首页 > 最新文献

ACM Computing Surveys (CSUR)最新文献

英文 中文
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review 云与雾中的元启发式调度技术:一个广泛的分类综述
Pub Date : 2022-02-03 DOI: 10.1145/3494520
R. Singh, L. Awasthi, Geeta Sikka
Task scheduling is a critical issue in distributed computing environments like cloud and fog. The objective is to provide an optimal distribution of tasks among the resources. Several research initiatives to use metaheuristic techniques for finding near-optimal solutions to task scheduling problems are under way. This study presents a comprehensive taxonomic review and analysis of recent metaheuristic scheduling techniques using exhaustive evaluation criteria in the cloud and fog environment. A taxonomy of metaheuristic scheduling algorithms is presented. Besides, we have considered an extensive list of scheduling objectives along with their associated metrics. Rigorous evaluation of existing literature is performed, and limitations highlighted. We have also focused on hybrid algorithms as they tend to improve scheduling performance. We believe that this work will encourage researchers to conduct further research for removing the limitations in existing studies.
任务调度是云、雾等分布式计算环境中的一个关键问题。目标是在资源之间提供任务的最佳分配。一些使用元启发式技术寻找任务调度问题的接近最优解决方案的研究计划正在进行中。这项研究提出了一个全面的分类审查和分析,最近的元启发式调度技术使用详尽的评估标准,在云和雾环境。提出了一种元启发式调度算法的分类。此外,我们还考虑了调度目标及其相关指标的广泛列表。对现有文献进行了严格的评估,并强调了局限性。我们也关注混合算法,因为它们倾向于提高调度性能。我们相信这项工作将鼓励研究人员进行进一步的研究,以消除现有研究中的局限性。
{"title":"Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review","authors":"R. Singh, L. Awasthi, Geeta Sikka","doi":"10.1145/3494520","DOIUrl":"https://doi.org/10.1145/3494520","url":null,"abstract":"Task scheduling is a critical issue in distributed computing environments like cloud and fog. The objective is to provide an optimal distribution of tasks among the resources. Several research initiatives to use metaheuristic techniques for finding near-optimal solutions to task scheduling problems are under way. This study presents a comprehensive taxonomic review and analysis of recent metaheuristic scheduling techniques using exhaustive evaluation criteria in the cloud and fog environment. A taxonomy of metaheuristic scheduling algorithms is presented. Besides, we have considered an extensive list of scheduling objectives along with their associated metrics. Rigorous evaluation of existing literature is performed, and limitations highlighted. We have also focused on hybrid algorithms as they tend to improve scheduling performance. We believe that this work will encourage researchers to conduct further research for removing the limitations in existing studies.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"5 1","pages":"1 - 43"},"PeriodicalIF":0.0,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82464223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Fuzzing: A Survey for Roadmap 模糊测试:路线图调查
Pub Date : 2022-01-28 DOI: 10.1145/3512345
Xiaogang Zhu, Sheng Wen, S. Çamtepe, Yang Xiang
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It generates a large number of test cases and monitors the executions for defects. Fuzzing has detected thousands of bugs and vulnerabilities in various applications. Although effective, there lacks systematic analysis of gaps faced by fuzzing. As a technique of defect detection, fuzzing is required to narrow down the gaps between the entire input space and the defect space. Without limitation on the generated inputs, the input space is infinite. However, defects are sparse in an application, which indicates that the defect space is much smaller than the entire input space. Besides, because fuzzing generates numerous test cases to repeatedly examine targets, it requires fuzzing to perform in an automatic manner. Due to the complexity of applications and defects, it is challenging to automatize the execution of diverse applications. In this article, we systematically review and analyze the gaps as well as their solutions, considering both breadth and depth. This survey can be a roadmap for both beginners and advanced developers to better understand fuzzing.
