首页 > 最新文献

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels 带开/关通道密钥预分配下无线传感器网络的安全连接
Jun Zhao
Security is an important issue in wireless sensor networks (WSNs), which are often deployed in hostile environments. The q-composite key predistribution scheme has been recognized as a suitable approach to secure WSNs. Although the q-composite scheme has received much attention in the literature, there is still a lack of rigorous analysis for secure WSNs operating under the q-composite scheme in consideration of the unreliability of links. One main difficulty lies in analyzing the network topology whose links are not independent. Wireless links can be unreliable in practice due to the presence of physical barriers between sensors or because of harsh environmental conditions severely impairing communications. In this paper, we resolve the difficult challenge and investigate k-connectivity in secure WSNs operating under the q-composite scheme with unreliable communication links modeled as independent on/off channels, where k-connectivity ensures connectivity despite the failure of any (k - 1) sensors or links, and connectivity means that any two sensors can find a path in between for secure communication. Specifically, we derive the asymptotically exact probability and a zero-one law for k-connectivity. We further use the theoretical results to provide design guidelines for secure WSNs. Experimental results also confirm the validity of our analytical findings.
无线传感器网络通常部署在恶劣环境中,安全是其中的一个重要问题。q-组合密钥预分配方案是一种安全的无线传感器网络方案。虽然q-composite方案在文献中得到了广泛的关注,但是考虑到链路的不可靠性,对于在q-composite方案下工作的安全wsn,目前还缺乏严格的分析。一个主要的难点在于分析链路不独立的网络拓扑结构。由于传感器之间存在物理障碍或恶劣的环境条件严重影响通信,无线链路在实践中可能不可靠。在本文中,我们解决了这一难题,并研究了在不可靠通信链路建模为独立开/关通道的q-复合方案下运行的安全wsn中的k-连通性,其中k-连通性确保了任何(k - 1)传感器或链路失效时的连通性,并且连通性意味着任何两个传感器都可以在两者之间找到安全通信的路径。具体地,我们导出了k-连通性的渐近精确概率和一个0 - 1定律。我们进一步利用理论结果为安全的无线传感器网络提供设计指南。实验结果也证实了分析结果的有效性。
{"title":"Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels","authors":"Jun Zhao","doi":"10.1109/ICDCS.2017.186","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.186","url":null,"abstract":"Security is an important issue in wireless sensor networks (WSNs), which are often deployed in hostile environments. The q-composite key predistribution scheme has been recognized as a suitable approach to secure WSNs. Although the q-composite scheme has received much attention in the literature, there is still a lack of rigorous analysis for secure WSNs operating under the q-composite scheme in consideration of the unreliability of links. One main difficulty lies in analyzing the network topology whose links are not independent. Wireless links can be unreliable in practice due to the presence of physical barriers between sensors or because of harsh environmental conditions severely impairing communications. In this paper, we resolve the difficult challenge and investigate k-connectivity in secure WSNs operating under the q-composite scheme with unreliable communication links modeled as independent on/off channels, where k-connectivity ensures connectivity despite the failure of any (k - 1) sensors or links, and connectivity means that any two sensors can find a path in between for secure communication. Specifically, we derive the asymptotically exact probability and a zero-one law for k-connectivity. We further use the theoretical results to provide design guidelines for secure WSNs. Experimental results also confirm the validity of our analytical findings.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks 多跳认知无线网络中的k保护路由协议
Chin-Jung Liu, Li Xiao
In cognitive radio networks (CRNs), the established communication sessions between secondary users (SUs) may be affected or even get interrupted because the SUs need to relinquish the spectrum when the licensed users (PUs) appear and reclaim the spectrum/channel. On detecting PU activities, the SUs on the affected links either switch to another available idle spectrum using the same link or the SUs seek for an alternative path/link. In either approach, the ongoing session is destined to experience delay or even gets interrupted, which is intolerable to quality of service-sensitive applications such as multimedia streaming or audio/video conferencing. In this paper, we study the problem of establishing k-protected routes in CRNs. A k-protected route consists of a set of main links with preassigned backup spectrum and backup paths and is guaranteed to sustain from k PU appearances without being interrupted. For a CRN, we find a k-protected route for each session request and maximize the number of sessions that can be supported. We propose both centralized and distributed k-protected routing algorithms for this problem. Simulation results show that our k-protected routing protocol outperforms existing opportunistic spectrum switching approaches in terms of delay and interruption rate.
