High-performance pseudo-anonymization of virtual power plant data on a CPU cluster

The considerable move towards the use of renewable energy resources has been provided by the digitization of energy systems with the help of virtual power plants (VPPs). However, due to the coincidence of this move with the introduction of new technologies in information and communications, joining these systems raises concerns about the privacy of personal data. The only real-world approach widely used in this case is to anonymize or pseudonymize the information associated with individuals in data received from distributed measurement devices. In this paper, we propose the method of classifying received data packets into different flows and assigning different access levels for each flow. This method makes data pseudonymous. Before this step, the received data, which has a different format, is unionized. To implement this idea, a tuple space flow classification algorithm is parallelized on a CPU cluster using MPI and OpenMP according to different scenarios. The CPU cluster consists of one head node and two computational nodes for packet classification operations. In this research, two scenarios have been used to run the CPU algorithm in parallel. The first scenario uses MPI and the second scenario uses a combination of MPI and OpenMP libraries. Also, the Tuple Space algorithm has been implemented on the computing systems using the mentioned libraries in the form of two scenarios using OpenMP and MPI. According to our results, the increase in the number of processor cores is linearly correlated with the increase in the speed of classification. Furthermore, while MPI uses more memory than OpenMP, it helps to achieve a higher speed of classification. In the combined method, the maximum speed of flow classification can be achieved if the number of processes and threads is equal to the number of processor cores. In other words, when the sum of processes and threads does not outnumber CPU cores, the least classification time and memory usage can be achieved.


Introduction
The energy crisis is on the rise. The rapid growth of electricity demand, especially in industrial domains with heavy energy consumption, has necessitated the use of distributed renewable energy [1,2]. Simultaneously, with the introduction of controllable systems for energy storage, new energies that are more than needed are imported into electrical storage systems to compensate for uncertainty in the power generation grid when necessary. Accordingly, the concept of virtual power plant (VPP) as a successful method has been proposed to meet the needs in the aggregation of renewable and distributed energies, respond to demands for electricity consumption and control electrical energy storage systems to maximize daily income from the electricity market [3].
The VPP is a set of physical devices producing or consuming energy [4][5][6]. In this complex, generators, storage units, and manageable or flexible loads, each of which forms a virtual entity and interacts together. Along with the centralized models for VPP, hierarchical models of VPP are also presented. In a typical hierarchical model, as illustrated in Fig. 1, power generators, storage units, and low-level flexible loads are used that can be controlled by a remote terminal unit (RTU).
At the middle level is the VPP node. This node is the main operator and decision-making and can be an independent operator or distributed system operator. Such a node is responsible for managing supervised RTU and optimizing the performance of distributed resources as well as coordinating with the market. The knowledge base needed to virtualize resources controlled by RTUs is at the disposal of the VPP node. The required data are collected heterogeneously at specified time intervals from smart electronic devices installed in RTUs and transferred to the VPP node to control and optimize the VPP performance through standard communication mechanisms [6,7]. Since the measurement data are collected from different installations with inhomogeneous scales and units, a unification is performed on them to represent them with the same units, labels, and scales [8]. These data are used for strategic management of customer energy assets, optimal planning of controllable and flexible loads, control of renewable energy producers and storage units, as well as strategic management of service quality provided to endusers.
According to Global Data Protection Regulation (GDPR), any data containing personal information must be anonymized before going through any of the abovementioned interrelated processes in the VPP node [7,[9][10][11][12]. That is, to establish the required degree of trust in real persons who join the VPP, a certain level of security and privacy must be provided. Two common methods for this objective are anonymization and pseudo-anonymization [13]. The former is the changing of personal information so that the individual information about personal or material relationships can no longer be assigned to a certain person or determinable natural person or only with an unreasonably great expense of time, costs, and effort. The latter is the processing of personal data in such a way that the personal data or enlistment of additional information can no longer be traced to a specific person if this additional information is to be stored separately and is subject to technical and organizational measures which ensure that the personal data cannot be assigned to an identified or identifiable natural person. In pseudonymization, the data that would allow for identification are replaced with a code, for example. However, there is a separate key (e.g., in the form of a table) between the subject and the pseudonym, so that it is ultimately still possible to re-identify the subject if one knows this key. In anonymization, however, all identifying characteristics are deleted. Due to the re-identification possibility provided by pseudo-anonymization, it is the more commonly accepted approach [9,10].
Traffic flow classification is essential to a broad range of network processes and management, e.g., privacy-preserving, quality-of-service (QoS) provisioning, and intrusion detection [14,15]. In this paper, we propose a novel pseudo-anonymization method that can be parallelly exploited for VPP data. In this method, the unionized data are first classified into specific flows regarding their source and destination addresses. At this step, a unique flow number is associated with each installation. The corresponding part of data that includes personal information is  Fig. 1 The architecture of Information and Communication Technology (ICT) infrastructure of hierarchical VPP encrypted and stored in a secure database with the flow number as the key.

