首页 > 最新文献

2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing最新文献

英文 中文
A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems 嵌入式控制系统中分布式共享内存的分布式实时操作系统
Takahiro Chiba, Myungryun Yoo, T. Yokoyama
The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.
提出了一种为分布式控制系统提供分布式共享内存服务的分布式实时操作系统(DRTOS)。基于模型的设计已经成为嵌入式控制软件设计的主流,软件模块的源代码可以从控制器模型中生成。生成的软件模块通过共享变量交换输入和输出值。我们开发了一个具有实时DSM服务的DRTOS,以提供一个位置透明的环境,其中分布式软件模块可以通过DSM交换输入和输出值。DRTOS是OSEK操作系统的扩展。我们使用一种叫做FlexRay的实时网络,它基于TDMA(时分多址)协议。DSM的一致性是根据FlexRay传输数据的顺序来保持的,而不是使用节点间同步。如果FlexRay通信配置良好,则DSM的最坏情况响应时间是可以预测的。
{"title":"A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems","authors":"Takahiro Chiba, Myungryun Yoo, T. Yokoyama","doi":"10.1109/DASC.2013.71","DOIUrl":"https://doi.org/10.1109/DASC.2013.71","url":null,"abstract":"The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Some Special Issues of Network Security Monitoring on Big Data Environments 大数据环境下网络安全监测的若干专题问题
Langzhou Liu, Jun Lin
Big Data possesses profound information of our society, and therefore, it impacts numerous aspects of human society, with a large amount of data from large-scale heterogeneous network environments, we should analyze some special issues of network security monitoring on Big Data environments. This paper propose data cleaning for various types of data sources and analysis Big Data on network security through security event on multiple associations rules. This study provides some ideas for network security monitoring on Big Data environments.
大数据蕴含着我们社会的深刻信息,因此影响着人类社会的方方面面,海量数据来自于大规模异构的网络环境,我们应该分析大数据环境下网络安全监控的一些特殊问题。本文提出对各类数据源进行数据清洗,并通过多关联规则上的安全事件分析大数据对网络安全的影响。本研究为大数据环境下的网络安全监控提供了一些思路。
{"title":"Some Special Issues of Network Security Monitoring on Big Data Environments","authors":"Langzhou Liu, Jun Lin","doi":"10.1109/DASC.2013.30","DOIUrl":"https://doi.org/10.1109/DASC.2013.30","url":null,"abstract":"Big Data possesses profound information of our society, and therefore, it impacts numerous aspects of human society, with a large amount of data from large-scale heterogeneous network environments, we should analyze some special issues of network security monitoring on Big Data environments. This paper propose data cleaning for various types of data sources and analysis Big Data on network security through security event on multiple associations rules. This study provides some ideas for network security monitoring on Big Data environments.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122789192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Research on Key Technology for Phase-Shift Laser Range Finder 相移激光测距关键技术研究
Su Xianbo, Tan Jianjun, Xu Jian, Huan ShaoJun
Laser range finder is one of the effective and automatic methods for distance measurement, making distance measurement much easier and safer in the places where people can't reach. Laser range finder helps to measure the distance accurately by finding the difference of phase which brings by modulated wave through the distance. Through the analysis of existing laser ranging technologies as well as the comparison of the different technological performance, phase-shift laser ranging method is proposed. This thesis aims to study some key technologies on phase-shift laser ranging for short-distance laser range finding sensor.
激光测距仪是一种有效的、自动化的距离测量方法,在人们无法到达的地方进行距离测量变得更加容易和安全。激光测距仪通过测量调制波在距离上所产生的相位差来精确测量距离。通过对现有激光测距技术的分析以及不同技术性能的比较,提出了相移激光测距方法。本文旨在研究近距离激光测距传感器相移激光测距的关键技术。
{"title":"Research on Key Technology for Phase-Shift Laser Range Finder","authors":"Su Xianbo, Tan Jianjun, Xu Jian, Huan ShaoJun","doi":"10.1109/DASC.2013.68","DOIUrl":"https://doi.org/10.1109/DASC.2013.68","url":null,"abstract":"Laser range finder is one of the effective and automatic methods for distance measurement, making distance measurement much easier and safer in the places where people can't reach. Laser range finder helps to measure the distance accurately by finding the difference of phase which brings by modulated wave through the distance. Through the analysis of existing laser ranging technologies as well as the comparison of the different technological performance, phase-shift laser ranging method is proposed. This thesis aims to study some key technologies on phase-shift laser ranging for short-distance laser range finding sensor.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New System Interconnection Architecture Based on RapidIO Using Partial Reconfiguration 基于RapidIO的部分重构系统互连新架构
Zhan Xu, Xiao Wu, Yi Wu
Now in the field of embedded system, high-speed interconnection based on parallel or serial LVDS technology is becoming increasingly important. Because of this the first RapidIO offerings available in the market were FPGA based, RapidIO interconnection had been identified as significant emerging technologies for FPGAs to support. At the same time, as the FPGAs increase in size, they are being large enough to accommodate both the static RapidIO interface and the reconfigurable logic. So, a consistent I/O interface is provided to support Reconfigurable Partition. This paper presents a new system interconnection architecture based on RapidIO to achieve the FPGA run-time Reconfigurable Partition.
