首页 > 最新文献

IEEE Transactions on Cloud Computing最新文献

英文 中文
Smart-to-Compress: A Predictive and Game-Theoretic Framework for Data Reduction Decisions 智能压缩:数据缩减决策的预测和博弈论框架
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-03 DOI: 10.1109/TCC.2026.3659933
Zhenrui He;Wenlong Tian;Zhixiong Xie;Dewen Zeng;Jianfeng Lu;Zhiyong Xu;Weijun Xiao;Yaping Wan
With the rapid growth of data, redundancy among different users in cloud environments has become increasingly prominent. Detecting and removing these redundant parts can effectively improve storage efficiency. But these processes may dramatically degrade the system performance, especially when dealing with similar data. Although deduplication and delta compression are common data reduction techniques, their high overhead can outweigh the benefits. As a result, users often cannot determine in advance whether compression is worthwhile for their datasets. Some approaches have attempted to solve this, but each has important limitations. Danny Harnik et al. proposed a sampling-based deduplication estimation method using linear programming, which efficiently estimates redundancy from exact duplicates. However, it fails to capture redundancy arising from similar data, thus underestimating the full compression potential. To address this limitation, we propose Smart-to-Compress, a predictive compression decision framework. We introduce the Super Feature Frequency Histogram (SFH) to capture redundancy among similar data. Combined with the Duplication Frequency Histogram (DFH), our method estimates the overall Data Reduction Ratio (DRR) without scanning the entire dataset. Furthermore, we design a game-theoretic decision model to weigh compression benefits against predicted costs, providing users with guidance on whether compression should be applied. Experiments on real-world datasets show that our method accurately predicts compression value, reduces unnecessary overhead, and offers reliable decision-making support for users.
随着数据的快速增长,云环境中不同用户之间的冗余问题日益突出。对这些冗余部件进行检测和剔除,可以有效提高存储效率。但是,这些进程可能会极大地降低系统性能,特别是在处理类似数据时。虽然重复数据删除和增量压缩是常见的数据缩减技术,但它们的高开销可能超过其好处。因此,用户通常无法事先确定压缩数据集是否值得。一些方法试图解决这个问题,但每种方法都有重要的局限性。Danny Harnik等人提出了一种基于抽样的重复数据删除估计方法,该方法利用线性规划有效地估计精确重复数据的冗余度。然而,它无法捕获类似数据产生的冗余,从而低估了全部压缩潜力。为了解决这一限制,我们提出了一种预测压缩决策框架Smart-to-Compress。我们引入了超特征频率直方图(superfeature Frequency Histogram, SFH)来捕获相似数据之间的冗余。结合重复频率直方图(DFH),我们的方法在不扫描整个数据集的情况下估计整体数据减少比(DRR)。此外,我们设计了一个博弈论决策模型来权衡压缩收益与预测成本,为用户提供是否应该使用压缩的指导。在实际数据集上的实验表明,该方法能够准确预测压缩值,减少不必要的开销,为用户提供可靠的决策支持。
{"title":"Smart-to-Compress: A Predictive and Game-Theoretic Framework for Data Reduction Decisions","authors":"Zhenrui He;Wenlong Tian;Zhixiong Xie;Dewen Zeng;Jianfeng Lu;Zhiyong Xu;Weijun Xiao;Yaping Wan","doi":"10.1109/TCC.2026.3659933","DOIUrl":"https://doi.org/10.1109/TCC.2026.3659933","url":null,"abstract":"With the rapid growth of data, redundancy among different users in cloud environments has become increasingly prominent. Detecting and removing these redundant parts can effectively improve storage efficiency. But these processes may dramatically degrade the system performance, especially when dealing with similar data. Although deduplication and delta compression are common data reduction techniques, their high overhead can outweigh the benefits. As a result, users often cannot determine in advance whether compression is worthwhile for their datasets. Some approaches have attempted to solve this, but each has important limitations. Danny Harnik et al. proposed a sampling-based deduplication estimation method using linear programming, which efficiently estimates redundancy from exact duplicates. However, it fails to capture redundancy arising from similar data, thus underestimating the full compression potential. To address this limitation, we propose Smart-to-Compress, a predictive compression decision framework. We introduce the Super Feature Frequency Histogram (SFH) to capture redundancy among similar data. Combined with the Duplication Frequency Histogram (DFH), our method estimates the overall Data Reduction Ratio (DRR) without scanning the entire dataset. Furthermore, we design a game-theoretic decision model to weigh compression benefits against predicted costs, providing users with guidance on whether compression should be applied. Experiments on real-world datasets show that our method accurately predicts compression value, reduces unnecessary overhead, and offers reliable decision-making support for users.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"14 1","pages":"406-418"},"PeriodicalIF":5.0,"publicationDate":"2026-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147375017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side Channel Attacks on Resource-Constrained Devices Enabled Through Secure Cloud Outsourcing 通过安全云外包实现资源受限设备侧信道攻击
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-28 DOI: 10.1109/TCC.2026.3658767
