首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
SPIRO: Turning elephants into mice with efficient RF transport 用高效射频传输把大象变成老鼠
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218452
Eugene Chai, K. Shin, Sung-ju Lee, Jeongkeun Lee, R. Etkin
Cloud-RANs (Radio Access Networks) assume the existence of a high-capacity, low-delay/latency fronthaul to support cooperative transmission schemes such as CoMP (Coordinated Multi-Point) and coordinated beamforming. However, building such hierarchical wired fronthauls is challenging as the typical I/Q data stream is non-elastic - I/Q data over the wired fronthaul has little tolerance for delay jitters and zero tolerance for losses. Any distortion to the I/Q data stream will make the resulting wireless transmission completely unintelligible. We propose Spiro, a mechanism that efficiently transports RF signals over a wired fronthaul network. The primary goal of Spiro is to make I/Q data streams elastic and resilient to unexpected network condition changes. This is accomplished through a novel combination of compression and data prioritization of I/Q data on the wired fronthaul. For a given wireless throughput, Spiro can reduce the bandwidth demand of the fronthaul data stream by up to 50% without any noticeable degradation in the wireless reception quality. Further bandwidth reduction via compression and frame losses only have a limited impact on the wireless throughput.
云- ran(无线接入网络)假设存在一个高容量、低延迟/延迟的前传,以支持协同传输方案,如CoMP(协调多点)和协调波束形成。然而,构建这样的分层有线前传是具有挑战性的,因为典型的I/Q数据流是非弹性的——有线前传上的I/Q数据对延迟抖动的容忍度很小,对损失的容忍度为零。对I/Q数据流的任何失真都会使所产生的无线传输完全无法理解。我们提出Spiro,一种通过有线前传网络有效传输射频信号的机制。Spiro的主要目标是使I/Q数据流对意外的网络条件变化具有弹性和弹性。这是通过有线前传I/Q数据的压缩和数据优先级的新颖组合来实现的。对于给定的无线吞吐量,Spiro可以将前传数据流的带宽需求减少多达50%,而无线接收质量没有任何明显的下降。通过压缩和帧丢失进一步减少带宽对无线吞吐量的影响有限。
{"title":"SPIRO: Turning elephants into mice with efficient RF transport","authors":"Eugene Chai, K. Shin, Sung-ju Lee, Jeongkeun Lee, R. Etkin","doi":"10.1109/INFOCOM.2015.7218452","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218452","url":null,"abstract":"Cloud-RANs (Radio Access Networks) assume the existence of a high-capacity, low-delay/latency fronthaul to support cooperative transmission schemes such as CoMP (Coordinated Multi-Point) and coordinated beamforming. However, building such hierarchical wired fronthauls is challenging as the typical I/Q data stream is non-elastic - I/Q data over the wired fronthaul has little tolerance for delay jitters and zero tolerance for losses. Any distortion to the I/Q data stream will make the resulting wireless transmission completely unintelligible. We propose Spiro, a mechanism that efficiently transports RF signals over a wired fronthaul network. The primary goal of Spiro is to make I/Q data streams elastic and resilient to unexpected network condition changes. This is accomplished through a novel combination of compression and data prioritization of I/Q data on the wired fronthaul. For a given wireless throughput, Spiro can reduce the bandwidth demand of the fronthaul data stream by up to 50% without any noticeable degradation in the wireless reception quality. Further bandwidth reduction via compression and frame losses only have a limited impact on the wireless throughput.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An empirical mixture model for large-scale RTT measurements 大尺度RTT测量的经验混合模型
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218636
Romain Fontugne, J. Mazel, K. Fukuda
Monitoring delays in the Internet is essential to understand the network condition and ensure the good functioning of time-sensitive applications. Large-scale measurements of round-trip time (RTT) are promising data sources to gain better insights into Internet-wide delays. However, the lack of efficient methodology to model RTTs prevents researchers from leveraging the value of these datasets. In this work, we propose a log-normal mixture model to identify, characterize, and monitor spatial and temporal dynamics of RTTs. This data-driven approach provides a coarse grained view of numerous RTTs in the form of a graph, thus, it enables efficient and systematic analysis of Internet-wide measurements. Using this model, we analyze more than 13 years of RTTs from about 12 millions unique IP addresses in passively measured backbone traffic traces. We evaluate the proposed method by comparison with external data sets, and present examples where the proposed model highlights interesting delay fluctuations due to route changes or congestion. We also introduce an application based on the proposed model to identify hosts deviating from their typical RTTs fluctuations, and we envision various applications for this empirical model.
