首页 > 最新文献

2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Towards a Monitoring System for a LoRa Mesh Network LoRa Mesh网络监控系统研究
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00139
Alejandro Jesus Capella Del Solar, J. M. Solé, Felix Freitag
LoRa is a popular communication technology used in Internet of Things (IoT) applications. Typically, in the LoRaWAN architecture, an end node periodically sends a LoRaWAN message to a gateway connected to the Internet. Recent works, however, showed the possibility of LoRa mesh networks where LoRa nodes communicate with each other. In this paper we present a monitoring system as a tool for observing the traffic and the operation of such LoRa mesh networks. The client side is implemented at the LoRa nodes which periodically send to a server detailed information about the nodes’ in-and outgoing LoRa packets. The server visualizes the information through a dashboard. Thus the monitoring tool allows network administrators to further analyze such LoRa mesh networks.
LoRa是一种用于物联网(IoT)应用的流行通信技术。通常,在LoRaWAN体系结构中,终端节点定期向连接到Internet的网关发送LoRaWAN消息。然而,最近的工作显示了LoRa网状网络的可能性,其中LoRa节点相互通信。在本文中,我们提出了一个监控系统,作为一种工具来观察这种LoRa网状网络的流量和运行。客户端在LoRa节点上实现,定期向服务器发送节点进出LoRa数据包的详细信息。服务器通过仪表板可视化信息。因此,监控工具允许网络管理员进一步分析这种LoRa网状网络。
{"title":"Towards a Monitoring System for a LoRa Mesh Network","authors":"Alejandro Jesus Capella Del Solar, J. M. Solé, Felix Freitag","doi":"10.1109/ICDCS54860.2022.00139","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00139","url":null,"abstract":"LoRa is a popular communication technology used in Internet of Things (IoT) applications. Typically, in the LoRaWAN architecture, an end node periodically sends a LoRaWAN message to a gateway connected to the Internet. Recent works, however, showed the possibility of LoRa mesh networks where LoRa nodes communicate with each other. In this paper we present a monitoring system as a tool for observing the traffic and the operation of such LoRa mesh networks. The client side is implemented at the LoRa nodes which periodically send to a server detailed information about the nodes’ in-and outgoing LoRa packets. The server visualizes the information through a dashboard. Thus the monitoring tool allows network administrators to further analyze such LoRa mesh networks.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AoI Minimization Charging at Wireless-Powered Network Edge 无线供电网络边缘AoI最小化充电
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00074
Q. Chen, Song Guo, Wenchao Xu, Zhipeng Cai, Lianglun Cheng, Hongyang Gao
Age of Information (AoI) has emerged as a new metric to measure data freshness from the destination’s perspective. The problem of optimizing AoI has been attracting extensive interests recently. However, existing works mainly focused on scheduling data transmission for AoI optimization. While at wireless-powered network edge, the charging plan of source nodes also requires to be computed in advance, which means the system AoI is determined by not only the data transmission decision but also the charging plan. Thus, in this paper, we investigate the first work to optimize the weighted peak AoI from the point of charging at wireless-powered network edge with a directional charger. Firstly, to minimize the weighted sum of average peak AoI, the AoI minimization problem is transformed to a charging time optimization problem with respect to the overlapped charging areas and average peak AoI, and an approximate algorithm is proposed to obtain the required charging time for each source node. Then, an age-based scheduling algorithm is proposed to compute the charging and data transmission decisions for each source node simultaneously, which can not only optimize the weighted sum of average peak AoI but also guarantee the maximum peak AoI for each source node. The proposed algorithm is proved to have an approximation ratio of up to (1+φ), where φ is a much smaller value related to the weight of each source node. Finally, the simulation results verify the high performance of proposed algorithms in terms of average and maximum peak AoI.
