首页 > 最新文献

Journal of Cloud Computing-Advances Systems and Applications最新文献

英文 中文
EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge Computing EVONChain:一种面向边缘计算的双层网络公共区块链架构
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00050
Yihan Kong, Qinyang Chen, Jing Li, Ting Xiong, Tao Xie
This paper introduces EVONChain, a nature-inspired evolvable blockchain that addresses scalability issues in large-scale blockchain applications. EVONChain decouples the functions of a full blockchain node into two consensus phases. A small number of high-performance cloud nodes in the inner network handle transaction validation, block packaging, and consistent replication using the “longest chain” rule. Meanwhile, a large number of low-performance user nodes connected by Mobile Edge Computing (MEC) providers in the outer network handle the Proof of Intelligent (PoI), a novel Proof of Work (PoW) mechanism that resists Application-Specific Integrated Circuit (ASIC) computing and enables “one-CPU-one-vote” principle. This architecture enables EVONChain to achieve perfect decentralization, high scalability and security. To evaluate EVONChain’s performance, we developed a simulator. Simulation results show that EVONChain can achieve a throughput of over 10,000 transactions per second (TPS) with an inner network bandwidth of 4Gbps, a block interval of 10 seconds, and an orphaned block rate of less than 7%. This indicates that EVONChain significantly improves performance scalability for high-frequency applications, reduces confirmation time to the minute level, while maintaining a comparable level of security to the Ethereum network.
本文介绍了EVONChain,这是一种受自然启发的可进化区块链,用于解决大规模区块链应用中的可扩展性问题。EVONChain将完整区块链节点的功能解耦为两个共识阶段。内部网络中的少数高性能云节点使用“最长链”规则处理事务验证、块打包和一致复制。与此同时,外部网络中由移动边缘计算(MEC)提供商连接的大量低性能用户节点处理智能证明(PoI),这是一种新颖的工作量证明(PoW)机制,可以抵抗专用集成电路(ASIC)计算,并实现“一cpu一票”原则。这种架构使EVONChain能够实现完美的去中心化、高扩展性和安全性。为了评估EVONChain的性能,我们开发了一个模拟器。仿真结果表明,EVONChain在内部网络带宽为4Gbps、块间隔为10秒、孤立块率小于7%的情况下,可以实现每秒10000笔交易(TPS)以上的吞吐量。这表明EVONChain显著提高了高频应用的性能可扩展性,将确认时间缩短到分钟级别,同时保持了与以太坊网络相当的安全级别。
{"title":"EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge Computing","authors":"Yihan Kong, Qinyang Chen, Jing Li, Ting Xiong, Tao Xie","doi":"10.1109/CSCloud-EdgeCom58631.2023.00050","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00050","url":null,"abstract":"This paper introduces EVONChain, a nature-inspired evolvable blockchain that addresses scalability issues in large-scale blockchain applications. EVONChain decouples the functions of a full blockchain node into two consensus phases. A small number of high-performance cloud nodes in the inner network handle transaction validation, block packaging, and consistent replication using the “longest chain” rule. Meanwhile, a large number of low-performance user nodes connected by Mobile Edge Computing (MEC) providers in the outer network handle the Proof of Intelligent (PoI), a novel Proof of Work (PoW) mechanism that resists Application-Specific Integrated Circuit (ASIC) computing and enables “one-CPU-one-vote” principle. This architecture enables EVONChain to achieve perfect decentralization, high scalability and security. To evaluate EVONChain’s performance, we developed a simulator. Simulation results show that EVONChain can achieve a throughput of over 10,000 transactions per second (TPS) with an inner network bandwidth of 4Gbps, a block interval of 10 seconds, and an orphaned block rate of less than 7%. This indicates that EVONChain significantly improves performance scalability for high-frequency applications, reduces confirmation time to the minute level, while maintaining a comparable level of security to the Ethereum network.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"81 1","pages":"247-253"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83609665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm-based Study on Transformation Combination for Carry-free Modified Signed Digit(MSD) Addition 基于算法的无携带修改符号数字加法变换组合研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00058
Baofeng Qi, Shaojiang Sun, Yihui Tong, J. Zhang, Zhehe Wang, Xianchao Wang
Addition is the most basic operation in arithmetic. And the binary number system is used to implement the adder in modern electronic computer. The inherent properties of binary make it difficult to implement carry-free addition. And the redundancy of Modified Signed Digit(MSD) number system has been applied to implementing carry-free addition by use of four logic transformations. This paper explores in depth the reason why the MSD number system can be used to implement carry-free addition and obtain 16 pairs of transformation which can be used to implement MSD addition. Moreover, we obtain all transformation combinations for three-step MSD addition by designing relevant algorithms. Meanwhile, we find the test data set with minimum number of trits for MSD addition. Finally, to improve computational efficiency, we explore the optimal transformation combinations for implementation of MSD adder. And we find that there are four optimal transformation combinations, i.e. (5, 3, 0), (5, 3, 1), (10,2,0), and (10, 2, 4) which all use the same number of basic operating units(BOUs).