RTU RTU
Our parallel flow classification method classifies the Internet Packets (IPs) into certain flows according to the address characteristics of their sender and receiver processes. While normalizing them for each stream, providing a certain level of access and confidentiality controls in the knowledge base of the VPP node. Figure 2, illustrates this idea. Our method is based on the classification of internet flows. Also, we explain a method to accelerate our flow classification on the cluster of CPUs and explain different scenarios in implementing that method.
Methods of classification are either hardware-based or software-based. The main disadvantage of hardware-based methods is their restriction in using memories that can be used in parallel searching. Moreover, they have high cost and power consumption [6][7][8]. As a result, they are only appropriate for classifications that have a small number of filters. On the other hand, software-based methods have recently come to the fore [7,9,10]. These methods are highly flexible and more cost-effective. Software-based methods have been widely researched. Many studies have sought to reduce the time and frequency of memory access by making use of certain techniques for developing algorithms and data structures [16,17].
Taylor has categorized classification methods. He mentions four general categories including linear search, decomposition, tuple space, and decision tree [18]. Each algorithm is briefly described below.
Linear search In this algorithm, filters are arranged according to their priority. Each incoming packet is compared with all the filters. The algorithm performs quite efficiently in terms of memory usage; however, the search time increases linearly as the number of filters increases.
Decomposition The problem of multidimensional packet classification can be decomposed into several one-dimensional linear search problems on a single field to apply proven techniques that could search according to a single field. In these methods, the speed of searching the routing table is relatively higher due to their hardware-based implementation along with the parallel execution of the algorithm. Their disadvantage, however, is that their memory usage is remarkably high.
Tuple space This method quickly narrows down the scope of the search by breaking the filter set into tuples. A tuple shows the number of specified bits in the fields of the filter. This group of algorithms is based on the fact that unique tuples are significantly smaller in number than the total number of filters in a filter set.
Decision tree It is a binary tree that is made of filter prefixes. Its nodes hold filters or a subset of filters. Necessary operations are conducted on encountering a single node depending on the algorithm that uses a decision tree. The advantage of this method lies in its parallel functioning. In decision tree-based algorithms, a decision tree is produced based on several fields. In such a tree, the leaves hold filters or subsets of filters. To search by using decision trees, a search key is built from the fields of the packet  header. Afterward, the bits or subsets of the bits of the search key are used to traverse the tree. From among the four methods described above, the tuple space algorithm will be investigated in the present paper. The classification time can be significantly reduced by parallelization of the algorithm, thus providing a compromise between classification time and memory usage.
There are multiple methods for the parallel implementation of algorithms [19][20][21][22][23][24]. One common method is to use a CPU cluster. In the present study, the hierarchical trie algorithm is parallelized for the first time on a CPU cluster.
The paper is organized as follows. Section 2 discusses two tuple space algorithms as well as the classification method in this kind of algorithm. Next, cluster systems and their programming will be described. Then we will have a brief review of the literature on computation clusters and parallelization of packet classification. In Sect. 4, the implementation of the proposed scenarios for parallelization of the tuple space algorithm on a CPU cluster will be described. The results of the implementations will also be analyzed and evaluated in this section. The final section offers some suggestions for further research and practice in the field.

Algorithms and tools
This section describes the structure as well as the classification method of the tuple space algorithm. Afterwards, we shall explain cluster computation and the parallelization tools used for this purpose.

