首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Learning for Exception: Dynamic Service Caching in 5G-Enabled MECs with Bursty User Demands 例外学习:用户需求突发的5g mec中的动态服务缓存
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00098
Zichuan Xu, Shengnan Wang, Shipei Liu, Haipeng Dai, Qiufen Xia, W. Liang, Guowei Wu
Mobile edge computing (MEC) is envisioned as an enabling technology for extreme low-latency services in the next generation 5G access networks. In a 5G-enabled MEC, computing resources are attached to base stations. In this way, network service providers can cache their services from remote data centers to base stations in the MEC to serve user tasks in their close proximity, thereby reducing the service latency. However, mobile users usually have various dynamic hidden features, such as their locations, user group tags, and mobility patterns. Such hidden features normally lead to uncertainties of the 5G-enabled MEC, such as user demand and processing delay. This poses significant challenges for the service caching and task offloading in a 5G-enabled MEC. In this paper, we investigate the problem of dynamic service caching and task offloading in a 5G-enabled MEC with user demand and processing delay uncertainties. We first propose an online learning algorithm for the problem with given user demands by utilizing the technique of Multi-Armed Bandits (MAB), and theoretically analyze the regret bound of the algorithm. We also propose a novel architecture of Generative Adversarial Networks (GAN) to accurately predict the user demands based on small samples of hidden features of mobile users. Based on the proposed GAN model, we then devise an efficient heuristic for the problem with the uncertainties of both user demand and processing delay. We finally evaluate the performance of the proposed algorithms by simulations based on a realistic dataset of user data. Experiment results show that the performance of the proposed algorithms outperform existing algorithms by around 15%.
移动边缘计算(MEC)被设想为下一代5G接入网络中极低延迟服务的使能技术。在支持5g的MEC中,计算资源附加在基站上。通过这种方式,网络服务提供商可以将其服务从远程数据中心缓存到MEC中的基站,以便在其附近为用户任务提供服务,从而减少服务延迟。但是,移动用户通常具有各种动态隐藏特性,例如他们的位置、用户组标记和移动模式。这些隐藏的特性通常会导致5g MEC的不确定性,如用户需求和处理延迟。这对支持5g的MEC中的服务缓存和任务卸载提出了重大挑战。在本文中,我们研究了具有用户需求和处理延迟不确定性的5g MEC中的动态服务缓存和任务卸载问题。本文首先利用多武装强盗(Multi-Armed Bandits, MAB)技术提出了一种针对给定用户需求问题的在线学习算法,并从理论上分析了该算法的后悔界。我们还提出了一种新的生成对抗网络(GAN)架构,以基于移动用户隐藏特征的小样本准确预测用户需求。基于所提出的GAN模型,我们设计了一种有效的启发式算法来解决同时存在用户需求和处理延迟不确定性的问题。最后,我们通过基于真实用户数据集的模拟来评估所提出算法的性能。实验结果表明,所提算法的性能比现有算法高出15%左右。
{"title":"Learning for Exception: Dynamic Service Caching in 5G-Enabled MECs with Bursty User Demands","authors":"Zichuan Xu, Shengnan Wang, Shipei Liu, Haipeng Dai, Qiufen Xia, W. Liang, Guowei Wu","doi":"10.1109/ICDCS47774.2020.00098","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00098","url":null,"abstract":"Mobile edge computing (MEC) is envisioned as an enabling technology for extreme low-latency services in the next generation 5G access networks. In a 5G-enabled MEC, computing resources are attached to base stations. In this way, network service providers can cache their services from remote data centers to base stations in the MEC to serve user tasks in their close proximity, thereby reducing the service latency. However, mobile users usually have various dynamic hidden features, such as their locations, user group tags, and mobility patterns. Such hidden features normally lead to uncertainties of the 5G-enabled MEC, such as user demand and processing delay. This poses significant challenges for the service caching and task offloading in a 5G-enabled MEC. In this paper, we investigate the problem of dynamic service caching and task offloading in a 5G-enabled MEC with user demand and processing delay uncertainties. We first propose an online learning algorithm for the problem with given user demands by utilizing the technique of Multi-Armed Bandits (MAB), and theoretically analyze the regret bound of the algorithm. We also propose a novel architecture of Generative Adversarial Networks (GAN) to accurately predict the user demands based on small samples of hidden features of mobile users. Based on the proposed GAN model, we then devise an efficient heuristic for the problem with the uncertainties of both user demand and processing delay. We finally evaluate the performance of the proposed algorithms by simulations based on a realistic dataset of user data. Experiment results show that the performance of the proposed algorithms outperform existing algorithms by around 15%.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Distributed Hierarchical File Systems strike back in the Cloud 分布式分级文件系统在云端卷土重来
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00108
Mahmoud Ismail, Salman Niazi, Mauritz Sundell, Mikael Ronström, Seif Haridi, J. Dowling