监测Internet中的延迟对于了解网络状况和确保对时间敏感的应用程序的良好运行至关重要。往返时间(RTT)的大规模测量是很有前途的数据源,可以更好地了解整个互联网的延迟。然而,缺乏有效的rtt建模方法阻碍了研究人员利用这些数据集的价值。在这项工作中,我们提出了一个对数正态混合模型来识别、表征和监测rtt的时空动态。这种数据驱动的方法以图的形式提供了大量rtt的粗粒度视图,因此,它支持对internet范围内的测量进行有效和系统的分析。使用该模型,我们从被动测量的骨干流量轨迹中约1200万个唯一IP地址中分析了超过13年的rtt。我们通过与外部数据集的比较来评估所提出的方法,并给出了一些例子,其中所提出的模型突出了由于路由变化或拥塞而引起的有趣的延迟波动。我们还介绍了一个基于所提出模型的应用程序,以识别偏离其典型rtt波动的主机,并设想了该经验模型的各种应用。
{"title":"An empirical mixture model for large-scale RTT measurements","authors":"Romain Fontugne, J. Mazel, K. Fukuda","doi":"10.1109/INFOCOM.2015.7218636","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218636","url":null,"abstract":"Monitoring delays in the Internet is essential to understand the network condition and ensure the good functioning of time-sensitive applications. Large-scale measurements of round-trip time (RTT) are promising data sources to gain better insights into Internet-wide delays. However, the lack of efficient methodology to model RTTs prevents researchers from leveraging the value of these datasets. In this work, we propose a log-normal mixture model to identify, characterize, and monitor spatial and temporal dynamics of RTTs. This data-driven approach provides a coarse grained view of numerous RTTs in the form of a graph, thus, it enables efficient and systematic analysis of Internet-wide measurements. Using this model, we analyze more than 13 years of RTTs from about 12 millions unique IP addresses in passively measured backbone traffic traces. We evaluate the proposed method by comparison with external data sets, and present examples where the proposed model highlights interesting delay fluctuations due to route changes or congestion. We also introduce an application based on the proposed model to identify hosts deviating from their typical RTTs fluctuations, and we envision various applications for this empirical model.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122466461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Code offload with least context migration in the mobile cloud 在移动云中以最少的上下文迁移进行代码卸载
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218570
Yong Li, Wei Gao
Mobile Cloud Computing (MCC) is of particular importance to address the contradiction between the increasing complexity of user applications and the limited lifespan of mobile device's battery, by offloading the computational workloads from local devices to the remote cloud. Current offloading schemes either require the programmer's annotations, which restricts its wide application; or transmits too much unnecessary data, resulting bandwidth and energy waste. In this paper, we propose a novel method-level offloading methodology to offload local computational workload with as least data transmission as possible. Our basic idea is to identify the contexts which are necessary to the method execution by parsing application binaries in advance and applying this parsing result to selectively migrate heap data while allowing successful method execution remotely. Our implementation of this design is built upon Dalvik Virtual Machine. Our experiments and evaluation against applications downloaded from Google Play show that our approach can save data transmission significantly comparing to existing schemes.