Yuling Luo;Qiuhui Li;Shunsheng Zhang;Junxiu Liu;Sheng Qin;Qiang Fu;Zhen Min
Side-Channel Attacks (SCAs) now require more side-channel traces for successful execution, which places more stringent requirements on the storage capacity and computational ability of the devices on which SCAs are based. To reduce the storage and computational pressure on the local device where SCAs are performed on collected leakage traces from an attacking device, this paper proposes a secure cloud outsourcing protocol to perform Principal Component Analysis (PCA) dimensionality reduction on the side-channel traces. Secure cloud outsourcing is applied for the computationally intensive matrix multiplication and eigenvalue decomposition of the PCA process. The proposed protocol has been proven to balance privacy, efficiency, and correctness. Through experiments on CW and Grizzly datasets, it shows that 1) Correlation Power Analysis (CPA) with PCA effectively mitigates noise, improving the probability of a successful CPA; 2) Cloud-based PCA significantly reduces the computational complexity of local devices; 3) Template Attacks (TAs) are performed on leakage trace data using cloud-based PCA, client-based PCA, Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA). The attack results of cloud-based and client-based PCA are basically identical, and they achieve lower Guessing-Entropy (GE) than ICA. Both theoretical analysis and experimental results demonstrate the feasibility and advantages of this protocol.
侧信道攻击(sca)现在需要更多的侧信道跟踪才能成功执行,这对sca所基于的设备的存储容量和计算能力提出了更严格的要求。为了减少本地设备的存储和计算压力,在对攻击设备收集的泄漏迹线执行sca时,本文提出了一种安全的云外包协议,用于对侧信道迹线执行主成分分析(PCA)降维。安全云外包应用于主成分分析过程的计算密集型矩阵乘法和特征值分解。所提出的协议已被证明能够平衡隐私、效率和正确性。通过在CW和Grizzly数据集上的实验,结果表明:1)结合PCA的相关功率分析(CPA)能够有效地降低噪声,提高CPA成功的概率;2)基于云的PCA显著降低了本地设备的计算复杂度;3)采用基于云的PCA、基于客户端的PCA、线性判别分析(LDA)和独立成分分析(ICA)对泄漏痕迹数据进行模板攻击(TAs)。基于云的PCA和基于客户端的PCA的攻击结果基本相同,而且它们的猜测熵(guess - entropy, GE)比ICA低。理论分析和实验结果都证明了该方案的可行性和优越性。
{"title":"Side Channel Attacks on Resource-Constrained Devices Enabled Through Secure Cloud Outsourcing","authors":"Yuling Luo;Qiuhui Li;Shunsheng Zhang;Junxiu Liu;Sheng Qin;Qiang Fu;Zhen Min","doi":"10.1109/TCC.2026.3658767","DOIUrl":"https://doi.org/10.1109/TCC.2026.3658767","url":null,"abstract":"Side-Channel Attacks (SCAs) now require more side-channel traces for successful execution, which places more stringent requirements on the storage capacity and computational ability of the devices on which SCAs are based. To reduce the storage and computational pressure on the local device where SCAs are performed on collected leakage traces from an attacking device, this paper proposes a secure cloud outsourcing protocol to perform Principal Component Analysis (PCA) dimensionality reduction on the side-channel traces. Secure cloud outsourcing is applied for the computationally intensive matrix multiplication and eigenvalue decomposition of the PCA process. The proposed protocol has been proven to balance privacy, efficiency, and correctness. Through experiments on CW and Grizzly datasets, it shows that 1) Correlation Power Analysis (CPA) with PCA effectively mitigates noise, improving the probability of a successful CPA; 2) Cloud-based PCA significantly reduces the computational complexity of local devices; 3) Template Attacks (TAs) are performed on leakage trace data using cloud-based PCA, client-based PCA, Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA). The attack results of cloud-based and client-based PCA are basically identical, and they achieve lower Guessing-Entropy (GE) than ICA. Both theoretical analysis and experimental results demonstrate the feasibility and advantages of this protocol.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"14 1","pages":"393-405"},"PeriodicalIF":5.0,"publicationDate":"2026-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147375018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Weaknesses of a Lightweight Privacy-Preserving Edge Computing Based Ciphertext Retrieval Scheme 基于边缘计算的轻量级保密密文检索方案的安全缺陷
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-12 DOI: 10.1109/TCC.2026.3651561
Y. Sreenivasa Rao
Most recently, Wang et al. proposed (in IEEE TCC, doi: 10.1109/TCC.2024.3461732) a lightweight privacy-preserving ciphertext retrieval scheme based on edge computing (termed as LPCR) by combining ciphertext policy attribute-based encryption and searchable encryption techniques. The authors claimed that LPCR can achieve the security of chosen plaintext attack (CPA) and chosen keyword attack (CKA), and resist collusion attack. However, by presenting a concrete plaintext recovery attack (PRA), we demonstrate that every decryption key has the ability to decrypt any user’s ciphertext and get the plaintext document encrypted in it. Next, using PRA, we illustrate that LPCR is vulnerable to CPA, CKA and collusion attacks.
