首页 > 最新文献

2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)最新文献

英文 中文
FDALB: Flow distribution aware load balancing for datacenter networks FDALB:数据中心网络的流量分布感知负载均衡
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590409
Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yun-jie Liu
We present FDALB, a flow distribution aware load balancing mechanism aimed at reducing flow collisions and achieving high scalability. FDALB, like the most of centralized methods, uses a centralized controller to get the view of networks and congestion information. However, FDALB classifies flows into short flows and long flows. The paths of short flows and long flows are controlled by distributed switches and the centralized controller respectively. Thus, the controller handles only a small part of flows to achieve high scalability. To further reduce the controller's overhead, FDALB leverages end-hosts to tag long flows, thus switches can easily determine long flows by inspecting the tag. Besides, FDALB can adaptively adjust the threshold at each end-host to keep up with the flow distribution dynamics.
本文提出了一种基于流分布感知的负载平衡机制FDALB,旨在减少流冲突并实现高可扩展性。与大多数集中式方法一样,FDALB使用集中式控制器来获取网络视图和拥塞信息。然而,FDALB将流分为短流和长流。短流路径和长流路径分别由分布式开关和集中控制器控制。因此,控制器只处理流的一小部分,以实现高可伸缩性。为了进一步减少控制器的开销,FDALB利用终端主机标记长流,因此交换机可以通过检查标记轻松确定长流。此外,FDALB可以自适应调整各端主机的阈值,以跟上流量分布动态。
{"title":"FDALB: Flow distribution aware load balancing for datacenter networks","authors":"Shuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yun-jie Liu","doi":"10.1109/IWQoS.2016.7590409","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590409","url":null,"abstract":"We present FDALB, a flow distribution aware load balancing mechanism aimed at reducing flow collisions and achieving high scalability. FDALB, like the most of centralized methods, uses a centralized controller to get the view of networks and congestion information. However, FDALB classifies flows into short flows and long flows. The paths of short flows and long flows are controlled by distributed switches and the centralized controller respectively. Thus, the controller handles only a small part of flows to achieve high scalability. To further reduce the controller's overhead, FDALB leverages end-hosts to tag long flows, thus switches can easily determine long flows by inspecting the tag. Besides, FDALB can adaptively adjust the threshold at each end-host to keep up with the flow distribution dynamics.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic TrafficAV:利用网络流量对移动恶意软件行为进行有效且可解释的检测
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590446
Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia
Android has become the most popular mobile platform due to its openness and flexibility. Meanwhile, it has also become the main target of massive mobile malware. This phenomenon drives a pressing need for malware detection. In this paper, we propose TrafficAV, which is an effective and explainable detection of mobile malware behavior using network traffic. Network traffic generated by mobile app is mirrored from the wireless access point to the server for data analysis. All data analysis and malware detection are performed on the server side, which consumes minimum resources on mobile devices without affecting the user experience. Due to the difficulty in identifying disparate malicious behaviors of malware from the network traffic, TrafficAV performs a multi-level network traffic analysis, gathering as many features of network traffic as necessary. The proposed method combines network traffic analysis with machine learning algorithm (C4.5 decision tree) that is capable of identifying Android malware with high accuracy. In an evaluation with 8,312 benign apps and 5,560 malware samples, TCP flow detection model and HTTP detection model all perform well and achieve detection rates of 98.16% and 99.65%, respectively. In addition, for the benefit of user, TrafficAV not only displays the final detection results, but also analyzes the behind-the-curtain reason of malicious results. This allows users to further investigate each feature's contribution in the final result, and to grasp the insights behind the final decision.