Cloud service providers have aligned on availability zones as an important unit of failure and replication for storage systems. An availability zone (AZ) has independent power, networking, and cooling systems and consists of one or more data centers. Multiple AZs in close geographic proximity form a region that can support replicated low latency storage services that can survive the failure of one or more AZs. Recent reductions in inter-AZ latency have made synchronous replication protocols increasingly viable, instead of traditional quorum-based replication protocols. We introduce HopsFS-CL, a distributed hierarchical file system with support for high-availability (HA) across AZs, backed by AZ-aware synchronously replicated metadata and AZ-aware block replication. HopsFS-CL is a redesign of HopsFS, a version of HDFS with distributed metadata, and its design involved making replication protocols and block placement protocols AZ-aware at all layers of its stack: the metadata serving, the metadata storage, and block storage layers. In experiments on a real-world workload from Spotify, we show that HopsFS-CL, deployed in HA mode over 3 AZs, reaches 1.66 million ops/s, and has similar performance to HopsFS when deployed in a single AZ, while preserving the same semantics.
云服务提供商已经将可用性区域作为存储系统故障和复制的重要单元。AZ (availability zone)由一个或多个数据中心组成,具有独立的供电、组网和制冷系统。地理位置接近的多个可用分区形成一个区域,该区域可以支持复制的低延迟存储服务,这些服务可以在一个或多个可用分区出现故障时继续存在。最近az间延迟的减少使得同步复制协议越来越可行,而不是传统的基于群体的复制协议。我们介绍HopsFS-CL,这是一种分布式分层文件系统,支持跨az的高可用性(HA),由az感知的同步复制元数据和az感知的块复制提供支持。HopsFS- cl是对HopsFS的重新设计,HopsFS是具有分布式元数据的HDFS的一个版本,它的设计涉及在其堆栈的所有层(元数据服务层、元数据存储层和块存储层)使复制协议和块放置协议能够识别az。在Spotify的真实工作负载实验中,我们表明HopsFS- cl在3个AZ上以HA模式部署,达到166万ops/s,并且在保持相同语义的情况下,在单个AZ中部署时具有与HopsFS相似的性能。
{"title":"Distributed Hierarchical File Systems strike back in the Cloud","authors":"Mahmoud Ismail, Salman Niazi, Mauritz Sundell, Mikael Ronström, Seif Haridi, J. Dowling","doi":"10.1109/ICDCS47774.2020.00108","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00108","url":null,"abstract":"Cloud service providers have aligned on availability zones as an important unit of failure and replication for storage systems. An availability zone (AZ) has independent power, networking, and cooling systems and consists of one or more data centers. Multiple AZs in close geographic proximity form a region that can support replicated low latency storage services that can survive the failure of one or more AZs. Recent reductions in inter-AZ latency have made synchronous replication protocols increasingly viable, instead of traditional quorum-based replication protocols. We introduce HopsFS-CL, a distributed hierarchical file system with support for high-availability (HA) across AZs, backed by AZ-aware synchronously replicated metadata and AZ-aware block replication. HopsFS-CL is a redesign of HopsFS, a version of HDFS with distributed metadata, and its design involved making replication protocols and block placement protocols AZ-aware at all layers of its stack: the metadata serving, the metadata storage, and block storage layers. In experiments on a real-world workload from Spotify, we show that HopsFS-CL, deployed in HA mode over 3 AZs, reaches 1.66 million ops/s, and has similar performance to HopsFS when deployed in a single AZ, while preserving the same semantics.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elan: Towards Generic and Efficient Elastic Training for Deep Learning Elan:面向深度学习的通用和高效弹性训练
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00018
Lei Xie, Jidong Zhai, Baodong Wu, Yuanbo Wang, Xingcheng Zhang, Peng Sun, Shengen Yan
Showing a promising future in improving resource utilization and accelerating training, elastic deep learning training has been attracting more and more attention recently. Nevertheless, existing approaches to provide elasticity have certain limitations. They either fail to fully explore the parallelism of deep learning training when scaling out or lack an efficient mechanism to replicate training states among different devices.To address these limitations, we design Elan, a generic and efficient elastic training system for deep learning. In Elan, we propose a novel hybrid scaling mechanism to make a good trade-off between training efficiency and model performance when exploring more parallelism. We exploit the topology of underlying devices to perform concurrent and IO-free training state replication. To avoid the high overhead of start and initialization, we further propose an asynchronous coordination mechanism. Powered by the above innovations, Elan can provide high-performance (~1s) migration, scaling in and scaling out support with negligible runtime overhead (<3‰). For elastic training of ResNet-50 on ImageNet, Elan improves the time to solution by 20%. For elastic scheduling, with the help of Elan, resource utilization is improved by 21%+ and job pending time is reduced by 43%+.