在嵌入式系统领域,基于并行或串行LVDS技术的高速互连变得越来越重要。因此,市场上的第一个RapidIO产品是基于FPGA的,RapidIO互连已被确定为FPGA支持的重要新兴技术。同时,随着fpga尺寸的增加,它们变得足够大,以容纳静态RapidIO接口和可重构逻辑。因此,提供了一致的I/O接口来支持Reconfigurable Partition。为实现FPGA运行时可重构分区,提出了一种基于RapidIO的系统互连新架构。
{"title":"A New System Interconnection Architecture Based on RapidIO Using Partial Reconfiguration","authors":"Zhan Xu, Xiao Wu, Yi Wu","doi":"10.1109/DASC.2013.75","DOIUrl":"https://doi.org/10.1109/DASC.2013.75","url":null,"abstract":"Now in the field of embedded system, high-speed interconnection based on parallel or serial LVDS technology is becoming increasingly important. Because of this the first RapidIO offerings available in the market were FPGA based, RapidIO interconnection had been identified as significant emerging technologies for FPGAs to support. At the same time, as the FPGAs increase in size, they are being large enough to accommodate both the static RapidIO interface and the reconfigurable logic. So, a consistent I/O interface is provided to support Reconfigurable Partition. This paper presents a new system interconnection architecture based on RapidIO to achieve the FPGA run-time Reconfigurable Partition.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADS-B Data Authentication Based on AH Protocol 基于AH协议的ADS-B数据认证
Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang
With the evolution of traditional civil aviation into "e-enabled" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.
随着传统民用航空向“e-enabled”航空发展,ADS-B自动相关监视广播(ADS-B)系统将取代雷达成为下一代空中交通管理的基石。然而,ADS-B系统是广播型数据链,ADS-B信号未经验证,因此很容易将假飞机插入ADS-B系统。为了过滤欺骗目标,本文提出了一种基于AH协议的ADS-B数据认证方案。安全性分析表明,该方案能够实现ADS-B报文的完整性、数据源的真实性和抗重放攻击。
{"title":"ADS-B Data Authentication Based on AH Protocol","authors":"Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang","doi":"10.1109/DASC.2013.32","DOIUrl":"https://doi.org/10.1109/DASC.2013.32","url":null,"abstract":"With the evolution of traditional civil aviation into \"e-enabled\" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Wireless Resources Allocation Method for D2MD Communication under IMT-A System IMT-A系统下D2MD通信的无线资源分配方法
Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang
A wireless resources allocation method for Device-to-Multi-Device (D2MD) communication under the control of base station is proposed. In the premise of ensuring quality of services (QoS) of all D2MD groups, the method can allocate wireless resources for D2MD groups through three steps: mode selection, spectrum allocation and power control. Simulation results show that the method can select the high-spectrum-efficiency mode which reuses the spectrum of cellular users for most D2MD communications, and does not affect cellular communications, the interference to cellular uplink of proposed suboptimal LCH algorithm which allocates cellular spectrums for D2MD groups to reuse can achieve the same level as the optimal algorithm, in addition, the calculating complexity is lower therefore shortening the response time of the base station.