Tuple space algorithm
The tuple space algorithm maps each k-dimensional rule to a tuple with k elements. In such a way that the set of rules mapped to regular tuples with k elements have fixed and definite lengths.
The tuple space algorithm was first proposed by Srivinasan et al. [25]. This method quickly narrows down the search scope of the fields. The main reason for developing a tuple space algorithm is the smaller number of separate tuples compared with the total number of filters. This will be done by breaking the filter sets into tuples. A tuple shows the number of bits specified in each field of the filter. For example, considering 2-dimensional filters, both F1(01*,111*) and F2(10*,010*) map to the tuple [2,3]. An example of a tuple is presented in Table 1.
The execution of this algorithm on the input (11100,11101, 53,25,4) with the filter set of Table 2 is described in the following. The input (11100,11101,53,25,4) contains five fields of a packet header including source IP, Destination IP, source port, destination port, and protocol fields. These fields are shown in order from left to right in Table 2 The binary trees produced based on the source and destination address fields are shown in Fig. 3. The black nodes represent the filters. The corresponding tuples are shown next to these nodes.
In this example, the search is first performed on the corresponding binary tree based on the source and destination address fields. The search paths are shown in the dashed line in Fig. 3, respectively from left o right. The filters corresponding to the tuples encountered on the traversed path are extracted.
In the end, the best matching filter, if any, is specified by a linear search on the filters extracted in the previous step. In the above example, the best matching filter is R4.
The filters corresponding to the tuples encountered on the traversed path are shown in Table 3. As can be seen, the number of filters obtained is smaller than the total number of initial filters. This technique can help to remove a significant number of filters in large filter sets.

Cluster computing
As clusters are intended to increase the processing power or the physical security of information and services, they are more reliable and cost-effective than a single server. In a cluster, the computers are not required to have the same performance; they only have to have identical architectures. The difference in architecture will cause problems in the process of clustering [26,27].
Some applications of clusters include High-Performance Computing (HPC), High Throughput Computing (HTC), High Availability (HA), and High-Performance Systems (HPS). One of the most important of these is HPC clustering services. In HPC, both the software and hardware power of a computer is used in parallel to perform a large amount of processing in a shorter time [28].
Cluster processing is counted as a kind of parallel or distributed processing. The cluster refers to a set of independent computers that are closely interrelated with the whole system and act together as an integrated resource. They can be indeed regarded as a single system. In most cases, the components of a cluster connect through a local network. There should be at least two components at work. In such a structure, the systems need a mediator for transferring messages and a scheduler for allocating resources [26,[28][29][30].
One of the major services provided by cluster systems is high-performance computing (HPC). As mentioned above, this method of clustering is also known as parallel processing [31]. What follows is a brief description of the parallel programming models used in this study.

OpenMP
OpenMP is an API that is widely used for parallel programming with C, C??, or Fortran in shared memory systems. A variety of architectures are supported in this interface including Windows and Unix platforms. This tool provides threads in a cluster system with shared memory. The strength of OpenMP lies in the fact that the parallel and serial versions of a piece of code are remarkably similar. Thus, a serial program in OpenMP can be converted into a parallel program simply by adding several instructions. Other merits of OpenMP include its simple and highly standard conventions, cross-platform structure, and popularity among programmers [31][32][33][34].

MPI
Message passing interface (MPI) is the most widely used method of parallel programming. MPI determines the features of a general API to be used on sharedmemory systems such as clusters. MPI is not a tool as such; it is a communication protocol that, as its name suggests, specifies how parallel systems can exchange messages [32][33][34]. Its major advantage over other methods of   Table 3 The selectional rules of tuple space search based on the rules in Table 2 Filter message transfer is its portability and high speed. Its high speed is explained by the fact that it can be optimized during execution on any hardware configuration. Moreover, its functions can be called in C, C??, Fortran, Java, C#, and Python [35][36][37][38][39]. MPI has various implementations for different operating systems and hardware configurations. One of the implementations is MPICH that is an open-source Linux implementation. The power of MPICH programs lies in their ability to be executed on the majority of important cluster architectures in the world. MPICH includes the C, C??, and Fortran libraries required to use MPI-2. For these reasons, we used MPICH as the message transfer interface in our experiments.