弹性深度学习训练在提高资源利用率、加快训练速度方面具有广阔的应用前景,近年来受到越来越多的关注。然而,现有的提供弹性的方法有一定的局限性。它们要么在扩展时未能充分探索深度学习训练的并行性,要么缺乏在不同设备之间复制训练状态的有效机制。为了解决这些限制,我们设计了Elan,一个通用的、高效的深度学习弹性训练系统。在Elan中,我们提出了一种新的混合缩放机制,以便在探索更多并行性时在训练效率和模型性能之间进行良好的权衡。我们利用底层设备的拓扑结构来执行并发和无io的训练状态复制。为了避免启动和初始化的高开销,我们进一步提出了一种异步协调机制。在上述创新的推动下,Elan可以提供高性能(~1s)迁移、内扩展和外扩展支持,而运行时开销可以忽略不计(<3‰)。对于ResNet-50在ImageNet上的弹性训练,Elan将求解时间提高了20%。对于弹性调度,在Elan的帮助下,资源利用率提高了21%以上,作业等待时间减少了43%以上。
{"title":"Elan: Towards Generic and Efficient Elastic Training for Deep Learning","authors":"Lei Xie, Jidong Zhai, Baodong Wu, Yuanbo Wang, Xingcheng Zhang, Peng Sun, Shengen Yan","doi":"10.1109/ICDCS47774.2020.00018","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00018","url":null,"abstract":"Showing a promising future in improving resource utilization and accelerating training, elastic deep learning training has been attracting more and more attention recently. Nevertheless, existing approaches to provide elasticity have certain limitations. They either fail to fully explore the parallelism of deep learning training when scaling out or lack an efficient mechanism to replicate training states among different devices.To address these limitations, we design Elan, a generic and efficient elastic training system for deep learning. In Elan, we propose a novel hybrid scaling mechanism to make a good trade-off between training efficiency and model performance when exploring more parallelism. We exploit the topology of underlying devices to perform concurrent and IO-free training state replication. To avoid the high overhead of start and initialization, we further propose an asynchronous coordination mechanism. Powered by the above innovations, Elan can provide high-performance (~1s) migration, scaling in and scaling out support with negligible runtime overhead (<3‰). For elastic training of ResNet-50 on ImageNet, Elan improves the time to solution by 20%. For elastic scheduling, with the help of Elan, resource utilization is improved by 21%+ and job pending time is reduced by 43%+.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Game Theoretical Analysis of Cross-Chain Swaps 交叉链互换的博弈论分析
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00060
M. Belotti, Stefano Moretti, M. Potop-Butucaru, Stefano Secci
In this paper we address the distributed cross-chain swap problem in the blockchain context where multiple agents exchange assets across multiple blockchain systems (e.g. trading Bitcoins for Litecoins or Ethers). We present a mathematical framework allowing to characterize blockchain swap protocols as the combination of a publishing and a commitment phase, where contracts are respectively published and then committed. We characterize the equilibria of existing cross-chain swap protocols (i.e., blockchain swap protocols exchanging assets among different blockchains). More precisely, we prove that following a swap protocol characterized by concurrent publishing of exchange contracts and snap (immediate) assets transfers is a Nash equilibrium. Furthermore, we prove that for protocols with a sequential publishing and commitment of the assets transfers, following the prescribed protocol is a sub-game perfect equilibrium.
