首页 > 最新文献

IEEE Transactions on Cloud Computing最新文献

英文 中文
SVD: A Scalable Virtual Machine Disk Format SVD:可扩展的虚拟机磁盘格式
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.1109/TCC.2024.3391390
Kevin Nguetchouang;Stella Bitchebe;Theophile Dubuc;Mar Callau-Zori;Christophe Hubert;Pierre Olivier;Alain Tchana
Contrary to CPU, memory, and network, disk virtualization is peculiar, for which virtualization through direct access is impossible. We study virtual disk utilization in a large-scale public cloud and observe the presence of long snapshot chains, sometimes composed of up to 1,000 files. We then demonstrate, through experimental measurements, that such long chains lead to virtualized storage performance and memory footprint scalability issues. To address these problems, we present SVD, a new virtual disk format. We implemented SVD by extending Qcow2, a popular format, and its Qemu driver. We evaluated our prototype, demonstrating that it brings significant performance enhancements and memory footprint reduction. For example, SVD improves the throughput of RocksDB by about 48% on a snapshot chain of length 500. SVD also reduces the memory footprint by 15×.
与 CPU、内存和网络相反,磁盘虚拟化是一种特殊的虚拟化,不可能通过直接访问实现虚拟化。我们研究了大规模公共云中的虚拟磁盘利用情况,观察到存在长快照链,有时由多达 1,000 个文件组成。然后,我们通过实验测量证明,这种长链会导致虚拟化存储性能和内存占用可扩展性问题。为了解决这些问题,我们提出了一种新的虚拟磁盘格式 SVD。我们通过扩展流行格式 Qcow2 及其 Qemu 驱动程序来实现 SVD。我们对原型进行了评估,结果表明它能显著提高性能并减少内存占用。例如,在长度为 500 的快照链上,SVD 将 RocksDB 的吞吐量提高了约 48%。SVD 还将内存占用减少了 15 倍。
{"title":"SVD: A Scalable Virtual Machine Disk Format","authors":"Kevin Nguetchouang;Stella Bitchebe;Theophile Dubuc;Mar Callau-Zori;Christophe Hubert;Pierre Olivier;Alain Tchana","doi":"10.1109/TCC.2024.3391390","DOIUrl":"10.1109/TCC.2024.3391390","url":null,"abstract":"Contrary to CPU, memory, and network, disk virtualization is peculiar, for which virtualization through direct access is impossible. We study virtual disk utilization in a large-scale public cloud and observe the presence of long snapshot chains, sometimes composed of up to 1,000 files. We then demonstrate, through experimental measurements, that such long chains lead to virtualized storage performance and memory footprint scalability issues. To address these problems, we present \u0000<sc>SVD</small>\u0000, a new virtual disk format. We implemented \u0000<sc>SVD</small>\u0000 by extending Qcow2, a popular format, and its Qemu driver. We evaluated our prototype, demonstrating that it brings significant performance enhancements and memory footprint reduction. For example, \u0000<sc>SVD</small>\u0000 improves the throughput of RocksDB by about 48% on a snapshot chain of length 500. \u0000<sc>SVD</small>\u0000 also reduces the memory footprint by 15×.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P4Hauler: An Accelerator-Aware In-Network Load Balancer for Applications Performance Boosting P4Hauler:用于提升应用性能的加速器感知网络内负载平衡器
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.1109/TCC.2024.3389658
Hesam Tajbakhsh;Ricardo Parizotto;Alberto Schaeffer-Filho;Israat Haque
Programmable accelerators enable the execution of applications intended for running in usual servers. However, inappropriately running applications on these devices can lead to load imbalance and performance degradation. An alternative to tackle this problem is load balancing, but existing in-network load balancers typically have no visibility of accelerators and often hard code policies in the switch source code. In this article, we present P4Hauler, an accelerator-aware in-network load balancer. In particular, our design discusses how to enforce load-balancing decisions in a programmable switch in a resource-aware manner, allowing different policies to handle traffic according to applications’ needs. We use monitoring and compression techniques to store application resources in a programmable switch for resource-aware decisions. In addition, we propose building blocks that operators can dynamically choose to realize different load balancing policies on-the-fly. We implemented and evaluated a prototype of P4Hauler on a testbed to show its efficiency and deployment feasibility. Our results indicate that P4Hauler can support 27% more load and decrease the flow completion time by around 13% using only a single accelerator. Also, extensive simulations confirm the performance gain of P4Hauler at scale compared to the state-of-the-art.
