首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Distributionally Robust Edge Learning with Dirichlet Process Prior 基于Dirichlet过程先验的分布鲁棒边缘学习
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00016
Zhaofeng Zhang, Yue Chen, Junshan Zhang
In order to meet the real-time performance requirements, intelligent decisions in many IoT applications must take place right here right now at the network edge. The conventional cloud-based learning approach would not be able to keep up with the demands in achieving edge intelligence in these applications. Nevertheless, pushing the artificial intelligence (AI) frontier to achieve edge intelligence is highly nontrivial due to the constrained computing resources and limited training data at the network edge. To tackle these challenges, we develop a distributionally robust optimization (DRO)-based edge learning algorithm, where the uncertainty model is constructed to foster the synergy of cloud knowledge transfer and local training. Specifically, the knowledge transferred from the cloud is in the form of a Dirichlet process prior distribution for the edge model parameters, and the edge device further constructs an uncertainty set centered around the empirical distribution of its local samples to capture the information of local data processing. The edge learning DRO problem, subject to the above two distributional uncertainty constraints, is then recast as an equivalent single-layer optimization problem using a duality approach. We then use an Expectation-Maximization (EM) algorithm-inspired method to derive a convex relaxation, based on which we devise algorithms to learn the edge model parameters. Finally, extensive experiments are implemented to showcase the performance gain over standard learning approaches using local edge data only.
为了满足实时性能要求,许多物联网应用中的智能决策必须在此时此地的网络边缘进行。传统的基于云的学习方法将无法满足在这些应用中实现边缘智能的需求。然而,由于网络边缘的计算资源和训练数据有限,推动人工智能(AI)前沿实现边缘智能是非常重要的。为了应对这些挑战,我们开发了一种基于分布式鲁棒优化(DRO)的边缘学习算法,其中构建了不确定性模型以促进云知识转移和本地训练的协同作用。具体而言,从云端传递的知识以边缘模型参数的Dirichlet过程先验分布的形式存在,边缘设备进一步以其局部样本的经验分布为中心构建不确定性集,以获取局部数据处理的信息。受上述两个分布不确定性约束的边缘学习DRO问题,然后使用对偶方法将其重新定义为等效的单层优化问题。然后,我们使用期望最大化(EM)算法启发的方法来推导凸松弛,并在此基础上设计算法来学习边缘模型参数。最后,实施了大量的实验来展示仅使用局部边缘数据的标准学习方法的性能增益。
{"title":"Distributionally Robust Edge Learning with Dirichlet Process Prior","authors":"Zhaofeng Zhang, Yue Chen, Junshan Zhang","doi":"10.1109/ICDCS47774.2020.00016","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00016","url":null,"abstract":"In order to meet the real-time performance requirements, intelligent decisions in many IoT applications must take place right here right now at the network edge. The conventional cloud-based learning approach would not be able to keep up with the demands in achieving edge intelligence in these applications. Nevertheless, pushing the artificial intelligence (AI) frontier to achieve edge intelligence is highly nontrivial due to the constrained computing resources and limited training data at the network edge. To tackle these challenges, we develop a distributionally robust optimization (DRO)-based edge learning algorithm, where the uncertainty model is constructed to foster the synergy of cloud knowledge transfer and local training. Specifically, the knowledge transferred from the cloud is in the form of a Dirichlet process prior distribution for the edge model parameters, and the edge device further constructs an uncertainty set centered around the empirical distribution of its local samples to capture the information of local data processing. The edge learning DRO problem, subject to the above two distributional uncertainty constraints, is then recast as an equivalent single-layer optimization problem using a duality approach. We then use an Expectation-Maximization (EM) algorithm-inspired method to derive a convex relaxation, based on which we devise algorithms to learn the edge model parameters. Finally, extensive experiments are implemented to showcase the performance gain over standard learning approaches using local edge data only.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114266589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers 云密码屏蔽:一种安全的云防火墙,用于防御认证服务器上的DDoS攻击
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00154
Yue Fu, M. Au, Rong Du, Haibo Hu, Dagang Li
Password-based authentication is essential to any online service. It is normally powered by a database of user credentials, for example a RADIUS server. However, even with various indexing techniques (e.g., B+-tree), password-based authentication can still be resource-consuming on large-scale systems (e.g., Internet and IoT), and is thus vulnerable to distributed denial-of-service (DDoS) attacks.In this paper, we propose a cloud-based firewall that uses Bloom filters to pre-screen and reject suspicious requests with wrong password before they reach the authentication server. The main challenge is the security of the firewall because it can be operated by a third party, so the Bloom filters might be accessed by adversaries to assist their brute-force password guessing.To ensure security, we start with the assumption of trusted cloud server and design a key-based semantic secure Bloom filter (KSSBF) for the best efficiency. We then design a generically secure Bloom filter (GSBF) for non-trusted cloud servers, which is key-independent and with strictly provable security. Through theoretical and empirical analysis, we show both of them can mitigate malicious requests without compromising the security of passwords.
