首页 > 最新文献

2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing 基于拓扑感知的集群配置,最小化边缘计算中的通信延迟
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00144
K. Rajashekar, Souradyuti Paul, S. Karmakar, Subhajit Sidhanta
For real-time edge computing applications working under stringent deadlines, communication delay between IoT devices and edge devices needs to be minimized. Since the generalized assignment problem being NP-Hard, an optimal assignment of IoT devices to the edge cluster is hard. We propose the application RL based heuristics to obtain a near-optimal assignment of IoT devices to the edge cluster while ensuring that none of the edge devices are overloaded. We demonstrate that our algorithm outperforms the state-of-the-art.
对于在严格期限下工作的实时边缘计算应用,需要最大限度地减少物联网设备和边缘设备之间的通信延迟。由于广义分配问题是NP-Hard问题,物联网设备到边缘集群的最优分配是困难的。我们提出了基于强化学习的应用启发式方法,以获得物联网设备到边缘集群的近乎最优分配,同时确保没有任何边缘设备过载。我们证明了我们的算法优于最先进的算法。
{"title":"Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing","authors":"K. Rajashekar, Souradyuti Paul, S. Karmakar, Subhajit Sidhanta","doi":"10.1109/ICDCS54860.2022.00144","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00144","url":null,"abstract":"For real-time edge computing applications working under stringent deadlines, communication delay between IoT devices and edge devices needs to be minimized. Since the generalized assignment problem being NP-Hard, an optimal assignment of IoT devices to the edge cluster is hard. We propose the application RL based heuristics to obtain a near-optimal assignment of IoT devices to the edge cluster while ensuring that none of the edge devices are overloaded. We demonstrate that our algorithm outperforms the state-of-the-art.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132036327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Query Recombination: To Process a Large Number of Concurrent Top-k Queries towards IoT Data on an Edge Server 查询重组:在边缘服务器上处理大量并发的对IoT数据的Top-k查询
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00060
Tuo Shi, Zhipeng Cai, Yingshu Li
Multi-access Edge Computing is an important technique in the Internet of Things (IoT). It can help people observe the physical world by caching IoT data at an edge server and provide data query services. In this paper, we investigate how to process numerous concurrent top-k queries on an edge server. Since the computation resource of an edge server is limited and costly, processing concurrent top-k queries in the edge is totally different from that in the cloud. Researchers always focus on reducing time/space complexity of processing single top-k query in the cloud. However, how to process numerous top-k queries on an edge server in a cost-efficient manner still remains an open problem. In order to solve the problem, we propose the query recombination concept which aims at using the correlation of queries to reduce resource consumption of query processing. By adopting query recombination, we can make use of a small set of queries to answer the other queries and reduce resource consumption as well. We prove that constructing an optimal query recombination is NP-hard. Three approximate algorithms are proposed accordingly. Simulations are carried out to evaluate the performance of the proposed algorithms further, and the results show that the proposed algorithms are effective and efficient.
多址边缘计算是物联网中的一项重要技术。它可以通过在边缘服务器上缓存物联网数据来帮助人们观察物理世界,并提供数据查询服务。在本文中,我们研究了如何在边缘服务器上处理大量并发top-k查询。由于边缘服务器的计算资源有限且成本高昂,因此在边缘处理并发top-k查询与在云中处理查询完全不同。研究人员一直关注如何降低在云中处理单个top-k查询的时间/空间复杂度。然而,如何以经济高效的方式在边缘服务器上处理大量top-k查询仍然是一个悬而未决的问题。为了解决这个问题,我们提出了查询重组的概念,旨在利用查询之间的相关性来减少查询处理的资源消耗。通过采用查询重组,我们可以利用一小部分查询来回答其他查询,并减少资源消耗。我们证明了构造最优查询重组是np困难的。据此提出了三种近似算法。通过仿真进一步验证了所提算法的性能,结果表明所提算法是有效的。
{"title":"Query Recombination: To Process a Large Number of Concurrent Top-k Queries towards IoT Data on an Edge Server","authors":"Tuo Shi, Zhipeng Cai, Yingshu Li","doi":"10.1109/ICDCS54860.2022.00060","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00060","url":null,"abstract":"Multi-access Edge Computing is an important technique in the Internet of Things (IoT). It can help people observe the physical world by caching IoT data at an edge server and provide data query services. In this paper, we investigate how to process numerous concurrent top-k queries on an edge server. Since the computation resource of an edge server is limited and costly, processing concurrent top-k queries in the edge is totally different from that in the cloud. Researchers always focus on reducing time/space complexity of processing single top-k query in the cloud. However, how to process numerous top-k queries on an edge server in a cost-efficient manner still remains an open problem. In order to solve the problem, we propose the query recombination concept which aims at using the correlation of queries to reduce resource consumption of query processing. By adopting query recombination, we can make use of a small set of queries to answer the other queries and reduce resource consumption as well. We prove that constructing an optimal query recombination is NP-hard. Three approximate algorithms are proposed accordingly. Simulations are carried out to evaluate the performance of the proposed algorithms further, and the results show that the proposed algorithms are effective and efficient.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
