首页 > 最新文献

2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)最新文献

英文 中文
Application of HAZOP to the Design of Cyber Security Experiments HAZOP在网络安全实验设计中的应用
Masood Mansoori, I. Welch, Kim-Kwang Raymond Choo, R. Maxion
Hazard and Operability studies have been extensively used in chemical engineering and designing safety critical systems. Its rigorous analysis based on discovering deviations and hazard makes it ideal in the study of designs and experiments with confounding variables. In this paper, HAZOP methodology is applied to a case study of network security experiment to reliably measure the IP tracking behavior of malicious websites using a low interaction client honeypot. The experiment's design involves a large number of factors and components which could potentially introduce bias in the study and result in invalid analysis. We demonstrate that HAZOP can be applied to security experiments to create a proper experimental design and properly control potential bias of confounding variables.
危害和可操作性研究已广泛应用于化学工程和设计安全关键系统。它在发现偏差和危险的基础上进行严密的分析,使其成为研究混杂变量的设计和实验的理想方法。本文将HAZOP方法应用于网络安全实验案例研究,利用低交互客户端蜜罐可靠地测量恶意网站的IP跟踪行为。实验的设计涉及大量的因素和组成部分,这些因素和组成部分可能会在研究中引入偏差并导致无效的分析。我们证明HAZOP可以应用于安全实验中,以创建适当的实验设计并适当控制混杂变量的潜在偏差。
{"title":"Application of HAZOP to the Design of Cyber Security Experiments","authors":"Masood Mansoori, I. Welch, Kim-Kwang Raymond Choo, R. Maxion","doi":"10.1109/AINA.2016.115","DOIUrl":"https://doi.org/10.1109/AINA.2016.115","url":null,"abstract":"Hazard and Operability studies have been extensively used in chemical engineering and designing safety critical systems. Its rigorous analysis based on discovering deviations and hazard makes it ideal in the study of designs and experiments with confounding variables. In this paper, HAZOP methodology is applied to a case study of network security experiment to reliably measure the IP tracking behavior of malicious websites using a low interaction client honeypot. The experiment's design involves a large number of factors and components which could potentially introduce bias in the study and result in invalid analysis. We demonstrate that HAZOP can be applied to security experiments to create a proper experimental design and properly control potential bias of confounding variables.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Soft Fall Detection Using Machine Learning in Wearable Devices 在可穿戴设备中使用机器学习的软跌倒检测
D. Genoud, Vincent Cuendet, Julien Torrent
Wearable watches provide very useful linear acceleration information that can be use to detect falls. Howeverfalls not from a standing position are difficult to spot amongother normal activities. This paper describes methods, basedon pattern recognition using machine learning, to improve thedetection of "soft falls". The values of the linear accelerometersare combined in a robust vector that will be presented as inputto the algorithms. The performance of these different machinelearning algorithms is discussed and then, based on the bestscoring method, the size of the time window fed to the systemis studied. The best experiments lead to results showing morethan 0.9 AUC on a real dataset. In a second part, a prototypeimplementation on an Android platform using the best resultsobtained during the experiments is described.
