首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
A Community Platform for Research on Pricing and Distributed Machine Learning 定价与分布式机器学习研究的社区平台
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00117
Xuanzhe Li, Samuel Gomena, L. Ballard, Juntao Li, Ehsan Aryafar, Carlee Joe-Wong
Data generated by increasingly pervasive and intelligent devices has led to an explosion in the use of machine learning (ML) and artificial intelligence, with ever more complex models trained to support applications in fields as diverse as healthcare, finance, and robotics. In order to train these models in a reasonable amount of time, the training is often distributed among multiple machines. However, paying for these machines (either by constructing a local cloud infrastructure or renting machines through an external provider such as Amazon AWS) is very costly. We propose to reduce these costs by creating a marketplace of computing resources designed to support distributed machine learning algorithms. Through our marketplace (coined “DeepMarket”), users can lend their spare computing resources (when not needed) or augment their resources with available DeepMarket machines to train their ML models. Such a marketplace directly provides several benefits for two groups of researchers: (i) ML researchers would be able to train their models with much reduced cost, and (ii) network economics researchers would be able to experiment with different compute pricing mechanisms. The focus of this Demo is to introduce the audience to DeepMarket and its user interface (named “PLUTO”). In particular, we will bring a few laptops with pre-installed PLUTO applications so that users can see how they can create an account on DeepMarket servers, lend their resource, borrow available resources, submit ML jobs, and retrieve the results. Our overall goal is to encourage the conference audience to install PLUTO on their own machines and create a user and developer community around DeepMarket.
越来越普及和智能的设备产生的数据导致机器学习(ML)和人工智能的使用呈爆炸式增长,越来越复杂的模型经过训练,以支持医疗保健、金融和机器人等不同领域的应用。为了在合理的时间内训练这些模型,训练通常分布在多台机器上。然而,为这些机器付费(通过构建本地云基础设施或通过Amazon AWS等外部提供商租用机器)非常昂贵。我们建议通过创建一个旨在支持分布式机器学习算法的计算资源市场来降低这些成本。通过我们的市场(创造了“DeepMarket”),用户可以借出他们多余的计算资源(当不需要的时候),或者用可用的DeepMarket机器来增加他们的资源来训练他们的机器学习模型。这样的市场直接为两组研究人员提供了几个好处:(i)机器学习研究人员将能够以更低的成本训练他们的模型,(ii)网络经济学研究人员将能够试验不同的计算定价机制。本演示的重点是向观众介绍DeepMarket及其用户界面(名为“PLUTO”)。特别是,我们将带来一些预装PLUTO应用程序的笔记本电脑,以便用户可以看到他们如何在DeepMarket服务器上创建帐户,借出资源,借用可用资源,提交ML作业以及检索结果。我们的总体目标是鼓励与会者在他们自己的机器上安装PLUTO,并围绕DeepMarket创建一个用户和开发者社区。
{"title":"A Community Platform for Research on Pricing and Distributed Machine Learning","authors":"Xuanzhe Li, Samuel Gomena, L. Ballard, Juntao Li, Ehsan Aryafar, Carlee Joe-Wong","doi":"10.1109/ICDCS47774.2020.00117","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00117","url":null,"abstract":"Data generated by increasingly pervasive and intelligent devices has led to an explosion in the use of machine learning (ML) and artificial intelligence, with ever more complex models trained to support applications in fields as diverse as healthcare, finance, and robotics. In order to train these models in a reasonable amount of time, the training is often distributed among multiple machines. However, paying for these machines (either by constructing a local cloud infrastructure or renting machines through an external provider such as Amazon AWS) is very costly. We propose to reduce these costs by creating a marketplace of computing resources designed to support distributed machine learning algorithms. Through our marketplace (coined “DeepMarket”), users can lend their spare computing resources (when not needed) or augment their resources with available DeepMarket machines to train their ML models. Such a marketplace directly provides several benefits for two groups of researchers: (i) ML researchers would be able to train their models with much reduced cost, and (ii) network economics researchers would be able to experiment with different compute pricing mechanisms. The focus of this Demo is to introduce the audience to DeepMarket and its user interface (named “PLUTO”). In particular, we will bring a few laptops with pre-installed PLUTO applications so that users can see how they can create an account on DeepMarket servers, lend their resource, borrow available resources, submit ML jobs, and retrieve the results. Our overall goal is to encourage the conference audience to install PLUTO on their own machines and create a user and developer community around DeepMarket.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FabAsset: Unique Digital Asset Management System for Hyperledger Fabric FabAsset:用于超级账本结构的独特数字资产管理系统
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00163
Sangwon Hong, Yoongdoo Noh, Jeyoung Hwang, Chanik Park
Business is innovating with the advent of blockchain that tokenizes digital assets. To expand the blockchain’s potential, Ethereum, a representative permissionless blockchain platform, supports the fungible token (FT) standard ERC-20 and the nonfungible token (NFT) standard ERC-721. Hyperledger Fabric (Fabric), a representative permissioned blockchain platform, proposed FabToken to support tokens in version 2.0.0 alpha. But FabToken contains only FTs, not NFTs. Given the market share in the enterprise blockchains, Fabric needs to support NFTs as soon as possible. This paper presents a unique digital asset management system called FabAsset so that Fabric can run decentralized applications that require NFTs. This paper describes the design of FabAsset, consisting of chaincode and SDK (Software Development Kit), and the prototype of a decentralized signature service leveraging FabAsset to validate its usefulness.
