The first step towards the information lifecycle management is to differentiate information by values. This paper presents an evaluation model for information value. The idea of the model is from commodity value disci...
详细信息
ISBN:
(纸本)9780769532639
The first step towards the information lifecycle management is to differentiate information by values. This paper presents an evaluation model for information value. The idea of the model is from commodity value discipline in economic area. The output of information value evaluation model is determined by information itself which is like commodity price is determined by use-value in economic area. The output of the model is changed around the real information value and controlled by the relationship between information supply and demand. The output of the model is determined by factors from three aspects that are information itself, information supply, and information demand. When applying the model into traditional information management approaches, such as replication, data migration, and backup, those mechanisms control the output of the model through adjusting the ability of information supply.
There has been significant progress in the development and deployment of peer-to-peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experien...
详细信息
ISBN:
(纸本)9781424432134
There has been significant progress in the development and deployment of peer-to-peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experiences in Anysee exhibit that existing systems are largely vulnerable to intermediate attacks, in which the content pollution is a common attack that can significantly reduce the content availability, and consequently impair the playback quality. This paper carries out a formal analysis of content pollution and discusses its implications in P2P live video streaming systems. Specifically, we establish a probabilistic model to capture the progress of content pollution. We verify the model using a real implementation based on Anysee system; we evaluate the content pollution effect through extensive simulations. We demonstrate that (1) the number of polluted peers can grow exponentially, similar to random scanning worms. This is vital that with 1% polluters, the overall system can be compromised within minutes; (2) the effective bandwidth utilization can be sharply decreased due to the transmission of polluted packets; (3) Augmenting the number of polluters does not imply a faster progress of content pollution, in which the most influential factors are the peer degree and access bandwidth. We further examine several techniques and demonstrate that a hash-based signature scheme can be effective against the content pollution, in particular when being used during the initial phase.
Peers in multiple P2P applications execute overlapped operations with different implementation, like neighbour management, resource publish/lookup, delay investigation, which leads to poor interoperability and unneces...
详细信息
Peers in multiple P2P applications execute overlapped operations with different implementation, like neighbour management, resource publish/lookup, delay investigation, which leads to poor interoperability and unnecessary network load. Peers contribute their resources only when they stay in same application. We propose a P2P middleware, called Ripple, to accomplish common functions in a layered architecture. Ripple manages all peers running various applications in a uniform substrate overlay network. The substrate overlay is designed with a hybrid topology. This hybrid topology does not aim at only a particular type of applications, but also enables the flexibility for various applications. Our work is an attempt to address common needs of P2P applications, which may simplify the development and improve the performance of P2P networks, as well as mitigate the sampling stress to physical networks.
As the world of gridcomputing is continuously growing, scalability and complexity of gridsystems are in an increasing rate. Moreover, gridsystems are dynamic and subject to various changes. Management of such chang...
详细信息
As the world of gridcomputing is continuously growing, scalability and complexity of gridsystems are in an increasing rate. Moreover, gridsystems are dynamic and subject to various changes. Management of such changes is a challenging issue facing grid communities. Namely, how to efficiently maintain gridsystem to adopt the environment modification, to meet the user demands and to manage the dynamic changes has become a big challenge. Manual- or script based maintenance approaches are tedious, time consuming and complex, in addition to being highly prone to errors. Therefore, state-of-the-art maintenance models are designed to support transparent runtime maintenance, fast and comprehensive respond to environmental changes and requirements, consequently, improve the availability and efficiency of the gridsystem. This paper focuses on investigating maintenance models and their common characteristics for grid. To this end, this paper surveys several representative grid maintenance model systems developed by various projects worldwide. The contributions of this paper are (i) discussing the motivations of maintenance for gridsystem, (ii) discussing the issues and the challenges in building maintenance mechanisms for gridsystem, (iii) reviewing maintenance models and compare their efficiencies for gridsystem, and (iv) discussing possible new directions.
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart o...
详细信息
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart of our mechanism is to migrate some shared files from the overloaded peers to the neighboring free riders automatically and transparently,which enforces free riders to offer services when altruistic peers are heavily *** migration is a key issue in our approach,and some related strategies are discussed.A simulation is designed to verify this approach,and the results show that it can not only alleviate free riding,but also improve the Quality of Service(QoS)and robustness of P2P networks efficiently.
Since the first report of free riding on Gnutella in 2000, large amounts of network measurement results show that free riding is prevalent in almost all Peer-to-Peer (P2P) networks, which reduces the robustness, avail...
详细信息
Since the first report of free riding on Gnutella in 2000, large amounts of network measurement results show that free riding is prevalent in almost all Peer-to-Peer (P2P) networks, which reduces the robustness, availability and lifetime of P2P networks. Overcoming free riding becomes a hot research issue both in academic and industrial communities. The traffic measurement mechanisms in P2P networks are overviewed, which include active measurement and passive measurement. Some detailed traffic measurement results of Gnutella overlay network are illustrated, which indicate the development of free riding in P2P network in recent 6 years. The modeling of P2P network is introduced, and the impacts to system performance of free riding are discussed. Moreover, the authors focus on the mechanisms avoiding free riding and categorize the proposed approaches into incentive mechanisms, game theoretical approaches, and social network or economic models based methods. Each category is discussed in detail, and some typical work is introduced. Especially, the features of these three categories of solutions are analyzed and compared from the aspect of engineering implementation, which is helpful to both the P2P software developers and academic researchers. Finally, future works about the mechanisms discouraging free riding in P2P networks are outlined.
In gridcomputing environment,grid users often *** the original user may be under the risk of information leakage and identity abused for sending his credential to remote computing *** grid security practice has few m...
详细信息
In gridcomputing environment,grid users often *** the original user may be under the risk of information leakage and identity abused for sending his credential to remote computing *** grid security practice has few means to enforce the security of credential *** computing (TC) technology can be added to gridcomputing environment to enhance the grid *** TC using an essential in-platform (trusted)third party,Trusted Platform Module (TPM),we can use TC to protect the user *** this paper we present credential migration management (CMM) system,which is a part of Daonity project,to manifest migrating credential in security between different computers with TPM.
In this short paper, we present our solution to index, store and retrieve the domain knowledge. The main principle exploits Lucene to index the domain knowledge under guide of the domain schema. The method to map doma...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this short paper, we present our solution to index, store and retrieve the domain knowledge. The main principle exploits Lucene to index the domain knowledge under guide of the domain schema. The method to map domain knowledge structure into Lucene index structure, store and update the indices, and to transfer RDF-based query into Lucene's query are presented. Copyright 2007 ACM.
P2P technology has been widely adopted in live streaming system for its scalability and low commercial cost. However, tree based system or mesh based system still has to face the constraint or tradeoff caused by its s...
详细信息
grid workflow is a complex and typical grid application, but owing to the highly dynamic feature of grid environments, resource unavailability is increasingly becoming severe and poses great challenges to grid workflo...
详细信息
ISBN:
(纸本)9781595937575
grid workflow is a complex and typical grid application, but owing to the highly dynamic feature of grid environments, resource unavailability is increasingly becoming severe and poses great challenges to grid workflow scheduling. Though fault recovery mechanism adopted in gridsystem guarantee the completion of jobs to some extent, but wasting system resources. To overcome the shortcoming, this paper proposes a Markov Chain based grid node availability prediction model which can efficiently predict grid nodes' availability in the future without adding significant overhead. Based on this model, the paper presents a grid workflow scheduling based on reliability cost (RCGS). The performance evaluation results demonstrate that RCGS improves the dependability of workflow execution and success ratio of tasks with low reliability cost.
暂无评论