首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities 边缘计算AI-物联网智能城市综合节能智能交通系统专题介绍
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-30 DOI: 10.1145/3584745
Vicente García Díaz, Jerry Chun‐wei Lin, Juan Antonio Morente Molinera
Most countries around the world are trying to make the idea of “smart cities” a reality by building the basic infrastructure needed to use the technology. In this case, edge computing (EC) is very important for faster data processing and faster responses at the edges of the network. In recent years, smart cities have started using EC to improve building security, home automation, urban parking systems, and traffic and city management. Traditional IoT networks collect data and send it to a central cloud for further processing. EC devices, in contrast, can process and analyze the data themselves, as well as reduce the load on the network. In addition, mobile crowdsensing (MCS) and mobile edge computing (MEC) provide the crowdsensing services needed for a smart city in a densely populated area. These techniques provide a specific service at a specific location and for a specific period of time. However, they are better suited to support technical communication services with static edges than the human side. This leads to a dynamic extension of MEC called human-enabled edge computing (HEC), which combines people, devices, the Internet, and information with the architecture of MEC and the ability to sense MCS. In general, a traditional sensor network does not take context into account as well as HEC because it uses smart devices such as smartphones and wearables that people carry with them. It also uses data from mobile devices to obtain crowd intelligence and provide services based on what people want. Edge computing involves both people and things and therefore requires intelligent methods for classification and decision making, such as machine learning, data mining, and cognitive intelligence. Edge intelligence is used in the smart city to leverage data from different parts of the smart city. This is done by running analytics algorithms at the edge of the city. This speeds up the time it takes networked devices to make decisions and improves the quality of the data. Smart cities are taking advantage of HEC and next-generation wireless technology to connect things to people and the Internet of Things (IoT), resulting in powerful services and automation in the creation of dense and changing data sets. A successful edge computing infrastructure requires a local server, AI, and connections to computing systems in mobile devices, cars, and the Internet of Things (IoT). The research community has responded with enthusiasm. Only research articles that meet the journal’s requirements are accepted for publication after peer review. In this special issue, we have received 34 articles, and we finally include only one article, which has been fairly peerreviewed and accepted for publication. The following points highlight the remarkable scientific achievements of the accepted article.
世界上大多数国家都在努力通过建设使用这项技术所需的基本基础设施来实现“智能城市”的想法。在这种情况下,边缘计算(EC)对于网络边缘更快的数据处理和更快的响应非常重要。近年来,智能城市已经开始使用EC来改善建筑安全、家庭自动化、城市停车系统以及交通和城市管理。传统的物联网网络收集数据并将其发送到中央云进行进一步处理。相比之下,EC设备可以自己处理和分析数据,并减少网络负载。此外,移动众筹(MCS)和移动边缘计算(MEC)为人口稠密地区的智能城市提供了所需的众筹服务。这些技术在特定的位置和特定的时间段内提供特定的服务。然而,与人工方面相比,它们更适合支持具有静态边缘的技术通信服务。这导致了MEC的动态扩展,称为人工边缘计算(HEC),它将人、设备、互联网和信息与MEC的架构和感知MCS的能力相结合。一般来说,传统的传感器网络不像HEC那样考虑上下文,因为它使用智能手机和人们随身携带的可穿戴设备等智能设备。它还使用来自移动设备的数据来获取人群情报,并根据人们的需求提供服务。边缘计算涉及人和物,因此需要智能的分类和决策方法,如机器学习、数据挖掘和认知智能。边缘智能用于智能城市,以利用智能城市不同部分的数据。这是通过在城市边缘运行分析算法来实现的。这加快了网络设备做出决策所需的时间,并提高了数据质量。智能城市正在利用HEC和下一代无线技术将事物与人和物联网(IoT)连接起来,从而在创建密集且不断变化的数据集时提供强大的服务和自动化。一个成功的边缘计算基础设施需要本地服务器、人工智能以及与移动设备、汽车和物联网(IoT)中的计算系统的连接。研究界对此反应热烈。只有符合期刊要求的研究文章才能在同行评审后发表。在这期特刊中,我们收到了34篇文章,最后我们只收录了一篇,这篇文章经过了同行评审并被接受发表。以下几点突出了被接受的文章所取得的显著科学成就。
{"title":"Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities","authors":"Vicente García Díaz, Jerry Chun‐wei Lin, Juan Antonio Morente Molinera","doi":"10.1145/3584745","DOIUrl":"https://doi.org/10.1145/3584745","url":null,"abstract":"Most countries around the world are trying to make the idea of “smart cities” a reality by building the basic infrastructure needed to use the technology. In this case, edge computing (EC) is very important for faster data processing and faster responses at the edges of the network. In recent years, smart cities have started using EC to improve building security, home automation, urban parking systems, and traffic and city management. Traditional IoT networks collect data and send it to a central cloud for further processing. EC devices, in contrast, can process and analyze the data themselves, as well as reduce the load on the network. In addition, mobile crowdsensing (MCS) and mobile edge computing (MEC) provide the crowdsensing services needed for