首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
Mixed-Parallel Implementations of Extrapolation Methods with Reduced Synchronization Overhead for Large Shared-Memory Computers 大型共享内存计算机中减少同步开销外推方法的混合并行实现
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.12
Matthias Korch, T. Rauber, C. Scholtes
Extrapolation methods belong to the class of one-step methods for the solution of systems of ordinary differential equations (ODEs). In this paper, we present parallel implementation variants of extrapolation methods for large shared-memory computer systems which exploit pure data parallelism or mixed task and data parallelism and make use of different load balancing strategies and different loop structures. In addition to general implementation variants suitable for ODE systems with arbitrary access structure, we devise specialized implementation variants which exploit the specific access structure of a large class of ODE systems to reduce synchronization costs and to improve the locality of memory references. We analyze and compare the scalability and the locality behavior of the implementation variants on an SGI Altix 4700 using up to 500 threads.
外推法属于求解常微分方程组的一步法。本文提出了针对大型共享内存计算机系统的外推方法的并行实现变体,这些外推方法利用纯数据并行性或混合任务和数据并行性,并利用不同的负载平衡策略和不同的循环结构。除了适用于具有任意访问结构的ODE系统的通用实现变体外,我们还设计了专门的实现变体,利用大量ODE系统的特定访问结构来降低同步成本并改善内存引用的局部性。我们分析和比较了SGI Altix 4700上使用多达500个线程的实现变体的可伸缩性和局部性行为。
{"title":"Mixed-Parallel Implementations of Extrapolation Methods with Reduced Synchronization Overhead for Large Shared-Memory Computers","authors":"Matthias Korch, T. Rauber, C. Scholtes","doi":"10.1109/ICPADS.2010.12","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.12","url":null,"abstract":"Extrapolation methods belong to the class of one-step methods for the solution of systems of ordinary differential equations (ODEs). In this paper, we present parallel implementation variants of extrapolation methods for large shared-memory computer systems which exploit pure data parallelism or mixed task and data parallelism and make use of different load balancing strategies and different loop structures. In addition to general implementation variants suitable for ODE systems with arbitrary access structure, we devise specialized implementation variants which exploit the specific access structure of a large class of ODE systems to reduce synchronization costs and to improve the locality of memory references. We analyze and compare the scalability and the locality behavior of the implementation variants on an SGI Altix 4700 using up to 500 threads.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Broadcasting Algorithm Via Shortest Paths 基于最短路径的广播算法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.110
Hovhannes A. Harutyunyan, Wei Wang
In this paper, we present a new heuristic that generates broadcast schemes in arbitrary networks. The heuristic gives optimal broadcast time for ring, tree and grid if the originator is on the corner. Extensive simulations show that our new heuristic outperforms the best known broadcast algorithms for two different network models representing Internet and ATM networks. It also allows to generate broadcast time of networks of bigger size because its time complexity, O(|E|), is lower compared to the complexities of the other algorithms. The last advantage of the heuristic is that every node is informed via a shortest path from the originator.
本文提出了一种在任意网络中生成广播方案的启发式算法。当发信人在角落时,启发式给出环、树和网格的最优广播时间。大量的模拟表明,对于代表Internet和ATM网络的两种不同网络模型,我们的新启发式算法优于最知名的广播算法。它还允许生成更大规模网络的广播时间,因为它的时间复杂度O(|E|)比其他算法的复杂性低。启发式的最后一个优点是,每个节点都是通过从始发点出发的最短路径通知的。
{"title":"Broadcasting Algorithm Via Shortest Paths","authors":"Hovhannes A. Harutyunyan, Wei Wang","doi":"10.1109/ICPADS.2010.110","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.110","url":null,"abstract":"In this paper, we present a new heuristic that generates broadcast schemes in arbitrary networks. The heuristic gives optimal broadcast time for ring, tree and grid if the originator is on the corner. Extensive simulations show that our new heuristic outperforms the best known broadcast algorithms for two different network models representing Internet and ATM networks. It also allows to generate broadcast time of networks of bigger size because its time complexity, O(|E|), is lower compared to the complexities of the other algorithms. The last advantage of the heuristic is that every node is informed via a shortest path from the originator.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Optimal Data Scheduling for P2P VoD Streaming Systems P2P视频点播流媒体系统的最优数据调度
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.55
Qifeng Yu, Daoxu Chen
Media streaming services have been much more popular nowadays, and these services consume lots of network bandwidth. Peer-to-Peer(P2P) technology has been employed in the streaming systems to save the server bandwidth consumption and enhance the system scalability. In a P2P streaming system, the quality of the data scheduling scheme will largely affect the server stress that being saved. In this paper, we present our optimal data scheduling scheme to achieve both server stress minimization and fairness among users when the playback continuities of the users are guaranteed. The data scheduling scheme we proposed is based on the maximum network flow problem, and it is proved to be polynomial. Simulations also show that the time consumption for the computation of the optimal scheduling is acceptable, and the result of the scheduling also achieves small node degree bound which makes it practical.
