首页 > 最新文献

2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)最新文献

英文 中文
Adaptive Convolutional Neural Network Structure for Network Traffic Classification 网络流量分类的自适应卷积神经网络结构
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00037
Zhuang Han, Jianfeng Guan, Yanan Yao, Su Yao
Network traffic classification has been highly concerned by academia and industry for decades. In recent years, deep learning has attracted many scholars to use it in network traffic classification due to its excellent performance in the fields of computer vision and natural language processing. However, the performance of the neural network depends on its structure in the same dataset. When looking for the neural network to classify network traffic, it is necessary to constantly adjust the structure of the neural network to achieve better results, which is very time-consuming and experience-dependent. To solve the above problem, this paper proposes an Adaptive Convolutional Neural Network Structure for Network Traffic Classification (ACNNS-NTC) algorithm. The proposed algorithm first pre-processes the network traffic data used for training and testing, and then uses particle swarm optimization algorithm to optimize the network structure of the convolutional neural network, to generate convolutional neural network structure for network traffic classification, and verify the classification results. Experimental results show that the accuracies of the ACNNS-NTC algorithm on public datasets (ISCX-IDS2012, USTC-TFC2016, CIC-IDS2017) are above 99%. At the same time, the generated convolutional neural network has a more succinct structure and fewer model parameters compared with the existing methods.
几十年来,网络流量分类一直受到学术界和业界的高度关注。近年来,由于深度学习在计算机视觉和自然语言处理领域的优异表现,吸引了众多学者将其应用于网络流量分类中。然而,神经网络的性能取决于其在相同数据集中的结构。在寻找神经网络对网络流量进行分类时,需要不断调整神经网络的结构以达到更好的结果,这是非常耗时且依赖经验的。为了解决上述问题,本文提出了一种自适应卷积神经网络结构网络流量分类(ACNNS-NTC)算法。该算法首先对用于训练和测试的网络流量数据进行预处理,然后利用粒子群优化算法对卷积神经网络的网络结构进行优化,生成用于网络流量分类的卷积神经网络结构,并对分类结果进行验证。实验结果表明,ACNNS-NTC算法在公共数据集(ISCX-IDS2012、USTC-TFC2016、CIC-IDS2017)上的准确率均在99%以上。同时,与现有方法相比,生成的卷积神经网络结构更简洁,模型参数更少。
{"title":"Adaptive Convolutional Neural Network Structure for Network Traffic Classification","authors":"Zhuang Han, Jianfeng Guan, Yanan Yao, Su Yao","doi":"10.1109/ICPADS53394.2021.00037","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00037","url":null,"abstract":"Network traffic classification has been highly concerned by academia and industry for decades. In recent years, deep learning has attracted many scholars to use it in network traffic classification due to its excellent performance in the fields of computer vision and natural language processing. However, the performance of the neural network depends on its structure in the same dataset. When looking for the neural network to classify network traffic, it is necessary to constantly adjust the structure of the neural network to achieve better results, which is very time-consuming and experience-dependent. To solve the above problem, this paper proposes an Adaptive Convolutional Neural Network Structure for Network Traffic Classification (ACNNS-NTC) algorithm. The proposed algorithm first pre-processes the network traffic data used for training and testing, and then uses particle swarm optimization algorithm to optimize the network structure of the convolutional neural network, to generate convolutional neural network structure for network traffic classification, and verify the classification results. Experimental results show that the accuracies of the ACNNS-NTC algorithm on public datasets (ISCX-IDS2012, USTC-TFC2016, CIC-IDS2017) are above 99%. At the same time, the generated convolutional neural network has a more succinct structure and fewer model parameters compared with the existing methods.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IAP: Instant Auditing Protocol for Anonymous Payments IAP:用于匿名支付的即时审计协议
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00074
Ping Zhong, Bo Wang, Anning Wang, Yiming Zhang, Shengyun Liu, Qikai Zhong, Xuping Tu
Blockchain(e.g., Bitcoin) has widespread use in digital currency, which is entirely public to all participants, revealing users' privacy and transaction details. Anonymous blockchains without auditing capability can offer strong privacy guarantees, they could be used by illegal activities. However, anonymous blockchains with auditing capability suffer from two limitations: (i) inefficient auditing capability; (ii) lower degree of decentralization. To address these problems, this paper presents IAP, an instant auditing protocol based on anonymous blockchain with strong anonymity guarantees, which uses audit node cluster to implement decentralized instant auditing. The experimental results show that IAP only needs 60 milliseconds to complete an audit on average with 16 audit nodes, which accounts for one thousand of a complete transaction time. IAP can still complete efficient auditing when there are more than half of the nodes are honest in the audit node cluster. Moreover, its performance is virtually unaffected by increased number of transactions.
