2010 IEEE 30th International Conference on Distributed Computing Systems Workshops最新文献

筛选
英文 中文
Energy-Efficient Agreement Protocols in P2P Overlay Networks P2P覆盖网络中的节能协议
A. Aikebaier, T. Enokido, M. Takizawa, S. Deen
{"title":"Energy-Efficient Agreement Protocols in P2P Overlay Networks","authors":"A. Aikebaier, T. Enokido, M. Takizawa, S. Deen","doi":"10.1109/ICDCSW.2010.47","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.47","url":null,"abstract":"The peer-to-peer (P2P) model is a fully distributed system which is composed of peer processes (peers) which cooperate with each other to achieve a common goal. Here, peers have to efficiently and flexibly make an agreement on one common value which satisfies an agreement condition. We discuss a novel approach to efficiently making an agreement where each peer sends a package of multiple possible values to the other peers at ongoing rounds. By exchanging multiple possible values at once, we can significantly reduce time and number of messages and increase the possibility to reach an agreement. We take advantage of the multipoint relaying (MPR) mechanism to reduce the number of messages to broadcast the messages. Here, if a peer which forwards messages to other peers is faulty, the peers cannot receive messages. In this paper, we newly discuss a broadcast scheme where only the trustworthy peers forward messages. Here, the transmission fault implied by faults of untrustworthy peers can be reduced.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Nonstationarity of Human Contact Networks 人类接触网络的非平稳性研究
S. Scellato, Mirco Musolesi, C. Mascolo, V. Latora
{"title":"On Nonstationarity of Human Contact Networks","authors":"S. Scellato, Mirco Musolesi, C. Mascolo, V. Latora","doi":"10.1109/ICDCSW.2010.43","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.43","url":null,"abstract":"The measurement and the analysis of the temporal patterns arising in human networks is of fundamental importance to many application domains including targeted advertising, opportunistic routing, resource provisioning (e.g., bandwidth allocation in infrastructured wireless networks) and, more in general, modeling of human social behavior. In this paper we present a novel and exhaustive study of the temporal dynamics of human networks and apply it to different sets of wireless network traces. We consider networks of contacts among users (i.e., peer-to-peer opportunistic networks). We show that we are able to quantify how the amount of information associated to the process evolves over time by using techniques based on time series analysis. We also demonstrate how regular patterns appear only at certain time scales: network dynamics appears nonstationary, in the sense that its statistical description is different at various time scales. These results provide a new methodology to accurately and quantitatively investigate the temporal properties of any type of human interactions and open new directions towards a better understanding of the regular nature of human social behavior.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117062815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cyber Crime Scene Investigations (C²SI) through Cloud Computing 基于云计算的网络犯罪现场调查(C²SI
Xinwen Fu, Z. Ling, Wei Yu, Junzhou Luo
{"title":"Cyber Crime Scene Investigations (C²SI) through Cloud Computing","authors":"Xinwen Fu, Z. Ling, Wei Yu, Junzhou Luo","doi":"10.1109/ICDCSW.2010.33","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.33","url":null,"abstract":"Cloud computing brings opportunities for network forensics tracing Internet criminals in the distributed environment. We may use the new “pay-as-you-go” model of the cloud computing to deploy the on-demand cyber surveillance sentinels and conduct distributed trace back in complicated cyber crime scene investigations. To trace criminals abusing anonymous communication networks such as Tor, law enforcement can deploy high-bandwidth Amazon EC2 sentinels into the Tor network. Some sentinels are configured as Tor entry guards and others work as Tor exits nodes. With the high bandwidth and appropriate number of such sentinels, we can achieve a required probability that a Tor circuit passes through an entry sentinel and an exit sentinel in order to capture the suspects. The proposed “pay-as-you-go” traceback model is cost-effective since the investigation may last for just hours with effective traceback techniques. Our experiments demonstrate the feasibility of this new traceback strategy through the cloud.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Z-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor Networks Z-Cast: ZigBee簇树无线传感器网络中的组播路由机制
Olfa Gaddour, A. Koubâa, O. Cheikhrouhou, M. Abid
{"title":"Z-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor Networks","authors":"Olfa Gaddour, A. Koubâa, O. Cheikhrouhou, M. Abid","doi":"10.1109/ICDCSW.2010.52","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.52","url":null,"abstract":"Group communication in Wireless Sensor Networks (WSNs) requires an efficient multicast routing mechanism due to inherent resources and computing constraints of sensor nodes. ZigBee, which is a standard protocol that represents a very prominent technology for WSNs, does not consider multicast routing in its specification. In this paper, a group is defined as a set of nodes that share the same sensory information. The main contributions of this paper are two-folded: First, we propose Z-Cast, an efficient multicast routing mechanism for groups that share the same sensory information in a cluster-tree WSN. Second, we show how to integrate the Z-Cast mechanism in open-ZB which is an open source IEEE 802.15.4/ZigBee implementation. Finally, we demonstrate the efficiency and backward compatibility of our proposal with the standard specification.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
GEMOM Platform Prototype Validation through Case Studies - Main Results and Viewpoints to Exploitation 通过案例研究验证GEMOM平台原型-开发的主要结果和观点
Petra Ristau, Shaun Topham, F. Paganelli, Lorenzo Blasi
{"title":"GEMOM Platform Prototype Validation through Case Studies - Main Results and Viewpoints to Exploitation","authors":"Petra Ristau, Shaun Topham, F. Paganelli, Lorenzo Blasi","doi":"10.1109/ICDCSW.2010.71","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.71","url":null,"abstract":"I. Introduction GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project. Its main contribution is the design and development of a secure, self-organizing and resilient messaging platform, enabling reliable message sourcing and delivery in business-critical application. The GEMOM middleware, with its secure, resilient, selfhealing and adaptive messaging infrastructure allows for flexible and robust messaging solutions and offers advanced monitoring, management and maintenance services. Specific and final project activities are focused on validating GEMOM key features through the above mentioned five application scenarios. Final results on ongoing testing activities will presented at the workshop.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127919209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adding Resilience to Message Oriented Middleware: The GEMOM Approach 向面向消息的中间件添加弹性:GEMOM方法
