首页 > 最新文献

Applied Computing Review最新文献

英文 中文
Student Research Abstract: SplitChain: Blockchain with fully decentralized dynamic sharding resilient to fast adaptive adversaries 摘要:SplitChain:具有完全去中心化动态分片的区块链,具有快速适应对手的弹性
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577207
Arthur Rauch
Over the past few years, blockchains have captured the public's interest with the promise of pseudo-anonymous decentralized exchange infrastructures. However, their potential is hindered by various technical issues, such as their ability to scale with problematic storage and communication costs and a fairly low transaction throughput. In this paper, we present SplitChain, a protocol intended to support the creation of scalable account-based blockchains without undermining decentralization and security. This is achieved by using sharding, i.e. by splitting the blockchain into several lighter chains managed by their own disjoint sets of validators called shards. These shards balance the load by processing disjoint sets of transactions in parallel. SplitChain distinguishes itself from other sharded blockchains by minimizing the synchronization constraints among shards while maintaining security guarantees. Finally, the protocol is designed to dynamically adapt the number of shards to the system load, to avoid over-dimensioning issues of most of the existing sharding-based solutions where the number of shards is static.
在过去的几年里,区块链以其伪匿名去中心化交换基础设施的承诺吸引了公众的兴趣。然而,它们的潜力受到各种技术问题的阻碍,例如它们在有问题的存储和通信成本以及相当低的事务吞吐量的情况下进行扩展的能力。在本文中,我们介绍了SplitChain,这是一种旨在支持创建可扩展的基于账户的区块链而不破坏去中心化和安全性的协议。这是通过使用分片来实现的,即将区块链分成几个更轻的链,由它们自己的不相交的验证器集(称为分片)管理。这些分片通过并行处理不相交的事务集来平衡负载。SplitChain与其他分片区块链的区别在于最小化分片之间的同步约束,同时保持安全保证。最后,该协议被设计为动态地适应系统负载的分片数量,以避免大多数现有的基于分片的解决方案中分片数量是静态的过维问题。
{"title":"Student Research Abstract: SplitChain: Blockchain with fully decentralized dynamic sharding resilient to fast adaptive adversaries","authors":"Arthur Rauch","doi":"10.1145/3555776.3577207","DOIUrl":"https://doi.org/10.1145/3555776.3577207","url":null,"abstract":"Over the past few years, blockchains have captured the public's interest with the promise of pseudo-anonymous decentralized exchange infrastructures. However, their potential is hindered by various technical issues, such as their ability to scale with problematic storage and communication costs and a fairly low transaction throughput. In this paper, we present SplitChain, a protocol intended to support the creation of scalable account-based blockchains without undermining decentralization and security. This is achieved by using sharding, i.e. by splitting the blockchain into several lighter chains managed by their own disjoint sets of validators called shards. These shards balance the load by processing disjoint sets of transactions in parallel. SplitChain distinguishes itself from other sharded blockchains by minimizing the synchronization constraints among shards while maintaining security guarantees. Finally, the protocol is designed to dynamically adapt the number of shards to the system load, to avoid over-dimensioning issues of most of the existing sharding-based solutions where the number of shards is static.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89892912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Synthetic Dataset Generation for the Uveitis Pathology Based on MedWGAN Model 基于MedWGAN模型的葡萄膜炎病理合成数据集生成
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577648
Heithem Sliman, I. Megdiche, Sami Yangui, Aida Drira, Ines Drira, E. Lamine
Artificial Intelligence (AI) has undergone considerable development in recent years in the field of medicine and in particular in decision support diagnostic. However, the development of such algorithms depends on the presence of a sufficiently large amount of data to provide reliable results. Unfortunately in medicine, it is not always possible to provide so much data on all pathologies. This problem is particularly true for rare diseases. In this paper we focus on uveitis, a rare disease in ophthalmology which is the third cause of blindness worldwide. This pathology is difficult to diagnose because of the disparity in prevalence of its etiologies. In order to provide physicians with a diagnostic aid system, it would be necessary to have a representative dataset of epidemiological profiles that have been studied for a long time in this domain. This work proposes a breakthrough in this field by suggesting a methodological framework for the generation of an open source dataset based on the crossing of several epidemiological profiles and using data augmentation techniques. The results of these generated synthetic data have been qualitatively validated by specialist physicians in ophthalmology. Our results are very promising and consist in a first brick to promote research in AI on Uveitis disease.
