211 results on '"Decentralized computing"'
Search Results
2. DCPMS: A Large-Scale Raster Layer Serving Method for Custom Online Calculation and Rendering.
- Author
-
Yang, Anbang, Zhang, Feng, Feng, Jie, Wang, Luoqi, Yue, Enjiang, Fan, Xinhua, Zhang, Jingyi, Hu, Linshu, and Wu, Sensen
- Subjects
- *
DATA warehousing , *DATA mapping , *SPATIAL resolution , *TILES , *INTERNET - Abstract
Raster data represent one of the fundamental data formats utilized in GIS. As the technology used to observe the Earth continues to evolve, the spatial and temporal resolution of raster data is becoming increasingly refined, while the data scale is expanding. One of the key issues in the development of GIS technology is to determine how to make large-scale raster data better to provide computation, visualization, and analysis services in the Internet environment. This paper proposes a decentralized COG-pyramid-based map service method (DCPMS). In comparison to traditional raster data online service technology, such as GIS servers and static tiles, DCPMS employs virtual mapping to reduce data storage costs and combines tile technology with a cloud-native storage scheme to enhance the concurrency of supportable requests. Furthermore, the band calculation process is shifted to the client, thereby effectively resolving the issue of efficient customized band calculation and data rendering in the context of a large-scale raster data online service. The results indicate DCPMS delivers commendable performance. Its decentralized architecture significantly enhances performance in high concurrency scenarios. With a thousand concurrent requests, the response time of DCPMS is reduced by 74% compared to the GIS server. Moreover, this service exhibits considerable strengths in data preprocessing and storage, suggesting a novel pathway for future technical improvement of large-scale raster data map services. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Decentralized Algorithms for Efficient Energy Management over Cloud-Edge Infrastructures
- Author
-
Karras, Aristeidis, Karras, Christos, Giannoukou, Ioanna, Giotopoulos, Konstantinos C., Tsolis, Dimitrios, Karydis, Ioannis, Sioutas, Spyros, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Chatzigiannakis, Ioannis, editor, and Karydis, Ioannis, editor
- Published
- 2024
- Full Text
- View/download PDF
4. Towards Continuous Development for Quantum Programming in Decentralized IoT environments.
- Author
-
Kourtis, Michail Alexandros, Tcholtchev, Nikolay, Gheorghe-Pop, Ilie-Daniel, Becker, Colin Kai-Uwe, Xylouris, Georgios, Markakis, Evangelos, Petric, Matic, Seidel, Raphael, and Bock, Sebastian
- Subjects
QUANTUM computing ,SERVICE level agreements ,PROCESS capability ,INTERNET of things ,QUANTUM computers - Abstract
The progression in quantum computing and the rapid development of quantum computation hardware has raised expectations for its application to commercially relevant use cases in the future. However, the need for high-level quantum programming abstractions and targeted use cases paired with vertical applications, which can directly benefit from quantum computing, remains an open challenge. This paper presents our vision for a decentralized architecture for swarm based IoT systems that leverages a high-level continuous development and integration quantum programming suite to support edge processing capabilities for different use cases across the edge-fog-cloud continuum. The planned Quantum DevKit provides the necessary abstractions and low-level backend interfaces for quantum computing infrastructure, enabling edge computation using quantum processing, with extensions to efficient management of Service Level Agreements (SLAs). The paper focuses on the presentation of the development kit and its coupling swarm-based architecture that automates the orchestration of the cloud-to-edge continuum, showcasing the potential of quantum technology in edge processing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. The Multi-Agent Programming Contest 2022
- Author
-
Ahlbrecht, Tobias, Dix, Jürgen, Fiekas, Niklas, Krausburg, Tabajara, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ahlbrecht, Tobias, editor, Dix, Jürgen, editor, Fiekas, Niklas, editor, and Krausburg, Tabajara, editor
- Published
- 2023
- Full Text
- View/download PDF
6. Research on Network Security Situation Assessment Model in Decentralized Computing Environment
- Author
-
Zhu Ye
- Subjects
decentralized computing ,authentication ,hierarchical analysis ,task assignment ,network security posture ,00a71 ,Mathematics ,QA1-939 - Abstract
In this paper, decentralized computing is used as an entry point to review the latest research results on network security issues through two methods, namely task assignment and hierarchical analysis, and construct a network security posture assessment model based on decentralized computing. A control framework is constructed by utilizing the functional complementarity of continuous authentication and security threat assessment in order to facilitate real-time observation of the security situation of the network and timely elimination of malicious nodes. A quantitative network security threat posture assessment model is constructed through hierarchical analysis to observe the extent of the breach of confidentiality and integrity of network information based on the security threat posture index. The effectiveness of the network security posture assessment model and method proposed in this paper was verified by empirical analysis in a simulated environment. The results show that after the simulated attack lasts for 12 minutes, the network security risk index measured by the assessment model in the test cascade case becomes larger with the intensification of the network attack, and the risk index value is up to 5.5. In summary, the network security posture assessment model based on decentralized computing designed in this paper can quickly reflect the changes in the security status of the underlying network and provide administrators with the current security status of the network in a macroscopic way.
- Published
- 2024
- Full Text
- View/download PDF
7. Decentralized learning over a network with Nyström approximation using SGD.
- Author
-
Lian, Heng and Liu, Jiamin
- Subjects
- *
HILBERT space , *TELECOMMUNICATION employees , *SUPERVISED learning , *NONPARAMETRIC estimation , *MACHINE-to-machine communications - Abstract
Nowadays we often meet with a learning problem when data are distributed on different machines connected via a network, instead of stored centrally. Here we consider decentralized supervised learning in a reproducing kernel Hilbert space. We note that standard gradient descent in a reproducing kernel Hilbert space is difficult to implement with multiple communications between worker machines. On the other hand, the Nyström approximation using gradient descent is more suited for the decentralized setting since only a small number of data points need to be shared at the beginning of the algorithm. In the setting of decentralized distributed learning in a reproducing kernel Hilbert space, we establish the optimal learning rate of stochastic gradient descent based on mini-batches, allowing multiple passes over the data set. The proposal provides a scalable approach to nonparametric estimation combining gradient method, distributed estimation, and random projection. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Towards Efficient and Trustworthy Pandemic Diagnosis in Smart Cities: A Blockchain-Based Federated Learning Approach.
- Author
-
Abdel-Basset, Mohamed, Alrashdi, Ibrahim, Hawash, Hossam, Sallam, Karam, and Hameed, Ibrahim A.