最近,模糊测试(fuzzing)在检测安全漏洞方面得到了广泛的应用。它生成大量的测试用例,并监视缺陷的执行。模糊测试已经在各种应用程序中检测到数千个bug和漏洞。虽然是有效的,但缺乏对模糊所面临的差距的系统分析。模糊作为一种缺陷检测技术,需要缩小整个输入空间和缺陷空间之间的差距。不受生成输入的限制,输入空间是无限的。然而,缺陷在应用程序中是稀疏的,这表明缺陷空间比整个输入空间要小得多。此外,由于模糊测试会生成大量的测试用例来重复检查目标,因此需要以自动的方式执行模糊测试。由于应用程序的复杂性和缺陷,自动化各种应用程序的执行是一项挑战。在本文中,我们系统地回顾和分析了这些差距及其解决方案,考虑了广度和深度。这项调查可以作为初学者和高级开发人员更好地理解模糊测试的路线图。
{"title":"Fuzzing: A Survey for Roadmap","authors":"Xiaogang Zhu, Sheng Wen, S. Çamtepe, Yang Xiang","doi":"10.1145/3512345","DOIUrl":"https://doi.org/10.1145/3512345","url":null,"abstract":"Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It generates a large number of test cases and monitors the executions for defects. Fuzzing has detected thousands of bugs and vulnerabilities in various applications. Although effective, there lacks systematic analysis of gaps faced by fuzzing. As a technique of defect detection, fuzzing is required to narrow down the gaps between the entire input space and the defect space. Without limitation on the generated inputs, the input space is infinite. However, defects are sparse in an application, which indicates that the defect space is much smaller than the entire input space. Besides, because fuzzing generates numerous test cases to repeatedly examine targets, it requires fuzzing to perform in an automatic manner. Due to the complexity of applications and defects, it is challenging to automatize the execution of diverse applications. In this article, we systematically review and analyze the gaps as well as their solutions, considering both breadth and depth. This survey can be a roadmap for both beginners and advanced developers to better understand fuzzing.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"38 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79028163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
A Survey on Assertion-based Hardware Verification 基于断言的硬件验证研究综述
Pub Date : 2022-01-28 DOI: 10.1145/3510578
Hasini Witharana, Yangdi Lyu, Subodha Charles, P. Mishra
Hardware verification of modern electronic systems has been identified as a major bottleneck due to the increasing complexity and time-to-market constraints. One of the major objectives in hardware verification is to drastically reduce the validation and debug time without sacrificing the design quality. Assertion-based verification is a promising avenue for efficient hardware validation and debug. In this article, we provide a comprehensive survey of recent progress in assertion-based hardware verification. Specifically, we outline how to define assertions using temporal logic to specify expected behaviors in different abstraction levels. Next, we describe state-of-the art approaches for automated generation of assertions. We also discuss test generation techniques for activating assertions to ensure that the generated assertions are valid. Finally, we present both pre-silicon and post-silicon assertion-based validation approaches that utilize simulation, formal methods as well as hybrid techniques. We conclude with a discussion on utilizing assertions for verifying both functional and non-functional requirements.