在认知无线电网络(cognitive radio network, crn)中,当授权用户(licensed user)出现时,辅助用户(secondary user)需要放弃频谱,收回频谱/信道,从而可能影响到辅助用户(secondary user)之间已经建立的通信会话,甚至中断会话。在检测到PU活动时,受影响链路上的单元或者使用相同的链路切换到另一个可用的空闲频谱,或者寻找替代路径/链路。在任何一种方法中,正在进行的会话都注定要经历延迟甚至中断,这对于服务质量敏感的应用程序(如多媒体流或音频/视频会议)来说是无法忍受的。本文研究了在crn中建立k保护路由的问题。k保护路由由一组具有预先分配的备份频谱和备份路径的主链路组成,并保证从k个PU出现时持续不中断。对于CRN,我们为每个会话请求找到一条k保护的路由,并最大限度地支持会话数。针对这一问题,我们提出了集中式和分布式k保护路由算法。仿真结果表明,我们的k保护路由协议在延迟和中断率方面优于现有的机会频谱交换方法。
{"title":"k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks","authors":"Chin-Jung Liu, Li Xiao","doi":"10.1109/ICDCS.2017.266","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.266","url":null,"abstract":"In cognitive radio networks (CRNs), the established communication sessions between secondary users (SUs) may be affected or even get interrupted because the SUs need to relinquish the spectrum when the licensed users (PUs) appear and reclaim the spectrum/channel. On detecting PU activities, the SUs on the affected links either switch to another available idle spectrum using the same link or the SUs seek for an alternative path/link. In either approach, the ongoing session is destined to experience delay or even gets interrupted, which is intolerable to quality of service-sensitive applications such as multimedia streaming or audio/video conferencing. In this paper, we study the problem of establishing k-protected routes in CRNs. A k-protected route consists of a set of main links with preassigned backup spectrum and backup paths and is guaranteed to sustain from k PU appearances without being interrupted. For a CRN, we find a k-protected route for each session request and maximize the number of sessions that can be supported. We propose both centralized and distributed k-protected routing algorithms for this problem. Simulation results show that our k-protected routing protocol outperforms existing opportunistic spectrum switching approaches in terms of delay and interruption rate.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Serverless Programming (Function as a Service) 无服务器编程(功能即服务)
Paul C. Castro, Vatche Isahagian, Vinod Muthusamy, Aleksander Slominski
.
{"title":"Serverless Programming (Function as a Service)","authors":"Paul C. Castro, Vatche Isahagian, Vinod Muthusamy, Aleksander Slominski","doi":"10.1109/ICDCS.2017.305","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.305","url":null,"abstract":".","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture HetNets中最大最小公平资源分配:分布式算法和混合架构
Ehsan Aryafar, A. Keshavarz-Haddad, Carlee Joe-Wong, M. Chiang
We study the resource allocation problem in RAN-level integrated HetNets. This emerging HetNets paradigm allows for dynamic traffic splitting across radio access technologies for each client, and then for aggregating the traffic inside the network to improve the overall resource utilization. We focus on the max-min fair service rate allocation across the clients, and study the properties of the optimal solution. Based on the analysis, we design a low complexity distributed algorithm that tries to achieve max-min fairness. We also design a hybrid network architecture that leverages opportunistic centralized network supervision to augment the distributed solution. We analyze the performance of our proposed algorithms and prove their convergence. We also derive conditions under which the outcome is optimal. When the conditions are not satisfied, we provide constant upper and lower bounds on the optimality gap. Finally, we study the convergence time of our distributed solution and show that leveraging appropriate policies in its design significantly reduces the convergence time.
