首页 > 最新文献

2008 The 28th International Conference on Distributed Computing Systems最新文献

英文 中文
Updates and Asynchronous Communication in Trusted Computing Systems 可信计算系统中的更新和异步通信
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.109
J. Brustoloni, David Kyle
Software-based usage controls typically are vulnerable to attacks. Trusted platform modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM-secured systems may not support software updates or asynchronous communication. We contribute techniques that overcome these limitations, enabling updates, secure transmission of usage-controlled files via email or removable disks, and secure use of such files on low-cost commercially available computers. We implemented the proposed scheme on Linux and report on its performance.
基于软件的使用控制通常容易受到攻击。可信平台模块(tpm)可以支持更健壮的控制。然而,按照传统的理解,tpm保护的系统可能不支持软件更新或异步通信。我们贡献了克服这些限制的技术,实现了更新,通过电子邮件或可移动磁盘安全传输使用控制文件,以及在低成本商用计算机上安全使用这些文件。我们在Linux上实现了所提出的方案,并报告了其性能。
{"title":"Updates and Asynchronous Communication in Trusted Computing Systems","authors":"J. Brustoloni, David Kyle","doi":"10.1109/ICDCS.2008.109","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.109","url":null,"abstract":"Software-based usage controls typically are vulnerable to attacks. Trusted platform modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM-secured systems may not support software updates or asynchronous communication. We contribute techniques that overcome these limitations, enabling updates, secure transmission of usage-controlled files via email or removable disks, and secure use of such files on low-cost commercially available computers. We implemented the proposed scheme on Linux and report on its performance.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks 无线传感器网络中的移动辅助时空检测
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.81
G. Xing, Jianping Wang, Ke Shen, Qingfeng Huang, X. Jia, H. So
Wireless sensor networks (WSNs) deployed for mission-critical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes with limited sensing capacity. Although advance network planning and dense node deployment may initially achieve the required performance, they often fail to adapt to the unpredictability of physical reality. This paper explores efficient use of mobile sensors to address the limitations of static WSNs in target detection. We propose a data fusion model that enables static and mobile sensors to effectively collaborate in target detection. An optimal sensor movement scheduling algorithm is developed to minimize the total moving distance of sensors while achieving a set of spatiotemporal performance requirements including high detection probability, low system false alarm rate and bounded detection delay. The effectiveness of our approach is validated by extensive simulations based on real data traces collected by 23 sensor nodes.
用于关键任务应用的无线传感器网络(wsn)面临着使用有限传感容量的节点来满足严格的时空性能要求的基本挑战。尽管预先的网络规划和密集的节点部署可能在最初达到所需的性能,但它们往往无法适应物理现实的不可预测性。本文探讨了如何有效地利用移动传感器来解决静态wsn在目标检测方面的局限性。我们提出了一种数据融合模型,使静态和移动传感器能够有效地协同进行目标检测。为了在满足高检测概率、低系统虚警率和有界检测延迟等时空性能要求的前提下,使传感器的总移动距离最小,提出了一种最优传感器运动调度算法。基于23个传感器节点收集的真实数据轨迹的大量仿真验证了我们方法的有效性。
{"title":"Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks","authors":"G. Xing, Jianping Wang, Ke Shen, Qingfeng Huang, X. Jia, H. So","doi":"10.1109/ICDCS.2008.81","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.81","url":null,"abstract":"Wireless sensor networks (WSNs) deployed for mission-critical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes with limited sensing capacity. Although advance network planning and dense node deployment may initially achieve the required performance, they often fail to adapt to the unpredictability of physical reality. This paper explores efficient use of mobile sensors to address the limitations of static WSNs in target detection. We propose a data fusion model that enables static and mobile sensors to effectively collaborate in target detection. An optimal sensor movement scheduling algorithm is developed to minimize the total moving distance of sensors while achieving a set of spatiotemporal performance requirements including high detection probability, low system false alarm rate and bounded detection delay. The effectiveness of our approach is validated by extensive simulations based on real data traces collected by 23 sensor nodes.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies 树形结构的高效分布式第三方数据认证
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.53
Hao Yuan, M. Atallah
In the third-party model for the distribution of data, the trusted data creator or owner provides an untrusted distributor D with integrity verification (IV) items that are stored at D in addition to the n data items. When a user U has a subset of n' of those n data items and needs to verify their integrity, U is provided by D with a number of IV items that U uses to verify its data's integrity. The model forbids U from receiving any information about the n-n' data items that the user is not authorized to access, and assumes that D has no signature authority (it stores only pre-signed IVs). Most of the published work in this area uses the Merkle tree or variants thereof, and typically requires D to store a linear or close to linear (in n) number s(n) of IV items that are pre-signed by the trusted authority. Moreover, most of the existing schemes impose on D a non-constant amount of computation work t(n) (typically logarithmic in n) in order to provide U with the IV items that enable U to verify the integrity of its data; we call h(n) the number of such IV items. The h(n) values found in the literature are non-constant, i.e., they actually do depend on the number of data items. The main contribution of this paper is to achieve linear s(n), constant h(n) and constant or logarithmic t(n) when the n data items are organized in a tree hierarchy T, and the user's subset of n' items form a subtree T'. The cases of T' considered are when T' is (i) rooted at a node v and of depth k below v; and (ii) reachable in k hops from v going both up and down in T.