可穿戴手表提供非常有用的线性加速度信息,可用于检测跌倒。然而,非站立姿势的跌倒很难在其他正常活动中发现。本文描述了基于机器学习的模式识别方法来改进“软跌倒”的检测。线性加速度计的值组合在一个鲁棒向量中,该向量将作为算法的输入。讨论了这些不同机器学习算法的性能,然后,基于最佳评分方法,研究了提供给系统的时间窗口的大小。最好的实验结果在真实数据集上显示超过0.9 AUC。在第二部分中,描述了在Android平台上使用实验中获得的最佳结果的原型实现。
{"title":"Soft Fall Detection Using Machine Learning in Wearable Devices","authors":"D. Genoud, Vincent Cuendet, Julien Torrent","doi":"10.1109/AINA.2016.124","DOIUrl":"https://doi.org/10.1109/AINA.2016.124","url":null,"abstract":"Wearable watches provide very useful linear acceleration information that can be use to detect falls. Howeverfalls not from a standing position are difficult to spot amongother normal activities. This paper describes methods, basedon pattern recognition using machine learning, to improve thedetection of \"soft falls\". The values of the linear accelerometersare combined in a robust vector that will be presented as inputto the algorithms. The performance of these different machinelearning algorithms is discussed and then, based on the bestscoring method, the size of the time window fed to the systemis studied. The best experiments lead to results showing morethan 0.9 AUC on a real dataset. In a second part, a prototypeimplementation on an Android platform using the best resultsobtained during the experiments is described.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"61 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Intersection Automata Based Model for Android Application Collusion 基于交集自动机的Android应用程序合流模型
S. Bhandari, V. Laxmi, A. Zemmari, M. Gaur
Android applications need to access and share user's sensitive data. To maintain user's privacy and related data security, it is essential to protect this data. Android security framework enforces permission protected model but it has been shown that applications can bypass this security model. Attacks based on such unauthorized privileges are known as Inter-Component Communication (ICC) Collusion Attacks. In this paper, we propose, a novel automaton framework that allows effective detection of intent based collusion. Our detection framework operates at the component-level. To evaluate our proposal, we developed 14 applications and took 4 applications from Google Play Store. We took all possible combinations from the set of 21 applications. We tested our approach on 210 pairs of applications derived from the set of 21 applications. Time and space complexity of our proposed approach is O(n) where n is the number of components in all the applications under analysis. The experimental results demonstrate that our technique is scalable to application sizing and more efficient as compared to other state of the art approaches.
Android应用程序需要访问和共享用户的敏感数据。为了维护用户的隐私和相关数据的安全,必须保护这些数据。Android安全框架执行权限保护模型,但已经证明,应用程序可以绕过这个安全模型。基于这种未经授权的特权的攻击被称为组件间通信(ICC)合谋攻击。在本文中,我们提出了一种新的自动机框架,可以有效地检测基于意图的合谋。我们的检测框架在组件级运行。为了评估我们的提案,我们开发了14个应用程序,并从Google Play Store中选择了4个应用程序。我们从21个应用程序中选取所有可能的组合。我们在来自21个应用程序集的210对应用程序上测试了我们的方法。我们提出的方法的时间和空间复杂性是O(n),其中n是在分析的所有应用程序中的组件数量。实验结果表明,与其他最先进的方法相比,我们的技术可扩展到应用程序的大小,并且效率更高。
{"title":"Intersection Automata Based Model for Android Application Collusion","authors":"S. Bhandari, V. Laxmi, A. Zemmari, M. Gaur","doi":"10.1109/AINA.2016.92","DOIUrl":"https://doi.org/10.1109/AINA.2016.92","url":null,"abstract":"Android applications need to access and share user's sensitive data. To maintain user's privacy and related data security, it is essential to protect this data. Android security framework enforces permission protected model but it has been shown that applications can bypass this security model. Attacks based on such unauthorized privileges are known as Inter-Component Communication (ICC) Collusion Attacks. In this paper, we propose, a novel automaton framework that allows effective detection of intent based collusion. Our detection framework operates at the component-level. To evaluate our proposal, we developed 14 applications and took 4 applications from Google Play Store. We took all possible combinations from the set of 21 applications. We tested our approach on 210 pairs of applications derived from the set of 21 applications. Time and space complexity of our proposed approach is O(n) where n is the number of components in all the applications under analysis. The experimental results demonstrate that our technique is scalable to application sizing and more efficient as compared to other state of the art approaches.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123124871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption 计算Diffie-Hellman假设下基于身份的严格安全结构化聚合签名方案
Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura
An aggregate signature scheme is a primitive whereby each signer signs an individual document and combines them to compress data size. We propose an aggregate signature scheme which is an extension in two standpoints of structured signatures and ID-based signatures, i.e., we construct an identity-based structured aggregate signature scheme. The proposed scheme is expected to be used with consumer-generated media services. We prove the security of the proposed scheme with tight reduction under the computational Diffie-Hellman (CDH) assumption in the random oracle model. Tight reduction means that the cost of a reduction algorithm is independent of an adversary's capability, i.e., security is not downgraded by the adversary's capability. To the best of our knowledge, no structured signature scheme with tight reduction has been proposed to date because it contains complicated structures that make the reduction inefficient. Note that the security of our scheme captures the switching attack (CCS 2007, Boldyreva et al.) and the re-ordering attack (ISPEC 2007, Shao), which break several famous schemes.