信息时代(AoI)已经成为从目的地角度衡量数据新鲜度的新指标。AoI的优化问题近年来引起了人们的广泛关注。然而,现有的工作主要集中在AoI优化的数据传输调度上。而在无线供电的网络边缘,源节点的充电计划也需要提前计算,这意味着系统的AoI不仅取决于数据传输决策,还取决于充电计划。因此,在本文中,我们研究了从无线供电网络边缘使用定向充电器充电点优化加权峰值AoI的第一项工作。首先,为了使平均峰值AoI的加权和最小,将AoI最小化问题转化为关于重叠充电区域和平均峰值AoI的充电时间优化问题,并提出了一种近似算法来获得每个源节点所需的充电时间;然后,提出了一种基于年龄的调度算法,同时计算各源节点的充电和数据传输决策,既能优化平均峰值AoI的加权和,又能保证各源节点的峰值AoI最大。该算法被证明具有高达(1+φ)的近似比,其中φ是与每个源节点的权重相关的小得多的值。最后,仿真结果验证了所提算法在平均和最大峰值AoI方面的高性能。
{"title":"AoI Minimization Charging at Wireless-Powered Network Edge","authors":"Q. Chen, Song Guo, Wenchao Xu, Zhipeng Cai, Lianglun Cheng, Hongyang Gao","doi":"10.1109/ICDCS54860.2022.00074","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00074","url":null,"abstract":"Age of Information (AoI) has emerged as a new metric to measure data freshness from the destination’s perspective. The problem of optimizing AoI has been attracting extensive interests recently. However, existing works mainly focused on scheduling data transmission for AoI optimization. While at wireless-powered network edge, the charging plan of source nodes also requires to be computed in advance, which means the system AoI is determined by not only the data transmission decision but also the charging plan. Thus, in this paper, we investigate the first work to optimize the weighted peak AoI from the point of charging at wireless-powered network edge with a directional charger. Firstly, to minimize the weighted sum of average peak AoI, the AoI minimization problem is transformed to a charging time optimization problem with respect to the overlapped charging areas and average peak AoI, and an approximate algorithm is proposed to obtain the required charging time for each source node. Then, an age-based scheduling algorithm is proposed to compute the charging and data transmission decisions for each source node simultaneously, which can not only optimize the weighted sum of average peak AoI but also guarantee the maximum peak AoI for each source node. The proposed algorithm is proved to have an approximation ratio of up to (1+φ), where φ is a much smaller value related to the weight of each source node. Finally, the simulation results verify the high performance of proposed algorithms in terms of average and maximum peak AoI.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crime and Punishment in Distributed Byzantine Decision Tasks 分布式拜占庭决策任务中的罪与罚
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00013
Pierre Civit, Seth Gilbert, V. Gramoli, R. Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi
A decision task is a distributed input-output problem in which each process starts with its input value and eventually produces its output value. Examples of such decision tasks are broad and range from consensus to reliable broadcast to lattice agreement. A distributed protocol solves a decision task if it enables processes to produce admissible output values despite arbitrary (Byzantine) failures. Unfortunately, it has been known for decades that many decision tasks cannot be solved if the system is overly corrupted, i.e., safety of distributed protocols solving such tasks can be violated in unlucky scenarios.By contrast, only recently did the community discover that some of these distributed protocols can be made accountable by ensuring that correct processes irrevocably detect some faulty processes responsible for any safety violation. This realization is particularly surprising (and positive) given that accountability is a powerful tool to mitigate safety violations in distributed protocols. Indeed, exposing crimes and introducing punishments naturally incentivize exemplarity.In this paper, we propose a generic transformation, called τscr, of any non-synchronous distributed protocol solving a decision task into its accountable version. Our τscr transformation is built upon the well-studied simulation of crash failures on top of Byzantine failures and increases the communication complexity by a quadratic multiplicative factor in the worst case.
决策任务是一个分布式的输入输出问题,其中每个过程从其输入值开始,最终产生其输出值。这种决策任务的例子很广泛,范围从共识到可靠广播再到格协议。如果分布式协议使进程能够在任意(拜占庭式)失败的情况下产生可接受的输出值,那么它就解决了决策任务。不幸的是,几十年来人们都知道,如果系统被过度破坏,许多决策任务就无法解决,也就是说,在不幸的情况下,解决这些任务的分布式协议的安全性可能会受到侵犯。相比之下,直到最近社区才发现,通过确保正确的进程不可逆转地检测到对任何安全违规负责的错误进程,可以使这些分布式协议中的一些负起责任。考虑到问责制是减轻分布式协议中安全违规的强大工具,这种认识尤其令人惊讶(和积极)。事实上,揭露犯罪和引入惩罚自然会激励以身作则。在本文中,我们提出了一种非同步分布式协议的通用转换,称为τscr,它将决策任务求解为其可问责版本。我们的τscr变换建立在对拜占庭故障之上的崩溃故障进行了充分研究的模拟之上,并在最坏的情况下通过二次乘法因子增加了通信复杂性。
{"title":"Crime and Punishment in Distributed Byzantine Decision Tasks","authors":"Pierre Civit, Seth Gilbert, V. Gramoli, R. Guerraoui, Jovan Komatovic, Zarko Milosevic, Adi Serendinschi","doi":"10.1109/ICDCS54860.2022.00013","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00013","url":null,"abstract":"A decision task is a distributed input-output problem in which each process starts with its input value and eventually produces its output value. Examples of such decision tasks are broad and range from consensus to reliable broadcast to lattice agreement. A distributed protocol solves a decision task if it enables processes to produce admissible output values despite arbitrary (Byzantine) failures. Unfortunately, it has been known for decades that many decision tasks cannot be solved if the