人工智能(AI)近年来在医学领域,特别是在决策支持诊断方面取得了长足的发展。然而,这种算法的发展依赖于足够大的数据量来提供可靠的结果。不幸的是,在医学上,不可能总是提供所有病理的如此多的数据。这个问题在罕见疾病中尤为明显。葡萄膜炎是一种罕见的眼科疾病,是世界上致盲的第三大原因。这种病理很难诊断,因为其病因的患病率存在差异。为了给医生提供一个诊断辅助系统,有必要拥有一个在这一领域已经研究了很长时间的具有代表性的流行病学概况数据集。这项工作提出了一个突破,提出了一个基于几种流行病学概况交叉和使用数据增强技术生成开源数据集的方法框架。这些合成数据的结果已由眼科专科医生进行了定性验证。我们的结果非常有希望,并且是推动人工智能在葡萄膜炎疾病研究中的第一块砖。
{"title":"A Synthetic Dataset Generation for the Uveitis Pathology Based on MedWGAN Model","authors":"Heithem Sliman, I. Megdiche, Sami Yangui, Aida Drira, Ines Drira, E. Lamine","doi":"10.1145/3555776.3577648","DOIUrl":"https://doi.org/10.1145/3555776.3577648","url":null,"abstract":"Artificial Intelligence (AI) has undergone considerable development in recent years in the field of medicine and in particular in decision support diagnostic. However, the development of such algorithms depends on the presence of a sufficiently large amount of data to provide reliable results. Unfortunately in medicine, it is not always possible to provide so much data on all pathologies. This problem is particularly true for rare diseases. In this paper we focus on uveitis, a rare disease in ophthalmology which is the third cause of blindness worldwide. This pathology is difficult to diagnose because of the disparity in prevalence of its etiologies. In order to provide physicians with a diagnostic aid system, it would be necessary to have a representative dataset of epidemiological profiles that have been studied for a long time in this domain. This work proposes a breakthrough in this field by suggesting a methodological framework for the generation of an open source dataset based on the crossing of several epidemiological profiles and using data augmentation techniques. The results of these generated synthetic data have been qualitatively validated by specialist physicians in ophthalmology. Our results are very promising and consist in a first brick to promote research in AI on Uveitis disease.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"102 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90651227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Privacy Preserving Private Permissioned Blockchains 通用隐私保护私有许可区块链
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577735
Frederic A. Hayek, Mirko Koscina, P. Lafourcade, Charles Olivier-Anclin
Private permissioned blockchains are becoming gradually more sought-after. Such systems are reachable by authorized users, and tend to be completely transparent to whoever interacts with the blockchain. In this paper, we mitigate the latter. Authorized users can now stay unlinked to the transaction they propose in the blockchain while being authenticated before being allowed to interact. As a first contribution, we developed a consensus algorithm for private permissioned blockchains based on Hyperledger Fabric and the Practical Byzantine Fault Tolerance consensus. Building on this blockchain, five additional variations achieving various client-wise privacy preserving levels are proposed. These different protocols allow for different use cases and levels of privacy control and sometimes its revocation by an authority. All our protocols guarantee the unlinkability of transactions to their issuers achieving anonymity or pseudonymity. Miners can also inherit some of the above privacy preserving setting. Naturally, we maintain liveness and safety of the system and its data.