研究了局域网级集成HetNets中的资源分配问题。这种新兴的HetNets范例允许为每个客户端跨无线电接入技术进行动态流量拆分,然后在网络内聚合流量以提高整体资源利用率。重点研究了客户间最大最小公平费率分配问题,并研究了最优解的性质。在此基础上,我们设计了一种低复杂度的分布式算法,力求达到最大最小公平性。我们还设计了一个混合网络架构,利用机会集中式网络监督来增强分布式解决方案。我们分析了我们提出的算法的性能并证明了它们的收敛性。我们还推导出结果最优的条件。当条件不满足时,给出了最优性间隙的常数上界和下界。最后,我们研究了分布式解决方案的收敛时间,并表明在其设计中使用适当的策略可以显着减少收敛时间。
{"title":"Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture","authors":"Ehsan Aryafar, A. Keshavarz-Haddad, Carlee Joe-Wong, M. Chiang","doi":"10.1109/ICDCS.2017.205","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.205","url":null,"abstract":"We study the resource allocation problem in RAN-level integrated HetNets. This emerging HetNets paradigm allows for dynamic traffic splitting across radio access technologies for each client, and then for aggregating the traffic inside the network to improve the overall resource utilization. We focus on the max-min fair service rate allocation across the clients, and study the properties of the optimal solution. Based on the analysis, we design a low complexity distributed algorithm that tries to achieve max-min fairness. We also design a hybrid network architecture that leverages opportunistic centralized network supervision to augment the distributed solution. We analyze the performance of our proposed algorithms and prove their convergence. We also derive conditions under which the outcome is optimal. When the conditions are not satisfied, we provide constant upper and lower bounds on the optimality gap. Finally, we study the convergence time of our distributed solution and show that leveraging appropriate policies in its design significantly reduces the convergence time.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs 多级关联图的群差分隐私保护披露
Balaji Palanisamy, C. Li, P. Krishnamurthy
Traditional privacy-preserving data disclosure solutions have focused on protecting the privacy of individual's information with the assumption that all aggregate (statistical) information about individuals is safe for disclosure. Such schemes fail to support group privacy where aggregate information about a group of individuals may also be sensitive and users of the published data may have different levels of access privileges entitled to them. We propose the notion of Eg-Group Differential Privacy that protects sensitive information of groups of individuals at various defined privacy levels, enabling data users to obtain the level of access entitled to them. We present a preliminary evaluation of the proposed notion of group privacy through experiments on real association graph data that demonstrate the guarantees on group privacy on the disclosed data.
传统的保护隐私的数据披露解决方案侧重于保护个人信息的隐私,并假设有关个人的所有汇总(统计)信息都可以安全披露。此类方案无法支持群体隐私,因为关于一组个人的汇总信息也可能是敏感的,并且发布数据的用户可能具有不同级别的访问权限。我们提出了egg - group Differential Privacy的概念,该概念在不同定义的隐私级别上保护个人群体的敏感信息,使数据用户能够获得有权访问的级别。通过对真实关联图数据的实验,我们对所提出的群体隐私概念进行了初步评估,证明了对公开数据的群体隐私保证。
{"title":"Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs","authors":"Balaji Palanisamy, C. Li, P. Krishnamurthy","doi":"10.1109/ICDCS.2017.223","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.223","url":null,"abstract":"Traditional privacy-preserving data disclosure solutions have focused on protecting the privacy of individual's information with the assumption that all aggregate (statistical) information about individuals is safe for disclosure. Such schemes fail to support group privacy where aggregate information about a group of individuals may also be sensitive and users of the published data may have different levels of access privileges entitled to them. We propose the notion of Eg-Group Differential Privacy that protects sensitive information of groups of individuals at various defined privacy levels, enabling data users to obtain the level of access entitled to them. We present a preliminary evaluation of the proposed notion of group privacy through experiments on real association graph data that demonstrate the guarantees on group privacy on the disclosed data.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch WearLock:使用智能手表通过声学解锁手机
Shanhe Yi, Zhengrui Qin, Nancy Carter, Qun A. Li
Smartphone lock screens are implemented to reduce the risk of data loss or compromise given the fact that increasing amount of person data are accessible on smartphones nowadays. Unfortunately, many smartphone users abandon lock screens due to the inconvenience of unlocking their phones many times a day. With the wide adoption of wearables, token-based approaches have gained popularity in simplifying unlocking and retaining security at the same time. To this end, we propose to take advantage of the smartwatch for easy smartphone unlocking. In this paper, we have designed WearLock, a system that uses acoustic tones as tokens to automate the unlocking securely. We build a sub-channel selection and an adaptive modulation in the acoustic modem to maximize unlocking success rate against ambient noise only when those two devices are nearby. We leverage the motion sensor on the smartwatch to reduce the unlock frequency. We offload smartwatch tasks to the smartphone to speed up computation and save energy. We have implemented the WearLock prototype and conducted extensive evaluations. Results achieved a low average bit error rate (BER) as 8% in various experiments. Compared to traditional manual personal identification numbers (PINs) entry, WearLock achieves at least 18% unlock speedup without any manual effort.