随着区块链的出现,商业正在创新,区块链将数字资产标记化。为了扩大区块链的潜力,以太坊是一个代表性的无权限区块链平台,支持可替代代币(FT)标准ERC-20和不可替代代币(NFT)标准ERC-721。Hyperledger Fabric (Fabric)是一个代表性的许可区块链平台,在2.0.0 alpha版本中提出了支持令牌的FabToken。但是FabToken只包含ft,不包含nft。考虑到企业区块链的市场份额,Fabric需要尽快支持nft。本文提出了一种名为FabAsset的独特数字资产管理系统,使Fabric可以运行需要nft的分散应用程序。本文描述了由链码和SDK(软件开发工具包)组成的FabAsset的设计,以及利用FabAsset验证其实用性的去中心化签名服务的原型。
{"title":"FabAsset: Unique Digital Asset Management System for Hyperledger Fabric","authors":"Sangwon Hong, Yoongdoo Noh, Jeyoung Hwang, Chanik Park","doi":"10.1109/ICDCS47774.2020.00163","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00163","url":null,"abstract":"Business is innovating with the advent of blockchain that tokenizes digital assets. To expand the blockchain’s potential, Ethereum, a representative permissionless blockchain platform, supports the fungible token (FT) standard ERC-20 and the nonfungible token (NFT) standard ERC-721. Hyperledger Fabric (Fabric), a representative permissioned blockchain platform, proposed FabToken to support tokens in version 2.0.0 alpha. But FabToken contains only FTs, not NFTs. Given the market share in the enterprise blockchains, Fabric needs to support NFTs as soon as possible. This paper presents a unique digital asset management system called FabAsset so that Fabric can run decentralized applications that require NFTs. This paper describes the design of FabAsset, consisting of chaincode and SDK (Software Development Kit), and the prototype of a decentralized signature service leveraging FabAsset to validate its usefulness.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"54 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CROSS: A Crowdsourcing based Sub-Servers Selection Framework in D2D Enhanced MEC Architecture CROSS: D2D增强型MEC架构中基于众包的子服务器选择框架
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00070
Tuo Shi, Zhipeng Cai, Jianzhong Li, Hong Gao
In a Device-to-Device (D2D) mobile edge computing system, the mobile devices can share computation and communication resources with each other. A mobile device can offload its computation task to a nearby mobile device. In order to release the computation workload of mobile edge servers and enhance the mobile edge service coverage quality, a set of mobile devices can be selected as sub-servers and provide mobile edge service to nearby devices. Based on the crowdsourcing technique, we have proposed a framework, CROSS, to select sub-servers in a D2D enhanced mobile edge computing system. Two major problems in CROSS framework, the sub-server selection problem and the payoff allocation problem, have been formulated. The first problem is proved to be NP-Hard and solved by an approximation algorithm. The second problem is solved by an auction mechanism. The performance of the CROSS framework is evaluated by experiments. The experimental results show that the CROSS framework is efficient and effective.