: A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge 一种基于不可替代令牌和零知识的可追溯且保护隐私的数据交换方案
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00030
Rui Song, Shang Gao, Yubo Song, Bin Xiao
With the advent of the Big Data era, industry, business and academia have developed various data exchange schemes to make data more economically beneficial. Unfortunately, most of the existing systems provide only one-time data exchanges without the ability to track the provenance and transformations of datasets. In addition, existing systems encrypt the data to protect data privacy, which hinders demanders from verifying the correctness of the data and evaluating its value.To provide data traceability and privacy while ensuring fairness during data exchanges, we design and implement ZKDET, a traceable data exchange scheme based on non-fungible token and zero-knowledge, which is able to (i) track all transformations of data during their lifecycle and record them on the blockchain; (ii) provide zero-knowledge proofs to securely guarantee that all complex transformations and data contents are correct and meet specific requirements; and (iii) warrant exchange fairness and data privacy in public storage platforms. Security analysis and evaluations on ZKDET show that it can support traceable data exchange while preserving data privacy and maintaining high throughput despite large data volumes.
随着大数据时代的到来,产业界、商界和学术界都制定了各种数据交换方案,以使数据更具经济效益。不幸的是,大多数现有系统只提供一次性数据交换,没有跟踪数据集的来源和转换的能力。此外,现有系统对数据进行加密,以保护数据隐私,这阻碍了需求方验证数据的正确性和评估数据的价值。为了提供数据可追溯性和隐私性,同时确保数据交换过程中的公平性,我们设计并实现了ZKDET,这是一种基于不可替代令牌和零知识的可追溯数据交换方案,能够(i)跟踪数据在其生命周期中的所有转换并将其记录在区块链上;(ii)提供零知识证明,以安全地保证所有复杂转换和数据内容都是正确的并符合特定要求;(三)保证公共存储平台的交换公平和数据隐私。对ZKDET的安全分析和评估表明,它可以支持可追溯的数据交换,同时保护数据隐私,并在数据量大的情况下保持高吞吐量。
{"title":": A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge","authors":"Rui Song, Shang Gao, Yubo Song, Bin Xiao","doi":"10.1109/ICDCS54860.2022.00030","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00030","url":null,"abstract":"With the advent of the Big Data era, industry, business and academia have developed various data exchange schemes to make data more economically beneficial. Unfortunately, most of the existing systems provide only one-time data exchanges without the ability to track the provenance and transformations of datasets. In addition, existing systems encrypt the data to protect data privacy, which hinders demanders from verifying the correctness of the data and evaluating its value.To provide data traceability and privacy while ensuring fairness during data exchanges, we design and implement ZKDET, a traceable data exchange scheme based on non-fungible token and zero-knowledge, which is able to (i) track all transformations of data during their lifecycle and record them on the blockchain; (ii) provide zero-knowledge proofs to securely guarantee that all complex transformations and data contents are correct and meet specific requirements; and (iii) warrant exchange fairness and data privacy in public storage platforms. Security analysis and evaluations on ZKDET show that it can support traceable data exchange while preserving data privacy and maintaining high throughput despite large data volumes.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
K-Indistinguishable Data Access for Encrypted Key-Value Stores 加密键值存储的k -不可区分数据访问
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00113
C. Zhang, Qingyuan Xie, Yinbin Miao, Xiaohua Jia
Key-value store is adopted by many applications due to its high performance in processing big data workloads. Recent research on secure cloud storage has shown that even if the data is encrypted, attackers can learn the sensitive information of data by launching access pattern attacks such as frequency analysis. For this issue, some schemes have been proposed to protect encrypted key-value stores against access pattern attacks. However, existing solutions protect access pattern information at the cost of large storage and bandwidth overhead, which is unacceptable for large-scale key-value stores. In this paper, we devise a K-indistinguishable frequency smoothing scheme for encrypted key-value stores, which can resist access pattern attacks launched by passive persistent adversaries with minimal storage and bandwidth overhead. Then, we propose a dynamic K-indistinguishable frequency smoothing scheme. It can efficiently adapt to the changes in access distribution while ensuring the K-indistinguishable security level and bandwidth efficiency. Finally, we formally analyze the security of our design. Extensive experiments demonstrate that our design achieves high throughput while minimizing storage and bandwidth overhead.
