首页 > 最新文献

2015 IEEE 35th International Conference on Distributed Computing Systems最新文献

英文 中文
Harnessing the Power of Multiple Cloud Service Providers: An Economical and SLA-Guaranteed Cloud Storage Service 利用多个云服务提供商的力量:经济且sla保证的云存储服务
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.85
Guoxin Liu, Haiying Shen
It is critical for a cloud service broker to minimize its payment cost to cloud service providers for serving the broker's customers while providing SLA-guaranteed services. In this paper, we propose an Economical and SLA-guaranteed cloud Storage Service (ES3), which finds a data allocation and resource reservation schedule with cost minimization. ES3 incorporates (1) a data allocation and reservation algorithm, which allocates each data item to a datacenter and determines the reservation amount on data centers by leveraging all the pricing policies, (2) a genetic algorithm based data allocation adjustment approach, which makes data Get/Put rates stable in each datacenter to maximize the reservation benefit. Our trace-driven experiments show the superior performance of ES3.
对于云服务代理来说,在提供sla保证的服务的同时为代理的客户提供服务,将其支付给云服务提供商的成本降到最低是至关重要的。在本文中,我们提出了一种经济的、sla保证的云存储服务(ES3),它找到了一个成本最小的数据分配和资源预留计划。ES3结合了(1)数据分配和预留算法,将每个数据项分配到数据中心,并利用所有定价策略确定数据中心的预留量;(2)基于遗传算法的数据分配调整方法,使每个数据中心的数据Get/Put率稳定,以最大化预留效益。我们的跟踪驱动实验证明了ES3的优越性能。
{"title":"Harnessing the Power of Multiple Cloud Service Providers: An Economical and SLA-Guaranteed Cloud Storage Service","authors":"Guoxin Liu, Haiying Shen","doi":"10.1109/ICDCS.2015.85","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.85","url":null,"abstract":"It is critical for a cloud service broker to minimize its payment cost to cloud service providers for serving the broker's customers while providing SLA-guaranteed services. In this paper, we propose an Economical and SLA-guaranteed cloud Storage Service (ES3), which finds a data allocation and resource reservation schedule with cost minimization. ES3 incorporates (1) a data allocation and reservation algorithm, which allocates each data item to a datacenter and determines the reservation amount on data centers by leveraging all the pricing policies, (2) a genetic algorithm based data allocation adjustment approach, which makes data Get/Put rates stable in each datacenter to maximize the reservation benefit. Our trace-driven experiments show the superior performance of ES3.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Exploiting Locality for Generalized Consensus 关于广义共识的局部性开发
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.99
Sebastiano Peluso, Alexandru Turcu, R. Palmieri, B. Ravindran
Single leader-based Consensus protocols are known to stop scaling once the leader reaches its saturation point. On the other hand, establishing Consensus of commands by taking into account only their dependencies (as specified by Generalized Consensus) is appealing because of the potentially higher parallelism and lower latency. However, current solutions have well-known pitfalls due to the higher quorum size, which is required to exploit low-latency fast decisions, and the need for tracking dependency relations. In this paper we briefly introduce M2PAXOS, a new implementation of Generalized Consensus that provides a fast decision of commands by leveraging a classic quorum size, which matches just the majority of nodes deployed. M2PAXOS does not establish command dependencies based on conflicts, rather it associates accessed objects with nodes, so that the delivery decision of commands operating on the same objects is made by a common node. The evaluation study of M2PAXOS confirms its effectiveness by showing an improvement up to 7× over state-of-the-art (Generalized) Consensus protocols.