Hybrid method
The hybrid method makes simultaneous use of OpenMP (for cores with shared memory) and MPI (for those with separate memories). However, MPI can also be used for the cores within a single system. Figure 4 illustrates the structure of hybrid architecture. In this study, we use all of the above three methods for parallelization of the tuple space algorithm on a CPU cluster.

Parallel packet classification
This section first addresses the algorithms so far parallelized on GPUs and multi-processor systems and then reviews previous studies of parallelization on GPU clusters.
Among the first studies of parallelization of packet classification algorithms on GPUs is the research conducted by Nottingham et al. in 2009. They theoretically investigated the possibility of parallel implementation of classification algorithms on GPUs [35].
Hung et al. conducted the first applied study in the field in 2011 and investigated the parallelization of two classification algorithms, i.e., BitMap-RFC and BPF, on GPUs in the framework of CUDA. They used three filters for implementation, and evaluation of the classification of 65 random packets [22]. Simultaneously, Deng et al. parallelized linear search algorithm with a combined method that used both GPU and CPU. They confirmed that this combination could increase processing power and decrease the delay in comparison with GPU-based methods. Another study was done in the same year by Pong et al. parallelizing HaRP and HyperCuts algorithms on multi-core processors. In their study, the maximum throughput rates obtained for HaRP and HyperCuts were 30.14 and 4.07 packets per second, respectively [36]. In 2011, Kang et al. implemented the DBS algorithm (an algorithm based on hash tables) along with linear search on both GPU and CPU. The speedup rate of DBS was 11 [37]. In 2014, Varvello et al. parallelized three algorithms on GPU, i.e., linear search, tuple space search, and Bloom search. The maximum speedup rate was 7 [38]. In 2016, Rafiee et al. implemented the hierarchical trie algorithm on a multi-core processor and GPU. For their implementation they used a GeForce GTX 750 graphics card which has four SMs. They used an Intel Core i7-3770L CPU and utilized CUDA and OpenMP for parallelization on GPU and CPU, respectively. Among their five scenarios for GPU and one scenario for CPU, the scenario which used shared memory on GPU had the best performance [39].
A major study of parallelization of packet classification algorithms on multi-core systems is the Zhou et al. [40]. They utilized Pthread for parallel implementation of linear search algorithm and area-based tree search algorithm on a 16-core processor. The maximum throughput achieved was 11.5 Gbps. Qu et al. conducted an influential study in 2015 and implemented a bit-vector decomposition algorithm on multi-core processors. Their parallelization was based on the OpenMP library. Their maximum throughput rate was 14/7 mega packets per second [41]. Tung et al. recently implemented a new parallel packet classification algorithm on an eight-core processor. According to their results, the productivity of the algorithm increased 40 percent on average. Also, the delay in addition and omission of filters had an average reduction of 43 percent. Furthermore, they improved the productivity of cache memory by setting the parameter of the dependence of CPU on threads and [41].
Recent developments subject to change in the Internet of Things (IoT), have motivated many researchers to look solutions for subsequent challenges in energy management,