最近,Wang等人(在IEEE TCC, doi: 10.1109/TCC.2024.3461732)提出了一种基于边缘计算的轻量级隐私保护密文检索方案(称为LPCR),该方案结合了基于密文策略属性的加密和可搜索的加密技术。作者声称,LPCR可以实现选择明文攻击(CPA)和选择关键字攻击(CKA)的安全性,并能抵抗共谋攻击。然而,通过提出具体的明文恢复攻击(PRA),我们证明了每个解密密钥都具有解密任何用户的密文并在其中加密明文文档的能力。接下来,我们使用PRA来说明LPCR容易受到CPA、CKA和共谋攻击。
{"title":"Security Weaknesses of a Lightweight Privacy-Preserving Edge Computing Based Ciphertext Retrieval Scheme","authors":"Y. Sreenivasa Rao","doi":"10.1109/TCC.2026.3651561","DOIUrl":"https://doi.org/10.1109/TCC.2026.3651561","url":null,"abstract":"Most recently, Wang et al. proposed (in IEEE TCC, doi: 10.1109/TCC.2024.3461732) a lightweight privacy-preserving ciphertext retrieval scheme based on edge computing (termed as LPCR) by combining ciphertext policy attribute-based encryption and searchable encryption techniques. The authors claimed that LPCR can achieve the security of chosen plaintext attack (CPA) and chosen keyword attack (CKA), and resist collusion attack. However, by presenting a concrete plaintext recovery attack (PRA), we demonstrate that every decryption key has the ability to decrypt any user’s ciphertext and get the plaintext document encrypted in it. Next, using PRA, we illustrate that LPCR is vulnerable to CPA, CKA and collusion attacks.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"14 1","pages":"391-392"},"PeriodicalIF":5.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147375016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Adaptive Workflow Scheduling With Graph Learning and Transformer-Driven Reinforcement in Heterogeneous Clouds 异构云中基于图学习和变压器驱动强化的实时自适应工作流调度
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-09 DOI: 10.1109/TCC.2025.3642240
Fan Ding;Houxiang Wang
Scheduling workflows with complex dependencies under dynamic resource availability in heterogeneous clouds remains highly challenging. Static and heuristic methods often fail to adapt to workload and resource changes, resulting in higher makespan, lower utilization, and increased cost. We propose GDST-PPO, a graph-based dynamic scheduling framework that encodes workflow DAGs with a GNN, models temporal and resource contexts via a Transformer with sparse attention, and optimizes decisions using PPO with a multi-objective reward. We perform extensive experiments on five benchmark workflows under realistic heterogeneous cloud settings. Across six baselines, GDST-PPO achieves up to 10.3% lower makespan, 18.1% higher resource utilization, and an 11.4% gain in overall score. In absolute terms, it attains a makespan of 7,168,820 s, resource utilization of 39.55%, and an overall score of 6.62 on our benchmark, demonstrating efficient, flexible, and cost-effective cloud workflow management.