在数据分发的第三方模型中,除了n个数据项外,可信数据创建者或所有者还向不可信分发者D提供存储在D的完整性验证(IV)项。当用户U拥有这n个数据项中的n'个子集并需要验证其完整性时,D为U提供了若干IV个数据项,U使用这些数据项来验证其数据的完整性。该模型禁止U接收关于用户未授权访问的n-n'个数据项的任何信息,并假设D没有签名权限(它只存储预签名的iv)。该领域发表的大多数工作都使用Merkle树或其变体,并且通常要求D存储由可信权威预签名的IV项的线性或接近线性(n个)数量的s(n)项。此外,为了向U提供IV项,使U能够验证其数据的完整性,大多数现有方案对D施加了非恒定量的计算工作t(n)(通常是n的对数);我们称h(n)为此类IV项的数量。文献中发现的h(n)值是非恒定的,也就是说,它们实际上依赖于数据项的数量。本文的主要贡献在于,当n个数据项被组织成树形层次t时,实现了线性s(n),常数h(n)和常数或对数t(n),并且n'项的用户子集形成一个子树t '。考虑T'的情况是,当T' (i)根位于节点v,且深度小于v;(ii)从v在T上上下跳k可达。
{"title":"Efficient Distributed Third-Party Data Authentication for Tree Hierarchies","authors":"Hao Yuan, M. Atallah","doi":"10.1109/ICDCS.2008.53","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.53","url":null,"abstract":"In the third-party model for the distribution of data, the trusted data creator or owner provides an untrusted distributor D with integrity verification (IV) items that are stored at D in addition to the n data items. When a user U has a subset of n' of those n data items and needs to verify their integrity, U is provided by D with a number of IV items that U uses to verify its data's integrity. The model forbids U from receiving any information about the n-n' data items that the user is not authorized to access, and assumes that D has no signature authority (it stores only pre-signed IVs). Most of the published work in this area uses the Merkle tree or variants thereof, and typically requires D to store a linear or close to linear (in n) number s(n) of IV items that are pre-signed by the trusted authority. Moreover, most of the existing schemes impose on D a non-constant amount of computation work t(n) (typically logarithmic in n) in order to provide U with the IV items that enable U to verify the integrity of its data; we call h(n) the number of such IV items. The h(n) values found in the literature are non-constant, i.e., they actually do depend on the number of data items. The main contribution of this paper is to achieve linear s(n), constant h(n) and constant or logarithmic t(n) when the n data items are organized in a tree hierarchy T, and the user's subset of n' items form a subtree T'. The cases of T' considered are when T' is (i) rooted at a node v and of depth k below v; and (ii) reachable in k hops from v going both up and down in T.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Group Based Detection for Sparse Sensor Networks 稀疏传感器网络中基于组的检测性能分析
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.30
Jingbin Zhang, Gang Zhou, S. Son, J. Stankovic, K. Whitehouse
In this paper, we analyze the performance of group based detection in sparse sensor networks, when the system level detection decision is made based on the detection reports generated from multiple sensing periods. Sparse deployment is essential for reducing cost of large scale sensor networks, which cover thousands of square miles. In a sparse deployment, the sensor field is only partially covered by sensorspsila sensing ranges, resulting in void sensing areas in the region, but all nodes are connected through multi-hop networking. Further, due to the unavoidable false alarms generated by a single sensor in a network, many deployed systems use group based detection to reduce system level false alarms. Despite the popularity of group based detection, few analysis works in the literature deal with group based detection. In this paper, we propose a novel approach called Markov chain based Spatial approach (MS-approach) to model group based detection in sensor networks. The M-S-approach successfully overcomes the complicated conditional detection probability of a target in each sensing period, and reduces the execution time of the analysis from many days to 1 minute. The analytical model is validated through extensive simulations. This analytical work is important because it provides an easy way to understand the performance of a system that uses group based detection without running countless simulations or deploying real systems.