system is overly corrupted, i.e., safety of distributed protocols solving such tasks can be violated in unlucky scenarios.By contrast, only recently did the community discover that some of these distributed protocols can be made accountable by ensuring that correct processes irrevocably detect some faulty processes responsible for any safety violation. This realization is particularly surprising (and positive) given that accountability is a powerful tool to mitigate safety violations in distributed protocols. Indeed, exposing crimes and introducing punishments naturally incentivize exemplarity.In this paper, we propose a generic transformation, called τscr, of any non-synchronous distributed protocol solving a decision task into its accountable version. Our τscr transformation is built upon the well-studied simulation of crash failures on top of Byzantine failures and increases the communication complexity by a quadratic multiplicative factor in the worst case.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization 增强加密货币黑名单:安全,无信任和有效的实现
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00112
Yuefeng Du, Anxin Zhou, Cong Wang
The flourishing development of blockchain and cryptocurrency has made it a hotbed for cyber-criminals to implement virtually untraceable scams. Consequently, the blockchain ecosystem urgently needs an effective method to help users stay away from scams in order to create an enticing investment environment. Despite the massive deployment of blocklist query APIs for malicious and scam domains/URLs in the industry, we identify two core reasons why existing blocklist services find it difficult to thrive in the cryptocurrency paradigm: 1) the compelling need to protect a user query due to sensitivity and high value of query content, i.e., payment addresses; 2) the thorny issue of evaluating the quality of blocklists effectively, in the face of common practices of incompetent providers.To this end, we first provide a private and highly efficient blocklist query scheme as a basic design, which conveniently achieves backward compatibility with current blockchain payment systems at a considerably low cost. Based on this design, we propose a new framework for shareholders to evaluate the quality of blocklists. Our framework provides stronger security guarantees than other similar works, as it is capable of suppressing both individual biasing and coercive manipulation at the same time. We provide a complete game-theoretic analysis and demonstrate comprehensive evaluation results to confirm the effectiveness and efficiency of our solutions, under the settings of a practical number of shareholders.
区块链和加密货币的蓬勃发展使其成为网络犯罪分子实施几乎无法追踪的骗局的温床。因此,区块链生态系统迫切需要一种有效的方法来帮助用户远离骗局,以创造一个诱人的投资环境。尽管行业中大量部署了针对恶意和诈骗域名/ url的黑名单查询api,但我们确定了现有黑名单服务难以在加密货币范式中茁壮成长的两个核心原因:1)由于查询内容的敏感性和高价值,迫切需要保护用户查询,即支付地址;2)面对无能提供商的常见做法,如何有效评估黑名单的质量这一棘手问题。为此,我们首先提供了一种私有且高效的区块链查询方案作为基本设计,以相当低的成本方便地实现了与当前区块链支付系统的向后兼容。基于这一设计,我们提出了一个新的框架,供股东评估黑名单的质量。我们的框架提供了比其他类似作品更强的安全保障,因为它能够同时抑制个人偏见和强制操纵。我们提供了完整的博弈论分析,并展示了综合评价结果,以确认我们的解决方案的有效性和效率,在实际股东数量的设置下。
{"title":"Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization","authors":"Yuefeng Du, Anxin Zhou, Cong Wang","doi":"10.1109/ICDCS54860.2022.00112","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00112","url":null,"abstract":"The flourishing development of blockchain and cryptocurrency has made it a hotbed for cyber-criminals to implement virtually untraceable scams. Consequently, the blockchain ecosystem urgently needs an effective method to help users stay away from scams in order to create an enticing investment environment. Despite the massive deployment of blocklist query APIs for malicious and scam domains/URLs in the industry, we identify two core reasons why existing blocklist services find it difficult to thrive in the cryptocurrency paradigm: 1) the compelling need to protect a user query due to sensitivity and high value of query content, i.e., payment addresses; 2) the thorny issue of evaluating the quality of blocklists effectively, in the face of common practices of incompetent providers.To this end, we first provide a private and highly efficient blocklist query scheme as a basic design, which conveniently achieves backward compatibility with current blockchain payment systems at a considerably low cost. Based on this design, we propose a new framework for shareholders to evaluate the quality of blocklists. Our framework provides stronger security guarantees than other similar works, as it is capable of suppressing both individual biasing and coercive manipulation at the same time. We provide a complete game-theoretic analysis and demonstrate comprehensive evaluation results to confirm the effectiveness and efficiency of our solutions, under the settings of a practical number of shareholders.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-granularity Weighted Federated Learning in Heterogeneous Mobile Edge Computing Systems 异构移动边缘计算系统中的多粒度加权联邦学习
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00049
Shangxuan Cai, Yunfeng Zhao, Zhicheng Liu, Chao Qiu, Xiaofei Wang, Qinghua Hu