移动云计算(MCC)通过将计算工作负载从本地设备转移到远程云,解决用户应用程序日益复杂和移动设备电池寿命有限之间的矛盾,具有特别重要的意义。当前的卸载方案要么需要程序员的注释,这限制了它的广泛应用;或者传输过多不必要的数据,造成带宽和能源的浪费。在本文中,我们提出了一种新的方法级卸载方法,以尽可能少的数据传输来卸载本地计算工作量。我们的基本思想是,通过提前解析应用程序二进制文件,识别方法执行所必需的上下文,并应用此解析结果选择性地迁移堆数据,同时允许成功地远程执行方法。我们在Dalvik虚拟机上实现了这个设计。我们对从Google Play下载的应用程序进行的实验和评估表明,与现有方案相比,我们的方法可以显著节省数据传输。
{"title":"Code offload with least context migration in the mobile cloud","authors":"Yong Li, Wei Gao","doi":"10.1109/INFOCOM.2015.7218570","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218570","url":null,"abstract":"Mobile Cloud Computing (MCC) is of particular importance to address the contradiction between the increasing complexity of user applications and the limited lifespan of mobile device's battery, by offloading the computational workloads from local devices to the remote cloud. Current offloading schemes either require the programmer's annotations, which restricts its wide application; or transmits too much unnecessary data, resulting bandwidth and energy waste. In this paper, we propose a novel method-level offloading methodology to offload local computational workload with as least data transmission as possible. Our basic idea is to identify the contexts which are necessary to the method execution by parsing application binaries in advance and applying this parsing result to selectively migrate heap data while allowing successful method execution remotely. Our implementation of this design is built upon Dalvik Virtual Machine. Our experiments and evaluation against applications downloaded from Google Play show that our approach can save data transmission significantly comparing to existing schemes.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125241966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
RFID cardinality estimation with blocker tags 拦阻标签的RFID基数估计
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218548
Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, A. Liu, Heng Qi, Xin Xie
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers no matter they are authorized or not. The common solution is to use a commercially available blocker tag which behaves as if a set of tags with known blocking IDs are present. The use of blocker tags makes RFID estimation much more challenging as some genuine tag IDs are covered by the blocker tag and some are not. In this paper, we propose REB, the first RFID estimation scheme with the presence of blocker tags. REB uses the framed slotted Aloha protocol specified in the C1G2 standard. For each round of the Aloha protocol, REB first executes the protocol on the genuine tags and the blocker tag, and then virtually executes the protocol on the known blocking IDs using the same Aloha protocol parameters. The basic idea of REB is to conduct statistically inference from the two sets of responses and estimate the number of genuine tags. We conduct extensive simulations to evaluate the performance of REB, in terms of time-efficiency and estimation reliability. The experimental results reveal that our REB scheme runs tens of times faster than the fastest identification protocol with the same accuracy requirement.
广泛使用的RFID标签带来了严重的隐私问题,因为标签响应来自读取器的查询,无论他们是否授权。常见的解决方案是使用商业上可用的拦截器标签,它的行为就好像存在一组已知拦截id的标签。拦截标签的使用使RFID估计更具挑战性,因为一些真正的标签id被拦截标签覆盖,而一些则没有。在本文中,我们提出了REB,这是第一个存在拦截标签的RFID估计方案。REB使用C1G2标准中指定的框架开槽Aloha协议。对于每一轮Aloha协议,REB首先在真实标签和blocker标签上执行协议,然后使用相同的Aloha协议参数在已知的阻塞id上虚拟执行协议。REB的基本思想是从两组响应中进行统计推断,估计正品标签的数量。我们进行了大量的模拟来评估REB的性能,在时间效率和估计可靠性方面。实验结果表明,在相同精度要求下,我们的REB方案比目前最快的识别方案快几十倍。
{"title":"RFID cardinality estimation with blocker tags","authors":"Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, A. Liu, Heng Qi, Xin Xie","doi":"10.1109/INFOCOM.2015.7218548","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218548","url":null,"abstract":"The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers no matter they are authorized or not. The common solution is to use a commercially available blocker tag which behaves as if a set of tags with known blocking IDs are present. The use of blocker tags makes RFID estimation much more challenging as some genuine tag IDs are covered by the blocker tag and some are not. In this paper, we propose REB, the first RFID estimation scheme with the presence of blocker tags. REB uses the framed slotted Aloha protocol specified in the C1G2 standard. For each round of the Aloha protocol, REB first executes the protocol on the genuine tags and the blocker tag, and then virtually executes the protocol on the known blocking IDs using the same Aloha protocol parameters. The basic idea of REB is to conduct statistically inference from the two sets of responses and estimate the number of genuine tags. We conduct extensive simulations to evaluate the performance of REB, in terms of time-efficiency and estimation reliability. The experimental results reveal that our REB scheme runs tens of times faster than the fastest identification protocol with the same accuracy requirement.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