本文分析了稀疏传感器网络中基于多个感知周期生成的检测报告进行系统级检测决策时基于群体的检测性能。稀疏部署对于降低覆盖数千平方英里的大规模传感器网络的成本至关重要。在稀疏部署中,传感器场仅部分被传感器感知范围覆盖,导致该区域存在空白感知区域,但所有节点都通过多跳网络连接。此外,由于网络中单个传感器不可避免地会产生虚警,因此许多已部署的系统使用基于组的检测来减少系统级虚警。尽管基于群体的检测很受欢迎,但文献中很少有分析工作涉及基于群体的检测。在本文中,我们提出了一种新的方法,称为基于马尔可夫链的空间方法(ms方法)来模拟传感器网络中基于组的检测。m - s方法成功地克服了目标在每个感知周期内复杂的条件检测概率,将分析的执行时间从许多天缩短到1分钟。通过大量的仿真验证了分析模型的正确性。这种分析工作很重要,因为它提供了一种简单的方法来了解使用基于组的检测系统的性能,而无需运行无数的模拟或部署真实的系统。
{"title":"Performance Analysis of Group Based Detection for Sparse Sensor Networks","authors":"Jingbin Zhang, Gang Zhou, S. Son, J. Stankovic, K. Whitehouse","doi":"10.1109/ICDCS.2008.30","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.30","url":null,"abstract":"In this paper, we analyze the performance of group based detection in sparse sensor networks, when the system level detection decision is made based on the detection reports generated from multiple sensing periods. Sparse deployment is essential for reducing cost of large scale sensor networks, which cover thousands of square miles. In a sparse deployment, the sensor field is only partially covered by sensorspsila sensing ranges, resulting in void sensing areas in the region, but all nodes are connected through multi-hop networking. Further, due to the unavoidable false alarms generated by a single sensor in a network, many deployed systems use group based detection to reduce system level false alarms. Despite the popularity of group based detection, few analysis works in the literature deal with group based detection. In this paper, we propose a novel approach called Markov chain based Spatial approach (MS-approach) to model group based detection in sensor networks. The M-S-approach successfully overcomes the complicated conditional detection probability of a target in each sensing period, and reduces the execution time of the analysis from many days to 1 minute. The analytical model is validated through extensive simulations. This analytical work is important because it provides an easy way to understand the performance of a system that uses group based detection without running countless simulations or deploying real systems.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134207744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The SCREAM Approach for Efficient Distributed Scheduling with Physical Interference in Wireless Mesh Networks 无线网状网络中具有物理干扰的高效分布式调度的尖叫方法
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.104
Gurashish Singh Brar, D. Blough, P. Santi
It is known that CSMA/CA channel access schemes are not well suited to meet the high traffic demand of wireless mesh networks. One possible way to increase traffic carrying capacity is to use a spatial TDMA (STDMA) approach in conjunction with the physical interference model, which allows more aggressive scheduling than the protocol interference model on which CSMA/CA is based. While an efficient centralized solution for STDMA with physical interference has been recently proposed, no satisfactory distributed approaches have been introduced so far. In this paper, we first prove that no localized distributed algorithm can solve the problem of building a feasible schedule under the physical interference model. Motivated by this, we design a global primitive, called SCREAM, which is used to verify the feasibility of a schedule during an iterative distributed scheduling procedure. Based on this primitive, we present two distributed protocols for efficient, distributed scheduling under the physical interference model, and we prove an approximation bound for one of the protocols. We also present extensive packet-level simulation results, which show that our protocols achieve schedule lengths very close to those of the centralized algorithm and have running times that are practical for mesh networks.
