首页 > 最新文献

2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)最新文献

英文 中文
Delay updating in Software-Defined Datacenter networks 软件定义数据中心网络中的延迟更新
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969122
Ting Qu, Deke Guo, Jia Xu, Zhong Liu
Software-Define Datacenter networks (SDDCs) are constantly changing due to various network update events. A set of involved flows of each update event should be migrated to the feasible paths without congestion. To tackle a single update event, prior methods find and execute a migration sequence so as to transform the initial traffic distribution to the final traffic distribution. However, when handling a queue of multiple update events, the head-of-line blocking problem always appears and considerably lower the efficiency of network update. To tackle this problem, we employ the idea of delay updating which schedules other queued events instead of the blocked head-event, aiming to break the blocking state and provide updating opportunities for other events. We formulate this problem as an optimization problem and propose partial delay updating (PDU) strategy. PDU tackles the queued update events based on their arrival order to preserve the fairness. Moreover, it prefers to just delay those blocked flows, lacking enough bandwidth resources, instead of all flows in the head-event. The evaluation results show that our delay updating strategy achieves 60%–80% reduction in average completion time of update events, compared to FIFO scheduling strategy, in four types of flow size.
软件定义数据中心网络(sddc)由于各种网络更新事件而不断变化。应该将每个更新事件的一组相关流迁移到没有拥塞的可行路径上。为了处理单个更新事件,先前的方法找到并执行迁移序列,从而将初始流量分布转换为最终流量分布。然而,在处理多个更新事件的队列时,总是会出现排队阻塞问题,大大降低了网络更新的效率。为了解决这个问题,我们采用延迟更新的思想,它调度其他排队事件而不是阻塞头事件,旨在打破阻塞状态并为其他事件提供更新机会。我们将此问题化为一个优化问题,并提出部分延迟更新(PDU)策略。PDU按照更新事件到达的顺序处理排队更新事件,以保持更新事件的公平性。而且,它更倾向于只延迟那些阻塞的流,而不是所有的流在head-event中。评估结果表明,在四种流大小的情况下,我们的延迟更新策略与FIFO调度策略相比,更新事件的平均完成时间减少了60% ~ 80%。
{"title":"Delay updating in Software-Defined Datacenter networks","authors":"Ting Qu, Deke Guo, Jia Xu, Zhong Liu","doi":"10.1109/IWQoS.2017.7969122","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969122","url":null,"abstract":"Software-Define Datacenter networks (SDDCs) are constantly changing due to various network update events. A set of involved flows of each update event should be migrated to the feasible paths without congestion. To tackle a single update event, prior methods find and execute a migration sequence so as to transform the initial traffic distribution to the final traffic distribution. However, when handling a queue of multiple update events, the head-of-line blocking problem always appears and considerably lower the efficiency of network update. To tackle this problem, we employ the idea of delay updating which schedules other queued events instead of the blocked head-event, aiming to break the blocking state and provide updating opportunities for other events. We formulate this problem as an optimization problem and propose partial delay updating (PDU) strategy. PDU tackles the queued update events based on their arrival order to preserve the fairness. Moreover, it prefers to just delay those blocked flows, lacking enough bandwidth resources, instead of all flows in the head-event. The evaluation results show that our delay updating strategy achieves 60%–80% reduction in average completion time of update events, compared to FIFO scheduling strategy, in four types of flow size.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Fog-to-Cloud control topology for QoS-aware end-to-end communication 面向面向qos感知的端到端通信的雾到云控制拓扑
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969140
Vitor Barbosa C. Souza, Alejandro Gómez-Cárdenas, X. Masip-Bruin, E. Marín-Tordera, Jordi García
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response time, further enabling the deployment of real-time services. Albeit QoS-aware network researches have been originally focused on data plane issues, the successful deployment of real-time services, demanding very low delay on the allocation of distributed resources, depends on the assessment of the impact of controlling decisions on QoS. Recently, Fog-to-Cloud (F2C) computing has been proposed as a hierarchical layered-architecture relying on a coordinated and distributed management of both Fog and Cloud resources, enabling the distributed and parallel allocation of resources at distinct layers, thus suitably mapping services demands into resources availability. In this paper, we assess the layered management architecture in F2C systems, taking into account its distributed nature. Preliminary results show the tradeoff observed regarding controllers capacity, number of controllers, and number of controller layers in the F2C architecture.
