-
FLIPS: Federated Learning using Intelligent Participant Selection
Authors:
Rahul Atul Bhope,
K. R. Jayaram,
Nalini Venkatasubramanian,
Ashish Verma,
Gegi Thomas
Abstract:
This paper presents the design and implementation of FLIPS, a middleware system to manage data and participant heterogeneity in federated learning (FL) training workloads. In particular, we examine the benefits of label distribution clustering on participant selection in federated learning. FLIPS clusters parties involved in an FL training job based on the label distribution of their data apriori,…
▽ More
This paper presents the design and implementation of FLIPS, a middleware system to manage data and participant heterogeneity in federated learning (FL) training workloads. In particular, we examine the benefits of label distribution clustering on participant selection in federated learning. FLIPS clusters parties involved in an FL training job based on the label distribution of their data apriori, and during FL training, ensures that each cluster is equitably represented in the participants selected. FLIPS can support the most common FL algorithms, including FedAvg, FedProx, FedDyn, FedOpt and FedYogi. To manage platform heterogeneity and dynamic resource availability, FLIPS incorporates a straggler management mechanism to handle changing capacities in distributed, smart community applications. Privacy of label distributions, clustering and participant selection is ensured through a trusted execution environment (TEE). Our comprehensive empirical evaluation compares FLIPS with random participant selection, as well as three other "smart" selection mechanisms - Oort, TiFL and gradient clustering using two real-world datasets, two benchmark datasets, two different non-IID distributions and three common FL algorithms (FedYogi, FedProx and FedAvg). We demonstrate that FLIPS significantly improves convergence, achieving higher accuracy by 17 - 20 % with 20 - 60 % lower communication costs, and these benefits endure in the presence of straggler participants.
△ Less
Submitted 30 September, 2023; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Data processing of Visible Emission Line Coronagraph Onboard ADITYA L1
Authors:
Muthu Priyal,
Jagdev Singh,
B. Raghavendra Prasad,
Chavali Sumana,
Varun Kumar,
Shalabh Mishra,
S. N. Venkata,
G. Sindhuja,
K. Sasikumar Raja,
Amit Kumar,
Sanal krishnan,
Bhavana S. Hegde,
D. Utkarsha,
Natarajan Venkatasubramanian,
Pawankumar Somasundram,
S. Nagabhushana,
PU. Kamath,
S. Kathiravan,
T. Vishnu Mani,
Suresh Basavaraju,
Rajkumar Chavan,
P. Vemareddy,
B. Ravindra,
S. P. Rajaguru,
K. Nagaraju
, et al. (6 additional authors not shown)
Abstract:
ADITYA-L1 is India's first dedicated mission to observe the sun and its atmosphere from a halo orbit around L1 point. Visible emission line coronagraph (VELC) is the prime payload on board at Aditya-L1 to observe the sun's corona. VELC is designed as an internally occulted reflective coronagraph to meet the observational requirements of wide wavelength band and close to the solar limb (1.05 Ro). I…
▽ More
ADITYA-L1 is India's first dedicated mission to observe the sun and its atmosphere from a halo orbit around L1 point. Visible emission line coronagraph (VELC) is the prime payload on board at Aditya-L1 to observe the sun's corona. VELC is designed as an internally occulted reflective coronagraph to meet the observational requirements of wide wavelength band and close to the solar limb (1.05 Ro). Images of the solar corona in continuum and spectra in three emission lines 5303Å [Fe xiv], 7892Å [Fe xi] and 10747 [Fe xiii] obtained with high cadence to be analyzed using software algorithms automatically. A reasonable part of observations will be made in synoptic mode, those, need to be analyzed and results made available for public use. The procedure involves the calibration of instrument and detectors, converting the images into fits format, correcting the images and spectra for the instrumental effects, align the images etc. Then, develop image processing algorithms to detect the occurrence of energetic events using continuum images. Also derive physical parameters, such as temperature and velocity structure of solar corona using emission line observations. Here, we describe the calibration of detectors and the development of software algorithms to detect the occurrence of CMEs and analyze the spectroscopic data.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
FedGen: Generalizable Federated Learning for Sequential Data
Authors:
Praveen Venkateswaran,
Vatche Isahagian,
Vinod Muthusamy,
Nalini Venkatasubramanian
Abstract:
Existing federated learning models that follow the standard risk minimization paradigm of machine learning often fail to generalize in the presence of spurious correlations in the training data. In many real-world distributed settings, spurious correlations exist due to biases and data sampling issues on distributed devices or clients that can erroneously influence models. Current generalization a…
▽ More
Existing federated learning models that follow the standard risk minimization paradigm of machine learning often fail to generalize in the presence of spurious correlations in the training data. In many real-world distributed settings, spurious correlations exist due to biases and data sampling issues on distributed devices or clients that can erroneously influence models. Current generalization approaches are designed for centralized training and attempt to identify features that have an invariant causal relationship with the target, thereby reducing the effect of spurious features. However, such invariant risk minimization approaches rely on apriori knowledge of training data distributions which is hard to obtain in many applications. In this work, we present a generalizable federated learning framework called FedGen, which allows clients to identify and distinguish between spurious and invariant features in a collaborative manner without prior knowledge of training distributions. We evaluate our approach on real-world datasets from different domains and show that FedGen results in models that achieve significantly better generalization and can outperform the accuracy of current federated learning approaches by over 24%.