MPI
Thread0 Thread1 Thread2 Thread0 Thread1 Thread2 OpenMP OpenMP Fig. 4 Combination of MPI and OpenMP programming models load balancing, security provisioning, and edge computing [42]. Software Defined Networking (SDN) has provided a suitable framework for secure processing of the network flows with reasonable speeds [43,44]. Recently, clusters of network processors have been exploited to enhance the speed of SDN networks. Jafarian et al., have fully analyzed SDN anomaly detection mechanisms on clusters of computing nodes [45]. Also, Mei-ling et al., have proposed a novel load balancing algorithm that considers the real-time processing of SDN loads on the cluster of SDN servers [46]. It still has limitations concerning the number of its cores. This is why there is a widespread tendency to cluster systems. CPU clusters have great potential for development. This means that a new computational node can be simply added to it to use more cores simultaneously. Thus, in this study, we use a CPU cluster and apply several different scenarios to classify network packets. In the following, we shall review some parallelized implementations on CPU and GPU to explain the achievements of this type of parallelization. Henty et al. used MPI and OpenMP on a CPU cluster for modeling purposes [19]. They concluded that the performance of this combined method was lower than the MPIalone method due to its overload. They also indicated that the OpenMP-alone method performed better than the combined method in small-scale problems. As their results suggest, this conclusion could not be generalized to all parallelization problems, the outcome depending on the structure of the code as well as on other circumstances. J. Hutter et al. combined MPI with the shared-memory method by using a 1024-core cluster. Their results showed that a major cause of inefficient parallelization in the combined method was connection delay [47]. Cappello et al. applied two methods to numerical simulation problems of aerodynamics, namely, a combined method and an MPI-alone method. According to their findings, the computation efficiency of a cluster depends several parameters such as memory access pattern and hardware performance [48]. In 2018, M. Ferretti et al. implemented Cross Motif search in a parallel form on a CPU cluster. Their study indicated that MPI alone performed better than the combination of MPI and OpenMP [49]. Q. Zhao et al. indicated in 2019 that large-scale numerical simulation for analyzing discrete spherical forms requires large amounts of time. A major factor affecting the efficiency of this simulation is the solving of linear equations in this problem. They used OpenMP, MPI, and combined method for parallelized implementation of this problem on the cluster Sugon TC4600. Their results suggested that the combined method performed better than the other two methods. According to their speedup graph, an increase in the number of processes and threads will increase efficiency as long as this number is less than processor cores [50].
As this review shows, clusters could provide higher parallelization capability for algorithms in different combinations of programming models. It also discloses that the efficiency of a programming model is dependent both on the type of the problem and on the implemented system. In this line, the present study intends to parallelize the tuple space algorithm for the first time on a CPU cluster. Below, we will show that by using different scenarios we can significantly increase packet processing speed and throughput rate.

Implementation of tuple space algorithm
Here we first take a look at the specifications of the implemented cluster and then describe the parallelization of the tuple space algorithm on this cluster by using a combined model.

Specifications of the implemented cluster
Our cluster was implemented on the distributed operating system Rocks which is based on Centos. The typical topology of the Rocks cluster is illustrated by Fig. 5.
Being an open-source operating system, Rocks has been designed to simplify processing, development, and management as well as to enhance performance in parallel cluster systems. Installation of Rocks on a master node requires two network adapters. One adapter should be used for internal communications (eth0) and the other for external communications (eth1). The operating system should be first installed on the master node and then on other computers. Most packages needed for clusters such as MPICH and OpenMPI are installed as default in Rocks [51].
In a cluster, communication between systems is performed through switches. We used a D-Link 100/1000 switch. Also, we used two homogeneous systems with quad-core CPUs for performing computations. Figure 6 depicts the architecture of the systems as well as how they are connected.
As shown in the figure, each system had a separate CPU and memory (i.e., symmetric multiprocessing architecture). The CPU specifications are listed in Table 4. The factors affecting CPU speed include the number of cores, cache memory, and bus speed, the most important one being the number of cores. Increasing the cores allows the CPU to perform more instructions simultaneously.

Using one system
The first scenario As described earlier, OpenMP uses threads for parallelization. All of the systems used have quad-core CPUs. Therefore, the number of required threads in the program varies from 1 to 4. The algorithm of this scenario is presented below. The inputs of the algorithm are the filter set R, the tree structure T, the packets H, and the number of threads N. First, by using the parallelization commands of OpenMP, the forloop is split statically among the four input cores which simultaneously process incoming packets in a parallel manner (Lines 1 and 2). In the end, the index corresponding to the best matching filter is stored in ruleIn-dexArray and returned as output. The length of this array is equal to the number of packets.
The second scenario As in the previous scenario, the criterion is the number of CPU cores; however, processes are used instead of threads. The MPI generates some processes each of which is assigned a file to execute. MPI runs the executable file simultaneously in all the cores. The rank  of each process which is a unique id can be used to separate the packets corresponding to that process. This feature is used in this study to divide the packets among different processes. Figure 2 presents the pseudocode for the algorithm which distributes packets among processes. The inputs to the algorithm are the total number of processes (S), the packets (H), and the rank of each process. By use of the unique rank of each process, the function returns the index of the first (start i ) and the final ( end i ð Þ) packet which are to be classified by the i-th process. In this pseudocode, H i specifies the number of packets assigned to the i-th process.
After distributing the packets among the processes and finding the indexes (end i , start i ) as well as the number of the packets for each process, these values along with the filter set R and the tree structure T are given as arguments to the classification algorithm. As can be seen in Fig. 7, for all the processes, the classification algorithm stores the best matching filter for the i-th process in ruleIndexArray i , which corresponds to ruleIndexArray in the range [start i ;end i ], and returns it as output.