私人许可的区块链正逐渐变得越来越受欢迎。这样的系统可以被授权用户访问,并且对于与区块链交互的任何人来说都是完全透明的。在本文中,我们减轻了后者。授权用户现在可以不链接到他们在区块链中提出的交易,同时在被允许进行交互之前进行身份验证。作为第一个贡献,我们基于超级账本结构和实用拜占庭容错共识为私有许可区块链开发了共识算法。在此区块链的基础上,提出了实现各种客户端隐私保护级别的五个附加变体。这些不同的协议支持不同的用例和级别的隐私控制,有时还允许权威机构撤销隐私控制。我们所有的协议都保证交易与发行者的不可链接性,实现匿名或假名。矿工也可以继承上面的一些隐私保护设置。当然,我们要维护系统及其数据的活力和安全性。
{"title":"Generic Privacy Preserving Private Permissioned Blockchains","authors":"Frederic A. Hayek, Mirko Koscina, P. Lafourcade, Charles Olivier-Anclin","doi":"10.1145/3555776.3577735","DOIUrl":"https://doi.org/10.1145/3555776.3577735","url":null,"abstract":"Private permissioned blockchains are becoming gradually more sought-after. Such systems are reachable by authorized users, and tend to be completely transparent to whoever interacts with the blockchain. In this paper, we mitigate the latter. Authorized users can now stay unlinked to the transaction they propose in the blockchain while being authenticated before being allowed to interact. As a first contribution, we developed a consensus algorithm for private permissioned blockchains based on Hyperledger Fabric and the Practical Byzantine Fault Tolerance consensus. Building on this blockchain, five additional variations achieving various client-wise privacy preserving levels are proposed. These different protocols allow for different use cases and levels of privacy control and sometimes its revocation by an authority. All our protocols guarantee the unlinkability of transactions to their issuers achieving anonymity or pseudonymity. Miners can also inherit some of the above privacy preserving setting. Naturally, we maintain liveness and safety of the system and its data.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"427 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84945426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A DTW Approach for Complex Data A Case Study with Network Data Streams 复杂数据的DTW方法——以网络数据流为例
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577638
Paula Raissa Silva, João Vinagre, J. Gama
Dynamic Time Warping (DTW) is a robust method to measure the similarity between two sequences. This paper proposes a method based on DTW to analyse high-speed data streams. The central idea is to decompose the network traffic into sequences of histograms of packet sizes and then calculate the distance between pairs of such sequences using DTW with Kullback-Leibler (KL) distance. As a baseline, we also compute the Euclidean Distance between the sequences of histograms. Since our preliminary experiments indicate that the distance between two sequences falls within a different range of values for distinct types of streams, we then exploit this distance information for stream classification using a Random Forest. The approach was investigated using recent internet traffic data from a telecommunications company. To illustrate the application of our approach, we conducted a case study with encrypted Internet Protocol Television (IPTV) network traffic data. The goal was to use our DTW-based approach to detect the video codec used in the streams, as well as the IPTV channel. Results strongly suggest that the DTW distance value between the data streams is highly informative for such classification tasks.
动态时间翘曲(DTW)是一种鲁棒的序列相似性度量方法。提出了一种基于DTW的高速数据流分析方法。其核心思想是将网络流量分解为数据包大小的直方图序列,然后使用具有KL距离的DTW计算这些序列对之间的距离。作为基线,我们还计算直方图序列之间的欧几里得距离。由于我们的初步实验表明,对于不同类型的流,两个序列之间的距离落在不同的值范围内,因此我们随后利用该距离信息使用随机森林进行流分类。研究人员利用一家电信公司最近的互联网流量数据对这种方法进行了调查。为了说明我们的方法的应用,我们对加密的互联网协议电视(IPTV)网络流量数据进行了一个案例研究。我们的目标是使用基于dtw的方法来检测流中使用的视频编解码器,以及IPTV频道。结果强烈表明,数据流之间的DTW距离值对于此类分类任务具有很高的信息量。
{"title":"A DTW Approach for Complex Data A Case Study with Network Data Streams","authors":"Paula Raissa Silva, João Vinagre, J. Gama","doi":"10.1145/3555776.3577638","DOIUrl":"https://doi.org/10.1145/3555776.3577638","url":null,"abstract":"Dynamic Time Warping (DTW) is a robust method to measure the similarity between two sequences. This paper proposes a method based on DTW to analyse high-speed data streams. The central idea is to decompose the network traffic into sequences of histograms of packet sizes and then calculate the distance between pairs of such sequences using DTW with Kullback-Leibler (KL) distance. As a baseline, we also compute the Euclidean Distance between the sequences of histograms. Since our preliminary experiments indicate that the distance between two sequences falls within a different range of values for distinct types of streams, we then exploit this distance information for stream classification using a Random Forest. The approach was investigated using recent internet traffic data from a telecommunications company. To illustrate the application of our approach, we conducted a case study with encrypted Internet Protocol Television (IPTV) network traffic data. The goal was to use our DTW-based approach to detect the video codec used in the streams, as well as the IPTV channel. Results strongly suggest that the DTW distance value between the data streams is highly informative for such classification tasks.