目前,CSMA/CA信道接入方案已不能很好地满足无线网状网络的高流量需求。增加流量承载能力的一种可能方法是将空间TDMA (STDMA)方法与物理干扰模型结合使用,这种方法比CSMA/CA所基于的协议干扰模型允许更积极的调度。虽然最近提出了一种有效的具有物理干扰的STDMA集中解决方案,但迄今为止还没有引入令人满意的分布式方法。本文首先证明了在物理干扰模型下,没有一种局部分布式算法可以解决建立可行调度的问题。受此启发,我们设计了一个全局原语,称为SCREAM,用于在迭代分布式调度过程中验证调度的可行性。在此基础上,提出了物理干扰模型下的两种高效分布式调度协议,并证明了其中一种协议的近似界。我们还提供了广泛的数据包级仿真结果,表明我们的协议实现的调度长度非常接近集中式算法的调度长度,并且具有适用于网状网络的运行时间。
{"title":"The SCREAM Approach for Efficient Distributed Scheduling with Physical Interference in Wireless Mesh Networks","authors":"Gurashish Singh Brar, D. Blough, P. Santi","doi":"10.1109/ICDCS.2008.104","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.104","url":null,"abstract":"It is known that CSMA/CA channel access schemes are not well suited to meet the high traffic demand of wireless mesh networks. One possible way to increase traffic carrying capacity is to use a spatial TDMA (STDMA) approach in conjunction with the physical interference model, which allows more aggressive scheduling than the protocol interference model on which CSMA/CA is based. While an efficient centralized solution for STDMA with physical interference has been recently proposed, no satisfactory distributed approaches have been introduced so far. In this paper, we first prove that no localized distributed algorithm can solve the problem of building a feasible schedule under the physical interference model. Motivated by this, we design a global primitive, called SCREAM, which is used to verify the feasibility of a schedule during an iterative distributed scheduling procedure. Based on this primitive, we present two distributed protocols for efficient, distributed scheduling under the physical interference model, and we prove an approximation bound for one of the protocols. We also present extensive packet-level simulation results, which show that our protocols achieve schedule lengths very close to those of the centralized algorithm and have running times that are practical for mesh networks.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs 基于IEEE 802.11的无线局域网中空数据帧的安全漏洞研究
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.17
Wenjun Gu, Zhimin Yang, Can Que, D. Xuan, W. Jia
Null data frames are a special but important type of frames in IEEE 802.11 based wireless local area networks (e.g., 802.11 WLANs). They are widely used for power management, channel scanning and association keeping alive. The wide applications of null data frames come from their salient features such as lightweight frame format and implementation flexibility. However, such features can be taken advantage of by malicious attackers to launch a variety of attacks. In this paper, we identify the potential security vulnerabilities in the current applications of null data frames. We then study two types of attacks taking advantage of these vulnerabilities in detail, and evaluate their effectiveness based on extensive experiments. Finally, we point out that our work has broader impact in that similar vulnerabilities exist in many other networks.
在基于IEEE 802.11的无线局域网(如802.11 wlan)中,空数据帧是一种特殊但重要的帧类型。它们被广泛用于电源管理、通道扫描和关联保持。空数据帧的广泛应用来自于它们的显著特性,如轻量级帧格式和实现灵活性。然而,这些特性可以被恶意攻击者利用来发动各种攻击。在本文中,我们识别了当前应用中null数据帧的潜在安全漏洞。然后,我们详细研究了利用这些漏洞的两种类型的攻击,并基于大量的实验评估了它们的有效性。最后,我们指出,我们的工作具有更广泛的影响,因为类似的漏洞存在于许多其他网络中。
{"title":"On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs","authors":"Wenjun Gu, Zhimin Yang, Can Que, D. Xuan, W. Jia","doi":"10.1109/ICDCS.2008.17","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.17","url":null,"abstract":"Null data frames are a special but important type of frames in IEEE 802.11 based wireless local area networks (e.g., 802.11 WLANs). They are widely used for power management, channel scanning and association keeping alive. The wide applications of null data frames come from their salient features such as lightweight frame format and implementation flexibility. However, such features can be taken advantage of by malicious attackers to launch a variety of attacks. In this paper, we identify the potential security vulnerabilities in the current applications of null data frames. We then study two types of attacks taking advantage of these vulnerabilities in detail, and evaluate their effectiveness based on extensive experiments. Finally, we point out that our work has broader impact in that similar vulnerabilities exist in many other networks.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection 绕过服务器瓶颈:间接大规模P2P数据收集
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.74
Di Niu, Baochun Li
In most large-scale peer-to-peer (P2P) applications, it is necessary to collect vital statistics data - sometimes referred to as logs - from up to millions of peers. Traditional solutions involve sending large volumes of such data to centralized logging servers, which are not scalable. In addition, they may not be able to retrieve statistics data from departed peers in dynamic peer-to-peer systems. In this paper, we solve this dilemma through an indirect collection mechanism that distributes data using random network coding across the network, from which servers proactively pull such statistics. By buffering data in a decentralized fashion with only a small portion of peer resources, we show that our new mechanism provides a "buffering" zone and a "smoothing" factor to collect large volumes of statistics, with appropriate resilience to peer dynamics and scalability to a large peer population.
