464 research outputs found
Assessing Data Usefulness for Failure Analysis in Anonymized System Logs
System logs are a valuable source of information for the analysis and
understanding of systems behavior for the purpose of improving their
performance. Such logs contain various types of information, including
sensitive information. Information deemed sensitive can either directly be
extracted from system log entries by correlation of several log entries, or can
be inferred from the combination of the (non-sensitive) information contained
within system logs with other logs and/or additional datasets. The analysis of
system logs containing sensitive information compromises data privacy.
Therefore, various anonymization techniques, such as generalization and
suppression have been employed, over the years, by data and computing centers
to protect the privacy of their users, their data, and the system as a whole.
Privacy-preserving data resulting from anonymization via generalization and
suppression may lead to significantly decreased data usefulness, thus,
hindering the intended analysis for understanding the system behavior.
Maintaining a balance between data usefulness and privacy preservation,
therefore, remains an open and important challenge. Irreversible encoding of
system logs using collision-resistant hashing algorithms, such as SHAKE-128, is
a novel approach previously introduced by the authors to mitigate data privacy
concerns. The present work describes a study of the applicability of the
encoding approach from earlier work on the system logs of a production high
performance computing system. Moreover, a metric is introduced to assess the
data usefulness of the anonymized system logs to detect and identify the
failures encountered in the system.Comment: 11 pages, 3 figures, submitted to 17th IEEE International Symposium
on Parallel and Distributed Computin
Hall viscosity, spin density, and torsion
We investigate the relationship between Hall viscosity, spin density and
response to geometric torsion. For the most general effective action for
relativistic gapped systems, the presence of non-universal terms implies that
there is no relationship between torsion response and Hall viscosity. We also
consider free relativistic and non-relativistic microscopic actions and again
verify the existence of analogous non-universal couplings. Explicit examples
demonstrate that torsion response is unrelated to both Hall viscosity and spin
density. We also argue that relativistic gapped theories must have vanishing
Hall viscosity in Lorentz invariant vacuums.Comment: 15 pages, 1 figur
Effective Field Theory of Relativistic Quantum Hall Systems
Motivated by the observation of the fractional quantum Hall effect in
graphene, we consider the effective field theory of relativistic quantum Hall
states. We find that, beside the Chern-Simons term, the effective action also
contains a term of topological nature, which couples the electromagnetic field
with a topologically conserved current of dimensional relativistic fluid.
In contrast to the Chern-Simons term, the new term involves the spacetime
metric in a nontrivial way. We extract the predictions of the effective theory
for linear electromagnetic and gravitational responses. For fractional quantum
Hall states at the zeroth Landau level, additional holomorphic constraints
allow one to express the results in terms of two dimensionless constants of
topological nature.Comment: 4 page
The Euler current and relativistic parity odd transport
For a spacetime of odd dimensions endowed with a unit vector field, we
introduce a new topological current that is identically conserved and whose
charge is equal to the Euler character of the even dimensional spacelike
foliations. The existence of this current allows us to introduce new
Chern-Simons-type terms in the effective field theories describing relativistic
quantum Hall states and (2+1) dimensional superfluids. Using effective field
theory, we calculate various correlation functions and identify transport
coefficients. In the quantum Hall case, this current provides the natural
relativistic generalization of the Wen-Zee term, required to characterize the
shift and Hall viscosity in quantum Hall systems. For the superfluid case this
term is required to have nonzero Hall viscosity and to describe superfluids
with non s-wave pairing.Comment: 24 pages. v2: added citations, corrected minor typos in appendi
Designing Precoding and Receive Matrices for Interference Alignment in MIMO Interference Channels
Interference is a key bottleneck in wireless communication
systems. Interference alignment is a management
technique that align interference from other transmitters in
the least possibly dimension subspace at each receiver and
provides the remaining dimensions for free interference signal.
An uncoordinated interference is an example of interference
which cannot be aligned coordinately with interference from
coordinated part; consequently, the performance of interference
alignment approaches are degraded. In this paper, we propose a
rank minimization method to enhance the performance of interference
alignment in the presence of uncoordinated interference
sources. Firstly, to obtain higher multiplexing gain, a new rank
minimization based optimization problem is proposed; then, a
new class of convex relaxation is introduced which can reduce
the optimal value of the problem and obtain lower rank solutions
by expanding the feasibility set. Simulation results show that our
proposed method can obtain considerably higher multiplexing
gain and sum rate than other approaches in the interference
alignment framework
Event Pattern Identification in Anonymized System Logs
The size of computing systems and the number of their components steadily increase. The volume of generated system logs is in proportion to this increase. Storing system logs for analyzing and diagnosing systems behavior in large computing systems, requires a high amount of storage capacity. Sensitive data in system logs raise significant concerns about their sharing and publishing. The use of anonymization methods to cleanse sensitive data in system logs before publication reduces the usability of anonymized system logs for further analysis. After a certain level of anonymization, the cleansed system logs lose their semantic and only remain useful for certain statistical analyses. In this work, we address this tradeoff between anonymization and the usefulness of anonymized system logs. This way, full system logs anonymization is guaranteed, minimum storage space is required, and the cleansed system logs remain usable for general statistical analyses. To address the above tradeoff: (1) All variables -of every log entry- need to be replaced with defined constant values. (2) Each log entry maps to a hash-key via a hash function that is resistant to hash-key collisions. (3) The frequency of each hash-key is calculated. (4) The hash-keys are optimized based on their frequency of appearance. Additionally, based on the hash-keys frequency, the non-informative hash-keys will be eliminated. Preliminary results of analyzing system logs from a production system via the proposed method, show up to 95% reduction in required storage capacity, while the precision of the statistical analysis remains unchanged and full anonymity is guaranteed
- …