- Subjects
- *
SMART cities , *TRUST , *DATA privacy , *COVID-19 pandemic , *PANDEMICS - Abstract
In the aftermath of the COVID-19 pandemic, the need for efficient and reliable disease diagnosis in smart cities has become increasingly serious. In this study, we introduce a novel blockchain-based federated learning framework tailored specifically for the diagnosis of pandemic diseases in smart cities, called BFLPD, with a focus on COVID-19 as a case study. The proposed BFLPD takes advantage of the decentralized nature of blockchain technology to design collaborative intelligence for automated diagnosis without violating trustworthiness metrics, such as privacy, security, and data sharing, which are encountered in healthcare systems of smart cities. Cheon–Kim–Kim–Song (CKKS) encryption is intelligently redesigned in BFLPD to ensure the secure sharing of learning updates during the training process. The proposed BFLPD presents a decentralized secure aggregation method that safeguards the integrity of the global model against adversarial attacks, thereby improving the overall efficiency and trustworthiness of our system. Extensive experiments and evaluations using a case study of COVID-19 ultrasound data demonstrate that BFLPD can reliably improve diagnostic accuracy while preserving data privacy, making it a promising tool with which smart cities can enhance their pandemic disease diagnosis capabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Adoption of Blockchain Technology in the Indian Business Market: Obstacles and Opportunities
- Author
-
Litoriya, Ratnesh, Arora, Abhishek, Bajaj, Raddhant, Gulati, Abhik, Chlamtac, Imrich, Series Editor, Misra, Sanjay, editor, and Kumar Tyagi, Amit, editor
- Published
- 2022
- Full Text
- View/download PDF
10. Research on Dynamic Simulation Modeling of Chemical Industry Based on Edge Algorithm
- Author
-
Pengpeng, Liu, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Tian, Yuan, editor, Ma, Tinghuai, editor, Khan, Muhammad Khurram, editor, Sheng, Victor S., editor, and Pan, Zhaoqing, editor
- Published
- 2022
- Full Text
- View/download PDF
11. The 15th Multi-Agent Programming Contest : Assemble with Care
- Author
-
Ahlbrecht, Tobias, Dix, Jürgen, Fiekas, Niklas, Krausburg, Tabajara, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ahlbrecht, Tobias, editor, Dix, Jürgen, editor, Fiekas, Niklas, editor, and Krausburg, Tabajara, editor
- Published
- 2021
- Full Text
- View/download PDF
12. Blockchain Technology and Its Implementation Challenges with IoT for Healthcare Industries
- Author
-
Mourya, Ashish Kumar, Alankar, Bhavya, Kaur, Harleen, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Das, Swagatam, editor, and Mohanty, Mihir Narayan, editor
- Published
- 2021
- Full Text
- View/download PDF
13. p2pGNN: A Decentralized Graph Neural Network for Node Classification in Peer-to-Peer Networks
- Author
-
Emmanouil Krasanakis, Symeon Papadopoulos, and Ioannis Kompatsiaris
- Subjects
Decentralized computing ,machine learning ,network theory (graphs) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this work, we aim to classify nodes of unstructured peer-to-peer networks with communication uncertainty, such as users of decentralized social networks. Graph Neural Networks (GNNs) are known to improve the accuracy of simple classifiers in centralized settings by leveraging naturally occurring network links, but graph convolutional layers are challenging to implement in decentralized settings when node neighbors are not constantly available. We address this problem by employing decoupled GNNs, where base classifier predictions and errors are diffused through graphs after training. For these, we deploy pre-trained and gossip-trained base classifiers and implement peer-to-peer graph diffusion under communication uncertainty. In particular, we develop an asynchronous decentralized formulation of diffusion that converges to centralized predictions in distribution and linearly with respect to communication rates. We experiment on three real-world graphs with node features and labels and simulate peer-to-peer networks with uniformly random communication frequencies; given a portion of known labels, our decentralized graph diffusion achieves comparable accuracy to centralized GNNs with minimal communication overhead (less than 3% of what gossip training already adds).
- Published
- 2022
- Full Text
- View/download PDF
14. To Centralize or Decentralize: What is the Question? An Application to Digital Payments
- Author
-
Berndsen, Ron, Wandhöfer, Ruth, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Strous, Leon, editor, Johnson, Roger, editor, Grier, David Alan, editor, and Swade, Doron, editor
- Published
- 2020
- Full Text
- View/download PDF
15. Decentralized Expectation Maximization Algorithm
- Author
-
Jin, Honghe, Sun, Xiaoxiao, Xu, Liwen, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Qiu, Meikang, editor
- Published
- 2020
- Full Text
- View/download PDF
16. The Multi-Agent Programming Contest: A Résumé : Comparing Agent Systems 2005–2019
- Author
-
Ahlbrecht, Tobias, Dix, Jürgen, Fiekas, Niklas, Krausburg, Tabajara, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ahlbrecht, Tobias, editor, Dix, Jürgen, editor, Fiekas, Niklas, editor, and Krausburg, Tabajara, editor
- Published
- 2020
- Full Text
- View/download PDF
17. Distributed IoT and Applications: A Survey
- Author
-
Jennath, H. S., Adarsh, S., Anoop, V. S., Kacprzyk, Janusz, Series Editor, Krishna, A.N., editor, Srikantaiah, K.C., editor, and Naveena, C, editor
- Published
- 2019
- Full Text
- View/download PDF
18. Communication-Efficient Decentralized Cooperative Data Analytics in Sensor Networks
- Author
-
Zhao, Liang, Li, Zhihua, Guo, Shujie, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Meng, Limin, editor, and Zhang, Yan, editor
- Published
- 2018
- Full Text
- View/download PDF
19. AgriOnBlock: Secured data harvesting for agriculture sector using blockchain technology
- Author
-
Bela Shrimali and Hiren Patel
- Subjects
Crop insurance ,Immutability ,Supply chain management ,Traceability ,Computer Networks and Communications ,business.industry ,Environmental economics ,Transparency (behavior) ,Decentralized computing ,Artificial Intelligence ,Hardware and Architecture ,Agriculture ,Profitability index ,Business ,Software ,Information Systems - Abstract
The existing agriculture system is having several components such as supply chain management, crop insurance, the shipment of goods, and it involves numerous untrusted stakeholders such as users (farmers, retailers, customers, wholesalers, etc.), agencies (bank, insurance company) and regulators (assessor, surveyors). Due to the active engrossment of the middle man (mostly human beings or agencies operated by human beings) some key issues are raised such as transparency, timeliness, traceability, security, and immutability resulting in financial loss, crop contamination, and spoilage. Secure distributed public ledger technology and decentralized computing paradigm make Blockchain an appropriate alternative to resolve these issues and to achieve profitability & trust for all its stakeholders. In this research, we intend to propose a Blockchain-based mechanism viz. AgriOnBlock which would address the issues mentioned in the agriculture sector by connecting various stakeholders through the usage of IoT devices and smart contracts in Ethereum. We further discuss implications, constraints (methodological, awareness related, regulatory, etc.), and potential for actual adoption of AgriOnBlock.