在大多数大规模点对点(P2P)应用程序中,有必要从多达数百万个点收集重要统计数据(有时称为日志)。传统的解决方案涉及将大量此类数据发送到集中式日志服务器,这是不可扩展的。此外,它们可能无法从动态对等系统中离开的对等节点检索统计数据。在本文中,我们通过一种间接收集机制解决了这一困境,该机制使用随机网络编码在网络上分发数据,服务器主动从中提取此类统计数据。通过仅使用一小部分对等资源以分散的方式缓冲数据,我们表明,我们的新机制提供了一个“缓冲”区域和一个“平滑”因子来收集大量统计数据,并具有适当的对等动态弹性和对大量对等人口的可扩展性。
{"title":"Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection","authors":"Di Niu, Baochun Li","doi":"10.1109/ICDCS.2008.74","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.74","url":null,"abstract":"In most large-scale peer-to-peer (P2P) applications, it is necessary to collect vital statistics data - sometimes referred to as logs - from up to millions of peers. Traditional solutions involve sending large volumes of such data to centralized logging servers, which are not scalable. In addition, they may not be able to retrieve statistics data from departed peers in dynamic peer-to-peer systems. In this paper, we solve this dilemma through an indirect collection mechanism that distributes data using random network coding across the network, from which servers proactively pull such statistics. By buffering data in a decentralized fashion with only a small portion of peer resources, we show that our new mechanism provides a \"buffering\" zone and a \"smoothing\" factor to collect large volumes of statistics, with appropriate resilience to peer dynamics and scalability to a large peer population.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MR-PDP: Multiple-Replica Provable Data Possession MR-PDP:多副本可证明的数据占有
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.68
Reza Curtmola, O. Khan, R. Burns, G. Ateniese
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system (Ateniese et al., 2007). Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.
许多存储系统依靠复制来提高不可信存储系统上数据的可用性和持久性。目前,这样的存储系统并没有提供强有力的证据证明实际上存储了数据的多个副本。存储服务器可以相互勾结,使其看起来像是在存储数据的多个副本,而实际上它们只存储一个副本。我们通过多副本可证明的数据占有(MR-PDP)解决了这个缺点:一个可证明的安全方案,允许在存储系统中存储文件的t个副本的客户端通过挑战-响应协议验证:(1)每个唯一副本可以在挑战时产生,(2)存储系统使用t倍存储单个副本所需的存储空间。MR-PDP扩展了以前在客户端/服务器存储系统中文件的单个副本的数据占有证明方面的工作(Ateniese et al., 2007)。使用MR-PDP存储t个副本比使用单副本PDP方案存储t个独立的、不相关的文件(例如,在存储每个文件之前分别加密)在计算上要高效得多。MR-PDP的另一个优点是,当一些现有的副本失败时,它可以按需生成更多的副本,而且花费很少。
{"title":"MR-PDP: Multiple-Replica Provable Data Possession","authors":"Reza Curtmola, O. Khan, R. Burns, G. Ateniese","doi":"10.1109/ICDCS.2008.68","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.68","url":null,"abstract":"Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they only store a single copy. We address this shortcoming through multiple-replica provable data possession (MR-PDP): A provably-secure scheme that allows a client that stores t replicas of a file in a storage system to verify through a challenge-response protocol that (1) each unique replica can be produced at the time of the challenge and that (2) the storage system uses t times the storage required to store a single replica. MR-PDP extends previous work on data possession proofs for a single copy of a file in a client/server storage system (Ateniese et al., 2007). Using MR-PDP to store t replicas is computationally much more efficient than using a single-replica PDP scheme to store t separate, unrelated files (e.g., by encrypting each file separately prior to storing it). Another advantage of MR-PDP is that it can generate further replicas on demand, at little expense, when some of the existing replicas fail.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 569
Energy and Timing Constrained System Reward Maximization on Wireless Networks 无线网络能量和时间约束下的系统奖励最大化
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.100
Jiayu Gong, Xiliang Zhong, Chengzhong Xu
Power efficiency is an important design issue in embedded devices with limited power supplies. In this paper, we study a reward-based packet scheduling problem in wireless environments. We consider a general scenario in which a transmitter communicates with multiple receivers periodically. To guarantee timely transmission of data, each packet is associated with a delay constraint. The periodic data streams have different importance levels, power functions, and levels of data sizes. The more data a transmitter delivers, the more rewards it obtains. Our objective is to develop schemes that selectively transmit data streams of different data sizes at different transmission rates to maximize the system reward under given time and energy constraints. We show that this problem is NP-hard and develop a dynamic programming algorithm for the optimal solution in pseudo-polynomial time. A fast polynomial-time heuristic approach is presented to achieve close approximation. Simulation results demonstrate that the proposed heuristic approach can achieve a significant improvement over other approaches adapted from existing studies at a small runtime overhead.