a smart city in a densely populated area. These techniques provide a specific service at a specific location and for a specific period of time. However, they are better suited to support technical communication services with static edges than the human side. This leads to a dynamic extension of MEC called human-enabled edge computing (HEC), which combines people, devices, the Internet, and information with the architecture of MEC and the ability to sense MCS. In general, a traditional sensor network does not take context into account as well as HEC because it uses smart devices such as smartphones and wearables that people carry with them. It also uses data from mobile devices to obtain crowd intelligence and provide services based on what people want. Edge computing involves both people and things and therefore requires intelligent methods for classification and decision making, such as machine learning, data mining, and cognitive intelligence. Edge intelligence is used in the smart city to leverage data from different parts of the smart city. This is done by running analytics algorithms at the edge of the city. This speeds up the time it takes networked devices to make decisions and improves the quality of the data. Smart cities are taking advantage of HEC and next-generation wireless technology to connect things to people and the Internet of Things (IoT), resulting in powerful services and automation in the creation of dense and changing data sets. A successful edge computing infrastructure requires a local server, AI, and connections to computing systems in mobile devices, cars, and the Internet of Things (IoT). The research community has responded with enthusiasm. Only research articles that meet the journal’s requirements are accepted for publication after peer review. In this special issue, we have received 34 articles, and we finally include only one article, which has been fairly peerreviewed and accepted for publication. The following points highlight the remarkable scientific achievements of the accepted article.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 2"},"PeriodicalIF":5.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43272319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Section on Cyber Security in Internet of Vehicles 车联网网络安全专题介绍
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-30 DOI: 10.1145/3584746
Ching-Hsien Hsu, Amir H. Alavi, M. Dong
a
{"title":"Introduction to the Special Section on Cyber Security in Internet of Vehicles","authors":"Ching-Hsien Hsu, Amir H. Alavi, M. Dong","doi":"10.1145/3584746","DOIUrl":"https://doi.org/10.1145/3584746","url":null,"abstract":"a","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 6"},"PeriodicalIF":5.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47228162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things “物联网中的多智能体系统和服务”特刊简介
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-30 DOI: 10.1145/3584744
A. Ciortea, Xiao-Wan Zhu, C. Pu, Munindar P. Singh
Over the past two decades, the Internet of Things (IoT) has evolved from silos built around custom protocol stacks into a system of systems built around standards—and the recent standardization of the Web of Things (WoT) at the IETF and the W3C further facilitates application-layer interoperability in the IoT. Constrained Web servers now target devices with as little as 10 KiB of RAM and 100 KiB of ROM, which means sensors and actuators can be abstracted behind embedded Web services. Going further, the WoT aims to provide uniform access to IoT devices through the Web—by hiding the protocols and interfaces used to access the devices behind abstract interaction patterns and hypermedia controls. From the edge of the network to the cloud, the Web is now emerging as a uniform hypermedia fabric that interconnects IoT devices and digital services. Still, many research questions remain open. IoT systems are not only inherently complex and heterogeneous, but also highly dynamic as the availability of devices (and their services) changes continually. Moreover, the IoT is inherently decentralized because it is not under the control of a single entity. In such settings, traditional engineering paradigms become impractical. Researchers and practitioners in the IoT community therefore require means to build sophisticated software agents that can achieve their design objectives through flexible interaction with other entities in their system. Many of the underlying research questions the IoT community is now confronted with—such as how to balance goal-directed and reactive behavior in software agents, or how to design and govern interactions in a decentralized IoT—have been investigated in the scientific literature on multiagent systems. At the same time, the IoT unlocks new practical use cases for multiagent systems.
