首页 > 最新文献

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network 增强比特币点对点网络传播延迟的接近感知方法
M. Sallal, Gareth Owenson, M. Adda
In the Bitcoin system, a peer-to-peer electronic currency system, the delay overhead in transaction verification prevents the Bitcoin from gaining increasing popularity nowadays as it makes the system vulnerable to double spend attacks. This paper introduces a proximity-aware extension to the current Bitcoin protocol, named Bitcoin Clustering Based Ping Time protocol (BCBPT). The ultimate purpose of the proposed protocol, that is based on how the clusters are formulated and the nodes define their membership, is to improve the transaction propagation delay in the Bitcoin network. In BCBPT, the proximity of connectivity in the Bitcoin network is increased by grouping Bitcoin nodes based on ping latencies between nodes. We show, through simulations, that the proximity base ping latency defines better clustering structures that optimize the performance of the transaction propagation delay. The reduction of the communication link cost measured by the information propagation time between nodes is mainly considered as a key reason for this improvement. Bitcoin Clustering Based Ping Time protocol is more effective at reducing the transaction propagation delay compared to the existing clustering protocol (LBC) that we proposed in our previous work.
在比特币系统中,一个点对点的电子货币系统,交易验证的延迟开销阻碍了比特币越来越受欢迎,因为它使系统容易受到双重攻击。本文介绍了对当前比特币协议的一种邻近感知扩展,称为基于比特币聚类的Ping时间协议(BCBPT)。该协议的最终目的是改善比特币网络中的交易传播延迟,该协议基于如何制定集群和节点定义其成员资格。在BCBPT中,通过基于节点之间的ping延迟对比特币节点进行分组,增加了比特币网络中连接的接近性。我们通过模拟表明,接近基ping延迟定义了更好的集群结构,可以优化事务传播延迟的性能。以节点间信息传播时间衡量的通信链路成本的降低被认为是这一改进的关键原因。与我们在之前的工作中提出的现有聚类协议(LBC)相比,基于比特币聚类的Ping Time协议在减少交易传播延迟方面更有效。
{"title":"Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network","authors":"M. Sallal, Gareth Owenson, M. Adda","doi":"10.1109/ICDCS.2017.53","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.53","url":null,"abstract":"In the Bitcoin system, a peer-to-peer electronic currency system, the delay overhead in transaction verification prevents the Bitcoin from gaining increasing popularity nowadays as it makes the system vulnerable to double spend attacks. This paper introduces a proximity-aware extension to the current Bitcoin protocol, named Bitcoin Clustering Based Ping Time protocol (BCBPT). The ultimate purpose of the proposed protocol, that is based on how the clusters are formulated and the nodes define their membership, is to improve the transaction propagation delay in the Bitcoin network. In BCBPT, the proximity of connectivity in the Bitcoin network is increased by grouping Bitcoin nodes based on ping latencies between nodes. We show, through simulations, that the proximity base ping latency defines better clustering structures that optimize the performance of the transaction propagation delay. The reduction of the communication link cost measured by the information propagation time between nodes is mainly considered as a key reason for this improvement. Bitcoin Clustering Based Ping Time protocol is more effective at reducing the transaction propagation delay compared to the existing clustering protocol (LBC) that we proposed in our previous work.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations 云联盟中访问控制系统的分散运行时监控
M. Ferdous, Andrea Margheri, F. Paci, Mu Yang, V. Sassone
Cloud federation is an emergent cloud-computing paradigm where partner organisations share data and services hosted on their own cloud platforms. In this context, it is crucial to enforce access control policies that satisfy data protection and privacy requirements of partner organisations. However, due to the distributed nature of cloud federations, the access control system alone does not guarantee that its deployed components cannot be circumvented while processing access requests. In order to promote accountability and reliability of a distributed access control system, we present a decentralised runtime monitoring architecture based on blockchain technology.