在本文中,我们解决了区块链背景下的分布式跨链交换问题,其中多个代理跨多个区块链系统交换资产(例如将比特币交易为莱特币或以太币)。我们提出了一个数学框架,允许将区块链交换协议描述为发布和承诺阶段的组合,其中合同分别发布,然后提交。我们描述了现有跨链交换协议的均衡(即,区块链交换协议在不同区块链之间交换资产)。更准确地说,我们证明了遵循以并发发布交换合约和快速(即时)资产转移为特征的交换协议是纳什均衡。此外,我们证明了对于具有顺序发布和承诺资产转移的协议,遵循规定的协议是子博弈的完美均衡。
{"title":"Game Theoretical Analysis of Cross-Chain Swaps","authors":"M. Belotti, Stefano Moretti, M. Potop-Butucaru, Stefano Secci","doi":"10.1109/ICDCS47774.2020.00060","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00060","url":null,"abstract":"In this paper we address the distributed cross-chain swap problem in the blockchain context where multiple agents exchange assets across multiple blockchain systems (e.g. trading Bitcoins for Litecoins or Ethers). We present a mathematical framework allowing to characterize blockchain swap protocols as the combination of a publishing and a commitment phase, where contracts are respectively published and then committed. We characterize the equilibria of existing cross-chain swap protocols (i.e., blockchain swap protocols exchanging assets among different blockchains). More precisely, we prove that following a swap protocol characterized by concurrent publishing of exchange contracts and snap (immediate) assets transfers is a Nash equilibrium. Furthermore, we prove that for protocols with a sequential publishing and commitment of the assets transfers, following the prescribed protocol is a sub-game perfect equilibrium.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124493304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
[Copyright notice] (版权)
Pub Date : 2020-11-01 DOI: 10.1109/icdcs47774.2020.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icdcs47774.2020.00003","DOIUrl":"https://doi.org/10.1109/icdcs47774.2020.00003","url":null,"abstract":"","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobiRescue: Reinforcement Learning based Rescue Team Dispatching in a Flooding Disaster 基于强化学习的洪水灾害救援队调度
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00033
Li Yan, Shohaib Mahmud, Haiying Shen, N. Foutz, Joshua Anton
The effectiveness of dispatching rescue teams under a flooding disaster is crucial. However, previous emergency vehicle dispatching methods cannot handle flooding disaster situations, and previous rescue team dispatching methods cannot accurately estimate the positions of potential rescue requests or dispatch the rescue teams according to the real-time distribution of rescue requests. In this paper, we propose MobiRescue, a human Mobility based Rescue team dispatching system, that aims to maximize the total number of fulfilled rescue requests, minimize the rescue teams’ driving delay to the rescue requests’ positions and also the number of dispatched rescue teams. We studied a city-scale human mobility dataset for the Hurricane Florence, and found that the disaster impact severities are quite different in different regions, and people’s movement was significantly affected by the disaster, which means that the rescue teams’ driving routes should be adaptively adjusted. Then, we propose a Support Vector Machine (SVM) based method to predict the distribution of potential rescue requests on each road segment. Based on the predicted distribution, we develop a Reinforcement Learning (RL) based rescue team dispatching method to achieve the aforementioned goals. Our trace-driven experiments demonstrate the superior performance of MobiRescue over other comparison methods.
在洪水灾害中,派遣救援队的效率至关重要。然而,以往的应急车辆调度方法无法处理洪涝灾害情况,以往的救援队调度方法无法准确估计潜在救援请求的位置,也无法根据救援请求的实时分布情况调度救援队。本文提出了一种基于人的机动性的救援队伍调度系统MobiRescue,该系统的目标是最大限度地满足救援请求的总数量,最大限度地减少救援队伍到达救援请求地点的行驶延迟,最大限度地减少派出的救援队伍数量。研究了佛罗伦萨飓风城市尺度的人员流动数据集,发现不同地区的灾害影响程度差异较大,人员流动受灾害影响显著,这意味着救援队伍的行驶路线需要进行自适应调整。然后,我们提出了一种基于支持向量机(SVM)的方法来预测每个路段上潜在救援请求的分布。基于预测分布,我们开发了一种基于强化学习(RL)的救援队调度方法来实现上述目标。我们的跟踪驱动实验证明了MobiRescue优于其他比较方法的性能。
