Anatoly Petrovich Durakovsky, S. Dvoryankin, V. Gorbatov
This paper suggests a conceptual mechanism for increasing the security level of the global information community, national information technology infrastructures (e-governments) and private cloud structures, which uses the logical characteristic of IPv6-protocol. The mechanism is based on the properties of the IPv6-header and, in particular, rules of coding IPv6-addresses.
{"title":"Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds","authors":"Anatoly Petrovich Durakovsky, S. Dvoryankin, V. Gorbatov","doi":"10.1109/FiCloud.2017.11","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.11","url":null,"abstract":"This paper suggests a conceptual mechanism for increasing the security level of the global information community, national information technology infrastructures (e-governments) and private cloud structures, which uses the logical characteristic of IPv6-protocol. The mechanism is based on the properties of the IPv6-header and, in particular, rules of coding IPv6-addresses.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) as a service is the ultimate goal of employing cloud computing paradigm for initiating IoT application scenarios. Due to the nature of IoT ecosystems, an IoT application should be distributed, programmable and autonomic; also, it requires to support heterogeneity, security and privacy by following design patterns involved in creating IoT systems. A multi-layer cloud architecture comprising of a high-capacity core center that is connected, through high speed links, to geographically distributed smart edges seem appropriate for highly distributed and heterogeneous IoT applications. Building upon our previous initiatives and inspired by the Infrastructure as Code (IoC) paradigm, in this paper, we propose and evaluate a hierarchical, programmable and autonomic IoT platform based on the microservice models. Our platform supports big data, local/edge data processing, high level of programmability and runtime autonomic management. The autonomic management system ensures the service availability, quality of service and optimized resource utilization in the whole IoT application components autonomously. The primary results affirm a promising future of our platform toward realization of IoT as a service.
{"title":"SAVI-IoT: A Self-Managing Containerized IoT Platform","authors":"Hamzeh Khazaei, H. Bannazadeh, A. Leon-Garcia","doi":"10.1109/FiCloud.2017.27","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.27","url":null,"abstract":"Internet of Things (IoT) as a service is the ultimate goal of employing cloud computing paradigm for initiating IoT application scenarios. Due to the nature of IoT ecosystems, an IoT application should be distributed, programmable and autonomic; also, it requires to support heterogeneity, security and privacy by following design patterns involved in creating IoT systems. A multi-layer cloud architecture comprising of a high-capacity core center that is connected, through high speed links, to geographically distributed smart edges seem appropriate for highly distributed and heterogeneous IoT applications. Building upon our previous initiatives and inspired by the Infrastructure as Code (IoC) paradigm, in this paper, we propose and evaluate a hierarchical, programmable and autonomic IoT platform based on the microservice models. Our platform supports big data, local/edge data processing, high level of programmability and runtime autonomic management. The autonomic management system ensures the service availability, quality of service and optimized resource utilization in the whole IoT application components autonomously. The primary results affirm a promising future of our platform toward realization of IoT as a service.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the near future, it is expected that a large number of machine-to-machine (M2M) communication devices will provide with ubiquitous information and services. Random access protocols like ALOHA ans CSMA have been considered for M2M networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that deploys reservation and data packets (FSA-RDP), in a scenario where a controller node collect data packets transmitted by a finite number of M2M devices. In FSA-RDP, frames of variable length are divided in two parts, the reservation and data subframes. During the reservation subframe, active devices send short reservation packets to the controller. The controller assigns reserved slots in the data subframe to those devices that succeeded with the reservation. Two queue disciplines are considered, the First In First Out - Blocking (FIFO-BL) and the Last In First Out - Push-Out (LIFO-PO). We develop a discrete time Markov chain to derive the protocol efficiency. For the FSARDP protocol, we also derive the cumulative distribution function of the delay for data packets that are successfully transmitted, when deploying both queue disciplines. Numerical results show that the protocol efficiency of FSA-RDP is between one and two orders of magnitude larger than the efficiency of the conventional Frame Slotted ALOHA. In addition, we show that the difference between the packet delay for FIFO-BL and LIFO-PO is only significant in scenarios with high load and high collision rate.
