首页 > 最新文献

Journal of Parallel and Distributed Computing最新文献

英文 中文
Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues) 封面1 -完整的扉页(每期)/特刊扉页(每期)
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-07 DOI: 10.1016/S0743-7315(25)00174-1
{"title":"Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues)","authors":"","doi":"10.1016/S0743-7315(25)00174-1","DOIUrl":"10.1016/S0743-7315(25)00174-1","url":null,"abstract":"","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105207"},"PeriodicalIF":4.0,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145736744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimistic execution in byzantine broadcast protocols that tolerate malicious majority 容忍恶意多数的拜占庭广播协议的乐观执行
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-29 DOI: 10.1016/j.jpdc.2025.105203
Ruomu Hou, Haifeng Yu
We consider the classic byzantine broadcast problem in distributed computing, in the context of a system with n node and at most fmax byzantine failures, under the standard synchronous timing model. Let f be the actual number of byzantine failures in a given execution, where ffmax. Our goal in this work is to optimize the performance of byzantine broadcast protocols in the common case where f is relative small. To this end, we propose a novel framework, called FlintBB, for adding an optimistic track into existing byzantine broadcast protocols. Using this framework, we show that we can achieve an exponential improvement in several existing byzantine broadcast protocols when f is relatively small. At the same time, our approach does not sacrifice the performance when f is not small.
在标准同步定时模型下,考虑了具有n个节点且最多fmax拜占庭故障的分布式计算系统中的经典拜占庭广播问题。设f为给定执行中拜占庭失败的实际次数,其中f≤fmax。我们在这项工作中的目标是在f相对较小的常见情况下优化拜占庭广播协议的性能。为此,我们提出了一个名为FlintBB的新框架,用于在现有的拜占庭广播协议中添加乐观轨道。使用这个框架,我们表明,当f相对较小时,我们可以在几个现有的拜占庭广播协议中实现指数级的改进。同时,我们的方法在f不小的情况下不牺牲性能。
{"title":"Optimistic execution in byzantine broadcast protocols that tolerate malicious majority","authors":"Ruomu Hou,&nbsp;Haifeng Yu","doi":"10.1016/j.jpdc.2025.105203","DOIUrl":"10.1016/j.jpdc.2025.105203","url":null,"abstract":"<div><div>We consider the classic byzantine broadcast problem in distributed computing, in the context of a system with <em>n</em> node and at most <span><math><msub><mi>f</mi><mrow><mi>m</mi><mi>a</mi><mi>x</mi></mrow></msub></math></span> byzantine failures, under the standard synchronous timing model. Let <em>f</em> be the actual number of byzantine failures in a given execution, where <span><math><mrow><mi>f</mi><mo>≤</mo><msub><mi>f</mi><mrow><mi>m</mi><mi>a</mi><mi>x</mi></mrow></msub></mrow></math></span>. Our goal in this work is to optimize the performance of byzantine broadcast protocols in the common case where <em>f</em> is relative small. To this end, we propose a novel framework, called <span>FlintBB</span>, for adding an <em>optimistic track</em> into existing byzantine broadcast protocols. Using this framework, we show that we can achieve an <em>exponential improvement</em> in several existing byzantine broadcast protocols when <em>f</em> is relatively small. At the same time, our approach does not sacrifice the performance when <em>f</em> is not small.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105203"},"PeriodicalIF":4.0,"publicationDate":"2025-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAARD: Proximity-aware all-reduce communication for dragonfly networks 蜻蜓网络的接近感知全缩减通信
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-19 DOI: 10.1016/j.jpdc.2025.105201
Junchao Ma, Dezun Dong, Fei Lei, Liquan Xiao
The All-Reduce operation is one of the most widely used collective communication operations, and it is widely used in the research and engineering fields of high-performance computing(HPC) and distributed machine learning(DML). Previous optimization work for All-Reduce operation is to design new algorithms only for different message size and different number of processors, and ignores the optimization that can be achieved by considering the topology. Dragonfly is a popular topology for current and future high-speed interconnection networks. The hierarchical characteristics of dragonfly network can be utilized to effectively reduce hardware overhead while ensuring low end-to-end transmission latency. This paper offers a first attempt to design an efficient All-Reduce algorithm on dragonfly networks, referenced as PAARD. Based on the hierarchical characteristics of dragonfly network, PAARD first proposes an end-to-end solution to alleviate congestion that could remarkably boost performance. We carefully design the algorithm of PAARD to ensure desirable performance with acceptable overhead and guarantee the generality when met marginal cases. Then, to illustrate the effectiveness of PAARD, we analyze the performance of PAARD with the state-of-the-art algorithm, Halving-doubling(HD) algorithm and Ring algorithm. The simulation results demonstrate that in our design the execution time can be improved by 3X for HD and 4.19x for Ring on 256 nodes of a 342-node dragonfly with minimal routing.