加法是算术中最基本的运算。在现代电子计算机中,加法器是用二进制来实现的。二进制的固有性质使其难以实现无进位加法。并利用修正符号数(MSD)数系统的冗余性,利用四种逻辑变换实现了无进位加法。本文深入探讨了MSD数制可用于实现无进位加法的原因,得到了可用于实现MSD加法的16对变换。此外,通过设计相关算法,得到了三步MSD加法的所有变换组合。同时,我们找到了用于MSD添加的最小特征的测试数据集。最后,为了提高计算效率,我们探索了实现MSD加法器的最佳变换组合。我们发现有四种最优变换组合,即(5,3,0)、(5,3,1)、(10,2,0)和(10,2,4),它们都使用相同数量的基本操作单元(bou)。
{"title":"Algorithm-based Study on Transformation Combination for Carry-free Modified Signed Digit(MSD) Addition","authors":"Baofeng Qi, Shaojiang Sun, Yihui Tong, J. Zhang, Zhehe Wang, Xianchao Wang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00058","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00058","url":null,"abstract":"Addition is the most basic operation in arithmetic. And the binary number system is used to implement the adder in modern electronic computer. The inherent properties of binary make it difficult to implement carry-free addition. And the redundancy of Modified Signed Digit(MSD) number system has been applied to implementing carry-free addition by use of four logic transformations. This paper explores in depth the reason why the MSD number system can be used to implement carry-free addition and obtain 16 pairs of transformation which can be used to implement MSD addition. Moreover, we obtain all transformation combinations for three-step MSD addition by designing relevant algorithms. Meanwhile, we find the test data set with minimum number of trits for MSD addition. Finally, to improve computational efficiency, we explore the optimal transformation combinations for implementation of MSD adder. And we find that there are four optimal transformation combinations, i.e. (5, 3, 0), (5, 3, 1), (10,2,0), and (10, 2, 4) which all use the same number of basic operating units(BOUs).","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"33 1","pages":"298-304"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90834923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks 基于启发式的工业TSN网络动态调度与路由方法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00081
Honglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve such challenges, a set of protocol standards developed by IEEE802.1 working group, namely Time-sensitive Networking (TSN), has been introduced into industrial networks. TSN can provide high real-time and reliability for data transmission, where the reliability is achieved by Frame duplication and Frame Elimination (FRER). In the realization process of FRER, it is necessary to determine the source node, destination node, and multiple disjoint paths to transmit redundant data. However, the transmission of these redundant traffic may result in the delay of other flows, and then affects the user experience. Therefore, it is very important to choose excellent redundant traffic paths to ensure reliability and reduce the impact on other flows. In the existing research, there are many dynamic scheduling and routing heuristics to determine the path, but they do not consider the influence of the location of the source node on the whole route scheduling. This paper proposes an improved dynamic scheduling and routing heuristic method, which takes the source node into account in the routing selection. In the flow test experiments of different magnitudes, it is found that the total delay of all flows is reduced by 1.4%-4.5% under the same magnitude of schedulability compared with Ant Colony Optimization.
