首页 > 最新文献

2015 IEEE 35th International Conference on Distributed Computing Systems最新文献

英文 中文
Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling Shuffle to Baffle:迈向安全多方Shuffle的可扩展协议
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.116
Mahnush Movahedi, Jared Saia, M. Zamani
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalability, load-balancing issues, trusted party assumptions, and/or weak security guarantees. In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced. In particular, we require each party to send only a polylogarithmic number of bits and perform a polylogarithmic number of operations while incurring only a logarithmic round complexity. We show security under universal compos ability against up to about n/3 fully-malicious parties. We also provide simulation results in the full version of this paper showing that our protocol improves significantly over previous work. For example, for one million parties, when compared to the state of the art, our protocol reduces the communication and computation costs by at least three orders of magnitude and slightly decreases the number of communication rounds.
在安全多方洗牌中,各持有一个输入的多方希望就其输入的随机排列达成一致,同时对该排列保密。这个问题在许多隐私保护应用程序(如匿名通信、基于位置的服务和电子投票)中都是一个重要的原语。解决此问题的已知技术存在可伸缩性差、负载平衡问题、可信方假设和/或安全性保证薄弱等问题。在本文中,我们提出了一种无条件安全的多方洗牌协议,该协议可以很好地随各方数量的增加而扩展,并且是负载均衡的。特别是,我们要求每一方只发送多对数位数的比特,并执行多对数位数的操作,同时只产生对数位数的轮复杂度。我们展示了在通用组合能力下的安全性,可以对抗多达n/3的完全恶意方。我们还在本文的完整版本中提供了仿真结果,表明我们的协议比以前的工作有了显着的改进。例如,对于一百万个参与方,与目前的技术水平相比,我们的协议将通信和计算成本降低了至少三个数量级,并略微减少了通信轮数。
{"title":"Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling","authors":"Mahnush Movahedi, Jared Saia, M. Zamani","doi":"10.1109/ICDCS.2015.116","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.116","url":null,"abstract":"In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalability, load-balancing issues, trusted party assumptions, and/or weak security guarantees. In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced. In particular, we require each party to send only a polylogarithmic number of bits and perform a polylogarithmic number of operations while incurring only a logarithmic round complexity. We show security under universal compos ability against up to about n/3 fully-malicious parties. We also provide simulation results in the full version of this paper showing that our protocol improves significantly over previous work. For example, for one million parties, when compared to the state of the art, our protocol reduces the communication and computation costs by at least three orders of magnitude and slightly decreases the number of communication rounds.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Scalable Publish/Subscribe Systems 迈向可扩展的发布/订阅系统
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.108
Shuping Ji, Chunyang Ye, Jun Wei, H. Jacobsen
Despite suffering from inefficiency and flexibility limitations, the filter-based routing (FBR) algorithm is widely used in content-based publish/subscribe (pub/sub) systems. To address its limitations, we propose a dynamic destination-based routing algorithm called D-DBR, which decomposes pub/sub into two independent parts: Content-based matching and destination based multicasting. D-DBR exhibits low event matching cost and high efficiency, flexibility, and robustness for event routing in small-scale overlays. To improve its scalability to large-scale overlays, we further extend D-DBR to a new routing algorithm called MERC. MERC divides the overlay into interconnected clusters and applies content-based and destination-based mechanisms to route events inter- and intra-cluster, respectively. We implemented all algorithms in the PADRES pub/sub system. Experimental results show that our algorithms outperform the FBR algorithm.