All-Reduce运算是应用最广泛的集体通信运算之一,广泛应用于高性能计算(HPC)和分布式机器学习(DML)的研究和工程领域。以往针对All-Reduce操作的优化工作都是针对不同的消息大小和不同的处理器数量设计新的算法,而忽略了考虑拓扑可以实现的优化。蜻蜓是当前和未来高速互连网络的流行拓扑结构。蜻蜓网络的分层特性可以有效地降低硬件开销,同时保证低端到端传输延迟。本文首次尝试在蜻蜓网络上设计一种高效的All-Reduce算法,称为PAARD。基于蜻蜓网络的分层特性,PAARD首先提出了一种端到端的解决方案来缓解拥塞,从而显著提高性能。我们精心设计了PAARD算法,以在可接受的开销下保证理想的性能,并保证在遇到边际情况时的通用性。然后,为了说明PAARD的有效性,我们分析了PAARD与最先进的算法、减半加倍(HD)算法和环算法的性能。仿真结果表明,在我们的设计中,在342节点蜻蜓的256个节点上,HD和Ring的执行时间分别提高了3倍和4.19倍。
{"title":"PAARD: Proximity-aware all-reduce communication for dragonfly networks","authors":"Junchao Ma,&nbsp;Dezun Dong,&nbsp;Fei Lei,&nbsp;Liquan Xiao","doi":"10.1016/j.jpdc.2025.105201","DOIUrl":"10.1016/j.jpdc.2025.105201","url":null,"abstract":"<div><div>The All-Reduce operation is one of the most widely used collective communication operations, and it is widely used in the research and engineering fields of high-performance computing(HPC) and distributed machine learning(DML). Previous optimization work for All-Reduce operation is to design new algorithms only for different message size and different number of processors, and ignores the optimization that can be achieved by considering the topology. Dragonfly is a popular topology for current and future high-speed interconnection networks. The hierarchical characteristics of dragonfly network can be utilized to effectively reduce hardware overhead while ensuring low end-to-end transmission latency. This paper offers a first attempt to design an efficient All-Reduce algorithm on dragonfly networks, referenced as PAARD. Based on the hierarchical characteristics of dragonfly network, PAARD first proposes an end-to-end solution to alleviate congestion that could remarkably boost performance. We carefully design the algorithm of PAARD to ensure desirable performance with acceptable overhead and guarantee the generality when met marginal cases. Then, to illustrate the effectiveness of PAARD, we analyze the performance of PAARD with the state-of-the-art algorithm, Halving-doubling(HD) algorithm and Ring algorithm. The simulation results demonstrate that in our design the execution time can be improved by 3X for HD and 4.19x for Ring on 256 nodes of a 342-node dragonfly with minimal routing.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105201"},"PeriodicalIF":4.0,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues) 封面1 -完整的扉页(每期)/特刊扉页(每期)
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-17 DOI: 10.1016/S0743-7315(25)00161-3
{"title":"Front Matter 1 - Full Title Page (regular issues)/Special Issue Title page (special issues)","authors":"","doi":"10.1016/S0743-7315(25)00161-3","DOIUrl":"10.1016/S0743-7315(25)00161-3","url":null,"abstract":"","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"207 ","pages":"Article 105194"},"PeriodicalIF":4.0,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145571754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy and performance efficient NAND flash translation layer architecture for low-latency edge applications 低延迟边缘应用的高能效NAND闪存转换层架构
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-17 DOI: 10.1016/j.jpdc.2025.105200
Ranjeeth Sekhar CB , Diksha Shekhawat , Jugal Gandhi , M. Santosh , Jai Gopal Pandey
This paper presents a hardware architecture, design, and implementation of a flash translation layer (FTL) for NAND flash memory devices. The proposed FTL system incorporates a hybrid logical-to-physical mapping scheme, wear leveling, garbage collection, bad block management, and error correcting codes (ECC). This architecture is designed to optimize the NAND flash memory management process, enhancing the overall performance and reliability. In this, hybrid logical-to-physical mapping and wear leveling schemes efficiently manage data placement, mitigating the inherent challenges of NAND flash memory, such as limited write endurance and page-based programming constraints. To validate the proposed hardware FTL, experimental evaluations have been performed, demonstrating its efficiency in terms of latency, dynamic power, and throughput. Hardware implementation is carried out on the Xilinx Zynq UltraScale+ ZCU102 platform containing the xczu9eg-2ffvb1156-2-e FPGA device. The proposed work has comparable resource utilization and improved datapath delay, throughput, and dynamic power, with practical implications for edge computing applications.