Android因其开放性和灵活性而成为最受欢迎的移动平台。与此同时,它也成为了大量移动恶意软件的主要目标。这种现象推动了对恶意软件检测的迫切需求。在本文中,我们提出了TrafficAV,它是一种有效且可解释的利用网络流量检测移动恶意软件行为的方法。移动应用产生的网络流量从无线接入点镜像到服务器进行数据分析。所有的数据分析和恶意软件检测都在服务器端进行,在不影响用户体验的情况下,对移动设备的资源消耗最少。由于很难从网络流量中识别出不同的恶意软件的恶意行为,TrafficAV执行多层次的网络流量分析,收集尽可能多的网络流量特征。该方法将网络流量分析与机器学习算法(C4.5决策树)相结合,能够以较高的准确率识别Android恶意软件。在对8,312个良性应用和5,560个恶意软件样本的评估中,TCP流量检测模型和HTTP检测模型均表现良好,检测率分别达到98.16%和99.65%。此外,为了用户的利益,TrafficAV不仅展示了最终的检测结果,还分析了恶意结果的幕后原因。这允许用户进一步研究每个特性在最终结果中的贡献,并掌握最终决策背后的见解。
{"title":"TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic","authors":"Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia","doi":"10.1109/IWQoS.2016.7590446","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590446","url":null,"abstract":"Android has become the most popular mobile platform due to its openness and flexibility. Meanwhile, it has also become the main target of massive mobile malware. This phenomenon drives a pressing need for malware detection. In this paper, we propose TrafficAV, which is an effective and explainable detection of mobile malware behavior using network traffic. Network traffic generated by mobile app is mirrored from the wireless access point to the server for data analysis. All data analysis and malware detection are performed on the server side, which consumes minimum resources on mobile devices without affecting the user experience. Due to the difficulty in identifying disparate malicious behaviors of malware from the network traffic, TrafficAV performs a multi-level network traffic analysis, gathering as many features of network traffic as necessary. The proposed method combines network traffic analysis with machine learning algorithm (C4.5 decision tree) that is capable of identifying Android malware with high accuracy. In an evaluation with 8,312 benign apps and 5,560 malware samples, TCP flow detection model and HTTP detection model all perform well and achieve detection rates of 98.16% and 99.65%, respectively. In addition, for the benefit of user, TrafficAV not only displays the final detection results, but also analyzes the behind-the-curtain reason of malicious results. This allows users to further investigate each feature's contribution in the final result, and to grasp the insights behind the final decision.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Model-based techniques for QoS assessment of cloud-hosted CDN services 基于模型的云托管CDN服务QoS评估技术
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590442
K. Ravindran, K. Fayzullaev, Yassine Wardei
Given cloud-based realization of a CDN service S (i.e., Content Distribution Network), QoS auditing captures the QoS violations that arise under various resource depletion and outage scenarios faced by S. Third-party control of the underlying cloud VM and storage nodes hosting the content (i.e., proxies of content server) raises the issue of reasoning about how well the CDN internal mechanisms are engineered to offer a required level of service to the application (i.e., low latency and overhead). We employ computational models of S to determine the optimal feasible proxy placements in the CDN topology and verify how close is the actual behavior of S to this 'gold standard'. Using declarative specifications, the QoS meta-data and CDN adaptation processes of S are externalized to enable a management module H reason about QoS violations. The paper elucidates the software and system engineering issues that arise in an external evaluation of the QoS provisioning of S by H.