在D2D (Device-to-Device)移动边缘计算系统中,移动设备之间可以共享计算资源和通信资源。移动设备可以将其计算任务卸载到附近的移动设备上。为了减轻移动边缘服务器的计算负担,提高移动边缘服务的覆盖质量,可以选择一组移动设备作为子服务器,向附近的设备提供移动边缘服务。基于众包技术,我们提出了一个CROSS框架来选择D2D增强型移动边缘计算系统中的子服务器。提出了CROSS框架中的两个主要问题:子服务器选择问题和收益分配问题。证明了第一个问题是NP-Hard问题,并采用近似算法求解。第二个问题是通过拍卖机制解决的。通过实验对CROSS框架的性能进行了评价。实验结果表明,该交叉框架是高效的。
{"title":"CROSS: A Crowdsourcing based Sub-Servers Selection Framework in D2D Enhanced MEC Architecture","authors":"Tuo Shi, Zhipeng Cai, Jianzhong Li, Hong Gao","doi":"10.1109/ICDCS47774.2020.00070","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00070","url":null,"abstract":"In a Device-to-Device (D2D) mobile edge computing system, the mobile devices can share computation and communication resources with each other. A mobile device can offload its computation task to a nearby mobile device. In order to release the computation workload of mobile edge servers and enhance the mobile edge service coverage quality, a set of mobile devices can be selected as sub-servers and provide mobile edge service to nearby devices. Based on the crowdsourcing technique, we have proposed a framework, CROSS, to select sub-servers in a D2D enhanced mobile edge computing system. Two major problems in CROSS framework, the sub-server selection problem and the payoff allocation problem, have been formulated. The first problem is proved to be NP-Hard and solved by an approximation algorithm. The second problem is solved by an auction mechanism. The performance of the CROSS framework is evaluated by experiments. The experimental results show that the CROSS framework is efficient and effective.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Image Denoising for Efficient Anomaly Detection in Videos 基于图像去噪的高效视频异常检测
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00181
Zhiwen Fang, Zhou Yue, Weiyuan Liu, Feng Yang
Video anomaly detection is tasked with the identification of events that do not conform to expected events. Currently, most methods tackle this problem by mining common normal patterns from training data and minimizing the generative errors. In inference phase, a large generative error is assigned to an abnormal event and a small one is for a normal event. However, because these methods only focus on the error intensity but ignore the error pattern, partial abnormal events will own similar generative error intensities to the normal ones. Thus, we propose to tackle the anomaly detection within an efficient image denoising framework. In this framework, the generative errors are treated as a kind of artificial noise, which will be superimposed on the current frame. Then, the contaminated frame is fed into a denoising network, which is trained to output a frame close to the current frame. In the denoising network, the common patterns of training data and the error patterns of each training frame can be learned jointly. It will benefit anomaly detection by restraining the generative errors of normal frames. The results on several challenging benchmark datasets demonstrate the effectiveness of our proposed method.
视频异常检测的任务是识别不符合预期事件的事件。目前,大多数方法都是通过从训练数据中挖掘常见的正态模式并最小化生成误差来解决这一问题。在推理阶段,对异常事件分配大的生成误差,对正常事件分配小的生成误差。然而,由于这些方法只关注错误强度而忽略了错误模式,部分异常事件将具有与正常事件相似的生成错误强度。因此,我们提出在有效的图像去噪框架内解决异常检测问题。在该框架中,生成误差被视为一种人工噪声,叠加在当前框架上。然后,将被污染的帧送入去噪网络,该网络经过训练后输出与当前帧接近的帧。在去噪网络中,可以联合学习训练数据的共同模式和每个训练帧的误差模式。通过抑制正常帧的生成错误,有利于异常检测。在几个具有挑战性的基准数据集上的结果证明了我们提出的方法的有效性。
{"title":"Image Denoising for Efficient Anomaly Detection in Videos","authors":"Zhiwen Fang, Zhou Yue, Weiyuan Liu, Feng Yang","doi":"10.1109/ICDCS47774.2020.00181","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00181","url":null,"abstract":"Video anomaly detection is tasked with the identification of events that do not conform to expected events. Currently, most methods tackle this problem by mining common normal patterns from training data and minimizing the generative errors. In inference phase, a large generative error is assigned to an abnormal event and a small one is for a normal event. However, because these methods only focus on the error intensity but ignore the error pattern, partial abnormal events will own similar generative error intensities to the normal ones. Thus, we propose to tackle the anomaly detection within an efficient image denoising framework. In this framework, the generative errors are treated as a kind of artificial noise, which will be superimposed on the current frame. Then, the contaminated frame is fed into a denoising network, which is trained to output a frame close to the current frame. In the denoising network, the common patterns of training data and the error patterns of each training frame can be learned jointly. It will benefit anomaly detection by restraining the generative errors of normal frames. The results on several challenging benchmark datasets demonstrate the effectiveness of our proposed method.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISCO: Distributed Control Plane Architecture for Resource Sharing in Heterogeneous Mobile Edge Cloud Scenarios DISCO:异构移动边缘云场景中资源共享的分布式控制平面架构
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00095
S. Maheshwari, P. Netalkar, D. Raychaudhuri
This paper presents a novel control plane protocol designed to enable cooperative resource sharing in heterogeneous edge cloud scenarios. While edge clouds offer the advantage of potentially lower latency for time critical applications, computing load generated by mobile users at the network edge can be very bursty as compared with aggregated traffic served by a data center. This motivates the design of a shared control plane which enables dynamic resource sharing between edge clouds in a region. The proposed control plane is designed to exchange key compute and network parameters (such as CPU GIPS, % utilization, and network bandwidth) needed for cooperation between heterogeneous edge clouds across network domains. The protocol thus enables sharing mechanisms such as dynamic resource assignment, compute offloading, load balancing, multi-node orchestration, and service migration. A specific distributed control plane (DISCO) based on overlay neighbor distribution with hop-count limit is described and evaluated in terms of control overhead and performance using an experimental proto-type running on the ORBIT radio grid testbed. The prototype system implements a heterogeneous network with 18 autonomous systems each with a compute cluster that participates in the control plane protocol and executes specified resource sharing algorithms. Experimental results are given comparing the performance of the baseline with no cooperation to that of cooperative algorithms for compute offloading, cluster computing and service chaining. An application level evaluation of latency vs. offered load is also carried out for an example time-critical application (image analysis for traffic lane detection). The results show significant performance gains (as much as 45% for the cluster computing example) vs. the no cooperation baseline in each case at the cost of relatively modest complexity and overhead.
