Paolo Giaccone’s research while affiliated with Consorzio Nazionale Interuniversitario per le Telecomunicazioni and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (200)


A “Big-Spine” Abstraction: Flow Prioritization With Spatial Diversity in The Data Center Network
  • Conference Paper

July 2024

·

5 Reads

Alessandro Cornacchia

·

·

Paolo Giaccone

·




Flows‐monitoring pipeline through WiFi scanner leveraging WiFi probe request messages.
When adding a new element to the Bloom filter, the input is processed using a set of k$$ k $$ independent hash functions. The resulting values from these hash functions (i.e., 0, 2, 8) serve as indices to access the Bloom filter array. At each corresponding index, the bit is set to 1. This process is repeated for each new input value.
Elements v1,v2,v3$$ {v}_1,{v}_2,{v}_3 $$ belonging to the hiding set of Bloom filter of 10 bits storing x1,x2,x3$$ {x}_1,{x}_2,{x}_3 $$. Arrows indicate the bits that are set to one according to two hash functions H1$$ {H}_1 $$ and H2$$ {H}_2 $$.
Achievable level of γ$$ \gamma $$‐deniability, for different values of anonymity K$$ K $$, when n$$ n $$ MAC addresses are inserted into a Bloom filter with m=10 000$$ m=10\;000 $$ bits and k=7$$ k=7 $$.
Relative error Er$$ {E}_r $$ in counting the number of MAC addresses resulting from the intersection of two Bloom filters.

+1

Privacy‐preserving WiFi‐based crowd monitoring
  • Article
  • Publisher preview available

March 2024

·

37 Reads

·

2 Citations

Transactions on Emerging Telecommunications Technologies

The process of estimating the number of individuals within a defined area, commonly referred to as people counting, is of paramount importance in the realm of safety, security and crisis management. It serves as a crucial tool for accurately monitoring crowd dynamics and facilitating well‐informed decision‐making during critical situations. In our current study, we place a special emphasis on the utilization of the WiFi fingerprint technique, leveraging probe request messages emitted by smart devices as a proxy for people counting. However, it is essential to recognize the evolving landscape of privacy regulations and the concerted efforts by major smart‐device manufacturers to enhance user privacy, exemplified by the introduction of MAC addresses randomization techniques. In this context, we designed a crowd monitoring solution that exploits Bloom filters for ensuring a formal deniability, aligning with the stringent requirements set forth by regulations like the European GDPR. Our proposed solution not only addresses the essential task of people counting but also incorporates advanced privacy‐preserving mechanisms. Importantly, it seamlessly integrates with trajectory‐based crowd monitoring, offering a comprehensive approach to managing crowds while respecting individual privacy rights.

View access options

Dynamic Management of Constrained Computing Resources for Serverless Services

January 2024

·

7 Reads

IEEE Transactions on Network and Service Management

Madhura Adeppady

·

Alberto Conte

·

Paolo Giaccone

·

[...]

·

In resource-constrained cloud systems, e.g., at the network edge or in private clouds, serverless computing is increasingly adopted to deploy microservices-based applications, leveraging its promised high resource efficiency. Provisioning resources to serverless services, however, poses several challenges, due to the high cold-start latency of containers and stringent Service Level Agreement (SLA) requirements of the microservices. In response, we investigate the behavior of containers in different states (i.e., running, warm, or cold) and exploit our experimental observations to formulate an optimization problem that minimizes the energy consumption of the active servers while reducing SLA violations. In light of the problem complexity, we propose a low-complexity algorithm, named AiW, which utilizes a multi-queueing approach to balance energy consumption and system performance by reusing containers effectively and invoking cold-starts only when necessary. To further minimize the energy consumption of data centers, we introduce the two-timescale COmputing resource Management at the Edge (COME) framework, comprising an orchestrator running our proposed AiW algorithm for container provisioning and Dynamic Server Provisioner (DSP) for dynamically activating/deactivating servers in response to AiW’s decisions on request scheduling. COME addresses the mismatch in timescales for resource provisioning decisions at the container and server levels. Extensive performance evaluation through simulation shows AiW’s close match to the optimum and COME’s significant reduction in power consumption by 22–64% compared state-of-the-art alternatives.