- Published
- 2023
- Full Text
- View/download PDF
20. 一种面向陆地碳循环模型服务的去中心化计算方法.
- Author
-
何元庆, 陈旻, 乐松山, 黄丙湖, 宋杰, 马载阳, and 王进
- Subjects
- *
SPEED limits , *DISTRIBUTED computing , *WEB services , *CARBON cycle , *VIRTUAL reality , *TRANSIT-oriented development , *SIMULATION methods & models - Abstract
Geographic modeling and simulation is an important method for solving environmental issues and providing decision - making. Recently, research related to geographic modeling and simulation in an open web environment is mainly focused on model service sharing, while the calculation speed of model has been less studied. The terrestrial carbon cycle model plays a key role in the simulation of carbon cycle, service - oriented sharing has promoted it's development, but the time - consuming calculation speed limits their widespread applications. The large amount of calculation of terrestrial carbon cycle model results in a large amount of time to obtain the output. Currently, the model sharing strategies have not employed effective ways to improve the calculation performance of terrestrial carbon cycle models. A service-oriented decentralized computing method is proposed to speed up the calculation of these models. The main idea of this method is adding computing nodes to alleviate the pressure of the calculation of the terrestrial carbon cycle model based on the existing model sharing strategies. First, the terrestrial carbon cycle models are published as model services in the open web environment. Then, a task segmentation and dispatch strategy is designed to break the complex computing tasks into small steps and dispatch them to different computing nodes for distributed calculation. The study case of three typical terrestrial carbon cycle models show the feasibility and practicability of the proposed method and it can be used to improve the calculation speed of the terrestrial carbon cycle model. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. Implementing healthcare services on a large scale: Challenges and remedies based on blockchain technology.
- Author
-
Pandey, Prateek and Litoriya, Ratnesh
- Abstract
• A technology-intervening solution for implementing health care policies in India. • Discussion of socio-technical hurdles in health policy implementation. • Menace of corruption in health insurance sector is a prominent problem that costs billions to the insurance industry. • Blockchain technology is not a panacea but offers a reliable and efficient solution to cope up with the problems in healthcare ecosystem. The accessibility of electronic healthcare data is necessary for effective treatment, policy decisions, and healthcare information exchange. Due to the intangibility of digital data, healthcare information is also prone to privacy-breach and security attacks. Further, the importance of immutability and privacy of healthcare data becomes colossal when a nationwide healthcare and wellness scheme is planned to be implemented. Providing quality healthcare services to such an enormous population size is challenging and requires proper technological infrastructure. The cooperation from the society is equally important to lay such a copious architecture on which the healthcare services should seamlessly run. To assess the social and technical challenges that lie ahead in implementing large-scale comprehensive healthcare services and suggest a technology-intervening solution to serve the society at large. This study considers India's National Health Policy (2017) initiatives. The social and technical hurdles in implementation of the schemes are discussed, and AarogyaChain, a Blockchain technology-based solution is proposed to eliminate the health policy implementation hiccups. We find that the scalability is a primary concern in implementing healthcare services on blockchain at such a large scale. We experimented by creating a blockchain and found that the system throughput is a function of the number of special nodes called ordering nodes, and a trade-off is required to balance between time-to-commit and system's fault tolerance. Blockchain provides a secure and transparent system of integrated healthcare services that keeps patients at the center and provides for corruption intolerant and efficient implementation of nationwide health-insurance programs. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. Co-Utile protocols for decentralized computing
- Author
-
Departament d'Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili., Manjón Paniagua, Jesús Alberto, Departament d'Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili., and Manjón Paniagua, Jesús Alberto
- Published
- 2023
23. Federated Fuzzy Clustering for Decentralized Incomplete Longitudinal Behavioral Data.
- Author
-
Ngo H, Fang H, Rumbut J, and Wang H
- Abstract
The use of medical data for machine learning, including unsupervised methods such as clustering, is often restricted by privacy regulations such as the Health Insurance Portability and Accountability Act (HIPAA). Medical data is sensitive and highly regulated and anonymization is often insufficient to protect a patient's identity. Traditional clustering algorithms are also unsuitable for longitudinal behavioral health trials, which often have missing data and observe individual behaviors over varying time periods. In this work, we develop a new decentralized federated multiple imputation-based fuzzy clustering algorithm for complex longitudinal behavioral trial data collected from multisite randomized controlled trials over different time periods. Federated learning (FL) preserves privacy by aggregating model parameters instead of data. Unlike previous FL methods, this proposed algorithm requires only two rounds of communication and handles clients with varying numbers of time points for incomplete longitudinal data. The model is evaluated on both empirical longitudinal dietary health data and simulated clusters with different numbers of clients, effect sizes, correlations, and sample sizes. The proposed algorithm converges rapidly and achieves desirable performance on multiple clustering metrics. This new method allows for targeted treatments for various patient groups while preserving their data privacy and enables the potential for broader applications in the Internet of Medical Things.
- Published
- 2024
- Full Text
- View/download PDF
24. A decentralized paradigm for resource-aware computing in wireless Ad hoc networks.
- Author
-
Banerjee, Heerok, Murugaanandam, S., and Ganapathy, V.
- Subjects
- *
AD hoc computer networks , *COMPUTER network security , *GRID computing , *NETWORK performance , *COMPUTER network architectures - Abstract
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacycritical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. UAS Path Planning for Dynamical Wildfire Monitoring with Uneven Importance
- Author
-
Islam, S M Towhidul
- Subjects
- UAS Path Planning, Wildfire Monitoring, Dynamic Perimeter Surveillance, Decentralized Computing, Simulation
- Abstract
Unmanned Aircraft Systems (UASs) offer many benefits in wildfire monitoring when compared to traditional wildfire monitoring technologies. When planning the path of an UAS for wildfire monitoring, it is important to consider the uneven propagation nature of the wildfire because different parts of the fire boundary demand different levels of monitoring attention (importance) based on the propagation speed. In addition, many of the existing works adopt a centralized approach for the path planning of the UASs. However, the use of centralized approaches is often limited in terms of applicability and adaptability. This work focuses on developing decentralized UAS path planning algorithms to autonomously monitor a spreading wildfire considering uneven importance. The algorithms allow the UASs to focus on the most active regions of a wildfire while still covering the entire fire perimeter. When monitoring a relatively smaller and spatially static fire, a single UAS might be adequate for the task. However, when monitoring a larger wildfire that is evolving dynamically in space and time, efficient and optimized use of multiple UASs is required. Based on this need, we also focus on decentralized and importance-based multi-UAS path planning for wildfire monitoring. The design, implementation, analysis, and simulation results have been discussed in details for both single-UAS and multi-UAS path planning algorithms. Experiment results show the effectiveness and robustness of the proposed algorithms for dynamic wildfire monitoring.