由于日益增加的复杂性和上市时间的限制,现代电子系统的硬件验证已被确定为主要瓶颈。硬件验证的主要目标之一是在不牺牲设计质量的情况下大幅减少验证和调试时间。基于断言的验证是有效的硬件验证和调试的一种很有前途的途径。在本文中,我们对基于断言的硬件验证的最新进展进行了全面的调查。具体来说,我们概述了如何使用时态逻辑定义断言,以指定不同抽象级别中的预期行为。接下来,我们将描述自动生成断言的最新方法。我们还讨论了用于激活断言的测试生成技术,以确保生成的断言是有效的。最后,我们提出了pre-silicon和post-silicon基于断言的验证方法,这些方法利用模拟、形式化方法以及混合技术。最后,我们讨论了如何利用断言来验证功能性和非功能性需求。
{"title":"A Survey on Assertion-based Hardware Verification","authors":"Hasini Witharana, Yangdi Lyu, Subodha Charles, P. Mishra","doi":"10.1145/3510578","DOIUrl":"https://doi.org/10.1145/3510578","url":null,"abstract":"Hardware verification of modern electronic systems has been identified as a major bottleneck due to the increasing complexity and time-to-market constraints. One of the major objectives in hardware verification is to drastically reduce the validation and debug time without sacrificing the design quality. Assertion-based verification is a promising avenue for efficient hardware validation and debug. In this article, we provide a comprehensive survey of recent progress in assertion-based hardware verification. Specifically, we outline how to define assertions using temporal logic to specify expected behaviors in different abstraction levels. Next, we describe state-of-the art approaches for automated generation of assertions. We also discuss test generation techniques for activating assertions to ensure that the generated assertions are valid. Finally, we present both pre-silicon and post-silicon assertion-based validation approaches that utilize simulation, formal methods as well as hybrid techniques. We conclude with a discussion on utilizing assertions for verifying both functional and non-functional requirements.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"6 1","pages":"1 - 33"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81609699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications 满足时间敏感物联网应用时限要求的技术综述
Pub Date : 2022-01-28 DOI: 10.1145/3510411
H. Korala, Dimitrios Georgakopoulos, P. Jayaraman, Ali Yavari
This article surveys existing techniques for meeting the time-bound requirements of time-sensitive applications in the Internet of Things (IoT). To provide the foundation for identifying and classifying relevant techniques, we present three sample time-sensitive IoT applications and their time-bound requirements, describe the main computation and network resources in IoT that can be used to process such applications, and identify the main challenges in meeting their time-bound requirements. Based on these, the article presents a comprehensive literature review of existing techniques and tools that can help meet application-specific time-bound requirements in IoT. The article also includes a gap analysis in existing research outcomes and proposes research directions for bridging the remaining research gaps in supporting time-sensitive IoT applications.
本文概述了满足物联网(IoT)中时间敏感应用的时限要求的现有技术。为了为识别和分类相关技术提供基础,我们提出了三个时间敏感的物联网应用示例及其时限要求,描述了物联网中可用于处理此类应用的主要计算和网络资源,并确定了满足其时限要求的主要挑战。在此基础上,本文对现有技术和工具进行了全面的文献综述,这些技术和工具可以帮助满足物联网中特定应用的时限要求。本文还包括对现有研究成果的差距分析,并提出研究方向,以弥合支持时间敏感物联网应用的剩余研究差距。
{"title":"A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications","authors":"H. Korala, Dimitrios Georgakopoulos, P. Jayaraman, Ali Yavari","doi":"10.1145/3510411","DOIUrl":"https://doi.org/10.1145/3510411","url":null,"abstract":"This article surveys existing techniques for meeting the time-bound requirements of time-sensitive applications in the Internet of Things (IoT). To provide the foundation for identifying and classifying relevant techniques, we present three sample time-sensitive IoT applications and their time-bound requirements, describe the main computation and network resources in IoT that can be used to process such applications, and identify the main challenges in meeting their time-bound requirements. Based on these, the article presents a comprehensive literature review of existing techniques and tools that can help meet application-specific time-bound requirements in IoT. The article also includes a gap analysis in existing research outcomes and proposes research directions for bridging the remaining research gaps in supporting time-sensitive IoT applications.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"4 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86398508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scarcity of Labels in Non-Stationary Data Streams: A Survey 非平稳数据流中标签的稀缺性研究
Pub Date : 2022-01-21 DOI: 10.1145/3494832
Conor Fahy, Shengxiang Yang, Mario Gongora
In a dynamic stream there is an assumption that the underlying process generating the stream is non-stationary and that concepts within the stream will drift and change as the stream progresses. Concepts learned by a classification model are prone to change and non-adaptive models are likely to deteriorate and become ineffective over time. The challenge of recognising and reacting to change in a stream is compounded by the scarcity of labels problem. This refers to the very realistic situation in which the true class label of an incoming point is not immediately available (or might never be available) or in situations where manually annotating data points are prohibitively expensive. In a high-velocity stream, it is perhaps impossible to manually label every incoming point and pursue a fully supervised approach. In this article, we formally describe the types of change, which can occur in a data-stream and then catalogue the methods for dealing with change when there is limited access to labels. We present an overview of the most influential ideas in the field along with recent advancements and we highlight trends, research gaps, and future research directions.