本文提出了一种新的控制平面协议,旨在实现异构边缘云场景下的协同资源共享。虽然边缘云为时间关键型应用程序提供了潜在的更低延迟的优势,但与数据中心提供的聚合流量相比,移动用户在网络边缘生成的计算负载可能非常突发。这激发了共享控制平面的设计,它可以在区域内的边缘云之间实现动态资源共享。所提出的控制平面旨在交换跨网络域异构边缘云之间协作所需的关键计算和网络参数(如CPU GIPS、利用率百分比和网络带宽)。因此,该协议支持动态资源分配、计算卸载、负载均衡、多节点编排和业务迁移等共享机制。介绍了一种基于跳数限制的覆盖邻居分布的分布式控制平面(DISCO),并通过运行在ORBIT无线电网格试验台的实验样机对其控制开销和性能进行了评价。原型系统实现了一个由18个自治系统组成的异构网络,每个自治系统都有一个计算集群,该集群参与控制平面协议并执行指定的资源共享算法。在计算卸载、集群计算和服务链等方面,比较了无协作基线算法与协作算法的性能。对于一个时间关键型应用程序(用于交通车道检测的图像分析),还对延迟与提供的负载进行了应用程序级别的评估。结果显示,在每种情况下,以相对适度的复杂性和开销为代价,与无协作基线相比,性能都有了显著的提高(对于集群计算示例,性能提高了45%)。
{"title":"DISCO: Distributed Control Plane Architecture for Resource Sharing in Heterogeneous Mobile Edge Cloud Scenarios","authors":"S. Maheshwari, P. Netalkar, D. Raychaudhuri","doi":"10.1109/ICDCS47774.2020.00095","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00095","url":null,"abstract":"This paper presents a novel control plane protocol designed to enable cooperative resource sharing in heterogeneous edge cloud scenarios. While edge clouds offer the advantage of potentially lower latency for time critical applications, computing load generated by mobile users at the network edge can be very bursty as compared with aggregated traffic served by a data center. This motivates the design of a shared control plane which enables dynamic resource sharing between edge clouds in a region. The proposed control plane is designed to exchange key compute and network parameters (such as CPU GIPS, % utilization, and network bandwidth) needed for cooperation between heterogeneous edge clouds across network domains. The protocol thus enables sharing mechanisms such as dynamic resource assignment, compute offloading, load balancing, multi-node orchestration, and service migration. A specific distributed control plane (DISCO) based on overlay neighbor distribution with hop-count limit is described and evaluated in terms of control overhead and performance using an experimental proto-type running on the ORBIT radio grid testbed. The prototype system implements a heterogeneous network with 18 autonomous systems each with a compute cluster that participates in the control plane protocol and executes specified resource sharing algorithms. Experimental results are given comparing the performance of the baseline with no cooperation to that of cooperative algorithms for compute offloading, cluster computing and service chaining. An application level evaluation of latency vs. offered load is also carried out for an example time-critical application (image analysis for traffic lane detection). The results show significant performance gains (as much as 45% for the cluster computing example) vs. the no cooperation baseline in each case at the cost of relatively modest complexity and overhead.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Semi-Fast Byzantine-tolerant Shared Register without Reliable Broadcast 无可靠广播的半快速拜占庭容忍共享寄存器
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00057
K. Konwar, Saptaparni Kumar, Lewis Tseng
Shared register emulations on top of message-passing systems provide an illusion of a simpler shared memory system which can make the task of a system designer easier. Numerous shared register applications have a considerably high read-to-write ratio. Thus, having algorithms that make reads more efficient than writes is a fair trade-off.Typically, such algorithms for reads and writes are asymmetric and sacrifice the stringent consistency condition atomicity, as it is impossible to have fast reads for multi-writer atomicity. Safety is a consistency condition that has has gathered interest from both the systems and theory community as it is weaker than atomicity yet provides strong enough guarantees like "strong consistency" or read-my-write consistency. One requirement that is assumed by many researchers is that of the reliable broadcast (RB) primitive, which ensures the "all or none" property during a broadcast. One drawback is that such a primitive takes 1.5 rounds to complete and requires server-to-server communication.This paper implements an efficient multi-writer multi-reader safe register without using a reliable broadcast primitive. Moreover, we provide fast reads or one-shot reads – our read operations can be completed in one round of client-to-server communication. Of course, this comes with the price of requiring more servers when compared to prior solutions assuming reliable broadcast. However, we show that this increased number of servers is indeed necessary as we prove a tight bound on the number of servers required to implement Byzantine-fault tolerant safe registers in a system without reliable broadcast.We extend our results to data stored using erasure coding as well. We present an emulation of single-writer multi-reader safe register based on MDS codes. The usage of MDS codes reduces storage and communication costs. On the negative side, we also show that to use MDS codes and at the same time achieve one-shot reads, we need even more servers.