聚合签名方案是一种原语,通过该原语,每个签名者签名一个单独的文档,并将它们组合起来压缩数据大小。本文提出了一种聚合签名方案,它是对结构化签名和基于身份签名两个观点的扩展,即构造了一个基于身份的结构化聚合签名方案。拟议中的方案预计将用于消费者生成的媒体服务。在随机oracle模型的计算性Diffie-Hellman (CDH)假设下,证明了该方案的安全性。严格约简意味着约简算法的成本与对手的能力无关,即安全性不会因对手的能力而降低。据我们所知,迄今为止还没有提出严格约简的结构化签名方案,因为它包含复杂的结构,使得约简效率低下。请注意,我们方案的安全性捕获了切换攻击(CCS 2007, Boldyreva等人)和重新排序攻击(ISPEC 2007, Shao),它们破坏了几个著名的方案。
{"title":"Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption","authors":"Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura","doi":"10.1109/AINA.2016.99","DOIUrl":"https://doi.org/10.1109/AINA.2016.99","url":null,"abstract":"An aggregate signature scheme is a primitive whereby each signer signs an individual document and combines them to compress data size. We propose an aggregate signature scheme which is an extension in two standpoints of structured signatures and ID-based signatures, i.e., we construct an identity-based structured aggregate signature scheme. The proposed scheme is expected to be used with consumer-generated media services. We prove the security of the proposed scheme with tight reduction under the computational Diffie-Hellman (CDH) assumption in the random oracle model. Tight reduction means that the cost of a reduction algorithm is independent of an adversary's capability, i.e., security is not downgraded by the adversary's capability. To the best of our knowledge, no structured signature scheme with tight reduction has been proposed to date because it contains complicated structures that make the reduction inefficient. Note that the security of our scheme captures the switching attack (CCS 2007, Boldyreva et al.) and the re-ordering attack (ISPEC 2007, Shao), which break several famous schemes.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Cooperative Reasoning in Ambient Environment 环境下的分布式协同推理
Amina Jarraya, Khedija Arour, A. Borgi, A. Bouzeghoub
Cooperation plays an important role in distributed reasoning systems in Ambient Environment. In such systems, ambient entities with diverse perception and capabilities have to cooperate during the reasoning process by sharing parts of their local knowledge to achieve a set of common goals. Nevertheless, previous work in distributed reasoning assumed that ambient entities keep their local knowledge private and reason in a top-down manner to reach these goals. Such approaches do not fit with the features of Ambient environment. This paper presents a more tailored distributed peer-to-peer approach for modeling and reasoning with context information using cooperation in Ambient Environment. Ambient entities cooperate by sharing parts of their local context information and reason in a bottom-up manner. We propose an operational model and present a prototype implementation for the proposed approach.
