首页 > 最新文献

EW 11最新文献

英文 中文
Trust but verify: accountability for network services 信任但要验证:网络服务的责任
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133585
Aydan R. Yumerefendi, J. Chase
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic security properties of authentication, privacy, and integrity. These accountability properties reduce the vulnerability of network services to subversion, tampering, corruption, and abuse. For example, actions taken in accountable systems and their clients are provable or even legally binding, to support contractual relationships in federated systems.We propose a framework for accountable network services, and explore its applicability and limitations. The foundation of our approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions and behavior, and prove responsibility for unexpected states or actions. We outline the key challenges in generalizing the principles and methodology of accountable design for practical use.
本文提倡将责任作为可靠网络系统的中心设计目标。我们为负责任的系统定义了三个属性,它们扩展了身份验证、隐私和完整性等基本安全属性。这些可问责性属性减少了网络服务遭受颠覆、篡改、损坏和滥用的脆弱性。例如,在负责任的系统及其客户中采取的行动是可证明的,甚至具有法律约束力,以支持联邦系统中的合同关系。我们提出了一个负责任的网络服务框架,并探讨了其适用性和局限性。我们方法的基础是保存每个服务的操作和/或内部状态快照的数字签名记录,并使用它们来检测篡改,验证操作和行为的一致性,并证明对意外状态或操作的责任。我们概述了推广负责任设计的原则和方法以供实际使用的主要挑战。
{"title":"Trust but verify: accountability for network services","authors":"Aydan R. Yumerefendi, J. Chase","doi":"10.1145/1133572.1133585","DOIUrl":"https://doi.org/10.1145/1133572.1133585","url":null,"abstract":"This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic security properties of authentication, privacy, and integrity. These accountability properties reduce the vulnerability of network services to subversion, tampering, corruption, and abuse. For example, actions taken in accountable systems and their clients are provable or even legally binding, to support contractual relationships in federated systems.We propose a framework for accountable network services, and explore its applicability and limitations. The foundation of our approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions and behavior, and prove responsibility for unexpected states or actions. We outline the key challenges in generalizing the principles and methodology of accountable design for practical use.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121115263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Separating durability and availability in self-managed storage 在自管理存储中分离持久性和可用性
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133576
Geoffrey Lefebvre, M. Feeley
Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the trade-offs associated with ensuring data availability in such systems. Reliability, however, is more than just availability. In fact, the durability of data is typically of more paramount concern. While users are likely to tolerate occasional disconnection from their data (they will likely have no choice in the matter), they demand a much stronger guarantee that their data is never permanently lost due to failure. To deliver strong durability guarantees efficiently, however, requires decoupling durability from availability. This paper describes the design of a data redundancy scheme that guarantees durability independently from availability. We provide a formula for determining the rate of redundancy repair when durability is the only concern and show that availability requires much more frequent repair. We simulate modified versions of the Total Recall block store that incorporate our design. Our results show that we can deliver durability more cheaply than availability, reducing network overhead by between 50% and 97%.