考虑到基于云的CDN服务S(即内容分发网络)的实现,QoS审计捕获了在各种资源耗尽和中断情况下出现的QoS违规S。第三方控制底层云VM和托管内容的存储节点(即内容服务器的代理)提出了一个问题,即CDN内部机制的设计如何为应用程序提供所需的服务级别(即,低延迟和开销)。我们使用S的计算模型来确定CDN拓扑中最优可行的代理位置,并验证S的实际行为与此“黄金标准”的接近程度。使用声明性规范,将S的QoS元数据和CDN适应过程外部化,使管理模块H能够判断QoS违规。本文阐述了H对S提供QoS的外部评估中出现的软件和系统工程问题。
{"title":"Model-based techniques for QoS assessment of cloud-hosted CDN services","authors":"K. Ravindran, K. Fayzullaev, Yassine Wardei","doi":"10.1109/IWQoS.2016.7590442","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590442","url":null,"abstract":"Given cloud-based realization of a CDN service S (i.e., Content Distribution Network), QoS auditing captures the QoS violations that arise under various resource depletion and outage scenarios faced by S. Third-party control of the underlying cloud VM and storage nodes hosting the content (i.e., proxies of content server) raises the issue of reasoning about how well the CDN internal mechanisms are engineered to offer a required level of service to the application (i.e., low latency and overhead). We employ computational models of S to determine the optimal feasible proxy placements in the CDN topology and verify how close is the actual behavior of S to this 'gold standard'. Using declarative specifications, the QoS meta-data and CDN adaptation processes of S are externalized to enable a management module H reason about QoS violations. The paper elucidates the software and system engineering issues that arise in an external evaluation of the QoS provisioning of S by H.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The detection of physical attacks against iBeacon transmitters 检测针对iBeacon发射机的物理攻击
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590453
Chen Liu, Pengyu Zhao, Kaigui Bian, Tong Zhao, Yan Wei
iBeacon is a new technology proposed by Apple using Bluetooth Low Energy (BLE), which helps mobile devices understand their position on a micro-local scale, and facilitates the delivery of location-based content to mobile users. According to the iBeacon protocol, iBeacon transmitters only do one-way broadcast communication, and thus it is difficult to authenticate the legitimacy of the transmitters. In this paper, we focus on detecting the physical attacks against iBeacon transmitters- iBeacon transmitters can be stolen, tampered, faked and reused, which interfere with the legitimate iBeacon transmission, reduce the quality of service and ultimately degrade the user experience. We develop a detection system based on Hidden Markov Model running on the server-side to detect the misbehaving iBeacon transmitters without more energy consuming. Our system achieves 85% detection accuracy on average for all physical attack actions; meanwhile it has a 5% false alarm rate for non-attack situations in our designated trace experiments, and 100% correct binary judgements in the random-trace experiments. To the best of our knowledge, this is the first work that focuses on the iBeacon physical attack problem.
iBeacon是苹果公司提出的一项使用低功耗蓝牙(BLE)的新技术,它可以帮助移动设备在微本地规模上了解自己的位置,并方便向移动用户提供基于位置的内容。根据iBeacon协议,iBeacon发射机只进行单向广播通信,因此难以验证发射机的合法性。在本文中,我们重点检测针对iBeacon发射机的物理攻击——iBeacon发射机可以被窃取、篡改、伪造和重用,从而干扰合法的iBeacon传输,降低服务质量,最终降低用户体验。我们开发了一个基于隐马尔可夫模型的检测系统,该系统运行在服务器端,可以在不增加能耗的情况下检测iBeacon发送器的异常行为。我们的系统对所有物理攻击行为的平均检测准确率达到85%;同时,在我们指定的跟踪实验中,它对非攻击情况的虚警率为5%,在随机跟踪实验中,它对二元判断的正确率为100%。据我们所知,这是第一个关注iBeacon物理攻击问题的工作。
{"title":"The detection of physical attacks against iBeacon transmitters","authors":"Chen Liu, Pengyu Zhao, Kaigui Bian, Tong Zhao, Yan Wei","doi":"10.1109/IWQoS.2016.7590453","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590453","url":null,"abstract":"iBeacon is a new technology proposed by Apple using Bluetooth Low Energy (BLE), which helps mobile devices understand their position on a micro-local scale, and facilitates the delivery of location-based content to mobile users. According to the iBeacon protocol, iBeacon transmitters only do one-way broadcast communication, and thus it is difficult to authenticate the legitimacy of the transmitters. In this paper, we focus on detecting the physical attacks against iBeacon transmitters- iBeacon transmitters can be stolen, tampered, faked and reused, which interfere with the legitimate iBeacon transmission, reduce the quality of service and ultimately degrade the user experience. We develop a detection system based on Hidden Markov Model running on the server-side to detect the misbehaving iBeacon transmitters without more energy consuming. Our system achieves 85% detection accuracy on average for all physical attack actions; meanwhile it has a 5% false alarm rate for non-attack situations in our designated trace experiments, and 100% correct binary judgements in the random-trace experiments. To the best of our knowledge, this is the first work that focuses on the iBeacon physical attack problem.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130806705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data Rate Guarantee for Coflow scheduling in network function virtualization 网络功能虚拟化中Coflow调度的数据速率保证