本文提出一种NAND快闪储存装置的快闪转换层(FTL)的硬体架构、设计与实作。提出的FTL系统包含混合逻辑到物理映射方案、磨损均衡、垃圾收集、坏块管理和纠错码(ECC)。该架构旨在优化NAND闪存管理流程,提高整体性能和可靠性。在这种情况下,混合逻辑到物理映射和损耗均衡方案有效地管理数据放置,减轻了NAND闪存的固有挑战,例如有限的写入持久性和基于页面的编程约束。为了验证所提出的硬件超光速,进行了实验评估,证明了其在延迟、动态功率和吞吐量方面的效率。硬件实现在Xilinx Zynq UltraScale+ ZCU102平台上进行,该平台包含xczu9egg -2ffvb1156-2-e FPGA器件。提出的工作具有相当的资源利用率和改进的数据路径延迟、吞吐量和动态功率,对边缘计算应用具有实际意义。
{"title":"Energy and performance efficient NAND flash translation layer architecture for low-latency edge applications","authors":"Ranjeeth Sekhar CB ,&nbsp;Diksha Shekhawat ,&nbsp;Jugal Gandhi ,&nbsp;M. Santosh ,&nbsp;Jai Gopal Pandey","doi":"10.1016/j.jpdc.2025.105200","DOIUrl":"10.1016/j.jpdc.2025.105200","url":null,"abstract":"<div><div>This paper presents a hardware architecture, design, and implementation of a flash translation layer (FTL) for NAND flash memory devices. The proposed FTL system incorporates a hybrid logical-to-physical mapping scheme, wear leveling, garbage collection, bad block management, and error correcting codes (ECC). This architecture is designed to optimize the NAND flash memory management process, enhancing the overall performance and reliability. In this, hybrid logical-to-physical mapping and wear leveling schemes efficiently manage data placement, mitigating the inherent challenges of NAND flash memory, such as limited write endurance and page-based programming constraints. To validate the proposed hardware FTL, experimental evaluations have been performed, demonstrating its efficiency in terms of latency, dynamic power, and throughput. Hardware implementation is carried out on the Xilinx Zynq UltraScale+ ZCU102 platform containing the xczu9eg-2ffvb1156-2-e FPGA device. The proposed work has comparable resource utilization and improved datapath delay, throughput, and dynamic power, with practical implications for edge computing applications.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105200"},"PeriodicalIF":4.0,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new switch buffer architecture for dragonfly networks 蜻蜓网络的一种新的交换缓冲架构
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-15 DOI: 10.1016/j.jpdc.2025.105199
Alejandro Cano , Cristóbal Camarero , Carmen Martínez , Ramón Beivide
Dragonfly networks offer a viable solution for large-scale supercomputers and datacenters. However, developing efficient routing mechanisms for these networks presents significant challenges. Current solutions often lead to unstable network behavior due to congestion and fairness issues, exacerbating performance variability and the tail-latency problem. An analysis of the topology and its standard deadlock avoidance mechanisms reveals that server access to global network links varies based on their location in the network, resulting in throughput unfairness. To address this issue, this paper introduces a novel switch buffer architecture which reduces head-of-line blocking and enhances fairness, to significantly improve overall network performance. Despite offering comparable cost to existing solutions, the proposed buffer architecture proves superior performance. Real-world synthetic simulations scenarios further confirm these findings, showing performance improvements between 10 % and 47 % against conventional solutions in medium sized Dragonflies.