在工业环境中,机器往往需要将异常检测结果及时反映到总控制中心,一般工业网络无法实现高实时性。为了解决这些挑战,IEEE802.1工作组开发的一套协议标准,即时间敏感网络(TSN)被引入到工业网络中。TSN可以为数据传输提供较高的实时性和可靠性,其中可靠性是通过帧重复和帧消除(Frame duplication and Frame Elimination, FRER)实现的。在frr的实现过程中,需要确定源节点、目的节点和多条不相交的路径来传输冗余数据。但是,这些冗余流量的传输可能会导致其他流量的传输延迟,从而影响用户体验。因此,选择优秀的冗余流量路径以保证可靠性和减少对其他流量的影响是非常重要的。在现有的研究中,有许多动态调度和路由启发式方法来确定路径,但它们没有考虑源节点位置对整个路由调度的影响。本文提出了一种改进的动态调度和路由启发式方法,该方法在路由选择中考虑了源节点。在不同量级的流测试实验中发现,在相同量级的可调度性下,与蚁群优化相比,所有流的总延迟减少了1.4% ~ 4.5%。
{"title":"A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks","authors":"Honglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao","doi":"10.1109/CSCloud-EdgeCom58631.2023.00081","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00081","url":null,"abstract":"In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve such challenges, a set of protocol standards developed by IEEE802.1 working group, namely Time-sensitive Networking (TSN), has been introduced into industrial networks. TSN can provide high real-time and reliability for data transmission, where the reliability is achieved by Frame duplication and Frame Elimination (FRER). In the realization process of FRER, it is necessary to determine the source node, destination node, and multiple disjoint paths to transmit redundant data. However, the transmission of these redundant traffic may result in the delay of other flows, and then affects the user experience. Therefore, it is very important to choose excellent redundant traffic paths to ensure reliability and reduce the impact on other flows. In the existing research, there are many dynamic scheduling and routing heuristics to determine the path, but they do not consider the influence of the location of the source node on the whole route scheduling. This paper proposes an improved dynamic scheduling and routing heuristic method, which takes the source node into account in the routing selection. In the flow test experiments of different magnitudes, it is found that the total delay of all flows is reduced by 1.4%-4.5% under the same magnitude of schedulability compared with Ant Colony Optimization.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"12 1","pages":"440-445"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87290712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Semantics-enhanced Decentralized Open IoT Service Platform 安全语义增强的分散式开放物联网服务平台
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00066
Vikram Pandey, Juan Li, Yan Bai
This paper proposes an innovative IoT service platform that leverages blockchain technology to enable secure and scalable IoT services. The platform is designed to be open to multiple IoT services and applications, and can be easily extended to provide secure registration, discovery, access, and payment services to both IoT providers and consumers. The proposed platform adopts an ontology-based approach for describing IoT services, which enables flexible and natural search for relevant services by both humans and machines. The use of semantic service descriptions also allows for effective access control to device data and secure transactions through the use of smart contracts. To increase scalability, we have utilized a peer-to-peer (P2P) based method to store and index service metadata, which enables efficient and scalable service discovery. Our experimental results have demonstrated the effectiveness of the proposed system in providing secure and scalable IoT services, while also enabling flexible and natural search for relevant services. Overall, the proposed IoT service platform has the potential to make IoT more accessible for daily use, while also providing enhanced security and scalability for IoT services.
