首页 > 最新文献

2015 IEEE 35th International Conference on Distributed Computing Systems最新文献

英文 中文
RStore: A Direct-Access DRAM-based Data Store RStore:直接访问的基于dram的数据存储
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.74
A. Trivedi, Patrick Stuedi, B. Metzler, Clemens Lutz, M. Schmatz, T. Gross
Distributed DRAM stores have become an attractive option for providing fast data accesses to analytics applications. To accelerate the performance of these stores, researchers have proposed using RDMA technology. RDMA offers high bandwidth and low latency data access by carefully separating resource setup from IO operations, and making IO operations fast by using rich network semantics and offloading. Despite recent interest, leveraging the full potential of RDMA in a distributed environment remains a challenging task. In this paper, we present RDMA Store or RStore, a DRAM-based data store that delivers high performance by extending RDMA's separation philosophy to a distributed setting. RStore achieves high aggregate bandwidth (705 Gb/s) and close-to-hardware latency on our 12-machine testbed. We developed a distributed graph processing framework and a Key-Value sorter using RStore's unique memory-like API. The graph processing framework, which relies on RStore for low-latency graph access, outperforms state-of-the-art systems by margins of 2.6 -- 4.2× when calculating Page Rank. The Key-Value sorter can sort 256 GB of data in 31.7 sec, which is 8× better than Hadoop TeraSort in a similar setting.
分布式DRAM存储已经成为为分析应用程序提供快速数据访问的一个有吸引力的选择。为了加速这些存储的性能,研究人员提出使用RDMA技术。RDMA通过仔细地将资源设置与IO操作分离,并通过使用丰富的网络语义和卸载使IO操作快速,从而提供高带宽和低延迟的数据访问。尽管最近有兴趣,但在分布式环境中充分利用RDMA的潜力仍然是一项具有挑战性的任务。在本文中,我们介绍了RDMA Store或RStore,这是一种基于dram的数据存储,通过将RDMA的分离哲学扩展到分布式设置来提供高性能。RStore在我们的12台机器测试台上实现了高聚合带宽(705 Gb/s)和接近硬件的延迟。我们使用RStore独特的类似内存的API开发了一个分布式图形处理框架和一个键值排序器。图处理框架依赖于RStore进行低延迟图访问,在计算页面排名时,它比最先进的系统高出2.6 - 4.2倍。Key-Value排序器可以在31.7秒内对256 GB的数据进行排序,在类似的设置下,这比Hadoop TeraSort要好8倍。
{"title":"RStore: A Direct-Access DRAM-based Data Store","authors":"A. Trivedi, Patrick Stuedi, B. Metzler, Clemens Lutz, M. Schmatz, T. Gross","doi":"10.1109/ICDCS.2015.74","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.74","url":null,"abstract":"Distributed DRAM stores have become an attractive option for providing fast data accesses to analytics applications. To accelerate the performance of these stores, researchers have proposed using RDMA technology. RDMA offers high bandwidth and low latency data access by carefully separating resource setup from IO operations, and making IO operations fast by using rich network semantics and offloading. Despite recent interest, leveraging the full potential of RDMA in a distributed environment remains a challenging task. In this paper, we present RDMA Store or RStore, a DRAM-based data store that delivers high performance by extending RDMA's separation philosophy to a distributed setting. RStore achieves high aggregate bandwidth (705 Gb/s) and close-to-hardware latency on our 12-machine testbed. We developed a distributed graph processing framework and a Key-Value sorter using RStore's unique memory-like API. The graph processing framework, which relies on RStore for low-latency graph access, outperforms state-of-the-art systems by margins of 2.6 -- 4.2× when calculating Page Rank. The Key-Value sorter can sort 256 GB of data in 31.7 sec, which is 8× better than Hadoop TeraSort in a similar setting.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy Preserving String Matching for Cloud Computing 云计算中的隐私保护字符串匹配
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.68
Bruhadeshwar Bezawada, A. Liu, Bargav Jayaraman, Ann L. Wang, Rui Li
Cloud computing has become indispensable in providing highly reliable data services to users. But, there are major concerns about the privacy of the data stored on cloud servers. While encryption of data provides sufficient protection, it is challenging to support rich querying functionality, such as string matching, over the encrypted data. In this work, we present the first ever symmetric key based approach to support privacy preserving string matching in cloud computing. We describe an efficient and accurate indexing structure, the PASS tree, which can execute a string pattern query in logarithmic time complexity over a set of data items. The PASS tree provides strong privacy guarantees against attacks from a semi-honest adversary. We have comprehensively evaluated our scheme over large real-life data, such as Wikipedia and Enron documents, containing up to 100000 keywords, and show that our algorithms achieve pattern search in less than a few milliseconds with 100% accuracy. Furthermore, we also describe a relevance ranking algorithm to return the most relevant documents to the user based on the pattern query. Our ranking algorithm achieves 90%+ above precision in ranking the returned documents.