众所周知,一旦leader达到饱和点,基于单个leader的共识协议就会停止扩展。另一方面,通过只考虑它们的依赖关系(如广义共识所指定的)来建立命令的一致性是有吸引力的,因为潜在的更高的并行性和更低的延迟。然而,目前的解决方案存在众所周知的缺陷,因为需要较高的仲裁大小,这需要利用低延迟的快速决策,并且需要跟踪依赖关系。在本文中,我们简要介绍了M2PAXOS,这是广义共识的一种新实现,它通过利用经典的仲裁大小来提供快速的命令决策,该仲裁大小仅与部署的大多数节点相匹配。M2PAXOS不基于冲突建立命令依赖关系,而是将被访问的对象与节点关联起来,因此在相同对象上操作的命令的交付决策由公共节点做出。M2PAXOS的评估研究证实了它的有效性,显示出比最先进的(广义)共识协议提高了7倍。
{"title":"On Exploiting Locality for Generalized Consensus","authors":"Sebastiano Peluso, Alexandru Turcu, R. Palmieri, B. Ravindran","doi":"10.1109/ICDCS.2015.99","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.99","url":null,"abstract":"Single leader-based Consensus protocols are known to stop scaling once the leader reaches its saturation point. On the other hand, establishing Consensus of commands by taking into account only their dependencies (as specified by Generalized Consensus) is appealing because of the potentially higher parallelism and lower latency. However, current solutions have well-known pitfalls due to the higher quorum size, which is required to exploit low-latency fast decisions, and the need for tracking dependency relations. In this paper we briefly introduce M2PAXOS, a new implementation of Generalized Consensus that provides a fast decision of commands by leveraging a classic quorum size, which matches just the majority of nodes deployed. M2PAXOS does not establish command dependencies based on conflicts, rather it associates accessed objects with nodes, so that the delivery decision of commands operating on the same objects is made by a common node. The evaluation study of M2PAXOS confirms its effectiveness by showing an improvement up to 7× over state-of-the-art (Generalized) Consensus protocols.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks 移动社交网络中有效的自定义隐私保护好友发现
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.31
Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Z. Tian
Mobile social networks have been increasingly popular with the explosive growth of mobile devices. Mobile users are allowed to interact with potential friends within a certain distance. Motivated by this feature, many exciting applications have been developed, yet the challenge of privacy protection is thus aroused. In this paper, we propose an efficient customized privacy preserving friend discovery mechanism, which not only protects the privacy of users' profile, but also establishes a verifiable secure communication channel between matched users. Besides, the initiator has the freedom to set a customized request profile by choosing the interested attributes and giving each attribute a specific value. Moreover, the request profile's privacy protection level is customized by the initiator according to his/her own privacy requirements. We also consider the collusion attacks among unmatched users. To the best of our knowledge, this is the first work to address such a security threat. Our protocol guarantees that only exactly matched users are able to communicate with the initiator securely, while little information can be obtained by other participants. To increase the matching efficiency, our design adopts the Bloom filter to efficiently exclude most unmatched users. As a result, our design effectively protects the profile privacy and efficiently decreases the computational overhead. Security analysis and performance evaluation are conducted to justify the superiority of our protocol.
随着移动设备的爆炸式增长,移动社交网络越来越受欢迎。手机用户可以在一定距离内与潜在朋友互动。在这一特性的推动下,开发了许多令人兴奋的应用程序,但也由此引发了隐私保护的挑战。本文提出了一种高效的自定义隐私保护好友发现机制,该机制不仅保护了用户档案的隐私,而且在匹配的用户之间建立了可验证的安全通信通道。此外,发起者可以自由地通过选择感兴趣的属性并为每个属性赋予特定的值来设置自定义的请求配置文件。此外,请求配置文件的隐私保护级别由发起者根据自己的隐私需求定制。我们还考虑了不匹配用户之间的串通攻击。据我们所知,这是应对此类安全威胁的首次工作。我们的协议保证只有完全匹配的用户才能安全地与发起者通信,而其他参与者只能获得很少的信息。为了提高匹配效率,我们的设计采用了Bloom过滤器,有效地排除了大部分不匹配的用户。因此,我们的设计有效地保护了配置文件的隐私,并有效地降低了计算开销。安全性分析和性能评估证明了我们协议的优越性。
{"title":"Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks","authors":"Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Z. Tian","doi":"10.1109/ICDCS.2015.31","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.31","url":null,"abstract":"Mobile social networks have been increasingly popular with the explosive growth of mobile devices. Mobile users are allowed to interact with potential friends within a certain distance. Motivated by this feature, many exciting applications have been developed, yet the challenge of privacy protection is thus aroused. In this paper, we propose an efficient customized privacy preserving friend discovery mechanism, which not only protects the privacy of users' profile, but also establishes a verifiable secure communication channel between matched users. Besides, the initiator has the freedom to set a customized request profile by choosing the interested attributes and giving each attribute a specific value. Moreover, the request profile's privacy protection level is customized by the initiator according to his/her own privacy requirements. We also consider the collusion attacks among unmatched users. To the best of our knowledge, this is the first work to address such a security threat. Our protocol guarantees that only exactly matched users are able to communicate with the initiator securely, while little information can be obtained by other participants. To increase the matching efficiency, our design adopts the Bloom filter to efficiently exclude most unmatched users. As a result, our design effectively protects the profile privacy and efficiently decreases the computational overhead. Security analysis and performance evaluation are conducted to justify the superiority of our protocol.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks 网络社交网络中谣言传播动力学建模及优化对策研究