如今,流媒体服务越来越流行,这些服务消耗了大量的网络带宽。为了节省服务器的带宽消耗和提高系统的可扩展性,在流媒体系统中采用了P2P技术。在P2P流系统中,数据调度方案的质量将在很大程度上影响所节省的服务器压力。在保证用户播放连续性的前提下,提出了一种最优的数据调度方案,以实现服务器压力最小化和用户间的公平性。我们提出的数据调度方案是基于最大网络流量问题,并证明了它是多项式的。仿真结果表明,优化调度的计算时间是可以接受的,调度结果也达到了较小的节点度界,使其具有实用性。
{"title":"Optimal Data Scheduling for P2P VoD Streaming Systems","authors":"Qifeng Yu, Daoxu Chen","doi":"10.1109/ICPADS.2010.55","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.55","url":null,"abstract":"Media streaming services have been much more popular nowadays, and these services consume lots of network bandwidth. Peer-to-Peer(P2P) technology has been employed in the streaming systems to save the server bandwidth consumption and enhance the system scalability. In a P2P streaming system, the quality of the data scheduling scheme will largely affect the server stress that being saved. In this paper, we present our optimal data scheduling scheme to achieve both server stress minimization and fairness among users when the playback continuities of the users are guaranteed. The data scheduling scheme we proposed is based on the maximum network flow problem, and it is proved to be polynomial. Simulations also show that the time consumption for the computation of the optimal scheduling is acceptable, and the result of the scheduling also achieves small node degree bound which makes it practical.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116084056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Policy-Based Framework for Automated SLA Negotiation for Internet-Based Virtual Computing Environment 基于策略的互联网虚拟计算环境SLA自动协商框架
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.104
Z. Xiao, Donggang Cao
Service Level Agreements (SLAs) play an important role in guaranteeing successful collaborations among autonomous entities in Internet-based Virtual Computing Environment (iVCE). However, traditional static and predefined SLAs are not suitable for the open and dynamic iVCE. This paper proposes a policy-based framework for supporting dynamic and automated SLA negotiations between autonomous entities in iVCE. Requirements or constraints on SLA attributes as well as negotiation strategies of negotiating parties are both specified in policy specifications using a simple but expressive policy language that extends the WS-Policy framework. According to these policies, a negotiation agent will be dynamically created for each negotiation party, which is responsible for SLA negotiations on behalf of its owner party. We have implemented a prototype of our framework and demonstrated our approach through a case study.