可编程加速器能够执行在普通服务器上运行的应用程序。然而,在这些设备上不适当地运行应用程序会导致负载不平衡和性能下降。解决这一问题的另一个办法是负载平衡,但现有的网内负载平衡器通常无法看到加速器,而且通常在交换机源代码中硬编码策略。在本文中,我们介绍了 P4Hauler,一种加速器感知的网内负载平衡器。我们的设计特别讨论了如何以资源感知的方式在可编程交换机中执行负载平衡决策,允许根据应用程序的需求采用不同的策略来处理流量。我们使用监控和压缩技术在可编程交换机中存储应用资源,以便做出资源感知决策。此外,我们还提出了构建模块,操作员可以动态选择这些模块,以实现不同的即时负载平衡策略。我们在测试平台上实施并评估了 P4Hauler 的原型,以展示其效率和部署可行性。我们的结果表明,P4Hauler 仅使用一个加速器就能多支持 27% 的负载,并将流量完成时间缩短约 13%。此外,大量的仿真证实,与最先进的技术相比,P4Hauler 在大规模应用中的性能提升非常明显。
{"title":"P4Hauler: An Accelerator-Aware In-Network Load Balancer for Applications Performance Boosting","authors":"Hesam Tajbakhsh;Ricardo Parizotto;Alberto Schaeffer-Filho;Israat Haque","doi":"10.1109/TCC.2024.3389658","DOIUrl":"10.1109/TCC.2024.3389658","url":null,"abstract":"Programmable accelerators enable the execution of applications intended for running in usual servers. However, inappropriately running applications on these devices can lead to load imbalance and performance degradation. An alternative to tackle this problem is load balancing, but existing in-network load balancers typically have no visibility of accelerators and often hard code policies in the switch source code. In this article, we present \u0000<sc>P4Hauler</small>\u0000, an accelerator-aware in-network load balancer. In particular, our design discusses how to enforce load-balancing decisions in a programmable switch in a resource-aware manner, allowing different policies to handle traffic according to applications’ needs. We use monitoring and compression techniques to store application resources in a programmable switch for resource-aware decisions. In addition, we propose building blocks that operators can dynamically choose to realize different load balancing policies on-the-fly. We implemented and evaluated a prototype of \u0000<sc>P4Hauler</small>\u0000 on a testbed to show its efficiency and deployment feasibility. Our results indicate that \u0000<sc>P4Hauler</small>\u0000 can support 27% more load and decrease the flow completion time by around 13% using only a single accelerator. Also, extensive simulations confirm the performance gain of \u0000<sc>P4Hauler</small>\u0000 at scale compared to the state-of-the-art.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Framework to Resolve the Oligopoly Issue in Cloud Computing 解决云计算寡头垄断问题的区块链框架
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-18 DOI: 10.1109/TCC.2024.3390933
Amit Biswas;Gaurav Baranwal;Abhinav Kumar
Cloud computing is one of the foundation technologies of Industry 4.0. Cloud 2.0 is the upcoming cloud technology that addresses several bottlenecks of Cloud 1.0. For instance, the presence of small service providers is threatened by the dominance of a few giant service providers in today’s cloud market in Cloud 1.0. Under this circumstance, the small service providers must work together to compete with the giant competitors to survive in the market. For that, small service providers require a transparent, fair, cost-effective, fault-tolerant, and easily scalable platform that can provide reliable and quality services to customers. This work introduces a blockchain-based framework to provide such a platform for cloud service providers and their customers. Here, a new consensus mechanism is proposed to maintain the system’s fairness, decentralization, and consistency. A consensus-based service monitoring concept is also introduced to assess the service quality. If a service provider does not deliver the committed quality of service (QoS), a penalty is imposed on the service provider. This framework is designed so that the service providers are always bound to provide committed QoS to the customers. Finally, we performed several experiments, and the experimental results corroborate our claims regarding the proposed framework.