在异构云中,在动态资源可用性下调度具有复杂依赖关系的工作流仍然具有很大的挑战性。静态和启发式方法通常不能适应工作负载和资源的变化,从而导致更高的完工时间、更低的利用率和更高的成本。本文提出了一种基于图形的动态调度框架GDST-PPO,该框架使用GNN对工作流dag进行编码,通过具有稀疏注意力的Transformer对时间和资源上下文进行建模,并使用具有多目标奖励的PPO来优化决策。我们在现实的异构云设置下对五个基准工作流进行了广泛的实验。在六个基线中,GDST-PPO的最大完工时间降低了10.3%,资源利用率提高了18.1%,总体得分提高了11.4%。绝对时间跨度为7168820秒,资源利用率为39.55%,基准测试总分为6.62分,展示了高效、灵活、高性价比的云工作流管理。
{"title":"Real-Time Adaptive Workflow Scheduling With Graph Learning and Transformer-Driven Reinforcement in Heterogeneous Clouds","authors":"Fan Ding;Houxiang Wang","doi":"10.1109/TCC.2025.3642240","DOIUrl":"https://doi.org/10.1109/TCC.2025.3642240","url":null,"abstract":"Scheduling workflows with complex dependencies under dynamic resource availability in heterogeneous clouds remains highly challenging. Static and heuristic methods often fail to adapt to workload and resource changes, resulting in higher makespan, lower utilization, and increased cost. We propose GDST-PPO, a graph-based dynamic scheduling framework that encodes workflow DAGs with a GNN, models temporal and resource contexts via a Transformer with sparse attention, and optimizes decisions using PPO with a multi-objective reward. We perform extensive experiments on five benchmark workflows under realistic heterogeneous cloud settings. Across six baselines, GDST-PPO achieves up to 10.3% lower makespan, 18.1% higher resource utilization, and an 11.4% gain in overall score. In absolute terms, it attains a makespan of 7,168,820 s, resource utilization of 39.55%, and an overall score of 6.62 on our benchmark, demonstrating efficient, flexible, and cost-effective cloud workflow management.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"14 1","pages":"376-390"},"PeriodicalIF":5.0,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147375014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer Learning-Enabled System for Drone Medicine Delivery Based on Spatio-Temporal Remote Sensing Data in Edge Cloud Networks 边缘云网络中基于时空遥感数据的无人机送药迁移学习系统
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-01 DOI: 10.1109/TCC.2025.3639073
Abdullah Lakhan;Tor-Morten Grønli;Ahmet Soylu;Ghulam Muhammad;Qurat-ul-ain Mastoi;Huaming Wu
These days, satellite remote sensing data is employed for different drone applications. The main goal is to provide imaginary information about electromagnetic locations and patterns, along with insights into geolocations on Earth. The Internet of Drone Things (IoDT) exploits remote sensing data to deliver medicine from source to destination. However, many existing medicine delivery systems based on drones need longer execution times and more efficiency in delivering medicine to the right destinations. This paper presents transfer learning, which empowers a spatiotemporal remote sensing data training system for medicine delivery in edge cloud networks based on IoDT applications. The objective is to deliver the medicine to the original destination with the highest score and process all drone tasks based on their given deadlines. We present the offloading spatiotemporal training and scheduling (OSPTS) algorithm methodology that completes the data collection process and medicine delivery in different locations. Therefore, we solve the problem as a combinatorial problem and find the optimal solution based on searching and convolutional neural networks (CNN). Transfer learning and convolutional neural networks are sub-schemes of the OSPTS that train the remote sensing data on edge nodes and point clouds for optimal medicine delivery. Simulation results show that the OSPTS obtained the highest score for medicine delivery in the correct position with less processing time than existing systems.
如今,卫星遥感数据被用于不同的无人机应用。主要目标是提供关于电磁位置和模式的假想信息,以及对地球地理位置的洞察。无人机物联网(IoDT)利用遥感数据将药品从源头运送到目的地。然而,许多现有的基于无人机的药物递送系统需要更长的执行时间和更高的效率,才能将药物运送到正确的目的地。本文提出了一种基于迁移学习的时空遥感数据训练系统,用于基于IoDT应用的边缘云网络中的药物交付。目标是将药物以最高分送到原始目的地,并根据给定的截止日期处理所有无人机任务。我们提出了一种卸载时空训练和调度(OSPTS)算法方法,该方法完成了数据收集过程和不同地点的药物递送。因此,我们将该问题作为一个组合问题来解决,并基于搜索和卷积神经网络(CNN)来寻找最优解。迁移学习和卷积神经网络是OSPTS的子方案,用于在边缘节点和点云上训练遥感数据以实现最佳药物递送。仿真结果表明,与现有系统相比,该系统处理时间更短,在正确位置上获得了最高分数。
{"title":"Transfer Learning-Enabled System for Drone Medicine Delivery Based on Spatio-Temporal Remote Sensing Data in Edge Cloud Networks","authors":"Abdullah Lakhan;Tor-Morten Grønli;Ahmet Soylu;Ghulam Muhammad;Qurat-ul-ain Mastoi;Huaming Wu","doi":"10.1109/TCC.2025.3639073","DOIUrl":"https://doi.org/10.1109/TCC.2025.3639073","url":null,"abstract":"These days, satellite remote sensing data is employed for different drone applications. The main goal is to provide imaginary information about electromagnetic locations and patterns, along with insights into geolocations on Earth. The Internet of Drone Things (IoDT) exploits remote sensing data to deliver medicine from source to destination. However, many existing medicine delivery systems based on drones need longer execution times and more efficiency in delivering medicine to the right destinations. This paper presents transfer learning, which empowers a spatiotemporal remote sensing data