{"title":"Performance Evaluation of Framed Slotted ALOHA with Reservation Packets for M2M Networks","authors":"V. Giner, J. Martínez-Bauset","doi":"10.1109/FiCloud.2017.38","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.38","url":null,"abstract":"In the near future, it is expected that a large number of machine-to-machine (M2M) communication devices will provide with ubiquitous information and services. Random access protocols like ALOHA ans CSMA have been considered for M2M networks for their simplicity of operation. This paper evaluates the performance of a Frame Slotted-ALOHA protocol that deploys reservation and data packets (FSA-RDP), in a scenario where a controller node collect data packets transmitted by a finite number of M2M devices. In FSA-RDP, frames of variable length are divided in two parts, the reservation and data subframes. During the reservation subframe, active devices send short reservation packets to the controller. The controller assigns reserved slots in the data subframe to those devices that succeeded with the reservation. Two queue disciplines are considered, the First In First Out - Blocking (FIFO-BL) and the Last In First Out - Push-Out (LIFO-PO). We develop a discrete time Markov chain to derive the protocol efficiency. For the FSARDP protocol, we also derive the cumulative distribution function of the delay for data packets that are successfully transmitted, when deploying both queue disciplines. Numerical results show that the protocol efficiency of FSA-RDP is between one and two orders of magnitude larger than the efficiency of the conventional Frame Slotted ALOHA. In addition, we show that the difference between the packet delay for FIFO-BL and LIFO-PO is only significant in scenarios with high load and high collision rate.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Celesti, Lorenzo Carnevale, A. Galletta, M. Fazio, M. Villari
The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On the basis of IoT Clouds the container virtualisation is becoming an even more prominent technology that allows them to deploy and manage, in a flexible fashion, micro-services within IoT devices. In this paper, we specifically focus on micro-service reliability in IoT devices. In particular, we propose a system based on container virtualisation that allows IoT Clouds to carry out fault-tolerance when a micro-service running on an IoT device fails. Experiments prove that the overheard introduced in our system by container virtualisation does not negatively affect performances when a micro-service is replaced due to a failure.
{"title":"A Watchdog Service Making Container-Based Micro-services Reliable in IoT Clouds","authors":"A. Celesti, Lorenzo Carnevale, A. Galletta, M. Fazio, M. Villari","doi":"10.1109/FiCloud.2017.57","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.57","url":null,"abstract":"The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On the basis of IoT Clouds the container virtualisation is becoming an even more prominent technology that allows them to deploy and manage, in a flexible fashion, micro-services within IoT devices. In this paper, we specifically focus on micro-service reliability in IoT devices. In particular, we propose a system based on container virtualisation that allows IoT Clouds to carry out fault-tolerance when a micro-service running on an IoT device fails. Experiments prove that the overheard introduced in our system by container virtualisation does not negatively affect performances when a micro-service is replaced due to a failure.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luís Nóbrega, P. Pedreiras, Pedro Gonçalves, Sergio Silva
The use of animals, specially ovines, for controlling infesting species in crops is an ancient method that has several advantages with respect to the use of chemical and/or mechanical techniques. Shepherds required to supervise animals, are getting increasingly less available and are costly. Over the last years, technologies for automatic animal supervision have been investigated, typically including devices to carry out localization, apply stimulus to the animals and, in some cases, report health data. Ovines have a relatively small size, which constrains the maximum weight that they can carry on, and consequently, imply that a practical system must be highly energy-efficient, to allow building light and small devices with enough autonomy. This paper presents a new system for sheep grazing control, developed in the scope of the SheepIT project. The focus of the paper is on the global communication architecture, which is a fundamental aspect for the overall system efficiency. The paper also includes simulation and experimental results that address the scalability and energy consumption aspects of the system.