最近新网络概念的部署,如M2M通信或物联网,无疑刺激了一组新服务的部署,既利用了云数据中心的集中资源,也利用了网络边缘设备共享的分布式资源。此外,雾计算最近被提议将减少服务响应时间作为其主要资产之一,从而进一步支持实时服务的部署。尽管QoS感知网络的研究最初集中在数据平面问题上,但实时业务的成功部署依赖于对控制决策对QoS影响的评估,实时业务对分布式资源的分配要求非常低的延迟。最近,雾到云(F2C)计算被提出作为一种依赖于雾和云资源的协调和分布式管理的分层分层架构,使资源在不同的层上进行分布式和并行分配,从而将服务需求适当地映射到资源可用性中。在本文中,我们评估了F2C系统中的分层管理架构,并考虑了其分布式特性。初步结果显示了在F2C架构中观察到的关于控制器容量、控制器数量和控制器层数量的权衡。
{"title":"Towards a Fog-to-Cloud control topology for QoS-aware end-to-end communication","authors":"Vitor Barbosa C. Souza, Alejandro Gómez-Cárdenas, X. Masip-Bruin, E. Marín-Tordera, Jordi García","doi":"10.1109/IWQoS.2017.7969140","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969140","url":null,"abstract":"The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response time, further enabling the deployment of real-time services. Albeit QoS-aware network researches have been originally focused on data plane issues, the successful deployment of real-time services, demanding very low delay on the allocation of distributed resources, depends on the assessment of the impact of controlling decisions on QoS. Recently, Fog-to-Cloud (F2C) computing has been proposed as a hierarchical layered-architecture relying on a coordinated and distributed management of both Fog and Cloud resources, enabling the distributed and parallel allocation of resources at distinct layers, thus suitably mapping services demands into resources availability. In this paper, we assess the layered management architecture in F2C systems, taking into account its distributed nature. Preliminary results show the tradeoff observed regarding controllers capacity, number of controllers, and number of controller layers in the F2C architecture.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
You can hide, but your periodic schedule can't 你可以隐藏,但你的周期计划不能
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969154
Minghua Ma, Kai Zhao, Kaixin Sui, Lei Xu, Yong Li, Dan Pei
The enterprise Wi-Fi networks enable the collection of large-scale users' trajectory datasets, which are highly desired for both research and commercial purposes. Meanwhile, releasing these mobility data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity as the first step to solve the privacy problem and it has been qualitatively recognized that k-anonymity is still risky when the diversity of sensitive information in the k-anonymity set is low. However, there lacks a study that provides a quantitative understanding for trajectory data. In this work, we investigate the schedule-leakage risk for the first time, by presenting a large-scale measurement based analysis of the high schedule-leakage risk over sixteen weeks of trajectory data collected from Tsinghua University, a campus with 2,670 access points deployed in 111 buildings. Using this dataset, we recognize the high risk of the schedule-leakage, i.e., even when 4-anonymity is satisfied, 28% of individuals' schedules are totally disclosed, and 56% are partly disclosed.
