首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Providing Realtime Support for Containerized Edge Services 为容器化边缘服务提供实时支持
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-04 DOI: 10.1145/3617123
Wenzhao Zhang, Yi Gao, Wei Dong
Containers have emerged as a popular technology for edge computing platforms. Although there are varieties of container orchestration frameworks, e.g., Kubernetes to provide high-reliable services for cloud infrastructure, providing real-time support at the containerized edge systems (CESs) remains a challenge. In this paper, we propose EdgeMan, a holistic edge service management framework for CESs, which consists of (1) a model-assisted event-driven lightweight online scheduling algorithm to provide request-level execution plans; (2) a bottleneck-metric-aware progressive resource allocation mechanism to improve resource efficiency. We then build a testbed that installed three containerized services with different latency sensitivities for concrete evaluation. Besides, we adopt real-world data traces from Alibaba and Twitter for large-scale emulations. Extensive experiments demonstrate that the deadline miss ratio of time-sensitive services run with EdgeMan is reduced by 85.9% on average compared with that of existing methods in both industry and academia.
容器已经成为边缘计算平台的流行技术。尽管有各种容器编排框架,例如Kubernetes,为云基础设施提供高可靠性服务,但在容器化边缘系统(CES)提供实时支持仍然是一个挑战。在本文中,我们提出了EdgeMan,一个用于CES的整体边缘服务管理框架,它由(1)一个模型辅助的事件驱动的轻量级在线调度算法组成,以提供请求级执行计划;(2) 感知瓶颈度量的渐进式资源分配机制,以提高资源效率。然后,我们构建了一个测试平台,安装了三个具有不同延迟敏感性的容器化服务,用于具体评估。此外,我们采用了阿里巴巴和推特的真实世界数据跟踪进行大规模模拟。大量实验表明,与工业界和学术界现有的方法相比,使用EdgeMan运行的时间敏感服务的截止日期未命中率平均降低了85.9%。
{"title":"Providing Realtime Support for Containerized Edge Services","authors":"Wenzhao Zhang, Yi Gao, Wei Dong","doi":"10.1145/3617123","DOIUrl":"https://doi.org/10.1145/3617123","url":null,"abstract":"Containers have emerged as a popular technology for edge computing platforms. Although there are varieties of container orchestration frameworks, e.g., Kubernetes to provide high-reliable services for cloud infrastructure, providing real-time support at the containerized edge systems (CESs) remains a challenge. In this paper, we propose EdgeMan, a holistic edge service management framework for CESs, which consists of (1) a model-assisted event-driven lightweight online scheduling algorithm to provide request-level execution plans; (2) a bottleneck-metric-aware progressive resource allocation mechanism to improve resource efficiency. We then build a testbed that installed three containerized services with different latency sensitivities for concrete evaluation. Besides, we adopt real-world data traces from Alibaba and Twitter for large-scale emulations. Extensive experiments demonstrate that the deadline miss ratio of time-sensitive services run with EdgeMan is reduced by 85.9% on average compared with that of existing methods in both industry and academia.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"1 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42734023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City 智慧城市无人机与5G边缘计算协同热点数据采集
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-23 DOI: 10.1145/3617373
Pei-Cheng Song, Jeng-Shyang Pan, H. Chao, S. Chu
The construction and governance of smart cities require the collaboration of different systems and different regions. How to realize the monitoring of abnormal hot spots through the collaboration of subsystems with limited resources is related to the stability and efficiency of the city. This work constructs a hot data processing framework for drones and 5G edge computing infrastructure, as well as an Ensemble Multi-Objective Cooperative Learning (EMOCL) method to process three different types of hot data. The data collection phase combines set operations with the 0-1 multi-knapsack model, and the cooperative learning phase realizes the degree of cooperation control while retaining the ability of independent optimization of the subsystem. Finally, the advantages of the framework are verified by hot data coverage and collaborative processing efficiency, resource use cost and balance.