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.29
Zaobo He, Zhipeng Cai, Xiaoming Wang
The spread of rumors in Online Social Networks (OSNs) poses great challenges to the social peace and public order. It is imperative to model propagation dynamics of rumors and develop corresponding countermeasures. Most of the existing works either overlook the heterogeneity of social networks or do not consider the cost of countermeasures. Motivated by these issues, this paper proposes a heterogeneous network based epidemic model that incorporates both the network heterogeneity and various countermeasures. Through analyzing the existence and stability of equilibrium solutions of the proposed ODE (Ordinary Differential Equation) system, the critical conditions that determine whether a rumor continuously propagates or becomes extinct are derived. Moreover, we concern about the cost of the main two types of countermeasures, i.e., Blocking rumors at influential users and spreading truth to clarify rumors. Employing the Pontryagin's maximum principle, we obtain the optimized countermeasures that ensures a rumor can become extinct at the end of an expected time period with lowest cost. Both the critical conditions and the optimized countermeasures provide a real-time decision reference to restrain the rumor spreading. Experiments based on Digg2009 dataset are conducted to evaluate the effectiveness of the proposed dynamic model and the efficiency of the optimized countermeasures.
网络社交网络中的谣言传播给社会治安带来了极大的挑战。对谣言的传播动态进行建模并制定相应的对策势在必行。现有的大部分研究要么忽视了社会网络的异质性,要么没有考虑对策的成本。针对这些问题,本文提出了一种基于异构网络的流行病模型,该模型既考虑了网络的异质性,又考虑了各种对策。通过分析所提出的ODE(常微分方程)系统平衡解的存在性和稳定性,导出了谣言是否持续传播或灭绝的临界条件。此外,我们还关注了两种主要对策的成本,即在有影响力的用户处屏蔽谣言和传播真相澄清谣言。利用庞特里亚金最大值原理,我们得到了保证谣言在预期时间结束时以最低成本消灭的最优对策。临界条件和优化对策都为抑制谣言传播提供了实时决策参考。基于Digg2009数据集进行了实验,以评估所提出的动态模型的有效性和优化对策的效率。
{"title":"Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks","authors":"Zaobo He, Zhipeng Cai, Xiaoming Wang","doi":"10.1109/ICDCS.2015.29","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.29","url":null,"abstract":"The spread of rumors in Online Social Networks (OSNs) poses great challenges to the social peace and public order. It is imperative to model propagation dynamics of rumors and develop corresponding countermeasures. Most of the existing works either overlook the heterogeneity of social networks or do not consider the cost of countermeasures. Motivated by these issues, this paper proposes a heterogeneous network based epidemic model that incorporates both the network heterogeneity and various countermeasures. Through analyzing the existence and stability of equilibrium solutions of the proposed ODE (Ordinary Differential Equation) system, the critical conditions that determine whether a rumor continuously propagates or becomes extinct are derived. Moreover, we concern about the cost of the main two types of countermeasures, i.e., Blocking rumors at influential users and spreading truth to clarify rumors. Employing the Pontryagin's maximum principle, we obtain the optimized countermeasures that ensures a rumor can become extinct at the end of an expected time period with lowest cost. Both the critical conditions and the optimized countermeasures provide a real-time decision reference to restrain the rumor spreading. Experiments based on Digg2009 dataset are conducted to evaluate the effectiveness of the proposed dynamic model and the efficiency of the optimized countermeasures.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
Rewiring 2 Links Is Enough: Accelerating Failure Recovery in Production Data Center Networks 重新布线链路就足够了:加速生产数据中心网络的故障恢复
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.64
Guo Chen, Youjian Zhao, Dan Pei, Dan Li
Failures are not uncommon in production data center networks (DCNs) nowadays, and it takes long time for the network to recover from a failure and find new forwarding paths, significantly impacting real time and interactive applications at the upper layer. The slow failure recovery is due to two primary reasons. First, there lacks immediate backup paths for downward links in DCN with multi-rooted tree topology. Second, distributed routing protocols in DCN take time to converge after failures. In this paper, we present a fault-tolerant DCN solution, called F2Tree, that can significantly improve the failure recovery time in current DCNs, only through a small amount of link rewiring and switch configuration changes. Because F2Tree does not change any existing software or hardware, it is readily deployed in production DCNs, where other existing proposals fail to achieve. Through testbed and emulation experiments, we show that F2Tree can greatly reduce the time of failure recovery by 78%. Our experimental results also show that, for partition-aggregate applications (popular in DCN) under various failure conditions, F2Tree reduces the ratio of deadline-missing requests by more than 96% compared to current DCNs.
