首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Matching game approach for charging scheduling in vehicle-to-grid networks 车网充电调度的匹配博弈方法
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997149
Guanhua Qiao, S. Leng, M. Zeng, Yan Zhang
This paper study a new paradigm of heterogeneous charging stations (CSs) for the excellent charging services of Electric Vehicles (EVs) in a dense urban environment. When a large number of EVs are driving on the roads, their travel demands and charging activities have significant impact on the charging management of multiple CSs including large-CSs (LCSs) and small-CSs (SCSs). The problem of charging scheduling can be formulated as a two-side Hospital/Residents (HR) matching game. In this matching game, we not only consider the economic interest of multiple CSs and charging experience of EVs but also utilize the natural advantages of SCSs to balance the traffic on the roads around LCSs. Furthermore, a two-stage scheme that is composed of distributed HR admission scheme and centralized HR reassignment scheme is proposed to reduce the computational complexity of the matching process. Simulation results indicate that the proposed algorithms can effectively offer the scheduling management among multiple CSs while providing good satisfaction to EV drivers.
本文研究了在人口密集的城市环境中为电动汽车提供优质充电服务的异构充电站的新模式。当大量电动汽车在道路上行驶时,其出行需求和充电活动对包括大型和小型云存储系统在内的多个云存储系统的充电管理产生重大影响。收费调度问题可以表述为一个双方医院/居民(HR)匹配博弈。在此匹配博弈中,我们既考虑了多个CSs的经济利益和电动汽车的充电体验,又利用了CSs的天然优势来平衡lcs周围道路的交通。此外,为了降低匹配过程的计算复杂度,提出了一种由分布式人力资源准入和集中式人力资源重新分配两阶段方案。仿真结果表明,该算法能够在满足电动汽车驾驶员需求的同时,有效地实现多个CSs之间的调度管理。
{"title":"Matching game approach for charging scheduling in vehicle-to-grid networks","authors":"Guanhua Qiao, S. Leng, M. Zeng, Yan Zhang","doi":"10.1109/ICC.2017.7997149","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997149","url":null,"abstract":"This paper study a new paradigm of heterogeneous charging stations (CSs) for the excellent charging services of Electric Vehicles (EVs) in a dense urban environment. When a large number of EVs are driving on the roads, their travel demands and charging activities have significant impact on the charging management of multiple CSs including large-CSs (LCSs) and small-CSs (SCSs). The problem of charging scheduling can be formulated as a two-side Hospital/Residents (HR) matching game. In this matching game, we not only consider the economic interest of multiple CSs and charging experience of EVs but also utilize the natural advantages of SCSs to balance the traffic on the roads around LCSs. Furthermore, a two-stage scheme that is composed of distributed HR admission scheme and centralized HR reassignment scheme is proposed to reduce the computational complexity of the matching process. Simulation results indicate that the proposed algorithms can effectively offer the scheduling management among multiple CSs while providing good satisfaction to EV drivers.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"73 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87330534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A hierarchical approach for the selection of optical ground stations maximizing the data transfer from low-earth observation satellites 利用近地观测卫星数据传输最大化的光学地面站分层选择方法
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996550
Mikael Capelle, Marie-José Huguet, Nicolas Jozefowiez, X. Olive
For space industries, free-space optical communications are becoming a mature technology, but the impact of their use to download observations from spatial imagery systems has still to be evaluated. Unlike current radio-frequency technology, freespace optical communications are strongly impacted by weather conditions, and most notably by clouds. In order to cope with the later, it is necessary to achieve ground station diversity, i.e. having a network of optical ground stations able to receive data from satellites. In this paper, we aim to find a subset of a given number of ground stations maximizing the amount of data that can be downloaded from a low-earth orbiting satellite to the Earth during its missions. We present a Mixed Integer Linear Program model and a hierarchical method based on an exhaustive enumeration of the sets of stations and on a dynamic programming algorithm to solve it. The efficiency of this method is evaluated on several instances based on real ground station networks and on cloud cover throughout the last twenty years.