键值存储因其在处理大数据工作负载方面的高性能而被很多应用所采用。最近对安全云存储的研究表明,即使对数据进行加密,攻击者也可以通过频率分析等访问模式攻击来了解数据的敏感信息。针对这个问题,已经提出了一些方案来保护加密的键值存储免受访问模式攻击。但是,现有的解决方案以大量存储和带宽开销为代价来保护访问模式信息,这对于大规模键值存储来说是不可接受的。在本文中,我们设计了一种用于加密键值存储的k -不可区分频率平滑方案,该方案可以以最小的存储和带宽开销抵御被动持久对手发起的访问模式攻击。然后,我们提出了一种动态k -不可分辨频率平滑方案。它能有效地适应接入分布的变化,同时保证k -不可区分的安全级别和带宽效率。最后,我们正式分析了我们设计的安全性。大量的实验表明,我们的设计实现了高吞吐量,同时最大限度地减少了存储和带宽开销。
{"title":"K-Indistinguishable Data Access for Encrypted Key-Value Stores","authors":"C. Zhang, Qingyuan Xie, Yinbin Miao, Xiaohua Jia","doi":"10.1109/ICDCS54860.2022.00113","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00113","url":null,"abstract":"Key-value store is adopted by many applications due to its high performance in processing big data workloads. Recent research on secure cloud storage has shown that even if the data is encrypted, attackers can learn the sensitive information of data by launching access pattern attacks such as frequency analysis. For this issue, some schemes have been proposed to protect encrypted key-value stores against access pattern attacks. However, existing solutions protect access pattern information at the cost of large storage and bandwidth overhead, which is unacceptable for large-scale key-value stores. In this paper, we devise a K-indistinguishable frequency smoothing scheme for encrypted key-value stores, which can resist access pattern attacks launched by passive persistent adversaries with minimal storage and bandwidth overhead. Then, we propose a dynamic K-indistinguishable frequency smoothing scheme. It can efficiently adapt to the changes in access distribution while ensuring the K-indistinguishable security level and bandwidth efficiency. Finally, we formally analyze the security of our design. Extensive experiments demonstrate that our design achieves high throughput while minimizing storage and bandwidth overhead.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pinpoint Achilles’ Heel in RFID Localization: Phase Calibration of RFID Antenna based on Linear Localization Model RFID定位中的致命弱点:基于线性定位模型的RFID天线相位标定
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00082
Yanling Bu, Linfu Xie, Jia Liu, Chuyu Wang, Ge Wang, Zenglong Wang, Sanglu Lu
In the context of Industrial Internet of Things (IIoT), RFID technologies have been widely applied to locate or track tagged objects for achieving item-level intelligence. However, prior localization work encounters two main issues. First, the phase measurement usually contains physical deviation. Existing localization work generally takes the physical center of an RFID antenna as its phase center, which is a key factor in improving localization accuracy but actually different from the physical center in practice. Second, the non-linear localization model is likely to be too complex to run on edge nodes with limited computing resources. In this paper, we present a LInear localizatiON solution, called LION, to perform the phase calibration for antennas with no need for the complex computation nor strong limitations. Specifically, we provide a novel lightweight model to pinpoint the actual antenna position quickly and accurately. Compared to previous localization methods, we reduce the intersection of circles or hyperbolas into radical lines, which greatly reduces the computation cost while guaranteeing the high accuracy. Further, to adapt to the complex environment with various ambient noise and multi-path effect, we leverage the weighted least square method to determine the optimal position. Moreover, we propose an adaptive parameter selection scheme to automatically choose optimal parameters for localization. In this way, LION is able to perform the accurate localization robustly. We implement LION using commercial RFID devices, and evaluate its performance extensively. Experimental results show the necessity of phase calibration as well as the high time efficiency of LION, e.g., the average accuracy improves by 6× and 2.1× for 2D and 3D localization, and the average time consuming is 0.02s and 1.8s for 2D and 3D cases.