尽管存在效率低下和灵活性限制的问题,但基于过滤器的路由(FBR)算法在基于内容的发布/订阅(pub/sub)系统中得到了广泛的应用。为了解决它的局限性,我们提出了一种动态的基于目的地的路由算法D-DBR,该算法将发布/订阅分解为两个独立的部分:基于内容的匹配和基于目的地的多播。D-DBR具有低事件匹配成本和高效率、灵活性和鲁棒性,适用于小范围覆盖的事件路由。为了提高其对大规模覆盖的可扩展性,我们进一步将D-DBR扩展到一种名为MERC的新路由算法。MERC将覆盖层划分为相互连接的集群,并分别应用基于内容和基于目的地的机制在集群间和集群内路由事件。我们在PADRES发布/子系统中实现了所有算法。实验结果表明,我们的算法优于FBR算法。
{"title":"Towards Scalable Publish/Subscribe Systems","authors":"Shuping Ji, Chunyang Ye, Jun Wei, H. Jacobsen","doi":"10.1109/ICDCS.2015.108","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.108","url":null,"abstract":"Despite suffering from inefficiency and flexibility limitations, the filter-based routing (FBR) algorithm is widely used in content-based publish/subscribe (pub/sub) systems. To address its limitations, we propose a dynamic destination-based routing algorithm called D-DBR, which decomposes pub/sub into two independent parts: Content-based matching and destination based multicasting. D-DBR exhibits low event matching cost and high efficiency, flexibility, and robustness for event routing in small-scale overlays. To improve its scalability to large-scale overlays, we further extend D-DBR to a new routing algorithm called MERC. MERC divides the overlay into interconnected clusters and applies content-based and destination-based mechanisms to route events inter- and intra-cluster, respectively. We implemented all algorithms in the PADRES pub/sub system. Experimental results show that our algorithms outperform the FBR algorithm.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125099137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model SINR模型下无线网络中常数逼近CDS构造的自稳定算法
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.112
Jiguo Yu, Lili Jia, Wei Li, Xiuzhen Cheng, Shengling Wang, R. Bie, Dongxiao Yu
As a distributed system, a wireless network, usually faces a complex environment (transient faults and topology changes occur frequently). The connected dominating set (CDS) problem has been widely studied due to its important applications in wireless communication and networks, especially the important role as a virtual backbone for efficient routing. In this paper, under SINR (Signal-to-Interference-plus-Noise-Ratio) model, we propose a distributed self-stabilizing maximal independent set (MIS) algorithm (DSSMIS). Based on DSSMIS, we design a distributed self-stabilizing algorithm (DSSCDS) for CDS construction with constant approximation within O(log n) rounds. To best of our knowledge, this is the first self-stabilizing CDS algorithm under SINR model.
无线网络作为一个分布式系统,通常面临复杂的环境(瞬态故障和拓扑变化频繁)。连通支配集(CDS)问题由于其在无线通信和网络中的重要应用,特别是作为高效路由的虚拟主干而受到广泛的研究。本文在信噪比(SINR)模型下,提出了一种分布式自稳定极大独立集算法(DSSMIS)。基于DSSMIS,我们设计了一种分布自稳定算法(DSSCDS),用于在O(log n)轮内进行常数逼近的CDS构造。据我们所知,这是SINR模型下的第一个自稳定CDS算法。
{"title":"A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model","authors":"Jiguo Yu, Lili Jia, Wei Li, Xiuzhen Cheng, Shengling Wang, R. Bie, Dongxiao Yu","doi":"10.1109/ICDCS.2015.112","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.112","url":null,"abstract":"As a distributed system, a wireless network, usually faces a complex environment (transient faults and topology changes occur frequently). The connected dominating set (CDS) problem has been widely studied due to its important applications in wireless communication and networks, especially the important role as a virtual backbone for efficient routing. In this paper, under SINR (Signal-to-Interference-plus-Noise-Ratio) model, we propose a distributed self-stabilizing maximal independent set (MIS) algorithm (DSSMIS). Based on DSSMIS, we design a distributed self-stabilizing algorithm (DSSCDS) for CDS construction with constant approximation within O(log n) rounds. To best of our knowledge, this is the first self-stabilizing CDS algorithm under SINR model.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131529930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improve Charging Capability for Wireless Rechargeable Sensor Networks Using Resonant Repeaters 利用共振中继器提高无线可充电传感器网络的充电能力
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.22
Cong Wang, Ji Li, Fan Ye, Yuanyuan Yang
Wireless charging has provided a convenient alternative to renew sensors' energy in wireless sensor networks. Due to physical limitations, previous works have only considered recharging a single node at a time, which has limited efficiency and scalability. Recent advance on multi-hop wireless charging is gaining momentum to provide fundamental support to address this problem. However, existing single-node charging designs do not consider and cannot take advantage of such opportunities. In this paper, we propose a new framework to enable multi-hop wireless charging using resonant repeaters. First, we present a realistic model that accounts for detailed physical factors to calculate charging efficiencies. Second, to achieve balance between energy efficiency and data latency, we propose a hybrid data gathering strategy that combines static and mobile data gathering to overcome their respective drawbacks and provide theoretical analysis. Then we formulate multi-hop recharge schedule into a bi-objective NP-hard optimization problem. We propose a two-step approximation algorithm that first finds the minimum charging cost and then calculates the charging vehicles' moving costs with bounded approximation ratios. Finally, upon discovering more room to reduce the total system cost, we develop a post-optimization algorithm that iteratively adds more stopping locations for charging vehicles to further improve the results. Our extensive simulations show that the proposed algorithms can handle dynamic energy demands effectively, and can cover at least three times of nodes and reduce service interruption time by an order of magnitude compared to the single-node charging scheme.
