SlideShare a Scribd company logo
A Privacy Leakage Upper Bound Constraint-Based
Approach for Cost-Effective Privacy Preserving of
Intermediate Data Sets in Cloud
ABSTRACT:
Cloud computing provides massive computation power and storage capacity which
enable users to deploy computation and data-intensive applications without
infrastructure investment. Along the processing of such applications, a large
volume of intermediate data sets will be generated, and often stored to save the
cost of recomputing them. However, preserving the privacy of intermediate data
sets becomes a challenging problem because adversaries may recover privacy-
sensitive information by analyzing multiple intermediate data sets. Encrypting
ALL data sets in cloud is widely adopted in existing approaches to address this
challenge. But we argue that encrypting all intermediate data sets are neither
efficient nor cost-effective because it is very time consuming and costly for data-
intensive applications to en/decrypt data sets frequently while performing any
operation on them. In this paper, we propose a novel upper bound privacy leakage
constraint-based approach to identify which intermediate data sets need to be
encrypted and which do not, so that privacy-preserving cost can be saved while the
privacy requirements of data holders can still be satisfied. Evaluation results
demonstrate that the privacy-preserving cost of intermediate data sets can be
significantly reduced with our approach over existing ones where all data sets are
encrypted.
EXISTING SYSTEM:
The privacy concerns caused by retaining intermediate data sets in cloud are
important but they are paid little attention. Storage and computation services in
cloud are equivalent from an economical perspective because they are charged in
proportion to their usage. Thus, cloud users can store valuable intermediate data
sets selectively when processing original data sets in data intensive applications
like medical diagnosis, in order to curtail the overall expenses by avoiding frequent
recomputation to obtain these data sets. Such scenarios are quite common because
data users often reanalyze results, conduct new analysis on intermediate data sets,
or share some intermediate results with others for collaboration. Without loss of
generality, the notion of intermediate data set herein refers to intermediate and
resultant data sets.
However, the storage of intermediate data enlarges attack surfaces so that privacy
requirements of data holders are at risk of being violated. Usually, intermediate
data sets in cloud are accessed and processed by multiple parties, but rarely
controlled by original data set holders. This enables an adversary to collect
intermediate data sets together and menace privacy-sensitive information from
them, bringing considerable economic loss or severe social reputation impairment
to data owners. But, little attention has been paid to such a cloud-specific privacy
issue.
DISADVANTAGES OF EXISTING SYSTEM:
Existing technical approaches for preserving the privacy of data sets stored in
cloud mainly include encryption and anonymization. On one hand, encrypting all
data sets, a straightforward and effective approach, is widely adopted in current
research.
However, processing on encrypted data sets efficiently is quite a challenging task,
because most existing applications only run on unencrypted data sets. Although
recent progress has been made in homomorphic encryption which theoretically
allows performing computation on encrypted data sets, applying current algorithms
are rather expensive due to their inefficiency On the other hand, partial information
of data sets, e.g., aggregate information, is required to expose to data users in most
cloud applications like data mining and analytics. In such cases, data sets are
Anonymized rather than encrypted to ensure both data utility and privacy
preserving. Current privacy-preserving techniques like generalization can
withstand most privacy attacks on one single data set, while preserving privacy for
multiple data sets is still a challenging problem
PROPOSED SYSTEM:
Encrypting all intermediate data sets will lead to high overhead and low efficiency
when they are frequently accessed or processed. As such, we propose to encrypt
part of intermediate data sets rather than all for reducing privacy-preserving cost.
In this paper, we propose a novel approach to identify which intermediate data sets
need to be encrypted while others do not, in order to satisfy privacy requirements
given by data holders. A tree structure is modeled from generation relationships of
intermediate data sets to analyze privacy propagation of data sets.
As quantifying joint privacy leakage of multiple data sets efficiently is challenging,
we exploit an upper bound constraint to confine privacy disclosure. Based on such
a constraint, we model the problem of saving privacy-preserving cost as a
constrained optimization problem. This problem is then divided into a series of
sub-problems by decomposing privacy leakage constraints. Finally, we design a
practical heuristic algorithm accordingly to identify the data sets that need to be
encrypted.
ADVANTAGES OF PROPOSED SYSTEM:
The major contributions of our research are threefold.
 First, we formally demonstrate the possibility of ensuring privacy leakage
requirements without encrypting all intermediate data sets when encryption
is incorporated with anonymization to preserve privacy.
 Second, we design a practical heuristic algorithm to identify which data sets
need to be encrypted for preserving privacy while the rest of them do not.
 Third, experiment results demonstrate that our approach can significantly
reduce privacy-preserving cost over existing approaches, which is quite
beneficial for the cloud users who utilize cloud services in a pay-as-you-go
fashion.
ARCHITECTURE:
ALGORITHM USED:
Algorithm 1: Privacy-Preserving Cost Reducing Heuristic
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : ASP.NET, C#.Net.
• Data Base : SQL Server 2005
REFERENCE:
Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey, and Jinjun Chen, “A
Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective
Privacy Preserving of Intermediate Data Sets in Cloud”, IEEE TRANSACTIONS
ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE
2013.