在动态流中,有一个假设,即产生流的潜在过程是非平稳的,并且流中的概念将随着流的进展而漂移和变化。通过分类模型学习的概念很容易发生变化,而非自适应模型很可能随着时间的推移而恶化并变得无效。识别流中的变化并对其做出反应的挑战,由于标签的稀缺性问题而变得更加复杂。这指的是一种非常现实的情况,在这种情况下,传入点的真实类标签不能立即可用(或者可能永远不可用),或者手动注释数据点的成本非常高。在高速流中,可能不可能手动标记每个传入点并采用完全监督的方法。在本文中,我们将正式描述可能发生在数据流中的变更类型,然后在对标签的访问受限时对处理变更的方法进行编目。我们概述了该领域最具影响力的思想以及最近的进展,并强调了趋势、研究差距和未来的研究方向。
{"title":"Scarcity of Labels in Non-Stationary Data Streams: A Survey","authors":"Conor Fahy, Shengxiang Yang, Mario Gongora","doi":"10.1145/3494832","DOIUrl":"https://doi.org/10.1145/3494832","url":null,"abstract":"In a dynamic stream there is an assumption that the underlying process generating the stream is non-stationary and that concepts within the stream will drift and change as the stream progresses. Concepts learned by a classification model are prone to change and non-adaptive models are likely to deteriorate and become ineffective over time. The challenge of recognising and reacting to change in a stream is compounded by the scarcity of labels problem. This refers to the very realistic situation in which the true class label of an incoming point is not immediately available (or might never be available) or in situations where manually annotating data points are prohibitively expensive. In a high-velocity stream, it is perhaps impossible to manually label every incoming point and pursue a fully supervised approach. In this article, we formally describe the types of change, which can occur in a data-stream and then catalogue the methods for dealing with change when there is limited access to labels. We present an overview of the most influential ideas in the field along with recent advancements and we highlight trends, research gaps, and future research directions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"2 1","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75891789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization 投资组合优化中均值方差法与指数增长率法的差距研究
Pub Date : 2022-01-19 DOI: 10.1145/3485274
Zhao-Rong Lai, Haisheng Yang
Portfolio optimization can be roughly categorized as the mean-variance approach and the exponential growth rate approach based on different theoretical foundations, trading logics, optimization objectives, and methodologies. The former and the latter are often used in long-term and short-term portfolio optimizations, respectively. Although the mean-variance approach could be applied to short-term portfolio optimization, the performance may not be satisfactory (same with the exponential growth rate approach to the long-term portfolio optimization). This survey mainly explores the gaps between these two approaches, and investigates what common ideas or mechanisms are beneficial. Besides, the evaluating framework of this field and some unsolved problems are also discussed.
