The proceedings contain 28 papers. The topics discussed include: proof of location through a blockchain agnostic smart contract language;implementation and preliminary evaluation of an auditable confidentiality mechan...
ISBN:
(纸本)9798350328127
The proceedings contain 28 papers. The topics discussed include: proof of location through a blockchain agnostic smart contract language;implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi;incentive-driven federated learning in mobile edge networks;OrcoDCS: an IoT-edge orchestrated online deep compressed sensing framework;the case for lazy byzantine fault detection for transactional database systems;a blockchain-driven architecture for usage control in solid;analyzing the effect of taproot on bitcoin deanonymization;enhancing portfolio performance with crypto tokens: a correlation network analysis;execution and statistical arbitrage with signals in multiple automated market makers;and the more you know: energy labelling enables more sustainable cryptocurrency investments.
The proceedings contain 134 papers. The topics discussed include: TailGuard: tail latency SLO guaranteed task scheduling for data-intensive user-facing applications;smart contract parallel execution with fine-grained ...
ISBN:
(纸本)9798350339864
The proceedings contain 134 papers. The topics discussed include: TailGuard: tail latency SLO guaranteed task scheduling for data-intensive user-facing applications;smart contract parallel execution with fine-grained state accesses;DeAR: accelerating distributed deep learning with fine-grained all-reduce pipelining;a game of NFTs: characterizing NFT wash trading in the Ethereum blockchain;uncovering vulnerabilities in Wasm smart contracts;TransOff: towards fast transferable computation offloading in MEC via embedded reinforcement learning;FedDM: data and model heterogeneity-aware federated learning via dynamic weight sharing;state-aware unsafe driving action detection and defense;fair DNN model selection in edge AI via a cooperative game approach;and servo: increasing the scalability of modifiable virtual environments using serverless computing.
Byzantine fault detection (BFD) techniques are promising approaches for better scalability and practicality, even though they cannot mask Byzantine faults like Byzantine fault tolerance (BFT) techniques. However, the ...
详细信息
ISBN:
(纸本)9798350328127
Byzantine fault detection (BFD) techniques are promising approaches for better scalability and practicality, even though they cannot mask Byzantine faults like Byzantine fault tolerance (BFT) techniques. However, the existing BFD protocol for database systems has suffered from long latency since it synchronously makes an agreement on the order of transactions between replicas when executing the transactions. In this paper, we explore an alternative BFD approach for database systems, which defers the expensive agreement and detects Byzantine faults lazily rather than detecting them in real-time. We discuss the challenges and design overview of our approach. We also present preliminary experimental results showing the benefit of our approach.
Decentralization initiatives like Solid and *** enable data owners to control who has access to their data and to stimulate innovation by creating both application and data markets. Once data owners share their data w...
详细信息
ISBN:
(纸本)9798350328127
Decentralization initiatives like Solid and *** enable data owners to control who has access to their data and to stimulate innovation by creating both application and data markets. Once data owners share their data with others, though, it is no longer possible for them to control how their data are used. To address this issue, we propose a usage control architecture to monitor compliance with usage control policies. To this end, our solution relies on blockchain and trusted execution environments. We demonstrate the potential of the architecture by describing the various workflows needed to realize a motivating use case scenario for data markets. Additionally, we discuss the merits of the approach from privacy, security, integrateability, and affordability perspectives.
With the increasing time drivers spent behind the wheel, availability of accurate, reliable, and comprehensive information on real-time traffic conditions is becoming increasingly important for individual road users, ...
详细信息
ISBN:
(纸本)9798350328127
With the increasing time drivers spent behind the wheel, availability of accurate, reliable, and comprehensive information on real-time traffic conditions is becoming increasingly important for individual road users, industry, and traffic authorities. Due to a growing amount of traffic combined with insufficient transportation infrastructure, traffic congestion is one of the major challenges modern society has to face in urban areas. While this results in serious environmental issues such as pollution, congestions also have significant effects on drivers' stress levels, which further is an essential factor in driver behavior and road safety. In this paper, we analyze real-time traffic situations on a fine-granular level by computing the local congestion factor, which represents traffic conditions on currently traversed route segments. We show that travel time predictions for short- and mid-term routes provided by four major public traffic information providers can be used for computing congestion factors in real-time, which can then be used as input for driver-centric applications.
