[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3627703.3629577acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Snatch: Online Streaming Analytics at the Network Edge

Published: 22 April 2024 Publication History

Abstract

In recent years, we have witnessed a growing trend of content hyper-giants deploying server infrastructure and services close to end-users, in "eyeball" networks. Still, one of the services that remained largely unaffected by this trend is online streaming analytics. This is despite the fact that most of the "big data" is received in real time and is most valuable at the time of arrival. The inability to process requests at the network edge is caused by a common setting where user profiles, necessary for analytics, are stored deep in the data center back-ends. This setting also carries privacy concerns as such user profiles are individually identifiable, yet the users are almost blind to what data is associated with their identities and how the data is analyzed. In this paper, we revise this arrangement, and plant encrypted semantic cookies at the user end. Without altering any of the existing protocols, this enables capturing and analytically pre-processing user requests soon after they are generated, at edge ISPs or content providers' off-nets. In addition, it ensures user anonymity perseverance during the analytics. We design and implement Snatch, a QUIC-based streaming analytics prototype, and demonstrate that it speeds up user analytics by up to 200x, and by 10-30x in the common case.

References

[1]
Alibaba Cloud MMO Gaming Solution Architecture, 2018. https://www.alibabacloud.com/blog/alibaba-cloud-mmo-gaming-solution-architecture_593877.
[2]
General Data Protection Regulation (GDPR), 2018. https://gdpr-info.eu/.
[3]
Chromium Blog: Building a more private web: A path towards making third party cookies obsolete, 2020. https://blog.chromium.org/2020/01/building-more-private-web-path-towards.html.
[4]
Full Third-Party Cookie Blocking and More, 2020. https://webkit.org/blog/10218/full-third-party-cookie-blocking-and-more/.
[5]
How Do I Manage Cookies In Brave?, 2020. https://support.brave.com/hc/en-us/articles/360050634931-How- Do-1-Manage-Cookies-In-Brave-.
[6]
A QUIC implementation in pure Go, 2021. https://github.com/lucas-clemente/quic-go.
[7]
Amazon EC2, 2021. https://aws.amazon.com/ec2/.
[8]
Apache Flink - Stateful Computations over Data Streams, 2021. https://flink.apache.org/.
[9]
Apache Flume, 2021. https://flume.apache.org/.
[10]
Apache Kafka, 2021. https://kafka.apache.org/.
[11]
Apache Spark, 2021. htps://spark.apache.org/.
[12]
Cloudflare - The Web Performance & Security Company, 2021. https://www.cloudflare.com/.
[13]
Cloudping - AWS Latency Monitoring, 2021. https://www.cloudping.co/grid.
[14]
Content Delivery Network (CDN)-Amazon CloudFront, 2021. https://aws.amazon.com/cloudfront/.
[15]
Google Cloud Dataflow, 2021. https://cloud.google.com/dataflow.
[16]
Intel Tofino 2, 2021. https://www.intel.com/content/www/us/en/products/network-io/programmable-ethernet-switch/tofino-2-series.html.
[17]
IP SLA Network Performance - Arelion, 2021. htps://www.arelion.com/our-network/ip-sla-network-performance.html.
[18]
Mysterium Network: Open Web Protocol, 2021. htps://www.mysterium.network/.
[19]
Our Global IP Network - NTT-GIN, 2021. https://www.arelion.com/our-network/ip-sla-network-performance.html.
[20]
P416 Portable Switch Architecture (PSA) - Packet Digest, 2021. htps://p4.org/p4-spec/docs/PSA.html#sec-packet-digest.
[21]
Processing billions of events in real time at Twitter, 2021. https://blog.twitter.com/engineering/en_us/topics/infrastructure/2021/processing-billions-of-events-in-real-time-at-twiter-.
[22]
