首页 > 最新文献

IEEE Transactions on Cloud Computing最新文献

英文 中文
Are ARM Cloud Servers Ready for Database Workloads? an Experimental Study ARM 云服务器是否已为数据库工作负载做好准备?实验研究
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-26 DOI: 10.1109/TCC.2024.3393895
Dumitrel Loghin
Almost all major cloud providers offer virtual machines running on servers with 64-bit ARM CPUs. For example, Amazon Web Services (AWS) designed custom ARM-based CPUs named Graviton2 and Graviton3. Other cloud providers, such as Microsoft Azure and Google Cloud Platform (GCP), employ servers with Ampere Altra CPUs. In this context, we conduct a comprehensive experimental study covering in-memory key-value stores, relational databases, enterprise blockchains, and Machine Learning inference. We cover all the available types of ARM cloud processors, including Graviton2 (AWS), Graviton3 (AWS), Ampere Altra (Azure and GCP), Yitian 710 (Alibaba Cloud), and Kunpeng 920 (Huawei Cloud). Our analysis shows that Yitian and Graviton3 are serious competitors for servers with Intel Xeon CPUs, achieving similar or better results with in-memory workloads. However, the performance of OLAP, ML inference, and blockchain on ARM-based servers is below that of Xeon. The reasons are mainly threefold 1) un-optimized software, 2) lower clock frequency, and 3) lower performance at core level. Surprisingly, ARM servers spend 2X more time in Linux kernel system calls compared to Xeon servers. Nonetheless, ARM-based servers show great potential. Given their lower cloud computing price, ARM servers could be the ideal choice when the performance is not critical.
几乎所有主要的云计算提供商都提供在配备 64 位 ARM CPU 的服务器上运行的虚拟机。例如,亚马逊网络服务(AWS)设计了基于 ARM 的定制 CPU,命名为 Graviton2 和 Graviton3。其他云提供商,如微软 Azure 和谷歌云平台(GCP),则采用了配备 Ampere Altra CPU 的服务器。在此背景下,我们进行了一项全面的实验研究,涵盖内存键值存储、关系数据库、企业区块链和机器学习推理。我们涵盖了所有可用的 ARM 云处理器类型,包括 Graviton2(AWS)、Graviton3(AWS)、Ampere Altra(Azure 和 GCP)、倚天 710(阿里巴巴云)和鲲鹏 920(华为云)。我们的分析表明,倚天和 Graviton3 是英特尔至强 CPU 服务器的有力竞争者,在内存工作负载方面取得了相似或更好的结果。然而,在基于 ARM 的服务器上,OLAP、ML 推理和区块链的性能却低于至强。原因主要有三个方面:1)软件未优化;2)时钟频率较低;3)内核级性能较低。令人惊讶的是,与 Xeon 服务器相比,ARM 服务器在 Linux 内核系统调用上花费的时间多出 2 倍。不过,基于 ARM 的服务器显示出巨大的潜力。鉴于其较低的云计算价格,ARM 服务器可能是性能要求不高时的理想选择。
{"title":"Are ARM Cloud Servers Ready for Database Workloads? an Experimental Study","authors":"Dumitrel Loghin","doi":"10.1109/TCC.2024.3393895","DOIUrl":"10.1109/TCC.2024.3393895","url":null,"abstract":"Almost all major cloud providers offer virtual machines running on servers with 64-bit ARM CPUs. For example, Amazon Web Services (AWS) designed custom ARM-based CPUs named Graviton2 and Graviton3. Other cloud providers, such as Microsoft Azure and Google Cloud Platform (GCP), employ servers with Ampere Altra CPUs. In this context, we conduct a comprehensive experimental study covering in-memory key-value stores, relational databases, enterprise blockchains, and Machine Learning inference. We cover all the available types of ARM cloud processors, including Graviton2 (AWS), Graviton3 (AWS), Ampere Altra (Azure and GCP), Yitian 710 (Alibaba Cloud), and Kunpeng 920 (Huawei Cloud). Our analysis shows that Yitian and Graviton3 are serious competitors for servers with Intel Xeon CPUs, achieving similar or better results with in-memory workloads. However, the performance of OLAP, ML inference, and blockchain on ARM-based servers is below that of Xeon. The reasons are mainly threefold 1) un-optimized software, 2) lower clock frequency, and 3) lower performance at core level. Surprisingly, ARM servers spend 2X more time in Linux kernel system calls compared to Xeon servers. Nonetheless, ARM-based servers show great potential. Given their lower cloud computing price, ARM servers could be the ideal choice when the performance is not critical.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 3","pages":"818-829"},"PeriodicalIF":5.3,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Evaluation of a Hierarchical Characterization and Adaptive Prediction Model for Cloud Workloads 设计和评估云工作负载的分层特征描述和自适应预测模型