本文提出了一种创新的物联网服务平台,利用区块链技术实现安全、可扩展的物联网服务。该平台旨在向多种物联网服务和应用开放,并且可以轻松扩展,为物联网提供商和消费者提供安全的注册、发现、访问和支付服务。提出的平台采用基于本体的方法来描述物联网服务,使人和机器能够灵活自然地搜索相关服务。语义服务描述的使用还允许对设备数据进行有效的访问控制,并通过使用智能合约来保护事务。为了提高可伸缩性,我们使用了基于点对点(P2P)的方法来存储和索引服务元数据,从而实现高效和可扩展的服务发现。我们的实验结果证明了所提出的系统在提供安全和可扩展的物联网服务方面的有效性,同时还实现了对相关服务的灵活和自然搜索。总体而言,拟议的物联网服务平台有可能使物联网更易于日常使用,同时还为物联网服务提供增强的安全性和可扩展性。
{"title":"A Secure Semantics-enhanced Decentralized Open IoT Service Platform","authors":"Vikram Pandey, Juan Li, Yan Bai","doi":"10.1109/CSCloud-EdgeCom58631.2023.00066","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00066","url":null,"abstract":"This paper proposes an innovative IoT service platform that leverages blockchain technology to enable secure and scalable IoT services. The platform is designed to be open to multiple IoT services and applications, and can be easily extended to provide secure registration, discovery, access, and payment services to both IoT providers and consumers. The proposed platform adopts an ontology-based approach for describing IoT services, which enables flexible and natural search for relevant services by both humans and machines. The use of semantic service descriptions also allows for effective access control to device data and secure transactions through the use of smart contracts. To increase scalability, we have utilized a peer-to-peer (P2P) based method to store and index service metadata, which enables efficient and scalable service discovery. Our experimental results have demonstrated the effectiveness of the proposed system in providing secure and scalable IoT services, while also enabling flexible and natural search for relevant services. Overall, the proposed IoT service platform has the potential to make IoT more accessible for daily use, while also providing enhanced security and scalability for IoT services.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"157 1","pages":"349-356"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77476020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal-aware QoS Prediction based on Tensor Factorization and Self-Attention for Cloud Services 基于张量分解和自关注的云服务时间感知QoS预测
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00042
Wenyu Tang, Mingdong Tang, Fenfang Xie
The widespread adoption of cloud computing has given rise to numerous cloud services with various functionalities, which are very useful in creating cloud applications. To ensure high reliability of cloud applications, it is crucial to invoke the right cloud services with optimal quality of service (QoS) in the runtime. Thus, predicting QoS of cloud services dynamically becomes a need. Previous methods do not take into a full consideration of the relationships between users, services, and time, thus their models’ expressive ability is limited. Based on the intricate relationships between users, services and time, this paper proposes a temporal-aware QoS prediction approach via exploiting tensor factorization and self-attention representation (TFSA) for cloud services. TFSA firsty utilizes tensor factorization to historical QoS data and leverages a self-attention mechanism to refine the personalized representations of users, services and time. Then, TFSA integrates the original and personalized representations for QoS predictions. Extensive experiments conducted on a real-world dataset show that the proposed approach significantly outperforms the other state-of-the-art methods with better prediction accuracy.
云计算的广泛采用产生了许多具有各种功能的云服务,这些服务在创建云应用程序时非常有用。为了确保云应用程序的高可靠性,在运行时调用具有最佳服务质量(QoS)的正确云服务至关重要。因此,动态预测云服务的QoS成为一种需求。以往的方法没有充分考虑用户、服务和时间之间的关系,模型的表达能力有限。基于用户、服务和时间之间的复杂关系,提出了一种基于张量分解和自关注表示(TFSA)的云服务时间感知QoS预测方法。TFSA首先对历史QoS数据进行张量分解,并利用自关注机制来细化用户、服务和时间的个性化表示。然后,TFSA集成了用于QoS预测的原始表示和个性化表示。在真实数据集上进行的大量实验表明,所提出的方法显著优于其他最先进的方法,具有更好的预测精度。
{"title":"Temporal-aware QoS Prediction based on Tensor Factorization and Self-Attention for Cloud Services","authors":"Wenyu Tang, Mingdong Tang, Fenfang Xie","doi":"10.1109/CSCloud-EdgeCom58631.2023.00042","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00042","url":null,"abstract":"The widespread adoption of cloud computing has given rise to numerous cloud services with various functionalities, which are very useful in creating cloud applications. To ensure high reliability of cloud applications, it is crucial to invoke the right cloud services with optimal quality of service (QoS) in the runtime. Thus, predicting QoS of cloud services dynamically becomes a need. Previous methods do not take into a full consideration of the relationships between users, services, and time, thus their models’ expressive ability is limited. Based on the intricate relationships between users, services and time, this paper proposes a temporal-aware QoS prediction approach via exploiting tensor factorization and self-attention representation (TFSA) for cloud services. TFSA firsty utilizes tensor factorization to historical QoS data and leverages a self-attention mechanism to refine the personalized representations of users, services and time. Then, TFSA integrates the original and personalized representations for QoS predictions. Extensive experiments conducted on a real-world dataset show that the proposed approach significantly outperforms the other state-of-the-art methods with better prediction accuracy.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"8 1","pages":"197-202"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82316510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning Privacy-preserving Method Based on Bregman Optimization 基于Bregman优化的联邦学习隐私保护方法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00023