无线充电为无线传感器网络中传感器的能量更新提供了一种方便的替代方案。由于物理限制,以往的工作只考虑一次给单个节点充电,效率和可扩展性有限。近年来,多跳无线充电技术的发展势头日益强劲,为解决这一问题提供了基础支持。然而,现有的单节点充电设计没有考虑到也无法利用这样的机会。在本文中,我们提出了一个新的框架,使多跳无线充电使用谐振中继器。首先,我们提出了一个现实的模型,该模型考虑了详细的物理因素来计算充电效率。其次,为了在能源效率和数据延迟之间取得平衡,我们提出了一种将静态和移动数据采集相结合的混合数据采集策略,以克服各自的缺点,并进行了理论分析。然后将多跳充值计划转化为一个双目标NP-hard优化问题。提出了一种两步逼近算法,首先求出最小充电成本,然后用有界逼近比计算充电车辆的移动成本。最后,在发现更多降低系统总成本的空间后,我们开发了一种后优化算法,迭代地增加充电车辆的停车位置,以进一步改善结果。大量的仿真结果表明,与单节点充电方案相比,该算法可以有效地处理动态能源需求,并且可以覆盖至少三个节点,并将服务中断时间减少一个数量级。
{"title":"Improve Charging Capability for Wireless Rechargeable Sensor Networks Using Resonant Repeaters","authors":"Cong Wang, Ji Li, Fan Ye, Yuanyuan Yang","doi":"10.1109/ICDCS.2015.22","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.22","url":null,"abstract":"Wireless charging has provided a convenient alternative to renew sensors' energy in wireless sensor networks. Due to physical limitations, previous works have only considered recharging a single node at a time, which has limited efficiency and scalability. Recent advance on multi-hop wireless charging is gaining momentum to provide fundamental support to address this problem. However, existing single-node charging designs do not consider and cannot take advantage of such opportunities. In this paper, we propose a new framework to enable multi-hop wireless charging using resonant repeaters. First, we present a realistic model that accounts for detailed physical factors to calculate charging efficiencies. Second, to achieve balance between energy efficiency and data latency, we propose a hybrid data gathering strategy that combines static and mobile data gathering to overcome their respective drawbacks and provide theoretical analysis. Then we formulate multi-hop recharge schedule into a bi-objective NP-hard optimization problem. We propose a two-step approximation algorithm that first finds the minimum charging cost and then calculates the charging vehicles' moving costs with bounded approximation ratios. Finally, upon discovering more room to reduce the total system cost, we develop a post-optimization algorithm that iteratively adds more stopping locations for charging vehicles to further improve the results. Our extensive simulations show that the proposed algorithms can handle dynamic energy demands effectively, and can cover at least three times of nodes and reduce service interruption time by an order of magnitude compared to the single-node charging scheme.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Synthesizing Self-Stabilizing Protocols under Average Recovery Time Constraints 平均恢复时间约束下的综合自稳定协议
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.65
Saba Aflaki, Fathiyeh Faghih, Borzoo Bonakdarpour
A self-stabilizing system is one that converges to a legitimate state from any arbitrary state. Such an arbitrary state may be reachable due to wrong initialization or the occurrence of transient faults. Average recovery time of self-stabilizing systems is a key factor in evaluating their performance, especially in the domain of network and robotic protocols. This paper introduces a groundbreaking result on automated repair and synthesis of self-stabilizing protocols whose average recovery time is required to satisfy certain constraints. We show that synthesizing and repairing weak-stabilizing protocols under average recovery time constraints is NP-complete. To cope with the exponential complexity (unless P = NP), we propose a polynomial-time heuristic.