区块链(例如比特币)在数字货币中广泛使用,对所有参与者完全公开,暴露了用户的隐私和交易细节。没有审计能力的匿名区块链可以提供强有力的隐私保证,它们可能被非法活动所利用。然而,具有审计能力的匿名区块链存在两个限制:(1)低效的审计能力;(二)权力下放程度较低。为了解决这些问题,本文提出了基于匿名区块链的即时审计协议IAP,该协议具有强匿名性保证,利用审计节点集群实现去中心化的即时审计。实验结果表明,IAP在16个审计节点上平均只需60毫秒即可完成一次审计,占一次完整事务时间的千分之一。当审计节点集群中有超过一半的节点是诚实节点时,IAP仍然可以完成有效的审计。此外,它的性能几乎不受事务数量增加的影响。
{"title":"IAP: Instant Auditing Protocol for Anonymous Payments","authors":"Ping Zhong, Bo Wang, Anning Wang, Yiming Zhang, Shengyun Liu, Qikai Zhong, Xuping Tu","doi":"10.1109/ICPADS53394.2021.00074","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00074","url":null,"abstract":"Blockchain(e.g., Bitcoin) has widespread use in digital currency, which is entirely public to all participants, revealing users' privacy and transaction details. Anonymous blockchains without auditing capability can offer strong privacy guarantees, they could be used by illegal activities. However, anonymous blockchains with auditing capability suffer from two limitations: (i) inefficient auditing capability; (ii) lower degree of decentralization. To address these problems, this paper presents IAP, an instant auditing protocol based on anonymous blockchain with strong anonymity guarantees, which uses audit node cluster to implement decentralized instant auditing. The experimental results show that IAP only needs 60 milliseconds to complete an audit on average with 16 audit nodes, which accounts for one thousand of a complete transaction time. IAP can still complete efficient auditing when there are more than half of the nodes are honest in the audit node cluster. Moreover, its performance is virtually unaffected by increased number of transactions.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125853415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Wi-Fi Tethering through Fast Convergent Transmission Power Adaptation 通过快速收敛传输功率适应的节能Wi-Fi以太网
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00119
Yu Zhang, Guoqiang Zhang, Wenjuan Zhao, Md Shazarul Alam, Ruiheng Xie
Energy-efficient Wi-Fi tethering has received sustained attention. However, most existing Wi-Fi tethering schemes use maximum power to transmit data regardless of the distance between a mobile access point (MAP) on a smartphone and other associated devices. This problem is becoming increasingly important with the popularity of MIMO deployment because they offer more offload traffic and a higher data rate. In this paper, we design a Distance-aware Adaptive Transmission Power Control (called DATPC) scheme. Hence, DATPC can set the appropriate transmission power at the right moment. We have prototyped DATPC on commercial 802.11n WiFi devices and evaluate its performance in various indoor and outdoor scenarios. Experimental results show that within 3m distance, DATPC reduces the energy consumption of a MAP smartphone by up to 60% while ensuring the same transmission quality as the default maximum transmission power when sending data packets.