云计算是工业 4.0 的基础技术之一。云 2.0 是即将推出的云技术,它解决了云 1.0 的几个瓶颈。例如,在云 1.0 中,小型服务提供商的存在受到了当今云市场中少数巨型服务提供商主导地位的威胁。在这种情况下,小型服务提供商必须齐心协力与巨头竞争,才能在市场上生存。为此,小型服务提供商需要一个透明、公平、经济高效、容错且易于扩展的平台,为客户提供可靠、优质的服务。这项工作引入了一个基于区块链的框架,为云服务提供商及其客户提供这样一个平台。这里提出了一种新的共识机制,以维护系统的公平性、去中心化和一致性。此外,还引入了基于共识的服务监控概念来评估服务质量。如果服务提供商没有提供承诺的服务质量(QoS),服务提供商将受到惩罚。这一框架的设计使服务提供商始终有义务向客户提供承诺的服务质量。最后,我们进行了几项实验,实验结果证实了我们对拟议框架的主张。
{"title":"A Blockchain-Based Framework to Resolve the Oligopoly Issue in Cloud Computing","authors":"Amit Biswas;Gaurav Baranwal;Abhinav Kumar","doi":"10.1109/TCC.2024.3390933","DOIUrl":"10.1109/TCC.2024.3390933","url":null,"abstract":"Cloud computing is one of the foundation technologies of Industry 4.0. Cloud 2.0 is the upcoming cloud technology that addresses several bottlenecks of Cloud 1.0. For instance, the presence of small service providers is threatened by the dominance of a few giant service providers in today’s cloud market in Cloud 1.0. Under this circumstance, the small service providers must work together to compete with the giant competitors to survive in the market. For that, small service providers require a transparent, fair, cost-effective, fault-tolerant, and easily scalable platform that can provide reliable and quality services to customers. This work introduces a blockchain-based framework to provide such a platform for cloud service providers and their customers. Here, a new consensus mechanism is proposed to maintain the system’s fairness, decentralization, and consistency. A consensus-based service monitoring concept is also introduced to assess the service quality. If a service provider does not deliver the committed quality of service (QoS), a penalty is imposed on the service provider. This framework is designed so that the service providers are always bound to provide committed QoS to the customers. Finally, we performed several experiments, and the experimental results corroborate our claims regarding the proposed framework.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140629101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing 为移动云计算提供具有恒定大小密码文本的分层双边访问控制
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-08 DOI: 10.1109/TCC.2024.3386126
Axin Wu;Yinghui Zhang;Jianhao Zhu;Qiuxia Zhao;Yu Zhang
Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud computing, enabling users to enjoy personalized services without constraints and restrictions of time and place. While this brings convenience, it also comes with risks such as privacy breaches and unauthorized access to outsourced data. Bilateral access control is a promising technique for addressing these issues. However, the current bilateral access control schemes cannot solve problems such as single point failure. To further enhance and enrich the existing schemes, we propose hierarchical bilateral access control. In the proposed scheme, the permission of generating encryption keys and decryption keys can be delegated to its child nodes, which alleviates the computation and communication overheads of the parent nodes and weaken the potential risks of single-point failure. Additionally, the ciphertext size remains constant, reducing the costs of transmitting and storing ciphertext and relieving resource limitations on devices. We then prove the privacy and authenticity of the scheme in the random oracle model. Finally, the comprehensive performance comparison and analysis demonstrate the efficiency of the proposed scheme.
移动云计算(MCC)整合了移动网络和云计算的优势,使用户可以不受时间和地点的限制,享受个性化服务。这在带来便利的同时,也带来了隐私泄露和未经授权访问外包数据等风险。双边访问控制是解决这些问题的一种有前途的技术。然而,目前的双边访问控制方案无法解决单点故障等问题。为了进一步增强和丰富现有方案,我们提出了分层双边访问控制。在提出的方案中,生成加密密钥和解密密钥的权限可以下放给子节点,从而减轻了父节点的计算和通信开销,削弱了单点故障的潜在风险。此外,密文大小保持不变,降低了传输和存储密文的成本,缓解了设备的资源限制。然后,我们证明了该方案在随机甲骨文模型中的隐私性和真实性。最后,全面的性能比较和分析证明了所提方案的效率。
{"title":"Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing","authors":"Axin Wu;Yinghui Zhang;Jianhao Zhu;Qiuxia Zhao;Yu Zhang","doi":"10.1109/TCC.2024.3386126","DOIUrl":"10.1109/TCC.2024.3386126","url":null,"abstract":"Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud computing, enabling users to enjoy personalized services without constraints and restrictions of time and place. While this brings convenience, it also comes with risks such as privacy breaches and unauthorized access to outsourced data. Bilateral access control is a promising technique for addressing these issues. However, the current bilateral access control schemes cannot solve problems such as single point failure. To further enhance and enrich the existing schemes, we propose hierarchical bilateral access control. In the proposed scheme, the permission of generating encryption keys and decryption keys can be delegated to its child nodes, which alleviates the computation and communication overheads of the parent nodes and weaken the potential risks of single-point failure. Additionally, the ciphertext size remains constant, reducing the costs of transmitting and storing ciphertext and relieving resource limitations on devices. We then prove the privacy and authenticity of the scheme in the random oracle model. Finally, the comprehensive performance comparison and analysis demonstrate the efficiency of the proposed scheme.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Scheduling of Time-Sensitive Coflows 对时间敏感的同流加权调度
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-03 DOI: 10.1109/TCC.2024.3384514