pyspark.streaming.DStream - PySpark 3.2.0 Documentation, 2021. htps://spark.apache.org/docs/latest/api/python/reference/api/pyspark.streaming.DStream.html.
[23]
RabbitMQ, 2021. htps://www.rabbitmq.com/.
[24]
SLA Performance For Global IP - Sprint, 2021. htps://www.sprint.net/tools/sla-performance/sl.
[25]
Spark Streaming Programming Guide, 2021. htps://spark.apache.org/docs/latest/streaming-programming-guide.html.
[26]
tc(8) --- Linux manual page, 2021. https://man7.org/linux/man-pages/man8/tc.8.html.
[27]
Mira - Real-Time Crowd Analysis, 2022. https://mira.co/solutions/real-time/.
[28]
Firefox rolls out Total Cookie Protection by default to more users worldwide, 2023. htps://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/.
[29]
Anubhavnidhi Abhashkumar, Jeongkeun Lee, Jean Tourrilhes, Sujata Banerjee, Wenfei Wu, Joon-Myung Kang, and Aditya Akella. P5: Policy-driven optimization of p4 pipeline. In Proceedings of the Symposium on SDN Research, pages 136--142, 2017.
[30]
Tyler Akidau, Alex Balikov, Kaya Bekiroglu, Slava Chernyak, Josh Haberman, Reuven Lax, Sam McVeety, Daniel Mills, Paul Nordstrom, and Sam Whittle. Millwheel: Fault-tolerant stream processing at internet scale. Proceedings of the VLDB Endowment, 6(11):1033--1044, 2013.
[31]
Michael Armbrust, Tathagata Das, Joseph Torres, Burak Yavuz, Shixiong Zhu, Reynold Xin, Ali Ghodsi, Ion Stoica, and Matei Zaharia. Structured streaming: A declarative api for real-time applications in apache spark. In Proceedings of the 2018 International Conference on Management of Data, pages 601--613, 2018.
[32]
Magdalena Balazinska, Hari Balakrishnan, Samuel Madden, and Michael Stonebraker. Fault-tolerance in the borealis distributed stream processing system. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 13--24, 2005.
[33]
Tom Barbette, Chen Tang, Haoran Yao, Dejan Kostić, Gerald Q Maguire Jr, Panagiotis Papadimitratos, and Marco Chiesa. A high-speed load-balancer design with guaranteed per-connection-consistency. In 17th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 20), pages 667--683, 2020.
[34]
Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, and Bernhard Seefeld. Prochlo: Strong privacy for analytics in the crowd. In Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017, pages 441--459. ACM, 2017.
[35]
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, et al. P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review, 44(3):87--95, 2014.
[36]
Pat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando Mujica, and Mark Horowitz. Forwarding metamorphosis: Fast programmable match-action processing in hardware for sdn. ACM SIGCOMM Computer Communication Review, 43(4):99--110, 2013.
[37]
Justin Brickell and Vitaly Shmatikov. Efficient anonymity-preserving data collection. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 76--85, 2006.
[38]
Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. {SEPIA}:{Privacy-Preserving} aggregation of {Multi-Domain} network events and statistics. In 19th USENIX Security Symposium (USENIX Security 10), 2010.
[39]
Matthew Caesar and Jennifer Rexford. Bgp routing policies in isp networks. IEEE network, 19(6):5--11, 2005.
[40]
Hung Cao and Monica Wachowicz. Analytics everywhere for streaming iot data. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pages 18--25. IEEE, 2019.
[41]
Hung Cao and Monica Wachowicz. An edge-fog-cloud architecture of streaming analytics for internet of things applications. Sensors, 19(16):3594, 2019.
[42]
Don Carney, Ugur Çetintemel, Mitch Cherniack, Christian Convey, Sangdon Lee, Greg Seidman, Nesime Tatbul, Stan Zdonik, and Michael Stonebraker. Monitoring streams---a new class of data management applications. In VLDB'02:Proceedings of the 28th International Conference on Very Large Databases, pages 215--226. Elsevier, 2002.