云联合是一种新兴的云计算范式,合作伙伴组织在其中共享托管在自己云平台上的数据和服务。在这种情况下,执行满足合作伙伴组织的数据保护和隐私要求的访问控制策略至关重要。然而,由于云联合的分布式特性,访问控制系统本身并不能保证其部署的组件在处理访问请求时不会被绕过。为了提高分布式访问控制系统的可靠性和可靠性,提出了一种基于区块链技术的分布式运行时监控体系结构。
{"title":"Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations","authors":"M. Ferdous, Andrea Margheri, F. Paci, Mu Yang, V. Sassone","doi":"10.1109/ICDCS.2017.178","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.178","url":null,"abstract":"Cloud federation is an emergent cloud-computing paradigm where partner organisations share data and services hosted on their own cloud platforms. In this context, it is crucial to enforce access control policies that satisfy data protection and privacy requirements of partner organisations. However, due to the distributed nature of cloud federations, the access control system alone does not guarantee that its deployed components cannot be circumvented while processing access requests. In order to promote accountability and reliability of a distributed access control system, we present a decentralised runtime monitoring architecture based on blockchain technology.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130208612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing 物联网和多智能体系统:分布式计算中的分散智能
Munindar P. Singh, A. Chopra
Traditionally, distributed computing concentrates on computation understood at the level of information exchange and sets aside human and organizational concerns as largely to be handled in an ad hoc manner. Increasingly, however, distributed applications involve multiple loci of autonomy. Research in multiagent systems (MAS) addresses autonomy by drawing on concepts and techniques from artificial intelligence. However, MAS research generally lacks an adequate understanding of modern distributed computing. In this Blue Sky paper, we envision decentralized multiagent systems as a way to place decentralized intelligence in distributed computing, specifically, by supporting computation at the level of social meanings. We motivate our proposals for research in the context of the Internet of Things (IoT), which has become a major thrust in distributed computing. From the IoT's representative applications, we abstract out the major challenges of relevance to decentralized intelligence. These include the heterogeneity of IoT components; asynchronous and delay-tolerant communication and decoupled enactment; and multiple stakeholders with subtle requirements for governance, incorporating resource usage, cooperation, and privacy. The IoT yields high-impact problems that require solutions that go beyond traditional ways of thinking. We conclude with highlights of some possible research directions in decentralized MAS, including programming models; interaction-oriented software engineering; and what we term enlightened governance.
传统上,分布式计算集中于在信息交换级别上理解的计算,并将人员和组织的关注点放在一边,主要以一种特殊的方式处理。然而,分布式应用程序越来越多地涉及到多个自治位点。多智能体系统(MAS)的研究通过借鉴人工智能的概念和技术来解决自主性问题。然而,MAS研究普遍缺乏对现代分布式计算的充分理解。在Blue Sky的这篇论文中,我们设想去中心化多智能体系统作为一种将去中心化智能置于分布式计算中的方式,特别是通过支持社会意义层面的计算。我们在物联网(IoT)的背景下激励我们的研究建议,这已经成为分布式计算的主要推动力。从物联网的代表性应用中,我们抽象出与分散智能相关的主要挑战。其中包括物联网组件的异构性;异步容忍延迟通信和解耦制定;以及对治理有微妙需求的多个涉众,包括资源使用、合作和隐私。物联网产生了高影响力的问题,需要超越传统思维方式的解决方案。最后,我们强调了去中心化MAS的一些可能的研究方向,包括编程模型;面向交互的软件工程;我们称之为开明的治理。
{"title":"The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing","authors":"Munindar P. Singh, A. Chopra","doi":"10.1109/ICDCS.2017.304","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.304","url":null,"abstract":"Traditionally, distributed computing concentrates on computation understood at the level of information exchange and sets aside human and organizational concerns as largely to be handled in an ad hoc manner. Increasingly, however, distributed applications involve multiple loci of autonomy. Research in multiagent systems (MAS) addresses autonomy by drawing on concepts and techniques from artificial intelligence. However, MAS research generally lacks an adequate understanding of modern distributed computing. In this Blue Sky paper, we envision decentralized multiagent systems as a way to place decentralized intelligence in distributed computing, specifically, by supporting computation at the level of social meanings. We motivate our proposals for research in the context of the Internet of Things (IoT), which has become a major thrust in distributed computing. From the IoT's representative applications, we abstract out the major challenges of relevance to decentralized intelligence. These include the heterogeneity of IoT components; asynchronous and delay-tolerant communication and decoupled enactment; and multiple stakeholders with subtle requirements for governance, incorporating resource usage, cooperation, and privacy. The IoT yields high-impact problems that require solutions that go beyond traditional ways of thinking. We conclude with highlights of some possible research directions in decentralized MAS, including programming models; interaction-oriented software engineering; and what we term enlightened governance.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