在基于互联网的虚拟计算环境(iVCE)中,服务水平协议(sla)在保证自治实体之间成功协作方面发挥着重要作用。但是,传统的静态和预定义的sla不适合开放和动态的iVCE。本文提出了一个基于策略的框架,用于支持iVCE中自治实体之间动态和自动化的SLA协商。SLA属性的需求或约束以及协商各方的协商策略都在策略规范中使用扩展WS-Policy框架的简单而富有表现力的策略语言指定。根据这些策略,将为每个谈判方动态创建一个谈判代理,代表其所有者方负责SLA谈判。我们已经实现了框架的原型,并通过案例研究演示了我们的方法。
{"title":"A Policy-Based Framework for Automated SLA Negotiation for Internet-Based Virtual Computing Environment","authors":"Z. Xiao, Donggang Cao","doi":"10.1109/ICPADS.2010.104","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.104","url":null,"abstract":"Service Level Agreements (SLAs) play an important role in guaranteeing successful collaborations among autonomous entities in Internet-based Virtual Computing Environment (iVCE). However, traditional static and predefined SLAs are not suitable for the open and dynamic iVCE. This paper proposes a policy-based framework for supporting dynamic and automated SLA negotiations between autonomous entities in iVCE. Requirements or constraints on SLA attributes as well as negotiation strategies of negotiating parties are both specified in policy specifications using a simple but expressive policy language that extends the WS-Policy framework. According to these policies, a negotiation agent will be dynamically created for each negotiation party, which is responsible for SLA negotiations on behalf of its owner party. We have implemented a prototype of our framework and demonstrated our approach through a case study.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121407158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Prefetching Framework for the Streaming Loading of Virtual Software 虚拟软件流加载的预取框架
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.25
Liang Zhong, Junbin Kang, Chunming Hu, Tianyu Wo, Haibing Zheng, B. Li
In recent years, the Software as a Service, largely enabled by the Internet, has become an innovative software delivery model. During the streaming execution of virtualization software, the execution will wait until the missing data was downloaded, which greatly influences the user experience. In this paper, we present a block-level prefetching framework for streaming delivery of software based on N-Gram prediction model and an incremental data mining algorithm. The prefetching framework uses the historical block access logs for data mining, then dynamically updates and polishes the prefetching rules. The experimental results show that this prefetching framework achieves a launch time reduced by 10% to 50%, as well as hit rate between 81% and 97%.
近年来,“软件即服务”在很大程度上是由互联网实现的,它已成为一种创新的软件交付模式。在虚拟化软件流式执行过程中,会等到丢失的数据下载完成后再执行,这对用户体验影响很大。本文提出了一种基于N-Gram预测模型和增量数据挖掘算法的软件流传输块级预取框架。预取框架利用历史块访问日志进行数据挖掘,并对预取规则进行动态更新和优化。实验结果表明,该预取框架的发射时间缩短了10% ~ 50%,命中率在81% ~ 97%之间。
{"title":"A Prefetching Framework for the Streaming Loading of Virtual Software","authors":"Liang Zhong, Junbin Kang, Chunming Hu, Tianyu Wo, Haibing Zheng, B. Li","doi":"10.1109/ICPADS.2010.25","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.25","url":null,"abstract":"In recent years, the Software as a Service, largely enabled by the Internet, has become an innovative software delivery model. During the streaming execution of virtualization software, the execution will wait until the missing data was downloaded, which greatly influences the user experience. In this paper, we present a block-level prefetching framework for streaming delivery of software based on N-Gram prediction model and an incremental data mining algorithm. The prefetching framework uses the historical block access logs for data mining, then dynamically updates and polishes the prefetching rules. The experimental results show that this prefetching framework achieves a launch time reduced by 10% to 50%, as well as hit rate between 81% and 97%.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inter-Coding: An Interleaving and Erasure Coding Based Stable Routing Scheme in Multi-path DTN 互编码:一种基于交错和擦除编码的多径DTN稳定路由方案
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.22
Xiaoming Tang, Panlong Yang, Chang Tian, Laixian Peng, Yubo Yan
The main challenge in DTNs is how to deal with path uncertainty in achieving a reliable routing scheme. All Erasure coding based routing algorithms make the assumption that the underlying path probabilities are known previously and remain constant, which is unpractical. On the other hand, the overall behavior of path probability tends to be stable with the increasing number of paths, which can be used to increase the stability of Erasure coding based schemes. Bearing this in mind, we present Inter-Coding: Inter-Coding is designed to fully combine the reliability of erasure coding, and the stability of interleaving to cope with uncertainties. We evaluate our approach in terms of delivery ratio under different level of uncertainty as well as different interleaving policy, and validate that Inter-Coding offers reliable and stable performance even the path uncertainty and dynamic is high.