在过去的二十年里,物联网(IoT)已经从围绕自定义协议栈构建的竖井发展成为围绕标准构建的系统系统,IETF和W3C最近对物联网(WoT)的标准化进一步促进了物联网中应用层的互操作性。受限的Web服务器现在的目标设备只有10 KiB的RAM和100 KiB的ROM,这意味着传感器和执行器可以抽象到嵌入式Web服务后面。更进一步,WoT旨在通过Web提供对物联网设备的统一访问——将用于访问设备的协议和接口隐藏在抽象交互模式和超媒体控件后面。从网络边缘到云,网络现在正在成为一种统一的超媒体结构,将物联网设备和数字服务互连起来。尽管如此,许多研究问题仍然悬而未决。物联网系统不仅固有地复杂和异构,而且随着设备(及其服务)的可用性不断变化,它也是高度动态的。此外,物联网本质上是去中心化的,因为它不受单个实体的控制。在这种情况下,传统的工程模式变得不切实际。因此,物联网社区的研究人员和从业者需要建立复杂的软件代理,通过与系统中其他实体的灵活交互来实现其设计目标。物联网社区现在面临的许多潜在研究问题,如如何平衡软件代理中的目标导向和反应行为,或如何设计和管理去中心化物联网中的交互,都已在多代理系统的科学文献中进行了研究。与此同时,物联网为多智能体系统解锁了新的实际用例。
{"title":"Introduction to the Special Issue on Multiagent Systems and Services in the Internet of Things","authors":"A. Ciortea, Xiao-Wan Zhu, C. Pu, Munindar P. Singh","doi":"10.1145/3584744","DOIUrl":"https://doi.org/10.1145/3584744","url":null,"abstract":"Over the past two decades, the Internet of Things (IoT) has evolved from silos built around custom protocol stacks into a system of systems built around standards—and the recent standardization of the Web of Things (WoT) at the IETF and the W3C further facilitates application-layer interoperability in the IoT. Constrained Web servers now target devices with as little as 10 KiB of RAM and 100 KiB of ROM, which means sensors and actuators can be abstracted behind embedded Web services. Going further, the WoT aims to provide uniform access to IoT devices through the Web—by hiding the protocols and interfaces used to access the devices behind abstract interaction patterns and hypermedia controls. From the edge of the network to the cloud, the Web is now emerging as a uniform hypermedia fabric that interconnects IoT devices and digital services. Still, many research questions remain open. IoT systems are not only inherently complex and heterogeneous, but also highly dynamic as the availability of devices (and their services) changes continually. Moreover, the IoT is inherently decentralized because it is not under the control of a single entity. In such settings, traditional engineering paradigms become impractical. Researchers and practitioners in the IoT community therefore require means to build sophisticated software agents that can achieve their design objectives through flexible interaction with other entities in their system. Many of the underlying research questions the IoT community is now confronted with—such as how to balance goal-directed and reactive behavior in software agents, or how to design and govern interactions in a decentralized IoT—have been investigated in the scientific literature on multiagent systems. At the same time, the IoT unlocks new practical use cases for multiagent systems.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42518489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN) 间歇连接移动网络(ICMN)的三方传输方法
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-17 DOI: 10.1145/3433545
Ramesh Sekaran, Fadi M. Al-Turjman, Rizwan Patan, V. Ramasamy
Mobile network is a collection of devices with dynamic behavior where devices keep moving, which may lead to the network track to be connected or disconnected. This type of network is called Intermittently Connected Mobile Network (ICMN). The ICMN network is designed by splitting the region into `n' regions, ensuring it is a disconnected network. This network holds the same topological structure with mobile devices in it. This type of network routing is a challenging task. Though research keeps deriving techniques to achieve efficient routing in ICMN such as Epidemic, Flooding, Spray, copy case, Probabilistic, and Wait, these derived techniques for routing in ICMN are wise with higher packet delivery ratio, minimum latency, lesser overhead, and so on. A new routing schedule has been enacted comprising three optimization techniques such as Privacy-Preserving Ant Routing Protocol (PPARP), Privacy-Preserving Routing Protocol (PPRP), and Privacy-Preserving Bee Routing Protocol (PPBRP). In this paper, the enacted technique gives an optimal result following various network characteristics. Algorithms embedded with productive routing provide maximum security. Results are pointed out by analysis taken from spreading false devices into the network and its effectiveness at worst case. This paper also aids with the comparative results of enacted algorithms for secure routing in ICMN.