{"title":"MobiRescue: Reinforcement Learning based Rescue Team Dispatching in a Flooding Disaster","authors":"Li Yan, Shohaib Mahmud, Haiying Shen, N. Foutz, Joshua Anton","doi":"10.1109/ICDCS47774.2020.00033","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00033","url":null,"abstract":"The effectiveness of dispatching rescue teams under a flooding disaster is crucial. However, previous emergency vehicle dispatching methods cannot handle flooding disaster situations, and previous rescue team dispatching methods cannot accurately estimate the positions of potential rescue requests or dispatch the rescue teams according to the real-time distribution of rescue requests. In this paper, we propose MobiRescue, a human Mobility based Rescue team dispatching system, that aims to maximize the total number of fulfilled rescue requests, minimize the rescue teams’ driving delay to the rescue requests’ positions and also the number of dispatched rescue teams. We studied a city-scale human mobility dataset for the Hurricane Florence, and found that the disaster impact severities are quite different in different regions, and people’s movement was significantly affected by the disaster, which means that the rescue teams’ driving routes should be adaptively adjusted. Then, we propose a Support Vector Machine (SVM) based method to predict the distribution of potential rescue requests on each road segment. Based on the predicted distribution, we develop a Reinforcement Learning (RL) based rescue team dispatching method to achieve the aforementioned goals. Our trace-driven experiments demonstrate the superior performance of MobiRescue over other comparison methods.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications PrivacyScope: tee保护应用程序中私人数据泄漏的自动分析
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00013
Ruide Zhang, Ning Zhang, A. Moini, W. Lou, Thomas Hou
Big data analytics is having a profound impact on many sectors of the economy by transforming raw data into actionable intelligence. However, increased use of sensitive business and private personal data with no or limited privacy safeguards has raised great concerns among individuals and government regulators. To address the growing tension between the need for data utility and the demand for data privacy, trusted execution environment (TEE) is being used in academic research as well as industrial application as a powerful primitive to enable confidential computation on the private data with only the result disclosed but not the original private data. While much of the current research has been focusing on protecting the TEE against attacks (e.g. side-channel information leakage), the security and privacy of the applications executing inside a TEE enclave has received little attention. The general attitude is that the application is running inside a trusted computing base (TCB), and therefore can be trusted. This assumption may not be valid when it comes to unverified third-party applications.In this paper, we present PrivacyScope, a static code analyzer designed to detect leakage of private data by an application code running in a TEE. PrivacyScope accomplishes this by analyzing the application code and identifying violations of a property called nonreversibility. We introduce nonreversibility since the classical noninterference property falls short of detecting private data leakage in certain scenarios, e.g., in machine learning (ML) programs where the program output is always related to (private) input data. Given its strict reliance on observable state, the noninterference falls short of detecting private data leakage in these situations. By design, PrivacyScope detects both explicit and implicit information leakage. The nonreversibility property is formally defined based on the noninterference property. Additionally, we describe the algorithms for PrivacyScope as extensions to the runtime semantics of a general language. To evaluate the efficacy of our approach and proof-of-feasibility prototype, we apply PrivacyScope to detect data leakage in select open-source ML code modules including linear regression, k-means clustering and collaborative filtering. Also, PrivacyScope can detect intentional data leakage code injected by a programmer. We responsibly disclosed all the discovered vulnerabilities leading to disclosure of private data in the open-source ML program we analyzed.
大数据分析通过将原始数据转化为可操作的情报,对经济的许多部门产生了深远的影响。然而,在没有或有限的隐私保护措施的情况下,越来越多地使用敏感的商业和私人数据,引起了个人和政府监管机构的极大担忧。为了解决数据实用需求和数据隐私需求之间日益紧张的关系,可信执行环境(TEE)作为一种强大的原语,被用于学术研究和工业应用中,以实现对私有数据的机密计算,仅公开结果而不公开原始私有数据。虽然目前的许多研究都集中在保护TEE免受攻击(例如,侧信道信息泄漏),但在TEE飞地内执行的应用程序的安全性和隐私性却很少受到关注。一般的态度是,应用程序在可信计算基础(TCB)中运行,因此是可信的。当涉及到未经验证的第三方应用程序时,这种假设可能不成立。在本文中,我们介绍了PrivacyScope,这是一个静态代码分析器,用于检测在TEE中运行的应用程序代码泄漏的私有数据。PrivacyScope通过分析应用程序代码和识别违反称为不可逆性的属性来实现这一点。我们引入了不可逆性,因为经典的不干扰特性在某些情况下无法检测私有数据泄漏,例如,在机器学习(ML)程序中,程序输出总是与(私有)输入数据相关。由于其严格依赖于可观察状态,在这些情况下,不干扰检测无法检测到私有数据泄漏。通过设计,PrivacyScope可以检测显式和隐式信息泄漏。不可逆性是根据不干涉性正式定义的。此外,我们将PrivacyScope的算法描述为对通用语言的运行时语义的扩展。为了评估我们的方法和可行性验证原型的有效性,我们应用PrivacyScope在选择的开源ML代码模块(包括线性回归、k-means聚类和协同过滤)中检测数据泄漏。此外,PrivacyScope可以检测程序员故意注入的数据泄漏代码。我们负责任地披露了我们分析的开源ML程序中发现的所有导致私人数据泄露的漏洞。