节能的Wi-Fi网络一直受到关注。然而,大多数现有的Wi-Fi捆绑方案使用最大功率来传输数据,而不考虑智能手机上的移动接入点(MAP)与其他相关设备之间的距离。随着MIMO部署的普及,这个问题变得越来越重要,因为它们提供了更多的卸载流量和更高的数据速率。本文设计了一种距离感知自适应传输功率控制(DATPC)方案。因此,DATPC可以在合适的时刻设置合适的传输功率。我们在商用802.11n WiFi设备上对DATPC进行了原型设计,并评估了其在各种室内和室外场景下的性能。实验结果表明,在3m距离内,DATPC在保证发送数据包时与默认最大传输功率相同的传输质量的情况下,可将MAP智能手机的能耗降低高达60%。
{"title":"Energy Efficient Wi-Fi Tethering through Fast Convergent Transmission Power Adaptation","authors":"Yu Zhang, Guoqiang Zhang, Wenjuan Zhao, Md Shazarul Alam, Ruiheng Xie","doi":"10.1109/ICPADS53394.2021.00119","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00119","url":null,"abstract":"Energy-efficient Wi-Fi tethering has received sustained attention. However, most existing Wi-Fi tethering schemes use maximum power to transmit data regardless of the distance between a mobile access point (MAP) on a smartphone and other associated devices. This problem is becoming increasingly important with the popularity of MIMO deployment because they offer more offload traffic and a higher data rate. In this paper, we design a Distance-aware Adaptive Transmission Power Control (called DATPC) scheme. Hence, DATPC can set the appropriate transmission power at the right moment. We have prototyped DATPC on commercial 802.11n WiFi devices and evaluate its performance in various indoor and outdoor scenarios. Experimental results show that within 3m distance, DATPC reduces the energy consumption of a MAP smartphone by up to 60% while ensuring the same transmission quality as the default maximum transmission power when sending data packets.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127455600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A User-related Semantic Location Privacy Protection Method In Location-based Service 基于位置的服务中基于用户的语义位置隐私保护方法
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00092
Xudong Yang, Ling Gao, Hai Wang, Yan Li, Jie Zheng, Jipeng Xu, Yuhui Ma
With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on privacy protection, they ignore the negative impact on the security of the knowledge of user-related semantic information of locations that attacker has. To solve this issue, we proposed a User-related Semantic Location Privacy Protection Mechanism (USPPM) based on k-anonymity. First, the anonymity set generation method that combines user-related mobile semantic feature of locations and semantic diversity entropy is proposed to improve the location semantic privacy safety. Second, we design an anonymity set optimization method which enhances sensitive semantic location privacy, through stackberg game model between attacker and protector. Finally, compared with other solutions, experiment on the real dataset shows that our algorithms can provide location privacy efficiently.
随着基于位置的服务(LBS)的普及和发展,位置隐私保护成为近年来的研究热点,尤其是k-匿名的研究。虽然以往的研究在隐私保护方面做了大量的工作,但忽视了攻击者所拥有的与用户相关的位置语义信息知识对安全性的负面影响。为了解决这个问题,我们提出了一种基于k-匿名的用户相关语义位置隐私保护机制(USPPM)。首先,提出将用户相关移动位置语义特征与语义多样性熵相结合的匿名集生成方法,提高位置语义隐私安全性;其次,通过攻击者和保护者之间的stackberg博弈模型,设计了一种增强敏感语义位置隐私的匿名集优化方法。最后,在真实数据集上的实验表明,我们的算法能够有效地提供位置隐私。
{"title":"A User-related Semantic Location Privacy Protection Method In Location-based Service","authors":"Xudong Yang, Ling Gao, Hai Wang, Yan Li, Jie Zheng, Jipeng Xu, Yuhui Ma","doi":"10.1109/ICPADS53394.2021.00092","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00092","url":null,"abstract":"With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on privacy protection, they ignore the negative impact on the security of the knowledge of user-related semantic information of locations that attacker has. To solve this issue, we proposed a User-related Semantic Location Privacy Protection Mechanism (USPPM) based on k-anonymity. First, the anonymity set generation method that combines user-related mobile semantic feature of locations and semantic diversity entropy is proposed to improve the location semantic privacy safety. Second, we design an anonymity set optimization method which enhances sensitive semantic location privacy, through stackberg game model between attacker and protector. Finally, compared with other solutions, experiment on the real dataset shows that our algorithms can provide location privacy efficiently.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT Sensors 并行物联网传感器分布式推理的分裂卷积神经网络
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00014
Jiale Chen, D. V. Le, R. Tan, Daren Ho
Convolutional neural networks (CNNs) are increasingly adopted on resource-constrained sensors for in-situ data analytics in Internet of Things (IoT) applications. This paper presents a model split framework, namely, splitCNN, in order to run a large CNN on a collection of concurrent IoT sensors. Specifically, we adopt CNN filter pruning techniques to split the large CNN into multiple small-size models, each of which is only sensitive to a certain number of data classes. These class-specific models are deployed onto the resource-constrained concurrent sensors which collaboratively perform distributed CNN inference on their same/similar sensing data. The outputs of multiple models are then fused to yield the global inference result. We apply splitCNN to three case studies with different sensing modalities, which include the human voice, industrial vibration signal, and visual sensing data. Extensive evaluation shows the effectiveness of the proposed splitCNN. In particular, the splitCNN achieves significant reduction in the model size and inference time while maintaining similar accuracy, compared with the original CNN model for all three case studies.