△ Less
Submitted 30 May, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Report of the Topical Group on Physics Beyond the Standard Model at Energy Frontier for Snowmass 2021
Authors:
Tulika Bose,
Antonio Boveia,
Caterina Doglioni,
Simone Pagan Griso,
James Hirschauer,
Elliot Lipeles,
Zhen Liu,
Nausheen R. Shah,
Lian-Tao Wang,
Kaustubh Agashe,
Juliette Alimena,
Sebastian Baum,
Mohamed Berkat,
Kevin Black,
Gwen Gardner,
Tony Gherghetta,
Josh Greaves,
Maxx Haehn,
Phil C. Harris,
Robert Harris,
Julie Hogan,
Suneth Jayawardana,
Abraham Kahn,
Jan Kalinowski,
Simon Knapen
, et al. (297 additional authors not shown)
Abstract:
This is the Snowmass2021 Energy Frontier (EF) Beyond the Standard Model (BSM) report. It combines the EF topical group reports of EF08 (Model-specific explorations), EF09 (More general explorations), and EF10 (Dark Matter at Colliders). The report includes a general introduction to BSM motivations and the comparative prospects for proposed future experiments for a broad range of potential BSM mode…
▽ More
This is the Snowmass2021 Energy Frontier (EF) Beyond the Standard Model (BSM) report. It combines the EF topical group reports of EF08 (Model-specific explorations), EF09 (More general explorations), and EF10 (Dark Matter at Colliders). The report includes a general introduction to BSM motivations and the comparative prospects for proposed future experiments for a broad range of potential BSM models and signatures, including compositeness, SUSY, leptoquarks, more general new bosons and fermions, long-lived particles, dark matter, charged-lepton flavor violation, and anomaly detection.
△ Less
Submitted 18 October, 2022; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Muon Collider Forum Report
Authors:
K. M. Black,
S. **dariani,
D. Li,
F. Maltoni,
P. Meade,
D. Stratakis,
D. Acosta,
R. Agarwal,
K. Agashe,
C. Aime,
D. Ally,
A. Apresyan,
A. Apyan,
P. Asadi,
D. Athanasakos,
Y. Bao,
E. Barzi,
N. Bartosik,
L. A. T. Bauerdick,
J. Beacham,
S. Belomestnykh,
J. S. Berg,
J. Berryhill,
A. Bertolin,
P. C. Bhat
, et al. (160 additional authors not shown)
Abstract:
A multi-TeV muon collider offers a spectacular opportunity in the direct exploration of the energy frontier. Offering a combination of unprecedented energy collisions in a comparatively clean leptonic environment, a high energy muon collider has the unique potential to provide both precision measurements and the highest energy reach in one machine that cannot be paralleled by any currently availab…
▽ More
A multi-TeV muon collider offers a spectacular opportunity in the direct exploration of the energy frontier. Offering a combination of unprecedented energy collisions in a comparatively clean leptonic environment, a high energy muon collider has the unique potential to provide both precision measurements and the highest energy reach in one machine that cannot be paralleled by any currently available technology. The topic generated a lot of excitement in Snowmass meetings and continues to attract a large number of supporters, including many from the early career community. In light of this very strong interest within the US particle physics community, Snowmass Energy, Theory and Accelerator Frontiers created a cross-frontier Muon Collider Forum in November of 2020. The Forum has been meeting on a monthly basis and organized several topical workshops dedicated to physics, accelerator technology, and detector R&D. Findings of the Forum are summarized in this report.