在实现可靠路由方案时,如何处理路径不确定性是DTNs面临的主要挑战。所有基于Erasure编码的路由算法都假设底层路径概率是已知的并且保持不变,这是不切实际的。另一方面,随着路径数量的增加,路径概率的总体行为趋于稳定,这可以用来提高基于Erasure编码的方案的稳定性。考虑到这一点,我们提出了Inter-Coding: Inter-Coding的设计充分结合了擦除编码的可靠性和交错编码的稳定性来应对不确定性。从不同不确定度和不同交错策略下的传输率进行了评价,验证了在路径不确定性和动态性较高的情况下,互编码仍然具有可靠和稳定的性能。
{"title":"Inter-Coding: An Interleaving and Erasure Coding Based Stable Routing Scheme in Multi-path DTN","authors":"Xiaoming Tang, Panlong Yang, Chang Tian, Laixian Peng, Yubo Yan","doi":"10.1109/ICPADS.2010.22","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.22","url":null,"abstract":"The main challenge in DTNs is how to deal with path uncertainty in achieving a reliable routing scheme. All Erasure coding based routing algorithms make the assumption that the underlying path probabilities are known previously and remain constant, which is unpractical. On the other hand, the overall behavior of path probability tends to be stable with the increasing number of paths, which can be used to increase the stability of Erasure coding based schemes. Bearing this in mind, we present Inter-Coding: Inter-Coding is designed to fully combine the reliability of erasure coding, and the stability of interleaving to cope with uncertainties. We evaluate our approach in terms of delivery ratio under different level of uncertainty as well as different interleaving policy, and validate that Inter-Coding offers reliable and stable performance even the path uncertainty and dynamic is high.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130356083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantitative Evaluation of TBC Systems of Gas Turbine Blades Using TFEC 燃气轮机叶片TBC系统的TFEC定量评价
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.121
Yong Li, Y. Mao, Zhenmao Chen
In mechanical engineering and aerospace, gas turbine blades are taken as the crucial components, and need special treatment for protection and long-turn service. Therefore, ceramic Thermal Barrier Coating (TBC), acting as the insulation between gas and the alloying bodies of blades, is utilized to guarantee that the gas turbine blades are able to work in the high-temperature and high-stress environment. It is imperative to non-destructively evaluate TBC systems of blades, since the TBC with thin thickness or delimitation will lead to catastrophic accidents of gas turbines. In this paper, Tri-frequency Eddy Current inspection (TFEC) is proposed for quantitative evaluation of TBC systems, which involves assessment of: (1) TBC thickness to identify possible thinning, and (2) thickness and conductivity of bond coating to detect delimitation and degradation. The Levenberg-Marquardt Algorithm is adopted in the inversion for the parameters, which need to be quantified. In the inverse process, the closed-form expressions of the Jacobian Matrix, which is conventionally obtained by using interpolation functions, are derived based on an analytical modeling. The inversion method is verified by a hybrid numerical modeling, which indicates that the proposed TFEC for quantitative evaluation of TBC is valid and applicable.
在机械工程和航空航天中,燃气轮机叶片作为关键部件,需要进行特殊处理以保护和长转使用。因此,利用陶瓷热障涂层(TBC)作为燃气与叶片合金体之间的隔热层,保证燃气轮机叶片能够在高温高应力环境下工作。叶片TBC系统的非破坏性评估势在必行,因为厚度过薄或有边界的TBC会导致燃气轮机的灾难性事故。本文提出了三频涡流检测(TFEC)用于TBC体系的定量评估,包括评估:(1)TBC厚度,以识别可能的减薄;(2)粘结涂层的厚度和电导率,以检测划界和降解。参数的反演采用Levenberg-Marquardt算法,需要对参数进行量化。在反求过程中,通过解析建模,导出了雅可比矩阵的封闭表达式,而雅可比矩阵通常是用插值函数求得的。通过混合数值模拟验证了该反演方法的有效性,表明所提出的TFEC对TBC的定量评价是有效和适用的。
{"title":"Quantitative Evaluation of TBC Systems of Gas Turbine Blades Using TFEC","authors":"Yong Li, Y. Mao, Zhenmao Chen","doi":"10.1109/ICPADS.2010.121","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.121","url":null,"abstract":"In mechanical engineering and aerospace, gas turbine blades are taken as the crucial components, and need special treatment for protection and long-turn service. Therefore, ceramic Thermal Barrier Coating (TBC), acting as the insulation between gas and the alloying bodies of blades, is utilized to guarantee that the gas turbine blades are able to work in the high-temperature and high-stress environment. It is imperative to non-destructively evaluate TBC systems of blades, since the TBC with thin thickness or delimitation will lead to catastrophic accidents of gas turbines. In this paper, Tri-frequency Eddy Current inspection (TFEC) is proposed for quantitative evaluation of TBC systems, which involves assessment of: (1) TBC thickness to identify possible thinning, and (2) thickness and conductivity of bond coating to detect delimitation and degradation. The Levenberg-Marquardt Algorithm is adopted in the inversion for the parameters, which need to be quantified. In the inverse process, the closed-form expressions of the Jacobian Matrix, which is conventionally obtained by using interpolation functions, are derived based on an analytical modeling. The inversion method is verified by a hybrid numerical modeling, which indicates that the proposed TFEC for quantitative evaluation of TBC is valid and applicable.