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77968707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Forecasting and Anomaly Detection of ADLs in single-resident elderly smart homes 单居老年人智能家居中ADLs的无监督预测与异常检测
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577822
Zahraa Khais Shahid, S. Saguna, C. Åhlund
As the aging population increases, predictive health applications for the elderly can provide opportunities for more independent living, increase cost efficiency and improve the quality of health services for senior citizens. Human activity recognition within IoT-based smart homes can enable detection of early health risks related to mild cognitive impairment by providing proactive measurements and interventions to both the elderly and supporting healthcare givers. In this paper, we develop and evaluate a method to forecast activities of daily living (ADL) and detect anomalous behaviour using motion sensor data from smart homes. We build a predictive Multivariate long short term memory (LSTM) model for forecasting activities and evaluate it using data from six real-world smart homes. Further, we use Mahalanobis distance to identify anomalies in user behaviors based on predictions and actual values. In all of the datasets used for forecasting both duration of stay and level of activities using duration of activeness/stillness features, the max NMAE error was about 6%, the values show that the performance of LSTM for predicting the direct next activity versus the seven coming activities are close.
随着人口老龄化的加剧,针对老年人的预测性健康应用可以为老年人提供更加独立生活的机会,提高成本效益,改善老年人的健康服务质量。基于物联网的智能家居中的人类活动识别可以通过向老年人和支持性医疗保健提供者提供主动测量和干预措施,实现与轻度认知障碍相关的早期健康风险检测。在本文中,我们开发并评估了一种方法来预测日常生活活动(ADL),并使用来自智能家居的运动传感器数据检测异常行为。我们建立了一个预测的多元长短期记忆(LSTM)模型,用于预测活动,并使用来自六个现实世界智能家居的数据对其进行评估。此外,我们使用马氏距离来识别基于预测和实际值的用户行为异常。在使用活跃/静止特征的持续时间预测停留时间和活动水平的所有数据集中,最大NMAE误差约为6%,这些值表明LSTM预测直接下一个活动与七个即将到来的活动的性能接近。
{"title":"Unsupervised Forecasting and Anomaly Detection of ADLs in single-resident elderly smart homes","authors":"Zahraa Khais Shahid, S. Saguna, C. Åhlund","doi":"10.1145/3555776.3577822","DOIUrl":"https://doi.org/10.1145/3555776.3577822","url":null,"abstract":"As the aging population increases, predictive health applications for the elderly can provide opportunities for more independent living, increase cost efficiency and improve the quality of health services for senior citizens. Human activity recognition within IoT-based smart homes can enable detection of early health risks related to mild cognitive impairment by providing proactive measurements and interventions to both the elderly and supporting healthcare givers. In this paper, we develop and evaluate a method to forecast activities of daily living (ADL) and detect anomalous behaviour using motion sensor data from smart homes. We build a predictive Multivariate long short term memory (LSTM) model for forecasting activities and evaluate it using data from six real-world smart homes. Further, we use Mahalanobis distance to identify anomalies in user behaviors based on predictions and actual values. In all of the datasets used for forecasting both duration of stay and level of activities using duration of activeness/stillness features, the max NMAE error was about 6%, the values show that the performance of LSTM for predicting the direct next activity versus the seven coming activities are close.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"51 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81874960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Free Willy: Prune System Calls to Enhance Software Security Free Willy:减少系统调用以增强软件安全性
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577593
Charlie Groh, Sergej Proskurin, Apostolis Zarras