根据理论基础、交易逻辑、优化目标和方法的不同,投资组合优化大致可分为均值方差法和指数增长率法。前者和后者通常分别用于长期和短期投资组合优化。均值-方差方法虽可用于短期投资组合优化,但其效果未必令人满意(指数增长率方法也适用于长期投资组合优化)。本调查主要探讨了这两种方法之间的差距,并调查了哪些共同的想法或机制是有益的。此外,还讨论了该领域的评价框架和尚未解决的问题。
{"title":"A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization","authors":"Zhao-Rong Lai, Haisheng Yang","doi":"10.1145/3485274","DOIUrl":"https://doi.org/10.1145/3485274","url":null,"abstract":"Portfolio optimization can be roughly categorized as the mean-variance approach and the exponential growth rate approach based on different theoretical foundations, trading logics, optimization objectives, and methodologies. The former and the latter are often used in long-term and short-term portfolio optimizations, respectively. Although the mean-variance approach could be applied to short-term portfolio optimization, the performance may not be satisfactory (same with the exponential growth rate approach to the long-term portfolio optimization). This survey mainly explores the gaps between these two approaches, and investigates what common ideas or mechanisms are beneficial. Besides, the evaluating framework of this field and some unsolved problems are also discussed.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"25 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78035904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges 电子健康记录在数据挖掘中的二次使用:数据特征和挑战
Pub Date : 2022-01-18 DOI: 10.1145/3490234
Tabinda Sarwar, S. Seifollahi, Jeffrey A Chan, Xiuzhen Zhang, V. Aksakalli, I. Hudson, Karin M. Verspoor, L. Cavedon
The primary objective of implementing Electronic Health Records (EHRs) is to improve the management of patients’ health-related information. However, these records have also been extensively used for the secondary purpose of clinical research and to improve healthcare practice. EHRs provide a rich set of information that includes demographics, medical history, medications, laboratory test results, and diagnosis. Data mining and analytics techniques have extensively exploited EHR information to study patient cohorts for various clinical and research applications, such as phenotype extraction, precision medicine, intervention evaluation, disease prediction, detection, and progression. But the presence of diverse data types and associated characteristics poses many challenges to the use of EHR data. In this article, we provide an overview of information found in EHR systems and their characteristics that could be utilized for secondary applications. We first discuss the different types of data stored in EHRs, followed by the data transformations necessary for data analysis and mining. Later, we discuss the data quality issues and characteristics of the EHRs along with the relevant methods used to address them. Moreover, this survey also highlights the usage of various data types for different applications. Hence, this article can serve as a primer for researchers to understand the use of EHRs for data mining and analytics purposes.
实施电子健康记录(EHRs)的主要目标是改善对患者健康相关信息的管理。然而,这些记录也被广泛用于临床研究和改善医疗保健实践的次要目的。电子病历提供了一组丰富的信息,包括人口统计、病史、药物、实验室测试结果和诊断。数据挖掘和分析技术已经广泛利用电子病历信息来研究各种临床和研究应用的患者群体,如表型提取、精准医学、干预评估、疾病预测、检测和进展。但是,各种数据类型和相关特征的存在给电子病历数据的使用带来了许多挑战。在本文中,我们概述了在EHR系统中发现的信息及其可用于辅助应用程序的特征。我们首先讨论存储在ehr中的不同类型的数据,然后讨论数据分析和挖掘所需的数据转换。稍后,我们将讨论电子病历的数据质量问题和特征,以及用于解决这些问题的相关方法。此外,该调查还强调了不同应用程序对不同数据类型的使用。因此,本文可以作为研究人员了解电子病历用于数据挖掘和分析目的的入门读物。
{"title":"The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges","authors":"Tabinda Sarwar, S. Seifollahi, Jeffrey A Chan, Xiuzhen Zhang, V. Aksakalli, I. Hudson, Karin M. Verspoor, L. Cavedon","doi":"10.1145/3490234","DOIUrl":"https://doi.org/10.1145/3490234","url":null,"abstract":"The primary objective of implementing Electronic Health Records (EHRs) is to improve the management of patients’ health-related information. However, these records have also been extensively used for the secondary purpose of clinical research and to improve healthcare practice. EHRs provide a rich set of information that includes demographics, medical history, medications, laboratory test results, and diagnosis. Data mining and analytics techniques have extensively exploited EHR information to study patient cohorts for various clinical and research applications, such as phenotype extraction, precision medicine, intervention evaluation, disease prediction, detection, and progression. But the presence of diverse data types and associated characteristics poses many challenges to the use of EHR data. In this article, we provide an overview of information found in EHR systems and their characteristics that could be utilized for secondary applications. We first discuss the different types of data stored in EHRs, followed by the data transformations necessary for data analysis and mining. Later, we discuss the data quality issues and characteristics of the EHRs along with the relevant methods used to address them. Moreover, this survey also highlights the usage of various data types for different applications. Hence, this article can serve as a primer for researchers to understand the use of EHRs for data mining and analytics purposes.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"8 1","pages":"1 - 40"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84047977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey 基于区块链和其他加密构建块的隐私保护信誉系统:调查
Pub Date : 2022-01-18 DOI: 10.1145/3490236
Omar Hasan, L. Brunie, E. Bertino
The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback because, for example, of fear of retaliation. Privacy-preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy-preserving reputation systems. We use these analysis frameworks to review and compare the existing approaches. Emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Blockchain-based privacy-preserving reputation systems have properties, such as trustlessness, transparency, and immutability, which prior systems do not have. Our analysis provides several insights and directions for future research. These include leveraging blockchain to its full potential in order to develop truly trustless systems, to achieve some important security properties, and to include defenses against common attacks that have so far not been addressed by most current systems.
