2018 IEEE/ACM Symposium on Edge Computing (SEC)最新文献

筛选
英文 中文
Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments Aggio:用于保护隐私的智能零售环境的优惠券安全
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00020
A. Harris, Robin Snader, R. Kravets
{"title":"Aggio: A Coupon Safe for Privacy-Preserving Smart Retail Environments","authors":"A. Harris, Robin Snader, R. Kravets","doi":"10.1109/SEC.2018.00020","DOIUrl":"https://doi.org/10.1109/SEC.2018.00020","url":null,"abstract":"Researchers and industry experts are looking at how to improve a shopper's experience and a store's revenue by leveraging and integrating technologies at the edges of the network, such as Internet-of-Things (IoT) devices, cloud-based systems, and mobile applications. The integration of IoT technology can now be used to improve purchasing incentives through the use of electronic coupons. Research has shown that targeted electronic coupons are the most effective and coupons presented to the shopper when they are near the products capture the most shoppers' dollars. Although it is easy to imagine coupons being broadcast to a shopper's mobile device over a low-power wireless channel, such a solution must be able to advertise many products, target many individual shoppers, and at the same time, provide shoppers with their desired level of privacy. To support this type of IoT-enabled shopping experience, we have designed Aggio, an electronic coupon distribution system that enables the distribution of localized, targeted coupons while supporting user privacy and security. Aggio uses cryptographic mechanisms to not only provide security but also to manage shopper groups e.g., bronze, silver, and gold reward programs) and minimize resource usage, including bandwidth and energy. The novel use of cryptographic management of coupons and groups allows Aggio to reduce bandwidth use, as well as reduce the computing and energy resources needed to process incoming coupons. Through the use of local coupon storage on the shopper's mobile device, the shopper does not need to query the cloud and so does not need to expose all of the details of their shopping decisions. Finally, the use of privacy preserving communication between the shopper's mobile device and the CouponHubs that are distributed throughout the retail environment allows the shopper to expose their location to the store without divulging their location to all other shoppers present in the store.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demo: ThingsMigrate - Platform-Independent Live-Migration of JavaScript Processes 演示:ThingsMigrate——JavaScript进程的独立于平台的实时迁移
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00044
Kumseok Jung, Julien Gascon-Samson, K. Pattabiraman
{"title":"Demo: ThingsMigrate - Platform-Independent Live-Migration of JavaScript Processes","authors":"Kumseok Jung, Julien Gascon-Samson, K. Pattabiraman","doi":"10.1109/SEC.2018.00044","DOIUrl":"https://doi.org/10.1109/SEC.2018.00044","url":null,"abstract":"Recent trends in IoT (Internet of Things) has seen increasing number of devices being shipped with full-fledged operating systems, allowing more complex and stateful applications written in high-level languages (e.g., JavaScript) to be run on the edge. The benefits of pushing computations towards the edge is that one can reduce the network costs of data transmission. Just like any other distributed system, we need to guarantee in IoT the availability of running processes, and thus need a live-migration mechanism for such programs. However, well-studied VM migration techniques are costly and impractical in IoT, due to the resource constraints and diversity of devices. In this demo paper, we present a demo of ThingsMigrate, a JavaScript middleware for enabling live-migration of stateful JavaScript applications in a platform-independent manner, along with a web dashboard used to monitor and control the IoT devices.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130454432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vigilia: Securing Smart Home Edge Computing Vigilia:保护智能家居边缘计算
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00013
R. Trimananda, Ali Younis, Bojun Wang, Bin Xu, Brian Demsky, G. Xu
{"title":"Vigilia: Securing Smart Home Edge Computing","authors":"R. Trimananda, Ali Younis, Bojun Wang, Bin Xu, Brian Demsky, G. Xu","doi":"10.1109/SEC.2018.00013","DOIUrl":"https://doi.org/10.1109/SEC.2018.00013","url":null,"abstract":"Smart home IoT devices are becoming increasingly popular. Modern programmable smart home hubs such as SmartThings enable homeowners to manage devices in sophisticated ways to save energy, improve security, and provide conveniences. Unfortunately, many smart home systems contain vulnerabilities, potentially impacting home security and privacy. This paper presents Vigilia, a system that shrinks the attack surface of smart home IoT systems by restricting the network access of devices. As existing smart home systems are closed, we have created an open implementation of a similar programming and configuration model in Vigilia and extended the execution environment to maximally restrict communications by instantiating device-based network permissions. We have implemented and compared Vigilia with forefront IoT-defense systems; our results demonstrate that Vigilia outperforms these systems and incurs negligible overhead.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"486 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
FastPay: A Secure Fast Payment Method for Edge-IoT Platforms using Blockchain 快速支付:使用区块链的边缘物联网平台安全快速支付方法