在消息传递系统之上的共享寄存器模拟提供了一种更简单的共享内存系统的错觉,这可以使系统设计人员的任务更容易。许多共享寄存器应用程序具有相当高的读写比率。因此,拥有使读比写更有效的算法是一种公平的权衡。通常,这种读写算法是不对称的,并且牺牲了严格的一致性条件原子性,因为对于多写器原子性来说,不可能实现快速读取。安全性是一种一致性条件,已经引起了系统和理论界的兴趣,因为它比原子性弱,但提供了足够强的保证,如“强一致性”或“读我写一致性”。许多研究人员假设的一个要求是可靠广播(RB)原语,它确保在广播期间的“全或无”属性。一个缺点是这样的原语需要1.5轮才能完成,并且需要服务器到服务器的通信。本文在不使用可靠广播原语的情况下实现了一种高效的多写多读安全寄存器。此外,我们提供快速读取或一次性读取-我们的读取操作可以在一轮客户端到服务器的通信中完成。当然,与假设可靠广播的先前解决方案相比,这需要更多的服务器。然而,我们表明,增加的服务器数量确实是必要的,因为我们证明了在没有可靠广播的系统中实现拜占庭容错安全寄存器所需的服务器数量的严格限制。我们还将结果扩展到使用擦除编码存储的数据。提出了一种基于MDS代码的单写多读安全寄存器仿真方法。MDS代码的使用降低了存储和通信成本。在消极的一面,我们也表明,使用MDS代码,同时实现一次读取,我们需要更多的服务器。
{"title":"Semi-Fast Byzantine-tolerant Shared Register without Reliable Broadcast","authors":"K. Konwar, Saptaparni Kumar, Lewis Tseng","doi":"10.1109/ICDCS47774.2020.00057","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00057","url":null,"abstract":"Shared register emulations on top of message-passing systems provide an illusion of a simpler shared memory system which can make the task of a system designer easier. Numerous shared register applications have a considerably high read-to-write ratio. Thus, having algorithms that make reads more efficient than writes is a fair trade-off.Typically, such algorithms for reads and writes are asymmetric and sacrifice the stringent consistency condition atomicity, as it is impossible to have fast reads for multi-writer atomicity. Safety is a consistency condition that has has gathered interest from both the systems and theory community as it is weaker than atomicity yet provides strong enough guarantees like \"strong consistency\" or read-my-write consistency. One requirement that is assumed by many researchers is that of the reliable broadcast (RB) primitive, which ensures the \"all or none\" property during a broadcast. One drawback is that such a primitive takes 1.5 rounds to complete and requires server-to-server communication.This paper implements an efficient multi-writer multi-reader safe register without using a reliable broadcast primitive. Moreover, we provide fast reads or one-shot reads – our read operations can be completed in one round of client-to-server communication. Of course, this comes with the price of requiring more servers when compared to prior solutions assuming reliable broadcast. However, we show that this increased number of servers is indeed necessary as we prove a tight bound on the number of servers required to implement Byzantine-fault tolerant safe registers in a system without reliable broadcast.We extend our results to data stored using erasure coding as well. We present an emulation of single-writer multi-reader safe register based on MDS codes. The usage of MDS codes reduces storage and communication costs. On the negative side, we also show that to use MDS codes and at the same time achieve one-shot reads, we need even more servers.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users 9年比特币交易研究:理解比特币矿工和用户的现实行为
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00091
Binbing Hou, Feng Chen
Bitcoin is the world’s first blockchain-based, peer-to-peer cryptocurrency system. Being tremendously successful, the Bitcoin system is designed to support reliable, secure, and trusted transactions between untrusted peers. Since its release in 2009, the Bitcoin system has rapidly grown to an unprecedentedly large scale. However, the real-world behaviors of miners and users in the system and the efficacy of the original Bitcoin system design in the field deployment still remain unclear, hindering us from understanding its internals and developing the next-generation cryptocurrency system.In this paper, we study the behaviors of Bitcoin miners and users and their interactions based on quantitative analysis of more than nine years of Bitcoin transaction history, from its first release on January 3rd, 2009 to April 30th, 2018. We have analyzed over 300 million transaction records to study the transactions’ processing, confirmation, and implementation. We have obtained several critical findings regarding how the miners and users exploit the high degree of freedom provided by the Bitcoin system to achieve their own interests. For example, we find that miners often attempt to maximize their profits even by sacrificing system performance; users could try to speed up the transaction processing by mistakenly trading off security for reduced latency. Such unexpected behaviors, to some degree, deviate from the original design purposes of the Bitcoin system and could bring undesirable consequences. Besides revealing several unexpected behaviors of the Bitcoin miners and users in the real world, we have also discussed the associated system implications as well as optimization opportunities in the future.