Using two systems
The first scenario This scenario differs from the second one-system scenario only in that it uses MPI processes without making use of any OpenMP thread. In this scenario, the algorithm is executed by a number of different processes. As mentioned earlier, this CPU cluster consists of two systems, each with four cores. Therefore, the maximum number of processes that can be defined is 8.
The second scenario In this scenario, the algorithm is executed by several processes and threads on the systems of the CPU cluster. In fact, this scenario uses a combined MPI-OpenMP method. As this cluster consists of two 4-core systems, for each packet volume the algorithm can

Implementation and evaluation
In this section, first, a software suite is described for generating the filter sets of experimental headers. We will then explain our criteria and evaluate the results of the scenarios presented in Sect. 4.

ClassBench suite
ClassBench which is a simulator based on the C language and Linux platform can generate the filters of classifiers as well as their corresponding headers. This suite produces filter sets that are similar to actual filter sets. It utilizes two modules. The first module generates an arbitrary number of filter sets while the second one generates a set of random packets based on the statistical features of the filters produced by the first module [52]. ClassBench can generate three types of filter sets: Firewall (FW), Access Control (ACL), and Chain (IPC). This suite has been used in many studies [53,54] to generate filters in their evaluation of packet classification methods. We also used this suite to produce filter sets corresponding to IPC2 with 1 k filters as well as 32 k, 64 k, 128 k, 256 k, 512 k, and 1024 k incoming packets in order to evaluate our scenarios. The C?? programs written for each scenario were executed with different numbers of packets and the average results were recorded as the final results of classification.

Evluation metrics
Various criteria exist for evaluating the efficiency of network packet classification methods. These criteria are briefly described below.
Throughput: One of the criteria is throughput. It is defined as the number of packets classified in the unit of time. It is measured in packets per second (PPS).
Classification time Classification time is the elapsed time during which the classification of packets is performed by the classifier system. It is denoted by T cllasification and calculated in two ways for different processes. The first method is to take the maximum time from among the times of all processes because it takes this amount of time to perform all classifications completely. Equation (1) shows how the time is calculated in this method.
T max cllasification ¼ maxft cllasification1 ; t cllasification2 ; . . .:t cllasificationnp As with the second method, the average time is considered instead of the maximum time. This is calculated by dividing the sum of the times by the total number of processes. Equation (2) represents this method.
Speedup Speedup is the result of the division of classification time in the serial mode by classification time in the parallel mode.
Here, T (s, p) is the time for parallel execution of the algorithm, and T(s,1) is the time for serial execution of the algorithm.
Transfer time Transfer time refers to the time needed for copying the required data structures from the CPU memory to the memory of classifier systems.
Processing delay of packets This criterion refers to how long it takes on average to classify a packet.
Memory usage In this study, an IPC filter set was used. The number of these filters is 634, for each of which there exists a source and destination tree with 1648 and 861 nodes, respectively. In Linux, each of these nodes requires 40 bytes of memory, making up a total memory of 40*(1648 ? 861) bytes.
Moreover, a certain amount of memory should also be allocated to packets, filters, and an output array used for displaying the results. Given this, the total memory needed is represented by Memory i . It should be noted that processes have a separate address space. Therefore, to obtain the memory usage of np processes, this amount of memory should be multiplied by np.