蜻蜓网络为大型超级计算机和数据中心提供了一个可行的解决方案。然而,为这些网络开发有效的路由机制提出了重大挑战。由于拥塞和公平性问题,当前的解决方案常常导致网络行为不稳定,加剧了性能可变性和尾部延迟问题。对拓扑结构及其标准死锁避免机制的分析表明,服务器对全局网络链路的访问因其在网络中的位置而异,从而导致吞吐量不公平。为了解决这一问题,本文引入了一种新颖的交换机缓冲结构,该结构减少了线路头阻塞并增强了公平性,从而显著提高了网络的整体性能。尽管提供了与现有解决方案相当的成本,但所提出的缓冲体系结构证明了卓越的性能。真实世界的合成模拟场景进一步证实了这些发现,显示中型蜻蜓的性能比传统解决方案提高了10%到47%。
{"title":"A new switch buffer architecture for dragonfly networks","authors":"Alejandro Cano ,&nbsp;Cristóbal Camarero ,&nbsp;Carmen Martínez ,&nbsp;Ramón Beivide","doi":"10.1016/j.jpdc.2025.105199","DOIUrl":"10.1016/j.jpdc.2025.105199","url":null,"abstract":"<div><div>Dragonfly networks offer a viable solution for large-scale supercomputers and datacenters. However, developing efficient routing mechanisms for these networks presents significant challenges. Current solutions often lead to unstable network behavior due to congestion and fairness issues, exacerbating performance variability and the tail-latency problem. An analysis of the topology and its standard deadlock avoidance mechanisms reveals that server access to global network links varies based on their location in the network, resulting in throughput unfairness. To address this issue, this paper introduces a novel switch buffer architecture which reduces head-of-line blocking and enhances fairness, to significantly improve overall network performance. Despite offering comparable cost to existing solutions, the proposed buffer architecture proves superior performance. Real-world synthetic simulations scenarios further confirm these findings, showing performance improvements between 10 % and 47 % against conventional solutions in medium sized Dragonflies.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105199"},"PeriodicalIF":4.0,"publicationDate":"2025-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BMSES: Blockchain and mobile edge computing-based secure and energy-efficient system for healthcare data management BMSES:区块链和基于移动边缘计算的医疗保健数据管理安全和节能系统
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-13 DOI: 10.1016/j.jpdc.2025.105198
Md Nurul Hasan, Suyel Namasudra
Blockchain technology is rapidly being adopted across various sectors, including healthcare, finance, and agriculture, due to its key features like decentralization, immutability, and consensus mechanisms. These features ensure security, privacy, transparency, and accountability. On the other hand, Mobile Edge Computing (MEC) extends cloud computing capabilities to mobile devices through a distributed system. However, existing studies, which combine blockchain with MEC, often overlook the impact of data offloading on system performance. This paper proposes a Blockchain and MEC-based Secure and Energy-efficient System (BMSES) for sharing Internet of Medical Things (IoMT) data securely among patients and doctors, while optimizing energy consumption through task offloading to MEC servers. Here, the Non-Orthogonal Multiple Access (NOMA) protocol is utilized for efficient channel sharing among multiple users, which offers low cost, reduced latency, and low power consumption. The proposed scheme optimizes energy consumption by efficiently managing task delegation and resource allocation in MEC. Additionally, smart contracts automate blockchain operations, enhancing efficiency and security. The proposed scheme is evaluated in terms of energy consumption, transmission rate, latency, and offloading delay. The results of the experiments show the effectiveness of the proposed scheme compared to state-of-the-art offloading approaches in terms of improving energy efficiency, transmission rate, offloading delay, and latency of the system.