智能手机锁屏是为了减少数据丢失或泄露的风险,因为现在越来越多的个人数据可以在智能手机上访问。不幸的是,许多智能手机用户因为一天要解锁很多次而放弃了锁屏。随着可穿戴设备的广泛采用,基于令牌的方法在简化解锁和同时保持安全性方面越来越受欢迎。为此,我们建议利用智能手表轻松解锁智能手机。在本文中,我们设计了WearLock,这是一个使用声音作为令牌来自动安全地解锁的系统。我们在声学调制解调器中构建了子通道选择和自适应调制,仅当这两个设备附近时,才能最大限度地提高对环境噪声的解锁成功率。我们利用智能手表上的运动传感器来减少解锁频率。我们将智能手表的任务转移到智能手机上,以加快计算速度并节省能源。我们已经实现了WearLock原型并进行了广泛的评估。实验结果表明,该系统的平均误码率(BER)在8%以下。与传统的手动个人识别号码(pin)输入相比,WearLock无需任何手动操作即可实现至少18%的解锁速度。
{"title":"WearLock: Unlocking Your Phone via Acoustics Using Smartwatch","authors":"Shanhe Yi, Zhengrui Qin, Nancy Carter, Qun A. Li","doi":"10.1109/ICDCS.2017.183","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.183","url":null,"abstract":"Smartphone lock screens are implemented to reduce the risk of data loss or compromise given the fact that increasing amount of person data are accessible on smartphones nowadays. Unfortunately, many smartphone users abandon lock screens due to the inconvenience of unlocking their phones many times a day. With the wide adoption of wearables, token-based approaches have gained popularity in simplifying unlocking and retaining security at the same time. To this end, we propose to take advantage of the smartwatch for easy smartphone unlocking. In this paper, we have designed WearLock, a system that uses acoustic tones as tokens to automate the unlocking securely. We build a sub-channel selection and an adaptive modulation in the acoustic modem to maximize unlocking success rate against ambient noise only when those two devices are nearby. We leverage the motion sensor on the smartwatch to reduce the unlock frequency. We offload smartwatch tasks to the smartphone to speed up computation and save energy. We have implemented the WearLock prototype and conducted extensive evaluations. Results achieved a low average bit error rate (BER) as 8% in various experiments. Compared to traditional manual personal identification numbers (PINs) entry, WearLock achieves at least 18% unlock speedup without any manual effort.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations 波动下基于主题的发布/订阅系统的可扩展路由
V. Turau, Gerry Siegemund
The loose coupling and the inherent scalability make publish/subscribe systems an ideal candidate for event-driven services for wireless networks using low power protocols such as IEEE 802.15.4. This work introduces a distributed algorithm to build and maintain a routing structure for such networks. The algorithm dynamically maintains a multicast tree for each node. While previous work focused on minimizing these trees we aim to keep the effort to maintain them in case of fluctuations of subscribers low. The multicast trees are implicitly defined by a novel structure called augmented virtual ring. The main contribution is a distributed algorithm to build and maintain this augmented virtual ring. Maintenance operations after sub-and unsubscriptions require message exchange in a limited region only. We compare the average lengths of the constructedforwarding paths with an almost ideal approach. As a resultof independent interest we present a distributed algorithm using messages of size O(logn) for constructing virtual rings of graphs that are on average shorter than rings based on depth first search.