如今,故障在生产数据中心网络(dcn)中并不少见,网络从故障中恢复并寻找新的转发路径需要很长时间,这对上层的实时和交互式应用程序产生了重大影响。故障恢复缓慢主要有两个原因。首先,在多根树结构的DCN中,下行链路缺乏即时备份路径。其次,DCN中的分布式路由协议在发生故障后需要一定的收敛时间。在本文中,我们提出了一种容错DCN解决方案,称为F2Tree,它可以显著提高当前DCN的故障恢复时间,只需通过少量的链路重新布线和交换机配置更改。由于F2Tree不改变任何现有的软件或硬件,因此它很容易部署在生产dcn中,而其他现有的建议无法实现这一点。通过测试和仿真实验表明,F2Tree可以将故障恢复时间大大缩短78%。我们的实验结果还表明,对于各种故障条件下的分区聚合应用程序(DCN中流行的应用程序),与当前的DCN相比,F2Tree将截止日期缺失请求的比例降低了96%以上。
{"title":"Rewiring 2 Links Is Enough: Accelerating Failure Recovery in Production Data Center Networks","authors":"Guo Chen, Youjian Zhao, Dan Pei, Dan Li","doi":"10.1109/ICDCS.2015.64","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.64","url":null,"abstract":"Failures are not uncommon in production data center networks (DCNs) nowadays, and it takes long time for the network to recover from a failure and find new forwarding paths, significantly impacting real time and interactive applications at the upper layer. The slow failure recovery is due to two primary reasons. First, there lacks immediate backup paths for downward links in DCN with multi-rooted tree topology. Second, distributed routing protocols in DCN take time to converge after failures. In this paper, we present a fault-tolerant DCN solution, called F2Tree, that can significantly improve the failure recovery time in current DCNs, only through a small amount of link rewiring and switch configuration changes. Because F2Tree does not change any existing software or hardware, it is readily deployed in production DCNs, where other existing proposals fail to achieve. Through testbed and emulation experiments, we show that F2Tree can greatly reduce the time of failure recovery by 78%. Our experimental results also show that, for partition-aggregate applications (popular in DCN) under various failure conditions, F2Tree reduces the ratio of deadline-missing requests by more than 96% compared to current DCNs.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles MAVR:无人机的代码重用、隐身攻击和缓解
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.71
Javid Habibi, Aditi Gupta, Stephen Carlsony, Ajay Panicker, E. Bertino
As embedded systems have increased in performance and reliability, their applications have expanded into new domains such as automated drone-based delivery mechanisms. Security of these drones, also referred to as unmanned aerial vehicles (UAVs), is crucial due to their use in many different domains. In this paper, we present a stealthy attack strategy that allows the attacker to change sensor values and modify the UAV navigation path. As the attack is stealthy, the system will continue to execute normally and thus the ground station or other monitoring entities and systems will not be able to detect that an attack is undergoing. With respect to defense, we propose a strategy that combines software and hardware techniques. At software level, we propose a fine grained randomization based approach that modifies the layout of the executable code and hinders code-reuse attack. To strengthen the security of our defense, we leverage a custom hardware platform designed and built by us. The platform isolates the code binary and randomized binary in such a way that the actual code being executed is never exposed for an attacker to analyze. We have implemented a prototype of this defense technique and present results to demonstrate the effectiveness and efficiency of this defense strategy.