智慧城市的建设和治理需要不同系统、不同区域的协同。如何通过资源有限的子系统协同,实现对异常热点的监测,关系到城市的稳定和效率。这项工作构建了一个用于无人机和5G边缘计算基础设施的热数据处理框架,以及一种处理三种不同类型热数据的集成多目标协同学习(EMOCL)方法。数据采集阶段将集合运算与0-1多背包模型相结合,协同学习阶段在保持子系统独立优化能力的同时,实现了协同控制的程度。最后,通过热点数据覆盖率和协同处理效率、资源使用成本和平衡性验证了该框架的优势。
{"title":"Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City","authors":"Pei-Cheng Song, Jeng-Shyang Pan, H. Chao, S. Chu","doi":"10.1145/3617373","DOIUrl":"https://doi.org/10.1145/3617373","url":null,"abstract":"The construction and governance of smart cities require the collaboration of different systems and different regions. How to realize the monitoring of abnormal hot spots through the collaboration of subsystems with limited resources is related to the stability and efficiency of the city. This work constructs a hot data processing framework for drones and 5G edge computing infrastructure, as well as an Ensemble Multi-Objective Cooperative Learning (EMOCL) method to process three different types of hot data. The data collection phase combines set operations with the 0-1 multi-knapsack model, and the cooperative learning phase realizes the degree of cooperation control while retaining the ability of independent optimization of the subsystem. Finally, the advantages of the framework are verified by hot data coverage and collaborative processing efficiency, resource use cost and balance.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48410095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Zero Trust Cybersecurity in the Internet of Things 基于区块链的物联网零信任网络安全
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-21 DOI: 10.1145/3594535
Shancang Li, Surya Nepal, T. Tryfonas, Hongwei Li
The Internet of Things (IoT) connects a massive number of smart devices to the Internet, in which all data, applications, devices, and users require connectivity, security, and trust. Traditional security approaches assume that all participants within the network perimeter are trustworthy. However, in IoT environment data, applications, devices, and users are gradually moving outside the traditional trusted defence perimeter and have become a source of security risks. Unlike traditional security approaches, which are initially designed for the optimum protection and only act if a process is malicious, the zero-trust security framework upholds the “verify and never trust” principle. Zero trust-based approaches assume that everything within the system is untrustworthy and needs to be verified to prevent threats. Meanwhile, the blockchain technology shows promises on cyber security and several blockchain security mechanisms have been developed, including access management, user authentication, and transaction security. Due to its prowess in enhancing cyber security, blockchain can provide zero trust security framework with highly accessible and transparent security mechanisms via a visible blockchain, in which all transactions are visible to restricted operators. Zero-trust models can be secured further by a blockchain due to its sheer immutable nature and blockchain technology is expected to recognise them, authenticate their trust, and allow them access. Blockchain-enabled zero trust security can detect suspicious online transaction, isolate connection, and restrict access to the user. This special issue received in total 37 high-quality submissions. Per journal policy, it was ensured that handling editors did not have any potential conflict of interest with authors of submitted papers. All submitted papers were reviewed by at least three independent potential referees. The papers were evaluated for their rigor and quality, and also for their relevance to the theme of our special issue. After evaluating the overall scores, seven papers were selected by the guest editors and approved by the Editor-in-Chief for inclusion in this special issue. We will now briefly introduce the accepted papers.