在工业物联网(IIoT)的背景下,RFID技术已被广泛应用于定位或跟踪标记物体,以实现物品级智能。然而,之前的本地化工作遇到了两个主要问题。首先,相位测量通常包含物理偏差。现有的定位工作一般以RFID天线的物理中心作为相位中心,这是提高定位精度的关键因素,但在实际应用中与物理中心有很大的不同。其次,非线性定位模型可能过于复杂,无法在计算资源有限的边缘节点上运行。在本文中,我们提出了一种称为LION的线性定位解决方案来执行天线的相位校准,无需复杂的计算,也没有很强的限制。具体来说,我们提供了一种新的轻量级模型,可以快速准确地确定天线的实际位置。与以往的定位方法相比,我们将圆或双曲线的交点简化为根线,在保证高精度的同时大大降低了计算量。此外,为了适应具有各种环境噪声和多径效应的复杂环境,我们利用加权最小二乘法来确定最优位置。此外,我们还提出了一种自适应参数选择方案,自动选择最优的定位参数。这样,LION就可以鲁棒地进行精确定位。我们使用商用RFID设备实现LION,并广泛评估其性能。实验结果表明了相位标定的必要性和时间效率高,二维和三维定位的平均精度分别提高了6倍和2.1倍,二维和三维定位的平均耗时分别为0.02s和1.8s。
{"title":"Pinpoint Achilles’ Heel in RFID Localization: Phase Calibration of RFID Antenna based on Linear Localization Model","authors":"Yanling Bu, Linfu Xie, Jia Liu, Chuyu Wang, Ge Wang, Zenglong Wang, Sanglu Lu","doi":"10.1109/ICDCS54860.2022.00082","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00082","url":null,"abstract":"In the context of Industrial Internet of Things (IIoT), RFID technologies have been widely applied to locate or track tagged objects for achieving item-level intelligence. However, prior localization work encounters two main issues. First, the phase measurement usually contains physical deviation. Existing localization work generally takes the physical center of an RFID antenna as its phase center, which is a key factor in improving localization accuracy but actually different from the physical center in practice. Second, the non-linear localization model is likely to be too complex to run on edge nodes with limited computing resources. In this paper, we present a LInear localizatiON solution, called LION, to perform the phase calibration for antennas with no need for the complex computation nor strong limitations. Specifically, we provide a novel lightweight model to pinpoint the actual antenna position quickly and accurately. Compared to previous localization methods, we reduce the intersection of circles or hyperbolas into radical lines, which greatly reduces the computation cost while guaranteeing the high accuracy. Further, to adapt to the complex environment with various ambient noise and multi-path effect, we leverage the weighted least square method to determine the optimal position. Moreover, we propose an adaptive parameter selection scheme to automatically choose optimal parameters for localization. In this way, LION is able to perform the accurate localization robustly. We implement LION using commercial RFID devices, and evaluate its performance extensively. Experimental results show the necessity of phase calibration as well as the high time efficiency of LION, e.g., the average accuracy improves by 6× and 2.1× for 2D and 3D localization, and the average time consuming is 0.02s and 1.8s for 2D and 3D cases.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ENIGMA: Low-Latency and Privacy-Preserving Edge Inference on Heterogeneous Neural Network Accelerators ENIGMA:异构神经网络加速器的低延迟和隐私保护边缘推断
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00051
Qiushi Li, Ju Ren, Xinglin Pan, Yuezhi Zhou, Yaoxue Zhang
Time-efficient artificial intelligence (AI) service has recently witnessed increasing interest from academia and industry due to the urgent needs in massive smart applications such as self-driving cars, virtual reality, high-resolution video streaming, etc. Existing solutions to reduce AI latency, like edge computing and heterogeneous neural-network accelerators (NNAs), face high risk of privacy leakage. To achieve both low-latency and privacy-preserving purposes on edge servers (e.g., NNAs), this paper proposes ENIGMA that can exploit the trusted execution environment (TEE) and heterogeneous NNAs of edge servers for edge inference. The low-latency is supported by a new ahead-of-time analysis framework for analyzing the linearity of multilayer neural networks, which automatically slices forward-graph and assigns sub-graphs to TEE or NNA. To avoid privacy leakage issue, we then introduce a pre-forwarded cipher generation (PFCG) scheme for computing linear sub-forward-graphs on NNA. The input data is encrypted to ciphertext that can be computed directly by linear sub-graphs, and the output can be decrypted to obtain the correct output. To enable non-linear computation of sub-graphs on TEE, we use ring-cache and automatic vectorization optimization to address the memory limitation of TEE. Qualitative analysis and quantitative experiments on GPU, NPU and TPU demonstrate that ENIGMA is not only compatible with heterogeneous NNAs, but also can avoid leakages of private features with latency as low as 50-milliseconds.