基于密码的身份验证对于任何在线服务都是必不可少的。它通常由用户凭据数据库提供支持,例如RADIUS服务器。然而,即使使用各种索引技术(例如,B+树),基于密码的身份验证在大型系统(例如,互联网和物联网)上仍然可能消耗资源,因此容易受到分布式拒绝服务(DDoS)攻击。在本文中,我们提出了一种基于云的防火墙,它使用Bloom过滤器在可疑的密码错误请求到达认证服务器之前进行预筛选和拒绝。主要的挑战是防火墙的安全性,因为它可以由第三方操作,所以攻击者可能会访问Bloom过滤器,以帮助他们暴力破解密码。为了确保安全性,我们从可信云服务器的假设出发,设计了一个基于密钥的语义安全布隆过滤器(KSSBF),以获得最佳的效率。然后,我们为不受信任的云服务器设计了一个通用安全的布隆过滤器(GSBF),该过滤器与密钥无关,具有严格可证明的安全性。通过理论和实证分析,我们证明了两者都可以在不影响密码安全性的情况下减轻恶意请求。
{"title":"Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers","authors":"Yue Fu, M. Au, Rong Du, Haibo Hu, Dagang Li","doi":"10.1109/ICDCS47774.2020.00154","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00154","url":null,"abstract":"Password-based authentication is essential to any online service. It is normally powered by a database of user credentials, for example a RADIUS server. However, even with various indexing techniques (e.g., B+-tree), password-based authentication can still be resource-consuming on large-scale systems (e.g., Internet and IoT), and is thus vulnerable to distributed denial-of-service (DDoS) attacks.In this paper, we propose a cloud-based firewall that uses Bloom filters to pre-screen and reject suspicious requests with wrong password before they reach the authentication server. The main challenge is the security of the firewall because it can be operated by a third party, so the Bloom filters might be accessed by adversaries to assist their brute-force password guessing.To ensure security, we start with the assumption of trusted cloud server and design a key-based semantic secure Bloom filter (KSSBF) for the best efficiency. We then design a generically secure Bloom filter (GSBF) for non-trusted cloud servers, which is key-independent and with strictly provable security. Through theoretical and empirical analysis, we show both of them can mitigate malicious requests without compromising the security of passwords.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134311482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach 无线网络中的信道访问攻击分类:一种深度学习方法
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00031
Xianglin Wei, Li Li, Chaogang Tang, M. Doroslovački, S. Subramaniam
Coping with diverse channel access attacks (CAAs) has been a major obstacle to realize the full potential of wireless networks as a basic building block of smart applications. Identifying and classifying different types of CAAs in a timely manner is a great challenge because of the inherently shared nature and randomness of the wireless medium. To overcome the difficulties encountered in existing methods, such as long latency, high data collection overhead, and limited applicable range, a deep learning-based CAA detection framework is proposed in this paper. First, we show the challenges of CAA classification by analyzing the impacts of CAAs on wireless network performance using an event-driven network simulator. Second, a state-transition model is built for the channel access process at a node, whose output sequences characterize the changing patterns of the node’s transmission status in different CAA scenarios. Third, a deep learning-based CAA classification framework is presented, which takes state transition sequences of a node as input and outputs predicted CAA types. The performance of three deep neural networks, i.e., fully-connected, convolutional, and Long Short-Term Memory (LSTM) network, for classifying CAAs are evaluated under our CAA classification framework in five CAA scenarios and the normal scenario without CAA. Experimental results show that LSTM outperforms the other two neural network architectures, and its CAA classification accuracy is higher than 95%. We successfully transferred the learned LSTM model to classify CAAs on other nodes in the same network and the nodes in other networks, which verifies the generality of our proposed framework.
