数据集。基于云的框架的优势在于其无处不在、(几乎)无限的资源容量、成本效率以及弹性。但是,从云端访问数据意味着大的网络流量、高的数据延迟和更高的安全风险。或者,雾计算作为一种很有前途的技术出现,以吸收这些不便。在边缘使用设备可以提供更近的计算设施,减少网络流量和延迟,并提高安全性。我们通过全球雾到云的管理架构,定义了智慧城市背景下数据管理的新框架;本文介绍了数据采集模块。作为第一个实验,我们估计了数据采集过程中的网络流量,并将其与传统的真实系统进行了比较。我们还展示了模型中一些基本数据聚合技术的有效性,如冗余数据消除和数据压缩。
{"title":"A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities","authors":"Amir Sinaeepourfard, Jordi García, X. Masip-Bruin, E. Marín-Tordera","doi":"10.1109/ICDCS.2017.202","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.202","url":null,"abstract":"Traditional smart city resources management rely on cloud based solutions to provide a centralized and rich set of open data. The advantages of cloud based frameworks are their ubiquity, (almost) unlimited resources capacity, cost efficiency, as well as elasticity. However, accessing data from the cloud implies large network traffic, high data latencies, and higher security risks. Alternatively, fog computing emerges as a promising technology to absorb these inconveniences. The use of devices at the edge provides closer computing facilities, reduces network traffic and latencies, and improves security. We have defined a new framework for data management in the context of smart city through a global fog to cloud management architecture; in this paper we present the data acquisition block. As a first experiment we estimate the network traffic during data collection, and compare it with a traditional real system. We also show the effectiveness of some basic data aggregation techniques in the model, such as redundant data elimination and data compression.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Agar: A Caching System for Erasure-Coded Data 琼脂:用于擦除编码数据的缓存系统
Raluca Halalai, P. Felber, Anne-Marie Kermarrec, François Taïani
Erasure coding is an established data protection mechanism. It provides high resiliency with low storage overhead, which makes it very attractive to storage systems developers. Unfortunately, when used in a distributed setting, erasure coding hampers a storage system's performance, because it requires clients to contact several, possibly remote sites to retrieve their data. This has hindered the adoption of erasure coding in practice, limiting its use to cold, archival data. Recent research showed that it is feasible to use erasure coding for hot data as well, thus opening new perspectives for improving erasure-coded storage systems. In this paper, we address the problem of minimizing access latency in erasure-coded storage. We propose Agar-a novel caching system tailored for erasure-coded content. Agar optimizes the contents of the cache based on live information regarding data popularity and access latency to different data storage sites. Our system adapts a dynamic programming algorithm to optimize the choice of data blocks that are cached, using an approach akin to "Knapsack" algorithms. We compare Agar to the classical Least Recently Used and Least Frequently Used cache eviction policies, while varying the amount of data cached between a data chunk and a whole replica of the object. We show that Agar can achieve 16% to 41% lower latency than systems that use classical caching policies.
Erasure编码是一种成熟的数据保护机制。它提供了高弹性和低存储开销,这使得它对存储系统开发人员非常有吸引力。不幸的是,当在分布式设置中使用时,擦除编码会影响存储系统的性能,因为它需要客户端联系几个,可能是远程站点来检索它们的数据。这在实践中阻碍了擦除编码的采用,限制了它对冷的存档数据的使用。最近的研究表明,在热数据中使用擦除编码也是可行的,从而为改进擦除编码存储系统开辟了新的前景。在本文中,我们解决了在擦除编码存储中最小化访问延迟的问题。我们提出agar -一种为擦除编码内容量身定制的新型缓存系统。Agar根据有关数据流行度和访问不同数据存储站点的延迟的实时信息优化缓存的内容。我们的系统采用一种动态规划算法来优化缓存数据块的选择,使用类似于“背包”算法的方法。我们将Agar与经典的最近最少使用和最不频繁使用的缓存驱逐策略进行比较,同时在数据块和对象的整个副本之间改变缓存的数据量。我们表明,与使用传统缓存策略的系统相比,琼脂可以实现16%到41%的低延迟。
{"title":"Agar: A Caching System for Erasure-Coded Data","authors":"Raluca Halalai, P. Felber, Anne-Marie Kermarrec, François Taïani","doi":"10.1109/ICDCS.2017.97","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.97","url":null,"abstract":"Erasure coding is an established data protection mechanism. It provides high resiliency with low storage overhead, which makes it very attractive to storage systems developers. Unfortunately, when used in a distributed setting, erasure coding hampers a storage system's performance, because it requires clients to contact several, possibly remote sites to retrieve their data. This has hindered the adoption of erasure coding in practice, limiting its use to cold, archival data. Recent research showed that it is feasible to use erasure coding for hot data as well, thus opening new perspectives for improving erasure-coded storage systems. In this paper, we address the problem of minimizing access latency in erasure-coded storage. We propose Agar-a novel caching system tailored for erasure-coded content. Agar optimizes the contents of the cache based on live information regarding data popularity and access latency to different data storage sites. Our system adapts a dynamic programming algorithm to optimize the choice of data blocks that are cached, using an approach akin to \"Knapsack\" algorithms. We compare Agar to the classical Least Recently Used and Least Frequently Used cache eviction policies, while varying the amount of data cached between a data chunk and a whole replica of the object. We show that Agar can achieve 16% to 41% lower latency than systems that use classical caching policies.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123497911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Location Privacy Breach: Apps Are Watching You in Background 位置隐私泄露:应用程序在后台监视你