Many privilege escalation exploits on Linux abuse vulnerable system calls to threaten the system's security. Therefore, various static and dynamic analysis based seccomp policy generation frameworks emerged. Yet, they either focus on a subset of the available binaries or are constrained by the inherent properties of dynamic, testing-based analysis, which are prone to false negatives. In this paper, we present Jesse, a static-analysis-based framework for generating seccomp policies for ELF binaries. We design and implement an abstract-interpretation-based constant propagation that helps the analyst identify vital system calls for arbitrary, non-obfuscated binaries. Using the extracted results, Jesse allows producing effective seccomp policies, reducing the system's attack vector. To assess Jesse's effectiveness and accuracy, we have applied our system to over 1,000 ELF binaries for Debian 10, and show that---contrary to existing solutions---Jesse produces accurate and safely approximated results, without relying on any properties of the target binaries. In addition, we conduct a case study in which we combine Jesse's constant propagation strategy with container debloating techniques to produce seccomp policies that restrict up to five times more system calls than the Docker's default seccomp policy on average.
Linux上的许多特权升级利用滥用易受攻击的系统调用来威胁系统的安全性。因此,出现了各种基于静态和动态分析的seccomp策略生成框架。然而,它们要么专注于可用二进制文件的一个子集,要么受到动态的、基于测试的分析的固有属性的限制,这些属性容易产生假阴性。在本文中,我们提出了Jesse,一个基于静态分析的框架,用于为ELF二进制文件生成次要策略。我们设计并实现了一个基于抽象解释的常量传播,它可以帮助分析人员识别任意的、非混淆的二进制文件的重要系统调用。使用提取的结果,Jesse允许生成有效的seccomp策略,减少系统的攻击向量。为了评估Jesse的有效性和准确性,我们将我们的系统应用于Debian 10的1000多个ELF二进制文件,并表明——与现有解决方案相反——Jesse产生了准确且安全的近似结果,而不依赖于目标二进制文件的任何属性。此外,我们还进行了一个案例研究,在这个案例中,我们将Jesse的恒定传播策略与容器膨胀技术结合起来,生成了seccomp策略,该策略限制的系统调用平均最多是Docker默认seccomp策略的五倍。
{"title":"Free Willy: Prune System Calls to Enhance Software Security","authors":"Charlie Groh, Sergej Proskurin, Apostolis Zarras","doi":"10.1145/3555776.3577593","DOIUrl":"https://doi.org/10.1145/3555776.3577593","url":null,"abstract":"Many privilege escalation exploits on Linux abuse vulnerable system calls to threaten the system's security. Therefore, various static and dynamic analysis based seccomp policy generation frameworks emerged. Yet, they either focus on a subset of the available binaries or are constrained by the inherent properties of dynamic, testing-based analysis, which are prone to false negatives. In this paper, we present Jesse, a static-analysis-based framework for generating seccomp policies for ELF binaries. We design and implement an abstract-interpretation-based constant propagation that helps the analyst identify vital system calls for arbitrary, non-obfuscated binaries. Using the extracted results, Jesse allows producing effective seccomp policies, reducing the system's attack vector. To assess Jesse's effectiveness and accuracy, we have applied our system to over 1,000 ELF binaries for Debian 10, and show that---contrary to existing solutions---Jesse produces accurate and safely approximated results, without relying on any properties of the target binaries. In addition, we conduct a case study in which we combine Jesse's constant propagation strategy with container debloating techniques to produce seccomp policies that restrict up to five times more system calls than the Docker's default seccomp policy on average.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"4 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90065825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
zCeph: Achieving High Performance On Storage System Using Small Zoned ZNS SSD zCeph:在存储系统上使用小分区ZNS SSD实现高性能
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577758
Jin-Yong Ha, H. Yeom
ZNS SSDs (Zoned Namespace SSD) are block devices that provide stable performance and low price by forcing sequential writes, however their users have to pay the price to guarantee strong write order. In addition, to get the best performance from small zoned ZNS SSDs that give the users control over device-internal parallel elements, the users need to utilize the SSDs in detail. Due to these overheads, Ceph, one of the distributed storage systems, has up to 69% lower performance when using ZNS SSDs compared to using legacy SSD. In this paper, we present zCeph which solves the problems that occur when using small zoned ZNS SSD in storage systems. We implemented zCeph based on legacy Ceph and evaluated it using synthesized and real-world workloads, showing that the performance improved by up to 4.1x and 7x, respectively, compared to the legacy Ceph using ZNS SSD.