training system for medicine delivery in edge cloud networks based on IoDT applications. The objective is to deliver the medicine to the original destination with the highest score and process all drone tasks based on their given deadlines. We present the offloading spatiotemporal training and scheduling (OSPTS) algorithm methodology that completes the data collection process and medicine delivery in different locations. Therefore, we solve the problem as a combinatorial problem and find the optimal solution based on searching and convolutional neural networks (CNN). Transfer learning and convolutional neural networks are sub-schemes of the OSPTS that train the remote sensing data on edge nodes and point clouds for optimal medicine delivery. Simulation results show that the OSPTS obtained the highest score for medicine delivery in the correct position with less processing time than existing systems.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"14 1","pages":"419-431"},"PeriodicalIF":5.0,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147375015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRKC: Deep Reinforcement Learning Enhanced Microservice Scheduling on Kubernetes Clusters in Cloud-Edge Environment 深度强化学习增强Kubernetes集群在云边缘环境下的微服务调度
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TCC.2025.3624031
Jian Jiang;Qianmu Li;Pengchuan Wang;Yunhuai Liu
In the rapidly evolving landscape of cloud-edge computing, efficient resource scheduling across Kubernetes clusters is essential for optimizing microservice deployment. Traditional scheduling methods, e.g., heuristic and meta-heuristic algorithms, often struggle with the dynamic and heterogeneous nature of cloud-edge environments, relying on fixed parameters and lacking adaptability. We propose and implement DRKC, a novel deep reinforcement learning-based approach that addresses these challenges by improving resource utilization and balancing workloads. We model the scheduling problem as a Markov decision process, enabling DRKC to automatically learn optimal scheduling policies from real-time system data without relying on predefined heuristics. The work synthesizes state information from multiple clusters, using multidimensional resource awareness to effectively respond to changing conditions. We evaluate our performance in three Kubernetes clusters with thirteen nodes and ninety-six test applications with different resource requirements. Experimental results validate the effectiveness of DRKC in enhancing overall resource efficiency and achieving superior load balancing across cloud-edge environments.
在快速发展的云边缘计算环境中,跨Kubernetes集群的高效资源调度对于优化微服务部署至关重要。传统的调度方法,如启发式和元启发式算法,往往难以适应云边缘环境的动态性和异构性,依赖于固定的参数,缺乏适应性。我们提出并实现了DRKC,这是一种新颖的基于深度强化学习的方法,通过提高资源利用率和平衡工作负载来解决这些挑战。我们将调度问题建模为马尔可夫决策过程,使DRKC能够从实时系统数据中自动学习最优调度策略,而不依赖于预定义的启发式。这项工作综合了来自多个集群的状态信息,利用多维资源感知来有效地响应不断变化的条件。我们在三个具有13个节点的Kubernetes集群和96个具有不同资源需求的测试应用程序中评估我们的性能。实验结果验证了DRKC在提高整体资源效率和实现跨云边缘环境的卓越负载平衡方面的有效性。
{"title":"DRKC: Deep Reinforcement Learning Enhanced Microservice Scheduling on Kubernetes Clusters in Cloud-Edge Environment","authors":"Jian Jiang;Qianmu Li;Pengchuan Wang;Yunhuai Liu","doi":"10.1109/TCC.2025.3624031","DOIUrl":"https://doi.org/10.1109/TCC.2025.3624031","url":null,"abstract":"In the rapidly evolving landscape of cloud-edge computing, efficient resource scheduling across Kubernetes clusters is essential for optimizing microservice deployment. Traditional scheduling methods, e.g., heuristic and meta-heuristic algorithms, often struggle with the dynamic and heterogeneous nature of cloud-edge environments, relying on fixed parameters and lacking adaptability. We propose and implement DRKC, a novel deep reinforcement learning-based approach that addresses these challenges by improving resource utilization and balancing workloads. We model the scheduling problem as a Markov decision process, enabling DRKC to automatically learn optimal scheduling policies from real-time system data without relying on predefined heuristics. The work synthesizes state information from multiple clusters, using multidimensional resource awareness to effectively respond to changing conditions. We evaluate our performance in three Kubernetes clusters with thirteen nodes and ninety-six test applications with different resource requirements. Experimental results validate the effectiveness of DRKC in enhancing overall resource efficiency and achieving superior load balancing across cloud-edge environments.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 4","pages":"1472-1486"},"PeriodicalIF":5.0,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Budget-Feasible Clock Mechanism for Hierarchical Computation Offloading in Edge-Vehicle Collaborative Computing 边缘车辆协同计算中分层计算卸载的预算可行时钟机制
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-14 DOI: 10.1109/TCC.2025.3621432
Xi Liu;Jun Liu;Weidong Li