比特币是世界上第一个基于区块链的点对点加密货币系统。由于取得了巨大的成功,比特币系统旨在支持不受信任的对等体之间可靠、安全和可信的交易。自2009年发布以来,比特币系统迅速发展到前所未有的规模。然而,系统中矿工和用户的真实行为以及原始比特币系统设计在现场部署中的功效仍然不清楚,阻碍了我们了解其内部和开发下一代加密货币系统。在本文中,我们通过对比特币从2009年1月3日首次发布到2018年4月30日的九年多的交易历史进行定量分析,研究了比特币矿工和用户的行为以及他们之间的互动。我们分析了3亿多笔交易记录,研究了交易的处理、确认和实现。关于矿工和用户如何利用比特币系统提供的高度自由来实现自己的利益,我们得到了一些重要的发现。例如,我们发现矿工经常试图通过牺牲系统性能来最大化他们的利润;用户可能会为了减少延迟而错误地牺牲安全性,从而试图加速事务处理。这种意想不到的行为在一定程度上偏离了比特币系统的原始设计目的,并可能带来不良后果。除了揭示现实世界中比特币矿工和用户的一些意想不到的行为外,我们还讨论了相关的系统影响以及未来的优化机会。
{"title":"A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users","authors":"Binbing Hou, Feng Chen","doi":"10.1109/ICDCS47774.2020.00091","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00091","url":null,"abstract":"Bitcoin is the world’s first blockchain-based, peer-to-peer cryptocurrency system. Being tremendously successful, the Bitcoin system is designed to support reliable, secure, and trusted transactions between untrusted peers. Since its release in 2009, the Bitcoin system has rapidly grown to an unprecedentedly large scale. However, the real-world behaviors of miners and users in the system and the efficacy of the original Bitcoin system design in the field deployment still remain unclear, hindering us from understanding its internals and developing the next-generation cryptocurrency system.In this paper, we study the behaviors of Bitcoin miners and users and their interactions based on quantitative analysis of more than nine years of Bitcoin transaction history, from its first release on January 3rd, 2009 to April 30th, 2018. We have analyzed over 300 million transaction records to study the transactions’ processing, confirmation, and implementation. We have obtained several critical findings regarding how the miners and users exploit the high degree of freedom provided by the Bitcoin system to achieve their own interests. For example, we find that miners often attempt to maximize their profits even by sacrificing system performance; users could try to speed up the transaction processing by mistakenly trading off security for reduced latency. Such unexpected behaviors, to some degree, deviate from the original design purposes of the Bitcoin system and could bring undesirable consequences. Besides revealing several unexpected behaviors of the Bitcoin miners and users in the real world, we have also discussed the associated system implications as well as optimization opportunities in the future.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MUSIC: Multi-Site Critical Sections over Geo-Distributed State 音乐:地理分布状态下的多站点关键部分
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00022
Bharath Balasubramanian, P. Zave, R. Schlichting, Mohammad Salehe, S. Narayanan, S. H. Mortazavi, E. D. Lara, M. Hiltunen, Kaustubh R. Joshi, Gueyoung Jung
A crucial requirement for many multi-site production services operating at global scale is the need for exclusive access to latest state. Here, a novel approach to address these requirements through the abstraction of a critical section over geo-distributed state is proposed. This abstraction is realized in a key-value store called MUSIC, which provides critical sections with novel semantics suitable for geo-distributed state referred to as entry consistency under failures (ECF). The semantics of ECF in MUSIC, its formal verification, and its implementation are presented, along with details of how MUSIC has been used to realize various fundamental geo-distributed structuring paradigms. MUSIC has been deployed in production geo-distributed services at AT&T as part of the Open Network Automation Platform (ONAP). Our evaluation of MUSIC shows that, despite providing additional properties, MUSIC has higher throughput (~1.4-17.17 times) than Zookeeper for larger critical section sizes and outperforms (~2-4 times) similar structures in which state updates use Paxos or CockroachDB transactions.