从不可靠的组件构建可靠的数据存储提出了许多挑战,这对于点对点存储系统来说尤其重要。最近的工作审查了与确保此类系统中的数据可用性有关的权衡。然而,可靠性不仅仅是可用性。实际上,数据的持久性通常是最重要的问题。虽然用户可能会容忍偶尔与他们的数据断开连接(他们在这件事上可能别无选择),但他们需要更强有力的保证,即他们的数据永远不会因故障而永久丢失。然而,为了有效地提供强大的持久性保证,需要将持久性与可用性解耦。本文描述了一种数据冗余方案的设计,该方案保证了持久性而不依赖于可用性。我们提供了一个公式,用于确定当耐久性是唯一关注的冗余修复率,并表明可用性需要更频繁的修复。我们模拟了包含我们设计的Total Recall块存储的修改版本。我们的结果表明,我们可以以比可用性更低的成本提供持久性,将网络开销减少50%到97%。
{"title":"Separating durability and availability in self-managed storage","authors":"Geoffrey Lefebvre, M. Feeley","doi":"10.1145/1133572.1133576","DOIUrl":"https://doi.org/10.1145/1133572.1133576","url":null,"abstract":"Building reliable data storage from unreliable components presents many challenges and is of particular interest for peer-to-peer storage systems. Recent work has examined the trade-offs associated with ensuring data availability in such systems. Reliability, however, is more than just availability. In fact, the durability of data is typically of more paramount concern. While users are likely to tolerate occasional disconnection from their data (they will likely have no choice in the matter), they demand a much stronger guarantee that their data is never permanently lost due to failure. To deliver strong durability guarantees efficiently, however, requires decoupling durability from availability. This paper describes the design of a data redundancy scheme that guarantees durability independently from availability. We provide a formula for determining the rate of redundancy repair when durability is the only concern and show that availability requires much more frequent repair. We simulate modified versions of the Total Recall block store that incorporate our design. Our results show that we can deliver durability more cheaply than availability, reducing network overhead by between 50% and 97%.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Scalable strong consistency for web applications 可伸缩的web应用程序的强一致性
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133581
S. Sivasubramanian, G. Pierre, M. Steen
Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the need for the next generation CDN architecture that does more than caching the results of Web applications but replicates both the application code and its underlying data. We propose the design of a system that guarantees strong consistency for Web applications with high scalability. The proposed system is based on partial replication, where data units are replicated only to servers that access them often. This reduces the consistency overhead as updates are sent to a reduced number of servers. The novelty of our system is that the proposed partial replication is performed by the system automatically by analyzing the system's access patterns periodically. We explore the design space of this system, find the key issues that need to be addressed to build it and propose solutions to solve them. We further show that the proposed algorithms offer significant performance gains compared to existing solutions for a wide range of Web access patterns.
Web应用程序工作负载的特点通常是有大量唯一的读请求和相当一部分写请求。托管这些应用程序推动了对下一代CDN体系结构的需求,该体系结构不仅可以缓存Web应用程序的结果,还可以复制应用程序代码及其底层数据。我们提出了一种保证Web应用程序具有高可伸缩性的强一致性的系统设计。所建议的系统基于部分复制,其中数据单元仅复制到经常访问它们的服务器。这降低了一致性开销,因为更新被发送到数量减少的服务器。本系统的新颖之处在于,通过周期性地分析系统的访问模式,系统可以自动执行所建议的部分复制。我们探索该系统的设计空间,找到构建该系统需要解决的关键问题,并提出解决这些问题的方案。我们进一步表明,与现有的各种Web访问模式的解决方案相比,所提出的算法提供了显著的性能提升。
{"title":"Scalable strong consistency for web applications","authors":"S. Sivasubramanian, G. Pierre, M. Steen","doi":"10.1145/1133572.1133581","DOIUrl":"https://doi.org/10.1145/1133572.1133581","url":null,"abstract":"Web application workloads are often characterized by a large number of unique read requests and a significant fraction of write requests. Hosting these applications drives the need for the next generation CDN architecture that does more than caching the results of Web applications but replicates both the application code and its underlying data. We propose the design of a system that guarantees strong consistency for Web applications with high scalability. The proposed system is based on partial replication, where data units are replicated only to servers that access them often. This reduces the consistency overhead as updates are sent to a reduced number of servers. The novelty of our system is that the proposed partial replication is performed by the system automatically by analyzing the system's access patterns periodically. We explore the design space of this system, find the key issues that need to be addressed to build it and propose solutions to solve them. We further show that the proposed algorithms offer significant performance gains compared to existing solutions for a wide range of Web access patterns.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EERAID: energy efficient redundant and inexpensive disk array EERAID:节能冗余且价格低廉的磁盘阵列
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133577
Dong Li, Jun Wang
Recent research works have been presented on conserving energy for multi-disk systems either at a single disk drive level or at a storage system level and thereby having certain limitations. This paper studies several new redundancy-based, power-aware, I/O request scheduling and cache management policies at the RAID controller level to build energy-efficient RAID systems, by exploiting the redundant information and destage issues of the array for two popular RAID levels, RAID 1 and RAID 5. For RAID 1, we develop a Windowed Round Robin (WRR) request scheduling policy; for RAID 5, we introduce a N-chance Power Aware cache replacement algorithm (NPA) for writes and a Power-Directed, Transformable (PDT) request scheduling policy for reads. Trace-driven simulation proves EERAID saves much more energy than legacy RAIDs and existing solutions.