自稳定系统是从任意状态收敛到合法状态的系统。这种任意状态可能由于错误的初始化或瞬态故障的发生而无法到达。自稳定系统的平均恢复时间是评估其性能的关键因素,特别是在网络和机器人协议领域。本文介绍了在平均恢复时间满足一定约束条件的自稳定方案的自动修复和合成方面取得的突破性成果。我们证明了在平均恢复时间约束下弱稳定协议的合成和修复是np完全的。为了处理指数复杂度(除非P = NP),我们提出了一个多项式时间启发式算法。
{"title":"Synthesizing Self-Stabilizing Protocols under Average Recovery Time Constraints","authors":"Saba Aflaki, Fathiyeh Faghih, Borzoo Bonakdarpour","doi":"10.1109/ICDCS.2015.65","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.65","url":null,"abstract":"A self-stabilizing system is one that converges to a legitimate state from any arbitrary state. Such an arbitrary state may be reachable due to wrong initialization or the occurrence of transient faults. Average recovery time of self-stabilizing systems is a key factor in evaluating their performance, especially in the domain of network and robotic protocols. This paper introduces a groundbreaking result on automated repair and synthesis of self-stabilizing protocols whose average recovery time is required to satisfy certain constraints. We show that synthesizing and repairing weak-stabilizing protocols under average recovery time constraints is NP-complete. To cope with the exponential complexity (unless P = NP), we propose a polynomial-time heuristic.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Approximate Holistic Aggregation in Wireless Sensor Networks 无线传感器网络中的近似整体聚合
Ji Li, Siyao Cheng, Zhipeng Cai, Jiguo Yu, Chaokun Wang, Yingshu Li
Holistic aggregation results are important for users to obtain summary information from Wireless Sensor Networks (WSNs). Holistic aggregation requires all the sensory data to be sent to the sink, which costs a huge amount of energy. Fortunately, in most applications, approximate results are acceptable. We study the approximated holistic aggregation algorithms based on uniform sampling. In this paper, four holistic aggregation operations are investigated. The mathematical methods to construct their estimators and determine the optional sample size are proposed, and the correctness of these methods is proved. Four corresponding distributed holistic algorithms are presented. The theoretical analysis and simulation results show that the algorithms have high performance.
整体聚合结果对于用户获取无线传感器网络的汇总信息至关重要。整体聚合需要将所有的感官数据发送到接收器,这需要消耗大量的能量。幸运的是,在大多数应用中,近似结果是可以接受的。研究了基于均匀抽样的近似整体聚合算法。本文研究了四种整体聚合操作。提出了构造其估计量和确定可选样本量的数学方法,并证明了这些方法的正确性。给出了四种相应的分布式整体算法。理论分析和仿真结果表明,该算法具有良好的性能。
{"title":"Approximate Holistic Aggregation in Wireless Sensor Networks","authors":"Ji Li, Siyao Cheng, Zhipeng Cai, Jiguo Yu, Chaokun Wang, Yingshu Li","doi":"10.1145/3027488","DOIUrl":"https://doi.org/10.1145/3027488","url":null,"abstract":"Holistic aggregation results are important for users to obtain summary information from Wireless Sensor Networks (WSNs). Holistic aggregation requires all the sensory data to be sent to the sink, which costs a huge amount of energy. Fortunately, in most applications, approximate results are acceptable. We study the approximated holistic aggregation algorithms based on uniform sampling. In this paper, four holistic aggregation operations are investigated. The mathematical methods to construct their estimators and determine the optional sample size are proposed, and the correctness of these methods is proved. Four corresponding distributed holistic algorithms are presented. The theoretical analysis and simulation results show that the algorithms have high performance.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Fault-Tolerant and Elastic Streaming MapReduce with Decentralized Coordination 分布式协调的容错弹性流MapReduce
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.41
A. Kumbhare, M. Frîncu, Yogesh L. Simmhan, V. Prasanna