△ Less
Submitted 8 August, 2023; v1 submitted 2 September, 2022;
originally announced September 2022.
-
Summarizing experimental sensitivities of collider experiments to dark matter models and comparison to other experiments
Authors:
Antonio Boveia,
Caterina Doglioni,
Boyu Gao,
Josh Greaves,
Philip Harris,
Katherine Pachal,
Etienne Dreyer,
Giuliano Gustavino,
Robert Harris,
Daniel Hayden,
Tetiana Hrynova,
Ashutosh Kotwal,
Jared Little,
Kevin Black,
Tulika Bose,
Yuze Chen,
Sridhara Dasu,
Haoyi Jia,
Deborah Pinna,
Varun Sharma,
Nikhilesh Venkatasubramanian,
Carl Vuosalo
Abstract:
Comparisons of the coverage of current and proposed dark matter searches can help us to understand the context in which a discovery of particle dark matter would be made. In some scenarios, a discovery could be reinforced by information from multiple, complementary types of experiments; in others, only one experiment would see a signal, giving only a partial, more ambiguous picture; in still other…
▽ More
Comparisons of the coverage of current and proposed dark matter searches can help us to understand the context in which a discovery of particle dark matter would be made. In some scenarios, a discovery could be reinforced by information from multiple, complementary types of experiments; in others, only one experiment would see a signal, giving only a partial, more ambiguous picture; in still others, no experiment would be sensitive and new approaches would be needed. In this whitepaper, we present an update to a similar study performed for the European Strategy Briefing Book performed within the dark matter at the Energy Frontier (EF10) Snowmass Topical Group We take as a starting point a set of projections for future collider facilities and a method of graphical comparisons routinely performed for LHC DM searches using simplified models recommended by the LHC Dark Matter Working Group and also used for the BSM and dark matter chapters of the European Strategy Briefing Book. These comparisons can also serve as launching point for cross-frontier discussions about dark matter complementarity.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
Prospects for Heavy WIMP Dark Matter Searches at Muon Colliders
Authors:
Kevin Black,
Tulika Bose,
Yuze Chen,
Sridhara Dasu,
Haoyi Jia,
Deborah Pinna,
Varun Sharma,
Nikhilesh Venkatasubramanian,
Carl Vuosalo
Abstract:
Plots summarizing the constraints on Dark Matter models can help visualize synergies between different searches for the same kind of experiment, as well as between different experiments. In this whitepaper, we present an update to the European Strategy Briefing Book plots, from the perspective of collider searches within the Dark Matter at the Energy Frontier (EF10) Snowmass Topical Group, startin…
▽ More
Plots summarizing the constraints on Dark Matter models can help visualize synergies between different searches for the same kind of experiment, as well as between different experiments. In this whitepaper, we present an update to the European Strategy Briefing Book plots, from the perspective of collider searches within the Dark Matter at the Energy Frontier (EF10) Snowmass Topical Group, starting from inputs from future collider facilities. We take as a starting point the plots currently made for LHC searches using benchmark models recommended by the Dark Matter Working Group, also used for the BSM and Dark Matter chapters of the European Strategy Briefing Book. These plots can also serve as a starting point for cross-frontier discussions about dark matter complementarity, and could be updated as a consequence of these discussions. This is a whitepaper submitted to the APS Snowmass process for the EF10 topical group.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
IoT Notary: Attestable Sensor Data Capture in IoT Environments
Authors:
Nisha Panwar,
Shantanu Sharma,
Guoxi Wang,
Sharad Mehrotra,
Nalini Venkatasubramanian,
Mamadou H. Diallo,
Ardalan Amiri Sani
Abstract:
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address s…
▽ More
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address such concerns, we propose IoT Notary, a framework to ensure trust in IoT systems and applications. IoT Notary provides secure log sealing on live sensor data to produce a verifiable `proof-of-integrity,' based on which a verifier can attest that captured sensor data adheres to the published data-capturing rules. IoT Notary is an integral part of TIPPERS, a smart space system that has been deployed at the University of California Irvine to provide various real-time location-based services on the campus. We present extensive experiments over realtime WiFi connectivity data to evaluate IoT Notary, and the results show that IoT Notary imposes nominal overheads. The secure logs only take 21% more storage, while users can verify their one day's data in less than two seconds even using a resource-limited device.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets
Authors:
Peeyush Gupta,
Sharad Mehrotra,
Shantanu Sharma,
Nalini Venkatasubramanian,
Guoxi Wang
Abstract:
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users. Concealer exploits carefully selected encryption techniques to use indexes supported by da…
▽ More
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users. Concealer exploits carefully selected encryption techniques to use indexes supported by database systems and combines ways to add fake tuples in order to realize an efficient system that protects against leakage based on output-size. Thus, the design of Concealer overcomes two limitations of existing symmetric searchable encryption (SSE) techniques: (i) it avoids the need of specialized data structures that limit usability/practicality of SSE in large scale deployments, and (ii) it avoids information leakages based on the output-size, which may leak data distributions. Experimental results validate the efficiency of the proposed algorithms over a spatial time-series dataset (collected from a smart space) and TPC-H datasets, each of 136 Million rows, the size of which prior approaches have not scaled to.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets
Authors:
Peeyush Gupta,
Sharad Mehrotra,
Nisha Panwar,
Shantanu Sharma,
Nalini Venkatasubramanian,
Guoxi Wang
Abstract:
Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g., Bluetooth beacons, cellular data records, and smartphone applications. Such solutions are often intrusive, potentially violating individual privacy ri…
▽ More
Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g., Bluetooth beacons, cellular data records, and smartphone applications. Such solutions are often intrusive, potentially violating individual privacy rights and are often subject to regulations (e.g., GDPR and CCPR) that mandate the need for opt-in policies to gather and use personal information. In this paper, we introduce Quest, a system that empowers organizations to observe individuals and spaces to implement policies for social distancing and contact tracing using WiFi connectivity data in a passive and privacy-preserving manner. The goal is to ensure the safety of employees and occupants at an organization, while protecting the privacy of all parties. Quest incorporates computationally- and information-theoretically-secure protocols that prevent adversaries from gaining knowledge of an individual's location history (based on WiFi data); it includes support for accurately identifying users who were in the vicinity of a confirmed patient, and then informing them via opt-in mechanisms. Quest supports a range of privacy-enabled applications to ensure adherence to social distancing, monitor the flow of people through spaces, identify potentially impacted regions, and raise exposure alerts. We describe the architecture, design choices, and implementation of the proposed security/privacy techniques in Quest. We, also, validate the practicality of Quest and evaluate it thoroughly via an actual campus-scale deployment at UC Irvine over a very large dataset of over 50M tuples.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization
Authors:
Yiming Lin,
Daokun Jiang,
Roberto Yus,
Georgios Bouloukakis,
Andrew Chio,
Sharad Mehrotra,
Nalini Venkatasubramanian
Abstract:
This paper explores the data cleaning challenges that arise in using WiFi connectivity data to locate users to semantic indoor locations such as buildings, regions, rooms. WiFi connectivity data consists of sporadic connections between devices and nearby WiFi access points (APs), each of which may cover a relatively large area within a building. Our system, entitled semantic LOCATion cleanER (LOCA…
▽ More
This paper explores the data cleaning challenges that arise in using WiFi connectivity data to locate users to semantic indoor locations such as buildings, regions, rooms. WiFi connectivity data consists of sporadic connections between devices and nearby WiFi access points (APs), each of which may cover a relatively large area within a building. Our system, entitled semantic LOCATion cleanER (LOCATER), postulates semantic localization as a series of data cleaning tasks - first, it treats the problem of determining the AP to which a device is connected between any two of its connection events as a missing value detection and repair problem. It then associates the device with the semantic subregion (e.g., a conference room in the region) by postulating it as a location disambiguation problem. LOCATER uses a bootstrap** semi-supervised learning method for coarse localization and a probabilistic method to achieve finer localization. The paper shows that LOCATER can achieve significantly high accuracy at both the coarse and fine levels.
△ Less
Submitted 5 April, 2022; v1 submitted 20 April, 2020;
originally announced April 2020.