对于空间工业来说,自由空间光通信正在成为一项成熟的技术,但是它们用于从空间成像系统下载观测结果的影响仍有待评估。与当前的射频技术不同,自由空间光通信受到天气条件的强烈影响,尤其是云层。为了应对后者,有必要实现地面站分集,即拥有一个能够接收卫星数据的光学地面站网络。在本文中,我们的目标是找到给定数量的地面站的一个子集,使其在执行任务期间可以从低地球轨道卫星下载到地球的数据量最大化。本文提出了一个混合整数线性规划模型和一种基于站集穷举和动态规划算法的分层求解方法。在近二十年来基于实际地面站网络和云量的若干实例中,对该方法的有效性进行了评价。
{"title":"A hierarchical approach for the selection of optical ground stations maximizing the data transfer from low-earth observation satellites","authors":"Mikael Capelle, Marie-José Huguet, Nicolas Jozefowiez, X. Olive","doi":"10.1109/ICC.2017.7996550","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996550","url":null,"abstract":"For space industries, free-space optical communications are becoming a mature technology, but the impact of their use to download observations from spatial imagery systems has still to be evaluated. Unlike current radio-frequency technology, freespace optical communications are strongly impacted by weather conditions, and most notably by clouds. In order to cope with the later, it is necessary to achieve ground station diversity, i.e. having a network of optical ground stations able to receive data from satellites. In this paper, we aim to find a subset of a given number of ground stations maximizing the amount of data that can be downloaded from a low-earth orbiting satellite to the Earth during its missions. We present a Mixed Integer Linear Program model and a hierarchical method based on an exhaustive enumeration of the sets of stations and on a dynamic programming algorithm to solve it. The efficiency of this method is evaluated on several instances based on real ground station networks and on cloud cover throughout the last twenty years.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"43 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86704442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fundamental limits on latency in cloud- and cache-aided HetNets 在云和缓存辅助的HetNets中延迟的基本限制
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996346
Jaber Kakar, S. Gherekhloo, Z. Awan, A. Sezgin
Hybrid architectures are generally composed of a cyber cloud with additional support of edge caching. By utilizing the benefits associated with cloud computing and caching, powerful enhanced interference management techniques can be readily utilized — that among others — also results in low-latency transmission. In this paper, we study the impact of cloud and edge processing on the latency for a heterogenous network (HetNet) consisting of two users and two transmitters. We define an information-theoretic metric, the delivery time per bit (DTB), that captures the delivery latency. We establish bounds on the DTB as a function of cache size, backhaul capacity and wireless channel parameters. We show the optimality on the DTB for various channel regimes.
混合架构通常由支持边缘缓存的网络云组成。通过利用与云计算和缓存相关的好处,可以很容易地利用强大的增强型干扰管理技术,从而实现低延迟传输。在本文中,我们研究了云和边缘处理对由两个用户和两个发射器组成的异构网络(HetNet)延迟的影响。我们定义了一个信息论度量,即每比特传递时间(DTB),它捕获了传递延迟。我们建立了DTB的边界作为缓存大小、回程容量和无线信道参数的函数。我们展示了各种信道体制下DTB的最优性。
{"title":"Fundamental limits on latency in cloud- and cache-aided HetNets","authors":"Jaber Kakar, S. Gherekhloo, Z. Awan, A. Sezgin","doi":"10.1109/ICC.2017.7996346","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996346","url":null,"abstract":"Hybrid architectures are generally composed of a cyber cloud with additional support of edge caching. By utilizing the benefits associated with cloud computing and caching, powerful enhanced interference management techniques can be readily utilized — that among others — also results in low-latency transmission. In this paper, we study the impact of cloud and edge processing on the latency for a heterogenous network (HetNet) consisting of two users and two transmitters. We define an information-theoretic metric, the delivery time per bit (DTB), that captures the delivery latency. We establish bounds on the DTB as a function of cache size, backhaul capacity and wireless channel parameters. We show the optimality on the DTB for various channel regimes.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"416 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86841750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Training-based synchronization for quantity-based modulation in inverse Gaussian channels 反高斯信道中基于数量调制的基于训练的同步
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996905
B. Hsu, Po-Chun Chou, Chia-han Lee, Ping-Cheng Yeh
In time-slotted molecular communication systems, clock synchronization between transmitter and receiver is crucial. In this paper, training-based synchronization schemes in a molecular communication system with quantity-based modulation are proposed by utilizing the information of arrival times of molecules. For timing offset estimation, three estimators are proposed, including maximum likelihood estimation (MLE), unbiased linear estimation (ULE), and iterative ULE. For clock skew estimation, two algorithms, arithmetic mean estimation and weighted mean estimation, are proposed. Simulation results demonstrate that the proposed estimators are effective.