企业Wi-Fi网络能够收集大规模用户轨迹数据集,这对于研究和商业目的都是非常需要的。与此同时,公布这些移动数据也引发了严重的隐私问题。大量的工作试图实现k-匿名作为解决隐私问题的第一步,并且已经定性地认识到,当k-匿名集中敏感信息的多样性较低时,k-匿名仍然存在风险。然而,缺乏对轨迹数据提供定量理解的研究。在这项工作中,我们首次调查了进度泄漏风险,通过对从清华大学收集的16周轨迹数据进行大规模测量,分析了高进度泄漏风险,清华大学在111栋建筑中部署了2670个接入点。使用该数据集,我们认识到时间表泄露的高风险,即即使在满足4-匿名的情况下,28%的个人时间表被完全披露,56%的个人时间表被部分披露。
{"title":"You can hide, but your periodic schedule can't","authors":"Minghua Ma, Kai Zhao, Kaixin Sui, Lei Xu, Yong Li, Dan Pei","doi":"10.1109/IWQoS.2017.7969154","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969154","url":null,"abstract":"The enterprise Wi-Fi networks enable the collection of large-scale users' trajectory datasets, which are highly desired for both research and commercial purposes. Meanwhile, releasing these mobility data also raises serious privacy concerns. A large body of work tries to achieve k-anonymity as the first step to solve the privacy problem and it has been qualitatively recognized that k-anonymity is still risky when the diversity of sensitive information in the k-anonymity set is low. However, there lacks a study that provides a quantitative understanding for trajectory data. In this work, we investigate the schedule-leakage risk for the first time, by presenting a large-scale measurement based analysis of the high schedule-leakage risk over sixteen weeks of trajectory data collected from Tsinghua University, a campus with 2,670 access points deployed in 111 buildings. Using this dataset, we recognize the high risk of the schedule-leakage, i.e., even when 4-anonymity is satisfied, 28% of individuals' schedules are totally disclosed, and 56% are partly disclosed.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A secure cloud storage system based on discrete logarithm problem 基于离散对数问题的安全云存储系统
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969107
Jian Zhang, Yang Yang, Yanjiao Chen, Fei Chen
With the development of cloud storage, data owners no longer physically possess their data and thus how to ensure the integrity of their outsourced data becomes a challenging task. Several protocols have been proposed to audit cloud storage, all of which rely mainly on data block tags to check data integrity. However, their block tag constructions employ cryptographic operations, which makes them computationally complex. In this paper, we investigate a secure cloud storage protocol based on the classic discrete logarithm problem. Our protocol generates data block tags with only basic algebraic operations, which brings substantial computation savings compared with previous work. We also strictly prove that the proposed protocol is secure under a definition which captures the real-world uses of cloud storage. In order to fit more application scenarios, we extend the proposed protocol to support data dynamics by employing an index vector and third-party public auditing by using a random masking number, both of which are efficient and provably secure. At last, theoretical analysis and experimental evaluation are provided to validate the superiority of the proposed protocol.
随着云存储的发展,数据所有者不再拥有其数据,因此如何确保其外包数据的完整性成为一项具有挑战性的任务。已经提出了几种审计云存储的协议,它们都主要依赖于数据块标记来检查数据完整性。然而,它们的块标记结构使用加密操作,这使得它们在计算上很复杂。本文研究了一种基于经典离散对数问题的安全云存储协议。我们的协议仅使用基本的代数运算生成数据块标签,与以前的工作相比节省了大量的计算量。我们还严格证明了所提出的协议在捕获云存储的实际使用的定义下是安全的。为了适应更多的应用场景,我们扩展了所提出的协议,通过使用索引向量来支持数据动态,通过使用随机掩码来支持第三方公共审计,这两种方法都是高效且可证明安全的。最后,通过理论分析和实验验证了该协议的优越性。
{"title":"A secure cloud storage system based on discrete logarithm problem","authors":"Jian Zhang, Yang Yang, Yanjiao Chen, Fei Chen","doi":"10.1109/IWQoS.2017.7969107","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969107","url":null,"abstract":"With the development of cloud storage, data owners no longer physically possess their data and thus how to ensure the integrity of their outsourced data becomes a challenging task. Several protocols have been proposed to audit cloud storage, all of which rely mainly on data block tags to check data integrity. However, their block tag constructions employ cryptographic operations, which makes them computationally complex. In this paper, we investigate a secure cloud storage protocol based on the classic discrete logarithm problem. Our protocol generates data block tags with only basic algebraic operations, which brings substantial computation savings compared with previous work. We also strictly prove that the proposed protocol is secure under a definition which captures the real-world uses of cloud storage. In order to fit more application scenarios, we extend the proposed protocol to support data dynamics by employing an index vector and third-party public auditing by using a random masking number, both of which are efficient and provably secure. At last, theoretical analysis and experimental evaluation are provided to validate the superiority of the proposed protocol.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Rethinking transfer optimization in a datacenter: Integrating load balancing with multipath flow control 重新思考数据中心的传输优化:将负载均衡与多路径流控制相结合
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969132
Zhuzhong Qian, K. Wen, S. Zhang, Xiaoliang Wang, Sanglu Lu
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way. In this work, we argue that the adaptive routing, in load balancing sense, and the flow control, in congestion control sense, could be tightly coupled at the transport layer to handle the complex datacenter traffic. We design OmniFlow, a novel transfer protocol which aims to achieve a proper balance between throughput and latency in a datacenter. Firstly, it can simultaneously and precisely measure the queueing latencies on multiple paths between two hosts, which enables it to have more visibility of the path congestion and have better control of the transmission states. Secondly, OmniFlow adaptively integrates the load balancing and flow control modules and shares the same congestion metrics (i.e. queueing latencies) between them. Based on different network conditions, it either dynamically reroutes flows to utilize the bisection bandwidth or proactively adjusts flow rates to bound queueing occupancies. The results of extensive experiments show that OmniFlow can provide both low average and tail latency for small flows without sacrificing the throughput of elephant flows.