应对各种信道访问攻击(CAAs)一直是实现无线网络作为智能应用的基本构建块的全部潜力的主要障碍。由于无线媒体固有的共享性质和随机性,及时识别和分类不同类型的caa是一项巨大的挑战。针对现有方法存在的时延长、数据采集开销大、适用范围有限等问题,本文提出了一种基于深度学习的CAA检测框架。首先,通过使用事件驱动网络模拟器分析CAA对无线网络性能的影响,我们展示了CAA分类的挑战。其次,建立了节点信道访问过程的状态转换模型,该模型的输出序列表征了节点在不同CAA场景下传输状态的变化规律。第三,提出了一种基于深度学习的CAA分类框架,该框架以节点的状态转移序列作为预测CAA类型的输入和输出。在我们的CAA分类框架下,对全连接、卷积和长短期记忆(LSTM)三种深度神经网络在5种CAA场景和无CAA的正常场景下对CAA进行分类的性能进行了评估。实验结果表明,LSTM优于其他两种神经网络结构,其CAA分类准确率高于95%。我们成功地将学习到的LSTM模型转移到同一网络中的其他节点和其他网络中的节点上进行CAAs分类,验证了我们提出的框架的通用性。
{"title":"Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach","authors":"Xianglin Wei, Li Li, Chaogang Tang, M. Doroslovački, S. Subramaniam","doi":"10.1109/ICDCS47774.2020.00031","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00031","url":null,"abstract":"Coping with diverse channel access attacks (CAAs) has been a major obstacle to realize the full potential of wireless networks as a basic building block of smart applications. Identifying and classifying different types of CAAs in a timely manner is a great challenge because of the inherently shared nature and randomness of the wireless medium. To overcome the difficulties encountered in existing methods, such as long latency, high data collection overhead, and limited applicable range, a deep learning-based CAA detection framework is proposed in this paper. First, we show the challenges of CAA classification by analyzing the impacts of CAAs on wireless network performance using an event-driven network simulator. Second, a state-transition model is built for the channel access process at a node, whose output sequences characterize the changing patterns of the node’s transmission status in different CAA scenarios. Third, a deep learning-based CAA classification framework is presented, which takes state transition sequences of a node as input and outputs predicted CAA types. The performance of three deep neural networks, i.e., fully-connected, convolutional, and Long Short-Term Memory (LSTM) network, for classifying CAAs are evaluated under our CAA classification framework in five CAA scenarios and the normal scenario without CAA. Experimental results show that LSTM outperforms the other two neural network architectures, and its CAA classification accuracy is higher than 95%. We successfully transferred the learned LSTM model to classify CAAs on other nodes in the same network and the nodes in other networks, which verifies the generality of our proposed framework.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Title page i] [标题页i]
Pub Date : 2020-11-01 DOI: 10.1109/icdcs47774.2020.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/icdcs47774.2020.00001","DOIUrl":"https://doi.org/10.1109/icdcs47774.2020.00001","url":null,"abstract":"","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"42 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WOLT: Auto-Configuration of Integrated Enterprise PLC-WiFi Networks 自动配置集成企业PLC-WiFi网络
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00066
Hisham Alhulayyil, Kittipat Apicharttrisorn, Jiasi Chen, K. Sundaresan, Samet Oymak, S. Krishnamurthy
Power Line Communication (PLC) based WiFi extenders can improve WiFi coverage in homes and enterprises. Unlike in traditional WiFi networks which use an underlying high data rate Ethernet backhaul, a PLC backhaul may not support high data rates. Specifically, our measurements show that arbitrarily affiliating users to PLC-WiFi extenders or based on their WiFi channel qualities alone may lead to poor network performance due to the differences in PLC link capacities. Thus, in this paper we build a framework, WOLT, to solve the problem of assigning