ZNS SSD (Zoned Namespace SSD)是一种块设备,通过强制顺序写入提供稳定的性能和低廉的价格,但用户必须付出代价才能保证强写顺序。此外,为了从允许用户控制设备内部并行元素的小型分区ZNS ssd中获得最佳性能,用户需要详细地利用ssd。由于这些开销,Ceph(分布式存储系统之一)在使用ZNS SSD时,与使用传统SSD相比,性能降低了69%。在本文中,我们提出了zCeph,它解决了在存储系统中使用小分区ZNS SSD时出现的问题。我们基于旧Ceph实现了zCeph,并使用合成和实际工作负载对其进行了评估,结果表明,与使用ZNS SSD的旧Ceph相比,zCeph的性能分别提高了4.1倍和7倍。
{"title":"zCeph: Achieving High Performance On Storage System Using Small Zoned ZNS SSD","authors":"Jin-Yong Ha, H. Yeom","doi":"10.1145/3555776.3577758","DOIUrl":"https://doi.org/10.1145/3555776.3577758","url":null,"abstract":"ZNS SSDs (Zoned Namespace SSD) are block devices that provide stable performance and low price by forcing sequential writes, however their users have to pay the price to guarantee strong write order. In addition, to get the best performance from small zoned ZNS SSDs that give the users control over device-internal parallel elements, the users need to utilize the SSDs in detail. Due to these overheads, Ceph, one of the distributed storage systems, has up to 69% lower performance when using ZNS SSDs compared to using legacy SSD. In this paper, we present zCeph which solves the problems that occur when using small zoned ZNS SSD in storage systems. We implemented zCeph based on legacy Ceph and evaluated it using synthesized and real-world workloads, showing that the performance improved by up to 4.1x and 7x, respectively, compared to the legacy Ceph using ZNS SSD.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89732334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Aging in a Real-Time Object Detection System on an Edge Server 边缘服务器实时目标检测系统中的软件老化问题
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577717
Kengo Watanabe, F. Machida, E. Andrade, R. Pietrantuono, Domenico Cotroneo
Real-time object detection systems are rapidly adopted in many edge computing systems for IoT applications. Since the computational resources on edge devices are often limited, continuous real-time object detection may suffer from the degradation of performance and reliability due to software aging. To provide a reliable IoT applications, it is crucial to understand how software aging can manifest in object detection systems under resource-constrained environment. In this paper, we investigate the software aging issue in a real-time object detection system using YOLOv5 running on a Raspberry Pi-based edge server. By performing statistical analysis on the measurement data, we detected a suspicious trend of software aging in the memory usage, which is induced by real-time object detection workloads. We also observe that a system monitoring process is halted due to the shortage of free storage space as a result of YOLOv5's resource dissipation. The monitoring process fails after 24.11, 44.56, and 115.36 hours (on average), when we set the sizes of input images to 160px, 320px, and 640px, respectively, in our system. Our experimental results can be used to plan countermeasures such as software rejuvenation and task offloading.