在时隙分子通信系统中,发送端和接收端之间的时钟同步至关重要。本文利用分子到达时间信息,提出了基于训练的量调制分子通信系统同步方案。对于时间偏移估计,提出了三种估计方法:极大似然估计(MLE)、无偏线性估计(ULE)和迭代估计(ULE)。对于时钟偏差估计,提出了算术平均估计和加权平均估计两种算法。仿真结果表明,该估计方法是有效的。
{"title":"Training-based synchronization for quantity-based modulation in inverse Gaussian channels","authors":"B. Hsu, Po-Chun Chou, Chia-han Lee, Ping-Cheng Yeh","doi":"10.1109/ICC.2017.7996905","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996905","url":null,"abstract":"In time-slotted molecular communication systems, clock synchronization between transmitter and receiver is crucial. In this paper, training-based synchronization schemes in a molecular communication system with quantity-based modulation are proposed by utilizing the information of arrival times of molecules. For timing offset estimation, three estimators are proposed, including maximum likelihood estimation (MLE), unbiased linear estimation (ULE), and iterative ULE. For clock skew estimation, two algorithms, arithmetic mean estimation and weighted mean estimation, are proposed. Simulation results demonstrate that the proposed estimators are effective.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82979917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bandit strategies for blindly attacking networks 盲目攻击网络的强盗策略
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996834
Saidhiraj Amuru, R. Buehrer, M. Schaar
Can we optimally attack networks (in terms of disrupting the ability of the nodes in the network from communicating) when the network topology is unknown? In this paper, we show that it is not always possible to do so when the network topology is unknown a priori. Specifically, we develop multi armed bandit-based techniques that enable the attacker to learn the best network attack strategies and also discuss the potential limitations that the attacker faces in such blind scenarios.
当网络拓扑结构未知时,我们是否能够以最佳方式攻击网络(就破坏网络中节点的通信能力而言)?在本文中,我们表明,当网络拓扑是先验未知时,并不总是可以这样做。具体来说,我们开发了基于多武装强盗的技术,使攻击者能够学习最佳的网络攻击策略,并讨论了攻击者在这种盲目场景中面临的潜在限制。
{"title":"Bandit strategies for blindly attacking networks","authors":"Saidhiraj Amuru, R. Buehrer, M. Schaar","doi":"10.1109/ICC.2017.7996834","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996834","url":null,"abstract":"Can we optimally attack networks (in terms of disrupting the ability of the nodes in the network from communicating) when the network topology is unknown? In this paper, we show that it is not always possible to do so when the network topology is unknown a priori. Specifically, we develop multi armed bandit-based techniques that enable the attacker to learn the best network attack strategies and also discuss the potential limitations that the attacker faces in such blind scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80733339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sampling-based tracking of time-varying channels for millimeter wave-band communications 基于采样的毫米波波段时变信道跟踪
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996518
J. Yoo, Jisu Bae, Sun Hong Lim, Sunwoo Kim, J. Choi, B. Shim
In this paper, we propose a new recursive sparse channel recovery algorithm which can track time-varying support of angular domain channel response vector in mobility scenario for millimeter wave-band communications. We model the angle of departure (AoD) and the angle of arrival (AoA) using discrete state Markov random process and derive joint estimation of the time-varying support and amplitude of the angular domain channel vector. Using sequential Monte Carlo (SMC) method, the proposed channel estimation scheme tracks the support by drawing the samples from a posteriori distribution of the support indices while capturing the dynamics of time-varying amplitude using Kalman filter. Our simulation results show that the proposed algorithm yields significantly better tracking performance than the existing compressed sensing schemes.