- Published
- 2023
26. A Blockchain-Based Decentralized Framework for Fair Data Processing
- Author
-
Guangcheng Li, Kan Xie, Yu Wang, Li Feng, Tie Qiu, and Qinglin Zhao
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Process (engineering) ,Distributed computing ,Throughput ,Computer Science Applications ,Task (computing) ,Decentralized computing ,Resource (project management) ,Control and Systems Engineering ,Task analysis ,Data center ,business ,Private network - Abstract
The blockchain has been considered as a new decentralized computing paradigm that has great potential to meet various computing needs. Considering a private network (such as data center) where incentive mechanisms are not required, this paper innovatively remolds the transaction-recording blockchain for decentralized data processing. In our design, workers have different processing capacity and tasks have different resource requirements. Workers first get task information from the blockchain and then process tasks locally, and next perform the proof of useful work (PoUW) consensus to compete for a scheduler, according to the number of the consumed CPU instructions in data processing. The scheduler is responsible for dispatching task information to the blockchain. A salient feature of our decentralized data processing is that workers actively select tasks, instead of passively receiving tasks as in a centralized framework. This will lead to collisions (i.e., multiple workers select the same task). To alleviate the collisions and provide the max-min fairness of data-processing, we propose a modified fair queue (called M-FQ) algorithm for the scheduler, as well as a fair task selection with collision avoidance (called Fair-CA) scheme for workers. Extensive simulations verify that our framework can well balance the fairness and the collision, while achieving as high throughput and good fairness as centralized frameworks. This study is the first attempt toward designing a general decentralized computing framework.
- Published
- 2021
- Full Text
- View/download PDF
27. DDLPF: A Practical Decentralized Deep Learning Paradigm for Internet-of-Things Applications
- Author
-
Yifu Wu, Gihan J. Mendis, and Jin Wei
- Subjects
Computer Networks and Communications ,Process (engineering) ,business.industry ,Computer science ,Deep learning ,Distributed computing ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Metalearning ,Computer Science Applications ,Data modeling ,Decentralized computing ,Hardware and Architecture ,Server ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,Centralized computing ,business ,0105 earth and related environmental sciences ,Information Systems - Abstract
In recent years, it has been observed the exponential growth of the Internet of Things (IoT) in different application fields, such as manufacturing and energy industry. To effectively fuse and process the tremendous amount of IoT sensing data timely, there is an urgent need to shift from a conventional centralized computing to a decentralized computing. However, there remain some essential technical challenges to develop effective decentralized computing methods in the context of IoT applications, including 1) the timely response, sufficient privacy preservation, and high security are normally required in IoT-related applications and 2) the biases and non-independent identically distributed (IID) properties potentially presented in the IoT sensing data. To address these challenges, in this article, we propose a decentralized deep learning paradigm with privacy-preservation and fast few-shot learning (DDLPF) by exploiting federated learning, metalearning, and blockchain techniques. In the simulation section, we evaluate the performance of our proposed DDLPF paradigm in different scenarios and compare it with other existing techniques.
- Published
- 2021
- Full Text
- View/download PDF
28. Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach
- Author
-
Jianqiang Li, Qiuzhen Lin, Ying He, Yuhang Wang, Chao Qiu, and Zhong Ming
- Subjects
Smart contract ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,020302 automobile design & engineering ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer Science Applications ,Decentralized computing ,0203 mechanical engineering ,Hardware and Architecture ,Asynchronous communication ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Resource allocation ,Reinforcement learning ,Resource allocation (computer) ,business ,Edge computing ,Information Systems - Abstract
With the exponential growth in the number of Internet-of-Things (IoT) devices, the cloud-centric computing paradigm can hardly meet the increasingly high requirements for low latency, high bandwidth, ease of availability, and more intelligent services. Therefore, a distributed and decentralized computing architecture is imperative, where edge-centric computing, such as fog computing and mist computing, has been recently proposed. Edge-centric computing resources can be managed locally and personally rather than being administered by a remote centralized third party. However, security and privacy issues are the main challenges due to the absence of trust between the IoT devices and edge computing nodes (ECNs). A blockchain, as a decentralized, trustless, and immutable public ledger, can well solve the trust-absence issue. In this article, we first elaborate on the security and privacy issues of edge-computing-enabled IoT, and then present the key characteristics of blockchains, which make blockchains well suited for the edge-centric IoT scenarios. Furthermore, we propose a general framework for blockchain-based edge-computing-enabled IoT scenarios that specifies the step-by-step procedure of a single transaction between an IoT end and an ECN. In addition, we design a smart contract within a private blockchain network that exploits the state-of-the-art machine learning algorithm, asynchronous advantage actor–critic (A3C), to allocate the edge computing resources, which exemplifies how artificial intelligence (AI) can be combined with blockchains. We further discuss the benefits of the convergence of AI and blockchains. Finally, simulation results are presented.
- Published
- 2021
- Full Text
- View/download PDF
29. Framing Artificial Intelligence (AI) Additive Manufacturing (AM)
- Author
-
Bianca Tonino-Heiden, Volodymyr Alieksieiev, Matthias Volk, and Bernhard Heiden
- Subjects
Decentralized computing ,Computer science ,Process (engineering) ,Framing (World Wide Web) ,Scalability ,General Earth and Planetary Sciences ,Production (economics) ,Applications of artificial intelligence ,Industrial engineering ,Field (computer science) ,General Environmental Science - Abstract
Nowadays AM is a rapidly growing and emerging discipline in manufacturing, as well as AI is in informational applications. Both are related to logistical and self-referential/-copying concepts which make them scalable. What is in AM osmotic mass production spreading is in AI-related Cyber-Physical Systems (CPS) the osmotic computational approach. AI-AM self-propagatedly framed is itself an emerging field, which can be logically or systematically unified. The paper investigates firstly recent developments in the field of the AM process flow and how it is related to AI applications. The result is a list of logistical, organisational, and industrial process steps as well as modern and future AI-AM applications. The extended approach then gives prospect to a meta-perspectively embedded osmotic decentralized computing, as well as an osmotic manufacturing paradigm, which utilizes glocal functions, concerning local production as well as global distributed material and information transport nets and their connection graphs.