云计算已经成为向用户提供高可靠性数据服务不可或缺的手段。但是,人们对存储在云服务器上的数据的隐私有很大的担忧。虽然数据加密提供了足够的保护,但在加密数据上支持丰富的查询功能(如字符串匹配)是一项挑战。在这项工作中,我们提出了有史以来第一个基于对称密钥的方法来支持云计算中保护隐私的字符串匹配。我们描述了一种高效而准确的索引结构,PASS树,它可以在一组数据项上以对数时间复杂度执行字符串模式查询。PASS树提供了强大的隐私保证,防止来自半诚实对手的攻击。我们在包含多达100000个关键字的大型现实数据(如Wikipedia和Enron文档)上全面评估了我们的方案,并表明我们的算法在不到几毫秒的时间内以100%的准确率实现了模式搜索。此外,我们还描述了一种基于模式查询将最相关的文档返回给用户的相关性排序算法。我们的排序算法在对返回的文档进行排序时达到90%以上的精度。
{"title":"Privacy Preserving String Matching for Cloud Computing","authors":"Bruhadeshwar Bezawada, A. Liu, Bargav Jayaraman, Ann L. Wang, Rui Li","doi":"10.1109/ICDCS.2015.68","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.68","url":null,"abstract":"Cloud computing has become indispensable in providing highly reliable data services to users. But, there are major concerns about the privacy of the data stored on cloud servers. While encryption of data provides sufficient protection, it is challenging to support rich querying functionality, such as string matching, over the encrypted data. In this work, we present the first ever symmetric key based approach to support privacy preserving string matching in cloud computing. We describe an efficient and accurate indexing structure, the PASS tree, which can execute a string pattern query in logarithmic time complexity over a set of data items. The PASS tree provides strong privacy guarantees against attacks from a semi-honest adversary. We have comprehensively evaluated our scheme over large real-life data, such as Wikipedia and Enron documents, containing up to 100000 keywords, and show that our algorithms achieve pattern search in less than a few milliseconds with 100% accuracy. Furthermore, we also describe a relevance ranking algorithm to return the most relevant documents to the user based on the pattern query. Our ranking algorithm achieves 90%+ above precision in ranking the returned documents.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
An Online Method for Minimizing Network Monitoring Overhead 最小化网络监控开销的在线方法
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.35
S. Silvestri, Rahul Urgaonkar, M. Zafer, B. J. Ko
Network monitoring is an essential component of network operation and, as the network size increases, it usually generates a significant overhead in large scale networks such as sensor and data center networks. In this paper, we show that measurement correlation often exhibited in real networks can be successfully exploited to reduce the network monitoring overhead. In particular, we propose an online adaptive measurement technique with which a subset of nodes are dynamically chosen as monitors while the measurements of the remaining nodes are estimated using the computed correlations. We propose an estimation framework based on jointly Gaussian distributed random variables, and formulate an optimization problem to select the monitors which minimize the estimation error under a total cost constraint. We show that the problem is NP-Hard and propose three efficient heuristics. In order to apply our framework to real-world networks, in which measurement distribution and correlation may significantly change over time, we also develop a learning based approach that automatically switches between learning and estimation phases using a change detection algorithm. Simulations carried out on two real traces from sensor networks and data centers show that our algorithms outperforms previous solutions based on compressed sensing and it is able to reduce the monitoring overhead by 50% while incurring a low estimation error. The results further demonstrate that applying the change detection algorithm reduces the estimation error up to two orders of magnitude.