As a promising framework for distributed learning in mobile edge computing scenarios, federated learning (FL) allows multiple mobile devices to train a model collaboratively without transferring raw data and exposing user privacy. However, vanilla FL schemes are still facing to problems in edge computing, where the diversity of tasks and devices causes the non-IID and multi-granularity data with model heterogeneity. It becomes a pressing challenge to jointly training edge devices accompanied by these problems, while vanilla FL only discusses them separately. To this end, we consider tailoring FL to adapt to mobile edge environments, which focus on solving the problems of collaborative training of edge devices with multi-granularity heterogeneous models under different data distributions. In particular, we proposed a distance-based FL for the same type of edge devices that provides personalized models to avoid the negative impact of non-IID data on model aggregation. Further, we design a bi-directional guidance method with a prior attention mechanism, which can transfer knowledge among edge devices with multi-granulairty and multi-scale models. The experimental results show that our proposed mechanisms significantly improve training performance compared to other baselines on IID and non-IID data. Furthermore, the bi-directional guidance significantly improves convergence efficiency and accuracy performance for finer and coarser granularity edge devices, respectively.
作为移动边缘计算场景中分布式学习的一个有前途的框架,联邦学习(FL)允许多个移动设备协同训练模型,而无需传输原始数据和暴露用户隐私。然而,传统的FL方案在边缘计算中仍然面临着任务和设备的多样性导致非iid和多粒度数据具有模型异构性的问题。伴随着这些问题,联合训练边缘设备成为一个紧迫的挑战,而香草FL只是单独讨论。为此,我们考虑定制FL以适应移动边缘环境,重点解决不同数据分布下多粒度异构模型的边缘设备协同训练问题。特别地,我们提出了一种基于距离的FL,为相同类型的边缘设备提供个性化模型,以避免非iid数据对模型聚合的负面影响。在此基础上,设计了一种基于先验注意机制的双向引导方法,实现了多粒度、多尺度模型的边缘设备间知识转移。实验结果表明,与IID和非IID数据上的其他基准相比,我们提出的机制显著提高了训练性能。此外,双向制导显著提高了细粒度边缘器件的收敛效率和精度性能。
{"title":"Multi-granularity Weighted Federated Learning in Heterogeneous Mobile Edge Computing Systems","authors":"Shangxuan Cai, Yunfeng Zhao, Zhicheng Liu, Chao Qiu, Xiaofei Wang, Qinghua Hu","doi":"10.1109/ICDCS54860.2022.00049","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00049","url":null,"abstract":"As a promising framework for distributed learning in mobile edge computing scenarios, federated learning (FL) allows multiple mobile devices to train a model collaboratively without transferring raw data and exposing user privacy. However, vanilla FL schemes are still facing to problems in edge computing, where the diversity of tasks and devices causes the non-IID and multi-granularity data with model heterogeneity. It becomes a pressing challenge to jointly training edge devices accompanied by these problems, while vanilla FL only discusses them separately. To this end, we consider tailoring FL to adapt to mobile edge environments, which focus on solving the problems of collaborative training of edge devices with multi-granularity heterogeneous models under different data distributions. In particular, we proposed a distance-based FL for the same type of edge devices that provides personalized models to avoid the negative impact of non-IID data on model aggregation. Further, we design a bi-directional guidance method with a prior attention mechanism, which can transfer knowledge among edge devices with multi-granulairty and multi-scale models. The experimental results show that our proposed mechanisms significantly improve training performance compared to other baselines on IID and non-IID data. Furthermore, the bi-directional guidance significantly improves convergence efficiency and accuracy performance for finer and coarser granularity edge devices, respectively.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127700336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data 加密云数据的轻量级保护隐私空间关键字查询
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00045
Yutao Yang, Yinbin Miao, K. Choo, R. Deng
With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatio-textual data is outsourced to the cloud server to reduce the local high storage and computing burdens, but at the same time causes security issues such as data privacy leakage. Thus, extensive privacy-preserving spatial keyword query schemes have been proposed. Most of the existing schemes use Asymmetric Scalar-Product-Preserving Encryption (ASPE) for encryption, but ASPE has proven to be insecure. And the existing spatial range query schemes require users to provide more information about the query range and generate a large amount of ciphertext, which causes high storage and computational burdens. To solve these issues, in this paper we introduce some random numbers and a random permutation to enhance the security of ASPE scheme, and then propose a novel privacy-preserving Spatial Keyword Query (SKQ) scheme based on the enhanced ASPE and Geohash algorithm. In addition, we design a more Lightweight Spatial Keyword Query (LSKQ) scheme by using a unified index for spatial range and multiple keywords, which not only greatly decreases SKQ’s storage and computational costs but also requires users to provide little information about query region. Finally, formal security analysis proves that our schemes have Indistinguishability under Chosen Plaintext Attack (IND-CPA), and extensive experiments demonstrate that our enhanced scheme is efficient and practical.