- Published
- 2021
- Full Text
- View/download PDF
30. Cloud Computing Vs Fog Computing: A Comparative Study
- Author
-
Niraj Singhal and Aviral Kumar Singhal
- Subjects
Flexibility (engineering) ,Decentralized computing ,Computer science ,Analytics ,business.industry ,Distributed computing ,Reliability (computer networking) ,Bandwidth (computing) ,Cloud computing ,Enhanced Data Rates for GSM Evolution ,Business agility ,business ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Fog computing (or fogging) is extending cloud computing to the edge of the network. It describes a decentralized computing structure located between the cloud and devices that produce data. Operations like computing, storing and networking between end devices and data centers of cloud computing are facilitated by Fog computing. Decentralization and flexibility are the main difference between Fog computing and Cloud computing. Advantages of Fog computing include, minimize latency, conserve network bandwidth, reduce operating costs, enhance security, improve reliability, deepen insights and boost business agility. Various applications of Fog computing are, smart cities and smart electric grids, smart transportation networks, connected cars, real-time analytics etc. Here, this paper presents a comparative study of Cloud computing and Fog computing.
- Published
- 2021
- Full Text
- View/download PDF
31. Decentralized Computing
- Author
-
Terence Kelly
- Subjects
General Computer Science ,SIMPLE (military communications protocol) ,Computer science ,Wireless network ,business.industry ,Computation ,Distributed computing ,02 engineering and technology ,Solver ,Decentralized computing ,Software ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,Protocol (object-oriented programming) ,Pencil (mathematics) - Abstract
Feeding all relevant inputs to a central solver is the obvious way to tackle a problem, but it's not always the only way. Decentralized methods that make do with only local communication and local computation are sometimes the best way. This episode of Drill Bits reviews an elegant protocol for self-organizing wireless networks that can also solve a seemingly impossible social networking problem. The protocol preserves privacy among participants and is so simple that it can be implemented with pencil, paper, and postcards. Example software implements both the decentralized protocol and a centralized solver.
- Published
- 2020
- Full Text
- View/download PDF
32. Edge Computing-Empowered Large-Scale Traffic Data Recovery Leveraging Low-Rank Theory
- Author
-
Dongyu Lu, Fan Wu, Xiaochen Fan, Chaocan Xiang, Panlong Yang, Zhao Zhang, and Yuben Qu
- Subjects
050210 logistics & transportation ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,05 social sciences ,020206 networking & telecommunications ,02 engineering and technology ,Missing data ,Computer Science Applications ,Data recovery ,Decentralized computing ,Control and Systems Engineering ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Leverage (statistics) ,Minification ,Enhanced Data Rates for GSM Evolution ,business ,Intelligent transportation system ,Edge computing - Abstract
Intelligent Transportation Systems (ITSs) have been widely deployed to provide traffic sensing data for a variety of smart traffic applications. However, the inevitable and ubiquitous missing data potentially compromises the performance of ITSs and even undermines the traffic applications. Therefore, accurate and real-time traffic data recovery is crucial to ITSs and its related services, especially for large-scale traffic networks. To leverage the characteristics in transportation networks for data recovery, we first conduct experimental explorations on a large-scale traffic dataset of an ITS and further quantify the spatiotemporal correlations of traffic data. Inspired by the observation results, we propose GTR , an edGe computing-empowered system for large-scale Traffic data recovery with low-Rank theory. GTR leverages the decentralized computing power of edge nodes to process massive traffic data from hundreds of traffic stations for accurate and real-time recovery. Specifically, we first propose a suboptimal edge node deployment algorithm with a theoretical performance guarantee, by exploiting the supermodularity in the NP-hard joint-optimization problem. Furthermore, to leverage the low-rank nature of traffic data, we transform the data recovery problem into a low-rank minimization problem, then utilize the fixed-point continuation iterative scheme to capture spatiotemporal correlations for accurate traffic recovery. Finally, the extensive trace-driven evaluations show that GTR only needs at most 5.7% extra total cost compared to the optimal deployment, while outperforming four baseline methods by 63.8% improvement in terms of traffic data recovery accuracy.
- Published
- 2020
- Full Text
- View/download PDF
33. p2pGNN: A Decentralized Graph Neural Network for Node Classification in Peer-to-Peer Networks
- Author
-
Symeon Papadopoulos, Emmanouil Krasanakis, and Ioannis (Yiannis) Kompatsiaris
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,General Computer Science ,Decentralized computing ,Machine learning ,General Engineering ,General Materials Science ,Computer Science - Social and Information Networks ,Network theory (graphs) ,Machine Learning (cs.LG) - Abstract
In this work, we aim to classify nodes of unstructured peer-to-peer networks with communication uncertainty, such as users of decentralized social networks. Graph Neural Networks (GNNs) are known to improve the accuracy of simple classifiers in centralized settings by leveraging naturally occurring network links, but graph convolutional layers are challenging to implement in decentralized settings when node neighbors are not constantly available. We address this problem by employing decoupled GNNs, where base classifier predictions and errors are diffused through graphs after training. For these, we deploy pre-trained and gossip-trained base classifiers and implement peer-to-peer graph diffusion under communication uncertainty. In particular, we develop an asynchronous decentralized formulation of diffusion that converges to centralized predictions in distribution and linearly with respect to communication rates. We experiment on three real-world graphs with node features and labels and simulate peer-to-peer networks with uniformly random communication frequencies; given a portion of known labels, our decentralized graph diffusion achieves comparable accuracy to centralized GNNs with minimal communication overhead (less than 3% of what gossip training already adds)., 12 pages, 4 figures, 2 tables, accepted manuscript, IEEE Access
- Published
- 2021
34. Smart Contracts and NFTs: Non-Fungible Tokens as a Core Component of Blockchain to Be Used as Collectibles
- Author
-
Kanisk, Shailender Kumar, and Akash Arora
- Subjects
Decentralized computing ,Cryptocurrency ,Blockchain ,Smart contract ,Scripting language ,Computer science ,Interface (Java) ,Use case ,computer.software_genre ,Computer security ,Security token ,computer - Abstract
Non-fungible tokens are one of the most important future application domains for smart contracts. Ethereum is the pioneer of a blockchain-based decentralized computing platform that has ultimately standardized these types of tokens into a well-defined interface, now known as ERC-721. Blockchain-based cryptocurrencies have received extensive attention recently. Massive data has been stored on permissionless blockchains. This paper aims to analyze blockchain and cryptocurrencies’ technical underpinnings, specifically non-fungible tokens or “crypto-collectibles,” with the help of a blockchain-based image matching game. While outlining the theoretical implications and use cases of NFTs, this paper also gives a glimpse into their possible use in the domain of human user verification to prevent misuse of public data by automated scripts. This demonstrates the interaction of the ERC-721 token with the Ethereum-based decentralized application. Further, we aim to reach a definitive conclusion on the benefits and challenges of NFTs and thus reach a solution that would be beneficial to both researchers and practitioners.