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00055
Zijiang Hao, Raymond Ji, Qun A. Li
{"title":"FastPay: A Secure Fast Payment Method for Edge-IoT Platforms using Blockchain","authors":"Zijiang Hao, Raymond Ji, Qun A. Li","doi":"10.1109/SEC.2018.00055","DOIUrl":"https://doi.org/10.1109/SEC.2018.00055","url":null,"abstract":"Blockchain-based cryptocurrency systems such as Bitcoin and Ethereum have attracted much attention during the last decade. In recent years, a trend of combining Internet of Things (IoT) devices with blockchain technology has emerged. Digital payments can be made on front-end IoT devices, while a back-end blockchain serves as a distributed ledger to ensure the validity of payments across the system. Nevertheless, fast payments are usually on demand in such a scenario, but an open problem still remains on how to protect blockchain-based systems from double-spending attacks in the context of fast payment. Off-chain techniques, such as Lightning Network and Raiden Network, act as countermeasures to this problem, but they all suffer from the hidden transactions problem. To combat this problem, we propose FastPay, a solution for achieving secure fast payments in blockchain-backed edge-IoT systems. Preliminary evaluation on our prototype demonstrates the effectiveness of FastPay.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131211385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Edge-Based Discovery of Training Data for Machine Learning 基于边缘的机器学习训练数据发现
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00018
Ziqiang Feng, S. George, J. Harkes, P. Pillai, R. Klatzky, M. Satyanarayanan
{"title":"Edge-Based Discovery of Training Data for Machine Learning","authors":"Ziqiang Feng, S. George, J. Harkes, P. Pillai, R. Klatzky, M. Satyanarayanan","doi":"10.1109/SEC.2018.00018","DOIUrl":"https://doi.org/10.1109/SEC.2018.00018","url":null,"abstract":"We show how edge-based early discard of data can greatly improve the productivity of a human expert in assembling a large training set for machine learning. This task may span multiple data sources that are live (e.g., video cameras) or archival (data sets dispersed over the Internet). The critical resource here is the attention of the expert. We describe Eureka, an interactive system that leverages edge computing to greatly improve the productivity of experts in this task. Our experimental results show that Eureka reduces the labeling effort needed to construct a training set by two orders of magnitude relative to a brute-force approach.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking 智能监控作为实时人员检测和跟踪的边缘服务
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00036
S. Nikouei, Yu Chen, Timothy R. Faughnan
{"title":"Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking","authors":"S. Nikouei, Yu Chen, Timothy R. Faughnan","doi":"10.1109/SEC.2018.00036","DOIUrl":"https://doi.org/10.1109/SEC.2018.00036","url":null,"abstract":"Monitoring for security and well-being in highly populated areas is a critical issue for city administrators, policy makers and urban planners. As an essential part of many dynamic and critical data-driven tasks, situational awareness (SAW) provides decision-makers a deeper insight of the meaning of urban surveillance. Thus, surveillance measures are increasingly needed. However, traditional surveillance platforms are not scalable when more cameras are added to the network. In this work, a smart surveillance as an edge service has been proposed. To accomplish the object detection, identification, and tracking tasks at the edge-fog layers, two novel lightweight algorithms are proposed for detection and tracking respectively. A prototype has been built to validate the feasibility of the idea, and the test results are very encouraging.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
EveryLite: A Lightweight Scripting Language for Micro Tasks in IoT Systems EveryLite:物联网系统中微任务的轻量级脚本语言
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00050
Zhenying Li, Xiaohui Peng, Lu Chao, Zhiwei Xu
{"title":"EveryLite: A Lightweight Scripting Language for Micro Tasks in IoT Systems","authors":"Zhenying Li, Xiaohui Peng, Lu Chao, Zhiwei Xu","doi":"10.1109/SEC.2018.00050","DOIUrl":"https://doi.org/10.1109/SEC.2018.00050","url":null,"abstract":"Processing the computational tasks on the devices at the edge can significantly reduce computing load, network transmission load, and response latency. However, programming on these devices is difficult due to the resource-constrained and diversity features. This paper presents a lightweight scripting language, called EveryLite, to address this issue. EveryLite features a new @-expression to access the resources on connected devices via the REST Web interfaces and focuses on the micro tasks with limited complexity in Internet of Things (IoT) systems. We design an elastic runtime environment with a core of 37 KB and some extending modules to address the IoT devices' diversity problem. Experimental results show that the applications developed by EveryLite can be run on heterogeneous devices without modification and consume less memory than those developed by other scripting languages such as Lua and Python.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124687872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
SafeShareRide: Edge-Based Attack Detection in Ridesharing Services SafeShareRide:基于边缘的拼车服务攻击检测
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00009
Liangkai Liu, Xingzhou Zhang, Mu Qiao, Weisong Shi