TimeFlip: Scheduling network updates with timestamp-based TCAM ranges TimeFlip:使用基于时间戳的TCAM范围调度网络更新
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218645
Tal Mizrahi, Ori Rottenstreich, Y. Moses
Network configuration and policy updates occur frequently, and must be performed in a way that minimizes transient effects caused by intermediate states of the network. It has been shown that accurate time can be used for coordinating network-wide updates, thereby reducing temporary inconsistencies. However, this approach presents a great challenge; even if network devices have perfectly synchronized clocks, how can we guarantee that updates are performed at the exact time for which they were scheduled? In this paper we present a practical method for implementing accurate time-based updates, using TIMEFLIPs. A TimeFlip is a time-based update that is implemented using a timestamp field in a Ternary Content Addressable Memory (TCAM) entry. TIMEFLIPs can be used to implement Atomic Bundle updates, and to coordinate network updates with high accuracy. We analyze the amount of TCAM resources required to encode a TimeFlip, and show that if there is enough flexibility in determining the scheduled time, a TimeFlip can be encoded by a single TCAM entry, using a single bit to represent the timestamp, and allowing the update to be performed with an accuracy on the order of 1 microsecond.
网络配置和策略更新经常发生,必须以最小化网络中间状态引起的瞬态影响的方式执行。事实证明,精确的时间可以用于协调全网范围的更新,从而减少暂时的不一致。然而,这种方法提出了一个巨大的挑战;即使网络设备具有完全同步的时钟,我们如何保证在计划的准确时间执行更新呢?在本文中,我们提出了一种实用的方法来实现精确的基于时间的更新,使用TIMEFLIPs。TimeFlip是一种基于时间的更新,它使用三元内容可寻址内存(TCAM)条目中的时间戳字段来实现。TIMEFLIPs可用于实现Atomic Bundle更新,并以高精度协调网络更新。我们分析了编码TimeFlip所需的TCAM资源的数量,并展示了如果在确定计划时间方面有足够的灵活性,则可以通过单个TCAM条目编码TimeFlip,使用单个比特表示时间戳,并允许以1微秒的精度执行更新。
{"title":"TimeFlip: Scheduling network updates with timestamp-based TCAM ranges","authors":"Tal Mizrahi, Ori Rottenstreich, Y. Moses","doi":"10.1109/INFOCOM.2015.7218645","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218645","url":null,"abstract":"Network configuration and policy updates occur frequently, and must be performed in a way that minimizes transient effects caused by intermediate states of the network. It has been shown that accurate time can be used for coordinating network-wide updates, thereby reducing temporary inconsistencies. However, this approach presents a great challenge; even if network devices have perfectly synchronized clocks, how can we guarantee that updates are performed at the exact time for which they were scheduled? In this paper we present a practical method for implementing accurate time-based updates, using TIMEFLIPs. A TimeFlip is a time-based update that is implemented using a timestamp field in a Ternary Content Addressable Memory (TCAM) entry. TIMEFLIPs can be used to implement Atomic Bundle updates, and to coordinate network updates with high accuracy. We analyze the amount of TCAM resources required to encode a TimeFlip, and show that if there is enough flexibility in determining the scheduled time, a TimeFlip can be encoded by a single TCAM entry, using a single bit to represent the timestamp, and allowing the update to be performed with an accuracy on the order of 1 microsecond.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
User recruitment for mobile crowdsensing over opportunistic networks 通过机会主义网络进行移动众测的用户招募
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218612
M. Karaliopoulos, Orestis Telelis, I. Koutsopoulos
We look into the realization of mobile crowdsensing campaigns that draw on the opportunistic networking paradigm, as practised in delay-tolerant networks but also in the emerging device-to-device communication mode in cellular networks. In particular, we ask how mobile users can be optimally selected in order to generate the required space-time paths across the network for collecting data from a set of fixed locations. The users hold different roles in these paths, from collecting data with their sensing-enabled devices to relaying them across the network and uploading them to data collection points with Internet connectivity. We first consider scenarios with deterministic node mobility and formulate the selection of users as a minimum-cost set cover problem with a submodular objective function. We then generalize to more realistic settings with uncertainty about the user mobility. A methodology is devised for translating the statistics of individual user mobility to statistics of spacetime path formation and feeding them to the set cover problem formulation. We describe practical greedy heuristics for the resulting NP-hard problems and compute their approximation ratios. Our experimentation with real mobility datasets (a) illustrates the multiple tradeoffs between the campaign cost and duration, the bound on the hopcount of space-time paths, and the number of collection points; and (b) provides evidence that in realistic problem instances the heuristics perform much better than what their pessimistic worst-case bounds suggest.