Gengming Zhu, Jiyong Zhang, Shaobo Zhang, Yijie Yin
Federated learning has received a lot of attention for its ability to solve the data silo problem, but it is also limited by the problem of data heterogeneity and privacy. Non-Independent Identical Distribution (Non-I.I.D) data leads to performance degradation of federation models, and privacy problem have been studied as a hot topic in the field of federated learning. However, current research rarely considers non-I.I.D data and privacy simultaneously. In this paper, we propose a federated learning scheme based on Bregman and differential privacy (FLBDP). Our approach adopts Bregman distance for personalized model training, which aims to control the difference between local model and global model in a limited range, the FLBDP can reduce the model difference to improve the model performance by Bregman optimization. In addition, we use a Gaussian mechanism to perturb the personalized model and update the local model by the perturbed personalized model, which enables the model parameters to satisfy differential privacy in the uplink channel to enhance user privacy protection.
联邦学习因其解决数据竖井问题的能力而受到广泛关注,但它也受到数据异构和隐私问题的限制。非独立相同分布(Non-I.I.D)数据导致联邦模型性能下降,隐私问题已成为联邦学习领域的研究热点。然而,目前的研究很少考虑非i - i。同时保护数据和隐私。本文提出了一种基于Bregman和差分隐私(FLBDP)的联邦学习方案。我们的方法采用Bregman距离进行个性化的模型训练,目的是在有限的范围内控制局部模型与全局模型之间的差异,FLBDP可以通过Bregman优化来减小模型差异,从而提高模型性能。此外,我们采用高斯机制对个性化模型进行摄动,并通过摄动的个性化模型对局部模型进行更新,使模型参数能够满足上行信道中的差分隐私,从而增强用户隐私保护。
{"title":"Federated Learning Privacy-preserving Method Based on Bregman Optimization","authors":"Gengming Zhu, Jiyong Zhang, Shaobo Zhang, Yijie Yin","doi":"10.1109/CSCloud-EdgeCom58631.2023.00023","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00023","url":null,"abstract":"Federated learning has received a lot of attention for its ability to solve the data silo problem, but it is also limited by the problem of data heterogeneity and privacy. Non-Independent Identical Distribution (Non-I.I.D) data leads to performance degradation of federation models, and privacy problem have been studied as a hot topic in the field of federated learning. However, current research rarely considers non-I.I.D data and privacy simultaneously. In this paper, we propose a federated learning scheme based on Bregman and differential privacy (FLBDP). Our approach adopts Bregman distance for personalized model training, which aims to control the difference between local model and global model in a limited range, the FLBDP can reduce the model difference to improve the model performance by Bregman optimization. In addition, we use a Gaussian mechanism to perturb the personalized model and update the local model by the perturbed personalized model, which enables the model parameters to satisfy differential privacy in the uplink channel to enhance user privacy protection.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"43 1","pages":"85-90"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85825198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Virtual Channel Scheme Based on Multi-hop Payment Channel 一种基于多跳支付通道的高效虚拟通道方案
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00026
Feng Li, Yaqin Liu, W. Liang, Songyou Xie, Yang Yang, Yuhui Li
The transaction throughput and confirmation time of the current mainstream blockchain cryptocurrency platform are far lower than those of traditional centralized trading platforms, which is difficult to meet the growing needs of users. Therefore, this paper proposes an efficient multi-hop off-chain Virtual Channel (VC) payment scheme to improve the confirmation speed of transactions by performing high-frequency and small transactions off-chain. The proposed scheme constructs a virtual channel scheme with dynamic selection [1], [2] through Hash Time-Lock Contract (HTLC) and constant collateral, and closes the virtual channel through on-chain settlement to ensure the balance security and atomicity of transactions. The proposed VC scheme is suitable for multi-hop Payment Channel (PC) networks, after the VC construction is completed, the transaction initiator and receiver directly conduct transactions through the virtual channel, ensuring the privacy of the transaction. Experimental analysis shows that the proposed scheme can resist a variety of malicious attacks and realize a rapid and safe transaction process.