-
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
Authors:
Nisha Panwar,
Shantanu Sharma,
Guoxi Wang,
Sharad Mehrotra,
Nalini Venkatasubramanian
Abstract:
This paper focuses on the new privacy challenges that arise in smart homes. Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulation in a ring network consisting of smart home devic…
▽ More
This paper focuses on the new privacy challenges that arise in smart homes. Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulation in a ring network consisting of smart home devices to prevent inferences from device activities, via device workflow, i.e., inferences from a coordinated sequence of devices' actuation. The solution hides the device activity and corresponding channel activities, and thus, preserve the individual's activities. We also extend our solution to deal with a large number of devices and devices that produce large-sized data by implementing parallel rings. Our experiments also evaluate the performance in terms of communication overheads of the proposed approach and the obtained privacy.
△ Less
Submitted 8 April, 2020;
originally announced April 2020.
-
IoT Expunge: Implementing Verifiable Retention of IoT Data
Authors:
Nisha Panwar,
Shantanu Sharma,
Peeyush Gupta,
Dhrubajyoti Ghosh,
Sharad Mehrotra,
Nalini Venkatasubramanian
Abstract:
The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, support strong privacy laws to protect an individua…
▽ More
The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, support strong privacy laws to protect an individual's data in the cloud. One such law relates to strict enforcement of data retention policies. This paper proposes a framework, entitled IoT Expunge that allows sensor data providers to store the data in cloud platforms that will ensure enforcement of retention policies. Additionally, the cloud provider produces verifiable proofs of its adherence to the retention policies. Experimental results on a real-world smart building testbed show that IoT Expunge imposes minimal overheads to the user to verify the data against data retention policies.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
IoT Notary: Sensor Data Attestation in Smart Environment
Authors:
Nisha Panwar,
Shantanu Sharma,
Guoxi Wang,
Sharad Mehrotra,
Nalini Venkatasubramanian,
Mamadou H. Diallo,
Ardalan Amiri Sani
Abstract:
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced --- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address…
▽ More
Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced --- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address such concerns, we propose IoT Notary, a framework to ensure trust in IoT systems and applications. IoT Notary provides secure log sealing on live sensor data to produce a verifiable `proof-of-integrity,' based on which a verifier can attest that captured sensor data adheres to the published data-capturing rules. IoT Notary is an integral part of TIPPERS, a smart space system that has been deployed at UCI to provide various real-time location-based services in the campus. IoT Notary imposes nominal overheads for verification, thereby users can verify their data of one day in less than two seconds.
△ Less
Submitted 27 August, 2019;
originally announced August 2019.
-
Smart Home Survey on Security and Privacy
Authors:
Nisha Panwar,
Shantanu Sharma,
Sharad Mehrotra,
Łukasz Krzywiecki,
Nalini Venkatasubramanian
Abstract:
Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern. This article shows security requirements and threats to a smart home and focuses on a privacy-preserving security model. We classify smart hom…
▽ More
Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern. This article shows security requirements and threats to a smart home and focuses on a privacy-preserving security model. We classify smart home services based on the spatial and temporal properties of the underlying device-to-device and owner-to-cloud interaction. We present ways to adapt existing security solutions such as distance-bounding protocols, ISO-KE, SIGMA, TLS, Schnorr, Okamoto Identification Scheme (IS), Pedersen commitment scheme for achieving security and privacy in a cloud-assisted home area network.
△ Less
Submitted 3 May, 2019; v1 submitted 10 April, 2019;
originally announced April 2019.
-
Verifiable Round-Robin Scheme for Smart Homes
Authors:
Nisha Panwar,
Shantanu Sharma,
Guoxi Wang,
Sharad Mehrotra,
Nalini Venkatasubramanian
Abstract:
Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channel and in-home device activities. We propose a meth…
▽ More
Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channel and in-home device activities. We propose a method for securely scheduling the devices while decoupling the device and channels activities. The proposed solution avoids any attacks that may reveal the coordinated schedule of the devices, and hence, also, assures that inferences that may compromise individual's privacy are not leaked due to device and channel level activities. Our experiments also validate the proposed approach, and consequently, an adversary cannot infer device and channel activities by just observing the network traffic.
△ Less
Submitted 24 January, 2019;
originally announced January 2019.