卷积神经网络(cnn)越来越多地应用于资源受限的传感器,用于物联网(IoT)应用中的原位数据分析。为了在一组并发物联网传感器上运行大型CNN,本文提出了一个模型拆分框架,即splitCNN。具体来说,我们采用CNN滤波剪枝技术,将大的CNN拆分成多个小的模型,每个小的模型只对一定数量的数据类敏感。这些类特定的模型被部署到资源受限的并发传感器上,这些传感器协同对它们相同/相似的传感数据执行分布式CNN推理。然后将多个模型的输出融合以产生全局推理结果。我们将splitCNN应用于三个具有不同传感模式的案例研究,包括人声、工业振动信号和视觉传感数据。广泛的评估表明了所提出的splitCNN的有效性。特别是,splitCNN在所有三个案例研究中,与原始CNN模型相比,在保持相似精度的同时,显著减少了模型大小和推理时间。
{"title":"Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT Sensors","authors":"Jiale Chen, D. V. Le, R. Tan, Daren Ho","doi":"10.1109/ICPADS53394.2021.00014","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00014","url":null,"abstract":"Convolutional neural networks (CNNs) are increasingly adopted on resource-constrained sensors for in-situ data analytics in Internet of Things (IoT) applications. This paper presents a model split framework, namely, splitCNN, in order to run a large CNN on a collection of concurrent IoT sensors. Specifically, we adopt CNN filter pruning techniques to split the large CNN into multiple small-size models, each of which is only sensitive to a certain number of data classes. These class-specific models are deployed onto the resource-constrained concurrent sensors which collaboratively perform distributed CNN inference on their same/similar sensing data. The outputs of multiple models are then fused to yield the global inference result. We apply splitCNN to three case studies with different sensing modalities, which include the human voice, industrial vibration signal, and visual sensing data. Extensive evaluation shows the effectiveness of the proposed splitCNN. In particular, the splitCNN achieves significant reduction in the model size and inference time while maintaining similar accuracy, compared with the original CNN model for all three case studies.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRPeek: Super Resolution Enabled Screen Peeking via COTS Smartphone SRPeek:通过COTS智能手机实现超分辨率屏幕窥视
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00117
Jialuo Du, Chenning Li, Zhenge Guo, Zhichao Cao
The screens of our smartphones and laptops display our private information persistently. The term “shoulder surfing” refers to the behavior of unauthorized people peeking at our screens, easily causing severe privacy leakages. Many countermeasures have been used to prevent naked eye-based peeking by reducing the possible peeking distance. However, the risk from modern smartphones with powerful cameras is underestimated. In this paper, we propose SRPeek, a long-distance shoulder surfing attack method using smartphones. Our key observation is that although a single image captured by smartphone cameras is blurred, the attacker can leverage super-resolution (SR) techniques to recover the information from multiple blurry images. We design an end-to-end system deployed on commercial smartphones, including an innovative deep neural network (DNN) architecture, StARe, for efficient multi-image SR. We implement SRPeek in Android and conduct extensive experiments to evaluate its performance. The results demonstrate we can recognize 90% of characters at a distance of 6m with telephoto lenses and 1.8m with common lenses, calling for the vigilance of the Quietly growing shoulder surfing threat.