区块链技术由于其去中心化、不变性和共识机制等关键特性,正迅速被各个领域采用,包括医疗保健、金融和农业。这些特性确保了安全性、隐私性、透明性和可问责性。另一方面,移动边缘计算(MEC)通过分布式系统将云计算能力扩展到移动设备。然而,现有的研究将区块链与MEC结合起来,往往忽略了数据卸载对系统性能的影响。本文提出了一种基于区块链和MEC的安全与节能系统(BMSES),用于在患者和医生之间安全地共享医疗物联网(IoMT)数据,同时通过将任务卸载到MEC服务器来优化能耗。在这里,利用非正交多址(NOMA)协议在多个用户之间进行有效的信道共享,从而提供低成本、低延迟和低功耗。该方案通过有效地管理MEC中的任务分配和资源分配来优化能耗。此外,智能合约使区块链操作自动化,提高了效率和安全性。从能耗、传输速率、延迟和卸载延迟等方面对该方案进行了评估。实验结果表明,与目前最先进的卸载方法相比,该方案在提高能源效率、传输速率、卸载延迟和系统延迟方面是有效的。
{"title":"BMSES: Blockchain and mobile edge computing-based secure and energy-efficient system for healthcare data management","authors":"Md Nurul Hasan,&nbsp;Suyel Namasudra","doi":"10.1016/j.jpdc.2025.105198","DOIUrl":"10.1016/j.jpdc.2025.105198","url":null,"abstract":"<div><div>Blockchain technology is rapidly being adopted across various sectors, including healthcare, finance, and agriculture, due to its key features like decentralization, immutability, and consensus mechanisms. These features ensure security, privacy, transparency, and accountability. On the other hand, Mobile Edge Computing (MEC) extends cloud computing capabilities to mobile devices through a distributed system. However, existing studies, which combine blockchain with MEC, often overlook the impact of data offloading on system performance. This paper proposes a Blockchain and MEC-based Secure and Energy-efficient System (BMSES) for sharing Internet of Medical Things (IoMT) data securely among patients and doctors, while optimizing energy consumption through task offloading to MEC servers. Here, the Non-Orthogonal Multiple Access (NOMA) protocol is utilized for efficient channel sharing among multiple users, which offers low cost, reduced latency, and low power consumption. The proposed scheme optimizes energy consumption by efficiently managing task delegation and resource allocation in MEC. Additionally, smart contracts automate blockchain operations, enhancing efficiency and security. The proposed scheme is evaluated in terms of energy consumption, transmission rate, latency, and offloading delay. The results of the experiments show the effectiveness of the proposed scheme compared to state-of-the-art offloading approaches in terms of improving energy efficiency, transmission rate, offloading delay, and latency of the system.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105198"},"PeriodicalIF":4.0,"publicationDate":"2025-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145571798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reload: Deep reinforcement learning-based workload distribution for collaborative edges 重载:基于深度强化学习的协同边缘工作负载分配
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-05 DOI: 10.1016/j.jpdc.2025.105191
Yu Liang , Jidong Ge , Jie Wu , Sheng Zhang , Shiwu Wen , Bin Luo
Edge computing is one of the promising technologies that aim to enable timely computation at the network edge. Major service providers started to deploy geographically-distributed edge servers several years ago. A major challenge in geographically distributed edges is task scheduling, i.e., how to assign various tasks submitted by mobile users to distributed edges so as to optimize some metric. However, it is not easy to perform task scheduling in geographically-distributed edges. We observed that there are three major challenges in designing an efficient task scheduling solution in dynamic edge environments: heterogeneous tasks, dynamic edge networks, and heterogeneous edge servers. In this paper, we pursue a black-box solution for task scheduling in the collaborative edge environment while not relying on detailed analytical performance modeling. We propose Reload, an intelligent deep reinforcement learning-based task scheduler. Reload learns a policy purely based on the known information, without foreseeing the future. Reload depicts its policy as a neural network that maps “raw” observations to scheduling actions. During training, Reload starts out knowing nothing and gradually learns to make better scheduling decisions through reinforcement, in the form of reward signals for past decisions. Reload leverages Advantage Actor Critic to train the policy network. We evaluate Reload using extensive simulations.