当前主流区块链加密货币平台的交易吞吐量和确认时间远低于传统的集中式交易平台,难以满足用户日益增长的需求。因此,本文提出了一种高效的多跳链下虚拟通道(VC)支付方案,通过进行高频、小额的链下交易来提高交易的确认速度。该方案通过哈希时间锁合约(HTLC)和常数抵押品构建动态选择[1]、[2]的虚拟通道方案,并通过链上结算关闭虚拟通道,保证交易的平衡安全性和原子性。本文提出的VC方案适用于多跳支付通道(PC)网络,在VC构建完成后,交易发起者和接收者直接通过虚拟通道进行交易,保证了交易的私密性。实验分析表明,该方案能够抵御多种恶意攻击,实现快速、安全的交易过程。
{"title":"An Efficient Virtual Channel Scheme Based on Multi-hop Payment Channel","authors":"Feng Li, Yaqin Liu, W. Liang, Songyou Xie, Yang Yang, Yuhui Li","doi":"10.1109/CSCloud-EdgeCom58631.2023.00026","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00026","url":null,"abstract":"The transaction throughput and confirmation time of the current mainstream blockchain cryptocurrency platform are far lower than those of traditional centralized trading platforms, which is difficult to meet the growing needs of users. Therefore, this paper proposes an efficient multi-hop off-chain Virtual Channel (VC) payment scheme to improve the confirmation speed of transactions by performing high-frequency and small transactions off-chain. The proposed scheme constructs a virtual channel scheme with dynamic selection [1], [2] through Hash Time-Lock Contract (HTLC) and constant collateral, and closes the virtual channel through on-chain settlement to ensure the balance security and atomicity of transactions. The proposed VC scheme is suitable for multi-hop Payment Channel (PC) networks, after the VC construction is completed, the transaction initiator and receiver directly conduct transactions through the virtual channel, ensuring the privacy of the transaction. Experimental analysis shows that the proposed scheme can resist a variety of malicious attacks and realize a rapid and safe transaction process.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"227 1","pages":"102-107"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76097313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation for urban computing scenarios: An overview and research challenges 城市计算场景的模拟:概述和研究挑战
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00012
Lin Wu, Guogui Yang, Jintao Yan, Shuguang Ran, Bao-kang Zhao, Huan Zhou
Urban computing is an emerging computing paradigm for processing urban data to serve urban applications, which is an important manner to realize smart cities. To be specific, cloud computing and edge computing are usually leveraged to support urban computing. As a distributed and extended solution for cloud computing, edge computing is capable of providing better data services for IoT devices. However, edge computing resources are widely distributed and edge devices are highly mobile. To guarantee the QoS (Quality of Service), it is challenging to decide where to distribute the computing resources according to edge devices, especially around a specific urban area. Therefore, it is essential to simulate and verify the solution through evaluation tools before practical deployment in urban scenarios. But urban computing is a relatively new paradigm, there are few evaluation tools for direct usage. To provide hints for useful tools, we perform a survey study on existing evaluation tools for edge computing, which can be somehow applied to urban computing. In this paper, we first classify and define the evaluation tools into three categories: simulators, emulators, and testbeds. Then we perform a comprehensive study on the above three categories. Finally, we conclude the research challenges for urban computing based on current evaluation tools.