ACTiCLOUD: Enabling the Next Generation of Cloud Applications ACTiCLOUD:启用下一代云应用程序
G. Goumas, K. Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, E. Elmroth, Michail Flouris, N. Foutris, J. Goodacre, D. Grohmann, Vasileios Karakostas, P. Koutsourakis, M. Kersten, M. Luján, E. Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, J. Webber, Y. Zhang, N. Koziris
Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast amounts of resources efficiently. Resources are stranded and fragmented, ultimately limiting cloud systems' applicability to large classes of critical applications that pose non-moderate resource demands. Eliminating current technological barriers of actual fluidity and scalability of cloud resources is essential to strengthen cloud computing's role as a critical cornerstone for the digital economy. ACTiCLOUD proposes a novel cloud architecture that breaks the existing scale-up and share-nothing barriers and enables the holistic management of physical resources both at the local cloud site and at distributed levels. Specifically, it makes advancements in the cloud resource management stacks by extending state-of-the-art hypervisor technology beyond the physical server boundary and localized cloud management system to provide a holistic resource management within a rack, within a site, and across distributed cloud sites. On top of this, ACTiCLOUD will adapt and optimize system libraries and runtimes (e.g., JVM) as well as ACTiCLOUD-native applications, which are extremely demanding, and critical classes of applications that currently face severe difficulties in matching their resource requirements to state-of-the-art cloud offerings.
尽管云计算系统作为一种主导的计算范式而扩散,但它缺乏有效的机制来有效地管理其大量的资源。资源被搁浅和分散,最终限制了云系统对大量关键应用程序的适用性,这些应用程序提出了不适度的资源需求。消除当前云资源实际流动性和可扩展性方面的技术障碍,对于加强云计算作为数字经济关键基石的作用至关重要。ACTiCLOUD提出了一种新的云架构,它打破了现有的扩展和无共享的障碍,能够在本地云站点和分布式级别上对物理资源进行全面管理。具体来说,它通过将最先进的管理程序技术扩展到物理服务器边界之外和本地化的云管理系统,从而在云资源管理堆栈中取得进步,从而在机架内、站点内和跨分布式云站点提供全面的资源管理。最重要的是,ACTiCLOUD将调整和优化系统库和运行时(例如JVM)以及ACTiCLOUD原生应用程序,这些应用程序的要求非常高,关键类应用程序目前在将其资源需求与最先进的云产品相匹配方面面临严重困难。
{"title":"ACTiCLOUD: Enabling the Next Generation of Cloud Applications","authors":"G. Goumas, K. Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, E. Elmroth, Michail Flouris, N. Foutris, J. Goodacre, D. Grohmann, Vasileios Karakostas, P. Koutsourakis, M. Kersten, M. Luján, E. Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, J. Webber, Y. Zhang, N. Koziris","doi":"10.1109/ICDCS.2017.252","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.252","url":null,"abstract":"Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast amounts of resources efficiently. Resources are stranded and fragmented, ultimately limiting cloud systems' applicability to large classes of critical applications that pose non-moderate resource demands. Eliminating current technological barriers of actual fluidity and scalability of cloud resources is essential to strengthen cloud computing's role as a critical cornerstone for the digital economy. ACTiCLOUD proposes a novel cloud architecture that breaks the existing scale-up and share-nothing barriers and enables the holistic management of physical resources both at the local cloud site and at distributed levels. Specifically, it makes advancements in the cloud resource management stacks by extending state-of-the-art hypervisor technology beyond the physical server boundary and localized cloud management system to provide a holistic resource management within a rack, within a site, and across distributed cloud sites. On top of this, ACTiCLOUD will adapt and optimize system libraries and runtimes (e.g., JVM) as well as ACTiCLOUD-native applications, which are extremely demanding, and critical classes of applications that currently face severe difficulties in matching their resource requirements to state-of-the-art cloud offerings.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Timed-Release of Self-Emerging Data Using Distributed Hash Tables 使用分布式哈希表定时发布自出现的数据