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-24 DOI: 10.1109/TCC.2024.3393114
Karthick Seshadri;Korrapati Sindhu;S. Nagesh Bhattu;Chidambaran Kollengode
Workload characterization and subsequent prediction are significant steps in maintaining the elasticity and scalability of resources in Cloud Data Centers. Due to the high variance in cloud workloads, designing a prediction algorithm that models the variations in the workload is a non-trivial task. If the workload predictor is unable to handle the dynamism in the workloads, then the result of the predictor may lead to over-provisioning or under-provisioning of cloud resources. To address this problem, we have created a Super Markov Prediction Model (SMPM) whose behaviour changes as per the change in the workload patterns. As the time progresses, based on the workload pattern SMPM uses different sequence models to predict the future workload. To evaluate the proposed model, we have experimented with Alibaba trace 2018, Google Cluster Trace (GCT), Alibaba trace 2020 and TPC-W workload trace. We have compared SMPM's prediction results with existing state-of-the-art prediction models and empirically verified that the proposed prediction model achieves a better accuracy as quantified using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE).
工作负载特征描述和后续预测是保持云数据中心资源弹性和可扩展性的重要步骤。由于云工作负载的变化很大,因此设计一种能够模拟工作负载变化的预测算法并非易事。如果工作负载预测器无法处理工作负载的动态变化,那么预测器的结果可能会导致云资源的过度分配或分配不足。为了解决这个问题,我们创建了一个超级马尔可夫预测模型(SMPM),其行为会随着工作负载模式的变化而改变。随着时间的推移,SMPM 会根据工作负载模式使用不同的序列模型来预测未来的工作负载。为了评估所提出的模型,我们使用 2018 年阿里巴巴跟踪、谷歌集群跟踪(GCT)、2020 年阿里巴巴跟踪和 TPC-W 工作负载跟踪进行了实验。我们将 SMPM 的预测结果与现有的最先进预测模型进行了比较,并通过实证验证了所提出的预测模型具有更高的准确性,并使用均方根误差(RMSE)和平均绝对误差(MAE)进行了量化。
{"title":"Design and Evaluation of a Hierarchical Characterization and Adaptive Prediction Model for Cloud Workloads","authors":"Karthick Seshadri;Korrapati Sindhu;S. Nagesh Bhattu;Chidambaran Kollengode","doi":"10.1109/TCC.2024.3393114","DOIUrl":"10.1109/TCC.2024.3393114","url":null,"abstract":"Workload characterization and subsequent prediction are significant steps in maintaining the elasticity and scalability of resources in Cloud Data Centers. Due to the high variance in cloud workloads, designing a prediction algorithm that models the variations in the workload is a non-trivial task. If the workload predictor is unable to handle the dynamism in the workloads, then the result of the predictor may lead to over-provisioning or under-provisioning of cloud resources. To address this problem, we have created a Super Markov Prediction Model (SMPM) whose behaviour changes as per the change in the workload patterns. As the time progresses, based on the workload pattern SMPM uses different sequence models to predict the future workload. To evaluate the proposed model, we have experimented with Alibaba trace 2018, Google Cluster Trace (GCT), Alibaba trace 2020 and TPC-W workload trace. We have compared SMPM's prediction results with existing state-of-the-art prediction models and empirically verified that the proposed prediction model achieves a better accuracy as quantified using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE).","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"712-724"},"PeriodicalIF":6.5,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140806316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVD: A Scalable Virtual Machine Disk Format SVD:可扩展的虚拟机磁盘格式
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-19 DOI: 10.1109/TCC.2024.3391390
Kevin Nguetchouang;Stella Bitchebe;Theophile Dubuc;Mar Callau-Zori;Christophe Hubert;Pierre Olivier;Alain Tchana