信誉系统的目的是让分布式应用程序的用户对他们的行为负责。用户的声誉是由系统中其他用户提供的反馈的总和来计算的。真实的反馈显然是计算准确代表用户行为的信誉分数的先决条件。然而,据观察,用户在提供真实反馈时可能会犹豫,例如,因为害怕报复。隐私保护信誉系统使用户能够以私人的方式提供反馈,从而不受限制。在这项调查中,我们提出了隐私保护信誉系统的分析框架。我们使用这些分析框架来回顾和比较现有的方法。重点放在基于区块链的系统上,因为它们是该领域最近的重大发展。基于区块链的隐私保护信誉系统具有诸如不可信、透明和不变性等属性,而这些属性是以前的系统所不具备的。我们的分析为未来的研究提供了一些见解和方向。其中包括充分利用区块链的潜力,以开发真正的无信任系统,实现一些重要的安全属性,并包括对迄今为止大多数当前系统尚未解决的常见攻击的防御。
{"title":"Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey","authors":"Omar Hasan, L. Brunie, E. Bertino","doi":"10.1145/3490236","DOIUrl":"https://doi.org/10.1145/3490236","url":null,"abstract":"The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback because, for example, of fear of retaliation. Privacy-preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy-preserving reputation systems. We use these analysis frameworks to review and compare the existing approaches. Emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Blockchain-based privacy-preserving reputation systems have properties, such as trustlessness, transparency, and immutability, which prior systems do not have. Our analysis provides several insights and directions for future research. These include leveraging blockchain to its full potential in order to develop truly trustless systems, to achieve some important security properties, and to include defenses against common attacks that have so far not been addressed by most current systems.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"9 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88388421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Network Traffic Generation: A Survey and Methodology 网络流量生成:一项调查和方法
Pub Date : 2022-01-18 DOI: 10.1145/3488375
O. A. Adeleke, Nicholas Bastin, D. Gurkan
Network traffic workloads are widely utilized in applied research to verify correctness and to measure the impact of novel algorithms, protocols, and network functions. We provide a comprehensive survey of traffic generators referenced by researchers over the last 13 years, providing in-depth classification of the functional behaviors of the most frequently cited generators. These classifications are then used as a critical component of a methodology presented to aid in the selection of generators derived from the workload requirements of future research.