Sequential implementation
Time Table 5 shows the classification time for different packet volumes in the two scenarios. The table has three columns that represent classification time in the sequential mode as well as using MPI and OpenMP with different numbers of cores. The results show that, in the sequential mode, by doubling the number of packets the time will approximately double. The reason is that the classification time increases as the number of packets increase.
As the results indicate, in the OpenMP scenario, the algorithm execution time decreases as the number of threads increases. The reason is that the incoming packets are processed by a larger number of threads and the processing load of every single thread is reduced; therefore, the time required for classification decreases. This finding also holds for the MPI scenario because the incoming packets are distributed among different processes and each process performs independently and in parallel with other processes. By comparing the execution time of the algorithm in OpenMP and MPI it can be understood that MPI has a shorter classification time. The packets are processed with higher speed because MPI does the work through several processes whereas OpenMP deals with one process and several threads.
Throughput We defined throughput as the number of classified packets in the unit of time. Figure 7 shows throughput for volumes of 64 K, 256 K, and 1024 K as well as for 2, 3, and 4 processes and threads in the first scenario (using MPI) and the second scenario (using both maximum and mean times).
The results show that in the classification of packets with large volumes, the second mode of the MPI scenario can classify more packets in the unit of time in comparison with OpenMP. Also, in both methods, the maximum number of packets are observed with 4 processes and threads because all processor cores are involved. The numbers below the graph denote the number of threads and processes.
The throughput for 1024 K packets with 4 processes and 4 cores in the OpenMP scenario, the first mode of MPI scenario, and the second mode of the MPI scenario is 0.079, 0.151, and 0.152. The second mode of the MPI scenario classifies 0.07 million packets more than OpenMP.
Memory usage Calculation of the required memory was explained under 5-2. The memory used by the two proposed scenarios is shown in Fig. 8.
Like the previous graph, this figure covers packet volumes of 64 K, 256 K, and 1024 K as well as 2, 3, and 4 processes and threads. It should be noted in this figure that memory usage in MPI increases with the number of processes because each process has an independent address space, but it does not increase with the number of threads in OpenMP.

Parallelization on the CPU cluster
Speedup Fig. 9 shows the speedup of different scenarios run on the CPU cluster concerning to the sequential execution of the algorithm for the size of 256 K. In this figure, the combined MPI-OpenMP is illustrated with 8 processes and 2 and 4 threads. The figure shows that the speedup parameter has a rising trend if MPI alone is used. The reason is that with an increase in the number of cores, more processes are used for classification. Therefore, the packets are distributed among more cores, which results in increased speed of execution and speedup. In the hybrid method, speedup has an increasing trend, but this increase is not observed with more than 4 cores. The reason is that the number of cores in this cluster is 8 and, when using 4 and 2 threads, 8/2 = 4 and 8/4 = 2 processes can bring about desirable results. With an increase in the number of cores, the number of processes also increases. This will lead to interference among the threads of these processes, which could increase execution time and decrease speedup.
Throughput In Fig. 10, the throughput of the different scenarios of the CPU cluster is shown for 256 K with 8 processes and 2 and 4 threads. As in the speedup figure, the hybrid method with 4 more processes has a weaker performance than the MPI-alone method and classifies fewer packets. The reason was explained above when discussing the speedup graph.
Memory usage Fig. 11 shows memory usage for the classification of 1024 K packets in the scenarios run on the CPU cluster. The results show that, as both methods use processes, memory usage in both of them is similar and increases with increasing the number of cores.
The results of the execution of the tuple space algorithm using OpenMP and MPI scenarios on a quad-core system show that requires more memory and performs better than OpenMP. Also, the results from the execution of the algorithm on the CPU cluster show that MPI, as in the one- Fig. 8 The memory usage of OpenMP and MPI scenarios in a system Fig. 9 The speedup of 256 K packets using MPI and the hybrid method (OpenMP-MPI) in the CPU cluster system mode, requires more memory and has a higher performance. However, as using more processes means more memory usage, the highest throughput rate possible can be achieved by defining the number of processes equal to the number of systems in MPI and defining the number of threads equal to the number of cores in each system.

Paralleization on the GPU
The graphics card used is the Nvidia GeForce GTX 960. The graphics card has 8 SMs, and each SM has 128 processing cores, so a total of 1024 cores are available.
Pre-processing time This includes the time of construction of TupleSpace trees and transferring them and synthetic packets to the global memory of GPU. In Table 6, the preprocessing time for the different numbers of packets has been shown. The preprocessing time doubles as the number of packets doubles; for example, for 128 K of packets, this time is 0.33 s, while for 256 k of packets, it has increased to 0.69 s.
Classification time Table 7 shows the implementation results of classifying the different number of input packets with 1024 filters of IPC2 using Tuple Space. The second column is the computation time of the kernel or the packet classification time. From the table, it is evident that this Fig. 10 The throughput of 256 K packets using MPI and the hybrid method (OpenMP-MPI) in the CPU cluster