近年来在单磁盘驱动器或存储系统级别上对多磁盘系统节能的研究工作都有一定的局限性。本文针对目前流行的RAID 1和RAID 5两种RAID级别的冗余信息和损坏问题,在RAID控制器级别研究了几种新的基于冗余、功率感知、I/O请求调度和缓存管理策略,以构建节能的RAID系统。对于RAID 1,我们开发了一个窗口轮询(WRR)请求调度策略;对于RAID 5,我们为写引入了n次功率感知缓存替换算法(NPA),为读引入了功率定向、可转换(PDT)请求调度策略。跟踪驱动的仿真证明EERAID比传统的raid和现有的解决方案节省了更多的能量。
{"title":"EERAID: energy efficient redundant and inexpensive disk array","authors":"Dong Li, Jun Wang","doi":"10.1145/1133572.1133577","DOIUrl":"https://doi.org/10.1145/1133572.1133577","url":null,"abstract":"Recent research works have been presented on conserving energy for multi-disk systems either at a single disk drive level or at a storage system level and thereby having certain limitations. This paper studies several new redundancy-based, power-aware, I/O request scheduling and cache management policies at the RAID controller level to build energy-efficient RAID systems, by exploiting the redundant information and destage issues of the array for two popular RAID levels, RAID 1 and RAID 5. For RAID 1, we develop a Windowed Round Robin (WRR) request scheduling policy; for RAID 5, we introduce a N-chance Power Aware cache replacement algorithm (NPA) for writes and a Power-Directed, Transformable (PDT) request scheduling policy for reads. Trace-driven simulation proves EERAID saves much more energy than legacy RAIDs and existing solutions.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Energy-efficient cluster-based service discovery for Ubiquitous Computing 基于高效集群的普适计算服务发现
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133604
Gregor Schiele, C. Becker, K. Rothermel
Service discovery in Ubiquitous Computing is a task that has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires us to optimize frequent and energy costly tasks, especially the ones incurring in communication activities. In this paper we present a novel service discovery algorithm based on node clustering. Nodes within a cluster may sleep to save energy when idle. A cluster head node is always active and answers discovery requests on behalf of other nodes to achieve low discovery latencies. Simulation experiments show energy savings of up to 66% compared to an approach where all nodes are permanently active while the discovery latencies were not increased.
由于环境的动态变化,普适计算中的服务发现是一项必须频繁完成的任务。移动设备有限的电池电量要求我们优化频繁、高能耗的任务,尤其是在通信活动中发生的任务。本文提出了一种新的基于节点聚类的服务发现算法。集群中的节点在空闲时可能会休眠以节省能量。集群头节点始终处于活动状态,并代表其他节点响应发现请求,以实现较低的发现延迟。仿真实验表明,与所有节点永久活动而不增加发现延迟的方法相比,节能高达66%。
{"title":"Energy-efficient cluster-based service discovery for Ubiquitous Computing","authors":"Gregor Schiele, C. Becker, K. Rothermel","doi":"10.1145/1133572.1133604","DOIUrl":"https://doi.org/10.1145/1133572.1133604","url":null,"abstract":"Service discovery in Ubiquitous Computing is a task that has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires us to optimize frequent and energy costly tasks, especially the ones incurring in communication activities. In this paper we present a novel service discovery algorithm based on node clustering. Nodes within a cluster may sleep to save energy when idle. A cluster head node is always active and answers discovery requests on behalf of other nodes to achieve low discovery latencies. Simulation experiments show energy savings of up to 66% compared to an approach where all nodes are permanently active while the discovery latencies were not increased.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
The lonely NATed node 孤独的NATed节点
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133584
Chad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S. Annexstein, K. Berman
In this paper we take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATed node. These are hosts that are behind Network Address Translation (NAT) gateways and are hidden by the fact that they have private IP addresses. We argue that Distributed-Hash Tables [20], P2P systems [6], and Grid Computing [10] could greatly benefit by tapping into this forgotten pool of resources. Also, we give an outline of a service, the Distributed-Hash Queue (DHQ), that can enable these NATed resources to be exploited.