生产数据中心中的各种流通常可以分为两种类型:带宽消耗型和延迟敏感型。为了提高数据中心网络的性能,需要有效的负载均衡协议和流量控制协议。然而,由于这两种技术在当前的数据中心中通常是单独使用的,因此它们无法以协调的方式优化网络。在这项工作中,我们认为负载平衡意义上的自适应路由和拥塞控制意义上的流量控制可以在传输层紧密耦合以处理复杂的数据中心流量。我们设计了OmniFlow,一种新的传输协议,旨在实现数据中心吞吐量和延迟之间的适当平衡。首先,它可以同时精确地测量两台主机之间多条路径上的排队延迟,使其对路径拥塞情况有更多的可见性,对传输状态有更好的控制。其次,OmniFlow自适应地集成了负载平衡和流量控制模块,并在它们之间共享相同的拥塞指标(即排队延迟)。根据不同的网络条件,它可以动态地重新路由流以利用分割带宽,或者主动调整流速率以限制排队占用。大量的实验结果表明,OmniFlow可以在不牺牲象流吞吐量的情况下为小流提供低平均和尾部延迟。
{"title":"Rethinking transfer optimization in a datacenter: Integrating load balancing with multipath flow control","authors":"Zhuzhong Qian, K. Wen, S. Zhang, Xiaoliang Wang, Sanglu Lu","doi":"10.1109/IWQoS.2017.7969132","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969132","url":null,"abstract":"The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way. In this work, we argue that the adaptive routing, in load balancing sense, and the flow control, in congestion control sense, could be tightly coupled at the transport layer to handle the complex datacenter traffic. We design OmniFlow, a novel transfer protocol which aims to achieve a proper balance between throughput and latency in a datacenter. Firstly, it can simultaneously and precisely measure the queueing latencies on multiple paths between two hosts, which enables it to have more visibility of the path congestion and have better control of the transmission states. Secondly, OmniFlow adaptively integrates the load balancing and flow control modules and shares the same congestion metrics (i.e. queueing latencies) between them. Based on different network conditions, it either dynamically reroutes flows to utilize the bisection bandwidth or proactively adjusts flow rates to bound queueing occupancies. The results of extensive experiments show that OmniFlow can provide both low average and tail latency for small flows without sacrificing the throughput of elephant flows.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixing SDN and CCN for content-centric Qos aware smart grid architecture 混合SDN和CCN实现以内容为中心的Qos感知智能电网架构
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969139
Nour El Houda Ben Youssef, Yosra Barouni, Sofiane Khalfallah, J. Slama, K. Driss
Providing the new power system with well-tailored communication architecture is a key factor to guarantee expected smart grid capabilities. Among many requirements, quality of service awareness is a relevant feature for the smart grid communication system. Indeed, various data flows are to be exchanged in order to ensure smart grid services, having each different resilience, bandwidth and latency thresholds. Proposing a communication architecture that is inherently quality of service aware for smart grids is, then, the main idea of the present research work. We intend to take advantage of emerging content-centric and software-defined networks whose principles are highly aligned with the smart grid communication system needs.