我们的智能手机和笔记本电脑的屏幕持续显示我们的私人信息。“肩冲浪”指的是未经授权的人偷窥我们的屏幕,很容易造成严重的隐私泄露。为了防止裸眼偷窥,减少了可能的偷窥距离,采取了很多对策。然而,带有强大摄像头的现代智能手机带来的风险被低估了。在本文中,我们提出了一种基于智能手机的长距离肩冲浪攻击方法SRPeek。我们的主要观察结果是,尽管智能手机摄像头拍摄的单个图像是模糊的,但攻击者可以利用超分辨率(SR)技术从多个模糊图像中恢复信息。我们设计了一个部署在商用智能手机上的端到端系统,包括创新的深度神经网络(DNN)架构StARe,用于高效的多图像sr。我们在Android上实现了SRPeek,并进行了大量的实验来评估其性能。结果表明,使用长焦镜头和普通镜头,我们可以在6米和1.8米的距离内识别90%的字符,这引起了人们对悄悄增长的肩部冲浪威胁的警惕。
{"title":"SRPeek: Super Resolution Enabled Screen Peeking via COTS Smartphone","authors":"Jialuo Du, Chenning Li, Zhenge Guo, Zhichao Cao","doi":"10.1109/ICPADS53394.2021.00117","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00117","url":null,"abstract":"The screens of our smartphones and laptops display our private information persistently. The term “shoulder surfing” refers to the behavior of unauthorized people peeking at our screens, easily causing severe privacy leakages. Many countermeasures have been used to prevent naked eye-based peeking by reducing the possible peeking distance. However, the risk from modern smartphones with powerful cameras is underestimated. In this paper, we propose SRPeek, a long-distance shoulder surfing attack method using smartphones. Our key observation is that although a single image captured by smartphone cameras is blurred, the attacker can leverage super-resolution (SR) techniques to recover the information from multiple blurry images. We design an end-to-end system deployed on commercial smartphones, including an innovative deep neural network (DNN) architecture, StARe, for efficient multi-image SR. We implement SRPeek in Android and conduct extensive experiments to evaluate its performance. The results demonstrate we can recognize 90% of characters at a distance of 6m with telephoto lenses and 1.8m with common lenses, calling for the vigilance of the Quietly growing shoulder surfing threat.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge Computing 边缘计算中自缩放和自适应服务布局的联合优化
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00121
Ye Li, Haitao Zhang, W. Tian, Huadong Ma
In edge computing environment where network connections are often unstable and workload intensity changes frequently, the proper scaling mechanism and service placement strategy based on microservices are needed to ensure the edge services can be provided consistently. However, the common elastic scaling mechanism nowadays is threshold-based responsive scaling and has reaction time in the order of minutes, which is not suitable for delay-sensitive applications in the edge computing environment. Moreover, auto-scaling strategy and service replica placement are considered separately. If the scaled service replicas are misplaced on the edge nodes with limited resources or significant communication latency between upstream and downstream neighbours, the Quality of Service (QoS) cannot be guaranteed even with the auto-scaling mechanism. In this paper, we study the joint optimization of dynamic auto-scaling and adaptive service placement, and define it as a task delay minimization problem while satisfying resource and bandwidth constraints. Firstly, we design a multi-stage auto-scaling model based on workload prediction and performance evaluation of edge nodes to dynamically create an appropriate number of service replicas. Secondly, we propose a Dynamic Adaptive Service Placement (DASP) approach to iteratively place each service replica by using Adaptive Discrete Binary Particle Swarm Optimization (ADBPSO) algorithm. DASP can determine the current optimal placement strategy according to dynamic service replica scaling decision in a short time. The placement results of the current round will guide the optimization of the next cycle iteratively. The experimental evaluation shows that our approach significantly outperforms the existing methods in reducing the average task response time.