随着地理定位技术的快速发展和数据的爆炸式增长,大量的空间文本数据被外包给云服务器,以减轻本地高昂的存储和计算负担,但同时也带来了数据隐私泄露等安全问题。因此,提出了广泛的保护隐私的空间关键字查询方案。现有的加密方案大多采用非对称标量保积加密(ASPE)进行加密,但ASPE已被证明是不安全的。而现有的空间范围查询方案需要用户提供更多的查询范围信息,并产生大量的密文,存储和计算负担较大。为了解决这些问题,本文引入了一些随机数和随机排列来提高ASPE方案的安全性,并在此基础上提出了一种新的基于增强ASPE和Geohash算法的隐私保护空间关键字查询(SKQ)方案。此外,我们设计了一种更轻量级的空间关键字查询(LSKQ)方案,通过对空间范围和多个关键字使用统一的索引,不仅大大降低了空间关键字查询的存储和计算成本,而且用户只需提供很少的查询区域信息。最后,正式的安全分析证明了我们的方案在选择明文攻击(IND-CPA)下具有不可区分性,大量的实验证明了我们的改进方案是有效和实用的。
{"title":"Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data","authors":"Yutao Yang, Yinbin Miao, K. Choo, R. Deng","doi":"10.1109/ICDCS54860.2022.00045","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00045","url":null,"abstract":"With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatio-textual data is outsourced to the cloud server to reduce the local high storage and computing burdens, but at the same time causes security issues such as data privacy leakage. Thus, extensive privacy-preserving spatial keyword query schemes have been proposed. Most of the existing schemes use Asymmetric Scalar-Product-Preserving Encryption (ASPE) for encryption, but ASPE has proven to be insecure. And the existing spatial range query schemes require users to provide more information about the query range and generate a large amount of ciphertext, which causes high storage and computational burdens. To solve these issues, in this paper we introduce some random numbers and a random permutation to enhance the security of ASPE scheme, and then propose a novel privacy-preserving Spatial Keyword Query (SKQ) scheme based on the enhanced ASPE and Geohash algorithm. In addition, we design a more Lightweight Spatial Keyword Query (LSKQ) scheme by using a unified index for spatial range and multiple keywords, which not only greatly decreases SKQ’s storage and computational costs but also requires users to provide little information about query region. Finally, formal security analysis proves that our schemes have Indistinguishability under Chosen Plaintext Attack (IND-CPA), and extensive experiments demonstrate that our enhanced scheme is efficient and practical.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge DELA:一种边缘跨层VSI-DDoS检测的深度集成学习方法
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00114
Javad Forough, M. Bhuyan, E. Elmroth
Web application services and networks become a major target of low-rate Distributed Denial of Service (DDoS) attacks such as Very Short Intermittent DDoS (VSI-DDoS). These threats exploit the TCP congestion control mechanism to cause transient resource outage and impute delays for legitimate users’ requests, while they bypass the secure systems. Besides that, cross-layer VSI-DDoS attacks, where the performed attacks are towards the different layers of the edge cloud infrastructures, are able to cause violation of customers’ Service-Level Agreements (SLAs) with less visible behavioral patterns. In this work, we propose a novel Deep Ensemble Learning Approach named DELA for detection of cross-layer VSI-DDoS on the edge cloud. This approach is developed based on Long Short-Term Memory (LSTM), ensemble learning, and a new voting mechanism based on Feed-Forward Neural Network (FFNN). In addition, it employs a novel training and detection algorithm to combat such attacks in web services and networks. The model shows improved results due to the utilization of historical information in decision- making and also the usage of neural network as aggregator instead of a static threshold-based aggregation. Moreover, we propose a novel overlapped data chunking algorithm that is able to ameliorate the detection performance. Furthermore, the evaluation of DELA shows its superior performance over our testbed and benchmark datasets. Accordingly, DELA achieves on average 4.88% higher F 1 score compared to state-of-the-art methods.
