Search results for "Overlay network"

showing 10 items of 11 documents

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

A decentralized load control architecture for smart energy consumption in small islands

2020

Abstract In this paper we propose the adoption of Overgrid, a new decentralized load control architecture, for balancing the energy production variations introduced with the adoption of renewable sources, facilitating and improving the smart energy retrofit. The system is presented and applied for managing the aggregated daily load profile of a community of domestic end-users in the island of Lampedusa, Italy, exploiting the load profiles gathered in a real measurement campaign. The Overgrid Demand Response (DR) architecture is used for managing the residential flexible loads, estimating the aggregated power demand without any centralized server and creating a virtual “community” of smart b…

Computer scienceDistributed computingGeography Planning and Development0211 other engineering and technologiesOverlay networkTransportationSmart grid02 engineering and technology010501 environmental sciences01 natural sciencesLoad profileDemand responseLoad shifting021108 energy0105 earth and related environmental sciencesCivil and Structural EngineeringBuilding automationRenewable Energy Sustainability and the Environmentbusiness.industryLoad curtailingLoad curtailing; Load shifting; Overlay network; Smart gridEnergy consumptionRenewable energySmart gridElectricity generationbusinessLoad shiftingSustainable Cities and Society
researchProduct

Overgrid: A Fully Distributed Demand Response Architecture Based on Overlay Networks

2017

In this paper, we present Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed demand response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. As overlay networks in communications establish logical links between peers regardless of the physical topology of the network, the Overgrid is able to apply some power balance criteria to its system of buildings, as they belong to a virtual microgrid, regardless of their physical location. We exploit an innovative distributed algorithm, called flow updating, for monitoring the power consumption of the buildings and the number of nodes…

EngineeringSettore ING-IND/11 - Fisica Tecnica AmbientaleSettore ING-INF/03 - Telecomunicazionibusiness.industry020209 energyDistributed computingOverlay network02 engineering and technologyEnergy consumptionNetwork topologySettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaDemand responseControl and Systems EngineeringDistributed algorithm0202 electrical engineering electronic engineering information engineeringMicrogridElectrical and Electronic EngineeringbusinessReference modelBuilding automationComputer networkIEEE Transactions on Automation Science and Engineering
researchProduct

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

A P2P Architecture for Multimedia Content Retrieval

2006

The retrieval facilities of most Peer-to-Peer (P2P) systems are limited to queries based on unique identifiers or small sets of keywords. This approach can be highly labor-intensive and inconsistent. In this paper we investigate a scenario where a huge amount of multimedia resources are shared in a P2P network, by means of efficient content-based image and video retrieval functionalities. The challenge in such systems is to limit the number of sent messages, maximizing the usefulness of each peer contacted in the query process. We achieve this goal by the adoption of a novel algorithm for routing user queries. The proposed approach exploits compact representations of multimedia resources sh…

Information retrievalMultimediaComputer scienceOverlay networkUser interfacecomputer.software_genreNetwork topologyImage retrievalcomputerShared resource
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

On Constructing Persistent Identifiers with Persistent Resolution Targets

2016

Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…

Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceslcsh:T58.5-58.64lcsh:Information technologyComputer sciencebusiness.industryOverlay network020206 networking & telecommunications02 engineering and technologycomputer.file_formatMaintenance engineeringlcsh:QA75.5-76.95IdentifierMetadataComputer Science - Networking and Internet ArchitectureData accessEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinessDisseminationBitTorrentcomputerComputer network
researchProduct

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo

Overlay networksComputer scienceDistributed computingOverlay networkSmart grid02 engineering and technologylcsh:Chemical technologyBiochemistryArticlePeer to peerAnalytical ChemistryDemand response0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringSecret sharingInstrumentationOvergridBuilding automationP2P020203 distributed computingbusiness.industryDistributed; Gossiping; Overgrid; Overlay networks; P2P; Peer to peer; Privacy; Secret sharing; Smart grid020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsRenewable energyDistributedElectricity generationSmart gridPrivacyGossipingbusinessSensors
researchProduct

A Community-based Approach for Service-based Application Composition in an Ecosystem

2010

The design of composite applications by combining existing services with known semantics is an ongoing topic in current research. Several studies are aimed at providing service description models and standards, service discovery and matching etc. However, service composition in distributed dynamic environments such as P2P ecosystems has received little attention from research communities. In this paper we present a design framework for composing services, taking in particular into account different ways of building peercommunities based on network or services characteristics.

Service (business)Matching (statistics)Computer sciencecomputer.internet_protocolbusiness.industryEnvironmental resource managementService discoveryOverlay networkService-oriented architectureSemanticsData scienceEcosystemService-based Application CompositionbusinesscomputerComposition (language)
researchProduct

Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems

2009

Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication systems. These drawbacks are related to ID assignment, the relation between ID and physical location, the routing styles and lack of cache, etc. In this paper, we investigate several approaches that can improve the efficiency of the peer/resource lookup algorithm. After that, we simulate two sys…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal time communication systemsOverlay networkOverlayCommunications systemUploadPeer to peer computingCachebusinessChord (peer-to-peer)Computer network2009 International Conference on New Trends in Information and Service Science
researchProduct