Software defined networking(SDN) has emerged as an efficient network technology for lowering operating cost through simplified hardware, software and management. Specific research focus has been placed to achieve a successful carrier grade network with SDN, in terms of scalability, reliability, Qo S and service management. In this paper, graph theory and traffic engineering are used to model the network state transitions and path assignment problem at first. Next, we present a quantitative assessment model on path assignment for a centralized controller to assess different kinds of path assignments, considering optimal path utilization, network load balance, network load volatility, and resource utilization simultaneously. In the end, an example forquantitatively assessing existing different path assignments is detailed to illustrate our proposed model.
WANG XiaomaoHUANG ChuanheSHI JiaoliFAN XiyinZHOU Hao
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.
WANG XiaomaoHUANG ChuanheZHOU HaoSHI JiaoliHE KaiDAN Feng
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient.
HE KaiHUANG ChuanheZHOU HaoSHI JiaoliWANG XiaomaoDAN Feng