随着嵌入式系统在性能和可靠性方面的提高,它们的应用已经扩展到新的领域,例如基于无人机的自动交付机制。这些无人机也被称为无人驾驶飞行器(uav),由于它们在许多不同领域的使用,其安全性至关重要。在本文中,我们提出了一种允许攻击者改变传感器值和修改无人机导航路径的隐形攻击策略。由于攻击是隐形的,系统将继续正常运行,因此地面站或其他监测实体和系统将无法探测到正在进行的攻击。在防御方面,我们提出了一种结合软件和硬件技术的策略。在软件层面,我们提出了一种基于细粒度随机化的方法,该方法可以修改可执行代码的布局并阻止代码重用攻击。为了加强我们的国防安全,我们利用我们自己设计和建造的定制硬件平台。该平台以这样一种方式隔离代码二进制和随机二进制,即永远不会暴露正在执行的实际代码以供攻击者分析。我们已经实现了这种防御技术的原型,并给出了结果来证明这种防御策略的有效性和效率。
{"title":"MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles","authors":"Javid Habibi, Aditi Gupta, Stephen Carlsony, Ajay Panicker, E. Bertino","doi":"10.1109/ICDCS.2015.71","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.71","url":null,"abstract":"As embedded systems have increased in performance and reliability, their applications have expanded into new domains such as automated drone-based delivery mechanisms. Security of these drones, also referred to as unmanned aerial vehicles (UAVs), is crucial due to their use in many different domains. In this paper, we present a stealthy attack strategy that allows the attacker to change sensor values and modify the UAV navigation path. As the attack is stealthy, the system will continue to execute normally and thus the ground station or other monitoring entities and systems will not be able to detect that an attack is undergoing. With respect to defense, we propose a strategy that combines software and hardware techniques. At software level, we propose a fine grained randomization based approach that modifies the layout of the executable code and hinders code-reuse attack. To strengthen the security of our defense, we leverage a custom hardware platform designed and built by us. The platform isolates the code binary and randomized binary in such a way that the actual code being executed is never exposed for an attacker to analyze. We have implemented a prototype of this defense technique and present results to demonstrate the effectiveness and efficiency of this defense strategy.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114572946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Combating Friend Spam Using Social Rejections 利用社交拒绝打击朋友垃圾邮件
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.32
Q. Cao, Michael Sirivianos, Xiaowei Yang, Kamesh Munagala
Unwanted friend requests in online social networks (OSNs), also known as friend spam, are among the most evasive malicious activities. Friend spam can result in OSN links that do not correspond to social relationship among users, thus pollute the underlying social graph upon which core OSN functionalities are built, including social search engine, ad targeting, and OSN defense systems. To effectively detect the fake accounts that act as friend spammers, we propose a system called Rejecto. It stems from the observation on social rejections in OSNs, i.e., Even well-maintained fake accounts inevitably have their friend requests rejected or they are reported by legitimate users. Our key insight is to partition the social graph into two regions such that the aggregate acceptance rate of friend requests from one region to the other is minimized. This design leads to reliable detection of a region that comprises friend spammers, regardless of the request collusion among the spammers. Meanwhile, it is resilient to other strategic manipulations. To efficiently obtain the graph cut, we extend the Kernighan-Lin heuristic and use it to iteratively detect the fake accounts that send out friend spam. Our evaluation shows that Rejecto can discern friend spammers under a broad range of scenarios and that it is computationally practical.