移动网络是具有动态行为的设备的集合,设备不断移动,可能导致网络轨道连接或断开。这种类型的网络称为间歇连接移动网络(ICMN)。ICMN网络通过将一个区域划分为“n”个区域来设计,以确保它是一个不连接的网络。该网络具有与移动设备相同的拓扑结构。这种类型的网络路由是一项具有挑战性的任务。在ICMN中实现高效路由的方法有Epidemic、Flooding、Spray、copy case、probistic、Wait等,但这些方法都具有较高的数据包传送率、最小的延迟、较小的开销等优点。制定了一种新的路由计划,包括三种优化技术,即隐私保护蚂蚁路由协议(PPARP)、隐私保护路由协议(PPRP)和隐私保护蜜蜂路由协议(PPBRP)。在本文中,所制定的技术给出了考虑各种网络特性的最优结果。嵌入生产性路由的算法提供了最大的安全性。通过对虚假设备在网络中的传播及其在最坏情况下的有效性的分析,指出了结果。本文还比较了ICMN中已制定的安全路由算法的结果。
{"title":"Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)","authors":"Ramesh Sekaran, Fadi M. Al-Turjman, Rizwan Patan, V. Ramasamy","doi":"10.1145/3433545","DOIUrl":"https://doi.org/10.1145/3433545","url":null,"abstract":"Mobile network is a collection of devices with dynamic behavior where devices keep moving, which may lead to the network track to be connected or disconnected. This type of network is called Intermittently Connected Mobile Network (ICMN). The ICMN network is designed by splitting the region into `n' regions, ensuring it is a disconnected network. This network holds the same topological structure with mobile devices in it. This type of network routing is a challenging task. Though research keeps deriving techniques to achieve efficient routing in ICMN such as Epidemic, Flooding, Spray, copy case, Probabilistic, and Wait, these derived techniques for routing in ICMN are wise with higher packet delivery ratio, minimum latency, lesser overhead, and so on. A new routing schedule has been enacted comprising three optimization techniques such as Privacy-Preserving Ant Routing Protocol (PPARP), Privacy-Preserving Routing Protocol (PPRP), and Privacy-Preserving Bee Routing Protocol (PPBRP). In this paper, the enacted technique gives an optimal result following various network characteristics. Algorithms embedded with productive routing provide maximum security. Results are pointed out by analysis taken from spreading false devices into the network and its effectiveness at worst case. This paper also aids with the comparative results of enacted algorithms for secure routing in ICMN.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 18"},"PeriodicalIF":5.3,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46702566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-Manufacturing Systems 基于网络制造系统的小表面缺陷智能检测的数字孪生
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-17 DOI: 10.1145/3571734
Yirui Wu, Hao Cao, Guoqiang Yang, Tong Lu, Shaohua Wan
With the remarkable technological development in cyber-physical systems, industry 4.0 has evolved by a significant concept named as digital twin (DT). However, it’s still difficult to construct relationship between twin simulation and real scenario considering dynamic variations, especially when dealing with small surface defect detection tasks with high performance and computation resource requirement. In this paper, we aim to construct cyber-manufacturing systems to achieve a DT solution for small surface defect detection task. Focusing on DT based solution, the proposed system consists of an Edge-Cloud architecture and a surface defect detection algorithm. Considering dynamic characteristics and real-time response requirement, Edge-Cloud architecture is built to achieve smart manufacturing by efficiently collecting, processing, analyzing, and storing data produced by factory. A deep learning based algorithm is then constructed to detect surface defeats based on multi-modal data, i.e., imaging and depth data. Experiments show the proposed algorithm could achieve high accuracy and recall in small defeat detection task, thus constructing DT in cyber-manufacturing.
随着网络物理系统的显著技术发展,工业4.0已经演变为一个重要的概念,称为数字孪生(DT)。然而,考虑到动态变化,孪生模拟与真实场景之间的关系仍然难以建立,特别是在处理高性能和计算资源要求高的小型表面缺陷检测任务时。在本文中,我们旨在构建网络制造系统,以实现小表面缺陷检测任务的DT解决方案。该系统以基于DT的解决方案为重点,由边缘云架构和表面缺陷检测算法组成。考虑到动态特性和实时响应需求,构建Edge-Cloud架构,通过高效采集、处理、分析和存储工厂生产数据,实现智能制造。然后构建基于深度学习的算法来检测基于多模态数据(即成像和深度数据)的地表失败。实验表明,该算法能够在小型故障检测任务中达到较高的准确率和召回率,从而构建网络制造中的故障检测。
{"title":"Digital Twin of Intelligent Small Surface Defect Detection with Cyber-Manufacturing Systems","authors":"Yirui Wu, Hao Cao, Guoqiang Yang, Tong Lu, Shaohua Wan","doi":"10.1145/3571734","DOIUrl":"https://doi.org/10.1145/3571734","url":null,"abstract":"With the remarkable technological development in cyber-physical systems, industry 4.0 has evolved by a significant concept named as digital twin (DT). However, it’s still difficult to construct relationship between twin simulation and real scenario considering dynamic variations, especially when dealing with small surface defect detection tasks with high performance and computation resource requirement. In this paper, we aim to construct cyber-manufacturing systems to achieve a DT solution for small surface defect detection task. Focusing on DT based solution, the proposed system consists of an Edge-Cloud architecture and a surface defect detection algorithm. Considering dynamic characteristics and real-time response requirement, Edge-Cloud architecture is built to achieve smart manufacturing by efficiently collecting, processing, analyzing, and storing data produced by factory. A deep learning based algorithm is then constructed to detect surface defeats based on multi-modal data, i.e., imaging and depth data. Experiments show the proposed algorithm could achieve high accuracy and recall in small defeat detection task, thus constructing DT in cyber-manufacturing.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"1 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44237622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience 增强用户体验质量的意图驱动的DaaS管理框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-14 DOI: 10.1145/3488586