我们研究了利用机会主义网络范例的移动众测活动的实现,如在延迟容忍网络中实践的那样,也在蜂窝网络中新兴的设备对设备通信模式中实践。特别是,我们询问如何最佳地选择移动用户,以便在网络中生成所需的时空路径,以便从一组固定位置收集数据。用户在这些路径中扮演着不同的角色,从使用具有传感功能的设备收集数据,到通过网络转发数据,并将数据上传到具有互联网连接的数据收集点。我们首先考虑具有确定性节点移动性的场景,并将用户的选择表述为具有子模块目标函数的最小成本集覆盖问题。然后,我们将其推广到具有用户移动性不确定性的更现实的设置。设计了一种将个人用户移动性统计转化为时空路径形成统计的方法,并将其提供给集合覆盖问题公式。我们描述了实际的贪心启发式算法,并计算了它们的近似比。我们对真实移动数据集的实验(a)说明了活动成本和持续时间之间的多重权衡,时空路径的跳跃数的界限,以及收集点的数量;并且(b)提供证据表明,在现实问题实例中,启发式比其悲观的最坏情况边界所建议的效果要好得多。
{"title":"User recruitment for mobile crowdsensing over opportunistic networks","authors":"M. Karaliopoulos, Orestis Telelis, I. Koutsopoulos","doi":"10.1109/INFOCOM.2015.7218612","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218612","url":null,"abstract":"We look into the realization of mobile crowdsensing campaigns that draw on the opportunistic networking paradigm, as practised in delay-tolerant networks but also in the emerging device-to-device communication mode in cellular networks. In particular, we ask how mobile users can be optimally selected in order to generate the required space-time paths across the network for collecting data from a set of fixed locations. The users hold different roles in these paths, from collecting data with their sensing-enabled devices to relaying them across the network and uploading them to data collection points with Internet connectivity. We first consider scenarios with deterministic node mobility and formulate the selection of users as a minimum-cost set cover problem with a submodular objective function. We then generalize to more realistic settings with uncertainty about the user mobility. A methodology is devised for translating the statistics of individual user mobility to statistics of spacetime path formation and feeding them to the set cover problem formulation. We describe practical greedy heuristics for the resulting NP-hard problems and compute their approximation ratios. Our experimentation with real mobility datasets (a) illustrates the multiple tradeoffs between the campaign cost and duration, the bound on the hopcount of space-time paths, and the number of collection points; and (b) provides evidence that in realistic problem instances the heuristics perform much better than what their pessimistic worst-case bounds suggest.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
Enhancing privacy through caching in location-based services 通过在基于位置的服务中缓存来增强隐私
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218474
Ben Niu, Qinghua Li, Xiao-yan Zhu, G. Cao, Hui Li
Privacy protection is critical for Location-Based Services (LBSs). In most previous solutions, users query service data from the untrusted LBS server when needed, and discard the data immediately after use. However, the data can be cached and reused to answer future queries. This prevents some queries from being sent to the LBS server and thus improves privacy. Although a few previous works recognize the usefulness of caching for better privacy, they use caching in a pretty straightforward way, and do not show the quantitative relation between caching and privacy. In this paper, we propose a caching-based solution to protect location privacy in LBSs, and rigorously explore how much caching can be used to improve privacy. Specifically, we propose an entropy-based privacy metric which for the first time incorporates the effect of caching on privacy. Then we design two novel caching-aware dummy selection algorithms which enhance location privacy through maximizing both the privacy of the current query and the dummies' contribution to cache. Evaluations show that our algorithms provide much better privacy than previous caching-oblivious and caching-aware solutions.