users to the appropriate PLC-WiFi extenders to increase the aggregate network throughput in an enterprise setting, where one may expect a relatively large number of power outlets. WOLT accounts for both the qualities of the two concatenated links viz., the PLC and WiFi links. It hinges on estimating the best capacity offered by the PLC links, and accounting for these while assigning users. It incorporates a polynomial-time algorithm that assigns only a subset of the users to maximize the aggregate throughput on the PLC links, and then assigns the remaining users such that the degradation in the aggregate throughput is minimized. WOLT is evaluated through simulations and real testbed experiments with commodity PLCWiFi extenders, and improves aggregate throughput by more than 2.5x compared to a greedy user association baseline.
基于电力线通信(PLC)的WiFi扩展器可以提高家庭和企业的WiFi覆盖范围。与使用底层高数据速率以太网回程的传统WiFi网络不同,PLC回程可能不支持高数据速率。具体来说,我们的测量表明,由于PLC链路容量的差异,武断地将用户关联到PLC-WiFi扩展器或仅基于其WiFi信道质量可能导致网络性能差。因此,在本文中,我们构建了一个框架,WOLT,来解决将用户分配到适当的PLC-WiFi扩展器以增加企业设置中的总网络吞吐量的问题,在企业设置中,人们可能期望有相对大量的电源插座。WOLT考虑了两个连接链路的质量,即PLC和WiFi链路。它取决于估计PLC链路提供的最佳容量,并在分配用户时考虑这些容量。它结合了一个多项式时间算法,该算法只分配用户的一个子集来最大化PLC链路上的总吞吐量,然后分配剩余的用户,使总吞吐量的退化最小化。WOLT通过商用PLCWiFi扩展器的模拟和真实测试平台实验进行评估,与贪婪用户关联基线相比,总吞吐量提高了2.5倍以上。
{"title":"WOLT: Auto-Configuration of Integrated Enterprise PLC-WiFi Networks","authors":"Hisham Alhulayyil, Kittipat Apicharttrisorn, Jiasi Chen, K. Sundaresan, Samet Oymak, S. Krishnamurthy","doi":"10.1109/ICDCS47774.2020.00066","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00066","url":null,"abstract":"Power Line Communication (PLC) based WiFi extenders can improve WiFi coverage in homes and enterprises. Unlike in traditional WiFi networks which use an underlying high data rate Ethernet backhaul, a PLC backhaul may not support high data rates. Specifically, our measurements show that arbitrarily affiliating users to PLC-WiFi extenders or based on their WiFi channel qualities alone may lead to poor network performance due to the differences in PLC link capacities. Thus, in this paper we build a framework, WOLT, to solve the problem of assigning users to the appropriate PLC-WiFi extenders to increase the aggregate network throughput in an enterprise setting, where one may expect a relatively large number of power outlets. WOLT accounts for both the qualities of the two concatenated links viz., the PLC and WiFi links. It hinges on estimating the best capacity offered by the PLC links, and accounting for these while assigning users. It incorporates a polynomial-time algorithm that assigns only a subset of the users to maximize the aggregate throughput on the PLC links, and then assigns the remaining users such that the degradation in the aggregate throughput is minimized. WOLT is evaluated through simulations and real testbed experiments with commodity PLCWiFi extenders, and improves aggregate throughput by more than 2.5x compared to a greedy user association baseline.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Win with What You Have: QoS-Consistent Edge Services with Unreliable and Dynamic Resources 凭借你所拥有的:qos一致的边缘服务与不可靠和动态的资源
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00196
Z. Song, E. Tilevich