在网络连接不稳定、工作负载强度变化频繁的边缘计算环境中,需要适当的扩展机制和基于微服务的服务放置策略来保证边缘服务的一致性提供。然而,目前常见的弹性缩放机制是基于阈值的响应缩放,其反应时间在分钟量级,不适合边缘计算环境中对延迟敏感的应用。此外,还分别考虑了自动伸缩策略和服务副本的放置。如果扩展后的服务副本被放置在资源有限或上下游邻居之间通信延迟较大的边缘节点上,则即使使用自动扩展机制也无法保证服务质量(QoS)。本文研究了动态自伸缩和自适应服务布局的联合优化问题,并将其定义为满足资源和带宽约束的任务延迟最小化问题。首先,设计了基于工作负载预测和边缘节点性能评估的多阶段自动扩展模型,动态创建适当数量的服务副本;其次,我们提出了一种动态自适应服务放置(DASP)方法,通过自适应离散二进制粒子群优化(ADBPSO)算法迭代放置每个服务副本。DASP可以根据动态的服务副本扩展决策在短时间内确定当前的最优放置策略。当前一轮的投放结果将迭代地指导下一轮的优化。实验评估表明,我们的方法在减少平均任务响应时间方面明显优于现有方法。
{"title":"Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge Computing","authors":"Ye Li, Haitao Zhang, W. Tian, Huadong Ma","doi":"10.1109/ICPADS53394.2021.00121","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00121","url":null,"abstract":"In edge computing environment where network connections are often unstable and workload intensity changes frequently, the proper scaling mechanism and service placement strategy based on microservices are needed to ensure the edge services can be provided consistently. However, the common elastic scaling mechanism nowadays is threshold-based responsive scaling and has reaction time in the order of minutes, which is not suitable for delay-sensitive applications in the edge computing environment. Moreover, auto-scaling strategy and service replica placement are considered separately. If the scaled service replicas are misplaced on the edge nodes with limited resources or significant communication latency between upstream and downstream neighbours, the Quality of Service (QoS) cannot be guaranteed even with the auto-scaling mechanism. In this paper, we study the joint optimization of dynamic auto-scaling and adaptive service placement, and define it as a task delay minimization problem while satisfying resource and bandwidth constraints. Firstly, we design a multi-stage auto-scaling model based on workload prediction and performance evaluation of edge nodes to dynamically create an appropriate number of service replicas. Secondly, we propose a Dynamic Adaptive Service Placement (DASP) approach to iteratively place each service replica by using Adaptive Discrete Binary Particle Swarm Optimization (ADBPSO) algorithm. DASP can determine the current optimal placement strategy according to dynamic service replica scaling decision in a short time. The placement results of the current round will guide the optimization of the next cycle iteratively. The experimental evaluation shows that our approach significantly outperforms the existing methods in reducing the average task response time.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128951678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling Conflict-free Collaborations with Cloud Storage Services 通过云存储服务实现无冲突协作
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00082
Minghao Zhao, Jian Chen, Zhenhua Li
Cloud storage services (e.g., Dropbox) have become pervasive in not only simple file sharing but also advanced collaborative file editing (collaboration for short). Using Dropbox for collaboration is much easier than SVN and Git, thus greatly facilitating common users. In practice, however, many Dropbox users are perplexed by unexpected collaboration conflicts, which severely impair their experiences. Through various benchmark experiments, we unveil the two root causes of collaboration conflicts: 1) Dropbox never locks an edited file during collaboration; 2) Dropbox only guarantees eventual data consistency among the collaborators, significantly aggravating the probability of conflicts. In this paper, we attempt to enable conflict-free collaborations with Dropbox-like cloud storage services. This attempt is empowered by three key findings and measures. First, although the end-to-end sync delay is unpredictable due to eventual consistency, we can always track the latest version of an edited file by actively resorting to the cloud via certain web APIs. Second, although all application-level data is encrypted in Dropbox, we can roughly deduce the sync status from traffic statistics. Third, applying a couple of useful mechanisms (e.g., distributed architecture and data lock) learned from Git, we can effectively and efficiently avoid collaboration conflicts-of course, this requires re-implementing Git mechanisms in cloud storage services with minimum overhead and user interference. Integrating above efforts, we build the ConflictReaper system capable of helping users automatically avoid almost all collaboration conflicts with affordable network and computation overhead.