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590440
Jianhui Zhang, Keqiu Li, Deke Guo, Heng Qi, Xiaoyi Tao, Yingwei Jin
In data centers, a lot of cluster computing applications follow a coflow pattern. On the other hand, network function virtualization (NFV) sufficiently improves the performance of the data center network. However, coflows encounter extremely different processing delays under diverse network functions. Traditional coflow scheduling schemes become insufficient in this situation. Based on the observation that the benefit of coflows is closely related to the data rates of flows, we propose DRGC (Data Rate Guarantee for Coflow) to guarantee the data rate requirements of coflows in the NFV environment. We prioritize the scheduling sequence of coflows, precisely allocate data rates for individual flows, and design an efficient scheduling algorithm. DRGC maintains the desired data rates of coflows with higher priorities at middleboxes and leaves more scheduling opportunities to the ones with lower priorities. In the large-scale trace-driven experiment, DRGC efficiently guarantees the data rate requirements of coflows and supports more 15% workload, compared with other scheduling schemes.
在数据中心中,许多集群计算应用程序遵循coflow模式。另一方面,网络功能虚拟化(network function virtualization, NFV)充分提高了数据中心网络的性能。然而,在不同的网络功能下,共流的处理延迟差异很大。在这种情况下,传统的协同流调度方案显得有些不足。基于Coflow的效益与流的数据速率密切相关的观察,我们提出了DRGC (data Rate Guarantee for Coflow)来保证NFV环境下Coflow的数据速率要求。我们对协同流的调度顺序进行了优先级排序,精确地分配了各个流的数据速率,并设计了一种高效的调度算法。DRGC在中间盒中维护具有较高优先级的协同流所需的数据速率,并将更多的调度机会留给具有较低优先级的协同流。在大规模跟踪驱动实验中,与其他调度方案相比,DRGC有效地保证了协同流的数据速率要求,并支持15%以上的工作量。
{"title":"Data Rate Guarantee for Coflow scheduling in network function virtualization","authors":"Jianhui Zhang, Keqiu Li, Deke Guo, Heng Qi, Xiaoyi Tao, Yingwei Jin","doi":"10.1109/IWQoS.2016.7590440","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590440","url":null,"abstract":"In data centers, a lot of cluster computing applications follow a coflow pattern. On the other hand, network function virtualization (NFV) sufficiently improves the performance of the data center network. However, coflows encounter extremely different processing delays under diverse network functions. Traditional coflow scheduling schemes become insufficient in this situation. Based on the observation that the benefit of coflows is closely related to the data rates of flows, we propose DRGC (Data Rate Guarantee for Coflow) to guarantee the data rate requirements of coflows in the NFV environment. We prioritize the scheduling sequence of coflows, precisely allocate data rates for individual flows, and design an efficient scheduling algorithm. DRGC maintains the desired data rates of coflows with higher priorities at middleboxes and leaves more scheduling opportunities to the ones with lower priorities. In the large-scale trace-driven experiment, DRGC efficiently guarantees the data rate requirements of coflows and supports more 15% workload, compared with other scheduling schemes.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lexicographical order Max-Min fair source quota allocation in mobile Delay-Tolerant Networks 移动容延迟网络中词典顺序最大最小公平源配额分配
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590424
Dongliang Xie, Xin Wang, Linhui Ma
There is a big potential to enable more efficient data dissemination in mobile Delay-Tolerant Networks (DTNs) with the concurrent use of multi-copy forwarding and social metrics. However, this also leads to the possibility of severely overloading the relay nodes with high social metrics, and consequent performance degradation. We propose a fair source quota allocation algorithm to effectively alleviate the load while ensuring their dissemination fairness, i.e, Lexicographical order Max-Min Fairness(LMMF). In this paper, A fair source quota allocation algorithm along with an implementation scheme was presented to take advantage of the features of social networks and social forwarding for higher delivery performance. Extensive simulations based on trace data demonstrate that our mechanism greatly reduces the delivery-ratio degradation caused by uneven load while ensuring fairness among the network users.