Contrary to CPU, memory, and network, disk virtualization is peculiar, for which virtualization through direct access is impossible. We study virtual disk utilization in a large-scale public cloud and observe the presence of long snapshot chains, sometimes composed of up to 1,000 files. We then demonstrate, through experimental measurements, that such long chains lead to virtualized storage performance and memory footprint scalability issues. To address these problems, we present SVD, a new virtual disk format. We implemented SVD by extending Qcow2, a popular format, and its Qemu driver. We evaluated our prototype, demonstrating that it brings significant performance enhancements and memory footprint reduction. For example, SVD improves the throughput of RocksDB by about 48% on a snapshot chain of length 500. SVD also reduces the memory footprint by 15×.
与 CPU、内存和网络相反,磁盘虚拟化是一种特殊的虚拟化,不可能通过直接访问实现虚拟化。我们研究了大规模公共云中的虚拟磁盘利用情况,观察到存在长快照链,有时由多达 1,000 个文件组成。然后,我们通过实验测量证明,这种长链会导致虚拟化存储性能和内存占用可扩展性问题。为了解决这些问题,我们提出了一种新的虚拟磁盘格式 SVD。我们通过扩展流行格式 Qcow2 及其 Qemu 驱动程序来实现 SVD。我们对原型进行了评估,结果表明它能显著提高性能并减少内存占用。例如,在长度为 500 的快照链上,SVD 将 RocksDB 的吞吐量提高了约 48%。SVD 还将内存占用减少了 15 倍。
{"title":"SVD: A Scalable Virtual Machine Disk Format","authors":"Kevin Nguetchouang;Stella Bitchebe;Theophile Dubuc;Mar Callau-Zori;Christophe Hubert;Pierre Olivier;Alain Tchana","doi":"10.1109/TCC.2024.3391390","DOIUrl":"10.1109/TCC.2024.3391390","url":null,"abstract":"Contrary to CPU, memory, and network, disk virtualization is peculiar, for which virtualization through direct access is impossible. We study virtual disk utilization in a large-scale public cloud and observe the presence of long snapshot chains, sometimes composed of up to 1,000 files. We then demonstrate, through experimental measurements, that such long chains lead to virtualized storage performance and memory footprint scalability issues. To address these problems, we present \u0000<sc>SVD</small>\u0000, a new virtual disk format. We implemented \u0000<sc>SVD</small>\u0000 by extending Qcow2, a popular format, and its Qemu driver. We evaluated our prototype, demonstrating that it brings significant performance enhancements and memory footprint reduction. For example, \u0000<sc>SVD</small>\u0000 improves the throughput of RocksDB by about 48% on a snapshot chain of length 500. \u0000<sc>SVD</small>\u0000 also reduces the memory footprint by 15×.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"684-696"},"PeriodicalIF":6.5,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P4Hauler: An Accelerator-Aware In-Network Load Balancer for Applications Performance Boosting P4Hauler:用于提升应用性能的加速器感知网络内负载平衡器
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-19 DOI: 10.1109/TCC.2024.3389658
Hesam Tajbakhsh;Ricardo Parizotto;Alberto Schaeffer-Filho;Israat Haque
Programmable accelerators enable the execution of applications intended for running in usual servers. However, inappropriately running applications on these devices can lead to load imbalance and performance degradation. An alternative to tackle this problem is load balancing, but existing in-network load balancers typically have no visibility of accelerators and often hard code policies in the switch source code. In this article, we present P4Hauler, an accelerator-aware in-network load balancer. In particular, our design discusses how to enforce load-balancing decisions in a programmable switch in a resource-aware manner, allowing different policies to handle traffic according to applications’ needs. We use monitoring and compression techniques to store application resources in a programmable switch for resource-aware decisions. In addition, we propose building blocks that operators can dynamically choose to realize different load balancing policies on-the-fly. We implemented and evaluated a prototype of P4Hauler on a testbed to show its efficiency and deployment feasibility. Our results indicate that P4Hauler can support 27% more load and decrease the flow completion time by around 13% using only a single accelerator. Also, extensive simulations confirm the performance gain of P4Hauler at scale compared to the state-of-the-art.