隐私保护对于基于位置的服务(lbs)至关重要。在以前的大多数解决方案中,用户在需要时从不受信任的LBS服务器查询服务数据,并在使用后立即丢弃数据。但是,可以缓存和重用数据以回答将来的查询。这可以防止某些查询被发送到LBS服务器,从而提高隐私。尽管之前的一些工作认识到缓存对于更好的隐私的有用性,但它们以相当直接的方式使用缓存,并且没有显示缓存与隐私之间的定量关系。在本文中,我们提出了一种基于缓存的解决方案来保护lbs中的位置隐私,并严格探索了可以使用多少缓存来提高隐私。具体来说,我们提出了一个基于熵的隐私度量,它首次包含了缓存对隐私的影响。然后,我们设计了两种新的缓存感知虚拟选择算法,通过最大化当前查询的隐私性和虚拟对缓存的贡献来增强位置隐私。评估表明,我们的算法比以前的缓存无关和缓存感知解决方案提供了更好的隐私。
{"title":"Enhancing privacy through caching in location-based services","authors":"Ben Niu, Qinghua Li, Xiao-yan Zhu, G. Cao, Hui Li","doi":"10.1109/INFOCOM.2015.7218474","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218474","url":null,"abstract":"Privacy protection is critical for Location-Based Services (LBSs). In most previous solutions, users query service data from the untrusted LBS server when needed, and discard the data immediately after use. However, the data can be cached and reused to answer future queries. This prevents some queries from being sent to the LBS server and thus improves privacy. Although a few previous works recognize the usefulness of caching for better privacy, they use caching in a pretty straightforward way, and do not show the quantitative relation between caching and privacy. In this paper, we propose a caching-based solution to protect location privacy in LBSs, and rigorously explore how much caching can be used to improve privacy. Specifically, we propose an entropy-based privacy metric which for the first time incorporates the effect of caching on privacy. Then we design two novel caching-aware dummy selection algorithms which enhance location privacy through maximizing both the privacy of the current query and the dummies' contribution to cache. Evaluations show that our algorithms provide much better privacy than previous caching-oblivious and caching-aware solutions.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
Real-time failure prediction in online services 在线服务实时故障预测
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218516
M. Shatnawi, M. Hefeeda
Current data mining techniques used to create failure predictors for online services require massive amounts of data to build, train, and test the predictors. These operations are tedious, time consuming, and are not done in real-time. Also, the accuracy of the resulting predictor is highly compromised by changes that affect the environment and working conditions of the predictor. We propose a new approach to creating a dynamic failure predictor for online services in real-time and keeping its accuracy high during the services run-time changes. We use synthetic transactions during the run-time lifecycle to generate current data about the service. This data is used in its ephemeral state to build, train, test, and maintain an up-to-date failure predictor. We implemented the proposed approach in a large-scale online ad service that processes billions of requests each month in six data centers distributed in three continents. We show that the proposed predictor is able to maintain failure prediction accuracy as high as 86% during online service changes, whereas the accuracy of the state-of-the-art predictors may drop to less than 10%.