We consider the edge-vehicle computing system (EVCS), where the combination of edge computing and vehicle computing takes respective advantages to provide various services. We address the problem of computation offloading in EVSC, where the computing tasks and the sensing tasks with limited budgets are offloaded to edge servers and vehicles. The resource-sharing model is proposed, where sensing resources of one vehicle are shared by multiple tasks. We consider the vehicle hierarchy, where vehicles with different equipment accuracy are classified into different hierarchies. A sensing task has different values and different demands for different hierarchies. A budget-feasible mechanism based on the clock auction is proposed. We show our proposed mechanism is strategy-proof and group strategy-proof, this drives the system into an equilibrium. In addition, the proposed mechanism achieves individual rationality, budget balance, and consumer sovereignty. The proposed mechanism consists of two algorithms that are based on the idea of dominant resource and iteration to improve resource utilization and reduce costs. Furthermore, the approximate ratios of the two allocation algorithms are analyzed. Experimental results demonstrate that the proposed mechanism achieves the near-optimal value and brings higher utility for participants.
我们考虑边缘车辆计算系统(EVCS),其中边缘计算和车辆计算相结合,各具优势,提供各种服务。我们解决了EVSC中的计算卸载问题,其中预算有限的计算任务和传感任务被卸载到边缘服务器和车辆上。提出了资源共享模型,将一辆车的传感资源由多个任务共享。我们考虑车辆层次,将装备精度不同的车辆划分到不同的层次。不同层次的感知任务具有不同的价值和不同的需求。提出了一种基于时钟拍卖的预算可行机制。我们证明了我们提出的机制是策略证明和群体策略证明,这推动系统进入均衡。此外,该机制还实现了个人理性、预算平衡和消费者主权。该机制包括基于优势资源和迭代思想的两种算法,以提高资源利用率和降低成本。进一步分析了两种分配算法的近似比值。实验结果表明,所提出的机制达到了接近最优值,为参与者带来了更高的效用。
{"title":"Budget-Feasible Clock Mechanism for Hierarchical Computation Offloading in Edge-Vehicle Collaborative Computing","authors":"Xi Liu;Jun Liu;Weidong Li","doi":"10.1109/TCC.2025.3621432","DOIUrl":"https://doi.org/10.1109/TCC.2025.3621432","url":null,"abstract":"We consider the edge-vehicle computing system (EVCS), where the combination of edge computing and vehicle computing takes respective advantages to provide various services. We address the problem of computation offloading in EVSC, where the computing tasks and the sensing tasks with limited budgets are offloaded to edge servers and vehicles. The resource-sharing model is proposed, where sensing resources of one vehicle are shared by multiple tasks. We consider the vehicle hierarchy, where vehicles with different equipment accuracy are classified into different hierarchies. A sensing task has different values and different demands for different hierarchies. A budget-feasible mechanism based on the clock auction is proposed. We show our proposed mechanism is strategy-proof and group strategy-proof, this drives the system into an equilibrium. In addition, the proposed mechanism achieves individual rationality, budget balance, and consumer sovereignty. The proposed mechanism consists of two algorithms that are based on the idea of dominant resource and iteration to improve resource utilization and reduce costs. Furthermore, the approximate ratios of the two allocation algorithms are analyzed. Experimental results demonstrate that the proposed mechanism achieves the near-optimal value and brings higher utility for participants.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 4","pages":"1458-1471"},"PeriodicalIF":5.0,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Conditional Privacy-Preserving Scheme for VANET Communications 面向VANET通信的轻量级条件隐私保护方案
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-19 DOI: 10.1109/TCC.2025.3612092
Xiaodong Shen;Jianchang Lai;Jinguang Han;Liquan Chen
As a crucial component of intelligent transportation systems, VANETs are essential for enhancing road safety and enabling efficient traffic management. To ensure secure communication, vehicles often use pseudonyms to protect their identity privacy. However, unconditional anonymity can hinder accountability, making it very necessary to provide conditional privacy protection for vehicles. The conditional privacy-preserving technology not only protects the identity privacy of legitimate vehicles, but also can trace the real identity of malicious vehicles. Some existing schemes lack conditional privacy protection or have large computation and communication costs, which makes them unsuitable for resource-constrained VANETs environments. Hence, we improve the current schnorr-based aggregate signature by eliminating bilinear pairing operations, optimizing the aggregation procedure for batch verification and propose a lightweight certificateless-based aggregate signature scheme (ECPP-CLAS) for VANETs. In our scheme, the aggregation enables multiple signatures to be compressed into an aggregated signature and verified simultaneously, thereby reducing communication consumption, trusted entity generates the pseudonym for the corresponding vehicle through special construction to meet the conditional privacy-preserving requirement. The security analysis and performance evaluation show that our proposed scheme can meet the expected security objectives and lightweight requirements.
