• Title/Summary/Keyword: Access Pattern

Search Result 454, Processing Time 0.034 seconds

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

Algorithmic GPGPU Memory Optimization

  • Jang, Byunghyun;Choi, Minsu;Kim, Kyung Ki
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.4
    • /
    • pp.391-406
    • /
    • 2014
  • The performance of General-Purpose computation on Graphics Processing Units (GPGPU) is heavily dependent on the memory access behavior. This sensitivity is due to a combination of the underlying Massively Parallel Processing (MPP) execution model present on GPUs and the lack of architectural support to handle irregular memory access patterns. Application performance can be significantly improved by applying memory-access-pattern-aware optimizations that can exploit knowledge of the characteristics of each access pattern. In this paper, we present an algorithmic methodology to semi-automatically find the best mapping of memory accesses present in serial loop nest to underlying data-parallel architectures based on a comprehensive static memory access pattern analysis. To that end we present a simple, yet powerful, mathematical model that captures all memory access pattern information present in serial data-parallel loop nests. We then show how this model is used in practice to select the most appropriate memory space for data and to search for an appropriate thread mapping and work group size from a large design space. To evaluate the effectiveness of our methodology, we report on execution speedup using selected benchmark kernels that cover a wide range of memory access patterns commonly found in GPGPU workloads. Our experimental results are reported using the industry standard heterogeneous programming language, OpenCL, targeting the NVIDIA GT200 architecture.

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

  • Choi, Dae-Seon;Kim, Seung-Hyun;Lee, Youn-Ho
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.66-75
    • /
    • 2012
  • This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. The proposed scheme uses a session key to permute indices of database records each time they are accessed. The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table and permuting both the index and position where the data are stored. Moreover, it is very efficient since only O(1) server computation and communication cost are required in terms of the number of the data stored. It can be applied to cloud computing, where the intermediate entities such as cloud computing service provider can violate the privacy of users or patients.

분산 데이타베이스에서의 동적 화일배정에 관한 연구

  • 황영헌;김대환;김영호;강석호
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.275-278
    • /
    • 1996
  • We propose dynamic file allocation method in distributed database management system with changing access patterns. There are a lot of studies on file allocation problem in D-DBMS, and those studies deal with off-line analysis and optimization. Those works are well for systems with static database access patterns, but are inadequate for systems that have changing access patterns. In these systems, dynamic file allocation along with access pattern is more proper. In advance, Brunstrom et al. studied on this area, but they dealt a extremely simplified model. So, we make more practical models to simulate real system. In these models, many factors that were disregard in the advance study are considered. These models are composed with the non-replication system and the replication system. In addition to, we deal with CPU workload balancing in such system in order to improve performance of systems. Our methodology is very simple and realistic, therefore we think that it will give a lot of improvement in D-DBMS with changing access pattern.

  • PDF

Prefetching System based on File Access Pattern Applicable to Multimedia Prefetching Scheme (멀티미디어 선반입에 적용 가능한 파일 액세스 패턴 기반의 선반입 시스템)

  • 황보준형;서대화
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.6
    • /
    • pp.489-499
    • /
    • 2001
  • This paper presents the SIC(Size-Interval-Count) prefetching system that can record the file access patterns of applications within a relatively small space of memory based on the repetitiveness of the file access patterns. The SICPS(SIC Prefetching System) is based on knowledge-based prefetching methods which includes high correctness in predicting future accesses of applications. The proposed system then uses the recorded file access patterns, referred to as "SIC access pattern information", to correctly predict the future accesses of the applications. The proposed prefetching system improved the response time by about 40% compared to the general file system and showed remarkable memory efficiency compared to the previously knowledge-based prefetching methods.