边缘计算是一种很有前途的技术,旨在实现网络边缘的及时计算。几年前,主要的服务提供商开始部署地理分布的边缘服务器。任务调度是地理分布边的一个主要挑战,即如何将移动用户提交的各种任务分配到分布边以优化某些度量。然而,在地理分布的边缘上执行任务调度并不容易。我们观察到,在动态边缘环境中设计有效的任务调度解决方案存在三个主要挑战:异构任务、动态边缘网络和异构边缘服务器。在本文中,我们在协作边缘环境中寻求任务调度的黑盒解决方案,而不依赖于详细的分析性能建模。我们提出Reload,一个基于深度强化学习的智能任务调度程序。Reload完全根据已知信息学习策略,而不需要预测未来。Reload将其策略描述为一个神经网络,将“原始”观察映射到调度操作。在训练过程中,Reload一开始什么都不知道,然后通过对过去决策的奖励信号的强化,逐渐学会做出更好的调度决策。Reload利用优势演员评论家来训练政策网络。我们使用大量的模拟来评估Reload。
{"title":"Reload: Deep reinforcement learning-based workload distribution for collaborative edges","authors":"Yu Liang ,&nbsp;Jidong Ge ,&nbsp;Jie Wu ,&nbsp;Sheng Zhang ,&nbsp;Shiwu Wen ,&nbsp;Bin Luo","doi":"10.1016/j.jpdc.2025.105191","DOIUrl":"10.1016/j.jpdc.2025.105191","url":null,"abstract":"<div><div>Edge computing is one of the promising technologies that aim to enable timely computation at the network edge. Major service providers started to deploy geographically-distributed edge servers several years ago. A major challenge in geographically distributed edges is task scheduling, i.e., how to assign various tasks submitted by mobile users to distributed edges so as to optimize some metric. However, it is not easy to perform task scheduling in geographically-distributed edges. We observed that there are three major challenges in designing an efficient task scheduling solution in dynamic edge environments: heterogeneous tasks, dynamic edge networks, and heterogeneous edge servers. In this paper, we pursue a black-box solution for task scheduling in the collaborative edge environment while not relying on detailed analytical performance modeling. We propose Reload, an intelligent deep reinforcement learning-based task scheduler. Reload learns a policy purely based on the known information, without foreseeing the future. Reload depicts its policy as a neural network that maps “raw” observations to scheduling actions. During training, Reload starts out knowing nothing and gradually learns to make better scheduling decisions through reinforcement, in the form of reward signals for past decisions. Reload leverages Advantage Actor Critic to train the policy network. We evaluate Reload using extensive simulations.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"209 ","pages":"Article 105191"},"PeriodicalIF":4.0,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145571881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the privacy preservation and secure communication in fog-based mobile crowdsensing 基于雾的移动众测隐私保护与安全通信研究
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-02 DOI: 10.1016/j.jpdc.2025.105184
Sunday Oyinlola Ogundoyin , Ismaila Adeniyi Kamil , Isaac Adewale Ojedokun , John Oluwaseun Babalola , Vincent Omollo Nyangaresi
The rapid growth of mobile crowdsensing (MCS) presents significant opportunities for large-scale data collection through the collaborative use of smart devices. However, the increasing volume of sensitive data generated by MCS services poses critical challenges in terms of privacy and security, particularly latency-sensitive applications. While some solutions exist, many still lack the scalability, robustness, efficiency, and privacy preservation required by MCS services. This paper proposes a privacy-preserving and secure fog-based MCS (FB-MCS) scheme, comprising a four-tier fog computing architecture that incorporates dynamic lower-tier fog (LTF) and static upper-tier fog (UTF) systems to enable efficient data aggregation, privacy protection, and secure communication. The proposed scheme utilizes secret sharing and homomorphic MAC techniques for efficient and verifiable data aggregation over multi-dimensional data, allowing a data requester to verify the accuracy and integrity of the aggregated results. The scheme employs a lightweight elliptic curve cryptography (ECC) to ensure secure authentication without overburdening resource-constrained devices. An adaptive fog node selection strategy, based on trust and mobility, is proposed for reliable real-time task allocation. Extensive security analysis demonstrates that the scheme not only guarantees privacy preservation, integrity of aggregation results, strong anonymity, un-linkability, traceability, and resistance to well-known attacks but also achieves data confidentiality and unforgeability in the random oracle model under Type I and Type II adversaries, assuming the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP) are intractable. Moreover, performance assessments indicate that the proposed scheme surpasses previous advanced solutions, achieving a 48 % – 280 % improvement in efficiency.