通过同时使用多副本转发和社交指标,在移动容忍延迟网络(DTNs)中实现更有效的数据传播具有很大的潜力。然而,这也可能导致具有高社交指标的中继节点严重超载,从而导致性能下降。我们提出了一种公平的源配额分配算法,在保证其传播公平性的同时有效地减轻负载,即字典顺序最大最小公平性(LMMF)。本文提出了一种公平的资源配额分配算法及其实现方案,以利用社交网络和社交转发的特点来提高分发性能。基于跟踪数据的大量模拟表明,我们的机制大大降低了由负载不均匀引起的投递率下降,同时确保了网络用户之间的公平性。
{"title":"Lexicographical order Max-Min fair source quota allocation in mobile Delay-Tolerant Networks","authors":"Dongliang Xie, Xin Wang, Linhui Ma","doi":"10.1109/IWQoS.2016.7590424","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590424","url":null,"abstract":"There is a big potential to enable more efficient data dissemination in mobile Delay-Tolerant Networks (DTNs) with the concurrent use of multi-copy forwarding and social metrics. However, this also leads to the possibility of severely overloading the relay nodes with high social metrics, and consequent performance degradation. We propose a fair source quota allocation algorithm to effectively alleviate the load while ensuring their dissemination fairness, i.e, Lexicographical order Max-Min Fairness(LMMF). In this paper, A fair source quota allocation algorithm along with an implementation scheme was presented to take advantage of the features of social networks and social forwarding for higher delivery performance. Extensive simulations based on trace data demonstrate that our mechanism greatly reduces the delivery-ratio degradation caused by uneven load while ensuring fairness among the network users.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Your trajectory privacy can be breached even if you walk in groups 即使你结伴行走,你的轨迹隐私也可能被侵犯
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590444
Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Zimu Li, Dan Pei
The enterprise Wi-Fi networks enable the collection of large-scale users' mobility information at an indoor level. The collected trajectory data is very valuable for both research and commercial purposes, but the use of the trajectory data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity (hiding each user in an anonymity set no smaller than k) as the first step to solve the privacy problem. Yet it has been qualitatively recognized that k-anonymity is still risky when the diversity of the sensitive information in the k-anonymity set is low. There, however, still lacks a study that provides a quantitative understanding of that risk in the trajectory dataset. In this work, we present a large-scale measurement based analysis of the low-diversity risk over four weeks of trajectory data collected from Tsinghua, a campus that covers an area of 4 km2, on which 2,670 access points are deployed in 111 buildings. Using this dataset, we highlight the high risk of the low diversity. For example, we find that even when 5-anonymity is satisfied, the sensitive attributes of 25% of individuals can be easily guessed. We also find that although a larger k increases the size of anonymity sets, the corresponding improvement on the diversity of anonymity sets is very limited (decayed exponentially). These results suggest that diversity-oriented solutions are necessary.