MAP-MIND: An Offline Algorithm for Optimizing Game Engine Module Placement in Cloud Gaming

January 2024

·

29 Reads

IEEE Access

Online gaming has seen a significant surge in popularity, becoming a dominant form of entertainment worldwide. This growth has necessitated the evolution of game servers from centralized to distributed models, leading to the emergence of distributed game engines. These engines allow for the distribution of game engine modules (GEMs) across multiple servers, improving scalability and performance. However, this distribution presents a new challenge: the game engine module placement problem. This problem involves strategically placing GEMs to maximize the number of accepted placement requests while minimizing the delay experienced by players, a critical factor in enhancing the gaming experience. The problem can be formulated as an Integer Linear Programming (ILP) model, which provides an optimal solution but suffers from high computational complexity, making it impractical for real-world applications. To address this challenge, this paper introduces two novel heuristic algorithms, MAP-MIND and MAP-MIND*. The MAP-MIND algorithm demonstrates superior performance, achieving near-optimal delay and more than 92% GEM request acceptance in the worst heterogeneous scenarios. The MAP-MIND* algorithm, while slightly under-performing MAP-MIND in terms of delay, proves to be significantly faster, making it a viable alternative for real-world applications with equal GEM request acceptance. The trade-off between the two algorithms offers a flexible approach to GEM placement, balancing performance and computational efficiency.


Fig. 2: Run example of the PD procedure.
Distributed Asynchronous Service Provisioning in the Edge-Cloud Multi-tier Network

December 2023

·

64 Reads

In an edge-cloud multi-tier network, datacenters provide services to mobile users, with each service having specific latency constraints and computational requirements. Deploying such a variety of services while matching their requirements with the available computing resources is challenging. In addition, time-critical services may have to be migrated as the users move, to keep fulfilling their latency constraints. Unlike previous work relying on an orchestrator with an always-updated global view of the available resources and the users' locations, this work envisions a distributed solution to the above problems. In particular, we propose a distributed asynchronous framework for service deployment in the edge-cloud that increases the system resilience by avoiding a single point of failure, as in the case of a central orchestrator. Our solution ensures cost-efficient feasible placement of services, while using negligible bandwidth. Our results, obtained through trace-driven, large-scale simulations, show that the proposed solution provides performance very close to those obtained by state-of-the-art centralized solutions, and at the cost of a small communication overhead.



Privacy-preserving WiFi-based Crowd Monitoring

November 2023

·

20 Reads

The process of estimating the number of individuals within a defined area, commonly referred to as people counting , is of paramount importance in the realm of safety, security and crisis management. It serves as a crucial tool for accurately monitoring crowd dynamics and facilitating well-informed decision-making during critical situations. In our current study, we place a special emphasis on the utilization of the WiFi fingerprint technique, leveraging probe request messages emitted by smart devices as a proxy for people counting. However, it is essential to recognize the evolving landscape of privacy regulations and the concerted efforts by major smart-device manufacturers to enhance user privacy, exemplified by the introduction of MAC addresses randomization techniques. In this context, we designed a crowd monitoring solution that exploits Bloom filters for ensuring a formal deniability , aligning with the stringent requirements set forth by regulations like the European GDPR [1] . Our proposed solution not only addresses the essential task of people counting but also incorporates advanced privacy-preserving mechanisms. Importantly, it seamlessly integrates with trajectory-based crowd monitoring, offering a comprehensive approach to managing crowds while respecting individual privacy rights.