松耦合和固有的可伸缩性使发布/订阅系统成为使用低功耗协议(如IEEE 802.15.4)的无线网络的事件驱动服务的理想候选者。本文介绍了一种分布式算法来构建和维护这种网络的路由结构。该算法为每个节点动态维护一棵组播树。虽然以前的工作侧重于最小化这些树,但我们的目标是在订阅者波动较低的情况下保持它们。多播树是由一种叫做增广虚环的新结构隐式定义的。主要贡献是一个分布式算法来构建和维护这个增强的虚拟环。订阅和退订后的维护操作只需要在有限的区域内交换消息。我们将构建的转发路径的平均长度与几乎理想的方法进行比较。作为独立兴趣的结果,我们提出了一种使用大小为O(logn)的消息的分布式算法,用于构建平均比基于深度优先搜索的环短的图的虚拟环。
{"title":"Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations","authors":"V. Turau, Gerry Siegemund","doi":"10.1109/ICDCS.2017.27","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.27","url":null,"abstract":"The loose coupling and the inherent scalability make publish/subscribe systems an ideal candidate for event-driven services for wireless networks using low power protocols such as IEEE 802.15.4. This work introduces a distributed algorithm to build and maintain a routing structure for such networks. The algorithm dynamically maintains a multicast tree for each node. While previous work focused on minimizing these trees we aim to keep the effort to maintain them in case of fluctuations of subscribers low. The multicast trees are implicitly defined by a novel structure called augmented virtual ring. The main contribution is a distributed algorithm to build and maintain this augmented virtual ring. Maintenance operations after sub-and unsubscriptions require message exchange in a limited region only. We compare the average lengths of the constructedforwarding paths with an almost ideal approach. As a resultof independent interest we present a distributed algorithm using messages of size O(logn) for constructing virtual rings of graphs that are on average shorter than rings based on depth first search.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121533900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Private, Yet Practical, Multiparty Deep Learning 私人,但实用,多方深度学习
Xinyang Zhang, S. Ji, Hui Wang, Ting Wang
In this paper, we consider the problem of multiparty deep learning (MDL), wherein autonomous data owners jointly train accurate deep neural network models without sharing their private data. We design, implement, and evaluate ∝MDL, a new MDL paradigm built upon three primitives: asynchronous optimization, lightweight homomorphic encryption, and threshold secret sharing. Compared with prior work, ∝MDL departs in significant ways: a) besides providing explicit privacy guarantee, it retains desirable model utility, which is paramount for accuracy-critical domains; b) it provides an intuitive handle for the operator to gracefully balance model utility and training efficiency; c) moreover, it supports delicate control over communication and computational costs by offering two variants, operating under loose and tight coordination respectively, thus optimizable for given system settings (e.g., limited versus sufficient network bandwidth). Through extensive empirical evaluation using benchmark datasets and deep learning architectures, we demonstrate the efficacy of ∝MDL.