网络监控是网络运行的重要组成部分,随着网络规模的增加,它通常会在传感器和数据中心网络等大规模网络中产生显著的开销。在本文中,我们证明了可以成功地利用实际网络中经常出现的测量相关性来减少网络监控开销。特别是,我们提出了一种在线自适应测量技术,其中动态选择节点子集作为监视器,同时使用计算出的相关性估计剩余节点的测量值。提出了一种基于联合高斯分布随机变量的估计框架,并提出了在总成本约束下选择估计误差最小的监测对象的优化问题。我们证明了这个问题是np困难的,并提出了三种有效的启发式方法。为了将我们的框架应用到现实世界的网络中,其中测量分布和相关性可能随着时间的推移而显著变化,我们还开发了一种基于学习的方法,该方法使用变化检测算法在学习和估计阶段之间自动切换。在传感器网络和数据中心的两条真实轨迹上进行的仿真表明,我们的算法优于以前基于压缩感知的解决方案,并且能够在产生低估计误差的同时将监控开销减少50%。结果进一步表明,应用变化检测算法可将估计误差降低两个数量级。
{"title":"An Online Method for Minimizing Network Monitoring Overhead","authors":"S. Silvestri, Rahul Urgaonkar, M. Zafer, B. J. Ko","doi":"10.1109/ICDCS.2015.35","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.35","url":null,"abstract":"Network monitoring is an essential component of network operation and, as the network size increases, it usually generates a significant overhead in large scale networks such as sensor and data center networks. In this paper, we show that measurement correlation often exhibited in real networks can be successfully exploited to reduce the network monitoring overhead. In particular, we propose an online adaptive measurement technique with which a subset of nodes are dynamically chosen as monitors while the measurements of the remaining nodes are estimated using the computed correlations. We propose an estimation framework based on jointly Gaussian distributed random variables, and formulate an optimization problem to select the monitors which minimize the estimation error under a total cost constraint. We show that the problem is NP-Hard and propose three efficient heuristics. In order to apply our framework to real-world networks, in which measurement distribution and correlation may significantly change over time, we also develop a learning based approach that automatically switches between learning and estimation phases using a change detection algorithm. Simulations carried out on two real traces from sensor networks and data centers show that our algorithms outperforms previous solutions based on compressed sensing and it is able to reduce the monitoring overhead by 50% while incurring a low estimation error. The results further demonstrate that applying the change detection algorithm reduces the estimation error up to two orders of magnitude.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132800330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Competitive Strategies for Online Cloud Resource Allocation with Discounts: The 2-Dimensional Parking Permit Problem 考虑折扣的在线云资源分配竞争策略:二维停车许可证问题
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.18
Xinhui Hu, Arne Ludwig, A. Richa, S. Schmid
Cloud computing heralded an era where resources can be scaled up and down elastically and in an online manner. This paper initiates the study of cost-effective cloud resource allocation algorithms under price discounts, using a competitive analysis approach. We show that for a single resource, the online resource renting problem can be seen as a 2-dimensional variant of the classic online parking permit problem, and we formally introduce the PPP2 problem accordingly. Our main contribution is an online algorithm for PPP2 which achieves a deterministic competitive ratio of k (under a certain set of assumptions), where k is the number of resource bundles. This is almost optimal, as we also prove a lower bound of k/3 for any deterministic online algorithm. Our online algorithm makes use of an optimal offline algorithm, which may be of independent interest since it is the first optimal offline algorithm for the 1D and 2D versions of the parking permit problem. Finally, we show that our algorithms and results also generalize to multiple resources (i.e., Multi-dimensional parking permit problems).