C. Li, Balaji Palanisamy
Releasing private data to the future is a challenging problem. Making private data accessible at a future point in time requires mechanisms to keep data secure and undiscovered so that protected data is not available prior to the legitimate release time and the data appears automatically at the expected release time. In this paper, we develop new mechanisms to support self-emerging data storage that securely hide keys of encrypted data in a Distributed Hash Table (DHT) network that makes the encryption keys automatically appear at the predetermined release time so that the protected encrypted private data can be decrypted at the release time. We show that a straight-forward approach of privately storing keys in a DHT is prone to a number of attacks that could either make the hidden data appear before the prescribed release time (release-ahead attack) or destroy the hidden data altogether (drop attack). We develop a suite of self-emerging key routing mechanisms for securely storing and routing encryption keys in the DHT. We show that the proposed scheme is resilient to both release-ahead attack and drop attack as well as to attacks that arise due to traditional churn issues in DHT networks. Our experimental evaluation demonstrates the performance of the proposed schemes in terms of attack resilience and churn resilience.
向未来发布私人数据是一个具有挑战性的问题。要使私有数据在未来的某个时间点可访问,需要保持数据安全和不被发现的机制,以便在合法发布时间之前无法使用受保护的数据,并在预期的发布时间自动出现数据。在本文中,我们开发了支持自出现数据存储的新机制,该机制将加密数据的密钥安全地隐藏在分布式哈希表(DHT)网络中,使加密密钥在预定的发布时间自动出现,以便受保护的加密私有数据可以在发布时间解密。我们表明,在DHT中私下存储密钥的直接方法容易受到许多攻击,这些攻击可能会使隐藏的数据在规定的发布时间之前出现(提前发布攻击),或者完全破坏隐藏的数据(删除攻击)。我们开发了一套自出现的密钥路由机制,用于在DHT中安全地存储和路由加密密钥。我们表明,所提出的方案对提前释放攻击和丢弃攻击以及由于DHT网络中传统的流失问题而引起的攻击具有弹性。我们的实验评估证明了所提出方案在攻击弹性和流失弹性方面的性能。
{"title":"Timed-Release of Self-Emerging Data Using Distributed Hash Tables","authors":"C. Li, Balaji Palanisamy","doi":"10.1109/ICDCS.2017.109","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.109","url":null,"abstract":"Releasing private data to the future is a challenging problem. Making private data accessible at a future point in time requires mechanisms to keep data secure and undiscovered so that protected data is not available prior to the legitimate release time and the data appears automatically at the expected release time. In this paper, we develop new mechanisms to support self-emerging data storage that securely hide keys of encrypted data in a Distributed Hash Table (DHT) network that makes the encryption keys automatically appear at the predetermined release time so that the protected encrypted private data can be decrypted at the release time. We show that a straight-forward approach of privately storing keys in a DHT is prone to a number of attacks that could either make the hidden data appear before the prescribed release time (release-ahead attack) or destroy the hidden data altogether (drop attack). We develop a suite of self-emerging key routing mechanisms for securely storing and routing encryption keys in the DHT. We show that the proposed scheme is resilient to both release-ahead attack and drop attack as well as to attacks that arise due to traditional churn issues in DHT networks. Our experimental evaluation demonstrates the performance of the proposed schemes in terms of attack resilience and churn resilience.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software 使用以内容为中心的网络分发高能物理软件的案例
M. Alhowaidi, B. Ramamurthy, B. Bockelman, D. Swanson
Named Data Networking (NDN) is one of the promising future internet architectures, which focuses on the data rather than its location (IP/host-based system). NDN has several characteristics which facilitate addressing and routing the data: fail-over, in-network caching and load balancing. This makes it useful in areas such as managing scientific data. The CMS experiment on the Large Hadron Collider (LHC) has a data access problem amenable to content-centric networking. CERN Virtual Machine File System (CVMFS) is used by High Energy Physics (HEP) community for worldwide software distribution. CVMFS maintain its data by using content-addressable storage, which makes it suitable for NDN. n this paper, we investigate the possibilities of using a content-centric networking architecture such as NDN on distributing CMS software.
