首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things 用于物联网的轻量级无证书且可证明安全的签名密码系统
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.408
Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius
In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.
在物联网背景下,我们提出了一种基于标准化签名KCDSA (Korean Certificate-based Digital signature Algorithm)的椭圆曲线签名加密方案。我们的解决方案有几个优点。首先,证明了该方案在随机oracle模型下的安全性。其次,它提供了以下安全属性:外部/内部的机密性和不可伪造性,不可否认性和公共可验证性,同时在通信和计算成本方面效率很高。第三,该方案提供了无证书特性,因此不需要证书来验证用户的公钥。为了说明这一点,我们基于传感器Wismote平台进行了实验评估,并将所提出的方案与并发方案的性能进行了比较。我们希望这些实验结果在更大程度上对通常倾向于使用实际性能数据的科学界有所帮助。
{"title":"Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things","authors":"Kim Thuat Nguyen, Nouha Oualha, M. Laurent-Maknavicius","doi":"10.1109/Trustcom.2015.408","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.408","url":null,"abstract":"In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability, non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes. We wish these experimental results be helpful at a larger extent to the scientific community usually prone to work with realistic performance figures.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management 安全即服务配置与网络保险管理的联合优化方法
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.403
Sivadon Chaisiri, R. Ko, D. Niyato
Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.
安全即服务(SECaaS)是一种基于云的按使用付费服务,它通过云提供信息安全措施,越来越多的公司使用这种服务来维护其系统的安全状态。客户通常必须根据产生的潜在订阅成本来提供这些SECaaS服务。然而,这些安全服务无法处理所有可能类型的威胁。单个威胁(例如恶意内部人员)可能导致宝贵数据和收入的损失。因此,企业(即云客户)通过购买网络保险来管理风险,以支付因不可预见的损失而产生的成本和责任,这也是很常见的。服务分配成本和保险之间的平衡通常是需要的,但没有得到很好的研究。在本文中,我们提出了一个优化的SECaaS配置框架,使客户能够从SECaaS提供商那里优化分配安全服务到他们的应用程序,同时通过购买网络保险政策来管理信息安全漏洞的风险。通过求解一个具有三阶段追索权的随机规划优化模型,得到了安全服务分配和保险管理的合理平衡点。通过仿真对该优化模型进行了验证。我们将我们的模型暴露给几个不确定的信息参数,结果是有希望的——展示了一种有效的方法来平衡客户的安全需求,同时保持低服务订阅和保险单成本。
{"title":"A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management","authors":"Sivadon Chaisiri, R. Ko, D. Niyato","doi":"10.1109/Trustcom.2015.403","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.403","url":null,"abstract":"Security-as-a-Service (SECaaS), pay-per-use cloud-based services that provides information security measures via the cloud, are increasingly used by corporations to maintain their systems' security posture. Customers often have to provision these SECaaS services based on the potential subscription costs incurred. However, these security services are unable to deal with all possible types of threats. A single threat (e.g. malicious insiders) can result in the loss of valuable data and revenue. Hence, it is also common to see corporations (i.e. cloud customers) manage their risks by purchasing cyber insurance to cover costs and liabilities due to unforeseen losses. A balance between service allocation cost and insurance is often required but not well studied. In this paper, we propose an optimized SECaaS provisioning framework that enables customers to optimally allocate security services from SECaaS providers to their applications, while managing risks from information security breaches via purchasing cyber insurance policies. Finding the right balance is a great challenge, and the solutions of the security service allocation and insurance management are obtained through solving an optimization model derived from stochastic programming with a three-stage recourse. Simulations were conducted to evaluate this optimization model. We exposed our model to several uncertain information parameters and the results are promising -- demonstrating an effective approach to balance customers' security requirements while keeping service subscription and insurance policy costs low.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127896488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis 利用模糊混合多标准分析法衡量电子商务系统的可信度
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.433
Zhengping Wu, Lifeng Wang
Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.