许多在全球范围内运行的多站点生产服务的一个关键要求是需要独占访问最新状态。本文提出了一种新的方法,通过抽象地理分布状态上的临界区域来满足这些需求。这种抽象是在一个名为MUSIC的键值存储中实现的,它为关键部分提供了适合地理分布状态的新语义,这种状态称为故障下的条目一致性(ECF)。介绍了MUSIC中ECF的语义、它的形式化验证及其实现,以及如何使用MUSIC来实现各种基本地理分布式结构范例的细节。作为开放网络自动化平台(ONAP)的一部分,MUSIC已经部署在AT&T的生产地理分布式服务中。我们对MUSIC的评估表明,尽管提供了额外的属性,对于更大的临界区大小,MUSIC具有比Zookeeper更高的吞吐量(~1.4-17.17倍),并且优于使用Paxos或CockroachDB事务进行状态更新的类似结构(~2-4倍)。
{"title":"MUSIC: Multi-Site Critical Sections over Geo-Distributed State","authors":"Bharath Balasubramanian, P. Zave, R. Schlichting, Mohammad Salehe, S. Narayanan, S. H. Mortazavi, E. D. Lara, M. Hiltunen, Kaustubh R. Joshi, Gueyoung Jung","doi":"10.1109/ICDCS47774.2020.00022","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00022","url":null,"abstract":"A crucial requirement for many multi-site production services operating at global scale is the need for exclusive access to latest state. Here, a novel approach to address these requirements through the abstraction of a critical section over geo-distributed state is proposed. This abstraction is realized in a key-value store called MUSIC, which provides critical sections with novel semantics suitable for geo-distributed state referred to as entry consistency under failures (ECF). The semantics of ECF in MUSIC, its formal verification, and its implementation are presented, along with details of how MUSIC has been used to realize various fundamental geo-distributed structuring paradigms. MUSIC has been deployed in production geo-distributed services at AT&T as part of the Open Network Automation Platform (ONAP). Our evaluation of MUSIC shows that, despite providing additional properties, MUSIC has higher throughput (~1.4-17.17 times) than Zookeeper for larger critical section sizes and outperforms (~2-4 times) similar structures in which state updates use Paxos or CockroachDB transactions.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Certificateless Consortium Blockchain for IoTs 物联网的无证书联盟区块链
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00054
Xiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bofu Yang
Blockchain is multi-centralized, immutable and traceable, thus is very suitable for distributed storage, privacy and security management in IoTs. However, most existing researches focus on the integration of public blockchain and IoTs. In fact, problems such as slow consensus, low transmission throughput, and completely open storage on the public blockchain are intolerable in IoT scenarios. Although consortium blockchain represented by Hyperledger Fabric has improved the transmission rate, its data security completely relies on the PKI-based certificate mechanism, resulting in transmission inefficiency and privacy leakage. In this paper, a key-derived Controllable Lightweight Secure Certificateless Signature (CLS2) algorithm is proposed to significantly improve the transmission efficiency and keep similar computation overhead of consortium blockchain. Compared with the existing certificateless signatures, CLS2 achieves more secure transactions, whose controllable anonymity and key-derived mechanism not only prevents public key replacement attacks and forged signature attacks, but also supports hierarchical privacy protection. Armed with CLS2, we design a consortium blockchain security architecture based on Hyper-ledger Fabric and edge computing. To the best of our knowledge, this is the first implementation of certificateless signature in consortium blockchain. We formally prove the security of our schemes in the random oracle model. Specifically, the security of the proposed scheme is reduced to the Elliptic curve discrete logarithm problem (ECDLP). Security analysis and experiments in IoT scenarios verify the feasibility and effectiveness of CLS2.
