Liang Zhu, Changqiao Xu, Jianfeng Guan, Yang Liu, Hongke Zhang
{"title":"A preference-aware trajectory privacy-preserving scheme in location-based social networks","authors":"Liang Zhu, Changqiao Xu, Jianfeng Guan, Yang Liu, Hongke Zhang","doi":"10.1109/INFCOMW.2017.8116482","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116482","url":null,"abstract":"Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive locations are always revealed by this way; 2) they fail to consider the user preference and background information in trajectory anonymization, which is important to keep personalized location-based service; 3) they can not be adapted to different kinds of privacy risk levels, resulting in low the service precision. To tackle the above problems, we propose PTPP, a preference-aware trajectory privacy-preserving scheme. First, we model the user preference by considering movement pattern, user familiarity and location popularity. Then, we classify the privacy risk levels according to user familiarity and location popularity. Finally, we propose a preference-aware trajectory anonymization algorithm by considering privacy risk levels. The experimental results show that our method outperforms the existing method in terms of data utility and efficiency.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Panagiotis A. Traganitis, Yanning Shen, G. Giannakis
{"title":"Topology inference of multilayer networks","authors":"Panagiotis A. Traganitis, Yanning Shen, G. Giannakis","doi":"10.1109/INFCOMW.2017.8116495","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116495","url":null,"abstract":"Linear structural equation models (SEMs) have been very successful in identifying the topology of complex graphs, such as those representing tactical, social and brain networks. The rising popularity of multilayer networks, presents the need for tools that are tailored to leverage the layered structure of the underlying network. To this end, a multilayer SEM is put forth, to infer causal relations between nodes belonging to multilayer networks. An efficient algorithm based on the alternating direction method of multipliers (ADMM) is developed, and preliminary tests on synthetic as well as real data demonstrate the effectiveness of the proposed approach.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contracts as entry barriers for unlicensed spectrum","authors":"Yining Zhu, R. Berry","doi":"10.1109/INFCOMW.2017.8116484","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116484","url":null,"abstract":"Greater unlicensed access to spectrum has the potential to increase competition among wireless service providers and encourage innovations by lowering barriers to entry. However, early providers offering service in such a band could create new entry barriers through the use of contracts that impose a penalty on customers who switch to a new provider. This paper discusses cases in which an exclusive or non-exclusive contract may be signed before entrants come into an unlicensed spectrum market. Our results indicate that the incumbents will always offer an exclusive contract, which would increase the expected customer surplus. The expected social welfare may increase or decrease depending on how we model the customers' demand, and the technology of the incumbents and entrants.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kesidis, N. Nasiriani, Y. Shan, B. Urgaonkar, I. Lambadaris
{"title":"Multicommodity games in public-cloud markets considering subadditive resource demands","authors":"G. Kesidis, N. Nasiriani, Y. Shan, B. Urgaonkar, I. Lambadaris","doi":"10.1109/INFCOMW.2017.8116454","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116454","url":null,"abstract":"In still developing, public cloud-computing markets, prices for virtual machine (VM) offerings fluctuate, and not just for spot/preemptible instances. Moreover, some (particularly derivative) providers allow for fine-grain initial resource provisioning and dynamic reprovisioning of VMs. In this preliminary study, we consider long-lived tenants of a public cloud under resource-based service-level agreements. For noncooperative aggregative multicommodity (plural IT resource) games among them, conditions are established for an interior Nash equilibrium and an exact potential (giving convergence to Nash equilibrium). Also discussed are extensions to plural IT resource demands that are subadditive in workload intensity.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names","authors":"Yuwei Xu, Siyan Yao, Changhai Wang, Jingdong Xu","doi":"10.1109/INFCOMW.2017.8116404","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116404","url":null,"abstract":"Packet loss is a serious phenomenon in Vehicular Ad-hoc NETworks (VANETs). Although the multi-source and in-network caching characteristics of Named Data Networking (NDN) can help the consumer to retrieve named content, how to provide reliable named data transmission in vehicular environment is still a problem. To achieve the named data retransmission, previous works follow the traditional RTO algorithms based on the latest RTT samples. Since the host-to-host transmission mode is broken by the multi-source and high dynamic Vehicular Named Data Networking (VNDN), those algorithms are no longer applicable. In this paper, we first put forward the concept of correlativity between two chunk transmissions, then quantify it by the logic and physical semantics implied in names, and finally propose CO-RTO, a correlativity-based algorithm which estimates the Retransmission TimeOut (RTO) according to the RTT samples with high correlativity. We have validated our approach in an urban traffic scenario on ndnSIM. The simulation results show that CO-RTO is more efficient than some classic algorithms in named data retransmission.