Dachuan Liu, Xing Gao, Haining Wang
Smartphone users can conveniently install a set of apps that provide Location Based Service (LBS) from markets. These LBS-based apps facilitate users in many application scenarios, but they raise concerns on the breach of privacy related to location access. Smartphone users can hardly perceive location access, especially when it happens in background. In comparison to location access in foreground, location access in background could result in more serious privacy breach because it can continuously know a user's locations. In this paper, we study the problem of location access in background, and especially perform the first measurement of this background action on the Google app market. Our investigation demonstrates that many popular apps conduct location access in background within short intervals. This enables these apps to collect a user's location trace, from which the important personal information, Points of Interest (PoIs), can be recognized. We further extract a user's movement pattern from the PoIs, and utilize it to measure the extent of privacy breach. The measurement results also show that using the combination of movement pattern related metrics and the other PoI related metrics can help detect the privacy breach in an earlier manner than using either one of them alone.
智能手机用户可以方便地安装一组应用程序,这些应用程序提供来自市场的基于位置的服务(LBS)。这些基于lbs的应用程序在许多应用场景中为用户提供了便利,但它们也引发了与位置访问相关的隐私泄露问题。智能手机用户几乎无法感知位置访问,尤其是在后台操作时。与前台的位置访问相比,后台的位置访问可能会导致更严重的隐私泄露,因为它可以持续地了解用户的位置。本文主要研究了后台位置访问问题,并在谷歌应用市场上对这一后台行为进行了首次测量。我们的调查表明,许多流行的应用程序在短时间内进行后台位置访问。这使得这些应用程序可以收集用户的位置跟踪,从中识别出重要的个人信息,兴趣点(PoIs)。我们进一步从poi中提取用户的移动模式,并利用它来衡量隐私泄露的程度。测量结果还表明,与单独使用其中任何一个相比,结合使用与移动模式相关的度量和其他PoI相关的度量可以帮助更早地检测到隐私泄露。
{"title":"Location Privacy Breach: Apps Are Watching You in Background","authors":"Dachuan Liu, Xing Gao, Haining Wang","doi":"10.1109/ICDCS.2017.227","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.227","url":null,"abstract":"Smartphone users can conveniently install a set of apps that provide Location Based Service (LBS) from markets. These LBS-based apps facilitate users in many application scenarios, but they raise concerns on the breach of privacy related to location access. Smartphone users can hardly perceive location access, especially when it happens in background. In comparison to location access in foreground, location access in background could result in more serious privacy breach because it can continuously know a user's locations. In this paper, we study the problem of location access in background, and especially perform the first measurement of this background action on the Google app market. Our investigation demonstrates that many popular apps conduct location access in background within short intervals. This enables these apps to collect a user's location trace, from which the important personal information, Points of Interest (PoIs), can be recognized. We further extract a user's movement pattern from the PoIs, and utilize it to measure the extent of privacy breach. The measurement results also show that using the combination of movement pattern related metrics and the other PoI related metrics can help detect the privacy breach in an earlier manner than using either one of them alone.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Location Privacy in Mobile Edge Clouds 移动边缘云中的位置隐私
T. He, E. Ciftcioglu, Shiqiang Wang, Kevin S. Chan
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.
在本文中,我们考虑了移动边缘云(MECs)中的用户位置隐私。mec是部署在网络边缘的小型云,用于提供靠近移动用户的云服务,并且已经提出了许多解决方案,通过迁移服务以跟随其用户来最大化服务局部性。然而,用户与其服务的协同定位意味着网络窃听者观察MEC之间的服务迁移可以将用户定位到一个MEC覆盖区域,这个覆盖区域可能相当小(例如,一个移动基站)。我们考虑使用箔条服务来防御这样的窃听者,重点是控制箔条的策略。假设窃听者执行最大似然(ML)检测,我们考虑模仿用户移动性的启发式策略和旨在最小化检测或跟踪准确性的优化策略。研究表明,当用户的移动足够随机时,由最优策略控制的单个箔条可以使窃听者的跟踪精度趋近于零。通过大量的仿真验证了我们解决方案的有效性。
{"title":"Location Privacy in Mobile Edge Clouds","authors":"T. He, E. Ciftcioglu, Shiqiang Wang, Kevin S. Chan","doi":"10.1109/ICDCS.2017.39","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.39","url":null,"abstract":"In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1