为新型电力系统提供量身定制的通信架构是保证智能电网性能的关键因素。在众多需求中,服务质量感知是智能电网通信系统的一个相关特征。实际上,为了确保智能电网服务,需要交换各种数据流,这些数据流具有不同的弹性、带宽和延迟阈值。因此,提出一种具有服务质量意识的智能电网通信体系结构是当前研究工作的主要思想。我们打算利用新兴的以内容为中心和软件定义的网络,其原则与智能电网通信系统的需求高度一致。
{"title":"Mixing SDN and CCN for content-centric Qos aware smart grid architecture","authors":"Nour El Houda Ben Youssef, Yosra Barouni, Sofiane Khalfallah, J. Slama, K. Driss","doi":"10.1109/IWQoS.2017.7969139","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969139","url":null,"abstract":"Providing the new power system with well-tailored communication architecture is a key factor to guarantee expected smart grid capabilities. Among many requirements, quality of service awareness is a relevant feature for the smart grid communication system. Indeed, various data flows are to be exchanged in order to ensure smart grid services, having each different resilience, bandwidth and latency thresholds. Proposing a communication architecture that is inherently quality of service aware for smart grids is, then, the main idea of the present research work. We intend to take advantage of emerging content-centric and software-defined networks whose principles are highly aligned with the smart grid communication system needs.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cost-efficient workload scheduling in Cloud Assisted Mobile Edge Computing 云辅助移动边缘计算中经济高效的工作负载调度
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969148
Xiao Ma, Shan Zhang, Wenzhuo Li, Puheng Zhang, Chuang Lin, Xuemin Shen
Mobile edge computing is envisioned as a promising computing paradigm with the advantage of low latency. However, compared with conventional mobile cloud computing, mobile edge computing is constrained in computing capacity, especially under the scenario of dense population. In this paper, we propose a Cloud Assisted Mobile Edge computing (CAME) framework, in which cloud resources are leased to enhance the system computing capacity. To balance the tradeoff between system delay and cost, mobile workload scheduling and cloud outsourcing are further devised. Specifically, the system delay is analyzed by modeling the CAME system as a queuing network. In addition, an optimization problem is formulated to minimize the system delay and cost. The problem is proved to be convex, which can be solved by using the Karush-Kuhn-Tucker (KKT) conditions. Instead of directly solving the KKT conditions, which incurs exponential complexity, an algorithm with linear complexity is proposed by exploiting the linear property of constraints. Extensive simulations are conducted to evaluate the proposed algorithm. Compared with the fair ratio algorithm and the greedy algorithm, the proposed algorithm can reduce the system delay by up to 33% and 46%, respectively, at the same outsourcing cost. Furthermore, the simulation results demonstrate that the proposed algorithm can effectively deal with the challenge of heterogeneous mobile users and balance the tradeoff between computation delay and transmission overhead.