在本文中,我们考虑了多方深度学习(MDL)问题,其中自主数据所有者在不共享其私有数据的情况下共同训练精确的深度神经网络模型。我们设计、实现和评估了∝MDL,这是一种新的MDL范式,建立在三个基本要素之上:异步优化、轻量级同态加密和阈值秘密共享。与先前的工作相比,∝MDL在以下方面有显著的不同:a)除了提供明确的隐私保证外,它保留了理想的模型效用,这对于精度关键领域至关重要;B)为操作者提供了一个直观的手柄,可以很好地平衡模型的实用性和训练效率;C)此外,它通过提供两种变体来支持对通信和计算成本的精细控制,分别在松散和紧密的协调下运行,因此可以针对给定的系统设置进行优化(例如,有限的网络带宽与足够的网络带宽)。通过使用基准数据集和深度学习架构进行广泛的实证评估,我们证明了∝MDL的有效性。
{"title":"Private, Yet Practical, Multiparty Deep Learning","authors":"Xinyang Zhang, S. Ji, Hui Wang, Ting Wang","doi":"10.1109/ICDCS.2017.215","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.215","url":null,"abstract":"In this paper, we consider the problem of multiparty deep learning (MDL), wherein autonomous data owners jointly train accurate deep neural network models without sharing their private data. We design, implement, and evaluate ∝MDL, a new MDL paradigm built upon three primitives: asynchronous optimization, lightweight homomorphic encryption, and threshold secret sharing. Compared with prior work, ∝MDL departs in significant ways: a) besides providing explicit privacy guarantee, it retains desirable model utility, which is paramount for accuracy-critical domains; b) it provides an intuitive handle for the operator to gracefully balance model utility and training efficiency; c) moreover, it supports delicate control over communication and computational costs by offering two variants, operating under loose and tight coordination respectively, thus optimizable for given system settings (e.g., limited versus sufficient network bandwidth). Through extensive empirical evaluation using benchmark datasets and deep learning architectures, we demonstrate the efficacy of ∝MDL.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems DeepOpp:地铁系统社交媒体内容的上下文感知移动访问
Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, J. Mccann, A. Regan
Accessing online social media content on underground metro systems is a challenge due to the fact that passengers often lose connectivity for large parts of their commute. As the oldest metro system in the world, the London underground represents a typical transportation network with intermittent Internet connectivity. To deal with disruption in connectivity along the sub-surface and deep-level underground lines on the London underground, we have designed a context-aware mobile system called DeepOpp that enables efficient offline access to online social media by prefetching and caching content opportunistically when signal availability is detected. DeepOpp can measure, crowdsource and predict signal characteristics such as strength, bandwidth and latency; it can use these predictions of mobile network signal to activate prefetching, and then employ an optimization routine to determine which social content should be cached in the system given real-time network conditions and device capacities. DeepOpp has been implemented as an Android application and tested on the London Underground; it shows significant improvement over existing approaches, e.g. reducing the amount of power needed to prefetch social media items by 2.5 times. While we use the London Underground to test our system, it is equally applicable in New York, Paris, Madrid, Shanghai, or any other urban underground metro system, or indeed in any situation in which users experience long breaks in connectivity.
在地铁系统上访问在线社交媒体内容是一个挑战,因为乘客经常在通勤的大部分时间里失去网络连接。作为世界上最古老的地铁系统,伦敦地铁代表了一个典型的间歇性互联网连接的交通网络。为了应对伦敦地铁地下和地下深层线路的连接中断,我们设计了一种名为DeepOpp的环境感知移动系统,当检测到信号可用时,它可以通过预取和缓存内容来实现对在线社交媒体的高效离线访问。DeepOpp可以测量、众包和预测信号特性,如强度、带宽和延迟;它可以使用这些移动网络信号的预测来激活预取,然后使用优化例程来确定在给定实时网络条件和设备容量的情况下,应该在系统中缓存哪些社会内容。DeepOpp已经作为Android应用程序实现,并在伦敦地铁上进行了测试;它比现有的方法有了显著的改进,例如,将预取社交媒体项目所需的电量减少了2.5倍。虽然我们使用伦敦地铁来测试我们的系统,但它同样适用于纽约、巴黎、马德里、上海或任何其他城市的地铁系统,或者用户经历长时间连接中断的任何情况。
{"title":"DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems","authors":"Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, J. Mccann, A. Regan","doi":"10.1109/ICDCS.2017.269","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.269","url":null,"abstract":"Accessing online social media content on underground metro systems is a challenge due to the fact that passengers often lose connectivity for large parts of their commute. As the oldest metro system in the world, the London underground represents a typical transportation network with intermittent Internet connectivity. To deal with disruption in connectivity along the sub-surface and deep-level underground lines on the London underground, we have designed a context-aware mobile system called DeepOpp that enables efficient offline access to online social media by prefetching and caching