1,074 research outputs found
A Cloud-based Mobile Privacy Protection System with Efficient Cache Mechanism
People increasingly rely on their mobile devices and use them to store a lot of data. Some of the data are personal and private, whose leakage leads to users\u27 privacy harm. Meanwhile, mobile apps and services over-collect users\u27 data due to the coarse-grained access control approach utilized by the mobile operating system. We propose a cloud-based approach to provide fine-grained access control toward data requests. We add privacy level, as a new metadata, to data and manage the storage using different policies correspondingly. However, the proposed approach leads to performance decreases because of the extra communication cost. We also introduce a novel cache mechanism to eliminate the extra cost by storing non-private and popular data on the mobile device. As part of our cache mechanism, we design a user-preference-based ordering method along with the principle of locality to determine how popular some data are. We also design a configurable refresh policy to improve the overall performance. Finally, we evaluate our approach using a real phone in a simulated environment. The results show that our approach can keep the response time of all data requests within a reasonable range and the cache mechanism can further improve the performance
Recommended from our members
Modeling and analyzing device-to-device content distribution in cellular networks
Device-to-device (D2D) communication is a promising approach to optimize the utilization of air interface resources in 5G networks, since it allows decentralized proximity-based communication. To obtain caching gains through D2D, mobile nodes must possess content that other mobiles want. Thus, devising intelligent cache placement techniques are essential for D2D. The goal of this dissertation is to provide randomized spatial models for content distribution in cellular networks by capturing the locality of the content, and additionally, to provide dynamic content placement algorithms exploiting the node configurations.
First, a randomized content caching scheme for D2D networks in the cellular context is proposed. Modeling the locations of the devices as a homogeneous Poisson Point Process (PPP), the probability of successful content delivery in the presence of interference and noise is derived. With some idealized modeling aspects, i.e., given that (i) only a fraction of users to be randomly scheduled at a given time, and (ii) the request distribution does not change over time, it has been shown that the performance of caching can be optimized by smoothing out the request distribution, where the smoothness of the caching distribution is mainly determined by the path loss exponent, and holds under Rayleigh, Ricean and Nakagami fading models.
Second, to take the randomized caching model a step further, a spatially correlated content caching scenario is contemplated. Inspired by the Matérn hard-core point process of type II, which is a first-order pairwise interaction model, D2D nodes caching the same file are never closer to each other than the exclusion radius. The exclusion radius plays the role of a substitute for caching probability. The optimal exclusion radii that maximize the hit probability can be determined by using the request distribution and cache memory size. Unlike independent content placement, which is oblivious to the geographic locations of the nodes, the new strategy can be effective for proximity-based communication even when the cache size is small.
Third, an auction-aided Matérn carrier sense multiple access (CSMA) policy that considers the joint analysis of scheduling and caching is studied. The auction scheme is distributed. Given a cache configuration, i.e., the set of cached files in each user at a given snapshot, each D2D receiver determines the value of its request, by bidding on the set of potential transmitters in its communication range. The values of the receiver bids are reported to the potential transmitter, which computes the cumulated sum of these variables taken on all users in its cell. The potential transmitter then reports the value of the bid sum to other potential transmitters in its contention range. Given the accumulated bids of all potential transmitters, the contention range and the medium access probability, a fraction of the potential transmitters are jointly scheduled, determined by the auction policy, in order to optimize the throughput. Later, a Gibbs sampling-based cache update strategy is proposed to iteratively optimize the hit rate by taking the scheduling scheme into account.
In this dissertation, a variety of distributed algorithms for D2D content caching are proposed. Our results indicate that the geographic locality and the network parameters have a significant role in determining and optimizing the placement strategy. Exploiting the user interactions and spatial diversity, and incentivizing cooperation among D2D nodes are crucial in realizing the full potential of caching. Furthermore, from a network point of view, the scheduling and the caching phases are closely linked to each other. Hence, understanding the interaction between these two phases helps develop novel dynamic caching strategies capturing the temporal and spatial locality of the demand.Electrical and Computer Engineerin
Supporting Secure and Transparent Mobility in Wireless Local-Area Networks
Wireless Local Area Networks (WLANs) are experiencing unprecedented growth as
the last mile connectivity solution. Mobility is an important feature of
any wireless communication system. Handoffs are a crucial link level
functionality that enable a mobile user to stay connected to a wireless network
by switching the data connection from one base station or access point to
another. Conceptually the handoff process can be subdivided into two phases:
(i) Discovery - wherein the client searches for APs in vicinity and (ii)
Authentication - the client authenticates to an AP selected from the discovery
phase.
The handoff procedure recommended by the IEEE 802.11 standard and closely
implemented by various wireless vendors is an intrusive and a brute-force
approach. My testbed based study of these algorithms showed that they incur
high latencies varying between 400ms to 1.3 seconds depending on the security
settings in effect. Such inefficient handoff mechanisms can have a detrimental
impact on applications especially synchronous multimedia connections such as
Voice over IP.
In my dissertation, I have proposed and evaluated the notion of locality among
APs induced by user mobility patterns. A relation is created among APs which
captures this locality in a graph theoretic manner called neighbor graphs
-- a distributed structure that autonomously captures such locality. Based on
this, I have designed and evaluated efficient mechanisms to address the two
different phases of this handoff process. Through a rigorous testbed based
implementation, I have demonstrated the viability of the concept of mobility
induced locality through good performance improvements. Through extensive
simulations I have studied the performance of proposed handoff mechanisms over
various different topologies. This work has shown that a topological structure
which captures the locality relationship among APs is fundamental to designing
mechanisms that make user mobility transparent from the higher layers of the
networking stack
Location and routing optimization protocols supporting internet host mobility
PhD ThesisWith the popularity of portable computers and the proliferation of wireless networking
interfaces, there is currently a great deal of interest in providing IP networking
support for host mobility using the Internet as a foundation for wireless
networking. Most proposed solutions depend on a default route through the mobile
host's horne address, which makes for unnecessarily long routes. The major
problem that this gives rise to is that of finding an efficient way of locating and
routing that allows datagrams to be delivered efficiently to moving destinations
whilst limiting costly Internet-wide location updates as much as possible.
Two concepts - "local region" and "patron service" - are introduced based on
the locality features of the host movement and packet traffic patterns. For each
mobile host, the local region is a set of designated subnetworks within which a
mobile host often moves, and the patrons are the hosts from which the majority of
traffic for the mobile host originated. By making use of the hierarchical addressing
and routing structure of Internet, the two concepts are used to confine the effects
of a host moving, so location updates are sent only to a designated host moving
area and to those hosts which are most likely to call again, thus providing nearly
optimal routing for most communication.
The proposed scheme was implemented as an IP extension using a network simulator
and evaluated from a system performance point of view. The results show a
significant reduction in the accumulated communication time along with improved
datagram tunneling, as compared with its extra location overhead. In addition,
a comparison with another scheme shows that our functionality is more effective
both for location update and routing efficiency. The scheme offers improved network
and host scalability by isolating local movement from the rest of the world,
and provides a convenient point at which to perform administration functions
- …