Olivier Brun;Rachid El-Azouzi;Quang-Trung Luu;Francesco De Pellegrini;Balakrishna J. Prabhu;Cédric Richier
Datacenter networks commonly facilitate the transmission of data in distributed computing frameworks through coflows, which are collections of parallel flows associated with a common task. Most of the existing research has concentrated on scheduling coflows to minimize the time required for their completion, i.e., to optimize the average dispatch rate of coflows in the network fabric. Nevertheless, modern applications often produce coflows that are specifically intended for online services and mission-crucial computational tasks, necessitating adherence to specific deadlines for their completion. In this paper, we introduce $mathtt {WDCoflow}$, a new algorithm to maximize the weighted number of coflows that complete before their deadline. By combining a dynamic programming algorithm along with parallel inequalities, our heuristic solution performs at once coflow admission control and coflow prioritization, imposing a $sigma$-order on the set of coflows. With extensive simulation, we demonstrate the effectiveness of our algorithm in improving up to $3times$ more coflows that meet their deadline in comparison the best SoA solution, namely $mathtt {CStext{-}MHA}$. Furthermore, when weights are used to differentiate coflow classes, $mathtt {WDCoflow}$ is able to improve the admission per class up to $4times$, while increasing the average weighted coflow admission rate.
数据中心网络通常通过协流(与共同任务相关的并行流集合)促进分布式计算框架中的数据传输。现有的大部分研究都集中在对共同流进行调度,以尽量减少其完成所需的时间,即优化网络结构中共同流的平均调度率。然而,现代应用经常会产生专门用于在线服务和关键计算任务的协流,这就要求协流的完成必须遵守特定的截止日期。在本文中,我们引入了 $mathtt {WDCoflow}$,这是一种新算法,用于最大化在截止日期前完成的共同流的加权数量。通过将动态编程算法与并行不等式相结合,我们的启发式解决方案可同时执行共同流接纳控制和共同流优先级排序,并对共同流集合实施 $sigma$ 排序。通过大量的仿真,我们证明了我们的算法的有效性,与最佳 SoA 解决方案(即 $mathtt {CStext{-}MHA}$ )相比,我们的算法能改善多达 3times$ 的共同流,使其在截止日期前达到要求。此外,当使用权重来区分共同流类别时,$mathtt {WDCoflow}$能够将每个类别的接纳率提高4倍,同时提高平均加权共同流接纳率。
{"title":"Weighted Scheduling of Time-Sensitive Coflows","authors":"Olivier Brun;Rachid El-Azouzi;Quang-Trung Luu;Francesco De Pellegrini;Balakrishna J. Prabhu;Cédric Richier","doi":"10.1109/TCC.2024.3384514","DOIUrl":"10.1109/TCC.2024.3384514","url":null,"abstract":"Datacenter networks commonly facilitate the transmission of data in distributed computing frameworks through coflows, which are collections of parallel flows associated with a common task. Most of the existing research has concentrated on scheduling coflows to minimize the time required for their completion, i.e., to optimize the average dispatch rate of coflows in the network fabric. Nevertheless, modern applications often produce coflows that are specifically intended for online services and mission-crucial computational tasks, necessitating adherence to specific deadlines for their completion. In this paper, we introduce \u0000<inline-formula><tex-math>$mathtt {WDCoflow}$</tex-math></inline-formula>\u0000, a new algorithm to maximize the weighted number of coflows that complete before their deadline. By combining a dynamic programming algorithm along with parallel inequalities, our heuristic solution performs at once coflow admission control and coflow prioritization, imposing a \u0000<inline-formula><tex-math>$sigma$</tex-math></inline-formula>\u0000-order on the set of coflows. With extensive simulation, we demonstrate the effectiveness of our algorithm in improving up to \u0000<inline-formula><tex-math>$3times$</tex-math></inline-formula>\u0000 more coflows that meet their deadline in comparison the best SoA solution, namely \u0000<inline-formula><tex-math>$mathtt {CStext{-}MHA}$</tex-math></inline-formula>\u0000. Furthermore, when weights are used to differentiate coflow classes, \u0000<inline-formula><tex-math>$mathtt {WDCoflow}$</tex-math></inline-formula>\u0000 is able to improve the admission per class up to \u0000<inline-formula><tex-math>$4times$</tex-math></inline-formula>\u0000, while increasing the average weighted coflow admission rate.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains 针对共享缓存攻击的空间硬混淆及其在确保基于云的区块链 ECDSA 安全中的应用
IF 6.5 2区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1109/TCC.2024.3383661
Yang Shi;Yimin Li;Tianyuan Luo;Xiong Jiang;Bowen Du;Hongfei Fan
In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in software modules. Program obfuscation serves as a promising countermeasure against key compromises by transforming a program into an unintelligent form while preserving its functionality. Unfortunately, for certain cryptographic algorithms such as the digital signature schemes, it is extremely difficult to construct provably secure obfuscators using traditional obfuscation approaches. To address such a challenge, this study proposes a novel approach to construct obfuscators for cryptographic algorithms named space-hard obfuscation, which can mitigate the threats from adversaries with the capability of acquiring a limited size of memory in shared cache attacks. Considering the extensive use of the Elliptic Curve Digital Signature Algorithm (ECDSA) in cloud-based Blockchain-as-a-Service (BaaS) and its potential vulnerability to shared cache attacks, we construct an exemplary scheme with provable security using space-hard obfuscation for ECDSA. Experimental results have demonstrated the scheme's high efficiency on cloud servers, as well as its successful integration with Hyperledger Fabric and Ethereum, two widely used blockchain systems.