作为智能交通系统的重要组成部分,vanet对于提高道路安全和实现高效交通管理至关重要。为了确保安全通信,车辆通常使用假名来保护其身份隐私。然而,无条件匿名可能会阻碍问责制,因此非常有必要为车辆提供有条件的隐私保护。条件隐私保护技术不仅保护了合法车辆的身份隐私,而且可以追踪恶意车辆的真实身份。现有的一些方案缺乏条件隐私保护或计算和通信成本大,不适合资源受限的vanet环境。因此,我们通过消除双线性配对操作来改进当前基于schnorr的聚合签名,优化聚合过程以进行批量验证,并提出了一种用于VANETs的轻量级无证书聚合签名方案(ECPP-CLAS)。在我们的方案中,聚合可以将多个签名压缩成一个聚合签名并同时进行验证,从而减少通信消耗,可信实体通过特殊构造生成对应车辆的假名,以满足有条件的隐私保护要求。安全性分析和性能评估表明,该方案能够满足预期的安全目标和轻量级要求。
{"title":"Lightweight Conditional Privacy-Preserving Scheme for VANET Communications","authors":"Xiaodong Shen;Jianchang Lai;Jinguang Han;Liquan Chen","doi":"10.1109/TCC.2025.3612092","DOIUrl":"https://doi.org/10.1109/TCC.2025.3612092","url":null,"abstract":"As a crucial component of intelligent transportation systems, VANETs are essential for enhancing road safety and enabling efficient traffic management. To ensure secure communication, vehicles often use pseudonyms to protect their identity privacy. However, unconditional anonymity can hinder accountability, making it very necessary to provide conditional privacy protection for vehicles. The conditional privacy-preserving technology not only protects the identity privacy of legitimate vehicles, but also can trace the real identity of malicious vehicles. Some existing schemes lack conditional privacy protection or have large computation and communication costs, which makes them unsuitable for resource-constrained VANETs environments. Hence, we improve the current schnorr-based aggregate signature by eliminating bilinear pairing operations, optimizing the aggregation procedure for batch verification and propose a lightweight certificateless-based aggregate signature scheme (ECPP-CLAS) for VANETs. In our scheme, the aggregation enables multiple signatures to be compressed into an aggregated signature and verified simultaneously, thereby reducing communication consumption, trusted entity generates the pseudonym for the corresponding vehicle through special construction to meet the conditional privacy-preserving requirement. The security analysis and performance evaluation show that our proposed scheme can meet the expected security objectives and lightweight requirements.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 4","pages":"1487-1497"},"PeriodicalIF":5.0,"publicationDate":"2025-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on “Blockchain-Assisted Public-Key Encryption With Keyword Search Against Keyword Guessing Attacks for Cloud Storage” 关于“针对云存储的关键字搜索的区块链辅助公钥加密”的评论
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 DOI: 10.1109/TCC.2025.3604552
Keita Emura
As a variant of PEKS (Public key Encryption with Keyword Search), Zhang et al. (IEEE Transactions on Cloud Computing 2021) introduced a secure and efficient PEKS scheme called SEPSE, where servers issue a servers-derived keyword to a sender or a receiver. In this article, we show that information of keyword is revealed from trapdoor when an adversary is allowed to issue servers-derived keyword queries twice.