[43]
Sirish Chandrasekaran, Owen Cooper, Amol Deshpande, Michael J Franklin, Joseph M Hellerstein, Wei Hong, Sailesh Krishnamurthy, Samuel R Madden, Fred Reiss, and Mehul A Shah. Telegraphcq: continuous dataflow processing. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pages 668--668, 2003.
[44]
Guoqiang Jerry Chen, Janet L Wiener, Shridhar Iyer, Anshul Jaiswal, Ran Lei, Nikhil Simha, Wei Wang, Kevin Wilfong, Tim Williamson, and Serhat Yilmaz. Realtime data processing at facebook. In Proceedings of the 2016 International Conference on Management of Data, pages 1087--1098, 2016.
[45]
Xiaoqi Chen. Implementing AES encryption on programmable switches via scrambled lookup tables. In Ang Chen and Laurent Vanbever, editors, Proceedings of the 2020 ACM SIGCOMM 2020 Workshop on Secure Programmable Network Infrastructure, SPIN@SIGCOMM 2020, Virtual Event, USA, August 14, 2020, pages 8--14. ACM, 2020.
[46]
Sanket Chintapalli, Derek Dagit, Bobby Evans, Reza Farivar, Thomas Graves, Mark Holderbaugh, Zhuo Liu, Kyle Nusbaum, Kishorkumar Patil, Boyang Jerry Peng, et al. Benchmarking streaming computation engines: Storm, flink and spark streaming. In 2016 IEEE international parallel and distributed processing symposium workshops (IPDPSW), pages 1789--1792. IEEE, 2016.
[47]
Brent Chun, David Culler, Timothy Roscoe, Andy Bavier, Larry Peterson, Mike Wawrzoniak, and Mic Bowman. Planetlab: an overlay testbed for broad-coverage services. ACM SIGCOMM Computer Communication Review, 33(3):3--12, 2003.
[48]
Henry Corrigan-Gibbs and Dan Boneh. Prio: Private, robust, and scalable computation of aggregate statistics. In Aditya Akella and Jon Howell, editors, 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017, pages 259--282. USENIX Association, 2017.
[49]
Henry Corrigan-Gibbs, Dan Boneh, and David Mazières. Riposte: An anonymous messaging system handling millions of users. In 2015 IEEE Symposium on Security and Privacy, pages 321--338. IEEE, 2015.
[50]
Marcos Dias de Assuncao, Alexandre da Silva Veith, and Rajkumar Buyya. Distributed data stream processing and edge computing: A survey on resource elasticity and future directions. Journal of Network and Computer Applications, 103:1--17, 2018.
[51]
Jeffrey Dean and Sanjay Ghemawat. Mapreduce: simplified data processing on large clusters. Communications of the ACM, 51(1):107--113, 2008.
[52]
Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. Collecting telemetry data privately. In Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett, editors, Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, pages 3571--3580, 2017.
[53]
Constantine Dovrolis, Krishna Gummadi, Aleksandar Kuzmanovic, and Sascha D Meinrath. Measurement lab: Overview and an invitation to the research community 2010.
[54]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith. Calibrating noise to sensitivity in private data analysis. In Shai Halevi and Tal Rabin, editors, Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, volume 3876 of Lecture Notes in Computer Science, pages 265--284. Springer, 2006.
[55]
Cynthia Dwork and Aaron Roth. The algorithmic foundations of differential privacy Found. Trends Theor. Comput. Sci., 9(3-4):211--407, 2014.
[56]
Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Abhradeep Thakurta. Amplification by shuffling: From local to central diferential privacy via anonymity. In Timothy M. Chan, editor, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6-9, 2019, pages 2468--2479. SIAM, 2019.
[57]
Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. RAPPOR: randomized aggregatable privacy-preserving ordinal response. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1054--1067. ACM, 2014.
[58]