The MapReduce programming model, due to its simplicity and scalability, has become an essential tool for processing large data volumes in distributed environments. Recent Stream Processing Systems (SPS) this model to provide low-latency analysis of high-velocity continuous data streams. However, integrating MapReduce with streaming poses challenges: first, the runtime variations in data characteristics such as data-rates and key-distribution cause resource overload, that in-turn leads to fluctuations in the Quality of the Service (QoS), and second, the stateful reducers, whose state depends on the complete tuple history, necessitates efficient fault-recovery mechanisms to maintain the desired QoS in the presence of resource failures. We propose an integrated streaming MapReduce architecture leveraging the concept of consistent hashing to support runtime elasticity along with locality-aware data and state replication to provide efficient load-balancing with low-overhead fault-tolerance and parallel fault-recovery from multiple simultaneous failures. Our evaluation on a private cloud shows up to 2.8× improvement in peak throughput compared to Apache Storm SPS, and a low recovery latency of 700 - 1500 ms from multiple failures.
MapReduce编程模型由于其简单性和可扩展性,已经成为在分布式环境中处理大数据量的必要工具。最近的流处理系统(SPS)这种模式提供了对高速连续数据流的低延迟分析。然而,将MapReduce与流集成带来了挑战:首先,数据特性(如数据速率和键分布)的运行时变化会导致资源过载,从而导致服务质量(QoS)的波动;其次,有状态的reducer的状态依赖于完整的元组历史,需要有效的故障恢复机制来在资源故障的情况下维持所需的QoS。我们提出了一个集成的流MapReduce架构,利用一致哈希的概念来支持运行时弹性以及位置感知数据和状态复制,以提供高效的负载平衡,具有低开销的容错能力和多个同时发生的故障的并行故障恢复。我们在私有云上的评估显示,与Apache Storm SPS相比,峰值吞吐量提高了2.8倍,并且多次故障的恢复延迟低至700 - 1500毫秒。
{"title":"Fault-Tolerant and Elastic Streaming MapReduce with Decentralized Coordination","authors":"A. Kumbhare, M. Frîncu, Yogesh L. Simmhan, V. Prasanna","doi":"10.1109/ICDCS.2015.41","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.41","url":null,"abstract":"The MapReduce programming model, due to its simplicity and scalability, has become an essential tool for processing large data volumes in distributed environments. Recent Stream Processing Systems (SPS) this model to provide low-latency analysis of high-velocity continuous data streams. However, integrating MapReduce with streaming poses challenges: first, the runtime variations in data characteristics such as data-rates and key-distribution cause resource overload, that in-turn leads to fluctuations in the Quality of the Service (QoS), and second, the stateful reducers, whose state depends on the complete tuple history, necessitates efficient fault-recovery mechanisms to maintain the desired QoS in the presence of resource failures. We propose an integrated streaming MapReduce architecture leveraging the concept of consistent hashing to support runtime elasticity along with locality-aware data and state replication to provide efficient load-balancing with low-overhead fault-tolerance and parallel fault-recovery from multiple simultaneous failures. Our evaluation on a private cloud shows up to 2.8× improvement in peak throughput compared to Apache Storm SPS, and a low recovery latency of 700 - 1500 ms from multiple failures.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising 以广告商和出版商为中心的隐私意识在线行为广告
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.38
Jingyu Hua, An Tang, Sheng Zhong
Online behavioral advertising (OBA) has become one of the most successful advertising models on the Internet. Nevertheless, all existing OBA systems are broker-centric in the billing phase, which means it is the broker who exclusively determines advertisers' expenses and publishers' revenues. Consequently, a malicious broker may cheat in their tallying of ad clicks to overcharge advertisers or underpay publishers. Furthermore, as the broker cannot justify the bills, malicious advertisers may deny actual clicks to ask for refunds, and malicious publishers may claim non-existing clicks to demand extra revenue shares. This paper solves these problems by reversing the priority between the broker and the advertisers and publishers. Specifically, when users click on ads, it makes corresponding advertisers and publishers forward click reports of clients to the broker after checking, anonymizing and signing them. The broker then settles accounts with advertisers and publishers fully based on these reports. To guarantee the interests of the broker after the priority reversal, we further propose effective mechanisms for detecting underreporting advertisers and over reporting publishers, respectively.