当前用于为在线服务创建故障预测器的数据挖掘技术需要大量数据来构建、训练和测试预测器。这些操作繁琐、耗时,而且不是实时完成的。此外,预测结果的准确性受到影响预测器的环境和工作条件的变化的高度损害。提出了一种实时创建在线服务动态故障预测器的新方法,并在服务运行时变化时保持其高准确性。我们在运行时生命周期中使用合成事务来生成有关服务的当前数据。这些临时状态的数据用于构建、训练、测试和维护最新的故障预测器。我们在一个大型在线广告服务中实现了所建议的方法,该服务每月在分布在三大洲的六个数据中心处理数十亿个请求。我们表明,所提出的预测器能够在在线服务更改期间保持高达86%的故障预测精度,而最先进的预测器的精度可能会下降到10%以下。
{"title":"Real-time failure prediction in online services","authors":"M. Shatnawi, M. Hefeeda","doi":"10.1109/INFOCOM.2015.7218516","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218516","url":null,"abstract":"Current data mining techniques used to create failure predictors for online services require massive amounts of data to build, train, and test the predictors. These operations are tedious, time consuming, and are not done in real-time. Also, the accuracy of the resulting predictor is highly compromised by changes that affect the environment and working conditions of the predictor. We propose a new approach to creating a dynamic failure predictor for online services in real-time and keeping its accuracy high during the services run-time changes. We use synthetic transactions during the run-time lifecycle to generate current data about the service. This data is used in its ephemeral state to build, train, test, and maintain an up-to-date failure predictor. We implemented the proposed approach in a large-scale online ad service that processes billions of requests each month in six data centers distributed in three continents. We show that the proposed predictor is able to maintain failure prediction accuracy as high as 86% during online service changes, whereas the accuracy of the state-of-the-art predictors may drop to less than 10%.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129663311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
How bad are the rogues' impact on enterprise 802.11 network performance? 流氓对企业802.11网络性能的影响有多严重?
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218401
Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li
Enterprise 802.11 Network (EWLAN) is an important infrastructure to the Mobile Internet, but its performance is being significantly impacted by the ever-increasing Rogue access points (RAPs). For example, in the university EWLAN we studied, the number of RAPs is more than seven times that of the enterprise APs. In this paper, we propose a generic methodology to measure RAP's carrier sense interference and hidden terminal interference, and it only uses readily available SNMP metrics, without any additional measurement hardware. Our results show that, on average, the carrier sense interference due to RAPs causes only 5% access delay increase at the MAC layer, because of careful engineering and software optimization. However, hidden terminal interference due to RAPs causes (a much more severe) up to 30% MAC layer loss rate increase on average, because no existing approach has explicitly dealt with the hidden terminal impact from rogue APs. Overall, the RAP interference would increase the IP layer delay at the WiFi hop by up to 50%.
企业802.11网络(EWLAN)是移动互联网的重要基础设施,但其性能受到日益增加的流氓接入点(rap)的严重影响。例如,在我们研究的大学EWLAN中,rap的数量是企业ap的7倍多。在本文中,我们提出了一种通用的方法来测量RAP的载波感知干扰和隐藏终端干扰,它只使用现成的SNMP指标,而不需要任何额外的测量硬件。我们的研究结果表明,由于精心的工程和软件优化,平均而言,由rap引起的载波感知干扰只会导致MAC层的访问延迟增加5%。然而,由于rap导致的隐藏终端干扰(更为严重)导致MAC层损失率平均增加高达30%,因为没有现有的方法明确处理来自恶意ap的隐藏终端影响。总的来说,RAP干扰会使WiFi跳处的IP层延迟增加多达50%。
{"title":"How bad are the rogues' impact on enterprise 802.11 network performance?","authors":"Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li","doi":"10.1109/INFOCOM.2015.7218401","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218401","url":null,"abstract":"Enterprise 802.11 Network (EWLAN) is an important infrastructure to the Mobile Internet, but its performance is being significantly impacted by the ever-increasing Rogue access points (RAPs). For example, in the university EWLAN we studied, the number of RAPs is more than seven times that of the enterprise APs. In this paper, we propose a generic methodology to measure RAP's carrier sense interference and hidden terminal interference, and it only uses readily available SNMP metrics, without any additional measurement hardware. Our results show that, on average, the carrier sense interference due to RAPs causes only 5% access delay increase at the MAC layer, because of careful engineering and software optimization. However, hidden terminal interference due to RAPs causes (a much more severe) up to 30% MAC layer loss rate increase on average, because no existing approach has explicitly dealt with the hidden terminal impact from rogue APs. Overall, the RAP interference would increase the IP layer delay at the WiFi hop by up to 50%.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks 数据偏好问题:车辆自组织网络安全数据传播的新视角