-
Research Agenda in Intelligent Infrastructure to Enhance Disaster Management, Community Resilience and Public Safety
Authors:
Michael Dunaway,
Robin Murphy,
Nalini Venkatasubramanian,
Leysia Palen,
Daniel Lopresti
Abstract:
Modern societies can be understood as the intersection of four interdependent systems: (1) the natural environment of geography, climate and weather; (2) the built environment of cities, engineered systems, and physical infrastructure; (3) the social environment of human populations, communities and socio-economic activities; and (4) an information ecosystem that overlays the other three domains a…
▽ More
Modern societies can be understood as the intersection of four interdependent systems: (1) the natural environment of geography, climate and weather; (2) the built environment of cities, engineered systems, and physical infrastructure; (3) the social environment of human populations, communities and socio-economic activities; and (4) an information ecosystem that overlays the other three domains and provides the means for understanding, interacting with, and managing the relationships between the natural, built, and human environments.
As the nation and its communities become more connected, networked and technologically sophisticated, new challenges and opportunities arise that demand a rethinking of current approaches to public safety and emergency management. Addressing the current and future challenges requires an equally sophisticated program of research, technology development, and strategic planning. The design and integration of intelligent infrastructure-including embedded sensors, the Internet of Things (IoT), advanced wireless information technologies, real-time data capture and analysis, and machine-learning-based decision support-holds the potential to greatly enhance public safety, emergency management, disaster recovery, and overall community resilience, while addressing new and emerging threats to public safety and security. Ultimately, the objective of this program of research and development is to save lives, reduce risk and disaster impacts, permit efficient use of material and social resources, and protect quality of life and economic stability across entire regions.
△ Less
Submitted 4 May, 2017;
originally announced May 2017.
-
On Optimal and Fair Service Allocation in Mobile Cloud Computing
Authors:
M. Reza Rahimi,
Nalini Venkatasubramanian,
Sharad Mehrotra,
Athanasios V. Vasilakos
Abstract:
This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile app…
▽ More
This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile applications as a location-time workflows (LTW) of tasks; here users mobility patterns are translated to mobile service usage patterns. We show that an optimal map** of LTWs to tiered cloud resources considering multiple QoS goals such application delay, device power consumption and user cost/price is an NP-hard problem for both single and group-based applications. We propose an efficient heuristic algorithm called MuSIC that is able to perform well (73% of optimal, 30% better than simple strategies), and scale well to a large number of users while ensuring high mobile application QoS. We evaluate MuSIC and the 2-tier mobile cloud approach via implementation (on real world clouds) and extensive simulations using rich mobile applications like intensive signal processing, video streaming and multimedia file sharing applications. Our experimental and simulation results indicate that MuSIC supports scalable operation (100+ concurrent users executing complex workflows) while improving QoS. We observe about 25% lower delays and power (under fixed price constraints) and about 35% decrease in price (considering fixed delay) in comparison to only using the public cloud. Our studies also show that MuSIC performs quite well under different mobility patterns, e.g. random waypoint and Manhattan models.
△ Less
Submitted 20 August, 2013;
originally announced August 2013.
-
An Event Based Approach To Situational Representation
Authors:
Naveen Ashish,
Dmitri Kalashnikov,
Sharad Mehrotra,
Nalini Venkatasubramanian
Abstract:
Many application domains require representing interrelated real-world activities and/or evolving physical phenomena. In the crisis response domain, for instance, one may be interested in representing the state of the unfolding crisis (e.g., forest fire), the progress of the response activities such as evacuation and traffic control, and the state of the crisis site(s). Such a situation represent…
▽ More
Many application domains require representing interrelated real-world activities and/or evolving physical phenomena. In the crisis response domain, for instance, one may be interested in representing the state of the unfolding crisis (e.g., forest fire), the progress of the response activities such as evacuation and traffic control, and the state of the crisis site(s). Such a situation representation can then be used to support a multitude of applications including situation monitoring, analysis, and planning. In this paper, we make a case for an event based representation of situations where events are defined to be domain-specific significant occurrences in space and time. We argue that events offer a unifying and powerful abstraction to building situational awareness applications. We identify challenges in building an Event Management System (EMS) for which traditional data and knowledge management systems prove to be limited and suggest possible directions and technologies to address the challenges.
△ Less
Submitted 22 June, 2009; v1 submitted 22 June, 2009;
originally announced June 2009.