Keith B. Frikken and Philippe Golle. Private social network analysis: how to assemble pieces of a graph privately. In Ari Juels and Marianne Winslett, editors, Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pages 89--98. ACM, 2006.
[59]
Zacharias Georgiou, Moysis Symeonides, Demetris Trihinas, George Pallis, and Marios D Dikaiakos. Streamsight: A query-driven framework for streaming analytics in edge computing. In 2018 IEEE/ACM 11th International Conference on Utility and Cloud Computing (UCC), pages 143--152. IEEE, 2018.
[60]
Petros Gigis, Matt Calder, Lefteris Manassakis, George Nomikos, Vasileios Kotronis, Xenofontas Dimitropoulos, Ethan Katz-Bassett, and Georgios Smaragdakis. Seven years in the life of hypergiants' off-nets. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference, pages 516--533, 2021.
[61]
Robert M. Gray and David L. Neuhoff. Quantization. IEEE Trans. Inf. Theory, 44(6):2325--2383, 1998.
[62]
Susan Hohenberger, Steven Myers, Rafael Pass, et al. Anonize: A large-scale anonymous survey system. In 2014 IEEE Symposium on Security and Privacy, pages 375--389. IEEE, 2014.
[63]
Chi-Yao Hong, Subhasree Mandal, Mohammad Al-Fares, Min Zhu, Richard Alimi, Chandan Bhagat, Sourabh Jain, Jay Kaimal, Shiyu Liang, Kirill Mendelev, et al. B4 and after: managing hierarchy, partitioning, and asymmetry for availability and scale in google's software-defined wan. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pages 74--87, 2018.
[64]
Pei Huang, Xiaonan Zhang, Linke Guo, and Ming Li. Incentivizing crowdsensing-based noise monitoring with differentially-private locations. IEEE Trans. Mob. Comput., 20(2):519--532, 2021.
[65]
Nikita Ivkin, Zhuolong Yu, Vladimir Braverman, and Xin Jin. Qpipe: Quantiles sketch fully in the data plane. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, pages 285--291, 2019.
[66]
Xin Jin, Xiaozhou Li, Haoyu Zhang, Robert Soulé, Jeongkeun Lee, Nate Foster, Changhoon Kim, and Ion Stoica. Netcache: Balancing key-value stores with fast in-network caching. In Proceedings of the 26th Symposium on Operating Systems Principles, pages 121--136, 2017.
[67]
Albert Jonathan, Abhishek Chandra, and Jon Weissman. Multi-query optimization in wide-area streaming analytics. In Proceedings of the ACM symposium on cloud computing, pages 412--425, 2018.
[68]
Taiwo Kolajo, Olawande Daramola, and Ayodele Adebiyi. Big data stream analysis: a systematic literature review. Journal of Big Data, 6(1):1--30, 2019.
[69]
Logan Kugler. How the internet spans the globe. Communications of the ACM, 63(1):14--16, 2019.
[70]
Sanjeev Kulkarni, Nikunj Bhagat, Maosong Fu, Vikas Kedigehalli, Christopher Kellogg, Sailesh Mittal, Jignesh M Patel, Karthik Ramasamy, and Siddarth Taneja. Twitter heron: Stream processing at scale. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pages 239--250, 2015.
[71]
Albert Kwon, David Lazar, Srinivas Devadas, and Bryan Ford. Riffle. Proceedings on Privacy Enhancing Technologies, 2016(2):115--134, 2016.
[72]
ChonLam Lao, Yanfang Le, Kshiteej Mahajan, Yixi Chen, Wenfei Wu, Aditya Akella, and Michael M Swift. Atp: In-network aggregation for multi-tenant learning. In NSDI, pages 741--761, 2021.
[73]
Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. Flowradar: A better netflow for data centers. In 13th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16), pages 311--324, 2016.
[74]
Shihan Lin, Rui Xin, Aayush Goel, and Xiaowei Yang. Invicloak: An end-to-end approach to privacy and performance in web content distribution. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pages 1947--1961. ACM, 2022.
[75]
Yehuda Lindell. Fast cut-and-choose-based protocols for malicious and covert adversaries. Journal of Cryptology, 29(2):456--490, 2016.
[76]
