首页 > 最新文献

2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing最新文献

英文 中文
Some Special Issues of Network Security Monitoring on Big Data Environments 大数据环境下网络安全监测的若干专题问题
Langzhou Liu, Jun Lin
Big Data possesses profound information of our society, and therefore, it impacts numerous aspects of human society, with a large amount of data from large-scale heterogeneous network environments, we should analyze some special issues of network security monitoring on Big Data environments. This paper propose data cleaning for various types of data sources and analysis Big Data on network security through security event on multiple associations rules. This study provides some ideas for network security monitoring on Big Data environments.
大数据蕴含着我们社会的深刻信息,因此影响着人类社会的方方面面,海量数据来自于大规模异构的网络环境,我们应该分析大数据环境下网络安全监控的一些特殊问题。本文提出对各类数据源进行数据清洗,并通过多关联规则上的安全事件分析大数据对网络安全的影响。本研究为大数据环境下的网络安全监控提供了一些思路。
{"title":"Some Special Issues of Network Security Monitoring on Big Data Environments","authors":"Langzhou Liu, Jun Lin","doi":"10.1109/DASC.2013.30","DOIUrl":"https://doi.org/10.1109/DASC.2013.30","url":null,"abstract":"Big Data possesses profound information of our society, and therefore, it impacts numerous aspects of human society, with a large amount of data from large-scale heterogeneous network environments, we should analyze some special issues of network security monitoring on Big Data environments. This paper propose data cleaning for various types of data sources and analysis Big Data on network security through security event on multiple associations rules. This study provides some ideas for network security monitoring on Big Data environments.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122789192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Delay Aware Broadcast Forwarding Protocol for Asynchronous Duty-Cycled WSNs 异步占空比wsn的延迟感知广播转发协议
Peizhong Shi, Yun Wang
Multi-hop broadcasts are more difficult in duty-cycled wireless sensor networks where each node stays awake only for a fraction of a time interval and neighborhood nodes are not simultaneously awake to receive data. In this paper, we exploit the problem of multi-hop broadcasts in low duty-cycled wireless sensor networks, and propose a delay aware broadcast forwarding protocol called DCEB. DCEB neither assumes time synchronization for sleep scheduling, which requires all neighboring nodes to wake up at the same time, nor assumes duty-cycled awareness, which makes the protocol difficult to use in low duty-cycled operations. The decision conditions of broadcast forwarding time with or without delay constraint are deduced. Experimental results prove that DCEB cuts the energy consumption of a multi-hop broadcast by reducing broadcast costs under the decision conditions.
在占空比无线传感器网络中,每个节点仅在一小段时间间隔内保持唤醒状态,并且相邻节点不能同时唤醒以接收数据,因此多跳广播更加困难。本文针对低占空比无线传感器网络中的多跳广播问题,提出了一种延迟感知广播转发协议DCEB。DCEB既不假设睡眠调度的时间同步,这要求所有相邻节点同时唤醒,也不假设占空比感知,这使得协议难以在低占空比操作中使用。推导了有无时延约束的广播转发时间的决策条件。实验结果表明,在决策条件下,DCEB通过降低广播成本来降低多跳广播的能量消耗。
{"title":"Delay Aware Broadcast Forwarding Protocol for Asynchronous Duty-Cycled WSNs","authors":"Peizhong Shi, Yun Wang","doi":"10.1109/DASC.2013.72","DOIUrl":"https://doi.org/10.1109/DASC.2013.72","url":null,"abstract":"Multi-hop broadcasts are more difficult in duty-cycled wireless sensor networks where each node stays awake only for a fraction of a time interval and neighborhood nodes are not simultaneously awake to receive data. In this paper, we exploit the problem of multi-hop broadcasts in low duty-cycled wireless sensor networks, and propose a delay aware broadcast forwarding protocol called DCEB. DCEB neither assumes time synchronization for sleep scheduling, which requires all neighboring nodes to wake up at the same time, nor assumes duty-cycled awareness, which makes the protocol difficult to use in low duty-cycled operations. The decision conditions of broadcast forwarding time with or without delay constraint are deduced. Experimental results prove that DCEB cuts the energy consumption of a multi-hop broadcast by reducing broadcast costs under the decision conditions.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Key Technology for Phase-Shift Laser Range Finder 相移激光测距关键技术研究
Su Xianbo, Tan Jianjun, Xu Jian, Huan ShaoJun
Laser range finder is one of the effective and automatic methods for distance measurement, making distance measurement much easier and safer in the places where people can't reach. Laser range finder helps to measure the distance accurately by finding the difference of phase which brings by modulated wave through the distance. Through the analysis of existing laser ranging technologies as well as the comparison of the different technological performance, phase-shift laser ranging method is proposed. This thesis aims to study some key technologies on phase-shift laser ranging for short-distance laser range finding sensor.
