{"title":"DST: Leveraging Delay-Insensitive Workload in Cloud Storage for Smart Home Network","authors":"Suiming Guo, Liang Chen, D. Chiu","doi":"10.1109/ICCCN.2015.7288401","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288401","url":null,"abstract":"We study the problem of how to manage the high intra-datacenter traffic in a chunk-based public cloud storage service serving primarily smart home devices. The large volume of traffic is introduced by delivering very large content during busy hours in the cloud. Measurement of a commercial cloud service shows that the peak traffic volume (at its edge servers) overwhelms the network interface cards (NICs), resulting in serious congestion and packet losses. Since it can be expected the large content downloading requests in smart home environment could be delay-insensitive, we propose DST to keep the peak load under a specified upper bound, by delaying users' requests when necessary. By modelling DST as a queueing system, we derive the relation between the mean delay and the traffic upper bound. With trace-driven simulations, we evaluate the system performance and validate the analysis results. For the commercial cloud service we study, we show that it is possible to keep the traffic upper bound to about 80% of peak traffic rate by introducing a mean delay of around 48 minutes.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jongdeog Lee, Akash Kapoor, Md. Tanvir Al Amin, Zhehao Wang, Zeyuan Zhang, Radhika Goyal, T. Abdelzaher
{"title":"InfoMax: An Information Maximizing Transport Layer Protocol for Named Data Networks","authors":"Jongdeog Lee, Akash Kapoor, Md. Tanvir Al Amin, Zhehao Wang, Zeyuan Zhang, Radhika Goyal, T. Abdelzaher","doi":"10.1109/ICCCN.2015.7288420","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288420","url":null,"abstract":"The advent of social networks, mobile sensing, and the Internet of Things herald an age of data overload, where the amount of data generated and stored by various data services exceeds application consumption needs. In such an age, an increasingly important need of data clients will be one of data sub-sampling. This need calls for novel data dissemination protocols that allow clients to request from the network a representative sampling of data that matches a query. In this paper, we present the design of a new transport-layer dissemination protocol, called InfoMax, that allows applications to request such a data sampling. InfoMax exploits the recently proposed named-data-networking (NDN) stack that makes networks aware of hierarchical data names, as opposed to IP addresses. Assuming that named objects with longer prefixes are semantically more similar, InfoMax has the property of minimizing semantic redundancy among delivered data items, hence offering the best coverage of the requested topic with the fewest bytes. The paper discusses the design of InfoMax, its experimental evaluation, and example applications.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114146536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering the Densest Subgraph in MapReduce for Assortative Big Natural Graphs","authors":"Bo Wu, Haiying Shen","doi":"10.1109/ICCCN.2015.7288397","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288397","url":null,"abstract":"Discovering the densest subgraph is important in graph analysis, which has wide-ranging applications from social network community mining to the discovery of biological network modules. However, the previous algorithms neglect the connectivity of the dense subgraph since it is a challenge to give consideration to both subgraph structure and time efficiency. As a result, it may lead to isolated subgraphs in the output though they aim to find one connected dense subgraph. Also, there are lacking of efficient algorithms for big natural graphs, especially considering datasets become increasingly larger in this era of Big Data. Furthermore, previous algorithms fail to take advantage of various features of natural graphs (e.g., power-law degree distribution, homophyly of vertices, and power-law community size) which can be applied to improve the efficiency and precision of the densest subgraph discovery. To handle these problems, we design a heuristic algorithm for discovering the connected densest subgraph for massive undirected graphs in a MapReduce framework by taking advantage of the features of natural graphs. Experimental results show that our algorithm is capable of discovering the connected densest subgraph. Also, it can reduce the running times by 62% for average and discover denser subgraphs in 50% of the real datasets and 88% of the simulated datasets comparing with previous algorithm in a MapReduce framework.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCmesh: Solar-Powered Wireless Smart Camera Mesh Network","authors":"Leland Miller, Kevin Abas, K. Obraczka","doi":"10.1109/ICCCN.2015.7288462","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288462","url":null,"abstract":"Wireless visual sensor networks find a wide range of applications such as environment and habitat monitoring, object tracking, surveillance, etc. Unlike sensor networks targeting telemetry applications, which typically use \"scalar\" sensors, visual sensor networks produce richer, multi-media information and therefore raise additional challenges related to efficient use of energy-, node-, and network-resources. In this paper, we introduce SCmesh, a mesh network of solar-powered wireless camera nodes. Using SCmesh, low-cost, solar-powered, visual sensing nodes are able to transfer video files as well as collaborate on tasks such as visual processing, event detection, object tracking, etc. SCmesh allows node-to-node, as well as scoped- or full broadcast communication. We deploy SCmesh in a smart visual sensor network deployment and showcase its functionality and performance.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating SDN Controller Performance Bottlenecks","authors":"C. Caba, José Soler","doi":"10.1109/ICCCN.2015.7288429","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288429","url":null,"abstract":"The centralization of the control plane decision logic in Software Defined Networking (SDN) has raised concerns regarding the performance of the SDN Controller (SDNC) when the network scales up. A number of solutions have been proposed in the literature to address these concerns. This paper proposes a new approach for addressing the performance bottlenecks that arise from limited computational resources at the SDNC. The proposed approach is based on optimally configuring the operating parameters of the components residing inside the SDNC (network control functions such as monitoring, routing, etc.). A series of tests have been performed, and results confirm that by careful configurations, the computational overhead at the SDNC can be reduced without significantly affecting the efficiency of its components.