content opportunistically when signal availability is detected. DeepOpp can measure, crowdsource and predict signal characteristics such as strength, bandwidth and latency; it can use these predictions of mobile network signal to activate prefetching, and then employ an optimization routine to determine which social content should be cached in the system given real-time network conditions and device capacities. DeepOpp has been implemented as an Android application and tested on the London Underground; it shows significant improvement over existing approaches, e.g. reducing the amount of power needed to prefetch social media items by 2.5 times. While we use the London Underground to test our system, it is equally applicable in New York, Paris, Madrid, Shanghai, or any other urban underground metro system, or indeed in any situation in which users experience long breaks in connectivity.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud DCM:在云中扩展n层应用程序的动态并发管理
Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong
Scaling web applications such as e-commerce in cloud by adding or removing servers in the system is an important practice to handle workload variations, with the goal of achieving both high quality of service (QoS) and high resource efficiency. Through extensive scaling experiments of an n-tier application benchmark (RUBBoS), we have observed that scaling only hardware resources without appropriate adaptation of soft resource allocations (e.g., thread or connection pool size) of each server would cause significant performance degradation of the overall system by either under- or over-utilizing the bottleneck resource in the system. We develop a dynamic concurrency management (DCM) framework which integrates soft resource allocations into the system scaling management. DCM introduces a model which determines a near-optimal concurrency setting to each tier of the system based on a combination of operational queuing laws and online analysis of fine-grained measurement data. We implement DCM as a two-level actuator which scales both hardware and soft resources in an n-tier system on the fly without interrupting the runtime system performance. Our experimental results demonstrate that DCM can achieve significantly more stable performance and higher resource efficiency compared to the state-of-the-art hardware-only scaling solutions (e.g., Amazon EC2-AutoScale) under realistic bursty workload traces.
通过在系统中添加或删除服务器来扩展web应用程序(如云中的电子商务)是处理工作负载变化的重要实践,其目标是实现高质量的服务(QoS)和高资源效率。通过n层应用程序基准(RUBBoS)的广泛扩展实验,我们观察到,仅扩展硬件资源而不适当地适应每个服务器的软资源分配(例如,线程或连接池大小)将导致系统中瓶颈资源的不足或过度利用,从而导致整个系统的显著性能下降。我们开发了一个动态并发管理(DCM)框架,将软资源分配集成到系统扩展管理中。DCM引入了一个模型,该模型基于操作排队法则和对细粒度测量数据的在线分析相结合,为系统的每一层确定近乎最佳的并发设置。我们将DCM作为一个两级执行器来实现,它在不中断运行时系统性能的情况下动态地扩展n层系统中的硬件和软资源。我们的实验结果表明,在实际的突发工作负载跟踪下,与最先进的纯硬件扩展解决方案(例如Amazon EC2-AutoScale)相比,DCM可以实现更稳定的性能和更高的资源效率。
{"title":"DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud","authors":"Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong","doi":"10.1109/ICDCS.2017.22","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.22","url":null,"abstract":"Scaling web applications such as e-commerce in cloud by adding or removing servers in the system is an important practice to handle workload variations, with the goal of achieving both high quality of service (QoS) and high resource efficiency. Through extensive scaling experiments of an n-tier application benchmark (RUBBoS), we have observed that scaling only hardware resources without appropriate adaptation of soft resource allocations (e.g., thread or connection pool size) of each server would cause significant performance degradation of the overall system by either under- or over-utilizing the bottleneck resource in the system. We develop a dynamic concurrency management (DCM) framework which integrates soft resource allocations into the system scaling management. DCM introduces a model which determines a near-optimal concurrency setting to each tier of the system based on a combination of operational queuing laws and online analysis of fine-grained measurement data. We implement DCM as a two-level actuator which scales both hardware and soft resources in an n-tier system on the fly without interrupting the runtime system performance. Our experimental results demonstrate that DCM can achieve significantly more stable performance and higher resource efficiency compared to the state-of-the-art hardware-only scaling solutions (e.g., Amazon EC2-AutoScale) under realistic bursty workload traces.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1