移动边缘计算被设想为一种具有低延迟优势的有前途的计算范式。然而,与传统的移动云计算相比,移动边缘计算的计算能力受到限制,特别是在人口密集的场景下。本文提出了一种云辅助移动边缘计算(Cloud Assisted Mobile Edge computing, come)框架,通过租用云资源来增强系统的计算能力。为了平衡系统延迟和成本之间的平衡,进一步设计了移动工作负载调度和云外包。具体来说,通过将come系统建模为排队网络来分析系统延迟。在此基础上,提出了最小化系统延迟和成本的优化问题。证明了该问题是凸的,可以用Karush-Kuhn-Tucker条件求解。利用约束的线性性,提出了一种具有线性复杂度的算法,而不是直接求解KKT条件导致的指数复杂度。进行了大量的仿真来评估所提出的算法。与公平比率算法和贪婪算法相比,在相同的外包成本下,该算法可将系统延迟分别降低33%和46%。仿真结果表明,该算法能够有效地应对异构移动用户的挑战,并在计算延迟和传输开销之间取得平衡。
{"title":"Cost-efficient workload scheduling in Cloud Assisted Mobile Edge Computing","authors":"Xiao Ma, Shan Zhang, Wenzhuo Li, Puheng Zhang, Chuang Lin, Xuemin Shen","doi":"10.1109/IWQoS.2017.7969148","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969148","url":null,"abstract":"Mobile edge computing is envisioned as a promising computing paradigm with the advantage of low latency. However, compared with conventional mobile cloud computing, mobile edge computing is constrained in computing capacity, especially under the scenario of dense population. In this paper, we propose a Cloud Assisted Mobile Edge computing (CAME) framework, in which cloud resources are leased to enhance the system computing capacity. To balance the tradeoff between system delay and cost, mobile workload scheduling and cloud outsourcing are further devised. Specifically, the system delay is analyzed by modeling the CAME system as a queuing network. In addition, an optimization problem is formulated to minimize the system delay and cost. The problem is proved to be convex, which can be solved by using the Karush-Kuhn-Tucker (KKT) conditions. Instead of directly solving the KKT conditions, which incurs exponential complexity, an algorithm with linear complexity is proposed by exploiting the linear property of constraints. Extensive simulations are conducted to evaluate the proposed algorithm. Compared with the fair ratio algorithm and the greedy algorithm, the proposed algorithm can reduce the system delay by up to 33% and 46%, respectively, at the same outsourcing cost. Furthermore, the simulation results demonstrate that the proposed algorithm can effectively deal with the challenge of heterogeneous mobile users and balance the tradeoff between computation delay and transmission overhead.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130702529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid 当隐私与经济相结合:在智能电网中启用差异化私有电池支持的电表报告
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969167
Zijian Zhang, Wenqiang Cao, Zhan Qin, Liehuang Zhu, Zhengtao Yu, K. Ren
Millions of the smart meters, as essential components, are being deployed ubiquitously in the next generation power system. However, the public privacy concerns over the users' power consumption leakage raise, since the smart meters' unintermittent readings contain customers' behavior patterns. To alleviate this problem, the state-of-the-art techniques are common to use a rechargeable battery to hide the actual power consumption. Unfortunately, none of the existing works completely provide a rigorous privacy protection with reasonable cost under real-world battery settings, i.e., achieving the well-known differential privacy guarantee economically using batteries with limited charge/discharge rate and capacity. To attain this goal, this paper proposes a differentially private meter reading report mechanism. The main idea is to first narrow down the domain of the noise distribution parameter, in order to decrease the possibility of violating the battery limits. It also combines a multi-armed bandit algorithm to further reduce the cost as much as possible. In addition, a novel switch mechanism is proposed to prevent the meter from reporting its reading when the battery limitations might be violated. The theoretical analysis provides a formal proof of the privacy guarantee of the proposed scheme. Besides, experimental results show that the privacy protection of the proposed scheme is at least nine times stronger than that of the existing solutions with acceptable extra cost.
数以百万计的智能电表作为必不可少的组成部分,正在下一代电力系统中无处不在地部署。然而,由于智能电表的不间断读数包含了用户的行为模式,用户的用电泄漏引发了公众对隐私的担忧。为了缓解这个问题,最先进的技术通常是使用可充电电池来隐藏实际的功耗。遗憾的是,现有的作品都没有完全在现实电池设置下以合理的成本提供严格的隐私保护,即使用有限的充放电速率和容量的电池经济地实现众所周知的差异隐私保障。为了实现这一目标,本文提出了一种差别化的私人抄表报告机制。主要思想是首先缩小噪声分布参数的范围,以减少违反电池限制的可能性。它还结合了多臂强盗算法,以进一步尽可能地降低成本。此外,提出了一种新的开关机制,以防止电表在可能违反电池限制时报告其读数。理论分析为所提出方案的隐私保障提供了形式化证明。此外,实验结果表明,在可接受的额外成本下,该方案的隐私保护能力至少是现有方案的9倍。