命名数据网络(NDN)是未来很有前途的互联网架构之一,它侧重于数据而不是其位置(基于IP/主机的系统)。NDN有几个特点,方便寻址和路由数据:故障转移,网络内缓存和负载平衡。这使得它在管理科学数据等领域非常有用。大型强子对撞机(LHC)上的CMS实验存在一个适合于以内容为中心的网络的数据访问问题。CERN虚拟机文件系统(CVMFS)是高能物理(HEP)社区用于全球软件分发的系统。CVMFS通过使用内容可寻址存储来维护其数据,这使得它适合于NDN。在本文中,我们研究了在分发CMS软件时使用以内容为中心的网络架构(如NDN)的可能性。
{"title":"The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software","authors":"M. Alhowaidi, B. Ramamurthy, B. Bockelman, D. Swanson","doi":"10.1109/ICDCS.2017.295","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.295","url":null,"abstract":"Named Data Networking (NDN) is one of the promising future internet architectures, which focuses on the data rather than its location (IP/host-based system). NDN has several characteristics which facilitate addressing and routing the data: fail-over, in-network caching and load balancing. This makes it useful in areas such as managing scientific data. The CMS experiment on the Large Hadron Collider (LHC) has a data access problem amenable to content-centric networking. CERN Virtual Machine File System (CVMFS) is used by High Energy Physics (HEP) community for worldwide software distribution. CVMFS maintain its data by using content-addressable storage, which makes it suitable for NDN. n this paper, we investigate the possibilities of using a content-centric networking architecture such as NDN on distributing CMS software.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment 双伸缩虚拟机和查询:经济高效的延迟缩减
Juan F. Pérez, R. Birke, Mathias Björkqvist, L. Chen
Wimpy virtual instances equipped with small numbers of cores and RAM are popular public and private cloud offerings because of their low cost for hosting applications. The challenge is how to run latency-sensitive applications using such instances, which trade off performance for cost. In this study, we analytically and experimentally show that simultaneously scaling resources at coarse granularity and workloads, i.e., submitting multiple query clones to different servers, at fine granularity can overcome the performance disadvantages of wimpy VM instances and achieve stringent latency targets that are even lower than the average execution times of wimpy servers. To such an end, we first derive a closed-form analysis for the latency under any given VM provisioning and query replication level, considering cloning policies that can (not) terminate outstanding clones with (without) an overhead. Validated on trace-driven simulations, our analysis is able to accurately predict the latency and efficiently search for the optimal number of VMs and clones. Secondly, we develop a dual elastic scaler, DuoScale, that dynamically scales VMs and clones according to the workload dynamics so as to achieve the target latency in a cost-effective manner. The effectiveness of DuoScale lies on the observation that the application performance only scales sub-linearly with increasing vertical or horizontal resource provisioning, i.e., resources per VM or number of VMs. We evaluate DuoScale against VM-only scaling strategies via extensive trace-driven simulations as well as experimental results on a cloud test-bed. Our results show that DuoScale is able to achieve the stringent target latency by using clones on wimpy VMs with cost savings up to 50%, compared to scaling brawny VMs that have better performance at a higher unit cost.