云计算预示着一个时代的到来,在这个时代,资源可以以在线的方式弹性地伸缩。本文采用竞争分析方法,研究了价格折扣条件下具有成本效益的云资源分配算法。我们证明,对于单个资源,在线资源租赁问题可以看作是经典在线停车许可证问题的二维变体,并相应地正式引入PPP2问题。我们的主要贡献是PPP2的在线算法,它实现了k的确定性竞争比(在一组特定的假设下),其中k是资源束的数量。这几乎是最优的,因为我们也证明了任何确定性在线算法的k/3的下界。我们的在线算法使用了最优离线算法,这可能是独立的兴趣,因为它是停车许可证问题的一维和二维版本的第一个最优离线算法。最后,我们证明了我们的算法和结果也可以推广到多个资源(即多维停车许可证问题)。
{"title":"Competitive Strategies for Online Cloud Resource Allocation with Discounts: The 2-Dimensional Parking Permit Problem","authors":"Xinhui Hu, Arne Ludwig, A. Richa, S. Schmid","doi":"10.1109/ICDCS.2015.18","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.18","url":null,"abstract":"Cloud computing heralded an era where resources can be scaled up and down elastically and in an online manner. This paper initiates the study of cost-effective cloud resource allocation algorithms under price discounts, using a competitive analysis approach. We show that for a single resource, the online resource renting problem can be seen as a 2-dimensional variant of the classic online parking permit problem, and we formally introduce the PPP2 problem accordingly. Our main contribution is an online algorithm for PPP2 which achieves a deterministic competitive ratio of k (under a certain set of assumptions), where k is the number of resource bundles. This is almost optimal, as we also prove a lower bound of k/3 for any deterministic online algorithm. Our online algorithm makes use of an optimal offline algorithm, which may be of independent interest since it is the first optimal offline algorithm for the 1D and 2D versions of the parking permit problem. Finally, we show that our algorithms and results also generalize to multiple resources (i.e., Multi-dimensional parking permit problems).","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Structured Encryption with Non-interactive Updates and Parallel Traversal 具有非交互式更新和并行遍历的结构化加密
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.104
Russell W. F. Lai, Sherman S. M. Chow
Searchable Symmetric Encryption (SSE) encrypts data in such a way that they can be searched efficiently. Some recent SSE schemes allow modification of data, yet they may incur storage overhead to support parallelism in searching, or additional computation to minimize the potential leakage incurred by the update, both penalize the performance. Moreover, most of them consider only keyword search and not applicable to arbitrary structured data. In this work, we propose the first parallel and dynamic symmetric-key structured encryption, which supports query of encrypted data structure. Our scheme leverages the rather simple randomized binary search tree to achieve non-interactive queries and updates.
可搜索对称加密(SSE)以一种可以有效搜索的方式对数据进行加密。一些最近的SSE方案允许修改数据,但是它们可能会产生存储开销以支持搜索中的并行性,或者额外的计算以最小化更新引起的潜在泄漏,这两者都会影响性能。此外,它们大多只考虑关键字搜索,不适用于任意结构化数据。在这项工作中,我们提出了第一个并行和动态对称密钥结构化加密,它支持对加密数据结构的查询。我们的方案利用相当简单的随机二叉搜索树来实现非交互式查询和更新。
{"title":"Structured Encryption with Non-interactive Updates and Parallel Traversal","authors":"Russell W. F. Lai, Sherman S. M. Chow","doi":"10.1109/ICDCS.2015.104","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.104","url":null,"abstract":"Searchable Symmetric Encryption (SSE) encrypts data in such a way that they can be searched efficiently. Some recent SSE schemes allow modification of data, yet they may incur storage overhead to support parallelism in searching, or additional computation to minimize the potential leakage incurred by the update, both penalize the performance. Moreover, most of them consider only keyword search and not applicable to arbitrary structured data. In this work, we propose the first parallel and dynamic symmetric-key structured encryption, which supports query of encrypted data structure. Our scheme leverages the rather simple randomized binary search tree to achieve non-interactive queries and updates.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
UStore: A Low Cost Cold and Archival Data Storage System for Data Centers UStore:面向数据中心的低成本冷归档数据存储系统
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.51
Quanlu Zhang, Yafei Dai, Fengqian Li, Lintao Zhang
Recent trend in cloud computing demands vast and ever increasing storage capacity for data centers. For many cloud service providers, much of the storage capacity demand is driven by cold and archival data, such as user uploaded contents, system logs, and backups. In this paper, we describe UStore, a hard disk based storage system designed for such workloads. We make the assumption that most data centers are already populated with computer servers and networking gears, and propose a solution to attach additional disks to these servers reliably at extremely low cost. The main component of UStore is a novel fat tree interconnect fabric to connect hard disks to existing servers and network infrastructure. To reduce cost, UStore leverages the mature commodity USB 3.0 technology to build the fabric, which has extremely low amortized cost per disk while still providing sufficient throughput to satisfy cold and archival workload. The software of the UStore system abstracts the system's physical topology and provides a consistent view of the storage capacity to the upper layer services such as distributed file systems or backup services. In a sense, UStore can be regarded as external USB hard disks designed for data centers.