Mobile and energy harvesting devices increasingly provide resources for edge environments. These devices’ mobility and limited energy budgets may cause failures and poor performance. The reliability and efficiency of edge services can be improved with equivalent microservices that satisfy application requirements by different means: execute equivalent microservices in the predefined patterns of fail-over to minimize execution costs or speculative parallelism to reduce latency. However, given the vast dissimilarities in resource availability and capability across edge environments, being limited to these predefined patterns when implementing edge services causes inconsistent QoS. To address this problem, we provide QoS-consistent edge services by customizing the execution of equivalent microservices. Our system estimates the environment-specific QoS of equivalent microservices and dynamically generates execution strategies that best satisfy given QoS requirements. We evaluate the effectiveness and performance of our system via simulations and benchmarks with realistic edge deployments. Our approach consistently out-performs the predefined execution patterns in satisfying the QoS requirements in unreliable and dynamic edge environments.
移动和能量收集设备越来越多地为边缘环境提供资源。这些设备的移动性和有限的能源预算可能会导致故障和性能差。边缘服务的可靠性和效率可以通过不同方式满足应用程序需求的等效微服务来提高:以预定义的故障转移模式执行等效微服务以最小化执行成本或推测并行性以减少延迟。然而,考虑到跨边缘环境的资源可用性和能力的巨大差异,在实现边缘服务时,被限制在这些预定义模式会导致不一致的QoS。为了解决这个问题,我们通过定制等效微服务的执行来提供qos一致的边缘服务。我们的系统估计等效微服务的特定于环境的QoS,并动态生成最能满足给定QoS要求的执行策略。我们通过模拟和实际边缘部署的基准来评估系统的有效性和性能。我们的方法在满足不可靠和动态边缘环境中的QoS要求方面始终优于预定义的执行模式。
{"title":"Win with What You Have: QoS-Consistent Edge Services with Unreliable and Dynamic Resources","authors":"Z. Song, E. Tilevich","doi":"10.1109/ICDCS47774.2020.00196","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00196","url":null,"abstract":"Mobile and energy harvesting devices increasingly provide resources for edge environments. These devices’ mobility and limited energy budgets may cause failures and poor performance. The reliability and efficiency of edge services can be improved with equivalent microservices that satisfy application requirements by different means: execute equivalent microservices in the predefined patterns of fail-over to minimize execution costs or speculative parallelism to reduce latency. However, given the vast dissimilarities in resource availability and capability across edge environments, being limited to these predefined patterns when implementing edge services causes inconsistent QoS. To address this problem, we provide QoS-consistent edge services by customizing the execution of equivalent microservices. Our system estimates the environment-specific QoS of equivalent microservices and dynamically generates execution strategies that best satisfy given QoS requirements. We evaluate the effectiveness and performance of our system via simulations and benchmarks with realistic edge deployments. Our approach consistently out-performs the predefined execution patterns in satisfying the QoS requirements in unreliable and dynamic edge environments.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114524558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MobiCharger: Optimal Scheduling for Cooperative EV-to-EV Dynamic Wireless Charging 移动充电器:电动汽车对电动汽车动态无线充电的优化调度
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00139
Li Yan, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu
With ever increasing concerns on environmental issues caused by gasoline fuel based vehicles, electric vehicles (EVs) have attracted more and more attention from governments, industries, and customers [1] . The recent advancements in EVs have great potential to create a more environmentally friendly smart city. However, due to limited battery capacity, most current mainstream EVs still have quite limited driving range (e.g., 100 miles) [2] . How to ensure the continuous running of EVs on a large-scale road network (e.g., metropolitan city, interstate) becomes a major concern.