激光测距仪是一种有效的、自动化的距离测量方法,在人们无法到达的地方进行距离测量变得更加容易和安全。激光测距仪通过测量调制波在距离上所产生的相位差来精确测量距离。通过对现有激光测距技术的分析以及不同技术性能的比较,提出了相移激光测距方法。本文旨在研究近距离激光测距传感器相移激光测距的关键技术。
{"title":"Research on Key Technology for Phase-Shift Laser Range Finder","authors":"Su Xianbo, Tan Jianjun, Xu Jian, Huan ShaoJun","doi":"10.1109/DASC.2013.68","DOIUrl":"https://doi.org/10.1109/DASC.2013.68","url":null,"abstract":"Laser range finder is one of the effective and automatic methods for distance measurement, making distance measurement much easier and safer in the places where people can't reach. Laser range finder helps to measure the distance accurately by finding the difference of phase which brings by modulated wave through the distance. Through the analysis of existing laser ranging technologies as well as the comparison of the different technological performance, phase-shift laser ranging method is proposed. This thesis aims to study some key technologies on phase-shift laser ranging for short-distance laser range finding sensor.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Algorithm to Exploit Superword Level Parallelism 一种利用超词级并行的新算法
Peng Liu, Rongcai Zhao, Wei Gao, Shuai Wei
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some applications, such as computations on non-contiguous and especially interleaved data, and loop nest for which inner loops that carry all the dependencies and external loops with strided memory accesses. In order to solve these problems, we adopt Isomorphic Statements Grouping (ISG) after extending group following UD and DU chains, which group isomorphic computation statements that perform the same operation. And correspondingly, we generate vector permutation instructions according to the target ISA SIMD instructions at the SIMD code generation phase. This approach has been implemented in a compiler based on Open64 which translate C source program to C source program with SIMD intrinsic functions. Experiments with this compiler show that ISG Super Level Parallelism(ISG-SLP) can be used to compile a number of real-world kernels, achieving up to 3.11 speedup.
目前SIMD扩展在计算平台中无处不在,被广泛应用于信号处理、多媒体和科学应用中。然而,编译器在向量化一些应用程序方面仍然存在困难,例如对不连续和特别是交错数据的计算,以及携带所有依赖关系的内部循环和具有跨行内存访问的外部循环的循环巢。为了解决这些问题,我们在扩展了UD链和DU链之后的组后采用ISG (Isomorphic Statements Grouping),将执行相同操作的同构计算语句分组。相应地,我们在SIMD代码生成阶段根据目标ISA SIMD指令生成向量置换指令。该方法已在基于Open64的编译器中实现,该编译器将C源程序转换为具有SIMD固有函数的C源程序。使用该编译器进行的实验表明,ISG Super Level Parallelism(ISG- slp)可用于编译许多真实的内核,实现高达3.11的加速。
{"title":"A New Algorithm to Exploit Superword Level Parallelism","authors":"Peng Liu, Rongcai Zhao, Wei Gao, Shuai Wei","doi":"10.1109/DASC.2013.118","DOIUrl":"https://doi.org/10.1109/DASC.2013.118","url":null,"abstract":"Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some applications, such as computations on non-contiguous and especially interleaved data, and loop nest for which inner loops that carry all the dependencies and external loops with strided memory accesses. In order to solve these problems, we adopt Isomorphic Statements Grouping (ISG) after extending group following UD and DU chains, which group isomorphic computation statements that perform the same operation. And correspondingly, we generate vector permutation instructions according to the target ISA SIMD instructions at the SIMD code generation phase. This approach has been implemented in a compiler based on Open64 which translate C source program to C source program with SIMD intrinsic functions. Experiments with this compiler show that ISG Super Level Parallelism(ISG-SLP) can be used to compile a number of real-world kernels, achieving up to 3.11 speedup.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115419392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel Simulation of Large-Scale Universal Particle Systems Using CUDA 基于CUDA的大规模通用粒子系统并行仿真
Xiangfei Li, Xuzhi Wang, W. Wan, Xiaoqiang Zhu, Xiaoqing Yu
Particle systems' greatest advantage is well suited for modeling complex fuzzy phenomena, such as explosions, fountain, tornado and fireworks, etc. in 3D graphics. With the increasing requirements on the number of particles and particle-particle interactions, the computational complexity of simulation in particle systems has increased rapidly. Particle systems are traditionally implemented on a general-purpose CPU, and the computational complexity of particle systems limits the number of particles that can be computed at interactive rates. This paper focuses on real-time simulation of large-scale particle systems. We discuss optional integration algorithms based on CUDA (Compute Unified Device Architecture) for both graphic and scientific simulation. The speed of particle systems has been greatly improved, with parallel-core GPUs working in tandem with multi-core CPUs. In order to provide a scalable and portable API library, the object-oriented programming method is adopted to encapsulate the functions of parallel particle system. Results show that our proposed APIs are user-friendly and the parallel implementations are significantly efficient.