{"title":"When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid","authors":"Zijian Zhang, Wenqiang Cao, Zhan Qin, Liehuang Zhu, Zhengtao Yu, K. Ren","doi":"10.1109/IWQoS.2017.7969167","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969167","url":null,"abstract":"Millions of the smart meters, as essential components, are being deployed ubiquitously in the next generation power system. However, the public privacy concerns over the users' power consumption leakage raise, since the smart meters' unintermittent readings contain customers' behavior patterns. To alleviate this problem, the state-of-the-art techniques are common to use a rechargeable battery to hide the actual power consumption. Unfortunately, none of the existing works completely provide a rigorous privacy protection with reasonable cost under real-world battery settings, i.e., achieving the well-known differential privacy guarantee economically using batteries with limited charge/discharge rate and capacity. To attain this goal, this paper proposes a differentially private meter reading report mechanism. The main idea is to first narrow down the domain of the noise distribution parameter, in order to decrease the possibility of violating the battery limits. It also combines a multi-armed bandit algorithm to further reduce the cost as much as possible. In addition, a novel switch mechanism is proposed to prevent the meter from reporting its reading when the battery limitations might be violated. The theoretical analysis provides a formal proof of the privacy guarantee of the proposed scheme. Besides, experimental results show that the privacy protection of the proposed scheme is at least nine times stronger than that of the existing solutions with acceptable extra cost.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Verifiable Ranked Search over dynamic encrypted data in cloud computing 云计算中动态加密数据的可验证排序搜索
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969156
Qin Liu, X. Nie, Xuhui Liu, Tao Peng, Jie Wu
Big data has become a hot topic in many areas where the volume and growth rate of data require cloud-based platforms for processing and analysis. Due to open cloud environments with very limited user-side control, existing research suggests encrypting data before outsourcing and adopting Searchable Symmetric Encryption (SSE) to facilitate keyword-based searches on the ciphertexts. However, no prior SSE constructions can simultaneously achieve sublinear search time, efficient update and verification, and on-demand file retrieval, which are all essential to the development of big data. To address this, we propose a Verifiable Ranked Searchable Symmetric Encryption (VRSSE) scheme that allows a user to perform top-K searches on a dynamic file collection while efficiently verifying the correctness of the search results. VRSSE is constructed based on the ranked inverted index, which contains multiple inverted lists that link sets of file nodes relating a specific keyword. For verifiable ranked searches, file nodes are ordered according to their ranks for such a keyword, and information about a node's prior/following neighbor will be encoded with the RSA accumulator. Extensive experiments on real data sets demonstrate the efficiency and effectiveness of our proposed scheme.
大数据已经成为许多领域的热门话题,数据的数量和增长速度需要基于云的平台来处理和分析。由于开放的云环境,用户端控制非常有限,现有研究建议在外包之前对数据进行加密,并采用可搜索对称加密(SSE)来方便对密文的关键字搜索。然而,现有的SSE结构无法同时实现亚线性的搜索时间、高效的更新验证和按需文件检索,而这些都是大数据发展所必需的。为了解决这个问题,我们提出了一个可验证的排名可搜索对称加密(VRSSE)方案,该方案允许用户在动态文件集合上执行top-K搜索,同时有效地验证搜索结果的正确性。VRSSE是基于排序倒排索引构建的,其中包含多个倒排列表,这些倒排列表链接与特定关键字相关的文件节点集。对于可验证的排序搜索,文件节点根据其对此类关键字的排名进行排序,并且关于节点的前/后邻居的信息将使用RSA累加器进行编码。在实际数据集上的大量实验证明了我们提出的方案的效率和有效性。