配备少量核心和RAM的Wimpy虚拟实例是流行的公共和私有云产品,因为它们托管应用程序的成本较低。挑战在于如何使用这样的实例运行对延迟敏感的应用程序,以性能换取成本。在本研究中,我们通过分析和实验表明,同时以粗粒度和工作负载扩展资源,即向不同的服务器提交多个查询克隆,以细粒度可以克服wimpy VM实例的性能缺点,并实现严格的延迟目标,甚至低于wimpy服务器的平均执行时间。为此,我们首先对任何给定的VM供应和查询复制级别下的延迟进行了封闭式分析,考虑到克隆策略可以(不)终止有(不)开销的未完成克隆。通过跟踪驱动的仿真验证,我们的分析能够准确地预测延迟并有效地搜索最佳数量的vm和克隆。其次,我们开发了一个双弹性扩展器DuoScale,它可以根据工作负载的动态动态扩展虚拟机和克隆,从而以经济有效的方式实现目标延迟。DuoScale的有效性在于观察到应用程序性能仅随着垂直或水平资源供应(即每个虚拟机的资源或虚拟机数量)的增加而呈亚线性扩展。我们通过广泛的跟踪驱动模拟以及在云测试平台上的实验结果,评估了DuoScale对虚拟机扩展策略的影响。我们的结果表明,与以更高的单位成本扩展具有更好性能的健壮vm相比,DuoScale能够通过在弱小vm上使用克隆来实现严格的目标延迟,并节省高达50%的成本。
{"title":"Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment","authors":"Juan F. Pérez, R. Birke, Mathias Björkqvist, L. Chen","doi":"10.1109/ICDCS.2017.231","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.231","url":null,"abstract":"Wimpy virtual instances equipped with small numbers of cores and RAM are popular public and private cloud offerings because of their low cost for hosting applications. The challenge is how to run latency-sensitive applications using such instances, which trade off performance for cost. In this study, we analytically and experimentally show that simultaneously scaling resources at coarse granularity and workloads, i.e., submitting multiple query clones to different servers, at fine granularity can overcome the performance disadvantages of wimpy VM instances and achieve stringent latency targets that are even lower than the average execution times of wimpy servers. To such an end, we first derive a closed-form analysis for the latency under any given VM provisioning and query replication level, considering cloning policies that can (not) terminate outstanding clones with (without) an overhead. Validated on trace-driven simulations, our analysis is able to accurately predict the latency and efficiently search for the optimal number of VMs and clones. Secondly, we develop a dual elastic scaler, DuoScale, that dynamically scales VMs and clones according to the workload dynamics so as to achieve the target latency in a cost-effective manner. The effectiveness of DuoScale lies on the observation that the application performance only scales sub-linearly with increasing vertical or horizontal resource provisioning, i.e., resources per VM or number of VMs. We evaluate DuoScale against VM-only scaling strategies via extensive trace-driven simulations as well as experimental results on a cloud test-bed. Our results show that DuoScale is able to achieve the stringent target latency by using clones on wimpy VMs with cost savings up to 50%, compared to scaling brawny VMs that have better performance at a higher unit cost.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags RFIPad:使用被动标签实现低成本和无设备的空中手写
H. Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, K. Zhao, Jizhong Zhao
An important function of smart environments is the ubiquitous access of computing devices. In public areas such as hospitals, libraries, and airports, people may want to interact with nearby computing systems to get information, such as directions to a hospital room, locations of books, and flight departure/arrival information. Touch screen based displays and kiosks, which are commonly used today, may incur extra hardware cost or even possible germ and bacteria infection. This work provides a new solution: users can make queries and inputs by performing in-air handwriting to an array of passive RFID tags, named RFIPad. This input method does not require human hands to carry any device and hence is convenient for applications in public areas. Besides the mobile and contactless property, this system is a cost-efficient extension to current RFID systems: an existing reader can monitor multiple RFIPads while performing its regular applications such as identification and tracking. We implement a prototype of RFIPad using commercial off-the-shelf UHF RFID devices. Experimental results show that RFIPad achieves >91% accuracy in recognizing basic touch-screen operations and English letters.