在本文中,我们认为当前在分布式系统领域的研究几乎忘记了最大的Internet资源之一——NATed节点。这些主机位于网络地址转换(NAT)网关后面,由于它们具有私有IP地址而被隐藏起来。我们认为分布式哈希表[20]、P2P系统[6]和网格计算[10]可以通过利用这一被遗忘的资源池而受益匪浅。此外,我们还概述了一个服务,即分布式哈希队列(DHQ),它可以使这些NATed资源得到利用。
{"title":"The lonely NATed node","authors":"Chad Yoshikawa, Brent N. Chun, Amin Vahdat, Fred S. Annexstein, K. Berman","doi":"10.1145/1133572.1133584","DOIUrl":"https://doi.org/10.1145/1133572.1133584","url":null,"abstract":"In this paper we take the position that current research in the area of distributed systems has all but forgotten about one of the largest collective Internet resources - the NATed node. These are hosts that are behind Network Address Translation (NAT) gateways and are hidden by the fact that they have private IP addresses. We argue that Distributed-Hash Tables [20], P2P systems [6], and Grid Computing [10] could greatly benefit by tapping into this forgotten pool of resources. Also, we give an outline of a service, the Distributed-Hash Queue (DHQ), that can enable these NATed resources to be exploited.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115853826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructing component-based extension interfaces in legacy systems code 在遗留系统代码中构造基于组件的扩展接口
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133605
Gilles Muller, J. Lawall, Jean-Marc Menaud, Mario Südholt
Implementing an extension of a legacy operating system requires knowing what functionalities the extension should provide and how the extension should be integrated with the legacy code. To resolve the first problem, we propose that the use of a component model can make explicit the interface between an extension and legacy code. To resolve the second problem, we propose to augment interface specifications with rewrite rules that integrate support for extensions in the legacy code. We illustrate our approach using extensions that add new scheduling policies to Linux and prefetching to the Squid Web cache. In both cases a small number of rules are sufficient to describe modifications that apply across the implementation of a large legacy system.
实现遗留操作系统的扩展需要知道该扩展应该提供哪些功能,以及该扩展应该如何与遗留代码集成。为了解决第一个问题,我们建议使用组件模型来明确扩展和遗留代码之间的接口。为了解决第二个问题,我们建议用重写规则来增强接口规范,这些规则集成了对遗留代码中扩展的支持。我们使用扩展来说明我们的方法,这些扩展为Linux添加了新的调度策略,并对Squid Web缓存进行了预取。在这两种情况下,少量的规则就足以描述应用于大型遗留系统实现的修改。
{"title":"Constructing component-based extension interfaces in legacy systems code","authors":"Gilles Muller, J. Lawall, Jean-Marc Menaud, Mario Südholt","doi":"10.1145/1133572.1133605","DOIUrl":"https://doi.org/10.1145/1133572.1133605","url":null,"abstract":"Implementing an extension of a legacy operating system requires knowing what functionalities the extension should provide and how the extension should be integrated with the legacy code. To resolve the first problem, we propose that the use of a component model can make explicit the interface between an extension and legacy code. To resolve the second problem, we propose to augment interface specifications with rewrite rules that integrate support for extensions in the legacy code. We illustrate our approach using extensions that add new scheduling policies to Linux and prefetching to the Squid Web cache. In both cases a small number of rules are sufficient to describe modifications that apply across the implementation of a large legacy system.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Defending against eclipse attacks on overlay networks 防御覆盖网络上的日食攻击
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133613
Atul Singh, M. Castro, P. Druschel, A. Rowstron
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor nodes. These pointers are used both to maintain the overlay and to implement application functionality, for example, to locate content stored by overlay nodes. If an attacker controls a large fraction of the neighbors of correct nodes, it can "eclipse" correct nodes and prevent correct overlay operation. This Eclipse attack is more general than the Sybil attack. Attackers can use a Sybil attack to launch an Eclipse attack by inventing a large number of seemingly distinct overlay nodes. However, defenses against Sybil attacks do not prevent Eclipse attacks because attackers may manipulate the overlay maintenance algorithm to mount an Eclipse attack. This paper discusses the impact of the Eclipse attack on several types of overlay and it proposes a novel defense that prevents the attack by bounding the degree of overlay nodes. Our defense can be applied to any overlay and it enables secure implementations of overlay optimizations that choose neighbors according to metrics like proximity. We present preliminary results that demonstrate the importance of defending against the Eclipse attack and show that our defense is effective.