{"title":"Verifiable Ranked Search over dynamic encrypted data in cloud computing","authors":"Qin Liu, X. Nie, Xuhui Liu, Tao Peng, Jie Wu","doi":"10.1109/IWQoS.2017.7969156","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969156","url":null,"abstract":"Big data has become a hot topic in many areas where the volume and growth rate of data require cloud-based platforms for processing and analysis. Due to open cloud environments with very limited user-side control, existing research suggests encrypting data before outsourcing and adopting Searchable Symmetric Encryption (SSE) to facilitate keyword-based searches on the ciphertexts. However, no prior SSE constructions can simultaneously achieve sublinear search time, efficient update and verification, and on-demand file retrieval, which are all essential to the development of big data. To address this, we propose a Verifiable Ranked Searchable Symmetric Encryption (VRSSE) scheme that allows a user to perform top-K searches on a dynamic file collection while efficiently verifying the correctness of the search results. VRSSE is constructed based on the ranked inverted index, which contains multiple inverted lists that link sets of file nodes relating a specific keyword. For verifiable ranked searches, file nodes are ordered according to their ranks for such a keyword, and information about a node's prior/following neighbor will be encoded with the RSA accumulator. Extensive experiments on real data sets demonstrate the efficiency and effectiveness of our proposed scheme.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
XpressEth: Concise and efficient converged real-time Ethernet XpressEth:简洁高效的融合实时以太网
Pub Date : 2017-06-14 DOI: 10.1109/IWQoS.2017.7969129
Kun Qian, Fengyuan Ren, Danfeng Shan, Wenxue Cheng, Bo Wang
Owing to Ethernet's low cost, high bandwidth and architecture openness, much attention has been paid to develop converged Ethernet to support both time-critical services and conventional communication services on a unified network infrastructure. The greatest challenge here is providing low and deterministic latency for time-critical packets. Recently, the IEEE time sensitive networking task group is launched to address it. However, their framework is complex and unsuitable for commodity switch architecture. In this paper, we propose a concise and efficient converged real-time Ethernet framework called XpressEth, which leverages Dual Preemption mechanism to minimize the delay of time-critical packets, and employs a lightweight Slot Assignment Scheduler to minimize the conflicts among time-critical packets at sources. XpressEth cuts off great burden from both forwarding and scheduling. The simulation results verify that XpressEth can provide ultra-low and deterministic latency for time-critical packets (1.024µ s per hop and zero jitter in 1Gbps network), which is 13× better than time sensitive networking solution, and the side-effect on conventional communication traffic is negligible.
由于以太网具有低成本、高带宽和架构开放性的特点,因此发展融合以太网以在统一的网络基础设施上同时支持时间关键型业务和传统通信业务成为人们关注的焦点。这里最大的挑战是为时间关键型数据包提供低且确定的延迟。最近,IEEE成立了时间敏感网络工作组来解决这一问题。但是,它们的框架比较复杂,不适合商用交换机架构。在本文中,我们提出了一个简洁高效的融合实时以太网框架XpressEth,它利用双抢占机制来最小化时间关键数据包的延迟,并采用轻量级的插槽分配调度程序来最小化时间关键数据包之间的冲突。XpressEth在转发和调度上都减少了很大的负担。仿真结果表明,XpressEth可以为时间关键型数据包提供超低且确定的延迟(在1Gbps网络中每跳1.024µs,零抖动),比时间敏感型网络解决方案提高13倍,对传统通信流量的副作用可以忽略不计。
{"title":"XpressEth: Concise and efficient converged real-time Ethernet","authors":"Kun Qian, Fengyuan Ren, Danfeng Shan, Wenxue Cheng, Bo Wang","doi":"10.1109/IWQoS.2017.7969129","DOIUrl":"https://doi.org/10.1109/IWQoS.2017.7969129","url":null,"abstract":"Owing to Ethernet's low cost, high bandwidth and architecture openness, much attention has been paid to develop converged Ethernet to support both time-critical services and conventional communication services on a unified network infrastructure. The greatest challenge here is providing low and deterministic latency for time-critical packets. Recently, the IEEE time sensitive networking task group is launched to address it. However, their framework is complex and unsuitable for commodity switch architecture. In this paper, we propose a concise and efficient converged real-time Ethernet framework called XpressEth, which leverages Dual Preemption mechanism to minimize the delay of time-critical packets, and employs a lightweight Slot Assignment Scheduler to minimize the conflicts among time-critical packets at sources. XpressEth cuts off great burden from both forwarding and scheduling. The simulation results verify that XpressEth can provide ultra-low and deterministic latency for time-critical packets (1.024µ s per hop and zero jitter in 1Gbps network), which is 13× better than time sensitive networking solution, and the side-effect on conventional communication traffic is negligible.","PeriodicalId":422861,"journal":{"name":"2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1