{"title":"PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications","authors":"Ruide Zhang, Ning Zhang, A. Moini, W. Lou, Thomas Hou","doi":"10.1109/ICDCS47774.2020.00013","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00013","url":null,"abstract":"Big data analytics is having a profound impact on many sectors of the economy by transforming raw data into actionable intelligence. However, increased use of sensitive business and private personal data with no or limited privacy safeguards has raised great concerns among individuals and government regulators. To address the growing tension between the need for data utility and the demand for data privacy, trusted execution environment (TEE) is being used in academic research as well as industrial application as a powerful primitive to enable confidential computation on the private data with only the result disclosed but not the original private data. While much of the current research has been focusing on protecting the TEE against attacks (e.g. side-channel information leakage), the security and privacy of the applications executing inside a TEE enclave has received little attention. The general attitude is that the application is running inside a trusted computing base (TCB), and therefore can be trusted. This assumption may not be valid when it comes to unverified third-party applications.In this paper, we present PrivacyScope, a static code analyzer designed to detect leakage of private data by an application code running in a TEE. PrivacyScope accomplishes this by analyzing the application code and identifying violations of a property called nonreversibility. We introduce nonreversibility since the classical noninterference property falls short of detecting private data leakage in certain scenarios, e.g., in machine learning (ML) programs where the program output is always related to (private) input data. Given its strict reliance on observable state, the noninterference falls short of detecting private data leakage in these situations. By design, PrivacyScope detects both explicit and implicit information leakage. The nonreversibility property is formally defined based on the noninterference property. Additionally, we describe the algorithms for PrivacyScope as extensions to the runtime semantics of a general language. To evaluate the efficacy of our approach and proof-of-feasibility prototype, we apply PrivacyScope to detect data leakage in select open-source ML code modules including linear regression, k-means clustering and collaborative filtering. Also, PrivacyScope can detect intentional data leakage code injected by a programmer. We responsibly disclosed all the discovered vulnerabilities leading to disclosure of private data in the open-source ML program we analyzed.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TagMic: Listening Through RFID Signals TagMic:通过RFID信号收听
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00136
Yin Li, Chunhui Duan, Xuan Ding, Cihang Liu
RFID is an increasingly ubiquitous technology widely adopted in both the industry and our daily life nowadays. But when it comes to eavesdropping, people usually pay attention to devices like cameras and mobile phones, instead of small-volume and battery-free RFID tags. This work shows the possibility of using prevalence RFIDs to capture and recognize the acoustic signals. To be specific, we attach an RFID tag on an object, which is located in the vicinity of the sound source. Our key innovation lies in the translation between the vibrations induced when the sound wave hits the object surface and the fluctuations in the tag’s RF signals. Although the inherent sampling rate of commercial RFID devices is deficient, and the vibrations are very subtle, we still extract characteristic features from imperfect measurements by taking advantage of state-of-the-art machine learning and signal processing algorithms. We have implemented our system with commercial RFID and loudspeaker equipment and evaluated it intensively in our lab environment. Experimental results show that the average success rate in detecting single tone sounds can reach as high as 93.10%. We believe our work would raise the attention of RFID in the concern of surveillance and security.