粒子系统最大的优点是非常适合在三维图形中建模复杂的模糊现象,如爆炸、喷泉、龙卷风和烟花等。随着人们对粒子数量和粒子间相互作用要求的不断提高,粒子系统模拟的计算复杂度迅速增加。粒子系统传统上是在通用CPU上实现的,粒子系统的计算复杂性限制了可以以交互速率计算的粒子数量。本文主要研究大尺度粒子系统的实时仿真。我们讨论了基于CUDA(计算统一设备架构)的可选集成算法,用于图形和科学模拟。粒子系统的速度已经大大提高,并行核gpu与多核cpu协同工作。为了提供可扩展、可移植的API库,采用面向对象的编程方法对并行粒子系统的功能进行封装。结果表明,我们提出的api用户友好,并行实现效率显著。
{"title":"Parallel Simulation of Large-Scale Universal Particle Systems Using CUDA","authors":"Xiangfei Li, Xuzhi Wang, W. Wan, Xiaoqiang Zhu, Xiaoqing Yu","doi":"10.1109/DASC.2013.128","DOIUrl":"https://doi.org/10.1109/DASC.2013.128","url":null,"abstract":"Particle systems' greatest advantage is well suited for modeling complex fuzzy phenomena, such as explosions, fountain, tornado and fireworks, etc. in 3D graphics. With the increasing requirements on the number of particles and particle-particle interactions, the computational complexity of simulation in particle systems has increased rapidly. Particle systems are traditionally implemented on a general-purpose CPU, and the computational complexity of particle systems limits the number of particles that can be computed at interactive rates. This paper focuses on real-time simulation of large-scale particle systems. We discuss optional integration algorithms based on CUDA (Compute Unified Device Architecture) for both graphic and scientific simulation. The speed of particle systems has been greatly improved, with parallel-core GPUs working in tandem with multi-core CPUs. In order to provide a scalable and portable API library, the object-oriented programming method is adopted to encapsulate the functions of parallel particle system. Results show that our proposed APIs are user-friendly and the parallel implementations are significantly efficient.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New System Interconnection Architecture Based on RapidIO Using Partial Reconfiguration 基于RapidIO的部分重构系统互连新架构
Zhan Xu, Xiao Wu, Yi Wu
Now in the field of embedded system, high-speed interconnection based on parallel or serial LVDS technology is becoming increasingly important. Because of this the first RapidIO offerings available in the market were FPGA based, RapidIO interconnection had been identified as significant emerging technologies for FPGAs to support. At the same time, as the FPGAs increase in size, they are being large enough to accommodate both the static RapidIO interface and the reconfigurable logic. So, a consistent I/O interface is provided to support Reconfigurable Partition. This paper presents a new system interconnection architecture based on RapidIO to achieve the FPGA run-time Reconfigurable Partition.
在嵌入式系统领域,基于并行或串行LVDS技术的高速互连变得越来越重要。因此,市场上的第一个RapidIO产品是基于FPGA的,RapidIO互连已被确定为FPGA支持的重要新兴技术。同时,随着fpga尺寸的增加,它们变得足够大,以容纳静态RapidIO接口和可重构逻辑。因此,提供了一致的I/O接口来支持Reconfigurable Partition。为实现FPGA运行时可重构分区,提出了一种基于RapidIO的系统互连新架构。
{"title":"A New System Interconnection Architecture Based on RapidIO Using Partial Reconfiguration","authors":"Zhan Xu, Xiao Wu, Yi Wu","doi":"10.1109/DASC.2013.75","DOIUrl":"https://doi.org/10.1109/DASC.2013.75","url":null,"abstract":"Now in the field of embedded system, high-speed interconnection based on parallel or serial LVDS technology is becoming increasingly important. Because of this the first RapidIO offerings available in the market were FPGA based, RapidIO interconnection had been identified as significant emerging technologies for FPGAs to support. At the same time, as the FPGAs increase in size, they are being large enough to accommodate both the static RapidIO interface and the reconfigurable logic. So, a consistent I/O interface is provided to support Reconfigurable Partition. This paper presents a new system interconnection architecture based on RapidIO to achieve the FPGA run-time Reconfigurable Partition.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Resources Allocation Method for D2MD Communication under IMT-A System IMT-A系统下D2MD通信的无线资源分配方法
Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang
A wireless resources allocation method for Device-to-Multi-Device (D2MD) communication under the control of base station is proposed. In the premise of ensuring quality of services (QoS) of all D2MD groups, the method can allocate wireless resources for D2MD groups through three steps: mode selection, spectrum allocation and power control. Simulation results show that the method can select the high-spectrum-efficiency mode which reuses the spectrum of cellular users for most D2MD communications, and does not affect cellular communications, the interference to cellular uplink of proposed suboptimal LCH algorithm which allocates cellular spectrums for D2MD groups to reuse can achieve the same level as the optimal algorithm, in addition, the calculating complexity is lower therefore shortening the response time of the base station.