本文提出了一种新的递归稀疏信道恢复算法,该算法可以跟踪毫米波移动场景下角域信道响应向量的时变支持度。利用离散状态马尔可夫随机过程对出发角和到达角进行建模,推导出角域信道矢量时变支持度和幅值的联合估计。该信道估计方案采用时序蒙特卡罗(SMC)方法,通过从支持指数的后检分布中提取样本来跟踪支持,同时利用卡尔曼滤波捕捉时变振幅的动态变化。仿真结果表明,该算法的跟踪性能明显优于现有的压缩感知算法。
{"title":"Sampling-based tracking of time-varying channels for millimeter wave-band communications","authors":"J. Yoo, Jisu Bae, Sun Hong Lim, Sunwoo Kim, J. Choi, B. Shim","doi":"10.1109/ICC.2017.7996518","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996518","url":null,"abstract":"In this paper, we propose a new recursive sparse channel recovery algorithm which can track time-varying support of angular domain channel response vector in mobility scenario for millimeter wave-band communications. We model the angle of departure (AoD) and the angle of arrival (AoA) using discrete state Markov random process and derive joint estimation of the time-varying support and amplitude of the angular domain channel vector. Using sequential Monte Carlo (SMC) method, the proposed channel estimation scheme tracks the support by drawing the samples from a posteriori distribution of the support indices while capturing the dynamics of time-varying amplitude using Kalman filter. Our simulation results show that the proposed algorithm yields significantly better tracking performance than the existing compressed sensing schemes.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89965261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Transmit antenna selection schemes for MISO-NOMA cooperative downlink transmissions with hybrid SWIPT protocol 基于混合SWIPT协议的MISO-NOMA协同下行传输的发射天线选择方案
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997005
Tri Nhu Do, D. B. D. Costa, T. Duong, Beongku An
In this paper, we investigate outage performance and diversity gain of transmit antenna selection (TAS) schemes in two-user multiple-input single-output non-orthogonal multiple access (MISO-NOMA) cooperative downlink transmissions. To this end, two TAS criteria, namely Criterion I and Criterion II, are proposed, which select an antenna that experiences the best fading condition of the channel from the source to the far user and to the near user, respectively. Additionally, considering the near user as a relay to help improve the reliability of the far user, hybrid simultaneous wireless information and power transfer (SWIPT) architecture is adopted to power the near user's relaying operation. Tight closed-form approximate expressions for the outage probability (OP) of both users are derived. Numerical results reveal that Criterion I and II achieve, respectively, the diversity order of K + 1 and 2 at the far user, and 1 and K at the near user, where K denotes the number of transmit antennas at the base station.
本文研究了两用户多输入单输出非正交多址(MISO-NOMA)协同下行传输中发射天线选择(TAS)方案的中断性能和分集增益。为此,提出了两个TAS准则,即准则I和准则II,分别选择从源到远用户和到近用户的信道中经历最佳衰落条件的天线。此外,为了提高远端用户的可靠性,考虑近端用户作为中继,采用混合同步无线信息和功率传输(SWIPT)架构为近端用户的中继操作供电。导出了两种用户的停电概率(OP)的紧闭近似表达式。数值结果表明,准则1和准则II分别在远端用户处实现K + 1和2的分集阶数,在近端用户处实现1和K的分集阶数,其中K为基站发射天线数。
{"title":"Transmit antenna selection schemes for MISO-NOMA cooperative downlink transmissions with hybrid SWIPT protocol","authors":"Tri Nhu Do, D. B. D. Costa, T. Duong, Beongku An","doi":"10.1109/ICC.2017.7997005","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997005","url":null,"abstract":"In this paper, we investigate outage performance and diversity gain of transmit antenna selection (TAS) schemes in two-user multiple-input single-output non-orthogonal multiple access (MISO-NOMA) cooperative downlink transmissions. To this end, two TAS criteria, namely Criterion I and Criterion II, are proposed, which select an antenna that experiences the best fading condition of the channel from the source to the far user and to the near user, respectively. Additionally, considering the near user as a relay to help improve the reliability of the far user, hybrid simultaneous wireless information and power transfer (SWIPT) architecture is adopted to power the near user's relaying operation. Tight closed-form approximate expressions for the outage probability (OP) of both users are derived. Numerical results reveal that Criterion I and II achieve, respectively, the diversity order of K + 1 and 2 at the far user, and 1 and K at the near user, where K denotes the number of transmit antennas at the base station.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91488314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
CryptMDB: A practical encrypted MongoDB over big data CryptMDB:一个实用的大数据加密MongoDB
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997105
Guowen Xu, Yanzhi Ren, Hongwei Li, Dongxiao Liu, Yuan-Shun Dai, Kan Yang
In big data era, data are usually stored in databases for easy access and utilization, which are now woven into every aspect of our lives. However, traditional relational databases cannot address users' demands for quick data access and calculating, since they cannot process data in a distributed way. To tackle this problem, non-relational databases such as MongoDB have emerged up and been applied in various Scenarios. Nevertheless, it should be noted that most MongoDB products fail to consider user's data privacy. In this paper, we propose a practical encrypted MongoDB (i.e., CryptMDB). Specifically, we utilize an additive homomorphic asymmetric cryptosystem to encrypt user's data and achieve strong privacy protection. Security analysis indicates that the CryptMDB can achieve confidentiality of user's data and prevent adversaries from illegally gaining access to the database. Furthermore, extensive experiments demonstrate that the CryptMDB achieves better efficiency than existing relational database in terms of data access and calculating.