RFID是一项越来越普遍的技术,广泛应用于工业和日常生活中。但在窃听方面,人们通常关注的是相机和手机等设备,而不是小体积、无电池的RFID标签。这项工作显示了使用流行射频识别来捕获和识别声学信号的可能性。具体地说,我们将射频识别标签贴在位于声源附近的物体上。我们的关键创新在于声波撞击物体表面时产生的振动与标签射频信号波动之间的转换。尽管商用RFID设备固有的采样率不足,振动非常微妙,但我们仍然利用最先进的机器学习和信号处理算法,从不完美的测量中提取特征。我们已经在商用RFID和扬声器设备上实施了我们的系统,并在我们的实验室环境中对其进行了深入评估。实验结果表明,该方法检测单音声音的平均成功率可达93.10%。我们相信我们的工作将会引起人们对RFID在监控和安全方面的关注。
{"title":"TagMic: Listening Through RFID Signals","authors":"Yin Li, Chunhui Duan, Xuan Ding, Cihang Liu","doi":"10.1109/ICDCS47774.2020.00136","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00136","url":null,"abstract":"RFID is an increasingly ubiquitous technology widely adopted in both the industry and our daily life nowadays. But when it comes to eavesdropping, people usually pay attention to devices like cameras and mobile phones, instead of small-volume and battery-free RFID tags. This work shows the possibility of using prevalence RFIDs to capture and recognize the acoustic signals. To be specific, we attach an RFID tag on an object, which is located in the vicinity of the sound source. Our key innovation lies in the translation between the vibrations induced when the sound wave hits the object surface and the fluctuations in the tag’s RF signals. Although the inherent sampling rate of commercial RFID devices is deficient, and the vibrations are very subtle, we still extract characteristic features from imperfect measurements by taking advantage of state-of-the-art machine learning and signal processing algorithms. We have implemented our system with commercial RFID and loudspeaker equipment and evaluated it intensively in our lab environment. Experimental results show that the average success rate in detecting single tone sounds can reach as high as 93.10%. We believe our work would raise the attention of RFID in the concern of surveillance and security.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131646582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact Consensus under Global Asymmetric Byzantine Links 全局不对称拜占庭链接下的精确共识
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00103
Lewis Tseng, Qinzi Zhang, Saptaparni Kumar, Yifan Zhang
Fault-tolerant distributed consensus is an important primitive in many large-scale distributed systems and applications. The consensus problem has been investigated under various fault models in the literature since the seminal work by Lamport et al. in 1982. In this paper, we study the exact consensus problem in a new faulty link model, namely global asymmetric Byzantine (GAB) link model. Our link-fault model is simple, yet to our surprise, not studied before.In our system, all the nodes are fault-free and each pair of nodes can communicate directly with each other. In the GAB link model, up to f directed links may become Byzantine, and have arbitrary behavior. Non-faulty links deliver messages reliably. In our model, it is possible that the link from node a to node b is faulty, but the link from node b to node a is fault-free. Unlike some prior models with a local constraint, which enforced a local upper bound on the number of failure links attached to each node, we adopt the global constraint, which allows any link to be corrupted in the GAB model. These global and asymmetric features distinguish our model from all prior faulty link models.In our GAB model, we study the consensus problem in both synchronous and asynchronous systems. We show that 2f + 1 nodes is both necessary and sufficient for solving synchronous consensus, whereas 2f+2 nodes is the tight condition on resilience for solving asynchronous consensus. We also study the models where faulty links are mobile (or transient), i.e., the set of faulty links might change from round to round. We show that 2f + 3 nodes is necessary and sufficient for a family of algorithms that update local state in an iterative fashion.
在许多大规模分布式系统和应用中,容错分布式一致性是一个重要的原语。自Lamport等人1982年开创性的工作以来,共识问题已经在各种故障模型下进行了研究。本文研究了一种新的故障链路模型——全局不对称拜占庭(GAB)链路模型中的精确一致性问题。我们的链接故障模型很简单,但令我们惊讶的是,以前没有研究过。在我们的系统中,所有的节点都是无故障的,每对节点之间都可以直接通信。在GAB链接模型中,多达f个定向链接可能变成拜占庭式的,并且具有任意行为。无故障链路能够可靠地传递消息。在我们的模型中,有可能从节点a到节点b的链路是故障的,但从节点b到节点a的链路是无故障的。与先前的一些带有局部约束的模型不同,我们采用全局约束,它允许GAB模型中的任何链路损坏,而局部约束对附加到每个节点的故障链接数量施加了局部上限。这些全局和不对称特征将我们的模型与所有先前的故障链接模型区分开来。在GAB模型中,我们研究了同步系统和异步系统的一致性问题。我们证明了2f+ 1节点是解决同步共识的充分必要条件,而2f+2节点是解决异步共识弹性的严格条件。我们还研究了故障链接移动(或瞬态)的模型,即故障链接的集合可能从一轮到一轮地变化。我们证明了2f + 3个节点对于以迭代方式更新局部状态的算法族是必要和充分的。