云计算的最新趋势要求数据中心拥有巨大且不断增长的存储容量。对于许多云服务提供商来说,大部分存储容量需求是由冷数据和归档数据驱动的,例如用户上传的内容、系统日志和备份。在本文中,我们描述了UStore,一个基于硬盘的存储系统,专为这种工作负载设计。我们假设大多数数据中心已经配备了计算机服务器和网络设备,并提出一种解决方案,以极低的成本将额外的磁盘可靠地附加到这些服务器上。UStore的主要组成部分是一种新颖的胖树互连结构,将硬盘与现有的服务器和网络基础设施连接起来。为了降低成本,UStore利用成熟的商用USB 3.0技术来构建fabric,每个磁盘的摊销成本极低,同时仍然提供足够的吞吐量来满足冷和存档工作负载。UStore系统软件对系统的物理拓扑进行抽象,为上层业务(如分布式文件系统、备份业务)提供一致的存储容量视图。从某种意义上说,UStore可以看作是为数据中心设计的外置USB硬盘。
{"title":"UStore: A Low Cost Cold and Archival Data Storage System for Data Centers","authors":"Quanlu Zhang, Yafei Dai, Fengqian Li, Lintao Zhang","doi":"10.1109/ICDCS.2015.51","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.51","url":null,"abstract":"Recent trend in cloud computing demands vast and ever increasing storage capacity for data centers. For many cloud service providers, much of the storage capacity demand is driven by cold and archival data, such as user uploaded contents, system logs, and backups. In this paper, we describe UStore, a hard disk based storage system designed for such workloads. We make the assumption that most data centers are already populated with computer servers and networking gears, and propose a solution to attach additional disks to these servers reliably at extremely low cost. The main component of UStore is a novel fat tree interconnect fabric to connect hard disks to existing servers and network infrastructure. To reduce cost, UStore leverages the mature commodity USB 3.0 technology to build the fabric, which has extremely low amortized cost per disk while still providing sufficient throughput to satisfy cold and archival workload. The software of the UStore system abstracts the system's physical topology and provides a consistent view of the storage capacity to the upper layer services such as distributed file systems or backup services. In a sense, UStore can be regarded as external USB hard disks designed for data centers.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Planning the Transformation of Overlays 关于规划叠加层的转换
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.107
Young Yoon, Nathan Robinson, Vinod Muthusamy, Sheila A. McIlraith, H. Jacobsen
Reconfiguring a topology is an important management technique to sustain high efficiency and robustness of an overlay. But, the problem of transforming the overlay from an old topology to a newly refined topology, at runtime, has received relatively little attention. The key challenge is to minimize the disruption that can be caused by topology transformation operations. Excessive disruption can be costly and harmful and thus it may hamper the decision to migrate to a better topology. To address this issue, we solve a problem of finding an appropriate sequence of steps to transform a topology that incurs the least service disruption. We refer to this problem as an incremental topology transformation (ITT) problem. The ITT problem can be formulated as an automated planning problem and can be solved with numerous off-the-shelf planning techniques. However, we found that state-of-the-art domain-independent planning techniques did not scale to solve large ITT problem instances. This shortcoming motivated us to develop a suite of planners that use novel domain-specific heuristics to guide the search for a solution. We empirically evaluated our planners on a wide range of topologies. Our results illustrate that our planners offer a viable solution to a diversity of ITT problems. We envision that our approach could eventually provide a compelling addition to the arsenal of techniques currently employed by the administrators of distributed overlay networks.