相互信任一直是用户之间开展业务的最重要因素。但整个系统的可信度才是用户首先选择某一电子商务平台的保证。作为电子商务系统的一个难以观测的属性,整体可信度的测量受到量化、准确性和可靠性的阻碍。本文提出了一种模糊混合多标准分析方法来衡量电子商务系统的可信度。本文收集并归纳了电子商务系统中涉及的信任因素。然后,使用定制的模糊成员函数对这些因素进行量化,并将其置于指定的信任空间中。根据各种信任因素和备选方案的性质,采用多标准分析法。在对所有相关因素进行筛选、分类和量化后,拟议的多标准分析方法将处理所有信任因素,并从不同角度分析其特征。为了精确处理所提出的信任度测量,还采用了特征分类、成员函数调整、标准函数和优先投票函数调整等方法。最后,结合模糊量化因素和多标准分析,可以揭示电子商务系统所有方面的可信度。实验结果表明,所提出的测量方法能够准确有效地对电子商务系统的可信度进行评估和排序。
{"title":"Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria Analysis","authors":"Zhengping Wu, Lifeng Wang","doi":"10.1109/Trustcom.2015.433","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.433","url":null,"abstract":"Mutual trust has been the most important factor for users to do business with each other. But the trustworthiness of an entire system provides assurance for users to choose a particular e-commerce platform at the first place. As a difficult-to-observe property of an e-commerce system, the measurement of overall trustworthiness is obstructed by quantification, accuracy and reliability. This paper proposes a fuzzy hybrid multi-criteria analysis approach to measure the trustworthiness of e-commerce systems. Trust factors involved in e-commerce systems are collected and grouped. Then, these factors are quantified and placed in a designated trust space using customized fuzzy membership functions. Based on the nature of various trust factors and alternatives, multi-criteria analysis is applied. After all relevant factors are filtered, categorized and quantified, the proposed multi-criteria analysis method will process all trust factors and analyze their features from different perspectives. To precisely process the proposed trustworthiness measurements, feature categorization, membership function adjustment, criteria function and priority voting function adaptation are also used. Finally, a combination of fuzzy quantified factors and multi-criteria analysis can expose the credibility of all e-commerce system aspects. Experiment results show that the proposed measurements can evaluate and rank e-commerce system trustworthiness accurately and effectively.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129189508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Hybrid Mobile Authentication Model for Ubiquitous Networking 面向泛在网络的混合移动认证模型
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.395
A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid
The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.
移动设备和无线技术(如蜂窝、Wi-Fi)的发展促进了移动服务的增长。由于移动用户通常是移动的,因此部署漫游服务是为了让用户不受其家庭网络的地理覆盖范围的限制而访问外国网络服务。已经提出了几种解决方案,以允许无处不在的移动接入认证;但是,这些方法仍然存在局限性,例如性能问题和安全漏洞。本文提出了一种新的混合移动认证模型,并通过合适的协议来实现,该协议结合了分布式和集中式模型的优点。拟议中的Passport和Visa令牌有助于外国网络对来访的移动用户进行身份验证和授权。这些令牌还为实现安全和有效的密钥管理提供了独特的解决方案。最重要的是,提出的解决方案提供了一种有效的技术,使用最近的证据(Passport Stamp)来处理用户撤销状态检查的问题。安全性和性能分析表明,该协议有效地保证了漫游的安全性,大大提高了计算速度,降低了通信成本。
{"title":"A Hybrid Mobile Authentication Model for Ubiquitous Networking","authors":"A. Almuhaideb, B. Srinivasan, P. D. Le, Mohammed A. Alhabeeb, Waleed M. Alfehaid","doi":"10.1109/Trustcom.2015.395","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.395","url":null,"abstract":"The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Key Management for Multi-privileged Group Communications 多特权群通信密钥管理研究
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.369
Wei Zhou, Yang Xu, Guojun Wang
In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.
在一些面向组的应用中,用户可以根据自己的意愿访问多个数据资源。因此,如何有效地访问数据资源是多特权组通信中的一个挑战。提出了几种分级访问控制的密钥管理方案。在本文中,我们讨论了密钥管理的挑战。在此基础上,提出了多特权组通信安全密钥管理的评价标准,并研究了几种典型方案的特点。根据密钥模型的拓扑结构、密钥更新方法、密钥更新策略和数据资源的加密方法等不同的维度,可以将这些方案分为几类。从密钥资料的安全分发和更新两个方面进行了比较分析。
{"title":"Research on Key Management for Multi-privileged Group Communications","authors":"Wei Zhou, Yang Xu, Guojun Wang","doi":"10.1109/Trustcom.2015.369","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.369","url":null,"abstract":"In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users 一种基于云的基于属性保护隐私的凭据用户移动性模型
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.470
Ahmad Sabouri
Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.