  • PDF

Dual Band Dipole Antenna with Tapered Microstrip Balun for WLAN Access Point (무선랜 AP(Access Point)용 테이퍼형 마이크로스립 발룬 구조 이중대역 다이폴 안테나)

  • Kim, Joung-Myoun;Kim, Jeong-Li;Yun, Je-Hoon;Kim, Nam
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.219-220
    • /
    • 2006
  • In this paper, we designed and implemented the Dual Band Dipole Antenna with Tapered Microstrip Balun for WLAN Access Point. Two dipole antennas with different resonant frequency and the antenna structure combined additional line were implemented for dual band performance. In order to feed the balun current, the tapered microstrip balun was used. Produced the Dual Band Antenna shows a special quality. The quality is that all VSWR is less than 1.5 in the 2.4GHz and 5GHz frequency bands in 802.11 standards, and it profits not less than 1.7dBi having typical Dipole Antenna pattern the very "a form of 8"pattern and Omni-directional pattern.

  • PDF

File Access Pattern Collection Scheme based on Repetitiveness (반복성을 고려한 파일 액세스 패턴 수집 기법)

  • Hwnag-Bo, Jun-Hyoung;Seok, Seong-U;Seo, Dae-Hwa
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.12
    • /
    • pp.674-684
    • /
    • 2001
  • This paper presents the SIC(Size-Interval-Count) prefetching scheme that can record the file access patterns of applications within a relatively small space of memory based on the repetitiveness of the file access patterns. Several knowledge-based prefetching methods were recently introduced, which includes high correctness in predicting future accesses of applications. They records the access patterns of applications and uses recorded access pattern information to predict which blocks will be requested next. Yet, these methods require to much memory space. Accordingly, the proposed method then uses the recorded file access patterns, referred to as "SIC access pattern information", to correctly predict the future accesses of the applications. The proposed prefetching method improved the response time by about 40% compared to the general file system and showed remarkable memory efficiency compared to the previously knowledge-based prefetching methods.

  • PDF

Development of Construction Site Access Management Automation System based on Hand Vascular Pattern

  • Gu Taek Kim;Ji Woong Yeom;Kyong Hoon Kim;Choong Hee Han;Jae Jun Kim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.499-505
    • /
    • 2009
  • Along with the changing pattern that the construction project is getting complicated, large-scaled and up-to-dated, necessity of efficient management of manpower and resources of the construction site is being increased. In particular, considering that the construction site requires a lot of labor force and in terms of the construction cost, labor cost shares 30-40%, labor management has become a very important factor. In this study, in order to support a stable and successful construction project implementation and supplement the existing system being utilized at the current site, construction site access management automation system based on hand vascular pattern, a biometrics system, is intended to be developed. Relevant theory for the system development and the problem of existing RFID system were evaluated and based on this findings, a system design and DB composition chart were envisaged. In addition, by applying this developed system to a number of sites, its result was analyzed

  • PDF

Tele-test Systems for ASIC Design (ASIC 설계를 위한 원격 테스트 시스템)

  • 윤도현;강성호
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.939-942
    • /
    • 1999
  • In this paper, Tele-Test System for ASIC Design is constructed. It consists of the server, and the clients. The server and clients are implemented by Java. Using Java RMI system, the remote access via information network is implemented. In this Tele-test system, fault simulation, test pattern compaction, test pattern generation, and path-delay fault test generation services are implemented. All service can be peformed parallel by network access.

  • PDF

Efficient Repair Algorithms using Disk Mirroring (디스크 미러링을 이용한 효율적인 복구 알고리즘)

  • Kim, Sung-Soo;Cho, Young-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1615-1624
    • /
    • 1997
  • In this paper, we propose and analyze various repair methods for a disk subsystem using mirroring. We also study the effects of the repair process that is invoked on disk faults on the mean response time of user disk requests. Finally, we analyze the effects of two different access patterns (uniform and non-uniform) on the repair process and performance. According to the results, average response times for non-uniform access pattern compared with uniform access pattern become shorter as the system load increases. Our simulation results show that the proposed repair algorithm with a short delay gives a better performance than the previous algorithms.

  • PDF