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Effectiveness of Smart Grid Applications Using Co-Simulation","authors":"Paul Moulema, Wei Yu, D. Griffith, N. Golmie","doi":"10.1109/ICCCN.2015.7288438","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288438","url":null,"abstract":"The smart grid is a complex system that comprises components from both the power grid and communication networks. To understand the behavior of such a complex system, co-simulation is a viable tool to capture the interaction and the reciprocal effects between a communication network and a physical power grid. In this paper, we systematically review the existing efforts of co-simulation and design a framework to explore co-simulation scenarios. Using the demand response and energy price as examples of smart grid applications and operating the communication network under various conditions (e.g., normal operation, performance degrade, and security threats), we implement these scenarios and conduct a performance evaluation of smart grid applications by leveraging a co-simulation platform.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disseminating Authorized Content in Interest-Centric Opportunistic Social Networks","authors":"C. Kong, Xiaojun Cao","doi":"10.1109/ICCCN.2015.7288398","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288398","url":null,"abstract":"The authorized content is the content which can only be generated by the content provider (CP). The content copies delivered to a user may bring some reward to the CP if the content is adopted by the user. The overall reward obtained by the CP depends on how much the user is interested in the content and how the user may help disseminate the content copies. Hence, to maximize the reward obtained, the content provider are motivated to disseminate the authorized content to the most interested users. In this paper, we study how to effectively disseminate the authorized content in interest-centric opportunistic social networks (IOSNs) such that the reward is maximized. We first derive the Social Connection Pattern (SCP) to statistically describe the interest distribution of the users contacted or connected. The SCP is used to predict the interests of possible contactors and connectors. We then propose our Social Connection Pattern based Dissemination algorithm (SCPD) to calculate the best number of content copies to disseminate when two users meet. Our dataset based simulation shows that our SCPD algorithm is effective and efficient to disseminate the authorized content in IOSNs","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing and Implementing Fully Transparent Internet Voting","authors":"Kevin Butterfield, Huian Li, X. Zou, Feng Li","doi":"10.1109/ICCCN.2015.7288408","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288408","url":null,"abstract":"Voting over the internet has been the focus of significant research with the potential to solve many problems. Current implementations typically suffer from a lack of transparency, where the connection between vote casting and result tallying is seen as a black box by voters. A new protocol was recently proposed that allows full transparency, never obfuscating any step of the process, and splits authority between mutually-constraining conflicting parties. Achieving such transparency brings with it challenging issues. In this paper we propose an efficient algorithm for generating unique, anonymous identifiers (voting locations) that is based on the Chinese Remainder Theorem, we extend the functionality of an election to allow for races with multiple winners, and we introduce a prototype of this voting system implemented as a multiplatform web application.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"464 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Road Network-Aware Anonymization in Mobile Systems with Reciprocity Support","authors":"Bhuvan Bamba, Ling Liu, Emre Yigitoglu","doi":"10.1109/ICCCN.2015.7288459","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288459","url":null,"abstract":"Most existing solutions on location anonymization fail to address the issue of location privacy protection for mobile users traveling on road networks. In this paper, we present a road network-aware privacy model to handle the location privacy problem in mobile systems. We present third party supported anonymization which can be plugged into existing mobile systems without major modifications. As opposed to current road network specific solutions, our system has the following salient features. First, we argue that the graph density of a cloaked subgraph is an important location cloaking quality measure for road network-based location privacy protection. High graph density leads to high utility of the cloaked location with respect to spatial resolution. Second, we devise a suite of graph-based cloaking algorithms which guarantee reciprocity - an important location cloaking property that many existing approaches fail to support - under an enhanced privacy model. Further, we use controlled randomization in the cloaking process to provide higher privacy strength while maintaining the utility of the cloaked location. Last but not the least, our experimental evaluation shows the efficiency and robustness of the approach in terms of privacy, utility and performance of the model.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victor C. Valgenti, Min Sik Kim, Sung-il Oh, Inbok Lee
{"title":"REduce: Removing Redundancy from Regular Expression Matching in Network Security","authors":"Victor C. Valgenti, Min Sik Kim, Sung-il Oh, Inbok Lee","doi":"10.1109/ICCCN.2015.7288457","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288457","url":null,"abstract":"Regular expressions have become a fixture in network security systems such as Network Intrusion Detection, Spam email filtering, and Antivirus. Unfortunately, regular expressions require considerably more resources in matching over fixed binary or character strings. Much research has focused on improving matching architectures or hardware support to create more efficient regular expression matching. This research, however, investigated whether or not the regular expression set itself contained any lever that might make for creating more efficient automata prior to moving such automata to any specific matching architecture or hardware. We found that typical Non-deterministic Finite Automata (NFA) construction methodologies create redundant paths in the NFA when used with the complex rule-sets employed in network security. This stems directly from the fact that creating optimized NFA is a hard problem. As such, we created REduce, a tool that uses shared prefixes among regular expressions as a heuristic to eliminate redundant paths among shared prefixes within constructed NFA. The end result is smaller matching automata (between 4-50% depending on the rule-set) and a 4-900% improvement in throughput due to reductions in active state. More importantly, REduce only targets NFA construction, thus the generated NFA can be converted to any specific matching architecture or hardware for cumulative improvement.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114208846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}