随着以汽油为燃料的汽车引起的环境问题日益受到人们的关注,电动汽车越来越受到政府、行业和消费者的关注[1]。最近电动汽车的进步有很大的潜力创造一个更环保的智能城市。然而,由于电池容量有限,目前大多数主流电动汽车的续驶里程仍然相当有限(例如100英里)[2]。如何保证电动汽车在大型路网(如大城市、州际公路)上的连续行驶成为人们关注的焦点。
{"title":"MobiCharger: Optimal Scheduling for Cooperative EV-to-EV Dynamic Wireless Charging","authors":"Li Yan, Haiying Shen, Liuwang Kang, Juanjuan Zhao, Chengzhong Xu","doi":"10.1109/ICDCS47774.2020.00139","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00139","url":null,"abstract":"With ever increasing concerns on environmental issues caused by gasoline fuel based vehicles, electric vehicles (EVs) have attracted more and more attention from governments, industries, and customers [1] . The recent advancements in EVs have great potential to create a more environmentally friendly smart city. However, due to limited battery capacity, most current mainstream EVs still have quite limited driving range (e.g., 100 miles) [2] . How to ensure the continuous running of EVs on a large-scale road network (e.g., metropolitan city, interstate) becomes a major concern.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FILT: Optimizing KV-Embedded File Systems through Flat Indexing FILT:通过平面索引优化kv嵌入式文件系统
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00150
Chen Chen, Tongliang Deng, Jian Zhang, Yanliang Zou, Xiaomin Zhu, Shu Yin
The effectiveness of applying key-value store mechanisms to manage metadata of file systems has been demonstrated recently. However, traditional indirect metadata indexing schemes are not in concert with modern key-value data structures, which could degrade the performance of a KV-embedded file system due to the overhead of hierarchical path queries. In this paper, we propose FILT, a proof-of-concept file system middleware that can solve this problem by employing flat indexing. FILT exploits the benefits of both flat indexing and LSM-tree structure to eliminate redundant path lookups. Our extensive performance evaluation studies show that FILT can offer up to 5.8x performance gain compared with sophisticated local file systems.
最近已经证明了应用键值存储机制来管理文件系统元数据的有效性。然而,传统的间接元数据索引方案与现代键值数据结构不一致,由于分层路径查询的开销,这可能会降低嵌入kv的文件系统的性能。在本文中,我们提出了FILT,一个概念验证文件系统中间件,它可以通过使用平面索引来解决这个问题。FILT利用了平面索引和lsm -树结构的优点来消除冗余的路径查找。我们广泛的性能评估研究表明,与复杂的本地文件系统相比,FILT可以提供高达5.8倍的性能提升。
{"title":"FILT: Optimizing KV-Embedded File Systems through Flat Indexing","authors":"Chen Chen, Tongliang Deng, Jian Zhang, Yanliang Zou, Xiaomin Zhu, Shu Yin","doi":"10.1109/ICDCS47774.2020.00150","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00150","url":null,"abstract":"The effectiveness of applying key-value store mechanisms to manage metadata of file systems has been demonstrated recently. However, traditional indirect metadata indexing schemes are not in concert with modern key-value data structures, which could degrade the performance of a KV-embedded file system due to the overhead of hierarchical path queries. In this paper, we propose FILT, a proof-of-concept file system middleware that can solve this problem by employing flat indexing. FILT exploits the benefits of both flat indexing and LSM-tree structure to eliminate redundant path lookups. Our extensive performance evaluation studies show that FILT can offer up to 5.8x performance gain compared with sophisticated local file systems.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing 助推私人:联邦极端梯度助推移动众传感
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00017
Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, S. Nepal, R. Deng, K. Ren
Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion and homomorphic encryption (HE). The former aims to expand the applicable machine learning models of FL. The latter focuses on who holds the secret key when applying HE to FL. For the naive HE scheme, the server is set to master the secret key. Such a setting causes a serious problem that if the server does not conduct aggregation before decryption, a chance is left for the server to access the user’s update. Inspired by the two challenges, we propose FEDXGB, a federated extreme gradient boosting (XGBoost) scheme supporting forced aggregation. FEDXGB mainly achieves the following two breakthroughs. First, FEDXGB involves a new HE based secure aggregation scheme for FL. By combining the advantages of secret sharing and homomorphic encryption, the algorithm can solve the second challenge mentioned above, and is robust to the user dropout. Then, FEDXGB extends FL to a new machine learning model by applying the secure aggregation scheme to the classification and regression tree building of XGBoost. Moreover, we conduct a comprehensive theoretical analysis and extensive experiments to evaluate the security, effectiveness, and efficiency of FEDXGB. The results indicate that FEDXGB achieves less than 1% accuracy loss compared with the original XGBoost, and can provide about 23.9% runtime and 33.3% communication reduction for HE based model update aggregation of FL.