在大数据时代,数据通常存储在数据库中,方便访问和利用,现在已经融入我们生活的方方面面。然而,传统的关系数据库无法以分布式的方式处理数据,无法满足用户对数据快速访问和计算的需求。为了解决这个问题,出现了MongoDB等非关系数据库,并应用于各种场景。然而,需要注意的是,大多数MongoDB产品都没有考虑到用户的数据隐私。在本文中,我们提出了一个实用的加密MongoDB(即CryptMDB)。具体来说,我们利用加性同态非对称密码系统对用户数据进行加密,实现了强大的隐私保护。安全性分析表明,CryptMDB可以实现用户数据的保密性,防止攻击者非法访问数据库。此外,大量的实验表明,在数据访问和计算方面,CryptMDB比现有的关系数据库具有更高的效率。
{"title":"CryptMDB: A practical encrypted MongoDB over big data","authors":"Guowen Xu, Yanzhi Ren, Hongwei Li, Dongxiao Liu, Yuan-Shun Dai, Kan Yang","doi":"10.1109/ICC.2017.7997105","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997105","url":null,"abstract":"In big data era, data are usually stored in databases for easy access and utilization, which are now woven into every aspect of our lives. However, traditional relational databases cannot address users' demands for quick data access and calculating, since they cannot process data in a distributed way. To tackle this problem, non-relational databases such as MongoDB have emerged up and been applied in various Scenarios. Nevertheless, it should be noted that most MongoDB products fail to consider user's data privacy. In this paper, we propose a practical encrypted MongoDB (i.e., CryptMDB). Specifically, we utilize an additive homomorphic asymmetric cryptosystem to encrypt user's data and achieve strong privacy protection. Security analysis indicates that the CryptMDB can achieve confidentiality of user's data and prevent adversaries from illegally gaining access to the database. Furthermore, extensive experiments demonstrate that the CryptMDB achieves better efficiency than existing relational database in terms of data access and calculating.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82335416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
QUIC: Better for what and for whom? QUIC:对什么更好,对谁更好?
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997281
Sarah Cook, B. Mathieu, Patrick Truong, I. Hamchaoui
Many applications nowadays use HTTP. HTTP/2, standardised in February 2015, is an improvment of HTTP/1.1. However it is still running on top of TCP/TLS and can thus suffer from performance issues, such as the number of RTTs for the handshake phase and the Head of Line blocking. Google proposed the QUIC (Quick UDP Internet Connection) protocol, an user level protocol, running on top of UDP, to solve those issues. Google argues that the response time (Page Load Time) is shorter and thus the end-user experience better. First papers evaluated the intrinsic performances of QUIC, but none compared QUIC with the network, the website structure and the involved actors in mind. In this paper, we present the results of our evaluation, performed on a local testbed as well as on Internet, and our analysis to identify in which conditions QUIC is of interest, which actors can benefit from having QUIC deployed in the network and what impacts QUIC can lead to.