城市计算是处理城市数据服务于城市应用的新兴计算范式,是实现智慧城市的重要方式。具体来说,通常利用云计算和边缘计算来支持城市计算。边缘计算作为云计算的分布式扩展解决方案,能够为物联网设备提供更好的数据服务。然而,边缘计算资源分布广泛,边缘设备具有高度移动性。为了保证服务质量(QoS),如何根据边缘设备确定计算资源的分布位置是一个挑战,特别是在特定的城市区域周围。因此,在实际部署到城市场景之前,有必要通过评估工具对解决方案进行模拟和验证。但是城市计算是一个相对较新的范式,很少有直接使用的评估工具。为了提供有用工具的提示,我们对现有的边缘计算评估工具进行了调查研究,这些工具可以以某种方式应用于城市计算。在本文中,我们首先将评估工具分为三类:模拟器、仿真器和试验台。然后对以上三类进行综合研究。最后,总结了基于现有评价工具的城市计算研究面临的挑战。
{"title":"Simulation for urban computing scenarios: An overview and research challenges","authors":"Lin Wu, Guogui Yang, Jintao Yan, Shuguang Ran, Bao-kang Zhao, Huan Zhou","doi":"10.1109/CSCloud-EdgeCom58631.2023.00012","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00012","url":null,"abstract":"Urban computing is an emerging computing paradigm for processing urban data to serve urban applications, which is an important manner to realize smart cities. To be specific, cloud computing and edge computing are usually leveraged to support urban computing. As a distributed and extended solution for cloud computing, edge computing is capable of providing better data services for IoT devices. However, edge computing resources are widely distributed and edge devices are highly mobile. To guarantee the QoS (Quality of Service), it is challenging to decide where to distribute the computing resources according to edge devices, especially around a specific urban area. Therefore, it is essential to simulate and verify the solution through evaluation tools before practical deployment in urban scenarios. But urban computing is a relatively new paradigm, there are few evaluation tools for direct usage. To provide hints for useful tools, we perform a survey study on existing evaluation tools for edge computing, which can be somehow applied to urban computing. In this paper, we first classify and define the evaluation tools into three categories: simulators, emulators, and testbeds. Then we perform a comprehensive study on the above three categories. Finally, we conclude the research challenges for urban computing based on current evaluation tools.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"8 1","pages":"12-17"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89242832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection Technology for Internet of Vehicles 车联网隐私保护技术
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00075
Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang
In the context of increasingly improved transportation infrastructure and increasing difficulty in vehicle management, vehicle networking technology has emerged in the public eye. Through rapid development in recent years, the Internet of Vehicles has formed a relatively stable system structure. Subsequently, the risk of attacks on the Internet of Vehicles continues to increase, and the weak password authentication and weak encryption of traditional Internet of Vehicles are no longer able to meet the current privacy protection requirements in the field of Internet of Vehicles. In order to solve the problem of information security in the Internet of Vehicles, privacy protection technology for the Internet of Vehicles was studied in the article. Firstly, the existing security risks of the Internet of Vehicles were introduced, followed by a specific analysis of privacy protection technologies such as Identity-Based Cryptograph, key management technology, and multi-dimensional authentication technology. Then, based on the development trend of existing technologies, the future development direction was predicted, and finally, the current privacy protection technologies for the Internet of Vehicles were summarized.