在物联网应用的许多边缘计算系统中,实时对象检测系统被迅速采用。由于边缘设备上的计算资源往往是有限的,持续的实时目标检测可能会由于软件老化而导致性能和可靠性下降。为了提供可靠的物联网应用,了解软件老化如何在资源受限环境下的目标检测系统中表现出来是至关重要的。在本文中,我们研究了在基于Raspberry pi的边缘服务器上使用YOLOv5运行的实时目标检测系统中的软件老化问题。通过对测量数据进行统计分析,我们发现内存使用中存在软件老化的可疑趋势,这是由实时对象检测工作负载引起的。我们还观察到,由于YOLOv5的资源耗散导致可用存储空间不足,导致系统监控进程停止。当我们在系统中分别将输入图像的大小设置为160px、320px和640px时,监控过程在24.11、44.56和115.36小时(平均)后失败。我们的实验结果可用于规划诸如软件复兴和任务卸载等对策。
{"title":"Software Aging in a Real-Time Object Detection System on an Edge Server","authors":"Kengo Watanabe, F. Machida, E. Andrade, R. Pietrantuono, Domenico Cotroneo","doi":"10.1145/3555776.3577717","DOIUrl":"https://doi.org/10.1145/3555776.3577717","url":null,"abstract":"Real-time object detection systems are rapidly adopted in many edge computing systems for IoT applications. Since the computational resources on edge devices are often limited, continuous real-time object detection may suffer from the degradation of performance and reliability due to software aging. To provide a reliable IoT applications, it is crucial to understand how software aging can manifest in object detection systems under resource-constrained environment. In this paper, we investigate the software aging issue in a real-time object detection system using YOLOv5 running on a Raspberry Pi-based edge server. By performing statistical analysis on the measurement data, we detected a suspicious trend of software aging in the memory usage, which is induced by real-time object detection workloads. We also observe that a system monitoring process is halted due to the shortage of free storage space as a result of YOLOv5's resource dissipation. The monitoring process fails after 24.11, 44.56, and 115.36 hours (on average), when we set the sizes of input images to 160px, 320px, and 640px, respectively, in our system. Our experimental results can be used to plan countermeasures such as software rejuvenation and task offloading.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89101926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign Method 基于快速梯度符号法的数据高效图像转换器安全验证软件平台
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577731
In-pyo Hong, Gyu-ho Choi, Pan-koo Kim, Chang Choi
Recently, research using knowledge distillation in artificial intelligence (AI) has been actively conducted. In particular, data-efficient image transformer (DeiT) is a representative transformer model using knowledge distillation in image classification. However, DeiT's safety against the patch unit's adversarial attacks was not verified. Furthermore, existing DeiT research did not prove security robustness against adversarial attacks. In order to verify the vulnerability of adversarial attacks, we conducted an attack using the fast gradient sign method (FGSM) targeting the DeiT model based on knowledge distillation. As a result of the experiment, an accuracy of 93.99% was shown in DeiT verification based on Normal data (Cifar-10). In contrast, when verified with abnormal data based on FGSM (adversarial examples), the accuracy decreased by 83.49% to 10.50%. By analyzing the vulnerability pattern related to adversarial attacks, we confirmed that FGSM showed successful attack performance through weight control of DeiT. Moreover, we verified that DeiT has security limitations for practical application.