{"title":"Exact Consensus under Global Asymmetric Byzantine Links","authors":"Lewis Tseng, Qinzi Zhang, Saptaparni Kumar, Yifan Zhang","doi":"10.1109/ICDCS47774.2020.00103","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00103","url":null,"abstract":"Fault-tolerant distributed consensus is an important primitive in many large-scale distributed systems and applications. The consensus problem has been investigated under various fault models in the literature since the seminal work by Lamport et al. in 1982. In this paper, we study the exact consensus problem in a new faulty link model, namely global asymmetric Byzantine (GAB) link model. Our link-fault model is simple, yet to our surprise, not studied before.In our system, all the nodes are fault-free and each pair of nodes can communicate directly with each other. In the GAB link model, up to f directed links may become Byzantine, and have arbitrary behavior. Non-faulty links deliver messages reliably. In our model, it is possible that the link from node a to node b is faulty, but the link from node b to node a is fault-free. Unlike some prior models with a local constraint, which enforced a local upper bound on the number of failure links attached to each node, we adopt the global constraint, which allows any link to be corrupted in the GAB model. These global and asymmetric features distinguish our model from all prior faulty link models.In our GAB model, we study the consensus problem in both synchronous and asynchronous systems. We show that 2f + 1 nodes is both necessary and sufficient for solving synchronous consensus, whereas 2f+2 nodes is the tight condition on resilience for solving asynchronous consensus. We also study the models where faulty links are mobile (or transient), i.e., the set of faulty links might change from round to round. We show that 2f + 3 nodes is necessary and sufficient for a family of algorithms that update local state in an iterative fashion.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125688075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A LoRaWAN-MAC Protocol Based on WSN Residual Energy to Adjust Duty Cycle* 基于WSN剩余能量调节占空比的LoRaWAN-MAC协议*
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00187
Ting Xu, Mingde Zhao
With the expansion of the scale of wireless sensor networks, people have higher requirements for the real-time nature of receiving information and the power consumption of network equipment. LoRa technology for low-power wide-area networks has been produced, but the energy consumption of network terminal nodes is still facing huge problems. Challenge. In this thesis, the REDS strategy based on LoRa technology is proposed. First, the residual energy is used to detect the preamble in the beacon, so that CAD can judge the effective preamble from the noise to avoid false wake up. Then use the remaining energy of the nodes in the remote Sink area of the network to activate the node and perform CAD channel detection. The node selects the communication access method according to the channel quality. When the network traffic load is low, the node communicates according to the CSMA-CA competition method. When the traffic load in the network is high, the nodes communicate and access according to the dynamic duty cycle method. It is proved that the network delay can be reduced by 29% and the energy efficiency can be improved by 19%. Thereby avoiding data collisions, improving channel utilization, and weighing the trade-off between network delay and network energy consumption.
随着无线传感器网络规模的不断扩大,人们对接收信息的实时性和网络设备的功耗提出了更高的要求。低功耗广域网的LoRa技术已经产生,但网络终端节点的能耗仍然面临着巨大的问题。挑战。本文提出了基于LoRa技术的red策略。首先,利用剩余能量检测信标中的前导,使CAD能够从噪声中判断有效的前导,避免误唤醒;然后利用网络远程Sink区域节点的剩余能量激活节点并进行CAD通道检测。节点根据信道质量选择通信接入方式。当网络流量负荷较低时,节点按照CSMA-CA竞争方式进行通信。当网络中业务量较大时,各节点按照动态占空比方式进行通信和接入。实验证明,该方法可使网络时延降低29%,能源效率提高19%。从而避免数据冲突,提高信道利用率,并权衡网络延迟和网络能耗之间的权衡。
{"title":"A LoRaWAN-MAC Protocol Based on WSN Residual Energy to Adjust Duty Cycle*","authors":"Ting Xu, Mingde Zhao","doi":"10.1109/ICDCS47774.2020.00187","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00187","url":null,"abstract":"With the expansion of the scale of wireless sensor networks, people have higher requirements for the real-time nature of receiving information and the power consumption of network equipment. LoRa technology for low-power wide-area networks has been produced, but the energy consumption of network terminal nodes is still facing huge problems. Challenge. In this thesis, the REDS strategy based on LoRa technology is proposed. First, the residual energy is used to detect the preamble in the beacon, so that CAD can judge the effective preamble from the noise to avoid false wake up. Then use the remaining energy of the nodes in the remote Sink area of the network to activate the node and perform CAD channel detection. The node selects the communication access method according to the channel quality. When the network traffic load is low, the node communicates according to the CSMA-CA competition method. When the traffic load in the network is high, the nodes communicate and access according to the dynamic duty cycle method. It is proved that the network delay can be reduced by 29% and the energy efficiency can be improved by 19%. Thereby avoiding data collisions, improving channel utilization, and weighing the trade-off between network delay and network energy consumption.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1