在云计算环境中,云服务器上运行的虚拟机(VM)很容易受到共享缓存攻击,如 Spectre 和 Foreshadow。通过利用虚拟机之间的内存共享,这些攻击可以破坏软件模块中的加密密钥。程序混淆是防止密钥泄露的有效对策,它能在保留程序功能的同时,将程序转换为非智能形式。遗憾的是,对于某些加密算法(如数字签名方案),使用传统的混淆方法构建可证明安全的混淆器极为困难。为了应对这一挑战,本研究提出了一种新的方法来构建加密算法的混淆器,并将其命名为 "空间硬混淆"(space-hard obfuscation),这种方法可以在共享缓存攻击中减轻来自有能力获取有限大小内存的对手的威胁。考虑到椭圆曲线数字签名算法(ECDSA)在基于云的区块链即服务(BaaS)中的广泛应用及其在共享缓存攻击中的潜在脆弱性,我们利用空间硬混淆为ECDSA构建了一个具有可证明安全性的示例方案。实验结果表明了该方案在云服务器上的高效性,以及它与 Hyperledger Fabric 和 Ethereum 这两个广泛使用的区块链系统的成功集成。
{"title":"Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains","authors":"Yang Shi;Yimin Li;Tianyuan Luo;Xiong Jiang;Bowen Du;Hongfei Fan","doi":"10.1109/TCC.2024.3383661","DOIUrl":"10.1109/TCC.2024.3383661","url":null,"abstract":"In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in software modules. Program obfuscation serves as a promising countermeasure against key compromises by transforming a program into an unintelligent form while preserving its functionality. Unfortunately, for certain cryptographic algorithms such as the digital signature schemes, it is extremely difficult to construct provably secure obfuscators using traditional obfuscation approaches. To address such a challenge, this study proposes a novel approach to construct obfuscators for cryptographic algorithms named space-hard obfuscation, which can mitigate the threats from adversaries with the capability of acquiring a limited size of memory in shared cache attacks. Considering the extensive use of the Elliptic Curve Digital Signature Algorithm (ECDSA) in cloud-based Blockchain-as-a-Service (BaaS) and its potential vulnerability to shared cache attacks, we construct an exemplary scheme with provable security using space-hard obfuscation for ECDSA. Experimental results have demonstrated the scheme's high efficiency on cloud servers, as well as its successful integration with Hyperledger Fabric and Ethereum, two widely used blockchain systems.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning to Optimize Workflow Scheduling for an Edge–Cloud Computing Environment 学习优化边缘云计算环境的工作流调度
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-31 DOI: 10.1109/TCC.2024.3408006
Kaige Zhu;Zhenjiang Zhang;Sherali Zeadally;Feng Sun
The widespread deployment of intelligent Internet of Things (IoT) devices brings tighter latency demands on complex workload patterns such as workflows. In such applications, tremendous dataflows are generated and processed in accordance with specific service chains. Edge computing has proven its feasibility in reducing the traffic in the core network and relieving cloud datacenters of fragmented computational demands. However, the efficient scheduling of workflows in hybrid edge–cloud networks is still challenging for the intelligent IoT paradigm. Existing works make dispatching decisions prior to real execution, making it difficult to cope with the dynamicity of the environment. Consequently, the schedulers are affected both by the scheduling strategy and by the mutual impact of dynamic workloads. We design an intelligent workflow scheduler for use in an edge–cloud network where workloads are generated with continuous steady arrivals. We develop new graph neural network (GNN)-based representations for task embedding and we design a proximal policy optimization (PPO)-based online learning scheduler. We further introduce an intrinsic reward to obtain an instantaneous evaluation of the dispatching decision and correct the scheduling policy on-the-fly. Numerical results validate the feasibility of our proposal as it outperforms existing works with an improved quality of service (QoS) level.