{"title":"SafeShareRide: Edge-Based Attack Detection in Ridesharing Services","authors":"Liangkai Liu, Xingzhou Zhang, Mu Qiao, Weisong Shi","doi":"10.1109/SEC.2018.00009","DOIUrl":"https://doi.org/10.1109/SEC.2018.00009","url":null,"abstract":"Ridesharing services, such as Uber and Didi, are enjoying great popularity; however, a big challenge remains in guaranteeing the safety of passenger and driver. State-of-the-art work has primarily adopted the cloud model, where data collected through end devices on vehicles are uploaded to and processed in the cloud. However, data such as video can be too large to be uploaded onto the cloud in real time. When a vehicle is moving, the network communication can become unstable, leading to high latency for data uploading. In addition, the cost of huge data transfer and storage is a big concern from a business point of view. As edge computing enables more powerful computing end devices, it is possible to design a latency-guaranteed framework to ensure in-vehicle safety. In this paper, we propose an edge-based attack detection in ridesharing services, namely SafeShareRide, which can detect dangerous events happening in the vehicle in near real time. SafeShareRide is implemented on both drivers' and passengers' smartphones. The detection of SafeShareRide consists of three stages: speech recognition, driving behavior detection, and video capture and analysis. Abnormal events detected during the stages of speech recognition or driving behavior detection will trigger the video capture and analysis in the third stage. The video data processing is also redesigned: video compression is conducted at the edge to save upload bandwidth while video analysis is conducted in the cloud. We implement the SafeShareRide system by leveraging open source algorithms. Our experiments include a performance comparison between SafeShareRide and other edge-based and cloud-based approaches, CPU usage and memory usage of each detection stage, and a performance comparison between stationary and moving scenarios. Finally, we summarize several insights into smartphone based edge computing systems.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Poster: Towards a Distributed and Self-Adaptable Cloud-Edge Middleware 海报:走向分布式和自适应的云边缘中间件
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00037
Julien Gascon-Samson, Kumseok Jung, K. Pattabiraman
{"title":"Poster: Towards a Distributed and Self-Adaptable Cloud-Edge Middleware","authors":"Julien Gascon-Samson, Kumseok Jung, K. Pattabiraman","doi":"10.1109/SEC.2018.00037","DOIUrl":"https://doi.org/10.1109/SEC.2018.00037","url":null,"abstract":"The Internet of Things (IoT) landscape has grown tremendously over the past few years. Modern devices are getting more powerful, and are therefore gaining the ability to execute complex and rich applications (edge computing), which can yield many benefits compared to traditional, cloud-centric models. On the other end, the use of high-level languages (e.g., JavaScript) allows programmers to abstract low-level considerations, and gives the ability to run the same code across different platforms. In this paper, we describe the main features of ThingsJS, our comprehensive self-adaptive cloud-edge middleware that allows for designing and running high-level, complex applications written in JavaScript on the IoT devices themselves.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extend Cloud to Edge with KubeEdge 使用KubeEdge将云扩展到边缘
2018 IEEE/ACM Symposium on Edge Computing (SEC) Pub Date : 2018-10-01 DOI: 10.1109/SEC.2018.00048
Ying Xiong, Yulin Sun, Li Xing, Ying Huang
{"title":"Extend Cloud to Edge with KubeEdge","authors":"Ying Xiong, Yulin Sun, Li Xing, Ying Huang","doi":"10.1109/SEC.2018.00048","DOIUrl":"https://doi.org/10.1109/SEC.2018.00048","url":null,"abstract":"In this paper, we introduce an infrastructure in edge computing environment, KubeEdge, to extend cloud capabilities to the edge. In the new form of cloud architecture, Cloud consists of computing resources both at centralized data centers and at distributed edges. KubeEdge infrastructure connects and coordinates two computing environments for applications leveraging both computing resources to achieve better performance and user experience. Technically, KubeEdge provides the network protocol infrastructure and the same runtime environment on the edge as in the cloud, which allows the seamless communication of applications with components running on edge nodes as well as cloud servers. It also allows the existing cloud services and cloud development model to be adopted at edge. Based on Kubernetes [1], KubeEdge architecture includes a network protocol stack called KubeBus, a distributed metadata store and synchronization service, and a lightweight agent (EdgeCore) for the edge. KubeBus is designed to have its own implementation of OSI network protocol layers, which connects servers at edge and VMs in the cloud as one virtual network. KubeBus provides a unified multitenant communication infrastructure with fault tolerance and high availability. The distributed metadata store and sync service is designed to support the offline scenario when edge nodes are not connected to the cloud. EdgeController component in KubeEdge architecture is a controller plugin for Kubernetes [1] to manage remote edge nodes and cloud VMs as one logical cluster, which enables KubeEdge to schedule, deploy and manage container applications across edge and cloud with the same API.","PeriodicalId":376439,"journal":{"name":"2018 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121500998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信