可编程加速器能够执行在普通服务器上运行的应用程序。然而,在这些设备上不适当地运行应用程序会导致负载不平衡和性能下降。解决这一问题的另一个办法是负载平衡,但现有的网内负载平衡器通常无法看到加速器,而且通常在交换机源代码中硬编码策略。在本文中,我们介绍了 P4Hauler,一种加速器感知的网内负载平衡器。我们的设计特别讨论了如何以资源感知的方式在可编程交换机中执行负载平衡决策,允许根据应用程序的需求采用不同的策略来处理流量。我们使用监控和压缩技术在可编程交换机中存储应用资源,以便做出资源感知决策。此外,我们还提出了构建模块,操作员可以动态选择这些模块,以实现不同的即时负载平衡策略。我们在测试平台上实施并评估了 P4Hauler 的原型,以展示其效率和部署可行性。我们的结果表明,P4Hauler 仅使用一个加速器就能多支持 27% 的负载,并将流量完成时间缩短约 13%。此外,大量的仿真证实,与最先进的技术相比,P4Hauler 在大规模应用中的性能提升非常明显。
{"title":"P4Hauler: An Accelerator-Aware In-Network Load Balancer for Applications Performance Boosting","authors":"Hesam Tajbakhsh;Ricardo Parizotto;Alberto Schaeffer-Filho;Israat Haque","doi":"10.1109/TCC.2024.3389658","DOIUrl":"10.1109/TCC.2024.3389658","url":null,"abstract":"Programmable accelerators enable the execution of applications intended for running in usual servers. However, inappropriately running applications on these devices can lead to load imbalance and performance degradation. An alternative to tackle this problem is load balancing, but existing in-network load balancers typically have no visibility of accelerators and often hard code policies in the switch source code. In this article, we present \u0000<sc>P4Hauler</small>\u0000, an accelerator-aware in-network load balancer. In particular, our design discusses how to enforce load-balancing decisions in a programmable switch in a resource-aware manner, allowing different policies to handle traffic according to applications’ needs. We use monitoring and compression techniques to store application resources in a programmable switch for resource-aware decisions. In addition, we propose building blocks that operators can dynamically choose to realize different load balancing policies on-the-fly. We implemented and evaluated a prototype of \u0000<sc>P4Hauler</small>\u0000 on a testbed to show its efficiency and deployment feasibility. Our results indicate that \u0000<sc>P4Hauler</small>\u0000 can support 27% more load and decrease the flow completion time by around 13% using only a single accelerator. Also, extensive simulations confirm the performance gain of \u0000<sc>P4Hauler</small>\u0000 at scale compared to the state-of-the-art.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"697-711"},"PeriodicalIF":6.5,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Framework to Resolve the Oligopoly Issue in Cloud Computing 解决云计算寡头垄断问题的区块链框架
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1109/TCC.2024.3390933
Amit Biswas;Gaurav Baranwal;Abhinav Kumar
Cloud computing is one of the foundation technologies of Industry 4.0. Cloud 2.0 is the upcoming cloud technology that addresses several bottlenecks of Cloud 1.0. For instance, the presence of small service providers is threatened by the dominance of a few giant service providers in today’s cloud market in Cloud 1.0. Under this circumstance, the small service providers must work together to compete with the giant competitors to survive in the market. For that, small service providers require a transparent, fair, cost-effective, fault-tolerant, and easily scalable platform that can provide reliable and quality services to customers. This work introduces a blockchain-based framework to provide such a platform for cloud service providers and their customers. Here, a new consensus mechanism is proposed to maintain the system’s fairness, decentralization, and consistency. A consensus-based service monitoring concept is also introduced to assess the service quality. If a service provider does not deliver the committed quality of service (QoS), a penalty is imposed on the service provider. This framework is designed so that the service providers are always bound to provide committed QoS to the customers. Finally, we performed several experiments, and the experimental results corroborate our claims regarding the proposed framework.
