首页 > 最新文献

Proceedings. International Conference on Distributed Computing Systems最新文献

英文 中文
BP-DEBUG: A Fault Debugging and Resolution Tool for Business Processes. BP-DEBUG:一个用于业务流程的故障调试和解决工具。
Pub Date : 2022-07-01 Epub Date: 2022-10-13 DOI: 10.1109/icdcs54860.2022.00143
Muhammad Adeel Zahid, Basit Shafiq, Shafay Shamail, Ayesha Afzal, Jaideep Vaidya

Cloud computing and Internet-ware software paradigm have enabled rapid development of distributed business process (BP) applications. Several tools are available to facilitate automated/ semi-automated development and deployment of such distributed BPs by orchestrating relevant service components in a plug-and-play fashion. However, the BPs developed using such tools are not guaranteed to be fault-free. In this demonstration, we present a tool called BP-DEBUG for debugging and automated repair of faulty BPs. BP-DEBUG implements our Collaborative Fault Resolution (CFR) approach that utilizes the knowledge of existing BPs with a similar set of web services fault detection and resolution in a given user BP. Essentially, CFR attempts to determine any semantic and structural differences between a faulty BP and related BPs and computes a minimum set of transformations which can be used to repair the faulty BP. Demo url: https://youtu.be/mf49oSekLOA.

云计算和互联网软件范式使分布式业务流程(BP)应用程序得以快速发展。通过以即插即用的方式编排相关服务组件,可以使用一些工具来促进此类分布式BP的自动化/半自动化开发和部署。然而,使用此类工具开发的BP并不能保证是无故障的。在这个演示中,我们展示了一个名为BP-DEBUG的工具,用于调试和自动修复有故障的BP。BP-DEBUG实现了我们的协作故障解决(CFR)方法,该方法利用现有BP的知识,在给定的用户BP中进行类似的web服务故障检测和解决。从本质上讲,CFR试图确定故障BP和相关BP之间的任何语义和结构差异,并计算可用于修复故障BP的最小变换集。演示网址:https://youtu.be/mf49oSekLOA.
{"title":"BP-DEBUG: A Fault Debugging and Resolution Tool for Business Processes.","authors":"Muhammad Adeel Zahid, Basit Shafiq, Shafay Shamail, Ayesha Afzal, Jaideep Vaidya","doi":"10.1109/icdcs54860.2022.00143","DOIUrl":"10.1109/icdcs54860.2022.00143","url":null,"abstract":"<p><p>Cloud computing and Internet-ware software paradigm have enabled rapid development of distributed business process (BP) applications. Several tools are available to facilitate automated/ semi-automated development and deployment of such distributed BPs by orchestrating relevant service components in a plug-and-play fashion. However, the BPs developed using such tools are not guaranteed to be fault-free. In this demonstration, we present a tool called BP-DEBUG for debugging and automated repair of faulty BPs. BP-DEBUG implements our Collaborative Fault Resolution (CFR) approach that utilizes the knowledge of existing BPs with a similar set of web services fault detection and resolution in a given user BP. Essentially, CFR attempts to determine any semantic and structural differences between a faulty BP and related BPs and computes a minimum set of transformations which can be used to repair the faulty BP. Demo url: https://youtu.be/mf49oSekLOA.</p>","PeriodicalId":74571,"journal":{"name":"Proceedings. International Conference on Distributed Computing Systems","volume":"2022 ","pages":"1306-1309"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9732836/pdf/nihms-1854496.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10355097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Based Auditable Access Control for Distributed Business Processes. 基于区块链的分布式业务流程可审计访问控制。
Pub Date : 2020-11-01 Epub Date: 2021-02-23 DOI: 10.1109/ICDCS47774.2020.00015
Ahmed Akhtar, Basit Shafiq, Jaideep Vaidya, Ayesha Afzal, Shafay Shamail, Omer Rana

The use of blockchain technology has been proposed to provide auditable access control for individual resources. However, when all resources are owned by a single organization, such expensive solutions may not be needed. In this work we focus on distributed applications such as business processes and distributed workflows. These applications are often composed of multiple resources/services that are subject to the security and access control policies of different organizational domains. Here, blockchains can provide an attractive decentralized solution to provide auditability. However, the underlying access control policies may be overlapping in terms of the component conditions/rules, and simply using existing solutions would result in repeated evaluation of user's authorization separately for each resource, leading to significant overhead in terms of cost and computation time over the blockchain. To address this challenge, we propose an approach that formulates a constraint optimization problem to generate an optimal composite access control policy. This policy is in compliance with all the local access control policies and minimizes the policy evaluation cost over the blockchain. The developed smart contract(s) can then be deployed to the blockchain, and used for access control enforcement. We also discuss how the access control enforcement can be audited using a game-theoretic approach to minimize cost. We have implemented the initial prototype of our approach using Ethereum as the underlying blockchain and experimentally validated the effectiveness and efficiency of our approach.