由于自动驾驶汽车、虚拟现实、高分辨率视频流等大规模智能应用的迫切需求,高效率的人工智能(AI)服务最近引起了学术界和工业界越来越多的兴趣。现有的减少人工智能延迟的解决方案,如边缘计算和异构神经网络加速器(NNAs),面临着很高的隐私泄露风险。为了在边缘服务器(如NNAs)上实现低延迟和隐私保护的目的,本文提出了利用可信执行环境(TEE)和边缘服务器的异构NNAs进行边缘推理的ENIGMA。低延迟由一个新的提前分析框架支持,用于分析多层神经网络的线性性,该框架自动切片前向图并将子图分配给TEE或NNA。为了避免隐私泄露问题,我们引入了一种用于计算NNA上线性子前向图的预转发密码生成(PFCG)方案。将输入的数据加密为可由线性子图直接计算的密文,对输出进行解密,得到正确的输出。为了实现TEE上子图的非线性计算,我们使用环缓存和自动矢量化优化来解决TEE的内存限制。在GPU、NPU和TPU上的定性分析和定量实验表明,ENIGMA不仅可以兼容异构NNAs,而且可以避免私有特征的泄漏,延迟低至50毫秒。
{"title":"ENIGMA: Low-Latency and Privacy-Preserving Edge Inference on Heterogeneous Neural Network Accelerators","authors":"Qiushi Li, Ju Ren, Xinglin Pan, Yuezhi Zhou, Yaoxue Zhang","doi":"10.1109/ICDCS54860.2022.00051","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00051","url":null,"abstract":"Time-efficient artificial intelligence (AI) service has recently witnessed increasing interest from academia and industry due to the urgent needs in massive smart applications such as self-driving cars, virtual reality, high-resolution video streaming, etc. Existing solutions to reduce AI latency, like edge computing and heterogeneous neural-network accelerators (NNAs), face high risk of privacy leakage. To achieve both low-latency and privacy-preserving purposes on edge servers (e.g., NNAs), this paper proposes ENIGMA that can exploit the trusted execution environment (TEE) and heterogeneous NNAs of edge servers for edge inference. The low-latency is supported by a new ahead-of-time analysis framework for analyzing the linearity of multilayer neural networks, which automatically slices forward-graph and assigns sub-graphs to TEE or NNA. To avoid privacy leakage issue, we then introduce a pre-forwarded cipher generation (PFCG) scheme for computing linear sub-forward-graphs on NNA. The input data is encrypted to ciphertext that can be computed directly by linear sub-graphs, and the output can be decrypted to obtain the correct output. To enable non-linear computation of sub-graphs on TEE, we use ring-cache and automatic vectorization optimization to address the memory limitation of TEE. Qualitative analysis and quantitative experiments on GPU, NPU and TPU demonstrate that ENIGMA is not only compatible with heterogeneous NNAs, but also can avoid leakages of private features with latency as low as 50-milliseconds.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
E-TSN: Enabling Event-triggered Critical Traffic in Time-Sensitive Networking for Industrial Applications E-TSN:在工业应用的时间敏感网络中启用事件触发关键流量
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00072
Yi Zhao, Zheng Yang, Xiaowu He, Jiahang Wu, Hao Cao, Liang Dong, Fan Dang, Yunhao Liu
Time-Sensitive Networking (TSN) is the most promising network technology for Industry 4.0. A series of IEEE standards on TSN introduce deterministic transmission into standard Ethernet. Under the current paradigm, TSN can only schedule the deterministic transmission of time-triggered critical traffic (TCT), neglecting the other type of traffic in industrial cyber physical systems, i.e., event-triggered critical traffic (ECT). So in this work, we propose a new paradigm for TSN scheduling named E-TSN, which can provide deterministic transmission for both TCT and ECT. The three techniques of E-TSN, i.e., probabilistic stream, prioritized slot sharing, and prudent reservation, enable the deterministic transmission of ECT in TSN, and at the same time, protect TCT from the impacts of ECT. We also develop and make public a TSN evaluation toolkit to fill the gap in TSN study between algorithm design and experimental validation. The experiments show that E-TSN can reduce the latency and jitter of ECT by at least an order of magnitude compared to state-of-the-art methods. By enabling reliable and timely delivery of ECT in TSN for the first time, E-TSN can broaden the application scope of TSN in industry.