覆盖网络广泛用于在边缘节点上部署功能,而无需更换网络路由器。覆盖网络中的每个节点都维护指向一组邻居节点的指针。这些指针既用于维护覆盖层,也用于实现应用程序功能,例如,定位覆盖节点存储的内容。如果攻击者控制了正确节点的大部分邻居,就会“遮蔽”正确节点,从而阻止正确的叠加操作。这种Eclipse攻击比Sybil攻击更通用。攻击者可以通过发明大量看似不同的覆盖节点来使用Sybil攻击来发起Eclipse攻击。然而,针对Sybil攻击的防御并不能阻止Eclipse攻击,因为攻击者可能会操纵覆盖维护算法来发起Eclipse攻击。本文讨论了Eclipse攻击对几种类型的覆盖的影响,并提出了一种新的防御方法,通过限制覆盖节点的程度来防止攻击。我们的防御可以应用于任何覆盖,它可以根据邻近等指标选择邻居的覆盖优化的安全实现。我们提供了初步结果,证明了防御Eclipse攻击的重要性,并表明我们的防御是有效的。
{"title":"Defending against eclipse attacks on overlay networks","authors":"Atul Singh, M. Castro, P. Druschel, A. Rowstron","doi":"10.1145/1133572.1133613","DOIUrl":"https://doi.org/10.1145/1133572.1133613","url":null,"abstract":"Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor nodes. These pointers are used both to maintain the overlay and to implement application functionality, for example, to locate content stored by overlay nodes. If an attacker controls a large fraction of the neighbors of correct nodes, it can \"eclipse\" correct nodes and prevent correct overlay operation. This Eclipse attack is more general than the Sybil attack. Attackers can use a Sybil attack to launch an Eclipse attack by inventing a large number of seemingly distinct overlay nodes. However, defenses against Sybil attacks do not prevent Eclipse attacks because attackers may manipulate the overlay maintenance algorithm to mount an Eclipse attack. This paper discusses the impact of the Eclipse attack on several types of overlay and it proposes a novel defense that prevents the attack by bounding the degree of overlay nodes. Our defense can be applied to any overlay and it enables secure implementations of overlay optimizations that choose neighbors according to metrics like proximity. We present preliminary results that demonstrate the importance of defending against the Eclipse attack and show that our defense is effective.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 188
Open problems in data collection networks 数据采集网络中的开放性问题
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133575
J. Ledlie, Jeffrey Shneidman, M. Welsh, M. Roussopoulos, M. Seltzer
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of sensor networks in parallel. Numerous system ingredients are necessary to make these applications possible. Sensor network research is building some of these components from the bottom up, dealing with issues such as wireless connectivity and battery life. CQ, peer-to-peer (P2P), and other research areas are building top down, examining in-network services, naming, decentralized queries, and scale. While many research groups use the same types of applications to motivate their work, many of these applications cannot be built today because of missing bridge research. These challenges include: uniting vastly differing devices and services, managing intermittent connectivity, placing in-network services with QoS and other constraints, developing unified security models, and correlating between sensor networks. This paper distills these new problems and outlines one proposed system that explores solutions to these concerns.