已经提出使用区块链技术为单个资源提供可审计的访问控制。然而,当所有资源都由一个组织拥有时,可能就不需要这种昂贵的解决方案了。在这项工作中,我们将重点关注分布式应用程序,如业务流程和分布式工作流。这些应用程序通常由多个资源/服务组成,这些资源/服务受不同组织域的安全和访问控制策略的约束。在这里,区块链可以提供一个有吸引力的去中心化解决方案来提供可审计性。然而,底层的访问控制策略在组件条件/规则方面可能是重叠的,并且简单地使用现有的解决方案将导致对每个资源分别重复评估用户的授权,从而导致在区块链上的成本和计算时间方面的显着开销。为了解决这一挑战,我们提出了一种制定约束优化问题以生成最优组合访问控制策略的方法。该策略符合所有本地访问控制策略,并且最小化了区块链上的策略评估成本。然后,开发的智能合约可以部署到区块链上,并用于访问控制实施。我们还讨论了如何使用博弈论方法来审计访问控制的实施以最小化成本。我们已经使用以太坊作为底层区块链实现了我们方法的初始原型,并通过实验验证了我们方法的有效性和效率。
{"title":"Blockchain Based Auditable Access Control for Distributed Business Processes.","authors":"Ahmed Akhtar,&nbsp;Basit Shafiq,&nbsp;Jaideep Vaidya,&nbsp;Ayesha Afzal,&nbsp;Shafay Shamail,&nbsp;Omer Rana","doi":"10.1109/ICDCS47774.2020.00015","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00015","url":null,"abstract":"<p><p>The use of blockchain technology has been proposed to provide auditable access control for individual resources. However, when all resources are owned by a single organization, such expensive solutions may not be needed. In this work we focus on distributed applications such as business processes and distributed workflows. These applications are often composed of multiple resources/services that are subject to the security and access control policies of different organizational domains. Here, blockchains can provide an attractive decentralized solution to provide auditability. However, the underlying access control policies may be overlapping in terms of the component conditions/rules, and simply using existing solutions would result in repeated evaluation of user's authorization separately for each resource, leading to significant overhead in terms of cost and computation time over the blockchain. To address this challenge, we propose an approach that formulates a constraint optimization problem to generate an optimal composite access control policy. This policy is in compliance with all the local access control policies and minimizes the policy evaluation cost over the blockchain. The developed smart contract(s) can then be deployed to the blockchain, and used for access control enforcement. We also discuss how the access control enforcement can be audited using a game-theoretic approach to minimize cost. We have implemented the initial prototype of our approach using Ethereum as the underlying blockchain and experimentally validated the effectiveness and efficiency of our approach.</p>","PeriodicalId":74571,"journal":{"name":"Proceedings. International Conference on Distributed Computing Systems","volume":"2020 ","pages":"12-22"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ICDCS47774.2020.00015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38968748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Threshold-Based Widespread Event Detection. 基于阈值的广泛事件检测。
Pub Date : 2019-01-01 DOI: 10.1109/icdcs.2019.00047
You Zhou, Yian Zhou, Shigang Chen

Widespread event detection is a fundamental network function that has many important applications in cybersecurity, traffic engineering, and distributed data mining. This paper introduces a new probabilistic threshold-based event detection problem, which is to find all events that appear in any w-out-of-a monitors with probabilistic guarantee on false positives, where a is the total number of monitors and the threshold w(≤ a) is a positive integer parameter that can be arbitrarily set, according to specific application requirements. We develop an efficient threshold filter solution and its improved versions, which combine Bloom filters, counting Bloom filter, threshold filter and compressed filters in a series of encoding and filtering steps, providing tradeoff between detection accuracy and communication overhead. We theoretically optimize the system parameters in the proposed solutions to minimize the communication overhead under the constraint of probabilistic detection guarantee. Extensive simulations demonstrate the practical viability of the proposed solutions in their ability of finding widespread events in a large network with few false positives and low communication overhead.