近年来,将知识蒸馏应用于人工智能(AI)的研究得到了积极的开展。其中,数据高效图像变压器(DeiT)是一种利用知识升华进行图像分类的典型变压器模型。然而,DeiT对补丁单元对抗性攻击的安全性尚未得到验证。此外,现有的DeiT研究并没有证明对对抗性攻击的安全性稳健性。为了验证对抗性攻击的脆弱性,我们利用快速梯度符号方法(FGSM)对基于知识蒸馏的DeiT模型进行了攻击。实验结果表明,基于Normal数据(Cifar-10)的DeiT验证准确率为93.99%。相比之下,当使用基于FGSM(对抗性示例)的异常数据进行验证时,准确率下降了83.49%至10.50%。通过分析对抗性攻击相关的漏洞模式,我们证实了FGSM通过DeiT的权重控制实现了成功的攻击性能。此外,我们验证了DeiT在实际应用中存在安全限制。
{"title":"Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign Method","authors":"In-pyo Hong, Gyu-ho Choi, Pan-koo Kim, Chang Choi","doi":"10.1145/3555776.3577731","DOIUrl":"https://doi.org/10.1145/3555776.3577731","url":null,"abstract":"Recently, research using knowledge distillation in artificial intelligence (AI) has been actively conducted. In particular, data-efficient image transformer (DeiT) is a representative transformer model using knowledge distillation in image classification. However, DeiT's safety against the patch unit's adversarial attacks was not verified. Furthermore, existing DeiT research did not prove security robustness against adversarial attacks. In order to verify the vulnerability of adversarial attacks, we conducted an attack using the fast gradient sign method (FGSM) targeting the DeiT model based on knowledge distillation. As a result of the experiment, an accuracy of 93.99% was shown in DeiT verification based on Normal data (Cifar-10). In contrast, when verified with abnormal data based on FGSM (adversarial examples), the accuracy decreased by 83.49% to 10.50%. By analyzing the vulnerability pattern related to adversarial attacks, we confirmed that FGSM showed successful attack performance through weight control of DeiT. Moreover, we verified that DeiT has security limitations for practical application.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"137 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89146499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reducing Power Consumption during Server Maintenance on Edge Computing Infrastructures 降低边缘计算基础设施维护服务器的功耗
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577739
Felipe Rubin, Paulo S. Souza, T. Ferreto
Edge servers must routinely undergo maintenance to ensure the environment's performance and security. During maintenance, applications hosted by outdated servers must be relocated to alternative servers to avoid downtime. In distributed edges with servers spread across large regions, ensuring that applications are not migrated to servers too far away from their users to avoid high latency hardens the maintenance planning. In addition, the limited power supply of edge sites restricts the list of suitable alternative hosts for the applications even further. Past work has focused on optimizing maintenance or increasing the power efficiency of edge computing infrastructures. However, no work addresses both objectives together. This paper presents Emma, a maintenance strategy that reduces power consumption during edge server maintenance without excessively extending maintenance time or increasing application latency. Experiments show that Emma can minimize power consumption during maintenance by up to 26.48% compared to strategies from the literature.
边缘服务器必须定期进行维护,以确保环境的性能和安全性。在维护期间,必须将由过时服务器托管的应用程序重新定位到替代服务器,以避免停机。在服务器分布在大区域的分布式边缘中,确保应用程序不会迁移到离用户太远的服务器上,以避免高延迟,这加强了维护计划。此外,边缘站点的有限电源进一步限制了应用程序的合适替代主机列表。过去的工作主要集中在优化维护或提高边缘计算基础设施的功率效率上。然而,没有一项工作能同时解决这两个目标。本文介绍了Emma,这是一种维护策略,可以在不过度延长维护时间或增加应用程序延迟的情况下降低边缘服务器维护期间的功耗。实验表明,与文献中的策略相比,Emma可以将维护期间的功耗降低26.48%。
{"title":"Reducing Power Consumption during Server Maintenance on Edge Computing Infrastructures","authors":"Felipe Rubin, Paulo S. Souza, T. Ferreto","doi":"10.1145/3555776.3577739","DOIUrl":"https://doi.org/10.1145/3555776.3577739","url":null,"abstract":"Edge servers must routinely undergo maintenance to ensure the environment's performance and security. During maintenance, applications hosted by outdated servers must be relocated to alternative servers to avoid downtime. In distributed edges with servers spread across large regions, ensuring that applications are not migrated to servers too far away from their users to avoid high latency hardens the maintenance planning. In addition, the limited power supply of edge sites restricts the list of suitable alternative hosts for the applications even further. Past work has focused on optimizing maintenance or increasing the power efficiency of edge computing infrastructures. However, no work addresses both objectives together. This paper presents Emma, a maintenance strategy that reduces power consumption during edge server maintenance without excessively extending maintenance time or increasing application latency. Experiments show that Emma can minimize power consumption during maintenance by up to 26.48% compared to strategies from the literature.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89677045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1