企业Wi-Fi网络可以在室内收集大规模用户的移动信息。收集的轨迹数据对于研究和商业目的都非常有价值,但轨迹数据的使用也引起了严重的隐私问题。大量的工作试图实现k-匿名(将每个用户隐藏在不小于k的匿名集中)作为解决隐私问题的第一步。然而,定性地认识到,当k-匿名集中敏感信息的多样性较低时,k-匿名仍然是有风险的。然而,目前仍缺乏对轨迹数据集中这种风险进行定量理解的研究。在这项工作中,我们对从清华大学收集的4周轨迹数据进行了大规模测量,分析了低多样性风险。清华大学占地4平方公里,在111栋建筑中部署了2670个接入点。利用该数据集,我们突出了低多样性的高风险。例如,我们发现,即使满足5匿名性,25%的个体的敏感属性也可以很容易地猜出来。我们还发现,虽然较大的k增加了匿名集的大小,但对匿名集多样性的相应改善非常有限(呈指数衰减)。这些结果表明,以多样性为导向的解决方案是必要的。
{"title":"Your trajectory privacy can be breached even if you walk in groups","authors":"Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Zimu Li, Dan Pei","doi":"10.1109/IWQoS.2016.7590444","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590444","url":null,"abstract":"The enterprise Wi-Fi networks enable the collection of large-scale users' mobility information at an indoor level. The collected trajectory data is very valuable for both research and commercial purposes, but the use of the trajectory data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity (hiding each user in an anonymity set no smaller than k) as the first step to solve the privacy problem. Yet it has been qualitatively recognized that k-anonymity is still risky when the diversity of the sensitive information in the k-anonymity set is low. There, however, still lacks a study that provides a quantitative understanding of that risk in the trajectory dataset. In this work, we present a large-scale measurement based analysis of the low-diversity risk over four weeks of trajectory data collected from Tsinghua, a campus that covers an area of 4 km2, on which 2,670 access points are deployed in 111 buildings. Using this dataset, we highlight the high risk of the low diversity. For example, we find that even when 5-anonymity is satisfied, the sensitive attributes of 25% of individuals can be easily guessed. We also find that although a larger k increases the size of anonymity sets, the corresponding improvement on the diversity of anonymity sets is very limited (decayed exponentially). These results suggest that diversity-oriented solutions are necessary.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Dynamic resource scheduling in cloud radio access network with mobile cloud computing 基于移动云计算的云无线接入网动态资源调度
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590428
Xinhou Wang, Kezhi Wang, Song Wu, S. Di, Kun Yang, Hai Jin
Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile cloud computing (MCC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile users' devices to provide better quality of service (QoS). But the power consumption has become skyrocketing for MSP as it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MCC separately while less work had considered the integration of C-RAN with MCC. In this paper, we present a unifying framework for optimizing the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MCC to minimize the power consumption of MSP while still guaranteeing the QoS for mobile users. Our objective is to maximize the profit of MSP. To achieve this objective, we first formulate the resource scheduling issue as a stochastic problem and then propose a Resource onlIne sCHeduling (RICH) algorithm using Lyapunov optimization technique to approach a time average profit that is close to the optimum with a diminishing gap (1/V) for MSP while still maintaining strong system stability and low congestion to guarantee the QoS for mobile users. With extensive simulations, we demonstrate that the profit of RICH algorithm is 3.3× (18.4×) higher than that of active (random) algorithm.
目前,移动服务提供商(MSP)通过将云无线接入网(C-RAN)与移动云计算(MCC)技术相结合,可以有效地处理不断增长的移动流量,增强移动用户设备的能力,从而提供更好的服务质量(QoS)。但是MSP的耗电量却呈直线上升趋势,严重影响了MSP的利润。以往的工作多是分别研究C-RAN和MCC的功耗,很少考虑C-RAN与MCC的集成。本文提出了一种统一的框架,通过联合调度C-RAN中的网络资源和MCC中的计算资源来优化MSP的功率性能权衡,从而在保证移动用户QoS的同时最小化MSP的功耗。我们的目标是使MSP的利润最大化。为了实现这一目标,我们首先将资源调度问题描述为一个随机问题,然后利用Lyapunov优化技术提出了一种资源在线调度(RICH)算法,该算法在保持较强的系统稳定性和低拥塞的同时,逼近MSP的时间平均利润接近最优且差距(1/V)减小,以保证移动用户的QoS。通过大量的仿真,我们证明RICH算法的利润比主动(随机)算法高3.3倍(18.4倍)。