网络行为广告(OBA)已成为互联网上最成功的广告模式之一。然而,所有现有的OBA系统在计费阶段都是以代理为中心的,这意味着由代理独家决定广告商的费用和出版商的收入。因此,恶意的经纪人可能会在他们的广告点击计数中作弊,以向广告商收取过高的费用或向出版商支付过低的费用。此外,由于经纪人无法证明账单的合理性,恶意广告商可能会拒绝实际点击以要求退款,恶意出版商可能会声称不存在点击以要求额外的收入分成。本文通过倒转经纪人与广告商和出版商之间的优先级来解决这些问题。具体来说,当用户点击广告时,由相应的广告主和发布商对客户的点击报告进行核对、匿名、签名后转发给经纪人。然后,经纪人完全根据这些报告与广告商和出版商结算账目。为了保证经纪人在优先级反转后的利益,我们进一步提出了检测低报广告商和高报出版商的有效机制。
{"title":"Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising","authors":"Jingyu Hua, An Tang, Sheng Zhong","doi":"10.1109/ICDCS.2015.38","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.38","url":null,"abstract":"Online behavioral advertising (OBA) has become one of the most successful advertising models on the Internet. Nevertheless, all existing OBA systems are broker-centric in the billing phase, which means it is the broker who exclusively determines advertisers' expenses and publishers' revenues. Consequently, a malicious broker may cheat in their tallying of ad clicks to overcharge advertisers or underpay publishers. Furthermore, as the broker cannot justify the bills, malicious advertisers may deny actual clicks to ask for refunds, and malicious publishers may claim non-existing clicks to demand extra revenue shares. This paper solves these problems by reversing the priority between the broker and the advertisers and publishers. Specifically, when users click on ads, it makes corresponding advertisers and publishers forward click reports of clients to the broker after checking, anonymizing and signing them. The broker then settles accounts with advertisers and publishers fully based on these reports. To guarantee the interests of the broker after the priority reversal, we further propose effective mechanisms for detecting underreporting advertisers and over reporting publishers, respectively.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy-Preserving Publication of Mobility Data with High Utility 高实用移动数据的隐私保护发布
Pub Date : 2015-06-30 DOI: 10.1109/ICDCS.2015.117
Vincent Primault, Sonia Ben Mokhtar, L. Brunie
An increasing amount of mobility data is being collected every day by different means, e.g., By mobile phone operators. This data is sometimes published after the application of simple anonymization techniques, which might lead to severe privacy threats. We propose in this paper a new solution whose novelty is two-fold. Firstly, we introduce an algorithm designed to hide places where a user stops during her journey (namely points of interest), by enforcing a constant speed along her trajectory. Secondly, we leverage places where users meet to take a chance to swap their trajectories and therefore confuse an attacker.