- Published
- 2021
- Full Text
- View/download PDF
35. DRLAS: Digital Record Keeping in Land Administration System Relying on Blockchain
- Author
-
M. Shamim Kaiser, Milon Biswas, and Tajim Md. Niamat Ullah Akhund
- Subjects
Record keeping ,Decentralized computing ,Blockchain ,Work (electrical) ,Smart contract ,Computer science ,Ledger ,Land administration ,Computer security ,computer.software_genre ,Monopoly ,computer - Abstract
On every developed or developing world, the Land Administration System (LAS) is a salient infrastructure. Both the digital (traditional database system) and the manual methods are applied in the LAS (paper-based documentations). Both of these systems provide an authority with monopoly power that can increase unethical conduct in land administration. Again, while the Blockchain technology was initially used to maintain a financial ledger, it is possible to expand the use of this technology to incorporate any decentralized computing structures, including the automated record keeping and management framework. Recent studies have found that the new and largely untested applications of Blockchain technology in land administration remain. In this work, the implementation of a blockchain-based system is proposed to build a System for Land Administration. In the Ethereum blockchain platform, the proposed framework was simulated and showed that the framework contributed to developing a stable, secure, effective and efficient system of land administration.
- Published
- 2021
- Full Text
- View/download PDF
36. Enhancing Performance of Cloud: Fog Computing Architecture, Challenges and Open Issues
- Author
-
Meena Rani, Kalpna Guleria, and Surya Narayan Panda
- Subjects
Structure (mathematical logic) ,Market research ,Decentralized computing ,business.industry ,Computer science ,Situated ,Key (cryptography) ,Cloud computing ,Architecture ,business ,Data science ,Edge computing ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Fog computing also referred as “fogging” or “fog networking” through which a decentralized computing structure is explained that is situated among the data producing devices as well as cloud. In logical locations, users are enabled for placing resources that include data as well as applications produced by them, with such flexible structure for enhancing the performance. The fog computing involves edge computing, cloud's power as well as various services which are brought closer to location where data is produced as well as processed. The terms edge computing and fog computing is utilized by various peoples interchangeably, as the primary aim of both technologies involves bringing intelligence as well as processing closer wherein data is developed. Generally, it is performed for enhancing efficiency, however, it can also be performed for compliance and security reasons. This paper explores the different concepts involved in fog computing, importance of fog computing and highlights various opportunities in the fog computing area. Paper also presents the key points that why this technology needs to be successful. Finally, it addresses various issues, challenges in fog computing that it should deal with.
- Published
- 2021
- Full Text
- View/download PDF
37. Bayesian metamodeling of complex biological systems across varying representations
- Author
-
Liping Sun, Carl Kesselman, Jitin Singla, Kala Bharath, Dongqing Zheng, Raymond C. Stevens, Kate L. White, Angdi Li, Andrej Sali, Jeremy O. B. Tempkin, Nicholas A. Graham, Barak Raveh, Tanmoy Sanyal, Chenxi Wang, and Jihui Zhao
- Subjects
Divide and conquer algorithms ,Computer science ,Population ,Bayesian probability ,Machine learning ,computer.software_genre ,Models, Biological ,Models ,integrative modeling ,Humans ,Computer Simulation ,Graphical model ,education ,Network model ,pancreatic β-cell ,education.field_of_study ,Multidisciplinary ,pancreatic beta-cell ,business.industry ,Diabetes ,Linear model ,Bayes Theorem ,Biological Sciences ,Biological ,multiscale modeling ,whole-cell modeling ,Metamodeling ,Decentralized computing ,Linear Models ,Bayesian metamodeling ,Artificial intelligence ,business ,computer - Abstract
Comprehensive modeling of a whole cell requires an integration of vast amounts of information on various aspects of the cell and its parts. To divide and conquer this task, we introduce Bayesian metamodeling, a general approach to modeling complex systems by integrating a collection of heterogeneous input models. Each input model can in principle be based on any type of data and can describe a different aspect of the modeled system using any mathematical representation, scale, and level of granularity. These input models are 1) converted to a standardized statistical representation relying on probabilistic graphical models, 2) coupled by modeling their mutual relations with the physical world, and 3) finally harmonized with respect to each other. To illustrate Bayesian metamodeling, we provide a proof-of-principle metamodel of glucose-stimulated insulin secretion by human pancreatic β-cells. The input models include a coarse-grained spatiotemporal simulation of insulin vesicle trafficking, docking, and exocytosis; a molecular network model of glucose-stimulated insulin secretion signaling; a network model of insulin metabolism; a structural model of glucagon-like peptide-1 receptor activation; a linear model of a pancreatic cell population; and ordinary differential equations for systemic postprandial insulin response. Metamodeling benefits from decentralized computing, while often producing a more accurate, precise, and complete model that contextualizes input models as well as resolves conflicting information. We anticipate Bayesian metamodeling will facilitate collaborative science by providing a framework for sharing expertise, resources, data, and models, as exemplified by the Pancreatic β-Cell Consortium.
- Published
- 2021
- Full Text
- View/download PDF
38. A collective filtering based content transmission scheme in edge of vehicles
- Author
-
Bin Hu, Xiangjie Kong, Yufan Feng, Zhaolong Ning, Xiping Hu, Xiaojie Wang, and Yi Guo
- Subjects
Information Systems and Management ,Markov chain ,business.industry ,Computer science ,05 social sciences ,Latency (audio) ,050301 education ,02 engineering and technology ,Computer Science Applications ,Theoretical Computer Science ,Upload ,Decentralized computing ,Transmission (telecommunications) ,Artificial Intelligence ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Enhanced Data Rates for GSM Evolution ,business ,0503 education ,Software ,Computer network - Abstract
With the emergence of the ever-increasing vehicular applications and booming Internet services, the requirements of low-latency and high efficient transmission among vehicles become urgent to meet, and their corresponding solutions need to be well investigated. To resolve the above challenges, we propose a fog computing-based content transmission scheme with collective filtering in edge of vehicles. We first provide a system model based on fog-based rode side units by considering location-awareness, content-caching and decentralized computing. Then, a content-caching strategy in RSUs is designed to minimize the downloading latency. Specifically, we model the moving vehicles with the two-dimensional Markov chains, and calculate the probabilities of file caching in RSUs to minimize the latency in file downloading. Each vehicle can also maintain a neighbor list to record the encounters with high similarities, and update it based on the historic and real-time contacts. Finally, we carry on the experiments based on the real-world taxi trajectories in Beijing and Shanghai, China. Simulation results demonstrate the effectiveness of our proposed method.