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage BLAST:将流密码应用于外包云存储
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.9
Ki-Woong Park, Chulmin Kim, K. Park
Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers. This paper presents a construction of secure storage, BLAST, enhanced with a stream cipher rather than a block cipher with a novel block accessible encryption mechanism based on streaming ciphers. In BLAST, a hierarchical tree generated in the form of an n-level quad tree is created for each user during the registration phase of the storage system. When a user wants to access the outsourced storage, the user can access their data after encrypting or decrypting it using a sequence of key stream frames derived from the hierarchical tree. The experimental results show that the proposed system achieves significant improved performance than normal streaming/block cipher-based secure storage system in terms of throughput and access latency.
提供安全高效的外包存储是云部署和可用性普及的先兆。为此,现有的设计主要依赖于分组密码,尽管流密码比分组密码计算效率更高。本文提出了一种基于流密码而不是分组密码增强的安全存储结构BLAST,并提出了一种新的基于流密码的分组可访问加密机制。在BLAST中,在存储系统的注册阶段为每个用户创建以n级四叉树形式生成的层次树。当用户希望访问外包存储时,用户可以在使用从层次树派生的密钥流帧序列对其进行加密或解密后访问其数据。实验结果表明,该系统在吞吐量和访问延迟方面都比普通的基于流/分组密码的安全存储系统有显著提高。
{"title":"BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage","authors":"Ki-Woong Park, Chulmin Kim, K. Park","doi":"10.1109/ICPADS.2010.9","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.9","url":null,"abstract":"Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers. This paper presents a construction of secure storage, BLAST, enhanced with a stream cipher rather than a block cipher with a novel block accessible encryption mechanism based on streaming ciphers. In BLAST, a hierarchical tree generated in the form of an n-level quad tree is created for each user during the registration phase of the storage system. When a user wants to access the outsourced storage, the user can access their data after encrypting or decrypting it using a sequence of key stream frames derived from the hierarchical tree. The experimental results show that the proposed system achieves significant improved performance than normal streaming/block cipher-based secure storage system in terms of throughput and access latency.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dual-Path Peer-to-Peer Anonymous Approach 双路径点对点匿名方法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.111
Ehsan Saboori, M. Abbaspour
there are many approaches proposed to provide anonymous peer-to-peer communications. Data sent via peer-to-peer communications is vulnerable to traffic analysis. Traffic analysis is the process of intercepting and analysing messages in order to compromise information from patterns in communications. An intruder can get information about the content of the data, the requester's and provider's identities. Anonymous approaches are designed with the following three goals: to protect the identity of provider, to protect the identity of requester and to protect the contents of transferred data between them. This article presents a new peer-to-peer approach to achieve anonymity between a requester and a provider in a hybrid peer-to-peer information-sharing environment with trusted servers called supper node so that the provider will not be able to identify the requester and no other peers can identify the two communicating parties with certainty. This article shows that the proposed approaches improved reliability and has more security. This approach, based on onion routing and randomization, protects transferring data against traffic analysis attack. The ultimate goal of this anonymous communications approach is to allow a requester to communicate with a provider in such a manner that nobody can determine the requester’s identity and the content of transferred data.