云存储服务(例如Dropbox)不仅在简单的文件共享方面,而且在高级协同文件编辑(简称协作)方面已经变得普遍。使用Dropbox进行协作比SVN和Git容易得多,从而极大地方便了普通用户。然而,在实践中,许多Dropbox用户都被意想不到的协作冲突所困扰,这严重影响了他们的体验。通过各种基准测试,我们揭示了协作冲突的两个根本原因:1)Dropbox在协作期间从不锁定已编辑的文件;2) Dropbox只保证协作者之间最终的数据一致性,这大大加剧了冲突的可能性。在本文中,我们试图通过类似dropbox的云存储服务实现无冲突的协作。这一尝试得到了三个关键发现和措施的支持。首先,尽管端到端同步延迟是不可预测的,因为最终的一致性,我们总是可以通过某些web api主动求助于云来跟踪编辑文件的最新版本。其次,虽然所有应用级数据在Dropbox中都是加密的,但我们可以从流量统计中大致推断出同步状态。第三,应用从Git中学到的一些有用的机制(例如,分布式架构和数据锁),我们可以有效地避免协作冲突——当然,这需要在云存储服务中以最小的开销和用户干扰重新实现Git机制。综合上述努力,我们构建了一个ConflictReaper系统,能够帮助用户在可承受的网络和计算开销下自动避免几乎所有的协作冲突。
{"title":"Enabling Conflict-free Collaborations with Cloud Storage Services","authors":"Minghao Zhao, Jian Chen, Zhenhua Li","doi":"10.1109/ICPADS53394.2021.00082","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00082","url":null,"abstract":"Cloud storage services (e.g., Dropbox) have become pervasive in not only simple file sharing but also advanced collaborative file editing (collaboration for short). Using Dropbox for collaboration is much easier than SVN and Git, thus greatly facilitating common users. In practice, however, many Dropbox users are perplexed by unexpected collaboration conflicts, which severely impair their experiences. Through various benchmark experiments, we unveil the two root causes of collaboration conflicts: 1) Dropbox never locks an edited file during collaboration; 2) Dropbox only guarantees eventual data consistency among the collaborators, significantly aggravating the probability of conflicts. In this paper, we attempt to enable conflict-free collaborations with Dropbox-like cloud storage services. This attempt is empowered by three key findings and measures. First, although the end-to-end sync delay is unpredictable due to eventual consistency, we can always track the latest version of an edited file by actively resorting to the cloud via certain web APIs. Second, although all application-level data is encrypted in Dropbox, we can roughly deduce the sync status from traffic statistics. Third, applying a couple of useful mechanisms (e.g., distributed architecture and data lock) learned from Git, we can effectively and efficiently avoid collaboration conflicts-of course, this requires re-implementing Git mechanisms in cloud storage services with minimum overhead and user interference. Integrating above efforts, we build the ConflictReaper system capable of helping users automatically avoid almost all collaboration conflicts with affordable network and computation overhead.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choosing Appropriate AI-enabled Edge Devices, Not the Costly Ones 选择合适的支持人工智能的边缘设备,而不是昂贵的设备
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00031
Ziyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu
Advances in Edge AI make it possible to achieve inference deep learning for emerging applications, e.g., smart transportation and smart city on the edge in real-time. Nowadays, different industry companies have developed several edge AI devices with various architectures. However, it is hard for application users to justify how to choose the appropriate edge-AI, due to the lack of benchmark testing results and testbeds specifically used to evaluate the system performance for those edge-AI systems. In this paper, we attempt to design a benchmark test platform for the edge-AI devices and evaluate six mainstream edge devices that are equipped with different computing powers and AI chip architectures. Throughput, power consumption ratio, and cost-effectiveness are chosen as the performance metrics for the evaluation process. Three classic deep learning workloads: object detection, image classification, and natural language processing are adopted with different batch sizes. The results show that under different batch sizes, compared with traditional edge devices, edge devices equipped with AI chips have out-performance in throughput, power consumption ratio, and cost-effectiveness by 134×, 57×, and 32×, respectively. From system perspective, our work not only demonstrates the effective AI capabilities of those edge AI devices, but also provide suggestions for AI optimization at edge in details.