提出了一种基站控制下设备到多设备(D2MD)通信的无线资源分配方法。该方法在保证所有D2MD组的服务质量(QoS)的前提下,通过模式选择、频谱分配和功率控制三步为D2MD组分配无线资源。仿真结果表明,该方法能够在不影响蜂窝通信的情况下,为大多数D2MD通信选择复用蜂窝用户频谱的高频谱效率模式,所提出的次优LCH算法将蜂窝频谱分配给D2MD组复用,对蜂窝上行链路的干扰达到与最优算法相同的水平,且计算复杂度较低,从而缩短了基站的响应时间。
{"title":"A Wireless Resources Allocation Method for D2MD Communication under IMT-A System","authors":"Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang","doi":"10.1109/DASC.2013.121","DOIUrl":"https://doi.org/10.1109/DASC.2013.121","url":null,"abstract":"A wireless resources allocation method for Device-to-Multi-Device (D2MD) communication under the control of base station is proposed. In the premise of ensuring quality of services (QoS) of all D2MD groups, the method can allocate wireless resources for D2MD groups through three steps: mode selection, spectrum allocation and power control. Simulation results show that the method can select the high-spectrum-efficiency mode which reuses the spectrum of cellular users for most D2MD communications, and does not affect cellular communications, the interference to cellular uplink of proposed suboptimal LCH algorithm which allocates cellular spectrums for D2MD groups to reuse can achieve the same level as the optimal algorithm, in addition, the calculating complexity is lower therefore shortening the response time of the base station.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Large Scale Unstructured Data with RDBMS 用RDBMS管理大规模非结构化数据
Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin
With the rapid development of information technology, the needs of unstructured data storage and processing is growing rapidly, which develops a new requirement for the database storage. Traditional row-oriented relational databases appear to be inadequate for the data query and analysis. In this paper, we propose a novel approach to store the unstructured data in a relational database. By splitting the VALUE property of the unstructured KEY/VALUE data and recreating the two-dimensional data, the original data can be stored in relational databases. The system introduced in this paper is designed to handle this task. In addition, this system rebuilds the SQL as its query language, which makes it compatible with relational databases. In experiments of the query for unstructured data, the outcomes show that the system is good at decomposing the SQL statement submitted by users, and generating the corrected sub-query statements. The results of the experiments show that the performance of this system is good.