智能环境的一个重要功能是计算设备的无处不在的访问。在医院、图书馆和机场等公共场所,人们可能希望与附近的计算系统进行交互,以获取信息,例如到医院房间的方向、书籍的位置和航班出发/到达的信息。目前普遍使用的基于触摸屏的显示器和售货亭可能会产生额外的硬件成本,甚至可能导致细菌和细菌感染。这项工作提供了一种新的解决方案:用户可以通过对一组名为RFIPad的无源RFID标签进行空中手写来进行查询和输入。这种输入法不需要人手携带任何设备,因此方便在公共场所应用。除了移动和非接触式特性外,该系统是当前RFID系统的经济高效扩展:现有的读取器可以在执行其常规应用(如识别和跟踪)时监控多个RFID pad。我们使用商用现成的UHF RFID设备实现了RFIPad的原型。实验结果表明,RFIPad对基本触摸屏操作和英文字母的识别准确率达到了91%以上。
{"title":"RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags","authors":"H. Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, K. Zhao, Jizhong Zhao","doi":"10.1109/ICDCS.2017.141","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.141","url":null,"abstract":"An important function of smart environments is the ubiquitous access of computing devices. In public areas such as hospitals, libraries, and airports, people may want to interact with nearby computing systems to get information, such as directions to a hospital room, locations of books, and flight departure/arrival information. Touch screen based displays and kiosks, which are commonly used today, may incur extra hardware cost or even possible germ and bacteria infection. This work provides a new solution: users can make queries and inputs by performing in-air handwriting to an array of passive RFID tags, named RFIPad. This input method does not require human hands to carry any device and hence is convenient for applications in public areas. Besides the mobile and contactless property, this system is a cost-efficient extension to current RFID systems: an existing reader can monitor multiple RFIPads while performing its regular applications such as identification and tracking. We implement a prototype of RFIPad using commercial off-the-shelf UHF RFID devices. Experimental results show that RFIPad achieves >91% accuracy in recognizing basic touch-screen operations and English letters.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments 普适边缘计算环境下对等数据共享的公平缓存算法
Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li
Edge devices (e.g., smartphones, tablets, connected vehicles, IoT nodes) with sensing, storage and communication resources are increasingly penetrating our environments. Many novel applications can be created when nearby peer edge devices share data. Caching can greatly improve the data availability, retrieval robustness and latency. In this paper, we study the unique issue of caching fairness in edge environment. Due to distinct ownership of peer devices, caching load balance is critical. We consider fairness metrics and formulate an integer linear programming problem, which is shown as summation of multiple Connected Facility Location (ConFL) problems. We propose an approximation algorithm leveraging an existing ConFL approximation algorithm, and prove that it preserves a 6.55 approximation ratio. We further develop a distributed algorithm where devices exchange data reachability and identify popular candidates as caching nodes. Extensive evaluation shows that compared with existing wireless network caching algorithms, our algorithms significantly improve data caching fairness, while keeping the contention induced latency similar to the best existing algorithms.
具有传感、存储和通信资源的边缘设备(如智能手机、平板电脑、联网汽车、物联网节点)正日益渗透到我们的环境中。当附近的对等边缘设备共享数据时,可以创建许多新颖的应用程序。缓存可以极大地提高数据可用性、检索健壮性和延迟。本文主要研究边缘环境下的缓存公平性问题。由于对等设备的所有权不同,缓存负载平衡至关重要。考虑公平性指标,提出了一个整数线性规划问题,该问题表现为多个互联设施选址问题的总和。我们利用现有的ConFL近似算法提出了一种近似算法,并证明它保持了6.55的近似比。我们进一步开发了一种分布式算法,其中设备交换数据可达性并将流行的候选节点标识为缓存节点。广泛的评估表明,与现有的无线网络缓存算法相比,我们的算法显著提高了数据缓存的公平性,同时保持了与现有最佳算法相似的争用延迟。
{"title":"Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments","authors":"Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li","doi":"10.1109/ICDCS.2017.151","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.151","url":null,"abstract":"Edge devices (e.g., smartphones, tablets, connected vehicles, IoT nodes) with sensing, storage and communication resources are increasingly penetrating our environments. Many novel applications can be created when nearby peer edge devices share data. Caching can greatly improve the data availability, retrieval robustness and latency. In this paper, we study the unique issue of caching