网络流量工作负载在应用研究中被广泛用于验证新算法、协议和网络功能的正确性和衡量其影响。我们对过去13年来被研究人员引用的流量生成器进行了全面的调查,对最常被引用的流量生成器的功能行为进行了深入的分类。然后,这些分类被用作一种方法的关键组成部分,以帮助从未来研究的工作量需求中选择发电机。
{"title":"Network Traffic Generation: A Survey and Methodology","authors":"O. A. Adeleke, Nicholas Bastin, D. Gurkan","doi":"10.1145/3488375","DOIUrl":"https://doi.org/10.1145/3488375","url":null,"abstract":"Network traffic workloads are widely utilized in applied research to verify correctness and to measure the impact of novel algorithms, protocols, and network functions. We provide a comprehensive survey of traffic generators referenced by researchers over the last 13 years, providing in-depth classification of the functional behaviors of the most frequently cited generators. These classifications are then used as a critical component of a methodology presented to aid in the selection of generators derived from the workload requirements of future research.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"24 1","pages":"1 - 23"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74757345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Review of Privacy Decision-making Mechanisms in Online Social Networks 在线社交网络中的隐私决策机制研究综述
Pub Date : 2022-01-18 DOI: 10.1145/3494067
José Alemany, E. Noguera, A. García-Fornes
Personal information of online social networks (OSNs) is governed by the privacy policies chosen by users besides OSN’s policies. Users make these decisions using privacy mechanisms, but privacy problems and regrets are daily reported. This article reviews current privacy mechanisms and solutions. For this, we analyze all the sub-decisions and elements of online communication involved in the privacy decision-making process. However, the differences in users’ motivations and the disclosure of too sensitive information (among others) can lead to loss of privacy. In this work, we identify requirements such as automation, preference-centered, relationship-based, and multi-party privacy mechanisms, which have been more researched. But also other requirements (recently emerged), such as privacy preservation with risk metrics, explainability, and ephemeral messages. We explore all the advances made in the literature, and we have seen that most of these have been focused on matching the users’ preferences with their decision (which is not appropriate, because users cannot evaluate all of the potential privacy scenarios) instead of assessing privacy risk metrics, adaptation, and explainability. Therefore, we have identified open challenges, such as metrics for assessing privacy risks, explainable solutions for users, ephemeral communication solutions, and the application of these requirements to the multi-party privacy scenario.
OSN (online social networks)的个人信息除了受OSN策略的约束外,还受用户选择的隐私策略的约束。用户使用隐私机制做出这些决定,但隐私问题和遗憾每天都有报告。本文回顾了当前的隐私机制和解决方案。为此,我们分析了隐私决策过程中涉及的所有在线交流子决策和要素。然而,用户动机的差异和过于敏感的信息(以及其他)的披露可能导致隐私的丧失。在这项工作中,我们确定了自动化、以偏好为中心、基于关系和多方隐私机制等需求,这些需求已经得到了更多的研究。但也有其他需求(最近出现的),例如带有风险度量、可解释性和短暂消息的隐私保护。我们探索了文献中取得的所有进展,我们已经看到,其中大多数都集中在将用户的偏好与他们的决定相匹配(这是不合适的,因为用户无法评估所有潜在的隐私场景),而不是评估隐私风险指标、适应性和可解释性。因此,我们已经确定了开放的挑战,例如评估隐私风险的指标,用户可解释的解决方案,临时通信解决方案,以及将这些要求应用于多方隐私场景。
{"title":"A Review of Privacy Decision-making Mechanisms in Online Social Networks","authors":"José Alemany, E. Noguera, A. García-Fornes","doi":"10.1145/3494067","DOIUrl":"https://doi.org/10.1145/3494067","url":null,"abstract":"Personal information of online social networks (OSNs) is governed by the privacy policies chosen by users besides OSN’s policies. Users make these decisions using privacy mechanisms, but privacy problems and regrets are daily reported. This article reviews current privacy mechanisms and solutions. For this, we analyze all the sub-decisions and elements of online communication involved in the privacy decision-making process. However, the differences in users’ motivations and the disclosure of too sensitive information (among others) can lead to loss of privacy. In this work, we identify requirements such as automation, preference-centered, relationship-based, and multi-party privacy mechanisms, which have been more researched. But also other requirements (recently emerged), such as privacy preservation with risk metrics, explainability, and ephemeral messages. We explore all the advances made in the literature, and we have seen that most of these have been focused on matching the users’ preferences with their decision (which is not appropriate, because users cannot evaluate all of the potential privacy scenarios) instead of assessing privacy risk metrics, adaptation, and explainability. Therefore, we have identified open challenges, such as metrics for assessing privacy risks, explainable solutions for users, ephemeral communication solutions, and the application of these requirements to the multi-party privacy scenario.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"3 1","pages":"1 - 32"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86170522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
ACM Computing Surveys (CSUR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1