最近,谷歌和其他24个机构提出了一系列针对联邦学习(FL)的公开挑战,包括应用扩展和同态加密(HE)。前者旨在扩展FL的适用机器学习模型,后者关注将HE应用于FL时谁持有密钥。对于朴素HE方案,将服务器设置为掌握密钥。这样的设置会导致一个严重的问题:如果服务器没有在解密之前进行聚合,那么服务器就有机会访问用户的更新。受这两个挑战的启发,我们提出了FEDXGB,一种支持强制聚合的联邦极端梯度增强(XGBoost)方案。FEDXGB主要实现了以下两个突破。首先,提出了一种新的基于HE的FL安全聚合方案,该算法结合了秘密共享和同态加密的优点,解决了上述第二个挑战,并且对用户退出具有鲁棒性。然后,FEDXGB通过将安全聚合方案应用于XGBoost的分类和回归树构建,将FL扩展为新的机器学习模型。此外,我们进行了全面的理论分析和广泛的实验来评估FEDXGB的安全性、有效性和效率。结果表明,与原始的XGBoost相比,FEDXGB的精度损失小于1%,并且可以为基于HE的FL模型更新聚合提供约23.9%的运行时间和33.3%的通信减少。
{"title":"Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing","authors":"Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, S. Nepal, R. Deng, K. Ren","doi":"10.1109/ICDCS47774.2020.00017","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00017","url":null,"abstract":"Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion and homomorphic encryption (HE). The former aims to expand the applicable machine learning models of FL. The latter focuses on who holds the secret key when applying HE to FL. For the naive HE scheme, the server is set to master the secret key. Such a setting causes a serious problem that if the server does not conduct aggregation before decryption, a chance is left for the server to access the user’s update. Inspired by the two challenges, we propose FEDXGB, a federated extreme gradient boosting (XGBoost) scheme supporting forced aggregation. FEDXGB mainly achieves the following two breakthroughs. First, FEDXGB involves a new HE based secure aggregation scheme for FL. By combining the advantages of secret sharing and homomorphic encryption, the algorithm can solve the second challenge mentioned above, and is robust to the user dropout. Then, FEDXGB extends FL to a new machine learning model by applying the secure aggregation scheme to the classification and regression tree building of XGBoost. Moreover, we conduct a comprehensive theoretical analysis and extensive experiments to evaluate the security, effectiveness, and efficiency of FEDXGB. The results indicate that FEDXGB achieves less than 1% accuracy loss compared with the original XGBoost, and can provide about 23.9% runtime and 33.3% communication reduction for HE based model update aggregation of FL.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential Game 边缘计算系统中体验感知用户分配的质量:一个潜在的博弈
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00036
Phu Lai, Qiang He, Guangming Cui, Feifei Chen, Mohamed Abdelrazek, J. Grundy, J. Hosking, Yun Yang
As many applications and services are moving towards a more human-centered design, app vendors are taking the quality of experience (QoE) increasingly seriously. End-to-end latency is a key factor that determines the QoE experienced by users, especially for latency-sensitive applications such as online gaming, health care, critical warning systems and so on. Recently, edge computing has emerged as a promising solution to the high latency problem. In an edge computing environment, edge servers are deployed at cellular base stations, offering processing power and low network latency to users within their geographic proximity. In this paper, we tackle the user allocation problem in edge computing from an app vendor's perspective, where the vendor needs to decide which edge servers to serve which users in a specific area. Also, the vendor must consider the various levels of quality of service (QoS) for its users. Each QoS level results in a different QoE level; thus, the app vendor needs to decide the QoS level for each user so that the overall user experience is maximized. To tackle the NP-hardness of this problem, we formulate it as a potential game then propose QoEGame, an effective and efficient game-theoretic approach that admits a Nash equilibrium as a solution to the user allocation problem. Being a distributed algorithm, QoEGame is able to fully utilize the distributed nature of edge computing. Finally, we theoretically and empirically evaluate the performance of QoEGame, which is illustrated to be significantly better than the state of the art and other baseline approaches.