在线社交网络(OSNs)中不受欢迎的朋友请求,也被称为朋友垃圾邮件,是最具规避性的恶意活动之一。朋友垃圾邮件会导致与用户之间的社交关系不对应的OSN链接,从而污染底层的社交图谱,而这些社交图谱是构建OSN核心功能的基础,包括社交搜索引擎、广告定位、OSN防御系统等。为了有效地检测充当朋友垃圾邮件发送者的虚假账户,我们提出了一个名为Rejecto的系统。它源于对osn中社交拒绝的观察,即即使是维护良好的假账户,其好友请求也不可避免地会被拒绝或被合法用户举报。我们的关键见解是将社交图划分为两个区域,这样从一个区域到另一个区域的朋友请求的总接受率就会最小化。这种设计可以可靠地检测到包含朋友垃圾邮件发送者的区域,而不考虑垃圾邮件发送者之间的请求串通。与此同时,它还能抵御其他战略操纵。为了有效地获得图割,我们扩展了Kernighan-Lin启发式算法,并使用它来迭代检测发送朋友垃圾信息的虚假账户。我们的评估表明,Rejecto可以在广泛的场景下识别朋友垃圾邮件发送者,并且在计算上是实用的。
{"title":"Combating Friend Spam Using Social Rejections","authors":"Q. Cao, Michael Sirivianos, Xiaowei Yang, Kamesh Munagala","doi":"10.1109/ICDCS.2015.32","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.32","url":null,"abstract":"Unwanted friend requests in online social networks (OSNs), also known as friend spam, are among the most evasive malicious activities. Friend spam can result in OSN links that do not correspond to social relationship among users, thus pollute the underlying social graph upon which core OSN functionalities are built, including social search engine, ad targeting, and OSN defense systems. To effectively detect the fake accounts that act as friend spammers, we propose a system called Rejecto. It stems from the observation on social rejections in OSNs, i.e., Even well-maintained fake accounts inevitably have their friend requests rejected or they are reported by legitimate users. Our key insight is to partition the social graph into two regions such that the aggregate acceptance rate of friend requests from one region to the other is minimized. This design leads to reliable detection of a region that comprises friend spammers, regardless of the request collusion among the spammers. Meanwhile, it is resilient to other strategic manipulations. To efficiently obtain the graph cut, we extend the Kernighan-Lin heuristic and use it to iteratively detect the fake accounts that send out friend spam. Our evaluation shows that Rejecto can discern friend spammers under a broad range of scenarios and that it is computationally practical.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Weighted Overlay Design for Topic-Based Publish/Subscribe Systems on Geo-Distributed Data Centers 地理分布式数据中心基于主题的发布/订阅系统的加权覆盖设计
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.55
Chen Chen, Y. Tock, H. Jacobsen, R. Vitenberg
We incorporate underlay information into overlay design for topic-based publish/subscribe (pub/sub) systems on geo-distributed data centers. We propose the MinAvg-WTCO problem that optimizes the weighted average node degree while constructing a topic-connected overlay (TCO), i.e., Each topic induces a connected sub-overlay among all nodes interested in this topic. Most existing TCO designs are oblivious to the low-level network infrastructure and assume edge equivalence. We prove that MinAvg-WTCO is NP-complete and difficult to approximate within a logarithmic factor with regard to the number of nodes. We devise several approximation algorithms for MinAvg-WTCO using different design techniques. Both theoretical analysis and empirical evaluation show that our designed algorithms tread the balance between overlay quality and runtime cost. Our algorithms significantly outperform the state of the art for TCO design that ignores edge differences.
我们将底层信息整合到基于主题的地理分布式数据中心发布/订阅(pub/sub)系统的覆盖设计中。我们提出了MinAvg-WTCO问题,该问题在构建主题连接覆盖(TCO)的同时优化加权平均节点度,即每个主题在对该主题感兴趣的所有节点之间诱导一个连接的子覆盖。大多数现有的TCO设计忽略了底层网络基础设施,并假设边缘等效。我们证明了MinAvg-WTCO是np完全的,并且很难在节点数量的对数因子内近似。我们使用不同的设计技术为MinAvg-WTCO设计了几种近似算法。理论分析和实证分析表明,我们设计的算法在覆盖质量和运行成本之间取得了平衡。我们的算法明显优于忽略边缘差异的TCO设计的最新技术。
{"title":"Weighted Overlay Design for Topic-Based Publish/Subscribe Systems on Geo-Distributed Data Centers","authors":"Chen Chen, Y. Tock, H. Jacobsen, R. Vitenberg","doi":"10.1109/ICDCS.2015.55","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.55","url":null,"abstract":"We incorporate underlay information into overlay design for topic-based publish/subscribe (pub/sub) systems on geo-distributed data centers. We propose the MinAvg-WTCO problem that optimizes the weighted average node degree while constructing a topic-connected overlay (TCO), i.e., Each topic induces a connected sub-overlay among all nodes interested in this topic. Most existing TCO designs are oblivious to the low-level network infrastructure and assume edge equivalence. We prove that MinAvg-WTCO is NP-complete and difficult to approximate within a logarithmic factor with regard to the number of nodes. We devise several approximation algorithms for MinAvg-WTCO using different design techniques. Both theoretical analysis and empirical evaluation show that our designed algorithms tread the balance between overlay quality and runtime cost. Our algorithms significantly outperform the state of the art for TCO design that ignores edge differences.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128845352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On Privacy Preserving Partial Image Sharing 保护隐私的部分图像共享
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.95
Jianping He, Bin Liu, Xuan Bao, Hongxia Jin, G. Kesidis
Sharing photos through Online Social Networks becomes an increasingly popular fashion. However, users' privacy may be at stake when sensitive photos are shared improperly. This paper presents a dynamic privacy protection technique (named PuPPIeS) for image data where the data owner stipulates small private regions for sensitive objects (faces, SSN numbers, etc.) of a photo/image and sets different sharing policies for these partial regions with respect to different individuals. PuPPIeS is based on optimized reversible matrix perturbation of compressed image data. Hence it can naturally support frequently used image transformations. Our experiments show that our solution is effective for privacy protection and incurs only a small overhead for partial image sharing.