传感器网络、连续查询(CQ)和其他领域的研究受到强大的应用程序的推动,这些应用程序旨在聚合、吸收和并行地与大量传感器网络交互。要使这些应用成为可能,需要许多系统成分。传感器网络研究正在自下而上地构建其中的一些组件,以解决诸如无线连接和电池寿命等问题。CQ、点对点(P2P)和其他研究领域正在自上而下地构建、检查网络内服务、命名、分散查询和规模。虽然许多研究小组使用相同类型的应用程序来激励他们的工作,但由于缺少桥梁研究,许多这些应用程序今天无法构建。这些挑战包括:统一截然不同的设备和服务,管理间歇性连接,在网络内设置具有QoS和其他约束的服务,开发统一的安全模型,以及在传感器网络之间进行关联。本文提炼了这些新问题,并概述了一个探索这些问题的解决方案的拟议系统。
{"title":"Open problems in data collection networks","authors":"J. Ledlie, Jeffrey Shneidman, M. Welsh, M. Roussopoulos, M. Seltzer","doi":"10.1145/1133572.1133575","DOIUrl":"https://doi.org/10.1145/1133572.1133575","url":null,"abstract":"Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of sensor networks in parallel. Numerous system ingredients are necessary to make these applications possible. Sensor network research is building some of these components from the bottom up, dealing with issues such as wireless connectivity and battery life. CQ, peer-to-peer (P2P), and other research areas are building top down, examining in-network services, naming, decentralized queries, and scale. While many research groups use the same types of applications to motivate their work, many of these applications cannot be built today because of missing bridge research. These challenges include: uniting vastly differing devices and services, managing intermittent connectivity, placing in-network services with QoS and other constraints, developing unified security models, and correlating between sensor networks. This paper distills these new problems and outlines one proposed system that explores solutions to these concerns.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134460451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Chip multithreading systems need a new operating system scheduler 芯片多线程系统需要一种新的操作系统调度程序
Pub Date : 2004-09-19 DOI: 10.1145/1133572.1133597
Alexandra Fedorova, Christopher Small, Daniel Nussbaum, M. Seltzer
The unpredictable nature of modern workloads, characterized by frequent branches and control transfers, can result in processor pipeline utilization as low as 19%. Chip multithreading (CMT), a processor architecture combining chip multiprocessing and hardware multithreading, is designed to address this issue. Hardware vendors plan to ship CMT systems within the next two years; understanding how such systems will perform is crucial if we are to use them to full advantage.Our simulation experiments show that a CMT-savvy operating system scheduler could improve application performance by a factor of two. In this paper we describe our initial analysis of application performance on CMT systems and propose a design for a scheduler tailored for the needs of a CMT system.
现代工作负载的不可预测性(以频繁的分支和控制传输为特征)可能导致处理器管道利用率低至19%。芯片多线程(CMT)是一种结合芯片多处理和硬件多线程的处理器体系结构,旨在解决这一问题。硬件供应商计划在未来两年内推出CMT系统;如果我们要充分利用这些系统,了解它们将如何运行是至关重要的。我们的模拟实验表明,精通cmt的操作系统调度器可以将应用程序性能提高两倍。在本文中,我们描述了我们对CMT系统上应用程序性能的初步分析,并提出了针对CMT系统需求量身定制的调度器设计。
{"title":"Chip multithreading systems need a new operating system scheduler","authors":"Alexandra Fedorova, Christopher Small, Daniel Nussbaum, M. Seltzer","doi":"10.1145/1133572.1133597","DOIUrl":"https://doi.org/10.1145/1133572.1133597","url":null,"abstract":"The unpredictable nature of modern workloads, characterized by frequent branches and control transfers, can result in processor pipeline utilization as low as 19%. Chip multithreading (CMT), a processor architecture combining chip multiprocessing and hardware multithreading, is designed to address this issue. Hardware vendors plan to ship CMT systems within the next two years; understanding how such systems will perform is crucial if we are to use them to full advantage.Our simulation experiments show that a CMT-savvy operating system scheduler could improve application performance by a factor of two. In this paper we describe our initial analysis of application performance on CMT systems and propose a design for a scheduler tailored for the needs of a CMT system.","PeriodicalId":285758,"journal":{"name":"EW 11","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127158142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
EW 11
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1