{"title":"Dynamic resource scheduling in cloud radio access network with mobile cloud computing","authors":"Xinhou Wang, Kezhi Wang, Song Wu, S. Di, Kun Yang, Hai Jin","doi":"10.1109/IWQoS.2016.7590428","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590428","url":null,"abstract":"Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile cloud computing (MCC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile users' devices to provide better quality of service (QoS). But the power consumption has become skyrocketing for MSP as it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MCC separately while less work had considered the integration of C-RAN with MCC. In this paper, we present a unifying framework for optimizing the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MCC to minimize the power consumption of MSP while still guaranteeing the QoS for mobile users. Our objective is to maximize the profit of MSP. To achieve this objective, we first formulate the resource scheduling issue as a stochastic problem and then propose a Resource onlIne sCHeduling (RICH) algorithm using Lyapunov optimization technique to approach a time average profit that is close to the optimum with a diminishing gap (1/V) for MSP while still maintaining strong system stability and low congestion to guarantee the QoS for mobile users. With extensive simulations, we demonstrate that the profit of RICH algorithm is 3.3× (18.4×) higher than that of active (random) algorithm.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Coverage and distinguishability requirements for Traffic Flow Monitoring Systems 交通流量监测系统的覆盖范围和可识别性要求
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590432
Huanyang Zheng, Wei Chang, Jie Wu
Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart cities. Their critical applications include vehicle theft prevention, vehicle localization, and traffic congestion solution. This paper studies an RoadSide Unit (RSU) placement problem in traffic flow monitoring systems. Given some traffic flows on streets, the objective is to place a minimum number of RSUs to cover and distinguish all traffic flows. A traffic flow is covered and distinguishable, if the set of its passing RSUs is non-empty and unique among all traffic flows. The RSU placement problem is NP-hard, monotonic, and non-submodular. It is a non-trivial extension of the traditional set cover problem that is submodular. We show that, to cover and distinguish an arbitrary pair of traffic flows (f and f'), two RSUs should be placed on streets from two different subsets of ff', f'f, and f ∩ f'. Three bounded RSU placement algorithms are proposed. Their approximation ratios are n ln n(n-1)/2 , n+1/2 ln 3n(n-1)/2, and ln n(n+1)/2, respectively. Here, ri is the number of given traffic flows. Extensive real data-driven experiments demonstrate the efficiency and effectiveness of the proposed algorithms.
交通流量监控系统旨在测量和监控智能城市中的车辆轨迹。它们的关键应用包括车辆防盗、车辆定位和交通拥堵解决方案。本文研究了交通流监控系统中路边单元(RSU)的配置问题。给定街道上的一些交通流量,目标是放置最小数量的rsu来覆盖和区分所有交通流量。如果一个交通流通过的rsu集合非空且在所有交通流中唯一,则该交通流被覆盖且可区分。RSU放置问题是np困难的、单调的、非子模的。它是传统集覆盖问题的非平凡推广,具有子模性。我们证明,为了覆盖和区分任意一对交通流(f和f'),应该在来自ff'、f'f和f∩f'的两个不同子集的街道上放置两个rsu。提出了三种有界RSU放置算法。它们的近似比分别是n ln n(n-1)/2, n+1/2 ln 3n(n-1)/2,和ln n(n+1)/2。这里,ri是给定交通流的数量。大量的真实数据驱动实验证明了所提出算法的效率和有效性。
{"title":"Coverage and distinguishability requirements for Traffic Flow Monitoring Systems","authors":"Huanyang Zheng, Wei Chang, Jie Wu","doi":"10.1109/IWQoS.2016.7590432","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590432","url":null,"abstract":"Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart cities. Their critical applications include vehicle theft prevention, vehicle localization, and traffic congestion solution. This paper studies an RoadSide Unit (RSU) placement problem in traffic flow monitoring systems. Given some traffic flows on streets, the objective is to place a minimum number of RSUs to cover and distinguish all traffic flows. A traffic flow is covered