智能物联网(IoT)设备的广泛部署对工作流等复杂工作负载模式提出了更严格的延迟要求。在此类应用中,会产生大量数据流并根据特定服务链进行处理。边缘计算在减少核心网络流量和缓解云数据中心分散的计算需求方面的可行性已得到证明。然而,对于智能物联网范例来说,在边缘-云混合网络中高效调度工作流仍具有挑战性。现有作品在实际执行之前就做出调度决策,难以应对环境的动态性。因此,调度器既受到调度策略的影响,也受到动态工作负载的相互影响。我们设计了一种智能工作流调度器,可用于工作负载持续稳定到达的边缘云网络。我们开发了新的基于图神经网络(GNN)的任务嵌入表示法,并设计了基于近端策略优化(PPO)的在线学习调度程序。我们进一步引入了内在奖励,以获得对调度决策的即时评估,并即时修正调度策略。数值结果验证了我们建议的可行性,因为它在提高服务质量(QoS)水平方面优于现有作品。
{"title":"Learning to Optimize Workflow Scheduling for an Edge–Cloud Computing Environment","authors":"Kaige Zhu;Zhenjiang Zhang;Sherali Zeadally;Feng Sun","doi":"10.1109/TCC.2024.3408006","DOIUrl":"10.1109/TCC.2024.3408006","url":null,"abstract":"The widespread deployment of intelligent Internet of Things (IoT) devices brings tighter latency demands on complex workload patterns such as workflows. In such applications, tremendous dataflows are generated and processed in accordance with specific service chains. Edge computing has proven its feasibility in reducing the traffic in the core network and relieving cloud datacenters of fragmented computational demands. However, the efficient scheduling of workflows in hybrid edge–cloud networks is still challenging for the intelligent IoT paradigm. Existing works make dispatching decisions prior to real execution, making it difficult to cope with the dynamicity of the environment. Consequently, the schedulers are affected both by the scheduling strategy and by the mutual impact of dynamic workloads. We design an intelligent workflow scheduler for use in an edge–cloud network where workloads are generated with continuous steady arrivals. We develop new graph neural network (GNN)-based representations for task embedding and we design a proximal policy optimization (PPO)-based online learning scheduler. We further introduce an intrinsic reward to obtain an instantaneous evaluation of the dispatching decision and correct the scheduling policy on-the-fly. Numerical results validate the feasibility of our proposal as it outperforms existing works with an improved quality of service (QoS) level.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs 面向边缘 VANET 的群车信誉评估方案
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1109/TCC.2024.3406509
Changbo Ke;Fu Xiao;Yan Cao;Zhiqiu Huang
With the development of the smart traffic, the traditional vehicular Ad hoc Networks (VANETs) and Traffic Estimation and Prediction System (TrEPS) do not satisfy the growing safety requirement, due to the network delay, transmit price and privacy security. In this paper, we propose a group-vehicles oriented reputation assessment scheme for edge VANETs. Firstly, based on edge computing, we build a reputation assessment framework for Group-Vehicles, to validate the correctness of message for other vehicles rapidly. Secondly, through filtering the malicious feedback and faulty message, our scheme can effectively defend against the Bad-mouth attack and Zigzag attack to assure the security of VANETs. Thirdly, the message isolation is implemented by the group-vehicles management, to enhance the privacy security of scheme. In the end, we validate the effectiveness of our scheme through experiments. In other words, even though the proportion of Bad-mouth attack vehicles is about 40%, the precision is 92.12%, and the recall is 88.25%. Also, the proportion of Zigzag attack vehicles is about 40%, the precision is 88.52%, and the recall is 86.75%.