Citations (64)


... Since 2014, device manufacturers have adopted a technique called MAC address randomization, which generates "fake" MAC addresses during the transmission of probe request messages to enhance user privacy. As reported in [30], there is no single method for MAC address randomization; in particular, some devices choose to randomize the entire 48-bit MAC address, while others selectively randomize only the second half of the address, retaining the first 24 bits known as the Organizationally Unique Identifier (OUI). Some articles (e.g. ...

Reference:

Estimating the People Density in Restricted Spaces Using Probe Requests for Wi-Fi Connections
Privacy‐preserving WiFi‐based crowd monitoring

Transactions on Emerging Telecommunications Technologies

... Finally, in our conference paper [1], we proposed a more naive version of AiW. Building upon this foundation, in this work we propose COME, which includes a more effective version of AiW and combines it with DSP to work at two different timescales. ...

Energy-aware Provisioning of Microservices for Serverless Edge Computing
  • Citing Conference Paper
  • December 2023

... However, other works concentrate on stateful container migration. The works [9], [10], mainly target data checkpointing techniques (CRIU) in a general purpose environment, not considering the modern industrial scenario requirements [9], [10]. The modern industrial environment, i.e. ...

Design, Modeling, and Implementation of Robust Migration of Stateful Edge Microservices

IEEE Transactions on Network and Service Management

... This initialization aligns with the previously introduced anonymization noise technique. 3 Building upon the definition of -deniability in Reference 4, we introduced the anonymization noise to control the value of and make it equal to 1. This establishes the formal concept of 1-deniability, ensuring that for every MAC address present in the Bloom filter, there exists at least one other MAC address not in the filter that, if queried, would yield an indistinguishable result from the original, thereby allowing us to deny its presence with certainty. ...

Privacy-Aware Crowd Monitoring and WiFi Traffic Emulation for Effective Crisis Management
  • Citing Conference Paper
  • September 2023

... At last, we mention that an initial version of this work has been presented in [29], [40], sketching stateful migration modeling and connection migration, respectively. Here, we have significantly enhanced our contribution on PAM and COAT, and showcased their effectiveness in practical scenarios. ...

Processing-Aware Migration Model for Stateful Edge Microservices
  • Citing Conference Paper
  • May 2023

... It comprises a framework for creating RF scenarios from ray-tracing models for Field Programmable Gate Array (FPGA)-based emulation platforms and a Software-defined Networking (SDN) channel sounder to characterize the emulated channels. In [76], a framework for creating mobile RF scenarios, including the presence of UAVs, based on real collected data, is discussed. ...

Mobile RF Scenario Design for Massive-Scale Wireless Channel Emulators
  • Citing Conference Paper
  • June 2023

... CRIU, which stands for Checkpoint/Restore in Userspace, deals with the checkpoint of the container's status on its original host and its restoration on the target host. We exploited CRIU's --tcp-established option to guarantee TCP connection persistence after migration [50]. This allows CRIU to obtain the support of Linux Kernel to retrieve and restore the TCP connection status, i.e., it saves the socket state and restores it at the destination. ...

TCP Connection Management for Stateful Container Migration at the Network Edge
  • Citing Conference Paper
  • June 2023

... The latency incurred by the Fabric network during the execution phase mainly consists of two components: the network latency of the communication between client and endorsing peers and the processing latency of each endorsing peer [32]. During the whole endorsement process, the number of peers required to endorse a transaction is driven by the corresponding endorsement policy that is specified in the Endorsement System Chaincode (ESCC). ...

Optimal Endorsement for Network-Wide Distributed Blockchains
  • Citing Article
  • September 2023

IEEE Systems Journal

... Vehicular fog nodes (VFNs), mobile fog nodes carried by moving vehicles, are proposed to handle spatio-temporal variations of demand efficiently. In [13], a hierarchical edge-cloud architecture for providing services to vehicles through virtual network function chains is explored. Each service has specific computational requirements and a target delay, necessitating proper placement of the chain and allocation of computational resources. ...

Dynamic Service Provisioning in the Edge-Cloud Continuum With Bounded Resources

IEEE/ACM Transactions on Networking