时间敏感网络(TSN)是工业4.0最有前途的网络技术。一系列关于TSN的IEEE标准将确定性传输引入标准以太网。在目前的范式下,TSN只能调度时间触发关键流量(TCT)的确定性传输,而忽略了工业网络物理系统中的其他类型的流量,即事件触发关键流量(ECT)。因此,本文提出了一种新的TSN调度模式E-TSN,它可以同时为TCT和ECT提供确定性传输。E-TSN的三种技术,即概率流、优先槽位共享和谨慎预留,使ECT在TSN中的传输具有确定性,同时保护TCT不受ECT的影响。我们还开发并公开了一个TSN评估工具包,以填补TSN研究在算法设计和实验验证之间的空白。实验表明,与最先进的方法相比,E-TSN可以将ECT的延迟和抖动降低至少一个数量级。E-TSN首次实现了TSN中ECT的可靠、及时交付,拓宽了TSN在工业中的应用范围。
{"title":"E-TSN: Enabling Event-triggered Critical Traffic in Time-Sensitive Networking for Industrial Applications","authors":"Yi Zhao, Zheng Yang, Xiaowu He, Jiahang Wu, Hao Cao, Liang Dong, Fan Dang, Yunhao Liu","doi":"10.1109/ICDCS54860.2022.00072","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00072","url":null,"abstract":"Time-Sensitive Networking (TSN) is the most promising network technology for Industry 4.0. A series of IEEE standards on TSN introduce deterministic transmission into standard Ethernet. Under the current paradigm, TSN can only schedule the deterministic transmission of time-triggered critical traffic (TCT), neglecting the other type of traffic in industrial cyber physical systems, i.e., event-triggered critical traffic (ECT). So in this work, we propose a new paradigm for TSN scheduling named E-TSN, which can provide deterministic transmission for both TCT and ECT. The three techniques of E-TSN, i.e., probabilistic stream, prioritized slot sharing, and prudent reservation, enable the deterministic transmission of ECT in TSN, and at the same time, protect TCT from the impacts of ECT. We also develop and make public a TSN evaluation toolkit to fill the gap in TSN study between algorithm design and experimental validation. The experiments show that E-TSN can reduce the latency and jitter of ECT by at least an order of magnitude compared to state-of-the-art methods. By enabling reliable and timely delivery of ECT in TSN for the first time, E-TSN can broaden the application scope of TSN in industry.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dissecting the Workload of Cloud Storage System 剖析云存储系统的工作负载
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00068
Yaodanjun Ren, Xiaoyi Sun, Kai Li, Jiale Lin, Shuzhi Feng, Zhenyu Ren, Jian Yin, Zhengwei Qi
The innovation and evolution of file and storage systems have been influenced by workload analysis. Though cloud storage systems have been widely deployed and used, real-world and large-scale cloud storage workload studies are rare. Previous large-scale distributed storage systems can meet versatility, stability, and reliability requirements. Furthermore, modern cloud storage systems need to meet additional challenges, such as coping with surges in peak loads and rapid expansion of requests. These changes may lead to different characteristics.In this work, we propose DiTing data tracing system and collect workloads with over 242,000 billion requests from the Alibaba cloud. By comparing the normal days and the Single’s Day (the world’s largest online shopping festival), we analyze characteristics such as I/O scale, latency, locality, and load distribution. Our analysis reveals four key observations as follows. First, the virtual layer is the performance bottleneck of modern cloud storage systems during extreme peak periods. Second, the write operations dominate the data access because the application and operating system buffers absorb reads better than writes. Third, the workload is heavily skewed toward a small percentage of virtual cloud disks, with 20% of cloud disks accounting for 80% of I/O requests. Finally, data access shows poor temporal and spatial locality, and the I/O requests are mostly small-scaled. Based on these observations, we propose several suggestions for cloud storage systems, including separating I/O processing from the virtual layer to the proxy layer, deploying heavy and light workload applications on the same node, and adopting a write-friendly cloud disk design for write-skewed requests, etc. In summary, these workload characteristics and suggestions are useful for designing and implementing next-generation cloud storage systems.