Chaofeng Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, Kenichi Tayama
Desktop as a Service (DaaS) has become widely used by enterprises. In 2020, the use of DaaS increased dramatically due to the demand to work remotely from home during the COVID-19 pandemic. The DaaS market is expected to continue growing rapidly [1]. The quality of experience (QoE) of a DaaS service has been one of the main factors to enhance DaaS user satisfaction. To ensure user QoE, the amount of cloud computation resources for a DaaS service must be appropriately designed. We propose an Intent-driven DaaS Management (IDM) framework to autonomously determine the cloud-resource-amount configurations for a given DaaS QoE requirement. IDM enables autonomous resource design by abstracting the knowledge about the dependency between DaaS workload, resource configuration, and performance from previous DaaS performance log data. To ensure the IDM framework's applicability to actual DaaS services, we analyzed five main challenges in applying the IDM framework to actual DaaS services: identifying the resource-design objective, quantifying DaaS QoE, addressing low log data availability, designing performance-inference models, and addressing low resource variations in the log data. We addressed these challenges through detailed designing of IDM modules. The effectiveness of the IDM framework was assessed from the aspects of DaaS performance-inference precision, DaaS resource design, and time and human-resource cost reduction.
桌面即服务(DaaS)已被企业广泛使用。2020年,由于新冠肺炎大流行期间在家远程工作的需求,DaaS的使用大幅增加。DaaS市场预计将继续快速增长[1]。DaaS服务的体验质量(QoE)一直是提高DaaS用户满意度的主要因素之一。为了确保用户QoE,必须适当设计DaaS服务的云计算资源量。我们提出了一个意向驱动的DaaS管理(IDM)框架,以自主确定给定DaaS QoE需求的云资源量配置。IDM通过从以前的DaaS性能日志数据中抽象出关于DaaS工作负载、资源配置和性能之间依赖关系的知识,实现了自主资源设计。为了确保IDM框架适用于实际的DaaS服务,我们分析了将IDM框架应用于实际DaaS服务的五个主要挑战:确定资源设计目标、量化DaaS QoE、解决日志数据可用性低的问题、设计性能推断模型以及解决日志数据中资源变化低的问题。我们通过IDM模块的详细设计解决了这些挑战。从DaaS性能推理精度、DaaS资源设计、时间和人力资源成本降低等方面评估了IDM框架的有效性。
{"title":"An Intent-driven DaaS Management Framework to Enhance User Quality of Experience","authors":"Chaofeng Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, Kenichi Tayama","doi":"10.1145/3488586","DOIUrl":"https://doi.org/10.1145/3488586","url":null,"abstract":"Desktop as a Service (DaaS) has become widely used by enterprises. In 2020, the use of DaaS increased dramatically due to the demand to work remotely from home during the COVID-19 pandemic. The DaaS market is expected to continue growing rapidly [1]. The quality of experience (QoE) of a DaaS service has been one of the main factors to enhance DaaS user satisfaction. To ensure user QoE, the amount of cloud computation resources for a DaaS service must be appropriately designed. We propose an Intent-driven DaaS Management (IDM) framework to autonomously determine the cloud-resource-amount configurations for a given DaaS QoE requirement. IDM enables autonomous resource design by abstracting the knowledge about the dependency between DaaS workload, resource configuration, and performance from previous DaaS performance log data. To ensure the IDM framework's applicability to actual DaaS services, we analyzed five main challenges in applying the IDM framework to actual DaaS services: identifying the resource-design objective, quantifying DaaS QoE, addressing low log data availability, designing performance-inference models, and addressing low resource variations in the log data. We addressed these challenges through detailed designing of IDM modules. The effectiveness of the IDM framework was assessed from the aspects of DaaS performance-inference precision, DaaS resource design, and time and human-resource cost reduction.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 25"},"PeriodicalIF":5.3,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44911688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics 支持SDN的地理分布式流媒体分析资源配置框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-10 DOI: 10.1145/3571158
H. Mostafaei, Shafi Afridi
Geographically distributed (geo-distributed) datacenters for stream data processing typically comprise multiple edges and core datacenters connected through Wide-Area Network (WAN) with a master node responsible for allocating tasks to worker nodes. Since WAN links significantly impact the performance of distributed task execution, the existing task assignment approach is unsuitable for distributed stream data processing with low latency and high throughput demand. In this paper, we propose SAFA, a resource provisioning framework using the Software-Defined Networking (SDN) concept with an SDN controller responsible for monitoring the WAN, selecting an appropriate subset of worker nodes, and assigning tasks to the designated worker nodes. We implemented the data plane of the framework in P4 and the control plane components in Python. We tested the performance of the proposed system on Apache Spark, Apache Storm, and Apache Flink using the Yahoo! streaming benchmark on a set of custom topologies. The results of the experiments validate that the proposed approach is viable for distributed stream processing and confirm that it can improve at least 1.64× the processing time of incoming events of the current stream processing systems.