物联网(Internet of Things, IoT)将大量的智能设备连接到互联网上,所有的数据、应用、设备和用户都需要连接、安全、信任。传统的安全方法假设网络边界内的所有参与者都是值得信任的。然而,在物联网环境中,数据、应用程序、设备和用户逐渐超出了传统的可信防御范围,成为安全风险的来源。与传统的安全方法不同,传统的安全方法最初是为最佳保护而设计的,只有在进程是恶意的情况下才会采取行动,零信任安全框架坚持“验证且永不信任”原则。基于零信任的方法假设系统中的所有内容都是不可信的,需要进行验证以防止威胁。与此同时,区块链技术在网络安全方面表现出了良好的前景,包括访问管理、用户认证和交易安全等多种区块链安全机制已经开发出来。由于区块链在增强网络安全方面的卓越能力,它可以通过一个可见的区块链提供零信任安全框架,具有高度可访问和透明的安全机制,其中所有交易对受限制的运营商都是可见的。由于其绝对不可变的性质,零信任模型可以通过区块链进一步得到保护,区块链技术有望识别它们,验证它们的信任,并允许它们访问。区块链支持的零信任安全可以检测可疑的在线交易,隔离连接,并限制用户的访问。本期特刊共收到37份高质量的投稿。根据期刊政策,处理编辑不会与提交论文的作者有任何潜在的利益冲突。所有提交的论文都由至少三名独立的潜在审稿人审阅。这些论文因其严谨性和质量以及它们与我们特刊主题的相关性而受到评价。经过综合评分,由特邀编辑选出7篇论文,经总编辑批准,纳入本期特刊。现在我们将简要介绍被接受的论文。
{"title":"Blockchain-based Zero Trust Cybersecurity in the Internet of Things","authors":"Shancang Li, Surya Nepal, T. Tryfonas, Hongwei Li","doi":"10.1145/3594535","DOIUrl":"https://doi.org/10.1145/3594535","url":null,"abstract":"The Internet of Things (IoT) connects a massive number of smart devices to the Internet, in which all data, applications, devices, and users require connectivity, security, and trust. Traditional security approaches assume that all participants within the network perimeter are trustworthy. However, in IoT environment data, applications, devices, and users are gradually moving outside the traditional trusted defence perimeter and have become a source of security risks. Unlike traditional security approaches, which are initially designed for the optimum protection and only act if a process is malicious, the zero-trust security framework upholds the “verify and never trust” principle. Zero trust-based approaches assume that everything within the system is untrustworthy and needs to be verified to prevent threats. Meanwhile, the blockchain technology shows promises on cyber security and several blockchain security mechanisms have been developed, including access management, user authentication, and transaction security. Due to its prowess in enhancing cyber security, blockchain can provide zero trust security framework with highly accessible and transparent security mechanisms via a visible blockchain, in which all transactions are visible to restricted operators. Zero-trust models can be secured further by a blockchain due to its sheer immutable nature and blockchain technology is expected to recognise them, authenticate their trust, and allow them access. Blockchain-enabled zero trust security can detect suspicious online transaction, isolate connection, and restrict access to the user. This special issue received in total 37 high-quality submissions. Per journal policy, it was ensured that handling editors did not have any potential conflict of interest with authors of submitted papers. All submitted papers were reviewed by at least three independent potential referees. The papers were evaluated for their rigor and quality, and also for their relevance to the theme of our special issue. After evaluating the overall scores, seven papers were selected by the guest editors and approved by the Editor-in-Chief for inclusion in this special issue. We will now briefly introduce the accepted papers.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45223585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds 伪装网:安全的图像外包机密模型训练在云
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-15 DOI: 10.1145/3609506
Keke Chen, Yuechun Gu, Sagar Sharma
Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This article presents an image disguising approach: DisguisedNets, which allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisguisedNets uses a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method—InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.
大量的训练数据和昂贵的模型调整是图像深度学习的标准特征。因此,数据所有者经常利用云资源开发大规模复杂模型,这也引发了隐私问题。现有的用于训练深度神经网络(dnn)的加密解决方案过于昂贵,不能有效地利用云GPU资源,并且给客户端预处理带来了很大的负担。本文介绍了一种图像伪装方法:DisguisedNets,它允许用户安全地将图像外包到云,并实现机密、高效的基于gpu的模型训练。DisguisedNets使用图像块化、块级随机排列和块级安全转换的新颖组合:随机多维投影(RMT)或AES像素级加密(AES)来转换训练数据。用户可以使用现有的DNN训练方法和GPU资源,而无需对伪装图像的训练模型进行任何修改。我们在多级威胁模型下分析和评估了这些方法,并将它们与另一种类似的方法instahide进行了比较。我们还表明,包括DisguisedNets和InstaHide在内的图像伪装方法可以有效地保护模型免受针对模型的攻击。
{"title":"DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds","authors":"Keke Chen, Yuechun Gu, Sagar Sharma","doi":"10.1145/3609506","DOIUrl":"https://doi.org/10.1145/3609506","url":null,"abstract":"Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This article presents an image disguising approach: DisguisedNets, which allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisguisedNets uses a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method—InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 26"},"PeriodicalIF":5.3,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43414514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds 伪装网:安全的图像外包机密模型训练在云
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-15 DOI: https://dl.acm.org/doi/10.1145/3609506
Keke Chen, Yuechun Gu, Sagar Sharma

Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This paper presents an image disguising approach: DisguisedNets that allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisgisedNets use a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method – InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.