随着许多应用程序和服务朝着更加以人为本的设计方向发展,应用程序供应商越来越重视体验质量(QoE)。端到端延迟是决定用户体验的QoE的关键因素,特别是对于在线游戏、医疗保健、关键警报系统等对延迟敏感的应用程序。最近,边缘计算已经成为解决高延迟问题的一个很有前途的解决方案。在边缘计算环境中,边缘服务器部署在蜂窝基站,为地理位置接近的用户提供处理能力和低网络延迟。在本文中,我们从应用程序供应商的角度解决边缘计算中的用户分配问题,供应商需要决定哪些边缘服务器为特定区域的哪些用户提供服务。此外,供应商必须考虑为其用户提供不同级别的服务质量(QoS)。每个QoS级别导致不同的QoE级别;因此,应用程序供应商需要为每个用户确定QoS级别,以便最大化整体用户体验。为了解决这个问题的np -硬度,我们将其描述为一个潜在的博弈,然后提出QoEGame,这是一种有效的博弈论方法,它承认纳什均衡是用户分配问题的解决方案。QoEGame是一种分布式算法,能够充分利用边缘计算的分布式特性。最后,我们从理论上和经验上评估了QoEGame的性能,证明它明显优于现有技术和其他基准方法。
{"title":"Quality of Experience-Aware User Allocation in Edge Computing Systems: A Potential Game","authors":"Phu Lai, Qiang He, Guangming Cui, Feifei Chen, Mohamed Abdelrazek, J. Grundy, J. Hosking, Yun Yang","doi":"10.1109/ICDCS47774.2020.00036","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00036","url":null,"abstract":"As many applications and services are moving towards a more human-centered design, app vendors are taking the quality of experience (QoE) increasingly seriously. End-to-end latency is a key factor that determines the QoE experienced by users, especially for latency-sensitive applications such as online gaming, health care, critical warning systems and so on. Recently, edge computing has emerged as a promising solution to the high latency problem. In an edge computing environment, edge servers are deployed at cellular base stations, offering processing power and low network latency to users within their geographic proximity. In this paper, we tackle the user allocation problem in edge computing from an app vendor's perspective, where the vendor needs to decide which edge servers to serve which users in a specific area. Also, the vendor must consider the various levels of quality of service (QoS) for its users. Each QoS level results in a different QoE level; thus, the app vendor needs to decide the QoS level for each user so that the overall user experience is maximized. To tackle the NP-hardness of this problem, we formulate it as a potential game then propose QoEGame, an effective and efficient game-theoretic approach that admits a Nash equilibrium as a solution to the user allocation problem. Being a distributed algorithm, QoEGame is able to fully utilize the distributed nature of edge computing. Finally, we theoretically and empirically evaluate the performance of QoEGame, which is illustrated to be significantly better than the state of the art and other baseline approaches.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1