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218489
Qiao Xiang, X. Chen, L. Kong, Lei Rao, Xue Liu
Vehicle-to-vehicle safety data dissemination plays an increasingly important role in ensuring the safety and efficiency of vehicle transportation. When collecting safety data, vehicles always prefer data generated at a closer location over data generated at a distant location, and prefer recent data over outdated data. However, these data preferences have been overlooked in most of existing safety data dissemination protocols, preventing vehicles getting more precise traffic information. In this paper, we explore the feasibility and benefits of incorporating the data preferences of vehicles in designing efficient safety data dissemination protocols. In particular, we propose the concept of packet-value to quantify these data preferences. We then design PVCast, a packet-value-based safety data dissemination protocol in VANET. PVCast makes the dissemination decision for each packet based on its packet-value and effective dissemination coverage in order to satisfy the data preferences of all the vehicles in the network. In addition, PVCast is lightweight and fully distributed. We evaluate the performance of PVCast on the ns-2 platform by comparing it with three representative data dissemination protocols. Simulation results in a typical highway scenario show that PVCast provides a significant improvement on per-vehicle throughput, per-packet dissemination coverage with small per-packet delay. Our findings demonstrate the importance and necessity of comprehensively considering the data preferences of vehicles when designing an efficient safety data dissemination protocol for VANET.
车对车安全数据的传播在保证车辆运输的安全与效率方面发挥着越来越重要的作用。在收集安全数据时,车辆总是更喜欢近距离产生的数据而不是远距离产生的数据,更喜欢最近的数据而不是过时的数据。然而,在大多数现有的安全数据传播协议中,这些数据偏好被忽视了,阻碍了车辆获得更精确的交通信息。在本文中,我们探讨了在设计有效的安全数据传播协议时纳入车辆数据偏好的可行性和效益。特别是,我们提出了包值的概念来量化这些数据偏好。然后,我们在VANET中设计了基于包值的安全数据传播协议PVCast。为了满足网络中所有车辆的数据偏好,PVCast根据每个数据包的包值和有效的传播覆盖范围对每个数据包进行传播决策。此外,PVCast是轻量级和完全分布式的。通过与三种具有代表性的数据传播协议进行比较,评估了PVCast在ns-2平台上的性能。在典型的高速公路场景下的仿真结果表明,PVCast在每辆车吞吐量、每包传播覆盖率和较小的每包延迟方面有显著改善。我们的研究结果表明,在设计有效的VANET安全数据传播协议时,综合考虑车辆数据偏好的重要性和必要性。
{"title":"Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks","authors":"Qiao Xiang, X. Chen, L. Kong, Lei Rao, Xue Liu","doi":"10.1109/INFOCOM.2015.7218489","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218489","url":null,"abstract":"Vehicle-to-vehicle safety data dissemination plays an increasingly important role in ensuring the safety and efficiency of vehicle transportation. When collecting safety data, vehicles always prefer data generated at a closer location over data generated at a distant location, and prefer recent data over outdated data. However, these data preferences have been overlooked in most of existing safety data dissemination protocols, preventing vehicles getting more precise traffic information. In this paper, we explore the feasibility and benefits of incorporating the data preferences of vehicles in designing efficient safety data dissemination protocols. In particular, we propose the concept of packet-value to quantify these data preferences. We then design PVCast, a packet-value-based safety data dissemination protocol in VANET. PVCast makes the dissemination decision for each packet based on its packet-value and effective dissemination coverage in order to satisfy the data preferences of all the vehicles in the network. In addition, PVCast is lightweight and fully distributed. We evaluate the performance of PVCast on the ns-2 platform by comparing it with three representative data dissemination protocols. Simulation results in a typical highway scenario show that PVCast provides a significant improvement on per-vehicle throughput, per-packet dissemination coverage with small per-packet delay. Our findings demonstrate the importance and necessity of comprehensively considering the data preferences of vehicles when designing an efficient safety data dissemination protocol for VANET.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1