用于流数据处理的地理分布(地理分布)数据中心通常包括通过广域网(WAN)连接的多个边缘和核心数据中心,其中主节点负责将任务分配给工作节点。由于广域网链路显著影响分布式任务执行的性能,现有的任务分配方法不适合于低延迟和高吞吐量需求的分布式流数据处理。在本文中,我们提出了SAFA,这是一个使用软件定义网络(SDN)概念的资源供应框架,SDN控制器负责监控WAN,选择适当的工作节点子集,并将任务分配给指定的工作节点。我们在P4中实现了框架的数据平面,在Python中实现了控制平面组件。我们使用Yahoo!一组自定义拓扑上的流式基准测试。实验结果验证了所提出的方法在分布式流处理中的可行性,并证实了该方法至少可以提高当前流处理系统对传入事件的处理时间1.64倍。
{"title":"SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics","authors":"H. Mostafaei, Shafi Afridi","doi":"10.1145/3571158","DOIUrl":"https://doi.org/10.1145/3571158","url":null,"abstract":"Geographically distributed (geo-distributed) datacenters for stream data processing typically comprise multiple edges and core datacenters connected through Wide-Area Network (WAN) with a master node responsible for allocating tasks to worker nodes. Since WAN links significantly impact the performance of distributed task execution, the existing task assignment approach is unsuitable for distributed stream data processing with low latency and high throughput demand. In this paper, we propose SAFA, a resource provisioning framework using the Software-Defined Networking (SDN) concept with an SDN controller responsible for monitoring the WAN, selecting an appropriate subset of worker nodes, and assigning tasks to the designated worker nodes. We implemented the data plane of the framework in P4 and the control plane components in Python. We tested the performance of the proposed system on Apache Spark, Apache Storm, and Apache Flink using the Yahoo! streaming benchmark on a set of custom topologies. The results of the experiments validate that the proposed approach is viable for distributed stream processing and confirm that it can improve at least 1.64× the processing time of incoming events of the current stream processing systems.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 21"},"PeriodicalIF":5.3,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41533278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy? 攻击DoH和ECH:服务器名称加密保护用户隐私吗?
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-09 DOI: 10.1145/3570726
Martino Trevisan, Francesca Soro, M. Mellia, I. Drago, R. Morla
Privacy on the Internet has become a priority, and several efforts have been devoted to limit the leakage of personal information. Domain names, both in the TLS Client Hello and DNS traffic, are among the last pieces of information still visible to an observer in the network. The Encrypted Client Hello extension for TLS, DNS over HTTPS or over QUIC protocols aim to further increase network confidentiality by encrypting the domain names of the visited servers. In this article, we check whether an attacker able to passively observe the traffic of users could still recover the domain name of websites they visit even if names are encrypted. By relying on large-scale network traces, we show that simplistic features and off-the-shelf machine learning models are sufficient to achieve surprisingly high precision and recall when recovering encrypted domain names. We consider three attack scenarios, i.e., recovering the per-flow name, rebuilding the set of visited websites by a user, and checking which users visit a given target website. We next evaluate the efficacy of padding-based mitigation, finding that all three attacks are still effective, despite resources wasted with padding. We conclude that current proposals for domain encryption may produce a false sense of privacy, and more robust techniques should be envisioned to offer protection to end users.