作为PEKS (Public key Encryption with Keyword Search)的一种变体,Zhang等人(IEEE Transactions on Cloud Computing 2021)引入了一种安全高效的PEKS方案,称为SEPSE,其中服务器向发送方或接收方发出服务器派生的关键字。在本文中,我们将展示当攻击者被允许两次发出服务器派生的关键字查询时,关键字信息将从陷阱门泄露。
{"title":"Comments on “Blockchain-Assisted Public-Key Encryption With Keyword Search Against Keyword Guessing Attacks for Cloud Storage”","authors":"Keita Emura","doi":"10.1109/TCC.2025.3604552","DOIUrl":"https://doi.org/10.1109/TCC.2025.3604552","url":null,"abstract":"As a variant of PEKS (Public key Encryption with Keyword Search), Zhang et al. (IEEE Transactions on Cloud Computing 2021) introduced a secure and efficient PEKS scheme called SEPSE, where servers issue a servers-derived keyword to a sender or a receiver. In this article, we show that information of keyword is revealed from trapdoor when an adversary is allowed to issue servers-derived keyword queries twice.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 4","pages":"1498-1499"},"PeriodicalIF":5.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forward-Secure Multi-User Graph Searchable Encryption for Exact Shortest Path Queries 精确最短路径查询的前向安全多用户图可搜索加密
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1109/TCC.2025.3599412
Weixiao Wang;Qing Fan;Chuan Zhang;Cong Zuo;Liehuang Zhu
The rapid development of cloud computing and increasing adoption of unstructured data impose higher requirements on cloud servers to deliver advanced query capabilities tailored for protected complex data. To provide outsourced graph privacy and support the shortest path query, a cornerstone of graph computing, various graph searchable encryption (GSE) schemes have been proposed. However, those GSE schemes are only for single-user setting and barely keep forward security, limiting data sharing and value extraction. Therefore, we propose a forward-secure GSE scheme for multi-user querying the exact shortest path. Specifically, our designed encryption structure seamlessly combines the randomizable distributed key-homomorphic pseudorandom function (RDPRF) for multi-user authentication and reduces database update. We then build a dual-server architecture with secure equality test protocol for query. To our knowledge, our GSE scheme is the first to guarantee forward security without a trusted proxy and support multi-user querying the exact shortest path. We formalize leakage functions and model the dynamic multi-user GSE scheme. Formal security proof is offered under reasonable leakage. Finally, we conduct experiments on ten real-world graph datasets with different scales and exemplify the feasibility of our scheme.
云计算的快速发展和越来越多地采用非结构化数据对云服务器提出了更高的要求,以提供为受保护的复杂数据量身定制的高级查询功能。为了提供外包的图隐私和支持最短路径查询(图计算的基石),各种图可搜索加密(GSE)方案被提出。然而,这些GSE方案仅适用于单用户设置,几乎不能保证前向安全性,限制了数据共享和价值提取。因此,我们提出了一种多用户查询精确最短路径的前向安全GSE方案。具体来说,我们设计的加密结构无缝地结合了用于多用户身份验证的随机分布式密钥同态伪随机函数(RDPRF),并减少了数据库更新。然后,我们构建了一个双服务器架构,并使用安全相等性测试协议进行查询。据我们所知,我们的GSE方案是第一个在没有可信代理的情况下保证转发安全性并支持多用户查询精确的最短路径的方案。我们形式化了泄漏函数,并建立了动态多用户GSE方案的模型。在合理的泄漏情况下提供正式的安全证明。最后,我们在10个不同尺度的真实图形数据集上进行了实验,验证了我们方案的可行性。
{"title":"Forward-Secure Multi-User Graph Searchable Encryption for Exact Shortest Path Queries","authors":"Weixiao Wang;Qing Fan;Chuan Zhang;Cong Zuo;Liehuang Zhu","doi":"10.1109/TCC.2025.3599412","DOIUrl":"https://doi.org/10.1109/TCC.2025.3599412","url":null,"abstract":"The rapid development of cloud computing and increasing adoption of unstructured data impose higher requirements on cloud servers to deliver advanced query capabilities tailored for protected complex data. To provide outsourced graph privacy and support the shortest path query, a cornerstone of graph computing, various graph searchable encryption (GSE) schemes have been proposed. However, those GSE schemes are only for single-user setting and barely keep forward security, limiting data sharing and value extraction. Therefore, we propose a forward-secure GSE scheme for multi-user querying the exact shortest path. Specifically, our designed encryption structure seamlessly combines the randomizable distributed key-homomorphic pseudorandom function (RDPRF) for multi-user authentication and reduces database update. We then build a dual-server architecture with secure equality test protocol for query. To our knowledge, our GSE scheme is the first to guarantee forward security without a trusted proxy and support multi-user querying the exact shortest path. We formalize leakage functions and model the dynamic multi-user GSE scheme. Formal security proof is offered under reasonable leakage. Finally, we conduct experiments on ten real-world graph datasets with different scales and exemplify the feasibility of our scheme.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 4","pages":"1446-1457"},"PeriodicalIF":5.0,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1