在交通基础设施日益完善,车辆管理难度越来越大的背景下,车联网技术开始进入大众视野。经过近年来的快速发展,车联网已经形成了相对稳定的体系结构。随后,车联网受到攻击的风险不断增加,传统车联网的弱密码认证和弱加密已经不能满足当前车联网领域的隐私保护需求。为了解决车联网中的信息安全问题,本文对车联网的隐私保护技术进行了研究。首先介绍了车联网存在的安全风险,然后对基于身份的加密技术、密钥管理技术、多维认证技术等隐私保护技术进行了具体分析。然后根据现有技术的发展趋势,对未来的发展方向进行了预测,最后对目前车联网隐私保护技术进行了总结。
{"title":"Privacy Protection Technology for Internet of Vehicles","authors":"Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang","doi":"10.1109/cscloud-edgecom58631.2023.00075","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00075","url":null,"abstract":"In the context of increasingly improved transportation infrastructure and increasing difficulty in vehicle management, vehicle networking technology has emerged in the public eye. Through rapid development in recent years, the Internet of Vehicles has formed a relatively stable system structure. Subsequently, the risk of attacks on the Internet of Vehicles continues to increase, and the weak password authentication and weak encryption of traditional Internet of Vehicles are no longer able to meet the current privacy protection requirements in the field of Internet of Vehicles. In order to solve the problem of information security in the Internet of Vehicles, privacy protection technology for the Internet of Vehicles was studied in the article. Firstly, the existing security risks of the Internet of Vehicles were introduced, followed by a specific analysis of privacy protection technologies such as Identity-Based Cryptograph, key management technology, and multi-dimensional authentication technology. Then, based on the development trend of existing technologies, the future development direction was predicted, and finally, the current privacy protection technologies for the Internet of Vehicles were summarized.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"14 1","pages":"405-410"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73935373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple Completely Adjacency List Oriented Relational Extraction Model 一个简单的面向完全邻接表的关系抽取模型
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00070
Jing Liao, Xiande Su, Cheng Peng
Entity relationship extraction aims to extract important triplet information from massive unstructured data, which is the basis of downstream tasks such as building a knowledge map. The graph perspective is used to analyze the entity and relationship extraction and build adjacency list oriented model to solve the problem of large space consumption of the adjacency matrix, but it uses complex operations to extract entities and relationships sequentially. Therefore, we propose a simple completely adjacency list oriented relationship extraction model. This model firstly introduce a realtion label-aware module to supplement sentence information and a feature separation module to alleviate the error accumulation problem caused by sequential extraction, and then sequentially extracts subjects, objects, and relations. Extensive experiments on two common datasets have shown that our model maintains high accuracy of 92.8while also significantly improving inference speed down from 35.7ms to 22.9ms.
实体关系提取旨在从海量非结构化数据中提取重要的三元组信息,这是构建知识地图等下游任务的基础。采用图透视法对实体和关系的提取进行分析,构建面向邻接表的模型,解决了邻接矩阵空间消耗大的问题,但对实体和关系的顺序提取操作复杂。因此,我们提出了一个简单的面向完全邻接表的关系提取模型。该模型首先引入关系标签感知模块来补充句子信息,引入特征分离模块来缓解顺序提取带来的错误积累问题,然后依次提取主题、对象和关系。在两个常用数据集上的大量实验表明,我们的模型保持了92.8的高精度,同时显著提高了推理速度,从35.7ms下降到22.9ms。
{"title":"A Simple Completely Adjacency List Oriented Relational Extraction Model","authors":"Jing Liao, Xiande Su, Cheng Peng","doi":"10.1109/cscloud-edgecom58631.2023.00070","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00070","url":null,"abstract":"Entity relationship extraction aims to extract important triplet information from massive unstructured data, which is the basis of downstream tasks such as building a knowledge map. The graph perspective is used to analyze the entity and relationship extraction and build adjacency list oriented model to solve the problem of large space consumption of the adjacency matrix, but it uses complex operations to extract entities and relationships sequentially. Therefore, we propose a simple completely adjacency list oriented relationship extraction model. This model firstly introduce a realtion label-aware module to supplement sentence information and a feature separation module to alleviate the error accumulation problem caused by sequential extraction, and then sequentially extracts subjects, objects, and relations. Extensive experiments on two common datasets have shown that our model maintains high accuracy of 92.8while also significantly improving inference speed down from 35.7ms to 22.9ms.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"43 1","pages":"375-380"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80221391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing-Advances Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1