协作在环境分布式推理系统中起着重要的作用。在这样的系统中,具有不同感知和能力的环境实体必须在推理过程中通过分享部分本地知识来合作,以实现一组共同目标。然而,先前的分布式推理工作假设环境实体保持其局部知识的私密性,并以自上而下的方式进行推理以达到这些目标。这种方法不符合Ambient环境的特点。本文提出了一种更有针对性的分布式点对点方法,利用环境环境中的协作对上下文信息进行建模和推理。环境实体以自下而上的方式共享其局部上下文信息和推理。我们提出了一个操作模型,并为所提出的方法提出了一个原型实现。
{"title":"Distributed Cooperative Reasoning in Ambient Environment","authors":"Amina Jarraya, Khedija Arour, A. Borgi, A. Bouzeghoub","doi":"10.1109/AINA.2016.52","DOIUrl":"https://doi.org/10.1109/AINA.2016.52","url":null,"abstract":"Cooperation plays an important role in distributed reasoning systems in Ambient Environment. In such systems, ambient entities with diverse perception and capabilities have to cooperate during the reasoning process by sharing parts of their local knowledge to achieve a set of common goals. Nevertheless, previous work in distributed reasoning assumed that ambient entities keep their local knowledge private and reason in a top-down manner to reach these goals. Such approaches do not fit with the features of Ambient environment. This paper presents a more tailored distributed peer-to-peer approach for modeling and reasoning with context information using cooperation in Ambient Environment. Ambient entities cooperate by sharing parts of their local context information and reason in a bottom-up manner. We propose an operational model and present a prototype implementation for the proposed approach.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scalability Metric for Control Planes in Software Defined Networks (SDNs) 软件定义网络(sdn)中控制平面的可扩展性度量
Murat Karakus, A. Durresi
Software Defined Networking (SDN) architecture promises to mitigate limitations of traditional networking architectures in order to satisfy today's complex networking needs. However, as all new networking architectures, SDN also presents several inevitable technical challenges to be addressed by researchers. Control plane scalability is one of the crucial issues deserving more attention from both academia and industry in SDN as well. There are many existing solutions proposing a way to alleviate the control plane scalability in SDN. However, one prominent common ground they share is that they measure the control plane scalability performance in terms of typical network QoS parameters such as throughput and latency. Although these metrics may be a good performance indicators for quality of service measurement in mid-term and long-term, they may not reflect real scalability performance of control planes in SDN environments. However, a metric for scalability of control plane in SDN can provide network administrators some insights while they construct their SDN networks. In this paper, we firstly explore the roots of control plane scalability problem in SDN as well as proposed existing solutions. We then propose a metric in order to evaluate the control plane scalability in SDN. We give mathematical models of the proposed metric over different control plane designs. Further, we compare the performance of these control plane designs by extensive experiments.
软件定义网络(SDN)体系结构有望减轻传统网络体系结构的局限性,以满足当今复杂的网络需求。然而,作为所有新的网络架构,SDN也提出了一些不可避免的技术挑战,需要研究人员解决。控制平面的可扩展性是SDN中值得学术界和工业界关注的关键问题之一。现有的许多解决方案都提出了一种缓解SDN控制平面可扩展性的方法。然而,它们的一个显著共同点是,它们根据典型的网络QoS参数(如吞吐量和延迟)来衡量控制平面的可伸缩性性能。虽然这些指标可能是衡量中期和长期服务质量的良好性能指标,但它们可能不能反映SDN环境下控制平面的真实可扩展性性能。然而,SDN中控制平面的可扩展性指标可以为网络管理员在构建SDN网络时提供一些见解。本文首先探讨了SDN中控制平面可扩展性问题的根源,并提出了现有的解决方案。然后,我们提出了一个度量来评估SDN中的控制平面可伸缩性。我们给出了不同控制平面设计下的度量的数学模型。此外,我们通过大量的实验比较了这些控制平面设计的性能。
{"title":"A Scalability Metric for Control Planes in Software Defined Networks (SDNs)","authors":"Murat Karakus, A. Durresi","doi":"10.1109/AINA.2016.112","DOIUrl":"https://doi.org/10.1109/AINA.2016.112","url":null,"abstract":"Software Defined Networking (SDN) architecture promises to mitigate limitations of traditional networking architectures in order to satisfy today's complex networking needs. However, as all new networking architectures, SDN also presents several inevitable technical challenges to be addressed by researchers. Control plane scalability is one of the crucial issues deserving more attention from both academia and industry in SDN as well. There are many existing solutions proposing a way to alleviate the control plane scalability in SDN. However, one prominent common ground they share is that they measure the control plane scalability performance in terms of typical network QoS parameters such as throughput and latency. Although these metrics may be a good performance indicators for quality of service measurement in mid-term and long-term, they may not reflect real scalability performance of control planes in SDN environments. However, a metric for scalability of control plane in SDN can provide network administrators some insights while they construct their SDN networks. In this paper, we firstly explore the roots of control plane scalability problem in SDN as well as proposed existing solutions. We then propose a metric in order to evaluate the control plane scalability in SDN. We give mathematical models of the proposed metric over different control plane designs. Further, we compare the performance of these control plane designs by extensive experiments.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Leveraging Co-authorship and Biographical Information for Author Ambiguity Resolution in DBLP 利用共同作者身份和传记信息解决DBLP中的作者歧义
Hussein Hazimeh, Iman Youness, J. Makki, Hassan Noureddine, J. Tscherrig, E. Mugellini, Omar Abou Khaled
Many authors can share the same name and this constitutes a serious problem that affects the relevancy of retrieval results and constitutes our motivation of finding such approach to cover this issue at the author names entity level. Solving such a problem may return with positive gain at the level of document retrieval, web search and the quality of data. This entity resolution task can be tackled as an unsupervised problem, where there are set of features that can be employed for the resolution job, or as supervised problem to compute the similarities among two citations and then classify if they are the same or not. Recent approaches usually utilize features such as: co-author, venue, topic similarity, affiliations and title of publications to deal with author ambiguity. In this paper, three attributes are used to treat this problem sequentially. The co-authorship firstly which is a well-known attribute, and then the topic and affiliation extracted from biographies, which can be found inside the publication, and this is our novelty frame in this paper.