Web应用程序服务和网络成为极短间歇性DDoS (VSI-DDoS)等低速率分布式拒绝服务(DDoS)攻击的主要目标。这些威胁利用TCP拥塞控制机制,在绕过安全系统的同时,造成暂时的资源中断,并为合法用户的请求造成延迟。除此之外,跨层VSI-DDoS攻击,其中执行的攻击是针对边缘云基础设施的不同层,能够以不太明显的行为模式导致违反客户的服务水平协议(sla)。在这项工作中,我们提出了一种新的深度集成学习方法,称为DELA,用于检测边缘云上的跨层VSI-DDoS。该方法是基于长短期记忆(LSTM)、集成学习和一种基于前馈神经网络(FFNN)的新的投票机制。此外,它还采用了一种新颖的训练和检测算法来打击web服务和网络中的此类攻击。由于在决策过程中使用了历史信息,并且使用神经网络作为聚合器来代替基于静态阈值的聚合,该模型的结果有所改善。此外,我们提出了一种新的重叠数据分块算法,能够改善检测性能。此外,对DELA的评估表明,它在我们的测试平台和基准数据集上具有优越的性能。因此,与最先进的方法相比,DELA的f1分数平均高出4.88%。
{"title":"DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge","authors":"Javad Forough, M. Bhuyan, E. Elmroth","doi":"10.1109/ICDCS54860.2022.00114","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00114","url":null,"abstract":"Web application services and networks become a major target of low-rate Distributed Denial of Service (DDoS) attacks such as Very Short Intermittent DDoS (VSI-DDoS). These threats exploit the TCP congestion control mechanism to cause transient resource outage and impute delays for legitimate users’ requests, while they bypass the secure systems. Besides that, cross-layer VSI-DDoS attacks, where the performed attacks are towards the different layers of the edge cloud infrastructures, are able to cause violation of customers’ Service-Level Agreements (SLAs) with less visible behavioral patterns. In this work, we propose a novel Deep Ensemble Learning Approach named DELA for detection of cross-layer VSI-DDoS on the edge cloud. This approach is developed based on Long Short-Term Memory (LSTM), ensemble learning, and a new voting mechanism based on Feed-Forward Neural Network (FFNN). In addition, it employs a novel training and detection algorithm to combat such attacks in web services and networks. The model shows improved results due to the utilization of historical information in decision- making and also the usage of neural network as aggregator instead of a static threshold-based aggregation. Moreover, we propose a novel overlapped data chunking algorithm that is able to ameliorate the detection performance. Furthermore, the evaluation of DELA shows its superior performance over our testbed and benchmark datasets. Accordingly, DELA achieves on average 4.88% higher F 1 score compared to state-of-the-art methods.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Twin Assisted Computation Offloading and Service Caching in Mobile Edge Computing 移动边缘计算中的数字孪生辅助计算卸载和服务缓存
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00140
Zhenyu Zhang, Huan Zhouand, Liang Zhao, Victor C. M. Leung
This paper considers the joint optimization of computation offloading, service caching, and resource allocation in the Digital Twin Edge Network (DTEN), and formulates the problem as Mixed-Integer Non-Linear Programming (MINLP), whose goal is to minimize the long-term energy consumption of the system. To solve the optimization problem, a Deep Deterministic Policy Gradient (DDPG) based algorithm is proposed for determining the strategies of computation offloading, service caching, and resource allocation. Simulation results demonstrate that the proposed DDPG based algorithm can reduce the long-term energy consumption of the system greatly, and outperform other benchmark algorithms under different scenarios.