在电源有限的嵌入式设备中,电源效率是一个重要的设计问题。本文研究了无线环境下基于奖励的分组调度问题。我们考虑一个一般的场景,其中一个发射器周期性地与多个接收器通信。为了保证数据的及时传输,每个数据包都有一个延迟约束。周期数据流具有不同的重要级别、幂函数和数据大小级别。发射器传送的数据越多,获得的奖励就越多。我们的目标是开发方案,以不同的传输速率有选择地传输不同数据大小的数据流,以在给定的时间和能量限制下最大化系统奖励。我们证明了这个问题是np困难的,并开发了一个在伪多项式时间内求解最优解的动态规划算法。提出了一种快速的多项式时间启发式逼近方法。仿真结果表明,所提出的启发式方法在较小的运行时开销下,比现有研究中采用的其他方法取得了显著的改进。
{"title":"Energy and Timing Constrained System Reward Maximization on Wireless Networks","authors":"Jiayu Gong, Xiliang Zhong, Chengzhong Xu","doi":"10.1109/ICDCS.2008.100","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.100","url":null,"abstract":"Power efficiency is an important design issue in embedded devices with limited power supplies. In this paper, we study a reward-based packet scheduling problem in wireless environments. We consider a general scenario in which a transmitter communicates with multiple receivers periodically. To guarantee timely transmission of data, each packet is associated with a delay constraint. The periodic data streams have different importance levels, power functions, and levels of data sizes. The more data a transmitter delivers, the more rewards it obtains. Our objective is to develop schemes that selectively transmit data streams of different data sizes at different transmission rates to maximize the system reward under given time and energy constraints. We show that this problem is NP-hard and develop a dynamic programming algorithm for the optimal solution in pseudo-polynomial time. A fast polynomial-time heuristic approach is presented to achieve close approximation. Simulation results demonstrate that the proposed heuristic approach can achieve a significant improvement over other approaches adapted from existing studies at a small runtime overhead.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122411704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications 基于启发式的解决普适计算应用中上下文不一致的策略
Pub Date : 2008-06-17 DOI: 10.1109/ICDCS.2008.46
Chang Xu, S. Cheung, W. Chan, Chunyang Ye
Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments, are often error-prone and inconsistent due to noises. Various strategies have been proposed to enable automatic context inconsistency resolution. They are formulated on different assumptions that may not hold in practice. This causes applications to be less context-aware to different extents. In this paper, we investigate such impacts and propose our new resolution strategy. We conducted experiments to compare our work with major existing strategies. The results showed that our strategy is both effective in resolving context inconsistencies and promising in its support of applications using contexts.
上下文感知允许普及应用程序适应多变的计算环境。上下文是指捕捉环境特征的信息片段,由于噪声的影响,上下文常常容易出错且不一致。已经提出了各种策略来实现上下文不一致的自动解决。它们是根据不同的假设制定的,这些假设在实践中可能站不住脚。这导致应用程序在不同程度上缺乏上下文感知能力。本文对这些影响进行了研究,并提出了新的解决策略。我们进行了实验,将我们的工作与现有的主要战略进行比较。结果表明,我们的策略在解决上下文不一致方面是有效的,并且在支持使用上下文的应用方面是有希望的。
{"title":"Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications","authors":"Chang Xu, S. Cheung, W. Chan, Chunyang Ye","doi":"10.1109/ICDCS.2008.46","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.46","url":null,"abstract":"Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments, are often error-prone and inconsistent due to noises. Various strategies have been proposed to enable automatic context inconsistency resolution. They are formulated on different assumptions that may not hold in practice. This causes applications to be less context-aware to different extents. In this paper, we investigate such impacts and propose our new resolution strategy. We conducted experiments to compare our work with major existing strategies. The results showed that our strategy is both effective in resolving context inconsistencies and promising in its support of applications using contexts.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
期刊
2008 The 28th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1