More Related Content

What's hot (19)

PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
PDF
Dynamic and public auditing with fair arbitration for cloud data
Shakas Technologies
 
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
PPTX
A Little Security For Big Data
Saurabh Kheni
 
DOCX
A secure and dynamic multi keyword ranked
jpstudcorner
 
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
DOCX
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
DOCX
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
Nexgen Technology
 
PDF
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
acijjournal
 
PDF
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
cscpconf
 
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore
 
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
 
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
PPTX
Final 1st
gokulprema
 
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
Dynamic and public auditing with fair arbitration for cloud data
Shakas Technologies
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
JAYAPRAKASH JPINFOTECH
 
A Little Security For Big Data
Saurabh Kheni
 
A secure and dynamic multi keyword ranked
jpstudcorner
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
Nexgen Technology
 
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTION
acijjournal
 
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
cscpconf
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
Final 1st
gokulprema
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 

Viewers also liked (7)

PDF
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
PDF
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 
PDF
The impact of innovation on travel and tourism industries (World Travel Marke...
Brian Solis
 
PDF
Open Source Creativity
Sara Cannon
 
PPSX
Reuters: Pictures of the Year 2016 (Part 2)
maditabalnco
 
PDF
The Six Highest Performing B2B Blog Post Formats
Barry Feldman
 
PDF
The Outcome Economy
Helge Tennø
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 
The impact of innovation on travel and tourism industries (World Travel Marke...
Brian Solis
 
Open Source Creativity
Sara Cannon
 
Reuters: Pictures of the Year 2016 (Part 2)
maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
Barry Feldman
 
The Outcome Economy
Helge Tennø
 
Ad

Similar to A privacy leakage upper bound constraint based approach for cost-effective privacy preserving of intermediate data sets in cloud (20)

PPTX
FINAL REVIEW.pptx
webdevelope
 
PDF
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
A scalabl e and cost effective framework for privacy preservation over big d...
amna alhabib
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
 
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
PDF
50120140507005
IAEME Publication
 
PDF
50120140507005 2
IAEME Publication
 
PDF
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
PDF
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
FINAL REVIEW.pptx
webdevelope
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 
International Journal of Engineering Research and Development
IJERD Editor
 
A scalabl e and cost effective framework for privacy preservation over big d...
amna alhabib
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
50120140507005
IAEME Publication
 
50120140507005 2
IAEME Publication
 
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
 
Ad

Recently uploaded (20)

PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PDF
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
Dimensions of Societal Planning in Commonism
StefanMz
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPT on the Development of Education in the Victorian England
Beena E S
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 

A privacy leakage upper bound constraint based approach for cost-effective privacy preserving of intermediate data sets in cloud