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster abstract: Resource allocation with service availability & QoS constraints in mobile fog networks","authors":"N. Daneshfar, N. Pappas, Vangelis Angelakis","doi":"10.1109/INFCOMW.2017.8116539","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116539","url":null,"abstract":"The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of resources in mobile edge devices.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats","authors":"Dongjin Xu, Liang Xiao, N. Mandayam, H. Poor","doi":"10.1109/INFCOMW.2017.8116435","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116435","url":null,"abstract":"Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval, respectively. Both the probability weighting effect and the framing effect are applied to model the deviation of subjective decisions of end-users from the objective decisions governed by expected utility theory, under uncertain attack durations. Cumulative decision weights are used to describe the probability weighting effect and the value distortion functions are used to represent the framing effect of subjective APT attackers and defenders in the CPT-based APT defense game, rather than discrete decision weights, as in earlier prospect theoretic study of APT defense. The Nash equilibria of the CPT-based APT defense game are derived, showing that a subjective attacker becomes risk-seeking if the frame of reference for evaluating the utility is large, and becomes risk-averse if the frame of reference for evaluating the utility is small.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the energy performance of GPS receivers for location tracking applications","authors":"Kongyang Chen, Guang Tan, Mingming Lu","doi":"10.1109/INFCOMW.2017.8116357","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116357","url":null,"abstract":"Integrated GPS receivers have become a basic module in location based services, such as position sharing, wild animal monitoring, and location tracking. However, GPS modules have a serious battery drain problem due to their high computation load. This paper aims to reveal the impact of key software parameters on GPS energy consumption, by establishing an energy model for a standard GPS receiver architecture as found in both academic and industrial designs. In particular, our measurements show that the receiver's energy consumption is in large part linear with the number of tracked satellites. This leads to a design of selective tracking algorithm that provides similar positioning accuracy (around 12m) with a subset of selected satellites, which translates to an energy saving of 22.7%.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116093272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph D. Beshay, A. T. Nasrabadi, R. Prakash, A. Francini
{"title":"On active queue management in cellular networks","authors":"Joseph D. Beshay, A. T. Nasrabadi, R. Prakash, A. Francini","doi":"10.1109/INFCOMW.2017.8116407","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116407","url":null,"abstract":"Active queue management (AQM) is broadly accepted as the tool of choice for tackling bufferbloat (the accumulation of large queueing delays) in network buffers. CoDel and PIE are considered two of the most promising AQM schemes, but little has been done to adopt them in cellular networks, which are particularly plagued by bufferbloat. This is partly due to the lack of adequate evaluation of their performance on links where the data rate varies quickly and widely. Past studies have used simplistic link models and thus do not provide a strong case for the adoption of either scheme in cellular networks. We study the performance of CoDel and PIE on a recently introduced emulator that accurately reproduces the highly variable nature of cellular links. We discover that both schemes incur link utilization losses up to 60% in return for reducing queueing delay. This trade-off is undesirable for network providers and applications, yet it is inherent to the design of both CoDel and PIE. We argue that AQM schemes designed around the primary goal of maximizing network power (the ratio between throughput and queuing delay) are not the most effective tool for tackling bufferbloat in cellular links. We propose a new queue balance metric as the driving criterion for designing more effective congestion control solutions for cellular networks.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiuhua Li, Peiran Wu, Xiaofei Wang, Keqiu Li, Zhu Han, Victor C. M. Leung
{"title":"Collaborative hierarchical caching in cloud radio access networks","authors":"Xiuhua Li, Peiran Wu, Xiaofei Wang, Keqiu Li, Zhu Han, Victor C. M. Leung","doi":"10.1109/INFCOMW.2017.8116420","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116420","url":null,"abstract":"To deal with the severe challenge from explosively increasing mobile users' multimedia service requests in mobile networks, introducing cloud-based computing platform and content caching into radio access networks (RANs) has become an effective emerging technique. In this paper, we propose a collaborative hierarchical caching framework in cloud RANs (C-RANs), which minimizes the access delay of content delivery under certain specific network constraints to improve users' Quality of Service (QoS) as well as offload network traffic. Specifically, based on the formed hierarchical caching topology consisting of two tiers of content caching at the base stations and the cloud central unit (CCU), we decompose the formulated large-scale optimization problem into a series of simpler subproblems, and then propose the corresponding low-complexity distributed heuristic solutions as well as a content request routing scheme. Trace-based evaluation results demonstrate the effectiveness of the proposed framework.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}