现在许多应用程序都使用HTTP。HTTP/2于2015年2月标准化,是对HTTP/1.1的改进。然而,它仍然运行在TCP/TLS之上,因此可能会受到性能问题的影响,例如握手阶段的rtt数量和线头阻塞。b谷歌提出了QUIC (Quick UDP Internet Connection)协议,一种运行在UDP之上的用户级协议,来解决这些问题。谷歌认为响应时间(页面加载时间)更短,因此最终用户体验更好。第一篇论文评价了QUIC的内在性能,但没有将QUIC与网络、网站结构和所涉及的参与者进行比较。在本文中,我们展示了我们在本地测试平台和互联网上进行的评估结果,以及我们的分析,以确定在哪些条件下QUIC是感兴趣的,哪些参与者可以从在网络中部署QUIC中受益,以及QUIC可能导致的影响。
{"title":"QUIC: Better for what and for whom?","authors":"Sarah Cook, B. Mathieu, Patrick Truong, I. Hamchaoui","doi":"10.1109/ICC.2017.7997281","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997281","url":null,"abstract":"Many applications nowadays use HTTP. HTTP/2, standardised in February 2015, is an improvment of HTTP/1.1. However it is still running on top of TCP/TLS and can thus suffer from performance issues, such as the number of RTTs for the handshake phase and the Head of Line blocking. Google proposed the QUIC (Quick UDP Internet Connection) protocol, an user level protocol, running on top of UDP, to solve those issues. Google argues that the response time (Page Load Time) is shorter and thus the end-user experience better. First papers evaluated the intrinsic performances of QUIC, but none compared QUIC with the network, the website structure and the involved actors in mind. In this paper, we present the results of our evaluation, performed on a local testbed as well as on Internet, and our analysis to identify in which conditions QUIC is of interest, which actors can benefit from having QUIC deployed in the network and what impacts QUIC can lead to.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78227988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Throughput maximization and resource optimization in NFV-enabled networks nfv网络中的吞吐量最大化和资源优化
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996514
Zichuan Xu, W. Liang, A. Galis, Yu Ma
Network function virtualization (NFV) has been emerging as a new paradigm to enable elastic and inexpensive network services in modern computer networks, through deploying flexible virtualized network functions (VNFs) running in virtual computing platforms. Different VNFs can be chained together to form different service chains, to meet various user data routing demands for different network services. In this paper we consider provisioning network services in an NFV-enabled network that consists of data centers for implementing VNF instances of service chains and switches. We study the throughput maximization problem with the aim to admit as many user requests as possible while minimizing the implementation cost of the requests, assuming that limited numbers of instances of each service chain have been stored in data centers. We first propose an optimal algorithm for the problem if all requests have identical packet rates; otherwise, we devise two approximation algorithms with probable approximation ratios, depending on whether the packet traffic of each request is splittable. We finally conduct experiments to evaluate the performance of the proposed algorithms by simulations. Experimental results show that the proposed algorithms achieve at least 15% more throughput than that of a greedy algorithm.
网络功能虚拟化(NFV)通过在虚拟计算平台上部署灵活的虚拟网络功能(VNFs),成为在现代计算机网络中实现弹性和廉价网络服务的新范例。可以将不同的VNFs链接在一起,形成不同的服务链,以满足不同网络业务的各种用户数据路由需求。在本文中,我们考虑在支持nfv的网络中提供网络服务,该网络由数据中心组成,用于实现服务链和交换机的VNF实例。假设每个服务链在数据中心中存储的实例数量有限,我们研究吞吐量最大化问题的目的是在允许尽可能多的用户请求的同时最小化请求的实现成本。我们首先提出了一个最优算法,如果所有请求具有相同的数据包速率;另外,根据每个请求的数据包流量是否可分割,我们设计了两种具有可能近似比率的近似算法。最后,我们进行了实验,通过模拟来评估所提出算法的性能。实验结果表明,该算法的吞吐量比贪婪算法至少提高15%。
{"title":"Throughput maximization and resource optimization in NFV-enabled networks","authors":"Zichuan Xu, W. Liang, A. Galis, Yu Ma","doi":"10.1109/ICC.2017.7996514","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996514","url":null,"abstract":"Network function virtualization (NFV) has been emerging as a new paradigm to enable elastic and inexpensive network services in modern computer networks, through deploying flexible virtualized network functions (VNFs) running in virtual computing platforms. Different VNFs can be chained together to form different service chains, to meet various user data routing demands for different network services. In this paper we consider provisioning network services in an NFV-enabled network that consists of data centers for implementing VNF instances of service chains and switches. We study the throughput maximization problem with the aim to admit as many user requests as possible while minimizing the implementation cost of the requests, assuming that limited numbers of instances of each service chain have been stored in data centers. We first propose an optimal algorithm for the problem if all requests have identical packet rates; otherwise, we devise two approximation algorithms with probable approximation ratios, depending on whether the packet traffic of each request is splittable. We finally conduct experiments to evaluate the performance of the proposed algorithms by simulations. Experimental results show that the proposed algorithms achieve at least 15% more throughput than that of a greedy algorithm.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"24 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78450615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1