本文考虑了数字双边缘网络(DTEN)中计算卸载、服务缓存和资源分配的联合优化问题,并将其表述为以系统长期能耗最小为目标的混合整数非线性规划(MINLP)问题。为了解决该优化问题,提出了一种基于深度确定性策略梯度(Deep Deterministic Policy Gradient, DDPG)的算法来确定计算卸载、服务缓存和资源分配策略。仿真结果表明,所提出的基于DDPG的算法可以大大降低系统的长期能耗,并且在不同场景下优于其他基准算法。
{"title":"Digital Twin Assisted Computation Offloading and Service Caching in Mobile Edge Computing","authors":"Zhenyu Zhang, Huan Zhouand, Liang Zhao, Victor C. M. Leung","doi":"10.1109/ICDCS54860.2022.00140","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00140","url":null,"abstract":"This paper considers the joint optimization of computation offloading, service caching, and resource allocation in the Digital Twin Edge Network (DTEN), and formulates the problem as Mixed-Integer Non-Linear Programming (MINLP), whose goal is to minimize the long-term energy consumption of the system. To solve the optimization problem, a Deep Deterministic Policy Gradient (DDPG) based algorithm is proposed for determining the strategies of computation offloading, service caching, and resource allocation. Simulation results demonstrate that the proposed DDPG based algorithm can reduce the long-term energy consumption of the system greatly, and outperform other benchmark algorithms under different scenarios.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Segmented Entanglement Establishment for Throughput Maximization in Quantum Networks 量子网络中吞吐量最大化的分段纠缠建立
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00014
Gongming Zhao, Jingzhou Wang, Yangming Zhao, Hongli Xu, C. Qiao
There are two conventional methods to establish an entanglement connection in a Quantum Data Network (QDN). One is to create single-hop entanglement links first and then connect them with quantum swapping, and the other is for-warding one of the entangled photons from one end to the other via all-optical switching at intermediate nodes to directly establish an entanglement connection. Since a photon is easy to be lost during a long distance transmission, all existing works are adopting the former method. However, in a room size network, the success probability of delivering a photon across multiple links via all-optical switching is not that low. In addition, with an all-optical switching technique, we can save quantum memory at the intermediate nodes. Accordingly, we are expecting to establish significantly more entanglement connections with limited quantum resources by first creating entanglement segments, each spanning multiple quantum links, using all-optical switching, and then connecting them with quantum swapping.In this paper, we design SEE, a Segmented Entanglement Establishment approach that seamlessly integrates quantum swapping and all-optical switching to maximize quantum network throughput. SEE first creates entanglement segments over one or multiple quantum links with all-optical switching, and then connect them with quantum swapping. It is clear that an entanglement link is only a special entanglement segment. Accordingly, SEE can theoretically outperform conventional entanglement link based approaches. Large scale simulations show that SEE can achieve up to 100.00% larger throughput compared with the state-of-the-art entanglement link based approach, i.e., REPS.
在量子数据网络(QDN)中建立纠缠连接的传统方法有两种。一种是先建立单跳纠缠链路,然后用量子交换将其连接起来;另一种是通过中间节点的全光交换,将一个纠缠光子从一端送到另一端,直接建立纠缠连接。由于光子在长距离传输中容易丢失,现有的工作都采用前一种方法。然而,在一个房间大小的网络中,通过全光交换在多个链路上传递光子的成功概率并不低。此外,利用全光交换技术,我们可以节省中间节点的量子内存。因此,我们希望在有限的量子资源下建立更多的纠缠连接,首先使用全光交换创建纠缠段,每个纠缠段跨越多个量子链路,然后使用量子交换将它们连接起来。在本文中,我们设计了SEE,一种分段纠缠建立方法,无缝集成量子交换和全光交换,以最大限度地提高量子网络吞吐量。SEE首先通过全光交换在一个或多个量子链路上创建纠缠段,然后通过量子交换将它们连接起来。显然,一个纠缠环节只是一个特殊的纠缠段。因此,从理论上讲,SEE可以优于传统的基于纠缠链路的方法。大规模仿真表明,与最先进的基于纠缠链路的方法(即REPS)相比,SEE可以实现高达100.00%的吞吐量。
{"title":"Segmented Entanglement Establishment for Throughput Maximization in Quantum Networks","authors":"Gongming Zhao, Jingzhou Wang, Yangming Zhao, Hongli Xu, C. Qiao","doi":"10.1109/ICDCS54860.2022.00014","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00014","url":null,"abstract":"There are two conventional methods to establish an entanglement connection in a Quantum Data Network (QDN). One is to create single-hop entanglement links first and then connect them with quantum swapping, and the other is for-warding one of the entangled photons from one end to the other via all-optical switching at intermediate nodes to directly establish an entanglement connection. Since a photon is easy to be lost during a long distance transmission, all existing works are adopting the former method. However, in a room size network, the success probability of delivering a photon across multiple links via all-optical switching is not that low. In addition, with an all-optical switching technique, we