大量的训练数据和昂贵的模型调整是图像深度学习的标准特征。因此,数据所有者经常利用云资源开发大规模复杂模型,这也引发了隐私问题。现有的用于训练深度神经网络(dnn)的加密解决方案过于昂贵,不能有效地利用云GPU资源,并且给客户端预处理带来了很大的负担。本文提出了一种图像伪装方法:DisguisedNets,它允许用户安全地将图像外包到云端,并实现机密、高效的基于gpu的模型训练。DisgisedNets使用图像块化、块级随机排列和块级安全转换的新颖组合:随机多维投影(RMT)或AES像素级加密(AES)来转换训练数据。用户可以使用现有的DNN训练方法和GPU资源,而无需对伪装图像的训练模型进行任何修改。我们在多级威胁模型下分析和评估了这些方法,并将它们与另一种类似的方法InstaHide进行了比较。我们还表明,包括DisguisedNets和InstaHide在内的图像伪装方法可以有效地保护模型免受针对模型的攻击。
{"title":"DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds","authors":"Keke Chen, Yuechun Gu, Sagar Sharma","doi":"https://dl.acm.org/doi/10.1145/3609506","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3609506","url":null,"abstract":"<p>Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This paper presents an image disguising approach: DisguisedNets that allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisgisedNets use a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method – InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"19 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-End Trust Management Framework for Crowdsourced IoT Services 面向众包物联网服务的端到端信任管理框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: https://dl.acm.org/doi/10.1145/3600232
Mohammed Bahutair, Athman Bouguettaya

We propose a novel end-to-end trust management framework for crowdsourced IoT services. The framework targets three main aspects: trust assessment, trust information credibility and accuracy, and trust information storage. We harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers’ uses. Additionally, our framework ascertains the credibility and accuracy of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the contextual fairness between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the integrity and availability of trust information.

我们为众包物联网服务提出了一种新颖的端到端信任管理框架。该框架主要针对三个方面:信任评估、信任信息的可信性和准确性、信任信息的存储。我们利用物联网消费者的使用模式来提供适应物联网消费者使用的信任评估。此外,我们的框架在信任评估之前确定了信任相关信息的可信度和准确性。这是通过验证物联网消费者和供应商收集的数据来实现的。此外,我们的框架确保了物联网服务和信任信息之间的上下文公平性。此外,我们提出了一种基于区块链的信任信息存储方法。我们提出的存储解决方案保留了信任信息的完整性和可用性。
{"title":"An End-to-End Trust Management Framework for Crowdsourced IoT Services","authors":"Mohammed Bahutair, Athman Bouguettaya","doi":"https://dl.acm.org/doi/10.1145/3600232","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3600232","url":null,"abstract":"<p>We propose a novel end-to-end trust management framework for crowdsourced IoT services. The framework targets three main aspects: <i>trust assessment</i>, <i>trust information credibility and accuracy</i>, and <i>trust information storage</i>. We harness the <i>usage patterns</i> of IoT consumers to offer a trust assessment that <i>adapts</i> to IoT consumers’ uses. Additionally, our framework ascertains the <i>credibility</i> and <i>accuracy</i> of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the <i>contextual fairness</i> between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the <i>integrity</i> and <i>availability</i> of trust information.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"67 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-end Trust Management Framework for Crowdsourced IoT Services 面向众包物联网服务的端到端信任管理框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3600232
Mohammed Bahutair, A. Bouguettaya
We propose a novel end-to-end trust management framework for crowdsourced Internet of Things (IoT) services. The framework targets three main aspects: trust assessment, trust information credibility and accuracy, and trust information storage. We harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers’ uses. Additionally, our framework ascertains the credibility and accuracy of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the contextual fairness between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the integrity and availability of trust information.