  • 1. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud ABSTRACT: Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate data sets will be generated, and often stored to save the cost of recomputing them. However, preserving the privacy of intermediate data sets becomes a challenging problem because adversaries may recover privacy- sensitive information by analyzing multiple intermediate data sets. Encrypting ALL data sets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate data sets are neither efficient nor cost-effective because it is very time consuming and costly for data- intensive applications to en/decrypt data sets frequently while performing any operation on them. In this paper, we propose a novel upper bound privacy leakage constraint-based approach to identify which intermediate data sets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate data sets can be
  • 2. significantly reduced with our approach over existing ones where all data sets are encrypted. EXISTING SYSTEM: The privacy concerns caused by retaining intermediate data sets in cloud are important but they are paid little attention. Storage and computation services in cloud are equivalent from an economical perspective because they are charged in proportion to their usage. Thus, cloud users can store valuable intermediate data sets selectively when processing original data sets in data intensive applications like medical diagnosis, in order to curtail the overall expenses by avoiding frequent recomputation to obtain these data sets. Such scenarios are quite common because data users often reanalyze results, conduct new analysis on intermediate data sets, or share some intermediate results with others for collaboration. Without loss of generality, the notion of intermediate data set herein refers to intermediate and resultant data sets. However, the storage of intermediate data enlarges attack surfaces so that privacy requirements of data holders are at risk of being violated. Usually, intermediate data sets in cloud are accessed and processed by multiple parties, but rarely controlled by original data set holders. This enables an adversary to collect intermediate data sets together and menace privacy-sensitive information from
  • 3. them, bringing considerable economic loss or severe social reputation impairment to data owners. But, little attention has been paid to such a cloud-specific privacy issue. DISADVANTAGES OF EXISTING SYSTEM: Existing technical approaches for preserving the privacy of data sets stored in cloud mainly include encryption and anonymization. On one hand, encrypting all data sets, a straightforward and effective approach, is widely adopted in current research. However, processing on encrypted data sets efficiently is quite a challenging task, because most existing applications only run on unencrypted data sets. Although recent progress has been made in homomorphic encryption which theoretically allows performing computation on encrypted data sets, applying current algorithms are rather expensive due to their inefficiency On the other hand, partial information of data sets, e.g., aggregate information, is required to expose to data users in most cloud applications like data mining and analytics. In such cases, data sets are Anonymized rather than encrypted to ensure both data utility and privacy preserving. Current privacy-preserving techniques like generalization can withstand most privacy attacks on one single data set, while preserving privacy for multiple data sets is still a challenging problem
  • 4. PROPOSED SYSTEM: Encrypting all intermediate data sets will lead to high overhead and low efficiency when they are frequently accessed or processed. As such, we propose to encrypt part of intermediate data sets rather than all for reducing privacy-preserving cost. In this paper, we propose a novel approach to identify which intermediate data sets need to be encrypted while others do not, in order to satisfy privacy requirements given by data holders. A tree structure is modeled from generation relationships of intermediate data sets to analyze privacy propagation of data sets. As quantifying joint privacy leakage of multiple data sets efficiently is challenging, we exploit an upper bound constraint to confine privacy disclosure. Based on such a constraint, we model the problem of saving privacy-preserving cost as a constrained optimization problem. This problem is then divided into a series of sub-problems by decomposing privacy leakage constraints. Finally, we design a practical heuristic algorithm accordingly to identify the data sets that need to be encrypted. ADVANTAGES OF PROPOSED SYSTEM: The major contributions of our research are threefold.
  • 5.  First, we formally demonstrate the possibility of ensuring privacy leakage requirements without encrypting all intermediate data sets when encryption is incorporated with anonymization to preserve privacy.  Second, we design a practical heuristic algorithm to identify which data sets need to be encrypted for preserving privacy while the rest of them do not.  Third, experiment results demonstrate that our approach can significantly reduce privacy-preserving cost over existing approaches, which is quite beneficial for the cloud users who utilize cloud services in a pay-as-you-go fashion. ARCHITECTURE:
  • 6. ALGORITHM USED: Algorithm 1: Privacy-Preserving Cost Reducing Heuristic SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : ASP.NET, C#.Net. • Data Base : SQL Server 2005
  • 7. REFERENCE: Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey, and Jinjun Chen, “A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013.