Comparing results
In this section, the performance of all three implementations is compared. Figure 12 compares the performance of the parallelization scenarios in classifying 1024 K of packets using IPC2 filters. As it is clear when using only one CPU (quad-core CPU), the throughput is 2.3 million packs per second. The throughput of the CPUclusterb is 4.72 million packs per second. Due to the larger number of cores and, therefore, faster parallelization, the GPU can handle 13.23 million more packets in unit time. According to the results, the throughput of the CPU cluster in classifying the packets with the Tuple Space algorithm is about two times the throughput of the single system running Tuple Space. Although the throughput of the classifying packets with GPU is about four times of the throughput of the CPU cluster system, comparing 1024 cores of GPU and only eight cores of CPU cluster, the average throughput of the CPU cluster is 0.525 MPPS which as compared to 0.004 MPPS throughput of GPU, is considerably higher.
This result confirms that by using appropriate parallelization APIs, the efficiency of a CPU cluster with a limited number of processing cores would be considerably higher than a GPU with many cores.

Conclusion
According to GDPR rules, the provision of an expected level of privacy and security in granting access privilege to the collected data from distributed subscribers of any virtual power plant is inevitable. Though this objective is possible by anonymization and pseudo-anonymization, due to its re-identification possibility, the latter is the more common approach in the ICT community.
In this paper, we presented a novel pseudo-anonymization method that is based on packet classification. In this method, the unionized data are first classified into specific flows regarding their source and destination addresses. At this step, a unique flow number is associated with each installation. The corresponding part of data that includes personal information is encrypted and stored in a secure database with the flow number as the key.
Among different packet classification algorithms, tuple space algorithms were selected and its parallel version on a CPU cluster was constructed. A review of the works conducted in this field showed that implementations of these algorithms on single-processor systems have not yet  Fig. 12 Comparison of the throughput of three scenarios for classifying 1024 packets using Tuple Space achieved desirable throughput and speedup rates and the low processing capability of these systems tends to decrease performance. To overcome this issue, the present paper implemented the tuple space algorithm on a CPU cluster. The achievements of this study are as follows: The tuple space algorithm was first implemented and executed in two scenarios on a quad-core system in a parallel mode. Parallelization in the first scenario was performed using OpenMP and, in the second scenario, MPI was used for distribution of packets and parallelization of the algorithm. The results show that MPI uses more memory but performs better than OpenMP. Next, the algorithm was implemented in two scenarios on a CPU cluster consisting of two quadcore systems. The evaluation results suggest that the first scenario (which used MPI alone) had better outcomes than the hybrid method (MPI-OpenMP). However, it should be noted that MPI uses more memory than OpenMP.
Overall, the findings of this study suggest that the best method for implementing the tuple space algorithm on a CPU cluster is to define the number of processes as equal to the number of systems in MPI and define the number of threads equal to the number of cores in each system. Thus, the highest possible throughput rate can be achieved, which means the largest volume of packets in the unit of time.
In future work, GPU Clusters or a combination of GPU and CPU clusters can be used to increase the speed of packet classification. Given the larger number of computational cores in GPUs, it is expected that packet classification speed will be significantly increased through the optimized parallelization of classification algorithms on GPU clusters. Data availability Not applicable.
Code availability The code will be available upon request sent to the corresponding author.

Declarations
Conflict of interest The authors declare that they have no competing interests.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.
Habib Nasser holds three high degrees as mechatronic engineer, Master in information technology and Ph.D. in complex systems (data scientist) and is specialist in smart technologies development. At Lis-Lab Habib has developed algorithms and mechatronic system for autonomous systems based on the analysis of mutli-sensors. He was previously a scientific research (qualified ISO13485) at Symme Lab to realize an advanced simulator for infant and analyse the problems of bronchitis. He has equipped the body with flexible sensors and a web-based application to clean and analyse the different information. At Ecosteering, he has developed a patented connected occupational clothing to detect painful postures in real time, especially to promote active aging and mitigate MSDs. At RDI'UP, Habib is the CEO and co-founder and he is interested in ML field and data analytics in healthcare and energy sectors.