提出了一种基站控制下设备到多设备(D2MD)通信的无线资源分配方法。该方法在保证所有D2MD组的服务质量(QoS)的前提下,通过模式选择、频谱分配和功率控制三步为D2MD组分配无线资源。仿真结果表明,该方法能够在不影响蜂窝通信的情况下,为大多数D2MD通信选择复用蜂窝用户频谱的高频谱效率模式,所提出的次优LCH算法将蜂窝频谱分配给D2MD组复用,对蜂窝上行链路的干扰达到与最优算法相同的水平,且计算复杂度较低,从而缩短了基站的响应时间。
{"title":"A Wireless Resources Allocation Method for D2MD Communication under IMT-A System","authors":"Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang","doi":"10.1109/DASC.2013.121","DOIUrl":"https://doi.org/10.1109/DASC.2013.121","url":null,"abstract":"A wireless resources allocation method for Device-to-Multi-Device (D2MD) communication under the control of base station is proposed. In the premise of ensuring quality of services (QoS) of all D2MD groups, the method can allocate wireless resources for D2MD groups through three steps: mode selection, spectrum allocation and power control. Simulation results show that the method can select the high-spectrum-efficiency mode which reuses the spectrum of cellular users for most D2MD communications, and does not affect cellular communications, the interference to cellular uplink of proposed suboptimal LCH algorithm which allocates cellular spectrums for D2MD groups to reuse can achieve the same level as the optimal algorithm, in addition, the calculating complexity is lower therefore shortening the response time of the base station.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay Aware Broadcast Forwarding Protocol for Asynchronous Duty-Cycled WSNs 异步占空比wsn的延迟感知广播转发协议
Peizhong Shi, Yun Wang
Multi-hop broadcasts are more difficult in duty-cycled wireless sensor networks where each node stays awake only for a fraction of a time interval and neighborhood nodes are not simultaneously awake to receive data. In this paper, we exploit the problem of multi-hop broadcasts in low duty-cycled wireless sensor networks, and propose a delay aware broadcast forwarding protocol called DCEB. DCEB neither assumes time synchronization for sleep scheduling, which requires all neighboring nodes to wake up at the same time, nor assumes duty-cycled awareness, which makes the protocol difficult to use in low duty-cycled operations. The decision conditions of broadcast forwarding time with or without delay constraint are deduced. Experimental results prove that DCEB cuts the energy consumption of a multi-hop broadcast by reducing broadcast costs under the decision conditions.
在占空比无线传感器网络中,每个节点仅在一小段时间间隔内保持唤醒状态,并且相邻节点不能同时唤醒以接收数据,因此多跳广播更加困难。本文针对低占空比无线传感器网络中的多跳广播问题,提出了一种延迟感知广播转发协议DCEB。DCEB既不假设睡眠调度的时间同步,这要求所有相邻节点同时唤醒,也不假设占空比感知,这使得协议难以在低占空比操作中使用。推导了有无时延约束的广播转发时间的决策条件。实验结果表明,在决策条件下,DCEB通过降低广播成本来降低多跳广播的能量消耗。
{"title":"Delay Aware Broadcast Forwarding Protocol for Asynchronous Duty-Cycled WSNs","authors":"Peizhong Shi, Yun Wang","doi":"10.1109/DASC.2013.72","DOIUrl":"https://doi.org/10.1109/DASC.2013.72","url":null,"abstract":"Multi-hop broadcasts are more difficult in duty-cycled wireless sensor networks where each node stays awake only for a fraction of a time interval and neighborhood nodes are not simultaneously awake to receive data. In this paper, we exploit the problem of multi-hop broadcasts in low duty-cycled wireless sensor networks, and propose a delay aware broadcast forwarding protocol called DCEB. DCEB neither assumes time synchronization for sleep scheduling, which requires all neighboring nodes to wake up at the same time, nor assumes duty-cycled awareness, which makes the protocol difficult to use in low duty-cycled operations. The decision conditions of broadcast forwarding time with or without delay constraint are deduced. Experimental results prove that DCEB cuts the energy consumption of a multi-hop broadcast by reducing broadcast costs under the decision conditions.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Large Scale Unstructured Data with RDBMS 用RDBMS管理大规模非结构化数据
Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin
With the rapid development of information technology, the needs of unstructured data storage and processing is growing rapidly, which develops a new requirement for the database storage. Traditional row-oriented relational databases appear to be inadequate for the data query and analysis. In this paper, we propose a novel approach to store the unstructured data in a relational database. By splitting the VALUE property of the unstructured KEY/VALUE data and recreating the two-dimensional data, the original data can be stored in relational databases. The system introduced in this paper is designed to handle this task. In addition, this system rebuilds the SQL as its query language, which makes it compatible with relational databases. In experiments of the query for unstructured data, the outcomes show that the system is good at decomposing the SQL statement submitted by users, and generating the corrected sub-query statements. The results of the experiments show that the performance of this system is good.