工作负载分析影响了文件和存储系统的创新和发展。虽然云存储系统已经被广泛部署和使用,但实际和大规模的云存储工作负载研究很少。以前的大规模分布式存储系统可以满足通用性、稳定性和可靠性的要求。此外,现代云存储系统还需要应对额外的挑战,例如应对峰值负载激增和请求的快速扩展。这些变化可能导致不同的特征。在这项工作中,我们提出了DiTing数据跟踪系统,并从阿里云收集了超过242亿个请求的工作负载。通过比较正常日和光棍节(世界上最大的在线购物节),我们分析了I/O规模、延迟、局域性和负载分布等特征。我们的分析揭示了以下四个关键观察结果。首先,虚拟层是现代云存储系统在极端峰值期间的性能瓶颈。其次,写操作主导了数据访问,因为应用程序和操作系统缓冲区比写更能吸收读操作。第三,工作负载严重偏向一小部分虚拟云磁盘,20%的云磁盘处理80%的I/O请求。最后,数据访问表现出较差的时间和空间局部性,并且I/O请求大多是小规模的。基于这些观察,我们对云存储系统提出了一些建议,包括将I/O处理从虚拟层分离到代理层,在同一节点上部署重工作负载和轻工作负载的应用程序,以及对写倾斜请求采用写友好型云磁盘设计等。总之,这些工作负载特征和建议对于设计和实现下一代云存储系统非常有用。
{"title":"Dissecting the Workload of Cloud Storage System","authors":"Yaodanjun Ren, Xiaoyi Sun, Kai Li, Jiale Lin, Shuzhi Feng, Zhenyu Ren, Jian Yin, Zhengwei Qi","doi":"10.1109/ICDCS54860.2022.00068","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00068","url":null,"abstract":"The innovation and evolution of file and storage systems have been influenced by workload analysis. Though cloud storage systems have been widely deployed and used, real-world and large-scale cloud storage workload studies are rare. Previous large-scale distributed storage systems can meet versatility, stability, and reliability requirements. Furthermore, modern cloud storage systems need to meet additional challenges, such as coping with surges in peak loads and rapid expansion of requests. These changes may lead to different characteristics.In this work, we propose DiTing data tracing system and collect workloads with over 242,000 billion requests from the Alibaba cloud. By comparing the normal days and the Single’s Day (the world’s largest online shopping festival), we analyze characteristics such as I/O scale, latency, locality, and load distribution. Our analysis reveals four key observations as follows. First, the virtual layer is the performance bottleneck of modern cloud storage systems during extreme peak periods. Second, the write operations dominate the data access because the application and operating system buffers absorb reads better than writes. Third, the workload is heavily skewed toward a small percentage of virtual cloud disks, with 20% of cloud disks accounting for 80% of I/O requests. Finally, data access shows poor temporal and spatial locality, and the I/O requests are mostly small-scaled. Based on these observations, we propose several suggestions for cloud storage systems, including separating I/O processing from the virtual layer to the proxy layer, deploying heavy and light workload applications on the same node, and adopting a write-friendly cloud disk design for write-skewed requests, etc. In summary, these workload characteristics and suggestions are useful for designing and implementing next-generation cloud storage systems.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132658206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To Turn or Not To Turn, SafeCross is the Answer 转弯或不转弯,安全十字路口是答案
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00047
Baofu Wu, Yuankai He, Zheng Dong, Jian Wan, Jilin Zhang, Weisong Shi
Blind area has plagued drivers’ safety ever since the dawn of automobiles. Thanks to the fast-growing vision-based perception technologies, autonomous driving systems can monitor the driving circumstance through a 360-degree view, and hence most blind areas can be avoided. However, in the left turn scenario at an intersection, the opposite road may be blocked by another vehicle parking at the same intersection (see Fig. 1), and in this case, the blind area cannot be observed by the onboard perception module of the autonomous vehicle. A potential fatal collision may occur if the autonomous vehicle turns left while a vehicle is running through the blind area. In this paper, we propose Safecross, a framework that oversees an intersection and delivers blind area warnings to the left-turn vehicles at the intersection if running vehicles are detected in the blind area. In order to provide accurate and reliable real-time warnings in all possible weather conditions, the architecture of Safecross has four major components: video pre-processing (VP) module, video classification (VC) module, few-shot learning (FL) module, and model switching (MS) module. Especially, the VP and VC modules will train a basic model to identify the blind area when a blocking vehicle appears at the intersection. Since the range of the blind area varies in different weather conditions, the FL and MS modules can adapt the basic model to the new condition in real-time to make the blind area identification more accurate. Intuitively, if the blind area is identified timely and accurately, the left-turn throughput of the intersection can be maximized. We have conducted extensive experiments to evaluate our proposed framework. The experiments are performed on a total of 2855 video segments with a time span of 180 days, including sunny, rainy, and snowy weather conditions. Experimental results show how Safecross can guarantee the vehicle’s safety while increasing the left-turn traffic throughput by 50%.