我们提出了一种用于众包物联网(IoT)服务的新型端到端信任管理框架。该框架主要针对三个方面:信任评估、信任信息的可信度和准确性以及信任信息的存储。我们利用物联网消费者的使用模式,提供适应物联网消费者使用的信任评估。此外,我们的框架在信任评估之前确定了信任相关信息的可信度和准确性。这是通过验证物联网消费者和提供商收集的数据来实现的。此外,我们的框架确保了物联网服务和信任信息之间的上下文公平性。此外,我们提出了一种基于区块链的信任信息存储方法。我们提出的存储解决方案保留了信任信息的完整性和可用性。
{"title":"An End-to-end Trust Management Framework for Crowdsourced IoT Services","authors":"Mohammed Bahutair, A. Bouguettaya","doi":"10.1145/3600232","DOIUrl":"https://doi.org/10.1145/3600232","url":null,"abstract":"We propose a novel end-to-end trust management framework for crowdsourced Internet of Things (IoT) services. The framework targets three main aspects: trust assessment, trust information credibility and accuracy, and trust information storage. We harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers’ uses. Additionally, our framework ascertains the credibility and accuracy of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the contextual fairness between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the integrity and availability of trust information.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 32"},"PeriodicalIF":5.3,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43502339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-25 DOI: https://dl.acm.org/doi/10.1145/3599968
Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle

Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.

动态和灵活的业务关系预计将在未来变得更加重要,以适应专门的变更请求或小批量生产。如今,买卖双方必须在实际生产前披露产品的敏感信息。但是,如果没有信任关系,企业的竞争力就会受到威胁。到目前为止,相关的工作忽略了这个问题:现有的方法只保护单个方的信息,阻碍了动态和随需应变的业务关系。为了弥补隐私保护信息不足的相应研究缺口,并与没有建立信任关系的公司打交道,我们追求创新的隐私保护采购查询方向,将其无缝集成到当今已建立的供应商管理和采购流程中。利用私有计算中成熟的构建块,如私有集交集和同态加密,我们提出了两种具有略微不同的隐私和性能含义的设计,以安全地实现互联网上的购买查询。特别是,我们允许买家在不分享敏感信息的情况下考虑更多潜在的卖家,并减轻卖家反复准备详细但被丢弃的报价的负担。我们使用来自生产技术领域的两个真实用例来演示我们的方法的可伸缩性。总的来说,我们提出了可部署的设计,为购买查询提供双向隐私,从而填补了目前阻碍建立动态和灵活业务关系的空白。在未来,我们期望在这个被忽视的领域显著增加研究活动,以满足不断变化的生产环境的需求。
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle","doi":"https://dl.acm.org/doi/10.1145/3599968","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3599968","url":null,"abstract":"<p>Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"38 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-25 DOI: 10.1145/3599968
J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle
Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.
动态和灵活的业务关系在未来将变得更加重要,以适应专门的变更请求或小批量生产。如今,买家和卖家必须在实际生产之前提前披露产品的敏感信息。然而,如果没有信任关系,这种情况对相关公司来说是不稳定的,因为他们担心自己的竞争力。到目前为止,相关工作忽略了这个问题:现有的方法只保护一方的信息,阻碍了动态和按需的业务关系。为了弥补隐私保护不足的信息的相应研究空白,并与没有建立信任关系的公司打交道,我们追求创新的隐私保护采购查询方向,将其无缝集成到当今既定的供应商管理和采购流程中。利用私有计算的成熟构建块,如私有集交集和同态加密,我们提出了两种隐私和性能影响略有不同的设计,以安全地实现互联网上的购买查询。特别是,我们允许买家在不分享敏感信息的情况下考虑更多潜在卖家,并减轻卖家反复准备精心设计但被丢弃的报价的负担。我们使用生产技术领域的两个真实世界用例来展示我们的方法的可扩展性。总的来说,我们提供了可部署的设计,为购买查询提供双向隐私,从而填补了目前阻碍建立动态灵活业务关系的空白。未来,我们预计这一被忽视领域的研究活动将大幅增加,以满足不断发展的生产环境的需求。
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle","doi":"10.1145/3599968","DOIUrl":"https://doi.org/10.1145/3599968","url":null,"abstract":"Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46352687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services 《计算语言学在多媒体物联网服务中的应用》特刊特邀编辑简介
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-23 DOI: 10.1145/3591355
Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary
The Internet of Multimedia Things (IoMT) [4] is the combination of interfaces, protocols, and associated multimedia-related information, which enables advanced services and applications based on the human-to-device and device-to-device interactions in physical and virtual environments. The rapid growth in multimedia-on-demand traffic that refers to audio, video, and images has drastically shifted on the vision of the Internet of Things (IoT) [1, 5] from scalar to IoMT, which is an integral part of multimedia services such as real-time content delivery, online games, and video conferencing on the global Internet [3, 4]. Complementarily, Computational Linguistics (CL) [2] is an interdisciplinary research field concerned with the processing of languages by computers. Since machine translation began to emerge in the early 1970s, CL has grown and developed exponentially. Nevertheless, the combination of IoT-based multimedia with CL services has received less attention so far and has emerged as a new research paradigm for future computing applications. The future of smart IoMT devices with NLP is more important in real-time systems such as speech understanding, emotion recognition, and home automation. There are several issues and technical challenges that need attention from the research community. The rapid growth of multimedia IoT services (data abstraction, data sharing, data mining) has led the way to incorporating CL techniques to meet its requirements. This special issue presents multimedia IoT services in real-time systems and highlights the open research challenges to get advantageous use of CL.
多媒体物联网(IoMT)[4]是接口、协议和相关多媒体相关信息的组合,它使基于物理和虚拟环境中人对设备和设备对设备交互的高级服务和应用成为可能。多媒体点播流量(包括音频、视频和图像)的快速增长,使物联网(IoT)[1,5]的愿景从标量急剧转变为IoMT,它是全球互联网上实时内容交付、在线游戏和视频会议等多媒体服务的组成部分[3,4]。与之相辅相成的是,计算语言学(CL)[2]是一个涉及计算机语言处理的跨学科研究领域。自从机器翻译在20世纪70年代初出现以来,CL已经成倍增长和发展。然而,基于物联网的多媒体与CL服务的结合迄今为止受到的关注较少,并已成为未来计算应用的新研究范式。具有NLP的智能IoMT设备的未来在语音理解、情感识别和家庭自动化等实时系统中更为重要。有几个问题和技术挑战需要引起研究界的注意。多媒体物联网服务(数据抽象、数据共享、数据挖掘)的快速增长,促使人们采用CL技术来满足其需求。本期专题介绍了实时系统中的多媒体物联网服务,并强调了利用CL的开放研究挑战。
{"title":"Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services","authors":"Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary","doi":"10.1145/3591355","DOIUrl":"https://doi.org/10.1145/3591355","url":null,"abstract":"The Internet of Multimedia Things (IoMT) [4] is the combination of interfaces, protocols, and associated multimedia-related information, which enables advanced services and applications based on the human-to-device and device-to-device interactions in physical and virtual environments. The rapid growth in multimedia-on-demand traffic that refers to audio, video, and images has drastically shifted on the vision of the Internet of Things (IoT) [1, 5] from scalar to IoMT, which is an integral part of multimedia services such as real-time content delivery, online games, and video conferencing on the global Internet [3, 4]. Complementarily, Computational Linguistics (CL) [2] is an interdisciplinary research field concerned with the processing of languages by computers. Since machine translation began to emerge in the early 1970s, CL has grown and developed exponentially. Nevertheless, the combination of IoT-based multimedia with CL services has received less attention so far and has emerged as a new research paradigm for future computing applications. The future of smart IoMT devices with NLP is more important in real-time systems such as speech understanding, emotion recognition, and home automation. There are several issues and technical challenges that need attention from the research community. The rapid growth of multimedia IoT services (data abstraction, data sharing, data mining) has led the way to incorporating CL techniques to meet its requirements. This special issue presents multimedia IoT services in real-time systems and highlights the open research challenges to get advantageous use of CL.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43193173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1