互联网上的隐私已成为一个优先事项,并致力于限制个人信息的泄露。TLS客户端Hello和DNS流量中的域名是网络中观察者仍然可见的最后几条信息。TLS、HTTPS或QUIC协议上的DNS的加密客户端Hello扩展旨在通过加密访问服务器的域名来进一步提高网络机密性。在本文中,我们检查能够被动观察用户流量的攻击者是否仍然可以恢复他们访问的网站的域名,即使这些网站的名称是加密的。通过依赖大规模的网络跟踪,我们表明,在恢复加密域名时,简单化的特征和现成的机器学习模型足以实现惊人的高精度和召回率。我们考虑了三种攻击场景,即恢复每个流的名称,重建用户访问的网站集,以及检查哪些用户访问给定的目标网站。接下来,我们评估了基于填充的缓解的效果,发现尽管填充浪费了资源,但所有三种攻击仍然有效。我们得出的结论是,当前的域加密提案可能会产生一种虚假的隐私感,应该设想更强大的技术来为最终用户提供保护。
{"title":"Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy?","authors":"Martino Trevisan, Francesca Soro, M. Mellia, I. Drago, R. Morla","doi":"10.1145/3570726","DOIUrl":"https://doi.org/10.1145/3570726","url":null,"abstract":"Privacy on the Internet has become a priority, and several efforts have been devoted to limit the leakage of personal information. Domain names, both in the TLS Client Hello and DNS traffic, are among the last pieces of information still visible to an observer in the network. The Encrypted Client Hello extension for TLS, DNS over HTTPS or over QUIC protocols aim to further increase network confidentiality by encrypting the domain names of the visited servers. In this article, we check whether an attacker able to passively observe the traffic of users could still recover the domain name of websites they visit even if names are encrypted. By relying on large-scale network traces, we show that simplistic features and off-the-shelf machine learning models are sufficient to achieve surprisingly high precision and recall when recovering encrypted domain names. We consider three attack scenarios, i.e., recovering the per-flow name, rebuilding the set of visited websites by a user, and checking which users visit a given target website. We next evaluate the efficacy of padding-based mitigation, finding that all three attacks are still effective, despite resources wasted with padding. We conclude that current proposals for domain encryption may produce a false sense of privacy, and more robust techniques should be envisioned to offer protection to end users.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 22"},"PeriodicalIF":5.3,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46905161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web 用Façade构造知识图:一种访问Web上异构数据源的统一方法
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-04 DOI: 10.1145/3555312
Luigi Asprino, E. Daga, Aldo Gangemi, P. Mulholland
Data integration is the dominant use case for RDF Knowledge Graphs. However, Web resources come in formats with weak semantics (for example, CSV and JSON), or formats specific to a given application (for example, BibTex, HTML, and Markdown). To solve this problem, Knowledge Graph Construction (KGC) is gaining momentum due to its focus on supporting users in transforming data into RDF. However, using existing KGC frameworks result in complex data processing pipelines, which mix structural and semantic mappings, whose development and maintenance constitute a significant bottleneck for KG engineers. Such frameworks force users to rely on different tools, sometimes based on heterogeneous languages, for inspecting sources, designing mappings, and generating triples, thus making the process unnecessarily complicated. We argue that it is possible and desirable to equip KG engineers with the ability of interacting with Web data formats by relying on their expertise in RDF and the well-established SPARQL query language [2]. In this article, we study a unified method for data access to heterogeneous data sources with Facade-X, a meta-model implemented in a new data integration system called SPARQL Anything. We demonstrate that our approach is theoretically sound, since it allows a single meta-model, based on RDF, to represent data from (a) any file format expressible in BNF syntax, as well as (b) any relational database. We compare our method to state-of-the-art approaches in terms of usability (cognitive complexity of the mappings) and general performance. Finally, we discuss the benefits and challenges of this novel approach by engaging with the reference user community.