{"title":"Energy Efficient Design of a Pasture Sensor Network","authors":"Luís Nóbrega, P. Pedreiras, Pedro Gonçalves, Sergio Silva","doi":"10.1109/FiCloud.2017.36","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.36","url":null,"abstract":"The use of animals, specially ovines, for controlling infesting species in crops is an ancient method that has several advantages with respect to the use of chemical and/or mechanical techniques. Shepherds required to supervise animals, are getting increasingly less available and are costly. Over the last years, technologies for automatic animal supervision have been investigated, typically including devices to carry out localization, apply stimulus to the animals and, in some cases, report health data. Ovines have a relatively small size, which constrains the maximum weight that they can carry on, and consequently, imply that a practical system must be highly energy-efficient, to allow building light and small devices with enough autonomy. This paper presents a new system for sheep grazing control, developed in the scope of the SheepIT project. The focus of the paper is on the global communication architecture, which is a fundamental aspect for the overall system efficiency. The paper also includes simulation and experimental results that address the scalability and energy consumption aspects of the system.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).
{"title":"Secure Self-Destruction of Shared Data in Multi-CloudIoT","authors":"Farida Ali Guechi, R. Maamri","doi":"10.1109/FiCloud.2017.31","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.31","url":null,"abstract":"Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the paper, a location-based reminder application iDoRemind is developed to assist people in remembering and managing their everyday activities. iDoRemind overcomes the weakness of the existing location-based reminder applications by repeated alerting the user and suggesting the alternative locations based on users' preferences and their current location. The suggested locations are ranked according to the calculated preference-ratio. In addition, the reminders can be shared in a group or social media. The group option makes it easier for people to manage group activities. It has been shown in the evaluation that users are highly satisfied with the services provided by iDoRemind.
{"title":"iDoRemind: A Location-Based Reminder Application for Android","authors":"Srihari Reddy Pamulapati, Longzhuang Li","doi":"10.1109/FiCloud.2017.9","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.9","url":null,"abstract":"In the paper, a location-based reminder application iDoRemind is developed to assist people in remembering and managing their everyday activities. iDoRemind overcomes the weakness of the existing location-based reminder applications by repeated alerting the user and suggesting the alternative locations based on users' preferences and their current location. The suggested locations are ranked according to the calculated preference-ratio. In addition, the reminders can be shared in a group or social media. The group option makes it easier for people to manage group activities. It has been shown in the evaluation that users are highly satisfied with the services provided by iDoRemind.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114953795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile devices have been increasing in both number and power. While devices such as smartphones gain capabilities, an increasing number of users rely on them to complete more and more tasks. One of the most significant constraints of mobile devices is the necessary reliance on battery power. This limitation can be circumvented by operating the device while it is charging; however, this approach has the potential to create a conflict of goals. Clearly, users want to continue to operate their devices at the same time that they also want to achieve a certain level of battery charge in a given charging period. Unfortunately, such use of the device might increase the time needed to achieve their charging goals. In this paper, we present a preliminary exploration of the effects of independent components on the charging times of one mobile device: the smartphone. We provide the design of a data gathering framework that heavily exercises particular smartphone components while monitoring battery charge rate. The data generated from this framework can be used to create models for estimating the impacts of the individual components on battery charge times. Our empirical study demonstrates that different components can have significant impacts on smartphone charging rates.
{"title":"Modeling the Effects of Independent Components on Mobile Device Charging Times","authors":"Mathew Schlichting, Jason Sawin","doi":"10.1109/FiCloud.2017.59","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.59","url":null,"abstract":"Mobile devices have been increasing in both number and power. While devices such as smartphones gain capabilities, an increasing number of users rely on them to complete more and more tasks. One of the most significant constraints of mobile devices is the necessary reliance on battery power. This limitation can be circumvented by operating the device while it is charging; however, this approach has the potential to create a conflict of goals. Clearly, users want to continue to operate their devices at the same time that they also want to achieve a certain level of battery charge in a given charging period. Unfortunately, such use of the device might increase the time needed to achieve their charging goals. In this paper, we present a preliminary exploration of the effects of independent components on the charging times of one mobile device: the smartphone. We provide the design of a data gathering framework that heavily exercises particular smartphone components while monitoring battery charge rate. The data generated from this framework can be used to create models for estimating the impacts of the individual components on battery charge times. Our empirical study demonstrates that different components can have significant impacts on smartphone charging rates.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"51 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karima Velasquez, D. Abreu, Diogo M. Gonçalves, L. Bittencourt, M. Curado, E. Monteiro, E. Madeira
A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an extension to the Cloud computing paradigm was created, called Fog computing, which brings processing and storage resources towards the edge of the network, in the vicinity of the Internet of Things environment. This scenario implies a higher complexity level needed to coordinate available resources and how applications and services use them. Although some solutions have been proposed for the Cloud, several characteristics differentiate the Cloud from the Fog, creating the need for new mechanisms for the coordination of resources, applications, and services in the Fog. This paper explains the challenges present in the Fog that call for new mechanisms to later propose an architecture to manage resources in the Fog using a hybrid approach. In the Internet of Things and South-Bound Fog Levels, a distributed management of applications and services is proposed applying choreography techniques to enable automated fast decision making. A centralized approach to orchestrate applications and services taking advantage of a global knowledge of the resources available in the network is suggested for the North-Bound Fog and Cloud Levels.