随着信息技术的飞速发展,对非结构化数据的存储和处理需求迅速增长,这就对数据库的存储提出了新的要求。传统的面向行关系数据库似乎不适合数据查询和分析。本文提出了一种在关系数据库中存储非结构化数据的新方法。通过拆分非结构化KEY/VALUE数据的VALUE属性并重新创建二维数据,可以将原始数据存储在关系数据库中。本文介绍的系统就是为处理这一任务而设计的。此外,本系统对SQL作为查询语言进行了重构,使其与关系数据库兼容。在对非结构化数据的查询实验中,结果表明该系统能够很好地分解用户提交的SQL语句,并生成正确的子查询语句。实验结果表明,该系统具有良好的性能。
{"title":"Managing Large Scale Unstructured Data with RDBMS","authors":"Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin","doi":"10.1109/DASC.2013.135","DOIUrl":"https://doi.org/10.1109/DASC.2013.135","url":null,"abstract":"With the rapid development of information technology, the needs of unstructured data storage and processing is growing rapidly, which develops a new requirement for the database storage. Traditional row-oriented relational databases appear to be inadequate for the data query and analysis. In this paper, we propose a novel approach to store the unstructured data in a relational database. By splitting the VALUE property of the unstructured KEY/VALUE data and recreating the two-dimensional data, the original data can be stored in relational databases. The system introduced in this paper is designed to handle this task. In addition, this system rebuilds the SQL as its query language, which makes it compatible with relational databases. In experiments of the query for unstructured data, the outcomes show that the system is good at decomposing the SQL statement submitted by users, and generating the corrected sub-query statements. The results of the experiments show that the performance of this system is good.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Distribution of Big Data Based on BitTorrent 基于BitTorrent的大数据安全分发
Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan
Recently, big data becomes more and more widespread on the Internet, as various P2P protocols, especially BitTorrent, make great contribution. Accompanied with BitTorrent spreading, however, malicious activities, divulging sensitive data and other security problems arise. Relative researches and analyses indicate that existing means of protecting P2P network are sophisticated but intricate when distributing big data, leading inefficiency of implementation. In this paper, a scheme to distribute big data securely and efficiently on BitTorrent network is proposed, which can be implemented in server, authorizing peers' admittances and actions, hence protecting sensitive data in the network. To achieve this goal, identity verification and cipher system are embedded into BitTorrent protocol, enabling the server to regulate and keep trace of peers' behaviors and sensitive data. The experimental results show the functional effectiveness of this scheme, as well as acceptable overhead on server.
近年来,大数据在互联网上的应用越来越广泛,各种P2P协议,尤其是BitTorrent都做出了巨大的贡献。然而,伴随着BitTorrent的传播,恶意活动、泄露敏感数据等安全问题也随之出现。相关研究和分析表明,现有的P2P网络在分布大数据时保护手段复杂而繁琐,导致实施效率低下。本文提出了一种在BitTorrent网络上安全高效地分发大数据的方案,该方案可以在服务器端实现,对对等体的准入和行为进行授权,从而保护网络中的敏感数据。为了实现这一目标,BitTorrent协议中嵌入了身份验证和密码系统,使服务器能够调节和跟踪对等体的行为和敏感数据。实验结果表明了该方案的功能有效性,并且在可接受的服务器开销范围内。
{"title":"Secure Distribution of Big Data Based on BitTorrent","authors":"Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan","doi":"10.1109/DASC.2013.42","DOIUrl":"https://doi.org/10.1109/DASC.2013.42","url":null,"abstract":"Recently, big data becomes more and more widespread on the Internet, as various P2P protocols, especially BitTorrent, make great contribution. Accompanied with BitTorrent spreading, however, malicious activities, divulging sensitive data and other security problems arise. Relative researches and analyses indicate that existing means of protecting P2P network are sophisticated but intricate when distributing big data, leading inefficiency of implementation. In this paper, a scheme to distribute big data securely and efficiently on BitTorrent network is proposed, which can be implemented in server, authorizing peers' admittances and actions, hence protecting sensitive data in the network. To achieve this goal, identity verification and cipher system are embedded into BitTorrent protocol, enabling the server to regulate and keep trace of peers' behaviors and sensitive data. The experimental results show the functional effectiveness of this scheme, as well as acceptable overhead on server.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Workflow Management Systems Meet Model Drive Architecture 工作流管理系统满足模型驱动架构
Chao Zhang, Ping Gu, Yan Li
In order to solve the problem of conversions among workflow management system models, and improve the efficiency of the development of workflow management systems. Based on model driven architecture(MDA), the paper gives the workflow model, and utilizes transformation languages to generate source model. In the actual process of software development, the method is conducive to improve the efficiency of development. In this paper, the method can adapt to the diversities of external environment, and improve the workflow management system robustness which has a certain application significance.
为了解决工作流管理系统模型之间的转换问题,提高工作流管理系统的开发效率。基于模型驱动体系结构(MDA),给出了工作流模型,并利用转换语言生成源模型。在实际的软件开发过程中,该方法有利于提高开发效率。本文所提出的方法能够适应外部环境的多样性,提高工作流管理系统的鲁棒性,具有一定的应用意义。
{"title":"Workflow Management Systems Meet Model Drive Architecture","authors":"Chao Zhang, Ping Gu, Yan Li","doi":"10.1109/DASC.2013.44","DOIUrl":"https://doi.org/10.1109/DASC.2013.44","url":null,"abstract":"In order to solve the problem of conversions among workflow management system models, and improve the efficiency of the development of workflow management systems. Based on model driven architecture(MDA), the paper gives the workflow model, and utilizes transformation languages to generate source model. In the actual process of software development, the method is conducive to improve the efficiency of development. In this paper, the method can adapt to the diversities of external environment, and improve the workflow management system robustness which has a certain application significance.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1