广泛事件检测是网络的一项基本功能,在网络安全、流量工程和分布式数据挖掘等领域有着重要的应用。本文提出了一种新的基于概率阈值的事件检测问题,即寻找任意w-out- a监视器中出现的所有事件,并对假阳性有概率保证,其中a为监视器总数,阈值w(≤a)为一个正整数参数,可根据具体应用需求任意设置。我们开发了一种有效的阈值滤波器解决方案及其改进版本,它在一系列编码和滤波步骤中结合了布隆滤波器,计数布隆滤波器,阈值滤波器和压缩滤波器,在检测精度和通信开销之间提供了权衡。在概率检测保证的约束下,从理论上对系统参数进行优化,使通信开销最小化。大量的仿真证明了所提出的解决方案的实际可行性,因为它们具有在大型网络中发现广泛事件的能力,并且很少有误报和低通信开销。
{"title":"Threshold-Based Widespread Event Detection.","authors":"You Zhou,&nbsp;Yian Zhou,&nbsp;Shigang Chen","doi":"10.1109/icdcs.2019.00047","DOIUrl":"https://doi.org/10.1109/icdcs.2019.00047","url":null,"abstract":"<p><p>Widespread event detection is a fundamental network function that has many important applications in cybersecurity, traffic engineering, and distributed data mining. This paper introduces a new probabilistic threshold-based event detection problem, which is to find all events that appear in any <i>w</i>-out-of-<i>a</i> monitors with probabilistic guarantee on false positives, where <i>a</i> is the total number of monitors and the threshold <i>w</i>(≤ <i>a</i>) is a positive integer parameter that can be arbitrarily set, according to specific application requirements. We develop an efficient threshold filter solution and its improved versions, which combine Bloom filters, counting Bloom filter, threshold filter and compressed filters in a series of encoding and filtering steps, providing tradeoff between detection accuracy and communication overhead. We theoretically optimize the system parameters in the proposed solutions to minimize the communication overhead under the constraint of probabilistic detection guarantee. Extensive simulations demonstrate the practical viability of the proposed solutions in their ability of finding widespread events in a large network with few false positives and low communication overhead.</p>","PeriodicalId":74571,"journal":{"name":"Proceedings. International Conference on Distributed Computing Systems","volume":"2019 ","pages":"399-408"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/icdcs.2019.00047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38560070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Strong Privacy in Online Survey. 实现在线调查的强隐私。
Pub Date : 2017-01-01 Epub Date: 2017-07-17 DOI: 10.1109/icdcs.2017.247
You Zhou, Yian Zhou, Shigang Chen, Samuel S Wu

Thanks to the proliferation of Internet access and modern digital and mobile devices, online survey has been flourishing into data collection of marketing, social, financial and medical studies. However, traditional data collection methods in online survey suffer from serious privacy issues. Existing privacy protection techniques are not adequate for online survey for lack of strong privacy. In this paper, we propose a practical strong privacy online survey scheme SPS based on a novel data collection technique called dual matrix masking (DM2), which guarantees the correctness of the tallying results with low computation overhead, and achieves universal verifiability, robustness and strong privacy. We also propose a more robust scheme RSPS, which incorporates multiple distributed survey managers. The RSPS scheme preserves the nice properties of SPS, and further achieves robust strong privacy against joint collusion attack. Through extensive analyses, we demonstrate our proposed schemes can be efficiently applied to online survey with accuracy and strong privacy.

由于互联网接入和现代数字和移动设备的普及,在线调查已经蓬勃发展成为营销,社会,金融和医学研究的数据收集。然而,传统的在线调查数据收集方式存在严重的隐私问题。现有的隐私保护技术对网络调查的隐私保护力度不够。本文提出了一种实用的强隐私在线调查方案SPS,该方案基于一种新的数据采集技术——双矩阵掩蔽(dual matrix masking, DM2),以较低的计算开销保证了统计结果的正确性,并实现了通用可验证性、鲁棒性和强隐私性。我们还提出了一个更健壮的方案RSPS,它包含多个分布式调查管理器。RSPS方案保留了SPS的优良特性,进一步实现了抗联合合谋攻击的鲁棒强隐私性。通过广泛的分析,我们证明了所提出的方案可以有效地应用于在线调查,具有准确性和强隐私性。
{"title":"Achieving Strong Privacy in Online Survey.","authors":"You Zhou,&nbsp;Yian Zhou,&nbsp;Shigang Chen,&nbsp;Samuel S Wu","doi":"10.1109/icdcs.2017.247","DOIUrl":"https://doi.org/10.1109/icdcs.2017.247","url":null,"abstract":"<p><p>Thanks to the proliferation of Internet access and modern digital and mobile devices, online survey has been flourishing into data collection of marketing, social, financial and medical studies. However, traditional data collection methods in online survey suffer from serious privacy issues. Existing privacy protection techniques are not adequate for online survey for lack of strong privacy. In this paper, we propose a practical strong privacy online survey scheme SPS based on a novel data collection technique called <i>dual matrix masking</i> (DM<sup>2</sup>), which guarantees the correctness of the tallying results with low computation overhead, and achieves universal verifiability, robustness and strong privacy. We also propose a more robust scheme RSPS, which incorporates multiple distributed survey managers. The RSPS scheme preserves the nice properties of SPS, and further achieves robust strong privacy against joint collusion attack. Through extensive analyses, we demonstrate our proposed schemes can be efficiently applied to online survey with accuracy and strong privacy.</p>","PeriodicalId":74571,"journal":{"name":"Proceedings. International Conference on Distributed Computing Systems","volume":"2017 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/icdcs.2017.247","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38325131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings. International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1