区块链具有多中心化、不可变和可追溯的特点,非常适合物联网中的分布式存储、隐私和安全管理。然而,现有的研究大多集中在公链与物联网的融合上。事实上,在物联网场景下,共识慢、传输吞吐量低、公有链完全开放存储等问题是无法容忍的。以Hyperledger Fabric为代表的联合体区块链虽然提高了传输速率,但其数据安全完全依赖于基于pki的证书机制,导致传输效率低下和隐私泄露。本文提出了一种基于密钥的可控轻量级安全无证书签名(CLS2)算法,以显著提高联盟区块链的传输效率并保持相似的计算开销。与现有的无证书签名相比,CLS2实现了更安全的交易,其可控制的匿名性和密钥派生机制不仅可以防止公钥替换攻击和伪造签名攻击,而且还支持分层隐私保护。利用CLS2,我们设计了一个基于超分类账结构和边缘计算的联盟区块链安全架构。据我们所知,这是联盟区块链中首次实现无证书签名。我们在随机oracle模型中正式证明了我们的方案的安全性。具体来说,该方案的安全性被简化为椭圆曲线离散对数问题(ECDLP)。物联网场景下的安全分析和实验验证了CLS2的可行性和有效性。
{"title":"A Certificateless Consortium Blockchain for IoTs","authors":"Xiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bofu Yang","doi":"10.1109/ICDCS47774.2020.00054","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00054","url":null,"abstract":"Blockchain is multi-centralized, immutable and traceable, thus is very suitable for distributed storage, privacy and security management in IoTs. However, most existing researches focus on the integration of public blockchain and IoTs. In fact, problems such as slow consensus, low transmission throughput, and completely open storage on the public blockchain are intolerable in IoT scenarios. Although consortium blockchain represented by Hyperledger Fabric has improved the transmission rate, its data security completely relies on the PKI-based certificate mechanism, resulting in transmission inefficiency and privacy leakage. In this paper, a key-derived Controllable Lightweight Secure Certificateless Signature (CLS2) algorithm is proposed to significantly improve the transmission efficiency and keep similar computation overhead of consortium blockchain. Compared with the existing certificateless signatures, CLS2 achieves more secure transactions, whose controllable anonymity and key-derived mechanism not only prevents public key replacement attacks and forged signature attacks, but also supports hierarchical privacy protection. Armed with CLS2, we design a consortium blockchain security architecture based on Hyper-ledger Fabric and edge computing. To the best of our knowledge, this is the first implementation of certificateless signature in consortium blockchain. We formally prove the security of our schemes in the random oracle model. Specifically, the security of the proposed scheme is reduced to the Elliptic curve discrete logarithm problem (ECDLP). Security analysis and experiments in IoT scenarios verify the feasibility and effectiveness of CLS2.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger 使用许可分布式账本增强具有可验证性的互联网投票系统
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00124
M. Sallal, Steve A. Schneider, M. Casey, François Dupressoir, H. Treharne, Catalin Dragan, Luke Riley, Phil Wright
This paper discusses an approach for incremental change to an online voting system, introducing a verifiability layer based on the Selene protocol to a trusted-third-party-based system, resulting in a fully verifiable and transparent e-voting system. The paper also describes how to use Distributed Ledger Technology as a component of the implementation of Selene to manage the verifiability data in a distributed way for resilience and trust.
本文讨论了一种对在线投票系统进行增量更改的方法,在基于可信第三方的系统中引入基于Selene协议的可验证层,从而实现完全可验证和透明的电子投票系统。本文还描述了如何使用分布式账本技术作为Selene实现的一个组成部分,以分布式的方式管理可验证性数据,以实现弹性和信任。
{"title":"Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger","authors":"M. Sallal, Steve A. Schneider, M. Casey, François Dupressoir, H. Treharne, Catalin Dragan, Luke Riley, Phil Wright","doi":"10.1109/ICDCS47774.2020.00124","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00124","url":null,"abstract":"This paper discusses an approach for incremental change to an online voting system, introducing a verifiability layer based on the Selene protocol to a trusted-third-party-based system, resulting in a fully verifiable and transparent e-voting system. The paper also describes how to use Distributed Ledger Technology as a component of the implementation of Selene to manage the verifiability data in a distributed way for resilience and trust.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116501171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1