重新配置拓扑结构是一种重要的管理技术,可以保持覆盖的高效率和鲁棒性。但是,在运行时将覆盖层从旧拓扑转换为新精细拓扑的问题却很少受到关注。关键的挑战是最小化拓扑转换操作可能造成的中断。过度的中断可能代价高昂且有害,因此它可能妨碍迁移到更好的拓扑结构的决策。为了解决这个问题,我们解决了一个问题,即找到适当的步骤序列来转换拓扑,从而使服务中断最少。我们把这个问题称为增量拓扑转换(ITT)问题。ITT问题可以被表述为一个自动化的规划问题,并且可以用许多现成的规划技术来解决。然而,我们发现最先进的领域独立规划技术不能扩展到解决大型ITT问题实例。这个缺点促使我们开发一套计划器,使用新颖的领域特定的启发式来指导对解决方案的搜索。我们在广泛的拓扑结构上对我们的规划者进行了经验评估。我们的研究结果表明,我们的规划者为各种ITT问题提供了可行的解决方案。我们设想,我们的方法最终可以为分布式覆盖网络管理员目前使用的技术库提供一个引人注目的补充。
{"title":"Towards Planning the Transformation of Overlays","authors":"Young Yoon, Nathan Robinson, Vinod Muthusamy, Sheila A. McIlraith, H. Jacobsen","doi":"10.1109/ICDCS.2015.107","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.107","url":null,"abstract":"Reconfiguring a topology is an important management technique to sustain high efficiency and robustness of an overlay. But, the problem of transforming the overlay from an old topology to a newly refined topology, at runtime, has received relatively little attention. The key challenge is to minimize the disruption that can be caused by topology transformation operations. Excessive disruption can be costly and harmful and thus it may hamper the decision to migrate to a better topology. To address this issue, we solve a problem of finding an appropriate sequence of steps to transform a topology that incurs the least service disruption. We refer to this problem as an incremental topology transformation (ITT) problem. The ITT problem can be formulated as an automated planning problem and can be solved with numerous off-the-shelf planning techniques. However, we found that state-of-the-art domain-independent planning techniques did not scale to solve large ITT problem instances. This shortcoming motivated us to develop a suite of planners that use novel domain-specific heuristics to guide the search for a solution. We empirically evaluated our planners on a wide range of topologies. Our results illustrate that our planners offer a viable solution to a diversity of ITT problems. We envision that our approach could eventually provide a compelling addition to the arsenal of techniques currently employed by the administrators of distributed overlay networks.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Route Scheduling Algorithm for the Sweep Coverage Problem 扫描覆盖问题的一种路由调度算法
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.91
Zhiyin Chen, S. Wu, Xudong Zhu, Xiaofeng Gao, Jian Gu, Guihai Chen
In order to decrease the sweep cycle and the number of mobile sensors required, we propose a route scheduling problem in this paper which is the first to consider the effect of sensing range. We prove that the Distance-Sensitive-Route Scheduling(DSRS) problem is NP-hard, and consider two different scenarios: the single kissing-point case and the general case. For different cases, We propose three corresponding approximation algorithms ROSE, G-ROSE, D-ROSE.