许多作者可以共享相同的名字,这构成了一个严重的问题,影响了检索结果的相关性,并构成了我们寻找这种方法来在作者姓名实体级别覆盖这个问题的动机。解决这样的问题可能会在文档检索、网络搜索和数据质量方面带来积极的回报。这个实体解析任务可以作为一个非监督问题来处理,其中有一组特征可以用于解析工作,或者作为一个监督问题来计算两个引用之间的相似性,然后对它们是否相同进行分类。最近的方法通常利用诸如:合著者、地点、主题相似度、隶属关系和出版物标题等特征来处理作者歧义。在本文中,使用三个属性来依次处理这个问题。共同作者首先是一个众所周知的属性,然后是从传记中提取的主题和从属关系,这些都可以在出版物中找到,这是我们本文的新颖性框架。
{"title":"Leveraging Co-authorship and Biographical Information for Author Ambiguity Resolution in DBLP","authors":"Hussein Hazimeh, Iman Youness, J. Makki, Hassan Noureddine, J. Tscherrig, E. Mugellini, Omar Abou Khaled","doi":"10.1109/AINA.2016.61","DOIUrl":"https://doi.org/10.1109/AINA.2016.61","url":null,"abstract":"Many authors can share the same name and this constitutes a serious problem that affects the relevancy of retrieval results and constitutes our motivation of finding such approach to cover this issue at the author names entity level. Solving such a problem may return with positive gain at the level of document retrieval, web search and the quality of data. This entity resolution task can be tackled as an unsupervised problem, where there are set of features that can be employed for the resolution job, or as supervised problem to compute the similarities among two citations and then classify if they are the same or not. Recent approaches usually utilize features such as: co-author, venue, topic similarity, affiliations and title of publications to deal with author ambiguity. In this paper, three attributes are used to treat this problem sequentially. The co-authorship firstly which is a well-known attribute, and then the topic and affiliation extracted from biographies, which can be found inside the publication, and this is our novelty frame in this paper.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124199411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Openstack Based Accounting and Billing Service for Future Internet Applications 面向未来互联网应用的基于Openstack的计费服务
O. Omosebi, Stelios Sotiriadis, N. Bessis
In latest years, there is a corresponding growth for cloud computing services, especially for those that can be offered as modular components in order to construct Future Internet (FI) applications. In addition, the emergence of inter-clouds as the mean to achieve utilization of various services available from different providers highlights new research directions. Following the business benefits of the cloud services into more advanced and modular systems the requirements for effective accounting and billing with regards to the service usage and the accurate billing of consumers of services becomes challenging. This work focuses on cloud platforms, their platform segregations and services, and presents an accounting and billing service that can be used to rate, charge and bill consumers of within a cloud or an inter-cloud platforms. The solution is developed based on FIWARE platform, which promotes the usage of Cloud Computing in Europe by designing general purpose cloud services namely as Generic Enablers (GEs). Here we design and implement an Accounting and Billing GE that is built upon OpenStack platforms and hosted as an easily to deploy and use cloud service.