J. Bigham, M. Novkovic
{"title":"Adding Resilience to Message Oriented Middleware: The GEMOM Approach","authors":"J. Bigham, M. Novkovic","doi":"10.1109/ICDCSW.2010.72","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.72","url":null,"abstract":"This talk describes an approach to enhance the resilience of message oriented middleware to faults and attacks. The system is designed to work with different message oriented middleware as long as the messaging system can supply the information and control API required. The structure of the system and the approach to handling broker failures and anomalous behaviour through the planning of mirroring and relaying mechanisms to suit the tolerable risk and the deployment context is the focus of the paper. Validation is through industrial case studies and end user assessment.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IRRES: Intrusion-Resilient Remote Email Storage IRRES:入侵弹性远程邮件存储
Di Ma, G. Tsudik
{"title":"IRRES: Intrusion-Resilient Remote Email Storage","authors":"Di Ma, G. Tsudik","doi":"10.1109/ICDCSW.2010.38","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.38","url":null,"abstract":"Both individuals and corporations increasingly rely on email to exchange important and, often sensitive, information. With the advent of ubiquitous computing and miniaturization of end-devices, many users leave email on remote servers, thus facilitating anywhere/anytime access from any networked device. Since private and sensitive information is often contained in email, it is very important to prevent its unauthorized disclosure. In this paper, we consider the problem of repeated intrusions of third-party email servers. Specifically, we design IRRES: Intrusion-Resilient Remote Email Storage system that prevents email leakage despite the presence of a powerful mobile adversary. IRRES eliminates sender compliance requirements by shifting encryption from email sender to email server. Incoming email messages are encrypted by the server with one-time keys obtained from an intrusion-resilient cooperative randomness generation process. Thus, even if the server is compromised twice, all email encrypted in the interim remains secure.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing a Community Cloud 保护社区云
F. Baiardi, D. Sgandurra
{"title":"Securing a Community Cloud","authors":"F. Baiardi, D. Sgandurra","doi":"10.1109/ICDCSW.2010.34","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.34","url":null,"abstract":"Virtual Interacting Network CommunIty (Vinci) is a software architecture that exploits virtualization to secure a community cloud, i.e. a cloud system shared among communities with distinct security levels and reliability requirements. A community consists of a set of users, their applications, a set of services and of shared resources. Users with distinct privileges and applications with distinct trust levels belong to distinct communities. Rather than acquiring and managing its own physical infrastructure, a community defines a virtual ICT infrastructure, i.e. an overlay, by instantiating and interconnecting virtual machines (VMs) defined from a small set of templates. Vinci includes templates to run user applications, protect shared resources and control traffic among communities to filter out malware or distributed attacks. The adoption of alternative VM templates minimizes the complexity of each VM and increases the robustness of both the VMs and of the overall infrastructure. The resulting overlays are mapped onto the cloud infrastructure or, from another perspective, they access an infrastructure service. The cloud provider defines a further overlay that interconnects VMs to manage the infrastructure resources and configure the VMs at start-up.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On Trustworthiness of CPU Usage Metering and Accounting 论CPU使用率计量核算的可信度
Mei Liu, Xuhua Ding
{"title":"On Trustworthiness of CPU Usage Metering and Accounting","authors":"Mei Liu, Xuhua Ding","doi":"10.1109/ICDCSW.2010.40","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.40","url":null,"abstract":"In the envisaged utility computing paradigm, a user taps a service provider's computing resources to accomplish her tasks, without deploying the needed hardware and software in her own IT infrastructure. To make the service profitable, the service provider charges the user based on the resources consumed. A commonly billed resource is CPU usage. A key factor to ensure the success of such a business model is the trustworthiness of the resource metering scheme. In this paper, we provide a systematic study on the trustworthiness of CPU usage metering. Our results show that the metering schemes in commodity operating systems should not be used in utility computing. A dishonest server can run various attacks to cheat the users. Many of the attacks are surprisingly simple and do not even require high privileges or sophisticated techniques. To demonstrate that, we experiment with several types of attacks on Linux and show their adversarial effects. We also suggest that source integrity, execution integrity and fine-grained metering are the necessary properties for a trustworthy metering scheme in utility computing.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
SecCloud: Bridging Secure Storage and Computation in Cloud SecCloud:桥接云中的安全存储和计算
Lifei Wei, Haojin Zhu, Z. Cao, Weiwei Jia, A. Vasilakos
{"title":"SecCloud: Bridging Secure Storage and Computation in Cloud","authors":"Lifei Wei, Haojin Zhu, Z. Cao, Weiwei Jia, A. Vasilakos","doi":"10.1109/ICDCSW.2010.36","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.36","url":null,"abstract":"Cloud computing becomes a hot research topic in the recent years. In the cloud computing, software applications and databases are moved to the centralized large data centers, which is called cloud. In the cloud, due to lack of physical possession of the data and the machine, the data and computation may not be well managed and fully trusted by cloud users. Existing work on cloud security mainly focuses on cloud storage without taking computation security into consideration. In this paper, we propose SecCloud, a novel auditing scheme to secure cloud computing based on probabilistic sampling technique as well as designated verifier technique, which aims to consider secure data storage, computation and privacy preserving together. We also discuss how to optimize sampling size to minimize the auditing cost. Detailed analysis and simulations have demonstrated the effectiveness and efficiency of the proposed scheme.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信