{"title":"Service Orchestration in Fog Environments","authors":"Karima Velasquez, D. Abreu, Diogo M. Gonçalves, L. Bittencourt, M. Curado, E. Monteiro, E. Madeira","doi":"10.1109/FICLOUD.2017.49","DOIUrl":"https://doi.org/10.1109/FICLOUD.2017.49","url":null,"abstract":"A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an extension to the Cloud computing paradigm was created, called Fog computing, which brings processing and storage resources towards the edge of the network, in the vicinity of the Internet of Things environment. This scenario implies a higher complexity level needed to coordinate available resources and how applications and services use them. Although some solutions have been proposed for the Cloud, several characteristics differentiate the Cloud from the Fog, creating the need for new mechanisms for the coordination of resources, applications, and services in the Fog. This paper explains the challenges present in the Fog that call for new mechanisms to later propose an architecture to manage resources in the Fog using a hybrid approach. In the Internet of Things and South-Bound Fog Levels, a distributed management of applications and services is proposed applying choreography techniques to enable automated fast decision making. A centralized approach to orchestrate applications and services taking advantage of a global knowledge of the resources available in the network is suggested for the North-Bound Fog and Cloud Levels.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130591143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effective management of resources on a cloud or cluster is crucial for achieving the quality of service requirements of users, which are typically captured in service level agreements (SLAs). This paper focuses on improving the robustness of resource allocation and scheduling techniques that process an open stream of MapReduce jobs with SLAs, by introducing techniques to handle errors/inaccuracies in user-estimated execution times that are submitted as part of the job's SLA. Inaccuracies in the estimates of task execution times can prevent the resource allocation and scheduling algorithm from making effective scheduling decisions, leading to a degradation in system performance. Techniques for handling error during runtime are presented to handle the situation where jobs have already started executing and their estimated execution times are inaccurate. A simulation-based performance evaluation of the error handling techniques is conducted, which demonstrates that the techniques are effective in improving system performance.
{"title":"A Run Time Technique for Handling Error in User-Estimated Execution Times on Systems Processing MapReduce Jobs with Deadlines","authors":"Norman Lim, S. Majumdar, P. Ashwood-Smith","doi":"10.1109/FiCloud.2017.32","DOIUrl":"https://doi.org/10.1109/FiCloud.2017.32","url":null,"abstract":"Effective management of resources on a cloud or cluster is crucial for achieving the quality of service requirements of users, which are typically captured in service level agreements (SLAs). This paper focuses on improving the robustness of resource allocation and scheduling techniques that process an open stream of MapReduce jobs with SLAs, by introducing techniques to handle errors/inaccuracies in user-estimated execution times that are submitted as part of the job's SLA. Inaccuracies in the estimates of task execution times can prevent the resource allocation and scheduling algorithm from making effective scheduling decisions, leading to a degradation in system performance. Techniques for handling error during runtime are presented to handle the situation where jobs have already started executing and their estimated execution times are inaccurate. A simulation-based performance evaluation of the error handling techniques is conducted, which demonstrates that the techniques are effective in improving system performance.","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}