can save quantum memory at the intermediate nodes. Accordingly, we are expecting to establish significantly more entanglement connections with limited quantum resources by first creating entanglement segments, each spanning multiple quantum links, using all-optical switching, and then connecting them with quantum swapping.In this paper, we design SEE, a Segmented Entanglement Establishment approach that seamlessly integrates quantum swapping and all-optical switching to maximize quantum network throughput. SEE first creates entanglement segments over one or multiple quantum links with all-optical switching, and then connect them with quantum swapping. It is clear that an entanglement link is only a special entanglement segment. Accordingly, SEE can theoretically outperform conventional entanglement link based approaches. Large scale simulations show that SEE can achieve up to 100.00% larger throughput compared with the state-of-the-art entanglement link based approach, i.e., REPS.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LoADPart: Load-Aware Dynamic Partition of Deep Neural Networks for Edge Offloading 负载感知边缘卸载的深度神经网络动态分区
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00053
Hongzhou Liu, Wenli Zheng, Li Li, Minyi Guo
The emerging edge computing technique provides support for the computation tasks that are delay-sensitive and compute-intensive, such as deep neural network inference, by offloading them from a user-end device to an edge server for fast execution. The increasing offloaded tasks on an edge server are gradually facing the contention of both the network and computation resources. The existing offloading approaches often partition the deep neural network at a place where the amount of data transmission is small to save network resource, but rarely consider the problem caused by computation resource shortage on the edge server. In this paper, we design LoADPart, a deep neural network offloading system. LoADPart can dynamically and jointly analyze both the available network bandwidth and the computation load of the edge server, and make proper decisions of deep neural network partition with a light-weighted algorithm, to minimize the end-to-end inference latency. We implement LoADPart for MindSpore, a deep learning framework supporting edge AI, and compare it with state-of-the-art solutions in the experiments on 6 deep neural networks. The results show that under the variation of server computation load, LoADPart can reduce the end-to-end latency by 14.2% on average and up to 32.3% in some specific cases.
新兴的边缘计算技术通过将延迟敏感和计算密集型的计算任务(如深度神经网络推理)从用户端设备卸载到边缘服务器以快速执行,从而为其提供支持。边缘服务器上日益增加的卸载任务逐渐面临着网络资源和计算资源的竞争。现有的卸载方法通常将深度神经网络划分在数据传输量较小的地方以节省网络资源,但很少考虑边缘服务器上计算资源不足所带来的问题。本文设计了一个深度神经网络卸载系统LoADPart。LoADPart可以动态联合分析边缘服务器的可用网络带宽和计算负载,并采用轻量级算法对深度神经网络分区进行合理决策,最大限度地减少端到端推理延迟。我们为MindSpore实现了LoADPart,这是一个支持边缘人工智能的深度学习框架,并在6个深度神经网络的实验中将其与最先进的解决方案进行了比较。结果表明,在服务器计算负载变化的情况下,LoADPart可将端到端延迟平均降低14.2%,在某些特定情况下可降低32.3%。
{"title":"LoADPart: Load-Aware Dynamic Partition of Deep Neural Networks for Edge Offloading","authors":"Hongzhou Liu, Wenli Zheng, Li Li, Minyi Guo","doi":"10.1109/ICDCS54860.2022.00053","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00053","url":null,"abstract":"The emerging edge computing technique provides support for the computation tasks that are delay-sensitive and compute-intensive, such as deep neural network inference, by offloading them from a user-end device to an edge server for fast execution. The increasing offloaded tasks on an edge server are gradually facing the contention of both the network and computation resources. The existing offloading approaches often partition the deep neural network at a place where the amount of data transmission is small to save network resource, but rarely consider the problem caused by computation resource shortage on the edge server. In this paper, we design LoADPart, a deep neural network offloading system. LoADPart can dynamically and jointly analyze both the available network bandwidth and the computation load of the edge server, and make proper decisions of deep neural network partition with a light-weighted algorithm, to minimize the end-to-end inference latency. We implement LoADPart for MindSpore, a deep learning framework supporting edge AI, and compare it with state-of-the-art solutions in the experiments on 6 deep neural networks. The results show that under the variation of server computation load, LoADPart can reduce the end-to-end latency by 14.2% on average and up to 32.3% in some specific cases.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115853525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1