Bitcoin was released in 2008 as an electronic peer-to-peer payment system. The aim was to enable financial transactions in an anonymous manner between participating parties. However, Bitcoin is considered a pseudonymo...
详细信息
ISBN:
(纸本)9798350328127
Bitcoin was released in 2008 as an electronic peer-to-peer payment system. The aim was to enable financial transactions in an anonymous manner between participating parties. However, Bitcoin is considered a pseudonymous network rather than anonymous, as the identity of the address owner is unknown, but every transaction is permanently stored on the Bitcoin blockchain and can be tracked by anyone. The structure of the blockchain, its transactions, and the Bitcoin network make it possible to deanonymize pseudonyms through various methods such as flow analysis, heuristics, and network traffic observations. Once a connection is established between pseudonyms used in the Bitcoin network and the real world, all previous transactions can be attributed to that identity. In 2021, Taproot was introduced to further increase privacy within the Bitcoin Network by introducing a new address format which will allow transactions to be more indistinguishable from one another. In this paper, we analyze current methods for deanonymizing Bitcoin transactions to understand which parts of the Bitcoin protocol they exploit. In addition, we look at the changes introduced by Taproot and determine the extent to which these changes affect the methods and what assumptions must be made for these methods to remain applicable.
Location-based services are at the heart of many applications that individuals use every day. However, there is often no guarantee of the truthfulness of users' location data, since this information can be easily ...
详细信息
ISBN:
(纸本)9798350328127
Location-based services are at the heart of many applications that individuals use every day. However, there is often no guarantee of the truthfulness of users' location data, since this information can be easily spoofed without a proof mechanism. In distributed system applications, preventing users from submitting counterfeit locations becomes even more challenging because of the lack of a central authority that monitors data provenance. In this work, we propose a decentralized architecture based on blockchains and decentralized technologies, offering a transparent solution for Proof of Location (PoL). We specifically address two main challenges, i.e., the issuing process of the PoL and the proof verification. We describe a smart contract based implementation in Reach, a blockchain-agnostic smart contract language, and the tests we conducted on different blockchains, i.e. Ethereum, Polygon, and Algorand, measuring latency and costs due to the payment of fees. Results confirm the viability of the proposal.
We present our research project on distributed, agent-based control in dynamic environments. We motivate the usage of agents and their difficulties in dynamic environments like the Web, and relate this to the fields o...
详细信息
ISBN:
(纸本)9798350339864
We present our research project on distributed, agent-based control in dynamic environments. We motivate the usage of agents and their difficulties in dynamic environments like the Web, and relate this to the fields of distributed and agent-based systems. We describe our idea of lightweight strategies for agents to adapt behavior on disturbances without relying on centralized mechanisms, and outline objectives and challenges of our project. Finally, we explain our simulation experiments as research method, and discuss our initial results to design distributed, lightweight, scalable agents for dynamic environments.
With the rapid development of information technology, the ethical use of data and users' privacy has become a big concern. In European Union, the General Data Protection Regulation (GDPR) has been enforced since 2...
详细信息
ISBN:
(纸本)9798350339864
With the rapid development of information technology, the ethical use of data and users' privacy has become a big concern. In European Union, the General Data Protection Regulation (GDPR) has been enforced since 2018, aiming to protect a person's privacy. However, the growth of the data economy might be hindered due to the lack of a trusted, secure and privacy-aware tool. Motivated by this observation, this work presents DataVaults - a secure, distributed and privacy-preserving personal data management platform. The main goal is to mitigate various privacy concerns through allowing an individual to maintain the ownership, handle and share the data based on their willingness. The platform enables a flexible data sharing method with fair compensation schemes. In particular, with the DataVaults platform, an individual can protect the sharing of personal data and fairly define how value can be captured, created, released and cashed out for the benefit of all the stakeholders involved (companies or not).
暂无评论