- Published
- 2020
- Full Text
- View/download PDF
39. A review of enabling methodologies for information processing in smart grids
- Author
-
Ahmed F. Zobaa, Ioana Pisica, Loi Lei Lai, and Alfredo Vaccaro
- Subjects
Computer science ,020209 energy ,020208 electrical & electronic engineering ,Information processing ,Energy Engineering and Power Technology ,Context (language use) ,02 engineering and technology ,Data science ,Decentralized computing ,Smart grid ,Software deployment ,restrict ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Wireless sensor network - Abstract
The deployment of traditional computing, control and monitoring paradigms in modern smart grids is characterized by several severe limitations. These could restrict their capability to manage the huge complexities and the vast penetration of distributed and renewable energy resources that are expected in future operational scenarios. In this context, the design of more scalable and more flexible solution paradigms represents a relevant issue to address. The enabling technologies and methodologies aimed at addressing these complex challenges include decentralized computing, self-organizing sensor networks, proactive control, and holistic computing frameworks. Accordingly, in this paper a selection from literature published on these topics will be analyzed and reviewed, in order to outline the most relevant research trends, and the main open problems.
- Published
- 2019
- Full Text
- View/download PDF
40. Drop computing: Ad-hoc dynamic collaborative computing
- Author
-
Constandinos X. Mavromoustakis, Radu-Ioan Ciobanu, Ciprian Dobre, Florin Pop, George Mastorakis, and Catalin Negru
- Subjects
020203 distributed computing ,Edge device ,Computer Networks and Communications ,business.industry ,Computer science ,Mobile broadband ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Decentralized computing ,User experience design ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Drop (telecommunication) ,Wireless ,business ,Internet of Things ,Mobile device ,Software ,Computer network - Abstract
Mobile applications nowadays generally consist of a frontend component running on the device, and a backend component running on the cloud that performs the larger computations. However, this usage model leads to high costs for developing the application (since a cloud infrastructure that should scale to the number of users must be maintained), and to a potentially bad user experience (if the latency is high or the users employ mobile broadband they pay for). Thus, we introduce the Drop Computing paradigm, which proposes the concept of decentralized computing over multilayered networks, combining cloud and wireless technologies over a social crowd formed between mobile and edge devices. Mobile devices and people interconnect to form ad-hoc dynamic collaborations to support the equivalent of a crowd-based edge multilayered cloud of clouds, where the capabilities of any mobile device are extended beyond the local technology barriers, to accommodate external resources available in the crowd of other devices. Thus, instead of every data or computation request going directly to the cloud, Drop Computing employs the mobile crowd formed of devices in close proximity for quicker and more efficient access. Devices in the mobile crowd are leveraged for requesting already downloaded data or performing computations, and the cloud acts as the second (or even third) option. We present a proof-of-concept implementation of Drop Computing and show, through simulations, that it is feasible for real-life usage, since it is able to drastically reduce costs while not affecting or even improving the user experience.
- Published
- 2019
- Full Text
- View/download PDF
41. Design of secure key management and user authentication scheme for fog computing services
- Author
-
Mohammad Wazid, Neeraj Kumar, Ashok Kumar Das, and Athanasios V. Vasilakos
- Subjects
Scheme (programming language) ,User authentication ,Computer Networks and Communications ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,02 engineering and technology ,GeneralLiterature_MISCELLANEOUS ,Decentralized computing ,Hardware and Architecture ,Fog computing ,Computer data storage ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Distributed Computing ,business ,Key management ,computer ,Software ,ComputingMethodologies_COMPUTERGRAPHICS ,computer.programming_language ,Computer network - Abstract
© 2018 Elsevier B.V. Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.
- Published
- 2019
- Full Text
- View/download PDF
42. An Internet‐based framework for federated process support
- Author
-
Piccinelli Floriana Marcello, Giacomo and Zugliani, Gabriele
- Published
- 1998
- Full Text
- View/download PDF
43. Blockchain Based Global Financial Service Platform
- Author
-
Mingyang Zhang, Heping Pan, Xu Han, Haisong Gu, Chonghe Zheng, and Yingjun Li
- Subjects
Information privacy ,Service (systems architecture) ,Decentralized computing ,Computer science ,business.industry ,Information sharing ,Deep learning ,Scalability ,Cloud computing ,Artificial intelligence ,business ,Data science ,Financial services - Abstract
Recently AI technologies, especially Deep Neural Network (DNN), have been widely used in the financial industry, such as stock price and movement prediction. In order to develop an AI-based solution for the global financial market, daily-based DNN model training for each stock is required to need collaboration among a large scale of entities. However, it is usually challenging due to data privacy, the cost of AI computing, and the lack of motivation to share information. This research proposes a novel Blockchain based platform, which utilizes the decentralized network, federated learning, and master-node to tackle these issues. The decentralized computing framework of federated learning, along with transfer learning, is applied to meet the data privacy requirements. Furthermore, the proposed federated learning platform with collaborative training is built on a decentralized AI computing cloud, which is highly affordable compared to centralized AI clouds. The master-node of Blockchain technology is further employed to enable the scalable global financial service, and effective rewards are applied to incentivize information sharing as well. We have applied the proposed Blockchain based platform to the stock prediction global service, which demonstrates the platform is practical and useful.
- Published
- 2021
- Full Text
- View/download PDF
44. FedCT: Federated Collaborative Transfer for Recommendation
- Author
-
Shuchang Liu, Yongfeng Zhang, Shuyuan Xu, Amélie Marian, Wenhui Yu, and Zuohui Fu
- Subjects
User information ,Decentralized computing ,Human–computer interaction ,Computer science ,business.industry ,Server ,Information sharing ,Cloud computing ,Recommender system ,Service provider ,Transfer of learning ,business - Abstract
When a user starts exploring items from a new area of an e-commerce system, cross-domain recommendation techniques come into help by transferring the abundant knowledge from the user's familiar domains to this new domain. However, this solution usually requires direct information sharing between service providers on the cloud which may not always be available and brings privacy concerns. In this paper, we show that one can overcome these concerns through learning on edge devices such as smartphones and laptops. The cross-domain recommendation problem is formalized under a decentralized computing environment with multiple domain servers. And we identify two key challenges for this setting: the unavailability of direct transfer and the heterogeneity of the domain-specific user representations. We then propose to learn and maintain a decentralized user encoding on each user's personal space. The optimization follows a variational inference framework that maximizes the mutual information between the user's encoding and the domain-specific user information from all her interacted domains. Empirical studies on real-world datasets exhibit the effectiveness of our proposed framework on recommendation tasks and its superiority over domain-pairwise transfer models. The resulting system offers reduced communication cost and an efficient inference mechanism that does not depend on the number of involved domains, and it allows flexible plugin of domain-specific transfer models without significant interference on other domains.