部署完整的保护隐私的基于属性的凭证生态系统需要相关实体在其域上使用和操作一些软件/硬件包。这也适用于Privacy-ABC用户,因为他们需要运行用户代理(User Agent),该代理代表他们进行操作,并在对服务提供者进行身份验证时在本地执行一些计算。如果用户希望使用多个工作站,目前除了在每个设备上安装user Agent之外,没有其他解决方案。这给它们的流动性带来了障碍,并造成了不便,这可能对此类技术的采用产生负面影响。在本文中,我们的目标是软件即服务方法,并建议一种消除上述障碍的免安装架构。
{"title":"A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users","authors":"Ahmad Sabouri","doi":"10.1109/Trustcom.2015.470","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.470","url":null,"abstract":"Deploying the full ecosystem of Privacy-preserving Attribute-based Credentials requires the involved entities to employ and operate some software/hardware packages on their domains. This also holds for the Privacy-ABC users, as they need to run a User Agent, which acts on their behalf and performs some computations locally when authenticating towards Service Providers. If the user wishes to use multiple workstations, currently there is no solution other than installing the User Agent on every device. This introduces barriers to their mobility and causes inconvenience, which can negatively influence adoption of such technologies. In this paper, we aim at a Software-as-a-Service approach and suggest an install-free architecture that lifts the aforementioned barriers.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of IEEE 802.15.6 Association Protocols IEEE 802.15.6关联协议研究
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.456
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan
A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.
人体区域网络是由人体周围的小型便携式设备组成的网络。它可以实现许多有趣的应用,包括老年保健和慢性病监测。由于身体区域网络用于收集敏感信息,因此需要适当的安全保护。IEEE标准802.15.6是体域网络的标准,它还提供了强大的安全性机制。本文对标准中提出的安全关联协议进行了综述。首先,发现了几个安全漏洞。此外,我们还从性能和可用性的角度得到了一些有趣的发现。
{"title":"A Study of IEEE 802.15.6 Association Protocols","authors":"Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan","doi":"10.1109/Trustcom.2015.456","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.456","url":null,"abstract":"A body area network is a network of small and portable devices around human bodies. It enables a number of interesting applications including elderly healthcare and chronic diseases monitoring. Since body area networks are used to collect sensitive information, they require proper security protections. IEEE Std 802.15.6 is a standard for body area networks, it also provides mechanisms for strong security. In this paper, security association protocols proposed in the standard are reviewed. First of all, several security flaws are found. In addition, we also get some interesting findings from the standpoint of performance and usability.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provision of Disk I/O Guarantee for MapReduce Applications 为MapReduce应用提供磁盘I/O保证
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.576
X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter
YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.
YARN是Hadoop生态系统中一个新兴的资源管理系统,它可以使用现成的商用服务器来处理每天pb级的大数据。目前YARN只支持RAM和CPU预留/控制。然而,预留和控制磁盘I/O吞吐量也需要为MapReduce应用程序提供满意的性能。在本文中,我们提出了一个可以集成到YARN中的软件组件的解决方案,以支持YARN中磁盘I/O吞吐量的保留。实验表明,该方案可以为MapReduce应用程序提供磁盘I/O吞吐量保证。
{"title":"Provision of Disk I/O Guarantee for MapReduce Applications","authors":"X. T. Tran, T. V. Do, Nam H. Do, L. Farkas, C. Rotter","doi":"10.1109/Trustcom.2015.576","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.576","url":null,"abstract":"YARN is an emerging resource management in the Hadoop ecosystem, where big data in the scale of petabytes/day are processed with the use of commercial off-the-shelf servers. At present YARN supports only RAM and CPU reservation/control. However, the reservation and the control of disk I/O throughput are also needed to provide a satisfactory performance for MapReduce applications. In this paper, we propose a solution with software components that can be integrated into YARN to support the reservation of disk I/O throughput in YARN. Experiments show that a proposed solution can provide a disk I/O throughput guarantee for MapReduce applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning 基于概率模型的大规模网络学习中视频观看行为的幂律分布
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.572
Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong
In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.