随着智能交通的发展,传统的车载 Ad hoc 网络(VANET)和交通估计与预测系统(TrEPS)由于网络延迟、传输价格和隐私安全等问题,已经不能满足日益增长的安全需求。本文提出了一种面向边缘 VANET 的群车信誉评估方案。首先,基于边缘计算,我们构建了一个群车信誉评估框架,以快速验证其他车辆信息的正确性。其次,通过过滤恶意反馈和错误信息,我们的方案可以有效抵御Bad-mouth攻击和Zigzag攻击,确保VANET的安全性。第三,通过群车管理实现信息隔离,增强方案的隐私安全性。最后,我们通过实验验证了方案的有效性。换句话说,即使坏口攻击车辆的比例约为 40%,精确度也达到了 92.12%,召回率为 88.25%。此外,"之 "字形攻击车辆的比例约为 40%,精确度为 88.52%,召回率为 86.75%。
{"title":"A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs","authors":"Changbo Ke;Fu Xiao;Yan Cao;Zhiqiu Huang","doi":"10.1109/TCC.2024.3406509","DOIUrl":"10.1109/TCC.2024.3406509","url":null,"abstract":"With the development of the smart traffic, the traditional vehicular Ad hoc Networks (VANETs) and Traffic Estimation and Prediction System (TrEPS) do not satisfy the growing safety requirement, due to the network delay, transmit price and privacy security. In this paper, we propose a group-vehicles oriented reputation assessment scheme for edge VANETs. Firstly, based on edge computing, we build a reputation assessment framework for Group-Vehicles, to validate the correctness of message for other vehicles rapidly. Secondly, through filtering the malicious feedback and faulty message, our scheme can effectively defend against the Bad-mouth attack and Zigzag attack to assure the security of VANETs. Thirdly, the message isolation is implemented by the group-vehicles management, to enhance the privacy security of scheme. In the end, we validate the effectiveness of our scheme through experiments. In other words, even though the proportion of Bad-mouth attack vehicles is about 40%, the precision is 92.12%, and the recall is 88.25%. Also, the proportion of Zigzag attack vehicles is about 40%, the precision is 88.52%, and the recall is 86.75%.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay-Sensitive Task Offloading Optimization by Geometric Programming 通过几何编程优化对延迟敏感的任务卸载
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1109/TCC.2024.3406384
Mohammad Fathi;Mohammad Saroughi;Azarhedi Zareie
Mobile cloud computing is an emerging technology to address the resource limitation of mobile terminals. These terminals need to satisfy the performance requirements of emerging resource-consuming applications. Among these applications, delay-sensitive applications are becoming popular with the requirements of low execution times. Satisfying the delay requirements of these applications is the main objective in the task offloading of mobile cloud computing. In this paper, considering a network of wireless and wired infrastructures, a resource allocation problem in the form of a non-convex problem is formulated to provide a fair delay for offloaded tasks by delay-sensitive applications. Both transmission and computation delays are included in the formulation of the offloading delay. To tackle the problem's complexity, the assignment of mobile terminals to radio access networks and cloud servers is done by proposing greedy assignment solutions. The derived problem which is a geometric programming problem is then solved using convex programming. The performance of the proposed solution is evaluated versus the number of mobile terminals with different values of bandwidth resources at the radio network, workloads, and demand CPU cycles at mobile terminals. Numerical results demonstrate the effectiveness of the proposed solution to decrease the offloading delay in comparison with similar schemes.
移动云计算是一项新兴技术,旨在解决移动终端的资源限制问题。这些终端需要满足新出现的资源消耗型应用对性能的要求。在这些应用中,对延迟敏感的应用正变得越来越流行,它们要求较低的执行时间。满足这些应用的延迟要求是移动云计算任务卸载的主要目标。本文考虑了无线和有线基础设施网络,以非凸问题的形式提出了一个资源分配问题,为延迟敏感型应用的卸载任务提供公平的延迟。在制定卸载延迟时,传输和计算延迟都包括在内。为解决该问题的复杂性,通过提出贪婪分配方案,将移动终端分配到无线接入网络和云服务器。得出的问题是一个几何编程问题,然后使用凸编程法进行求解。根据移动终端数量、无线网络带宽资源、工作负载和移动终端 CPU 周期需求的不同值,对所提解决方案的性能进行了评估。数值结果表明,与类似方案相比,所提方案能有效减少卸载延迟。
{"title":"Delay-Sensitive Task Offloading Optimization by Geometric Programming","authors":"Mohammad Fathi;Mohammad Saroughi;Azarhedi Zareie","doi":"10.1109/TCC.2024.3406384","DOIUrl":"10.1109/TCC.2024.3406384","url":null,"abstract":"Mobile cloud computing is an emerging technology to address the resource limitation of mobile terminals. These terminals need to satisfy the performance requirements of emerging resource-consuming applications. Among these applications, delay-sensitive applications are becoming popular with the requirements of low execution times. Satisfying the delay requirements of these applications is the main objective in the task offloading of mobile cloud computing. In this paper, considering a network of wireless and wired infrastructures, a resource allocation problem in the form of a non-convex problem is formulated to provide a fair