随着信息技术的飞速发展,对非结构化数据的存储和处理需求迅速增长,这就对数据库的存储提出了新的要求。传统的面向行关系数据库似乎不适合数据查询和分析。本文提出了一种在关系数据库中存储非结构化数据的新方法。通过拆分非结构化KEY/VALUE数据的VALUE属性并重新创建二维数据,可以将原始数据存储在关系数据库中。本文介绍的系统就是为处理这一任务而设计的。此外,本系统对SQL作为查询语言进行了重构,使其与关系数据库兼容。在对非结构化数据的查询实验中,结果表明该系统能够很好地分解用户提交的SQL语句,并生成正确的子查询语句。实验结果表明,该系统具有良好的性能。
{"title":"Managing Large Scale Unstructured Data with RDBMS","authors":"Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin","doi":"10.1109/DASC.2013.135","DOIUrl":"https://doi.org/10.1109/DASC.2013.135","url":null,"abstract":"With the rapid development of information technology, the needs of unstructured data storage and processing is growing rapidly, which develops a new requirement for the database storage. Traditional row-oriented relational databases appear to be inadequate for the data query and analysis. In this paper, we propose a novel approach to store the unstructured data in a relational database. By splitting the VALUE property of the unstructured KEY/VALUE data and recreating the two-dimensional data, the original data can be stored in relational databases. The system introduced in this paper is designed to handle this task. In addition, this system rebuilds the SQL as its query language, which makes it compatible with relational databases. In experiments of the query for unstructured data, the outcomes show that the system is good at decomposing the SQL statement submitted by users, and generating the corrected sub-query statements. The results of the experiments show that the performance of this system is good.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Distribution of Big Data Based on BitTorrent 基于BitTorrent的大数据安全分发
Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan
Recently, big data becomes more and more widespread on the Internet, as various P2P protocols, especially BitTorrent, make great contribution. Accompanied with BitTorrent spreading, however, malicious activities, divulging sensitive data and other security problems arise. Relative researches and analyses indicate that existing means of protecting P2P network are sophisticated but intricate when distributing big data, leading inefficiency of implementation. In this paper, a scheme to distribute big data securely and efficiently on BitTorrent network is proposed, which can be implemented in server, authorizing peers' admittances and actions, hence protecting sensitive data in the network. To achieve this goal, identity verification and cipher system are embedded into BitTorrent protocol, enabling the server to regulate and keep trace of peers' behaviors and sensitive data. The experimental results show the functional effectiveness of this scheme, as well as acceptable overhead on server.
近年来,大数据在互联网上的应用越来越广泛,各种P2P协议,尤其是BitTorrent都做出了巨大的贡献。然而,伴随着BitTorrent的传播,恶意活动、泄露敏感数据等安全问题也随之出现。相关研究和分析表明,现有的P2P网络在分布大数据时保护手段复杂而繁琐,导致实施效率低下。本文提出了一种在BitTorrent网络上安全高效地分发大数据的方案,该方案可以在服务器端实现,对对等体的准入和行为进行授权,从而保护网络中的敏感数据。为了实现这一目标,BitTorrent协议中嵌入了身份验证和密码系统,使服务器能够调节和跟踪对等体的行为和敏感数据。实验结果表明了该方案的功能有效性,并且在可接受的服务器开销范围内。
{"title":"Secure Distribution of Big Data Based on BitTorrent","authors":"Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan","doi":"10.1109/DASC.2013.42","DOIUrl":"https://doi.org/10.1109/DASC.2013.42","url":null,"abstract":"Recently, big data becomes more and more widespread on the Internet, as various P2P protocols, especially BitTorrent, make great contribution. Accompanied with BitTorrent spreading, however, malicious activities, divulging sensitive data and other security problems arise. Relative researches and analyses indicate that existing means of protecting P2P network are sophisticated but intricate when distributing big data, leading inefficiency of implementation. In this paper, a scheme to distribute big data securely and efficiently on BitTorrent network is proposed, which can be implemented in server, authorizing peers' admittances and actions, hence protecting sensitive data in the network. To achieve this goal, identity verification and cipher system are embedded into BitTorrent protocol, enabling the server to regulate and keep trace of peers' behaviors and sensitive data. The experimental results show the functional effectiveness of this scheme, as well as acceptable overhead on server.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Workflow Management Systems Meet Model Drive Architecture 工作流管理系统满足模型驱动架构
Chao Zhang, Ping Gu, Yan Li
In order to solve the problem of conversions among workflow management system models, and improve the efficiency of the development of workflow management systems. Based on model driven architecture(MDA), the paper gives the workflow model, and utilizes transformation languages to generate source model. In the actual process of software development, the method is conducive to improve the efficiency of development. In this paper, the method can adapt to the diversities of external environment, and improve the workflow management system robustness which has a certain application significance.
为了解决工作流管理系统模型之间的转换问题,提高工作流管理系统的开发效率。基于模型驱动体系结构(MDA),给出了工作流模型,并利用转换语言生成源模型。在实际的软件开发过程中,该方法有利于提高开发效率。本文所提出的方法能够适应外部环境的多样性,提高工作流管理系统的鲁棒性,具有一定的应用意义。
{"title":"Workflow Management Systems Meet Model Drive Architecture","authors":"Chao Zhang, Ping Gu, Yan Li","doi":"10.1109/DASC.2013.44","DOIUrl":"https://doi.org/10.1109/DASC.2013.44","url":null,"abstract":"In order to solve the problem of conversions among workflow management system models, and improve the efficiency of the development of workflow management systems. Based on model driven architecture(MDA), the paper gives the workflow model, and utilizes transformation languages to generate source model. In the actual process of software development, the method is conducive to improve the efficiency of development. In this paper, the method can adapt to the diversities of external environment, and improve the workflow management system robustness which has a certain application significance.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1