在互联网时代,e-Learning已经广泛普及,并产生了大量的视频观看行为日志数据。通过对这些日志数据的分析和挖掘,观察到不同于小规模e-Learning或传统课堂环境的显著的观看行为幂律分布(PLD)。在本文中,我们将pld的生成机制应用于分析大型电子学习平台的日志数据,以发现影响视频观看行为的因素。首先,从日志数据中发现与视频观看行为相关的四个因素,包括观看视频的数量、观看视频的开始日期、期末考试日期和入学时间。在此基础上,提出了基于这四个因素的观看行为概率模型。最后,用9门在线课程验证了模型的准确性,每门课程都招收了1000多名学生。此外,本文还对模型的应用进行了分析,并为教师提高学生成绩提供了一些有价值的建议。
{"title":"Probabilistic Modeling Towards Understanding the Power Law Distribution of Video Viewing Behavior in Large-Scale e-Learning","authors":"Ni Xue, Huan He, Jun Liu, Q. Zheng, Tian Ma, Jianfei Ruan, B. Dong","doi":"10.1109/Trustcom.2015.572","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.572","url":null,"abstract":"In the era of internet, e-Learning has become vastly widespread and generated huge amount of log data of video viewing behavior. Through analyzing and mining these log data, significant Power Law Distribution (PLD) of viewing behavior is observed, which is different from small-scale e-Learning or traditional classroom environment. In this paper, we apply the mechanisms for generating the PLDs in analyzing log data of a large-scale e-Learning platform to discover the factors influencing the video viewing behavior. Firstly, four factors correlated to the video viewing behavior are discovered from log data, including the number of videos viewed, the start date of viewing videos, the date of final exam, and the duration of enrollment. Furthermore, we present a probabilistic model of viewing behavior based on the four factors. Finally, the accuracy of the model is validated with nine online courses in which each course enrolled more than 1,000 students. In addition, we analyze the application of the proposed model and provide some valuable suggestions for teachers to improve the performance of students.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"152 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-physical Design of Data Centers Cooling Systems Automation 数据中心冷却系统自动化的信息物理设计
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.641
A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang
Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.
现代数据中心在许多方面类似于工业工厂,通过消耗大量能源产生大量热量,并且需要强大的冷却和通风。冷却系统的能耗占数据中心总能耗的30% ~ 50%。解决此类冷却系统能源效率的有效方法是应用先进的自动化解决方案,类似于工业和楼宇自动化系统。然而,现有的自动化解决方案不够灵活,无法满足现代数据中心冷却系统的要求。本文试图利用分布式自适应自动化架构来提高制冷系统的能效。所提出的自动化算法在模拟服务器机房热行为的仿真环境中得到验证,并有助于找到最节能的控制策略来控制冷却设备。本文介绍了由MATLAB/SIMULINK中的热行为建模与IEC 61499标准的分布式控制环境闭环连接组成的仿真工具。本文描述了在一定约束条件下使用所提出的工具对典型服务器机房进行的仿真,并给出了仿真结果。结果表明,在控制冷却系统方面,提高能源效率、灵活性和更好的决策能力是有潜力的。
{"title":"Cyber-physical Design of Data Centers Cooling Systems Automation","authors":"A. Mousavi, V. Vyatkin, Y. Berezovskaya, Xiaojing Zhang","doi":"10.1109/Trustcom.2015.641","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.641","url":null,"abstract":"Modern data centers in many aspects are akin to industrial plants that generate a lot of heat by consuming substantial amount of energy and require powerful cooling and ventilation. Cooling system contributes with 30 to 50% of the total energy consumption of data centers. An effective way to address energy efficiency in such cooling systems is to apply advanced automation solutions, similar to that of industrial and building automation systems. However, existing automation solutions are not flexible enough to meet requirements of cooling systems in modern data centres. This paper is an endeavour to utilize distributed adaptive automation architecture in order to improve energy efficiency of cooling. The proposed automation algorithms are validated in a simulation environment which models the thermal behaviour of a server room and helps to find the most energy efficient control strategy for controlling the cooling devices. This paper describes the simulation tool comprising of thermal behaviour modelling in MATLAB/SIMULINK connected in closed-loop with the distributed control environment of IEC 61499 standard. Simulation of a typical server room under certain constraints using the proposed tool is described and the results are presented. The results demonstrate the potential of improving higher energy efficiency, flexibility and better decision-making ability for controlling the cooling systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1