通过在线社交网络分享照片已成为一种日益流行的时尚。然而,当敏感照片被不当分享时,用户的隐私可能会受到威胁。本文提出了一种图像数据的动态隐私保护技术(命名为puppy),数据所有者为照片/图像的敏感对象(人脸、社会保险号等)规定小的私有区域,并针对不同的个体为这些局部区域设置不同的共享策略。小狗是基于压缩图像数据的优化可逆矩阵摄动。因此,它可以自然地支持经常使用的图像转换。我们的实验表明,我们的解决方案对隐私保护是有效的,并且对部分图像共享只产生很小的开销。
{"title":"On Privacy Preserving Partial Image Sharing","authors":"Jianping He, Bin Liu, Xuan Bao, Hongxia Jin, G. Kesidis","doi":"10.1109/ICDCS.2015.95","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.95","url":null,"abstract":"Sharing photos through Online Social Networks becomes an increasingly popular fashion. However, users' privacy may be at stake when sensitive photos are shared improperly. This paper presents a dynamic privacy protection technique (named PuPPIeS) for image data where the data owner stipulates small private regions for sensitive objects (faces, SSN numbers, etc.) of a photo/image and sets different sharing policies for these partial regions with respect to different individuals. PuPPIeS is based on optimized reversible matrix perturbation of compressed image data. Hence it can naturally support frequently used image transformations. Our experiments show that our solution is effective for privacy protection and incurs only a small overhead for partial image sharing.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"47 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Asynchronous Adaptive Task Allocation 异步自适应任务分配
Pub Date : 2015-06-01 DOI: 10.1109/ICDCS.2015.17
S. Kentros, Chadi Kari, A. Kiayias, A. Russell
We present a randomized algorithm for asynchronous task allocation, also known as the write-all or do-all problem. Our algorithm has work complexity O(n+k2 log3 k) with high probability, where n the number of tasks and k the number of processes that participate in the computation. Our solution uses O(n) shared memory space that supports atomic test-and-set operations and with high probability each participating process uses O(k) internal memory space. This is the first adaptive solution for the write-all problem that has work n plus some additive term which depends only on the number of participating processes k and not the size of the problem n.
我们提出了一种异步任务分配的随机算法,也称为全写或全做问题。我们的算法具有高概率的工作复杂度O(n+k2 log3k),其中n为任务数,k为参与计算的进程数。我们的解决方案使用O(n)个支持原子测试和设置操作的共享内存空间,并且每个参与进程很可能使用O(k)个内部内存空间。这是对全写问题的第一个自适应解这个问题有功n加上一些附加项它只取决于参与进程的数量k而不是问题的大小n。
{"title":"Asynchronous Adaptive Task Allocation","authors":"S. Kentros, Chadi Kari, A. Kiayias, A. Russell","doi":"10.1109/ICDCS.2015.17","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.17","url":null,"abstract":"We present a randomized algorithm for asynchronous task allocation, also known as the write-all or do-all problem. Our algorithm has work complexity O(n+k2 log3 k) with high probability, where n the number of tasks and k the number of processes that participate in the computation. Our solution uses O(n) shared memory space that supports atomic test-and-set operations and with high probability each participating process uses O(k) internal memory space. This is the first adaptive solution for the write-all problem that has work n plus some additive term which depends only on the number of participating processes k and not the size of the problem n.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127227063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 IEEE 35th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1