边缘人工智能的进步使得在边缘实时实现智能交通和智慧城市等新兴应用的推理深度学习成为可能。如今,不同的行业公司开发了几种具有不同架构的边缘人工智能设备。然而,由于缺乏专门用于评估这些边缘人工智能系统性能的基准测试结果和测试平台,应用程序用户很难证明如何选择适当的边缘人工智能。在本文中,我们尝试为边缘AI设备设计一个基准测试平台,并评估六种主流边缘设备,这些设备配备了不同的计算能力和AI芯片架构。选择吞吐量、功耗比和成本效益作为评估过程的性能指标。采用了三种经典的深度学习工作负载:对象检测、图像分类和自然语言处理,并采用了不同的批处理规模。结果表明,在不同批量下,与传统边缘设备相比,搭载AI芯片的边缘设备在吞吐量、功耗比和成本效益方面分别高出134倍、57倍和32倍。从系统的角度来看,我们的工作不仅展示了这些边缘人工智能设备的有效人工智能能力,而且为边缘人工智能优化提供了详细的建议。
{"title":"Choosing Appropriate AI-enabled Edge Devices, Not the Costly Ones","authors":"Ziyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu","doi":"10.1109/ICPADS53394.2021.00031","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00031","url":null,"abstract":"Advances in Edge AI make it possible to achieve inference deep learning for emerging applications, e.g., smart transportation and smart city on the edge in real-time. Nowadays, different industry companies have developed several edge AI devices with various architectures. However, it is hard for application users to justify how to choose the appropriate edge-AI, due to the lack of benchmark testing results and testbeds specifically used to evaluate the system performance for those edge-AI systems. In this paper, we attempt to design a benchmark test platform for the edge-AI devices and evaluate six mainstream edge devices that are equipped with different computing powers and AI chip architectures. Throughput, power consumption ratio, and cost-effectiveness are chosen as the performance metrics for the evaluation process. Three classic deep learning workloads: object detection, image classification, and natural language processing are adopted with different batch sizes. The results show that under different batch sizes, compared with traditional edge devices, edge devices equipped with AI chips have out-performance in throughput, power consumption ratio, and cost-effectiveness by 134×, 57×, and 32×, respectively. From system perspective, our work not only demonstrates the effective AI capabilities of those edge AI devices, but also provide suggestions for AI optimization at edge in details.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
xRSA: Construct Larger Bits RSA on Low-Cost Devices xRSA:在低成本设备上构造大比特RSA
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00085
Fan Dang, Lingkun Li, Jiajie Chen
As the most widely applied public-key cryptographic algorithm, RSA is now integrated into many low-cost devices such as IoT devices. Due to the limited resource, most low-cost devices only ship a 2048-bit multiplier, making the longest supported private key length as 2048 bits. Unfortunately, 2048-bit RSA keys are gradually considered insecure. Utilizing the existing 2048-bit multiplier is challenging because a 4096-bit message cannot be stored in the multiplier. In this paper, we perform a thorough study of RSA and propose a new method that achieves the 4096-bit RSA cryptography with the existing hardware. We use the Montgomery modular multiplication and the Chinese Remainder Theorem to reduce the computational cost and construct the necessary components to compute the RSA private key operation. To further validate the correctness of the method and evaluate its performance, we implement this method on a micro-controller and build a testbed named CanoKey with three commonly used cryptography protocols. The result shows that our method is over 200x faster than the naive method, a.k.a., software-based big number multiplications.
RSA作为目前应用最广泛的公钥加密算法,已被集成到物联网设备等许多低成本设备中。由于资源有限,大多数低成本设备只提供2048位乘法器,因此支持的最长私钥长度为2048位。不幸的是,2048位RSA密钥逐渐被认为是不安全的。利用现有的2048位乘法器具有挑战性,因为4096位消息不能存储在乘法器中。本文对RSA进行了深入的研究,提出了一种利用现有硬件实现4096位RSA加密的新方法。我们使用Montgomery模乘法和中国剩余定理来减少计算成本,并构造计算RSA私钥操作所需的组件。为了进一步验证该方法的正确性并评估其性能,我们在微控制器上实现了该方法,并构建了一个名为CanoKey的测试平台,其中包含三种常用的加密协议。结果表明,我们的方法比基于软件的大数乘法的朴素方法快200倍以上。
{"title":"xRSA: Construct Larger Bits RSA on Low-Cost Devices","authors":"Fan Dang, Lingkun Li, Jiajie Chen","doi":"10.1109/ICPADS53394.2021.00085","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00085","url":null,"abstract":"As the most widely applied public-key cryptographic algorithm, RSA is now integrated into many low-cost devices such as IoT devices. Due to the limited resource, most low-cost devices only ship a 2048-bit multiplier, making the longest supported private key length as 2048 bits. Unfortunately, 2048-bit RSA keys are gradually considered insecure. Utilizing the existing 2048-bit multiplier is challenging because a 4096-bit message cannot be stored in the multiplier. In this paper, we perform a thorough study of RSA and propose a new method that achieves the 4096-bit RSA cryptography with the existing hardware. We use the Montgomery modular multiplication and the Chinese Remainder Theorem to reduce the computational cost and construct the necessary components to compute the RSA private key operation. To further validate the correctness of the method and evaluate its performance, we implement this method on a micro-controller and build a testbed named CanoKey with three commonly used cryptography protocols. The result shows that our method is over 200x faster than the naive method, a.k.a., software-based big number multiplications.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1