每天都有越来越多的移动数据通过不同的方式被收集,例如移动电话运营商。这些数据有时是在应用简单的匿名化技术后发布的,这可能会导致严重的隐私威胁。本文提出了一种具有双重新颖性的新解。首先,我们引入了一种算法,通过在用户的轨迹上施加恒定的速度,来隐藏用户在旅途中停下来的地方(即兴趣点)。其次,我们利用用户见面的地方来交换他们的轨迹,从而迷惑攻击者。
{"title":"Privacy-Preserving Publication of Mobility Data with High Utility","authors":"Vincent Primault, Sonia Ben Mokhtar, L. Brunie","doi":"10.1109/ICDCS.2015.117","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.117","url":null,"abstract":"An increasing amount of mobility data is being collected every day by different means, e.g., By mobile phone operators. This data is sometimes published after the application of simple anonymization techniques, which might lead to severe privacy threats. We propose in this paper a new solution whose novelty is two-fold. Firstly, we introduce an algorithm designed to hide places where a user stops during her journey (namely points of interest), by enforcing a constant speed along her trajectory. Secondly, we leverage places where users meet to take a chance to swap their trajectories and therefore confuse an attacker.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127389906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees 约束生成树的空间最优时效沉默自稳定构造
Pub Date : 2015-06-29 DOI: 10.1109/ICDCS.2015.66
Lélia Blin, P. Fraigniaud
Self-stabilizing algorithms are distributed algorithms supporting transient failures. Starting from any configuration, they allow the system to detect whether the actual configuration is legal, and, if not, they allow the system to eventually reach a legal configuration. In the context of network computing, it is known that, for every task, there is a self-stabilizing algorithm solving that task, with optimal space-complexity, but converging in an exponential number of rounds. On the other hand, it is also known that, for every task, there is a self-stabilizing algorithm solving that task in a linear number of rounds, but with large space-complexity. It is however not known whether for every task there exists a self-stabilizing algorithm that is simultaneously space-efficient and time-efficient. In this paper, we make a first attempt for answering the question of whether such an efficient algorithm exists for every task, by focussing on constrained spanning tree construction tasks. We present a general roadmap for the design of silent space-optimal self-stabilizing algorithms solving such tasks, converging in polynomially many rounds under the unfair scheduler. By applying our roadmap to the task of constructing minimum-weight spanning tree (MST), and to the task of constructing minimum-degree spanning tree (MDST), we provide algorithms that outperform previously known algorithms designed and optimized specifically for solving each of these two tasks.
自稳定算法是支持暂态故障的分布式算法。从任何配置开始,它们允许系统检测实际配置是否合法,如果不合法,它们允许系统最终达到合法配置。在网络计算的背景下,众所周知,对于每个任务,都有一个自稳定算法来解决该任务,具有最佳的空间复杂度,但在指数轮数中收敛。另一方面,我们也知道,对于每一个任务,都有一个自稳定算法在线性轮数内求解该任务,但具有很大的空间复杂度。然而,对于每个任务,是否存在一个同时具有空间效率和时间效率的自稳定算法是未知的。在本文中,我们通过关注约束生成树构造任务,首次尝试回答是否对每个任务都存在这样一个有效算法的问题。本文给出了求解这类任务的沉默空间最优自稳定算法的总体设计思路,该算法在不公平调度下以多项式多轮收敛。通过将我们的路线图应用于构建最小权重生成树(MST)和构建最小度生成树(MDST)的任务,我们提供了优于先前已知的专门为解决这两个任务而设计和优化的算法的算法。
{"title":"Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees","authors":"Lélia Blin, P. Fraigniaud","doi":"10.1109/ICDCS.2015.66","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.66","url":null,"abstract":"Self-stabilizing algorithms are distributed algorithms supporting transient failures. Starting from any configuration, they allow the system to detect whether the actual configuration is legal, and, if not, they allow the system to eventually reach a legal configuration. In the context of network computing, it is known that, for every task, there is a self-stabilizing algorithm solving that task, with optimal space-complexity, but converging in an exponential number of rounds. On the other hand, it is also known that, for every task, there is a self-stabilizing algorithm solving that task in a linear number of rounds, but with large space-complexity. It is however not known whether for every task there exists a self-stabilizing algorithm that is simultaneously space-efficient and time-efficient. In this paper, we make a first attempt for answering the question of whether such an efficient algorithm exists for every task, by focussing on constrained spanning tree construction tasks. We present a general roadmap for the design of silent space-optimal self-stabilizing algorithms solving such tasks, converging in polynomially many rounds under the unfair scheduler. By applying our roadmap to the task of constructing minimum-weight spanning tree (MST), and to the task of constructing minimum-degree spanning tree (MDST), we provide algorithms that outperform previously known algorithms designed and optimized specifically for solving each of these two tasks.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2015 IEEE 35th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1