移动群体感知(MCS)的快速发展为通过智能设备的协同使用进行大规模数据收集提供了重要机会。然而,MCS服务生成的敏感数据量不断增加,在隐私和安全方面带来了严峻的挑战,特别是对延迟敏感的应用程序。虽然存在一些解决方案,但许多解决方案仍然缺乏MCS服务所需的可伸缩性、健壮性、效率和隐私保护。本文提出了一种隐私保护和安全的基于雾的MCS (FB-MCS)方案,该方案包括一个四层雾计算架构,该架构结合了动态下层雾(LTF)和静态上层雾(UTF)系统,以实现高效的数据聚合、隐私保护和安全通信。该方案利用秘密共享和同态MAC技术对多维数据进行有效和可验证的数据聚合,允许数据请求者验证聚合结果的准确性和完整性。该方案采用轻量级的椭圆曲线加密(ECC)来确保安全认证,而不会给资源受限的设备带来过重的负担。提出了一种基于信任和可移动性的自适应雾节点选择策略,用于实时可靠的任务分配。大量的安全性分析表明,该方案不仅保证了隐私保护、聚合结果的完整性、强匿名性、不可链接性、可追溯性和抗知名攻击,而且在假设计算Diffie-Hellman问题(CDHP)和离散对数问题(DLP)难以处理的情况下,在I类和II类对手的随机oracle模型中实现了数据的保密性和不可伪造性。此外,性能评估表明,所提出的方案超过了以前的先进解决方案,实现了48% - 280%的效率提高。
{"title":"On the privacy preservation and secure communication in fog-based mobile crowdsensing","authors":"Sunday Oyinlola Ogundoyin ,&nbsp;Ismaila Adeniyi Kamil ,&nbsp;Isaac Adewale Ojedokun ,&nbsp;John Oluwaseun Babalola ,&nbsp;Vincent Omollo Nyangaresi","doi":"10.1016/j.jpdc.2025.105184","DOIUrl":"10.1016/j.jpdc.2025.105184","url":null,"abstract":"<div><div>The rapid growth of mobile crowdsensing (MCS) presents significant opportunities for large-scale data collection through the collaborative use of smart devices. However, the increasing volume of sensitive data generated by MCS services poses critical challenges in terms of privacy and security, particularly latency-sensitive applications. While some solutions exist, many still lack the scalability, robustness, efficiency, and privacy preservation required by MCS services. This paper proposes a privacy-preserving and secure fog-based MCS (FB-MCS) scheme, comprising a four-tier fog computing architecture that incorporates dynamic lower-tier fog (LTF) and static upper-tier fog (UTF) systems to enable efficient data aggregation, privacy protection, and secure communication. The proposed scheme utilizes secret sharing and homomorphic MAC techniques for efficient and verifiable data aggregation over multi-dimensional data, allowing a data requester to verify the accuracy and integrity of the aggregated results. The scheme employs a lightweight elliptic curve cryptography (ECC) to ensure secure authentication without overburdening resource-constrained devices. An adaptive fog node selection strategy, based on trust and mobility, is proposed for reliable real-time task allocation. Extensive security analysis demonstrates that the scheme not only guarantees privacy preservation, integrity of aggregation results, strong anonymity, un-linkability, traceability, and resistance to well-known attacks but also achieves data confidentiality and unforgeability in the random oracle model under Type I and Type II adversaries, assuming the Computational Diffie-Hellman Problem (CDHP) and Discrete Logarithm Problem (DLP) are intractable. Moreover, performance assessments indicate that the proposed scheme surpasses previous advanced solutions, achieving a 48 % – 280 % improvement in efficiency.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105184"},"PeriodicalIF":4.0,"publicationDate":"2025-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diverse attack detection in IoT using hybrid deep convolutional with capsule auto encoder for intrusion detection model 利用混合深度卷积和胶囊自动编码器的入侵检测模型进行物联网中的多种攻击检测
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-10-28 DOI: 10.1016/j.jpdc.2025.105190
M. Dharmalingam , Kamalraj Subramaniam , Ashwin M , N. Nandhagopal
One rapidly expanding technology that is effectively employed in many different applications is the Internet of Things (IoT) network. There are daily communication issues in an Internet of Things network because of the enormous number of connecting nodes. A cloud service is used as a backend by the IoT platform to process data and manage remote control. A successful intrusion detection system (IDS) that can track computer sources and generate data on suspicious or unusual activity is essential for managing the growing complexity of cyberattacks. The security of the IoT network may increasingly become a major issue as IoT technology becomes widely used. Due to the large number and diversity of IoT devices, protecting IoT systems with conventional IDS is difficult. This proposed approach can mitigate the problems of existing studies and achieve better results in the process of detection IoT attacks. Initially, min-max normalization is used to pre-process the inputs to speed up training and improve the efficiency of the proposed model. From the normalized data, a new Adaptive Eagle Cat Optimization (AECO) with unique hunting and search functions is used to select features. Finally, based on the selected features, a Hybrid Deep Convolutional with Capsule Auto Encoder (Hybrid_DCAE) is proposed to classify various intruders, and an Enhanced Gannet Optimization Algorithm (EGOA) is used to fine-tune the parameters for improved system performance. The results analysis shows that the proposed model achieved 96.8 % accuracy in the BoT-IoT dataset, 97.21 % in CICIDS-2017, 97.55 % in UNSW-NB15, and 97.4 % in the DS2OS dataset.