自汽车问世以来,盲区一直困扰着驾驶员的安全。由于快速发展的视觉感知技术,自动驾驶系统可以360度监控驾驶环境,因此可以避免大部分盲区。然而,在十字路口左转场景中,对面道路可能被停在同一路口的另一辆车挡住(如图1),此时自动驾驶车辆的车载感知模块无法观察到盲区。如果自动驾驶汽车在车辆穿过盲区时左转,可能会发生致命的碰撞。在本文中,我们提出了safcross框架,该框架可以监督十字路口,并在检测到盲区内有车辆行驶时向十字路口的左转车辆发出盲区警告。为了在所有可能的天气条件下提供准确可靠的实时预警,Safecross的架构有四个主要组成部分:视频预处理(VP)模块、视频分类(VC)模块、少拍学习(FL)模块和模型切换(MS)模块。特别是,VP和VC模块将训练一个基本模型,在交叉口出现阻塞车辆时识别盲区。由于不同天气条件下盲区的范围不同,FL和MS模块可以实时调整基本模型以适应新的天气条件,使盲区识别更加准确。直观地说,如果及时准确地识别盲区,可以使交叉口的左转吞吐量最大化。我们进行了大量的实验来评估我们提出的框架。实验共对2855个视频片段进行,时间跨度为180天,包括晴、雨、雪天气条件。实验结果表明,安全十字路口在保证车辆安全的同时,可使左转交通吞吐量提高50%。
{"title":"To Turn or Not To Turn, SafeCross is the Answer","authors":"Baofu Wu, Yuankai He, Zheng Dong, Jian Wan, Jilin Zhang, Weisong Shi","doi":"10.1109/ICDCS54860.2022.00047","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00047","url":null,"abstract":"Blind area has plagued drivers’ safety ever since the dawn of automobiles. Thanks to the fast-growing vision-based perception technologies, autonomous driving systems can monitor the driving circumstance through a 360-degree view, and hence most blind areas can be avoided. However, in the left turn scenario at an intersection, the opposite road may be blocked by another vehicle parking at the same intersection (see Fig. 1), and in this case, the blind area cannot be observed by the onboard perception module of the autonomous vehicle. A potential fatal collision may occur if the autonomous vehicle turns left while a vehicle is running through the blind area. In this paper, we propose Safecross, a framework that oversees an intersection and delivers blind area warnings to the left-turn vehicles at the intersection if running vehicles are detected in the blind area. In order to provide accurate and reliable real-time warnings in all possible weather conditions, the architecture of Safecross has four major components: video pre-processing (VP) module, video classification (VC) module, few-shot learning (FL) module, and model switching (MS) module. Especially, the VP and VC modules will train a basic model to identify the blind area when a blocking vehicle appears at the intersection. Since the range of the blind area varies in different weather conditions, the FL and MS modules can adapt the basic model to the new condition in real-time to make the blind area identification more accurate. Intuitively, if the blind area is identified timely and accurately, the left-turn throughput of the intersection can be maximized. We have conducted extensive experiments to evaluate our proposed framework. The experiments are performed on a total of 2855 video segments with a time span of 180 days, including sunny, rainy, and snowy weather conditions. Experimental results show how Safecross can guarantee the vehicle’s safety while increasing the left-turn traffic throughput by 50%.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114751248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Cache Management for Multi-Tenant Cloud Services 多租户云服务的个性化缓存管理
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00149
Yigui Yuan, Peiquan Jin, Shouhong Wan
Cloud services such as multi-tenant content delivery networks (CDN) have become a trend because they can offer personalized business support for users. However, as the business modes of different users are usually different, it is not appropriate to use a single cache strategy on cloud servers. First, a single cache cannot adapt to various access patterns of tenants. Second, a single cache will also affect the isolation among different users. In this paper, we propose MyCache, a new framework to deliver personalized cache management for multi-tenant cloud services. We first discuss the impact of access patterns, which motivates MyCache. Then, we briefly introduce the architecture of MyCache, and finally, we present preliminary experimental results to show the feasibility and superiority of our proposal.
多租户内容分发网络(CDN)等云服务已经成为一种趋势,因为它们可以为用户提供个性化的业务支持。但是,由于不同用户的业务模式通常不同,因此在云服务器上使用单一缓存策略是不合适的。首先,单个缓存不能适应租户的各种访问模式。其次,单个缓存也会影响不同用户之间的隔离。在本文中,我们提出了MyCache,这是一个为多租户云服务提供个性化缓存管理的新框架。我们首先讨论访问模式的影响,它激发了MyCache。然后简要介绍了MyCache的体系结构,最后给出了初步的实验结果,证明了本文所提方案的可行性和优越性。
{"title":"Personalized Cache Management for Multi-Tenant Cloud Services","authors":"Yigui Yuan, Peiquan Jin, Shouhong Wan","doi":"10.1109/ICDCS54860.2022.00149","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00149","url":null,"abstract":"Cloud services such as multi-tenant content delivery networks (CDN) have become a trend because they can offer personalized business support for users. However, as the business modes of different users are usually different, it is not appropriate to use a single cache strategy on cloud servers. First, a single cache cannot adapt to various access patterns of tenants. Second, a single cache will also affect the isolation among different users. In this paper, we propose MyCache, a new framework to deliver personalized cache management for multi-tenant cloud services. We first discuss the impact of access patterns, which motivates MyCache. Then, we briefly introduce the architecture of MyCache, and finally, we present preliminary experimental results to show the feasibility and superiority of our proposal.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124344557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1