为了减少扫描周期和所需移动传感器的数量,本文首次提出了考虑感知距离影响的路由调度问题。我们证明了距离敏感路由调度(DSRS)问题是np困难的,并考虑了两种不同的情况:单吻点情况和一般情况。针对不同的情况,我们提出了ROSE、G-ROSE、D-ROSE三种相应的近似算法。
{"title":"A Route Scheduling Algorithm for the Sweep Coverage Problem","authors":"Zhiyin Chen, S. Wu, Xudong Zhu, Xiaofeng Gao, Jian Gu, Guihai Chen","doi":"10.1109/ICDCS.2015.91","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.91","url":null,"abstract":"In order to decrease the sweep cycle and the number of mobile sensors required, we propose a route scheduling problem in this paper which is the first to consider the effect of sensing range. We prove that the Distance-Sensitive-Route Scheduling(DSRS) problem is NP-hard, and consider two different scenarios: the single kissing-point case and the general case. For different cases, We propose three corresponding approximation algorithms ROSE, G-ROSE, D-ROSE.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing Roadside Advertisement Dissemination in Vehicular Cyber-Physical Systems 基于车载信息物理系统的路边广告传播优化
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.13
Huanyang Zheng, Jie Wu
In this paper, we address a promising application in the Vehicular Cyber-Physical Systems (VCPS) called roadside advertisement dissemination. Its application involves three elements: the drivers in the vehicles, Roadside Access Points (RAPs), and shopkeepers. The shopkeeper wants to attract as many customers as possible, through using RAPs to disseminate advertisements to the passing vehicles. Upon receiving an advertisement, the driver may detour towards the shop, depending on the detour distance. Given a fixed number of RAPs and the traffic distribution, our goal is to optimize the RAP placement for the shopkeeper to maximally attract potential customers. This application is a non-trivial extension of traditional coverage problems, the difference being that we use RAPs to cover the traffic flows. RAP placement algorithms may pose complex trade-offs. If we place RAPs at locations that can provide small detour distances to attract more customers, these locations may not necessarily be located in heavy traffic regions. While heavy traffic regions cover more flows, they can cause large detour distances, making shopping less attractive to customers. To balance this trade off, novel RAP placement algorithms are proposed. Since real-world traffic distributions exhibit unique patterns, here we further consider the Manhattan grid scenario and then propose corresponding near-optimal solutions. Real trace-driven experiments validate the competitive performance of the proposed algorithms.
在本文中,我们讨论了在车辆信息物理系统(VCPS)中一个很有前途的应用,即路边广告传播。它的应用涉及三个要素:车辆中的驾驶员、路边接入点(rap)和店主。店主想通过使用rap向过往车辆传播广告来吸引尽可能多的顾客。在收到广告后,司机可以根据绕行的距离绕行到商店。给定固定数量的RAP和流量分布,我们的目标是优化店主的RAP放置,以最大限度地吸引潜在客户。这个应用程序是传统覆盖问题的一个重要扩展,不同之处在于我们使用rap来覆盖流量。RAP放置算法可能会带来复杂的权衡。如果我们将rap放置在可以提供较小绕行距离以吸引更多客户的位置,这些位置可能不一定位于交通繁忙的区域。虽然交通繁忙的地区覆盖了更多的人流,但它们可能会造成很大的绕路距离,使购物对顾客的吸引力降低。为了平衡这种权衡,提出了新的RAP放置算法。由于现实世界的交通分布呈现出独特的模式,这里我们进一步考虑曼哈顿网格场景,然后提出相应的接近最优的解决方案。真实的跟踪驱动实验验证了所提出算法的竞争性能。
{"title":"Optimizing Roadside Advertisement Dissemination in Vehicular Cyber-Physical Systems","authors":"Huanyang Zheng, Jie Wu","doi":"10.1109/ICDCS.2015.13","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.13","url":null,"abstract":"In this paper, we address a promising application in the Vehicular Cyber-Physical Systems (VCPS) called roadside advertisement dissemination. Its application involves three elements: the drivers in the vehicles, Roadside Access Points (RAPs), and shopkeepers. The shopkeeper wants to attract as many customers as possible, through using RAPs to disseminate advertisements to the passing vehicles. Upon receiving an advertisement, the driver may detour towards the shop, depending on the detour distance. Given a fixed number of RAPs and the traffic distribution, our goal is to optimize the RAP placement for the shopkeeper to maximally attract potential customers. This application is a non-trivial extension of traditional coverage problems, the difference being that we use RAPs to cover the traffic flows. RAP placement algorithms may pose complex trade-offs. If we place RAPs at locations that can provide small detour distances to attract more customers, these locations may not necessarily be located in heavy traffic regions. While heavy traffic regions cover more flows, they can cause large detour distances, making shopping less attractive to customers. To balance this trade off, novel RAP placement algorithms are proposed. Since real-world traffic distributions exhibit unique patterns, here we further consider the Manhattan grid scenario and then propose corresponding near-optimal solutions. Real trace-driven experiments validate the competitive performance of the proposed algorithms.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery 基于群体感知的轨迹恢复保护隐私压缩感知