Zaoxing Liu, Antonis Manousis, Gregory Vorsanger, Vyas Sekar, and Vladimir Braverman. One sketch to rule them all: Rethinking network flow monitoring with univmon. In Proceedings of the 2016 ACM SIGCOMM Conference, pages 101--114, 2016.
[77]
Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches. In 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021.
[78]
Rui Miao, Hongyi Zeng, Changhoon Kim, Jeongkeun Lee, and Minlan Yu. Silkroad: Making stateful layer-4 load balancing fast and cheap using switching asics. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pages 15--28, 2017.
[79]
Mehdi Mohammadi, Ala Al-Fuqaha, Sameh Sorour, and Mohsen Guizani. Deep learning for iot big data and streaming analytics: A survey. IEEE Communications Surveys & Tutorials, 20(4):2923--2960, 2018.
[80]
Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, and Dan Boneh. Privacy-preserving matrix factorization. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 801--812, 2013.
[81]
Raluca Ada Popa, Andrew J Blumberg, Hari Balakrishnan, and Frank H Li. Privacy and accountability for location-based aggregate statistics. In Proceedings of the 18th ACM conference on Computer and communications security, pages 653--666, 2011.
[82]
Dan RK Ports and Jacob Nelson. When should the network be the computer? In Proceedings of the Workshop on Hot Topics in Operating Systems, pages 209--215, 2019.
[83]
Qifan Pu, Ganesh Ananthanarayanan, Peter Bodik, Srikanth Kandula, Aditya Akella, Paramvir Bahl, and Ion Stoica. Low latency geodistributed data analytics. ACM SIGCOMM Computer Communication Review, 45(4):421--434, 2015.
[84]
Ariel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S Pai, and Michael J Freedman. Aggregation and degradation in Jetstream: Streaming analytics in the wide area. In 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14), pages 275--288, 2014.
[85]
Edo Roth, Karan Newatia, Yiping Ma, Ke Zhong, Sebastian Angel, and Andreas Haeberlen. Mycelium: Large-scale distributed graph queries with differential privacy. In Robbert van Renesse and Nickolai Zeldovich, editors, SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, Virtual Event / Koblenz, Germany, October 26-29, 2021, pages 327--343. ACM, 2021.
[86]
Mario A Sánchez, John S Otto, Zachary S Bischof, David R Choffnes, Fabián E Bustamante, Balachander Krishnamurthy, and Walter Willinger. Dasu: Pushing experiments to the internet's edge. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13), pages 487--499, 2013.
[87]
Amedeo Sapio, Marco Canini, Chen-Yu Ho, Jacob Nelson, Panos Kalnis, Changhoon Kim, Arvind Krishnamurthy, Masoud Moshref, Dan Ports, and Peter Richtarik. Scaling distributed machine learning with in-network aggregation. In 18th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 21), pages 785--808, 2021.
[88]
Anirudh Sivaraman, Alvin Cheung, Mihai Budiu, Changhoon Kim, Mohammad Alizadeh, Hari Balakrishnan, George Varghese, Nick McKeown, and Steve Licking. Packet transactions: High-level programming for line-rate switches. In Proceedings of the 2016 ACM SIGCOMM Conference, pages 15--28, 2016.
[89]
RIPE NCC Staff. Ripe atlas: A global internet measurement network. Internet Protocol Journal, 18(3), 2015.
[90]
Apple's Differential Privacy Team. Learning Privacy at Scale, 2021. https://machinelearning.apple.com/research/learning-with-privacy-at-scale.
[91]
Ankit Toshniwal, Siddarth Taneja, Amit Shukla, Karthik Ramasamy, Jignesh M Patel, Sanjeev Kulkarni, Jason Jackson, Krishna Gade, Maosong Fu, Jake Donham, et al. Storm@ twitter. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pages 147--156, 2014.
[92]
Michael Trusov, Liye Ma, and Zainab Jamal. Crumbs of the cookie: User profiling in customer-base analysis and behavioral targeting. Mark. Sci., 35(3):405--426, 2016.
[93]