提出了许多提供匿名点对点通信的方法。通过点对点通信发送的数据容易受到流量分析的影响。流量分析是拦截和分析消息的过程,目的是从通信模式中获取信息。入侵者可以获得有关数据内容、请求者和提供者身份的信息。匿名方法的设计有以下三个目标:保护提供者的身份、保护请求者的身份和保护它们之间传输数据的内容。本文提出了一种新的点对点方法,在具有称为超级节点的可信服务器的混合型点对点信息共享环境中实现请求者和提供者之间的匿名性,以便提供者无法识别请求者,而其他对等点也无法确定两个通信方的身份。本文表明,该方法提高了系统的可靠性和安全性。这种方法基于洋葱路由和随机化,保护传输数据免受流量分析攻击。这种匿名通信方法的最终目标是允许请求者以一种没有人能够确定请求者身份和传输数据内容的方式与提供者进行通信。
{"title":"Dual-Path Peer-to-Peer Anonymous Approach","authors":"Ehsan Saboori, M. Abbaspour","doi":"10.1109/ICPADS.2010.111","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.111","url":null,"abstract":"there are many approaches proposed to provide anonymous peer-to-peer communications. Data sent via peer-to-peer communications is vulnerable to traffic analysis. Traffic analysis is the process of intercepting and analysing messages in order to compromise information from patterns in communications. An intruder can get information about the content of the data, the requester's and provider's identities. Anonymous approaches are designed with the following three goals: to protect the identity of provider, to protect the identity of requester and to protect the contents of transferred data between them. This article presents a new peer-to-peer approach to achieve anonymity between a requester and a provider in a hybrid peer-to-peer information-sharing environment with trusted servers called supper node so that the provider will not be able to identify the requester and no other peers can identify the two communicating parties with certainty. This article shows that the proposed approaches improved reliability and has more security. This approach, based on onion routing and randomization, protects transferring data against traffic analysis attack. The ultimate goal of this anonymous communications approach is to allow a requester to communicate with a provider in such a manner that nobody can determine the requester’s identity and the content of transferred data.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Velocity Field Based Modelling and Simulation of Crowd in Confrontation Operations 基于速度场的对抗行动人群建模与仿真
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.95
Congcong Bian, Dan Chen, Shuaiting Wang
In peacekeeping, domestic or combat operations, unanticipated crowd confrontations can occur. As a highly dynamic social group, human crowd in confrontation is a fascinating phenomenon. This study proposes a novel method based on the concept of vector field to formulate the way in which external stimuli may affect the behaviors of individuals in a crowd. Our approach represents each individual as an autonomous agent whose actions are guided by the vector field model. Furthermore, the concept of information entropy has been adopted to describe the connection between individuals’ behaviors and the potential of disorder of the whole crowd. A quantitative analysis on intangible dynamics of a crowd in confrontation is then enabled, which is significant in designing crowd control tactics.
在维持和平、国内或作战行动中,可能会发生意想不到的人群对抗。人类作为一个高度动态的社会群体,群体对抗是一种令人着迷的现象。本研究提出了一种基于向量场概念的新方法来阐述外部刺激对群体中个体行为的影响方式。我们的方法将每个个体表示为一个自主代理,其行为由向量场模型指导。此外,还采用了信息熵的概念来描述个体的行为与整个群体的失序潜力之间的联系。从而对人群对抗过程中的无形动态进行定量分析,对人群控制策略的设计具有重要意义。
{"title":"Velocity Field Based Modelling and Simulation of Crowd in Confrontation Operations","authors":"Congcong Bian, Dan Chen, Shuaiting Wang","doi":"10.1109/ICPADS.2010.95","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.95","url":null,"abstract":"In peacekeeping, domestic or combat operations, unanticipated crowd confrontations can occur. As a highly dynamic social group, human crowd in confrontation is a fascinating phenomenon. This study proposes a novel method based on the concept of vector field to formulate the way in which external stimuli may affect the behaviors of individuals in a crowd. Our approach represents each individual as an autonomous agent whose actions are guided by the vector field model. Furthermore, the concept of information entropy has been adopted to describe the connection between individuals’ behaviors and the potential of disorder of the whole crowd. A quantitative analysis on intangible dynamics of a crowd in confrontation is then enabled, which is significant in designing crowd control tactics.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125669890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1