and distinguishable, if the set of its passing RSUs is non-empty and unique among all traffic flows. The RSU placement problem is NP-hard, monotonic, and non-submodular. It is a non-trivial extension of the traditional set cover problem that is submodular. We show that, to cover and distinguish an arbitrary pair of traffic flows (f and f'), two RSUs should be placed on streets from two different subsets of ff', f'f, and f ∩ f'. Three bounded RSU placement algorithms are proposed. Their approximation ratios are n ln n(n-1)/2 , n+1/2 ln 3n(n-1)/2, and ln n(n+1)/2, respectively. Here, ri is the number of given traffic flows. Extensive real data-driven experiments demonstrate the efficiency and effectiveness of the proposed algorithms.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Selecting most informative contributors with unknown costs for budgeted crowdsensing 选择最具信息性且成本未知的贡献者进行预算众测
Pub Date : 2016-06-20 DOI: 10.1109/IWQoS.2016.7590447
Shuo Yang, Fan Wu, Shaojie Tang, Tie Luo, Xiaofeng Gao, L. Kong, Guihai Chen
Mobile crowdsensing has become a novel and promising paradigm in collecting environmental data. A critical problem in improving the QoS of crowdsensing is to decide which users to select to perform sensing tasks, in order to obtain the most informative data, while maintaining the total sensing costs below a given budget. The key challenges lie in (i) finding an effective measure of the informativeness of users' data, (ii) learning users' sensing costs which are unknown a priori, and (iii) designing efficient user selection algorithms that achieve low-regret guarantees. In this paper, we build Gaussian Processes (GPs) to model spatial locations, and provide a mutual information-based criteria to characterize users' informativeness. To tackle the second and third challenges, we model the problem as a budgeted multi-armed bandit (MAB) problem based on stochastic assumptions, and propose an algorithm with theoretically proven low-regret guarantee. Our theoretical analysis and evaluation results both demonstrate that our algorithm can efficiently select most informative users under stringent constraints.
移动众测已成为收集环境数据的一种新颖而有前途的范例。提高群体感知服务质量的一个关键问题是选择哪些用户来执行感知任务,以获得信息量最大的数据,同时保持总感知成本低于给定的预算。关键的挑战在于(i)找到用户数据信息量的有效度量,(ii)学习先验未知的用户感知成本,以及(iii)设计实现低后悔保证的高效用户选择算法。在本文中,我们建立高斯过程(GPs)来建模空间位置,并提供一个基于互信息的标准来表征用户的信息性。为了解决第二和第三个问题,我们将其建模为基于随机假设的预算多臂强盗(MAB)问题,并提出了一种具有理论证明的低后悔保证的算法。理论分析和评价结果均表明,在严格的约束条件下,该算法能够有效地选择出信息量最大的用户。
{"title":"Selecting most informative contributors with unknown costs for budgeted crowdsensing","authors":"Shuo Yang, Fan Wu, Shaojie Tang, Tie Luo, Xiaofeng Gao, L. Kong, Guihai Chen","doi":"10.1109/IWQoS.2016.7590447","DOIUrl":"https://doi.org/10.1109/IWQoS.2016.7590447","url":null,"abstract":"Mobile crowdsensing has become a novel and promising paradigm in collecting environmental data. A critical problem in improving the QoS of crowdsensing is to decide which users to select to perform sensing tasks, in order to obtain the most informative data, while maintaining the total sensing costs below a given budget. The key challenges lie in (i) finding an effective measure of the informativeness of users' data, (ii) learning users' sensing costs which are unknown a priori, and (iii) designing efficient user selection algorithms that achieve low-regret guarantees. In this paper, we build Gaussian Processes (GPs) to model spatial locations, and provide a mutual information-based criteria to characterize users' informativeness. To tackle the second and third challenges, we model the problem as a budgeted multi-armed bandit (MAB) problem based on stochastic assumptions, and propose an algorithm with theoretically proven low-regret guarantee. Our theoretical analysis and evaluation results both demonstrate that our algorithm can efficiently select most informative users under stringent constraints.","PeriodicalId":304978,"journal":{"name":"2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1