Han Wang, Robert Soulé, Huynh Tu Dang, Ki Suh Lee, Vishal Shrivastav, Nate Foster, and Hakim Weatherspoon. P4fpga: A rapid prototyping framework for p4. In Proceedings of the Symposium on SDN Research, pages 122--135, 2017.
[94]
David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. Dissent in numbers: Making strong anonymity scale. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), pages 179--182, 2012.
[95]
Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, and Aleksandar Kuzmanovic. Mosaic: quantifying privacy leakage in mobile networks. In Dah Ming Chiu, Jia Wang, Paul Barford, and Srinivasan Seshan, editors, ACM SIGCOMM 2013 Conference, SIGCOMM 2013, Hong Kong, August 12-16, 2013, pages 279--290. ACM, 2013.
[96]
Yunming Xiao, Matteo Varvello, and Aleksandar Kuzmanovic. Monetizing spare bandwidth: The case of distributed vpns. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 6(2):33:1-33:27, 2022.
[97]
Rui Xin, Shihan Lin, and Xiaowei Yang. Quantifying user password exposure to third-party cdns. In Passive and Active Measurement - 24th International Conference, PAM 2023, Virtual Event, March 21-23, 2023, Proceedings, volume 13882 of Lecture Notes in Computer Science, pages 652--668. Springer, 2023.
[98]
Zhaoqi Xiong and Noa Zilberman. Do switches dream of machine learning? toward in-network classification. In Proceedings of the 18th ACM workshop on hot topics in networks, pages 25--33, 2019.
[99]
Dingqi Yang, Bingqing Qu, and Philippe Cudré-Mauroux. Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Transactions on Knowledge and Data Engineering, 31(3):507--520, 2018.
[100]
Zhiqiang Yang, Sheng Zhong, and Rebecca N. Wright. Anonymity-preserving data collection. In Robert Grossman, Roberto J. Bayardo, and Kristin P. Bennett, editors, Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005, pages 334--343. ACM, 2005.
[101]
Yifan Yuan, Omar Alama, Jiawei Fei, Jacob Nelson, Dan R. K. Ports, Amedeo Sapio, Marco Canini, and Nam Sung Kim. Unlocking the power of inline floating-point operations on programmable switches. In Amar Phanishayee and Vyas Sekar, editors, 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022, pages 683--700. USENIX Association, 2022.
[102]
Matei Zaharia, Tathagata Das, Haoyuan Li, Timothy Hunter, Scott Shenker, and Ion Stoica. Discretized streams: Fault-tolerant streaming computation at scale. In Proceedings of the twenty-fourth ACM symposium on operating systems principles, pages 423--438, 2013.
[103]
Ben Zhang, Xin Jin, Sylvia Ratnasamy, John Wawrzynek, and Edward A Lee. Awstream: Adaptive wide-area streaming analytics. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pages 236--252, 2018.

Index Terms

  1. Snatch: Online Streaming Analytics at the Network Edge

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        EuroSys '24: Proceedings of the Nineteenth European Conference on Computer Systems
        April 2024
        1245 pages
        ISBN:9798400704376
        DOI:10.1145/3627703
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 April 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Badges

        • Best Student Paper

        Author Tags

        1. Network Edge
        2. Online Streaming Analytics

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        EuroSys '24
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 241 of 1,308 submissions, 18%

        Upcoming Conference

        EuroSys '25
        Twentieth European Conference on Computer Systems
        March 30 - April 3, 2025
        Rotterdam , Netherlands

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 218
          Total Downloads
        • Downloads (Last 12 months)218
        • Downloads (Last 6 weeks)25
        Reflects downloads up to 10 Dec 2024

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media