数据集成是RDF知识图的主要用例。然而,Web资源的格式具有弱语义(例如,CSV和JSON),或者特定于给定应用程序的格式(例如,BibTex、HTML和Markdown)。为了解决这个问题,知识图构建(KGC)正因其专注于支持用户将数据转换为RDF而获得发展势头。然而,使用现有的KGC框架会产生复杂的数据处理管道,这些管道混合了结构和语义映射,其开发和维护对KG工程师来说是一个重要的瓶颈。这样的框架迫使用户依赖不同的工具,有时基于异构语言,来检查源代码、设计映射和生成三元组,从而使过程变得不必要地复杂。我们认为,依靠KG工程师在RDF和公认的SPARQL查询语言[2]方面的专业知识,让他们具备与Web数据格式交互的能力是可能的,也是可取的。在本文中,我们研究了一种使用Facade-X对异构数据源进行数据访问的统一方法,Facade-X是一种在名为SPARQLAnything的新数据集成系统中实现的元模型。我们证明了我们的方法在理论上是合理的,因为它允许基于RDF的单个元模型来表示(a)任何可以用BNF语法表达的文件格式的数据,以及(b)任何关系数据库的数据。在可用性(映射的认知复杂性)和一般性能方面,我们将我们的方法与最先进的方法进行了比较。最后,我们通过与参考用户社区的接触,讨论了这种新方法的好处和挑战。
{"title":"Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web","authors":"Luigi Asprino, E. Daga, Aldo Gangemi, P. Mulholland","doi":"10.1145/3555312","DOIUrl":"https://doi.org/10.1145/3555312","url":null,"abstract":"Data integration is the dominant use case for RDF Knowledge Graphs. However, Web resources come in formats with weak semantics (for example, CSV and JSON), or formats specific to a given application (for example, BibTex, HTML, and Markdown). To solve this problem, Knowledge Graph Construction (KGC) is gaining momentum due to its focus on supporting users in transforming data into RDF. However, using existing KGC frameworks result in complex data processing pipelines, which mix structural and semantic mappings, whose development and maintenance constitute a significant bottleneck for KG engineers. Such frameworks force users to rely on different tools, sometimes based on heterogeneous languages, for inspecting sources, designing mappings, and generating triples, thus making the process unnecessarily complicated. We argue that it is possible and desirable to equip KG engineers with the ability of interacting with Web data formats by relying on their expertise in RDF and the well-established SPARQL query language [2]. In this article, we study a unified method for data access to heterogeneous data sources with Facade-X, a meta-model implemented in a new data integration system called SPARQL Anything. We demonstrate that our approach is theoretically sound, since it allows a single meta-model, based on RDF, to represent data from (a) any file format expressible in BNF syntax, as well as (b) any relational database. We compare our method to state-of-the-art approaches in terms of usability (cognitive complexity of the mappings) and general performance. Finally, we discuss the benefits and challenges of this novel approach by engaging with the reference user community.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 31"},"PeriodicalIF":5.3,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46818022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction 通过基于文本的特征提取检测虚假评论的多类型分类器集成
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-21 DOI: 10.1145/3568676
G. S. Budhi, R. Chiong
The financial impact of online reviews has prompted some fraudulent sellers to generate fake consumer reviews for either promoting their products or discrediting competing products. In this study, we propose a novel ensemble model—the Multi-type Classifier Ensemble (MtCE)—combined with a textual-based featuring method, which is relatively independent of the system, to detect fake online consumer reviews. Unlike other ensemble models that utilise only the same type of single classifier, our proposed ensemble utilises several customised machine learning classifiers (including deep learning models) as its base classifiers. The results of our experiments show that the MtCE can adequately detect fake reviews, and that it outperforms other single and ensemble methods in terms of accuracy and other measurements for all the relevant public datasets used in this study. Moreover, if set correctly, the parameters of MtCE, such as base-classifier types, the total number of base classifiers, bootstrap, and the method to vote on output (e.g., majority or priority), can further improve the performance of the proposed ensemble.
在线评论的财务影响促使一些欺诈卖家产生虚假的消费者评论,因为他们要么宣传自己的产品,要么诋毁竞争产品。在这项研究中,我们提出了一种新的集成模型——多类型分类器集成(MtCE)——结合一种相对独立于系统的基于文本的特征方法,来检测虚假的在线消费者评论。与其他只使用相同类型的单个分类器的集成模型不同,我们提出的集成使用几个定制的机器学习分类器(包括深度学习模型)作为其基本分类器。我们的实验结果表明,MtCE可以充分检测虚假评论,并且在本研究中使用的所有相关公共数据集的准确性和其他测量方面,它优于其他单一和集成方法。此外,如果设置正确,MtCE的参数,如基本分类器类型、基本分类器的总数、引导和对输出进行投票的方法(例如,多数或优先级),可以进一步提高所提出的集成的性能。
{"title":"A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction","authors":"G. S. Budhi, R. Chiong","doi":"10.1145/3568676","DOIUrl":"https://doi.org/10.1145/3568676","url":null,"abstract":"The financial impact of online reviews has prompted some fraudulent sellers to generate fake consumer reviews for either promoting their products or discrediting competing products. In this study, we propose a novel ensemble model—the Multi-type Classifier Ensemble (MtCE)—combined with a textual-based featuring method, which is relatively independent of the system, to detect fake online consumer reviews. Unlike other ensemble models that utilise only the same type of single classifier, our proposed ensemble utilises several customised machine learning classifiers (including deep learning models) as its base classifiers. The results of our experiments show that the MtCE can adequately detect fake reviews, and that it outperforms other single and ensemble methods in terms of accuracy and other measurements for all the relevant public datasets used in this study. Moreover, if set correctly, the parameters of MtCE, such as base-classifier types, the total number of base classifiers, bootstrap, and the method to vote on output (e.g., majority or priority), can further improve the performance of the proposed ensemble.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 24"},"PeriodicalIF":5.3,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43432553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1