近年来,云计算服务有了相应的增长,特别是那些可以作为模块化组件提供以构建未来互联网(FI)应用程序的服务。此外,作为利用不同提供商提供的各种服务的手段,云间的出现突出了新的研究方向。随着云服务的业务优势进入更高级和模块化的系统,与服务使用和服务消费者的准确计费相关的有效会计和计费需求变得具有挑战性。这项工作的重点是云平台及其平台隔离和服务,并提出了一种会计和计费服务,可用于对云内或云间平台内的消费者进行评级、收费和计费。该解决方案是基于FIWARE平台开发的,该平台通过设计通用云服务,即通用使能器(ge),促进了云计算在欧洲的使用。在这里,我们设计并实现了一个基于OpenStack平台的会计和计费GE,并作为易于部署和使用的云服务托管。
{"title":"An Openstack Based Accounting and Billing Service for Future Internet Applications","authors":"O. Omosebi, Stelios Sotiriadis, N. Bessis","doi":"10.1109/AINA.2016.66","DOIUrl":"https://doi.org/10.1109/AINA.2016.66","url":null,"abstract":"In latest years, there is a corresponding growth for cloud computing services, especially for those that can be offered as modular components in order to construct Future Internet (FI) applications. In addition, the emergence of inter-clouds as the mean to achieve utilization of various services available from different providers highlights new research directions. Following the business benefits of the cloud services into more advanced and modular systems the requirements for effective accounting and billing with regards to the service usage and the accurate billing of consumers of services becomes challenging. This work focuses on cloud platforms, their platform segregations and services, and presents an accounting and billing service that can be used to rate, charge and bill consumers of within a cloud or an inter-cloud platforms. The solution is developed based on FIWARE platform, which promotes the usage of Cloud Computing in Europe by designing general purpose cloud services namely as Generic Enablers (GEs). Here we design and implement an Accounting and Billing GE that is built upon OpenStack platforms and hosted as an easily to deploy and use cloud service.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OS 考虑OpenWRT操作系统的树莓派和OLSR无线内容中心网络试验台的实验结果
Admir Barolli, Tetsuya Oda, L. Barolli, M. Takizawa
The Content Centric Networks (CCN) replaces the IP narrow waist of the Internet architecture by a content layer. When a node wants to access a piece of content, it sends an Interest packet to the network. The network then, using the name of the content for routing, forwards the Interest to one or more copies of the content object. In this paper, we present the implementation of a OpenWRT OS based testbed for CCN. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. We transmitted single ICMP flow over UDP. For evaluation we considered hop count, delay and jitter metrics. The experimental results show that the nodes in the testbed were communicating smoothly and we got low values of delay and jitter.
内容中心网络(CCN)用内容层取代了互联网架构的IP窄腰。当一个节点想要访问一段内容时,它向网络发送一个兴趣包。然后,网络使用内容的名称进行路由,将兴趣转发给内容对象的一个或多个副本。在本文中,我们提出了一个基于OpenWRT操作系统的CCN测试平台的实现。本文分析了优化链路状态路由(OLSR)协议在室内场景下的性能。我们在UDP上传输单个ICMP流。为了评估,我们考虑了跳数、延迟和抖动指标。实验结果表明,试验台各节点通信顺畅,时延和抖动值均较低。
{"title":"Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OS","authors":"Admir Barolli, Tetsuya Oda, L. Barolli, M. Takizawa","doi":"10.1109/AINA.2016.153","DOIUrl":"https://doi.org/10.1109/AINA.2016.153","url":null,"abstract":"The Content Centric Networks (CCN) replaces the IP narrow waist of the Internet architecture by a content layer. When a node wants to access a piece of content, it sends an Interest packet to the network. The network then, using the name of the content for routing, forwards the Interest to one or more copies of the content object. In this paper, we present the implementation of a OpenWRT OS based testbed for CCN. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. We transmitted single ICMP flow over UDP. For evaluation we considered hop count, delay and jitter metrics. The experimental results show that the nodes in the testbed were communicating smoothly and we got low values of delay and jitter.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Precision Operation Optimization for Detection-Based Sensor Networks 基于检测的传感器网络的精确运行优化
F. Lin, Chiu-Han Hsiao, Y. Wen