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.12
L. Kong, Liang He, Xiao-Yang Liu, Yu Gu, Minyou Wu, Xuemei Liu
Location based services have experienced an explosive growth and evolved from utilizing a single location to the whole trajectory. Due to the hardware and energy constraints, there are usually many missing data within a trajectory. In order to accurately recover the complete trajectory, crowdsensing provides a promising method. This method resorts to the correlation among multiple users' trajectories and the advanced compressive sensing technique, which significantly outperforms conventional interpolation methods on accuracy. However, as trajectories exposes users' daily activities, the privacy issue is a major concern in crowdsensing. While existing solutions independently tackle the accurate trajectory recovery and privacy issues, yet no single design is able to address these two challenges simultaneously. Therefore in this paper, we propose a novel Privacy Preserving Compressive Sensing (PPCS) scheme, which encrypts a trajectory with several other trajectories while maintaining the homomorphic obfuscation property for compressive sensing. Under PPCS, adversaries can only capture the encrypted data, so the user privacy is preserved. Furthermore, the homomorphic obfuscation property guarantees that the recovery accuracy of PPCS is comparable to the state-of-the-art compressive sensing design. Based on two publicly available traces with numerous users and long durations, we conduct extensive simulations to evaluate PPCS. The results demonstrate that PPCS achieves a high accuracy of <;53 m and a large distortion between the encrypted and the original trajectories (a commonly adopted metric of privacy strength) of >9,000 m even when up to 50% original data are missing.
基于位置的服务经历了爆炸式的增长,并从利用单个位置发展到整个轨迹。由于硬件和能量的限制,在轨迹中通常会有许多丢失的数据。为了准确地恢复完整的轨迹,众感提供了一种很有前途的方法。该方法利用多个用户轨迹之间的相关性和先进的压缩感知技术,在精度上明显优于传统的插值方法。然而,由于轨迹暴露了用户的日常活动,隐私问题是众筹中的一个主要问题。虽然现有的解决方案可以独立解决精确轨迹恢复和隐私问题,但没有一种设计能够同时解决这两个挑战。因此,在本文中,我们提出了一种新的隐私保护压缩感知(PPCS)方案,该方案在保持压缩感知的同态混淆特性的同时,对多个其他轨迹进行加密。在PPCS下,攻击者只能捕获加密的数据,因此保护了用户的隐私。此外,同态混淆特性保证了PPCS的恢复精度可与最先进的压缩感知设计相媲美。基于两个公开可用的具有大量用户和长持续时间的跟踪,我们进行了广泛的模拟来评估PPCS。结果表明,即使原始数据丢失高达50%,PPCS也能达到9000 m的高精度。
{"title":"Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery","authors":"L. Kong, Liang He, Xiao-Yang Liu, Yu Gu, Minyou Wu, Xuemei Liu","doi":"10.1109/ICDCS.2015.12","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.12","url":null,"abstract":"Location based services have experienced an explosive growth and evolved from utilizing a single location to the whole trajectory. Due to the hardware and energy constraints, there are usually many missing data within a trajectory. In order to accurately recover the complete trajectory, crowdsensing provides a promising method. This method resorts to the correlation among multiple users' trajectories and the advanced compressive sensing technique, which significantly outperforms conventional interpolation methods on accuracy. However, as trajectories exposes users' daily activities, the privacy issue is a major concern in crowdsensing. While existing solutions independently tackle the accurate trajectory recovery and privacy issues, yet no single design is able to address these two challenges simultaneously. Therefore in this paper, we propose a novel Privacy Preserving Compressive Sensing (PPCS) scheme, which encrypts a trajectory with several other trajectories while maintaining the homomorphic obfuscation property for compressive sensing. Under PPCS, adversaries can only capture the encrypted data, so the user privacy is preserved. Furthermore, the homomorphic obfuscation property guarantees that the recovery accuracy of PPCS is comparable to the state-of-the-art compressive sensing design. Based on two publicly available traces with numerous users and long durations, we conduct extensive simulations to evaluate PPCS. The results demonstrate that PPCS achieves a high accuracy of <;53 m and a large distortion between the encrypted and the original trajectories (a commonly adopted metric of privacy strength) of >9,000 m even when up to 50% original data are missing.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130395890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
期刊
2015 IEEE 35th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1