delay for offloaded tasks by delay-sensitive applications. Both transmission and computation delays are included in the formulation of the offloading delay. To tackle the problem's complexity, the assignment of mobile terminals to radio access networks and cloud servers is done by proposing greedy assignment solutions. The derived problem which is a geometric programming problem is then solved using convex programming. The performance of the proposed solution is evaluated versus the number of mobile terminals with different values of bandwidth resources at the radio network, workloads, and demand CPU cycles at mobile terminals. Numerical results demonstrate the effectiveness of the proposed solution to decrease the offloading delay in comparison with similar schemes.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Data Locality of Tasks by Executor Allocation in Spark Computing Environment 通过 Spark 计算环境中的执行器分配提高任务的数据位置性
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1109/TCC.2024.3406041
Zhongming Fu;Mengsi He;Yang Yi;Zhuo Tang
The concept of data locality is crucial for distributed systems (e.g., Spark and Hadoop) to process Big Data. Most of the existing research optimized the data locality from the aspect of task scheduling. However, as the execution container of Spark's tasks, the executor launched on different nodes can directly affect the data locality achieved by the tasks. This article tries to improve the data locality of tasks by executor allocation in Spark framework. First, because of different communication modes at stages, we separately model the communication cost of tasks for transferring input data to the executors. Then formalize an optimal executor allocation problem to minimize the total communication cost of transferring all input data. This problem is proven to be NP-hard. Finally, we present a greed dropping heuristic algorithm to provide solution to the executor allocation problem. Our proposals are implemented in Spark-3.4.0 and its performance is evaluated through representative micro-benchmarks (i.e., WordCount, Join, Sort) and macro-benchmarks (i.e., PageRank and LDA). Extensive experiments show that the proposed executor allocation strategy can decrease the network traffic and data access time by improving the data locality during the task scheduling. Its performance benefits are particularly significant for iterative applications.
数据局部性的概念对于分布式系统(如 Spark 和 Hadoop)处理大数据至关重要。现有研究大多从任务调度方面优化数据本地性。然而,作为 Spark 任务的执行容器,不同节点上启动的执行器会直接影响任务实现的数据局部性。本文试图通过 Spark 框架中的执行器分配来改善任务的数据局部性。首先,由于各阶段的通信模式不同,我们分别建立了任务向执行器传输输入数据的通信成本模型。然后形式化一个最优执行器分配问题,以最小化传输所有输入数据的总通信成本。这个问题被证明是 NP 难的。最后,我们提出了一种放弃贪婪的启发式算法,为执行器分配问题提供了解决方案。我们的建议在 Spark-3.4.0 中实现,并通过代表性的微基准(即 WordCount、Join、Sort)和宏基准(即 PageRank 和 LDA)对其性能进行了评估。广泛的实验表明,所提出的执行器分配策略可以在任务调度过程中改善数据位置,从而减少网络流量和数据访问时间。其性能优势对于迭代应用尤为显著。
{"title":"Improving Data Locality of Tasks by Executor Allocation in Spark Computing Environment","authors":"Zhongming Fu;Mengsi He;Yang Yi;Zhuo Tang","doi":"10.1109/TCC.2024.3406041","DOIUrl":"10.1109/TCC.2024.3406041","url":null,"abstract":"The concept of data locality is crucial for distributed systems (e.g., Spark and Hadoop) to process Big Data. Most of the existing research optimized the data locality from the aspect of task scheduling. However, as the execution container of Spark's tasks, the executor launched on different nodes can directly affect the data locality achieved by the tasks. This article tries to improve the data locality of tasks by executor allocation in Spark framework. First, because of different communication modes at stages, we separately model the communication cost of tasks for transferring input data to the executors. Then formalize an optimal executor allocation problem to minimize the total communication cost of transferring all input data. This problem is proven to be NP-hard. Finally, we present a greed dropping heuristic algorithm to provide solution to the executor allocation problem. Our proposals are implemented in Spark-3.4.0 and its performance is evaluated through representative micro-benchmarks (i.e., \u0000<italic>WordCount</i>\u0000, \u0000<italic>Join</i>\u0000, \u0000<italic>Sort</i>\u0000) and macro-benchmarks (i.e., \u0000<italic>PageRank</i>\u0000 and \u0000<italic>LDA</i>\u0000). Extensive experiments show that the proposed executor allocation strategy can decrease the network traffic and data access time by improving the data locality during the task scheduling. Its performance benefits are particularly significant for iterative applications.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1