物联网(IoT)网络是一种快速扩展的技术,它被有效地应用于许多不同的应用中。在物联网网络中,由于连接节点的数量巨大,因此存在日常通信问题。云服务被物联网平台用作后端,用于处理数据和管理远程控制。一个成功的入侵检测系统(IDS)可以跟踪计算机来源并生成可疑或异常活动的数据,对于管理日益复杂的网络攻击至关重要。随着物联网技术的广泛应用,物联网网络的安全性可能日益成为一个主要问题。由于物联网设备的数量和多样性,用传统的IDS保护物联网系统是困难的。提出的方法可以减轻现有研究的问题,并在检测物联网攻击的过程中取得更好的结果。首先,使用最小-最大归一化对输入进行预处理,以加快训练速度,提高模型的效率。从归一化的数据中,使用一种新的具有独特的狩猎和搜索功能的自适应鹰猫优化(AECO)来选择特征。最后,基于所选特征,提出了一种带有胶囊自动编码器的混合深度卷积算法(Hybrid_DCAE)对各种入侵者进行分类,并使用增强塘鹅优化算法(EGOA)对参数进行微调,以提高系统性能。结果分析表明,该模型在BoT-IoT数据集中的准确率为96.8%,在CICIDS-2017、UNSW-NB15和ds2s数据集中的准确率分别为97.21%、97.55%和97.4%。
{"title":"Diverse attack detection in IoT using hybrid deep convolutional with capsule auto encoder for intrusion detection model","authors":"M. Dharmalingam ,&nbsp;Kamalraj Subramaniam ,&nbsp;Ashwin M ,&nbsp;N. Nandhagopal","doi":"10.1016/j.jpdc.2025.105190","DOIUrl":"10.1016/j.jpdc.2025.105190","url":null,"abstract":"<div><div>One rapidly expanding technology that is effectively employed in many different applications is the Internet of Things (IoT) network. There are daily communication issues in an Internet of Things network because of the enormous number of connecting nodes. A cloud service is used as a backend by the IoT platform to process data and manage remote control. A successful intrusion detection system (IDS) that can track computer sources and generate data on suspicious or unusual activity is essential for managing the growing complexity of cyberattacks. The security of the IoT network may increasingly become a major issue as IoT technology becomes widely used. Due to the large number and diversity of IoT devices, protecting IoT systems with conventional IDS is difficult. This proposed approach can mitigate the problems of existing studies and achieve better results in the process of detection IoT attacks. Initially, min-max normalization is used to pre-process the inputs to speed up training and improve the efficiency of the proposed model. From the normalized data, a new Adaptive Eagle Cat Optimization (AECO) with unique hunting and search functions is used to select features. Finally, based on the selected features, a Hybrid Deep Convolutional with Capsule Auto Encoder (Hybrid_DCAE) is proposed to classify various intruders, and an Enhanced Gannet Optimization Algorithm (EGOA) is used to fine-tune the parameters for improved system performance. The results analysis shows that the proposed model achieved 96.8 % accuracy in the BoT-IoT dataset, 97.21 % in CICIDS-2017, 97.55 % in UNSW-NB15, and 97.4 % in the DS2OS dataset.</div></div>","PeriodicalId":54775,"journal":{"name":"Journal of Parallel and Distributed Computing","volume":"208 ","pages":"Article 105190"},"PeriodicalIF":4.0,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Parallel and Distributed Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1