fairness in edge environment. Due to distinct ownership of peer devices, caching load balance is critical. We consider fairness metrics and formulate an integer linear programming problem, which is shown as summation of multiple Connected Facility Location (ConFL) problems. We propose an approximation algorithm leveraging an existing ConFL approximation algorithm, and prove that it preserves a 6.55 approximation ratio. We further develop a distributed algorithm where devices exchange data reachability and identify popular candidates as caching nodes. Extensive evaluation shows that compared with existing wireless network caching algorithms, our algorithms significantly improve data caching fairness, while keeping the contention induced latency similar to the best existing algorithms.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters 地理分布数据中心中图形处理的高效数据传输研究
Amelie Chi Zhou, Shadi Ibrahim, Bingsheng He
Graph partitioning is important for optimizing the performance and communication cost of large graph processing jobs. Recently, many graph applications such as social networks store their data on geo-distributed datacenters (DCs) to provide services worldwide with low latency. This raises new challenges to existing graph partitioning methods, due to the costly Wide Area Network (WAN) usage and the multi-levels of network heterogeneities in geo-distributed DCs. In this paper, we propose a geo-aware graph partitioning method named G-Cut, which aims at minimizing the inter-DC data transfer time of graph processing jobs in geo-distributed DCs while satisfying the WAN usage budget. G-Cut adopts two novel optimization phases which address the two challenges in WAN usage and network heterogeneities separately. G-Cut can be also applied to partition dynamic graphs thanks to its light-weight runtime overhead. We evaluate the effectiveness and efficiency of G-Cut using realworld graphs with both real geo-distributed DCs and simulations. Evaluation results show that G-Cut can reduce the inter-DC data transfer time by up to 58% and reduce the WAN usage by up to 70% compared to state-of-the-art graph partitioning methods with a low runtime overhead.
图分区对于优化大型图处理作业的性能和通信成本具有重要意义。最近,许多图形应用程序(如社交网络)将其数据存储在地理分布式数据中心(dc)上,以低延迟提供全球服务。这对现有的图形划分方法提出了新的挑战,因为广域网(WAN)的使用成本很高,而且地理分布数据中心的网络异构程度很高。本文提出了一种地理感知的图形划分方法G-Cut,该方法的目的是在满足广域网使用预算的情况下,最大限度地减少地理分布式数据中心中图形处理作业在数据中心之间的数据传输时间。G-Cut采用了两个新的优化阶段,分别解决广域网使用和网络异构的两个挑战。由于其轻量级的运行时开销,G-Cut也可以应用于分区动态图。我们使用具有真实地理分布dc和模拟的真实世界图来评估G-Cut的有效性和效率。评估结果表明,与运行时开销较低的最先进的图分区方法相比,G-Cut可以将数据中心间的数据传输时间减少58%,将WAN使用减少70%。
{"title":"On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters","authors":"Amelie Chi Zhou, Shadi Ibrahim, Bingsheng He","doi":"10.1109/ICDCS.2017.98","DOIUrl":"https://doi.org/10.1109/ICDCS.2017.98","url":null,"abstract":"Graph partitioning is important for optimizing the performance and communication cost of large graph processing jobs. Recently, many graph applications such as social networks store their data on geo-distributed datacenters (DCs) to provide services worldwide with low latency. This raises new challenges to existing graph partitioning methods, due to the costly Wide Area Network (WAN) usage and the multi-levels of network heterogeneities in geo-distributed DCs. In this paper, we propose a geo-aware graph partitioning method named G-Cut, which aims at minimizing the inter-DC data transfer time of graph processing jobs in geo-distributed DCs while satisfying the WAN usage budget. G-Cut adopts two novel optimization phases which address the two challenges in WAN usage and network heterogeneities separately. G-Cut can be also applied to partition dynamic graphs thanks to its light-weight runtime overhead. We evaluate the effectiveness and efficiency of G-Cut using realworld graphs with both real geo-distributed DCs and simulations. Evaluation results show that G-Cut can reduce the inter-DC data transfer time by up to 58% and reduce the WAN usage by up to 70% compared to state-of-the-art graph partitioning methods with a low runtime overhead.","PeriodicalId":127689,"journal":{"name":"2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1