Wireless Sensor Networks (WSNs), which are connected by sensor nodes with wireless communication techniques, are used to collect, process, and transmit the various types of environmental data, such as temperature, fire and smoke detectors, CO gas, humidity, pressure, and video-based data. The network lifetime is limited due to sensors are equipped with batteries. The measurement uncertainties and detection faults lead higher power consumption by retransmissions due to event detection error. These two factors influence with each other. In this study, there are two indicators are introduced for detection errors, false positive (FP) and false negative (FN) to evaluate a detection-based sensor network. For operation perspectives, three models are addressed to near-optimize the network lifetime and detection errors. Linear-and non-linear mathematical planning problems are formulated as (1) to minimize event FP rate subject to FN constraints, (2) to minimize the network energy consumption subject to detection accuracy requirements, turning sensor ON/OFF decisions, the required number of voting nodes, and given FP/FN constraints, and (3) to extend from the previous model as a planning problem for various types of sensor nodes deployed with diverse FP/FN characteristics and costs. An integer programming (IP) tool, LINGO, is adopted to solve the problems with computational experiments on several situations. The experimental results show that the objectives can be achieved, lots of useful hints or configurations can be applied for system implementations to improve system performance efficiently and effectively.
无线传感器网络(wsn)由传感器节点通过无线通信技术连接,用于收集、处理和传输各种类型的环境数据,如温度、火灾和烟雾探测器、CO气体、湿度、压力和基于视频的数据。由于传感器配备电池,网络寿命受到限制。由于事件检测误差导致的测量不确定性和检测故障导致重传功耗增大。这两个因素相互影响。在本研究中,引入假阳性(FP)和假阴性(FN)两个检测误差指标来评估基于检测的传感器网络。从操作角度出发,提出了三种模型来接近优化网络寿命和检测误差。线性和非线性数学规划问题被表述为(1)最小化受FN约束的事件FP率,(2)最小化受检测精度要求、打开/关闭传感器决策、所需投票节点数量和给定FP/FN约束的网络能耗,以及(3)从之前的模型扩展为具有不同FP/FN特性和成本的各种类型的传感器节点的规划问题。采用整数规划(IP)工具LINGO对几种情况下的问题进行了计算实验。实验结果表明,该方法达到了预期的目标,并为系统实现提供了许多有用的提示或配置,从而有效地提高了系统的性能。
{"title":"A Precision Operation Optimization for Detection-Based Sensor Networks","authors":"F. Lin, Chiu-Han Hsiao, Y. Wen","doi":"10.1109/AINA.2016.30","DOIUrl":"https://doi.org/10.1109/AINA.2016.30","url":null,"abstract":"Wireless Sensor Networks (WSNs), which are connected by sensor nodes with wireless communication techniques, are used to collect, process, and transmit the various types of environmental data, such as temperature, fire and smoke detectors, CO gas, humidity, pressure, and video-based data. The network lifetime is limited due to sensors are equipped with batteries. The measurement uncertainties and detection faults lead higher power consumption by retransmissions due to event detection error. These two factors influence with each other. In this study, there are two indicators are introduced for detection errors, false positive (FP) and false negative (FN) to evaluate a detection-based sensor network. For operation perspectives, three models are addressed to near-optimize the network lifetime and detection errors. Linear-and non-linear mathematical planning problems are formulated as (1) to minimize event FP rate subject to FN constraints, (2) to minimize the network energy consumption subject to detection accuracy requirements, turning sensor ON/OFF decisions, the required number of voting nodes, and given FP/FN constraints, and (3) to extend from the previous model as a planning problem for various types of sensor nodes deployed with diverse FP/FN characteristics and costs. An integer programming (IP) tool, LINGO, is adopted to solve the problems with computational experiments on several situations. The experimental results show that the objectives can be achieved, lots of useful hints or configurations can be applied for system implementations to improve system performance efficiently and effectively.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1