- Published
- 2021
- Full Text
- View/download PDF
45. Priority and Dependency-Based DAG Tasks Offloading in Fog/Edge Collaborative Environment
- Author
-
Bing Tang, Feiyan Guo, Xing Fu, and Linyao Kang
- Subjects
050101 languages & linguistics ,Edge device ,business.industry ,Computer science ,Distributed computing ,05 social sciences ,Cloud computing ,02 engineering and technology ,Energy consumption ,Directed acyclic graph ,Decentralized computing ,Task (computing) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Enhanced Data Rates for GSM Evolution ,business - Abstract
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. It usually adopts convenient and flexible distributed services, which can realize low-cost and real-time data analysis and intelligent control. Efficient communication and fog/edge collaboration have become popular research issues. In this paper, the offloading problem of dependent tasks in fog/edge collaborative environment is studied. Dependent task is modeled as a directed acyclic graph (DAG), and the scenario that fog nodes are configured with heterogeneous multi-core servers is considered. According to task dependencies and energy consumption requirements, all subtasks executed on different edge devices are prioritized, and the Priority and Dependency-based DAG Tasks Offloading Algorithm (PDAGTO) is proposed. Simulation results have shown that, compared with the existing work, the proposed algorithm can effectively reduce the average delay and the total energy consumption of during the procedure of task offloading.
- Published
- 2021
- Full Text
- View/download PDF
46. Centralized Information Systems Services: Managing the Transition to Decentralization
- Author
-
Walker, Kenton B.
- Published
- 1993
- Full Text
- View/download PDF
47. Blockchain-Based Digital Record-Keeping in Land Administration System
- Author
-
Noshin Tasnim, Rabius Sunny Rizon, Shovon Niverd Pereira, and Muhammad Nazrul Islam
- Subjects
Decentralized computing ,Blockchain ,Smart contract ,Computer science ,Management system ,Control (management) ,Scalability ,Land administration ,Computer security ,computer.software_genre ,Monopoly ,computer - Abstract
Land Administration System (LAS) is a salient infrastructure for any developed or developing country. The LAS is implemented both in digital form (traditional database system) and the manual approaches (paper-based documentations). Both of these systems provide monopoly control to an authority which may increase corrupt behavior in land administration. Again, though the Blockchain technology was originally introduced for keeping a financial ledger; the utilization of this technology can be extended to implement any decentralized computing systems including the digital record keeping and management system. Recent studies found that uses of Blockchain technology in land administration remain new and relatively untested. Therefore, in this work, a blockchain-based framework is proposed to develop a land administration system. The proposed framework was simulated in Ethereum blockchain platform; and showed that the framework contributed to develop a secure, reliable, scalable, effective, and efficient land administration system.
- Published
- 2021
- Full Text
- View/download PDF
48. Secure Blockchain: Assessing Specific Security Threats
- Author
-
Ganguly Ananya, Das Baisakhi, Das Priyanjali, and Das Abhishek
- Subjects
Blockchain ,Smart contract ,business.industry ,Computer science ,Supply chain ,Cryptography ,Computer security ,computer.software_genre ,Decentralized computing ,Fork (file system) ,business ,computer ,Vulnerability (computing) ,Anonymity - Abstract
Blockchain technology originates from the Bitcoin system, and due to its great success it can draw awareness to other fields because of its global acceptable features like decentralization, anonymity, and audibility. Other than finance, blockchain technology has evolved in various applications like legal, supply chain, health care, etc. Though blockchain technology is a bit difficult to maintain and monitor, still a blockchain network is more secure than other technologies. In this work, we want to give some avenues of the blockchain security system and also highlight some specific security threats. The issues related to mining or fork problems have also been discussed. It is found that several unexpected fields contribute to security concerns rather than decentralized computing and any cryptographic issues.
- Published
- 2021
- Full Text
- View/download PDF
49. A Novel Probabilistic-Performance-Aware Approach to Multi-workflow Scheduling in the Edge Computing Environment
- Author
-
Wanbo Zheng, Xiaoning Sun, Yiqiao Peng, Mei Long, Ruilong Yang, Xiaobo Li, Yuyin Ma, and Yong Ma
- Subjects
020203 distributed computing ,Job shop scheduling ,Computer science ,Quality of service ,Distributed computing ,Probabilistic logic ,02 engineering and technology ,Scheduling (computing) ,Decentralized computing ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Enhanced Data Rates for GSM Evolution ,Edge computing - Abstract
Edge computing is a decentralized computing infrastructure in which data, calculation, storage and applications are located somewhere between the data source and the computing facilities. While the edge servers enjoy the close proximity to the end-users to provide services at reduced latency and lower energy costs, we use from limitations in computational and radio resources, which calls for smart, quality-of-service (QoS) guaranteed and efficient task scheduling methods and strategies. For addressing the edge-environment-oriented multi-workflow scheduling problem, in this paper, we propose a probabilistic-QoS-aware approach to multi-workflow scheduling over edge servers with time-varying QoS. Our proposed method leveraged a probability-mass function-based QoS aggregation model and a discrete firefly algorithm for generating the multi-workflow scheduling plans. In order to prove the effectiveness of our proposed method, we conducted an experimental case study based on varying types of workflows and a real-world dataset for edge server positions. It can be seen that our method clearly outperforms its competitors in terms of completion time, cost, and deadline validation rate.
- Published
- 2021
- Full Text
- View/download PDF
50. A Review of Secure Cloud Storage-Based on Cloud Computing
- Author
-
Akhil Bhatia, Piyush Aneja, and Achyut Shankar
- Subjects
business.industry ,Computer science ,Data_MISCELLANEOUS ,Information technology ,Data security ,Cloud computing ,computer.software_genre ,Computer security ,Encryption ,ComputingMilieux_GENERAL ,Decentralized computing ,Grid computing ,Computer cluster ,business ,computer ,Cloud storage - Abstract
Cloud computing is a new computational model for decentralized computing which has become very popular because of the “on-demand” service. Cloud computing is built up from cluster computing and grid computing. The cloud service helps to access our information anywhere and anytime. Many people believe that cloud computing is going to reshape Information technology Companies as a revolution. Strategies including encryption and decryption processing are taken to secure cloud computing and cloud storage, data security, and data transmission. Many companies have their cloud computing services like Toyota, Citibank, Amazon, Google, Microsoft, etc. As we all know, storage is one of the most significant expenditures on Information technology projects and companies. Traditionally, we store data in Pen drive, compact disc, hard drive, etc., but to meet this need, we started saving our data in the cloud because there are many advantages of cloud storage over traditional storage and it has also become popular in the last few years. Cloud storage is a storage in which we can store data online in the cloud. Cloud storage provides us many benefits like disaster healing, easy access, and many more. This work aims to provide a means of understanding the topic of cloud computing and cloud storage.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.