云计算是工业 4.0 的基础技术之一。云 2.0 是即将推出的云技术,它解决了云 1.0 的几个瓶颈。例如,在云 1.0 中,小型服务提供商的存在受到了当今云市场中少数巨型服务提供商主导地位的威胁。在这种情况下,小型服务提供商必须齐心协力与巨头竞争,才能在市场上生存。为此,小型服务提供商需要一个透明、公平、经济高效、容错且易于扩展的平台,为客户提供可靠、优质的服务。这项工作引入了一个基于区块链的框架,为云服务提供商及其客户提供这样一个平台。这里提出了一种新的共识机制,以维护系统的公平性、去中心化和一致性。此外,还引入了基于共识的服务监控概念来评估服务质量。如果服务提供商没有提供承诺的服务质量(QoS),服务提供商将受到惩罚。这一框架的设计使服务提供商始终有义务向客户提供承诺的服务质量。最后,我们进行了几项实验,实验结果证实了我们对拟议框架的主张。
{"title":"A Blockchain-Based Framework to Resolve the Oligopoly Issue in Cloud Computing","authors":"Amit Biswas;Gaurav Baranwal;Abhinav Kumar","doi":"10.1109/TCC.2024.3390933","DOIUrl":"10.1109/TCC.2024.3390933","url":null,"abstract":"Cloud computing is one of the foundation technologies of Industry 4.0. Cloud 2.0 is the upcoming cloud technology that addresses several bottlenecks of Cloud 1.0. For instance, the presence of small service providers is threatened by the dominance of a few giant service providers in today’s cloud market in Cloud 1.0. Under this circumstance, the small service providers must work together to compete with the giant competitors to survive in the market. For that, small service providers require a transparent, fair, cost-effective, fault-tolerant, and easily scalable platform that can provide reliable and quality services to customers. This work introduces a blockchain-based framework to provide such a platform for cloud service providers and their customers. Here, a new consensus mechanism is proposed to maintain the system’s fairness, decentralization, and consistency. A consensus-based service monitoring concept is also introduced to assess the service quality. If a service provider does not deliver the committed quality of service (QoS), a penalty is imposed on the service provider. This framework is designed so that the service providers are always bound to provide committed QoS to the customers. Finally, we performed several experiments, and the experimental results corroborate our claims regarding the proposed framework.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"671-683"},"PeriodicalIF":6.5,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140629101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing 为移动云计算提供具有恒定大小密码文本的分层双边访问控制
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-08 DOI: 10.1109/TCC.2024.3386126
Axin Wu;Yinghui Zhang;Jianhao Zhu;Qiuxia Zhao;Yu Zhang
Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud computing, enabling users to enjoy personalized services without constraints and restrictions of time and place. While this brings convenience, it also comes with risks such as privacy breaches and unauthorized access to outsourced data. Bilateral access control is a promising technique for addressing these issues. However, the current bilateral access control schemes cannot solve problems such as single point failure. To further enhance and enrich the existing schemes, we propose hierarchical bilateral access control. In the proposed scheme, the permission of generating encryption keys and decryption keys can be delegated to its child nodes, which alleviates the computation and communication overheads of the parent nodes and weaken the potential risks of single-point failure. Additionally, the ciphertext size remains constant, reducing the costs of transmitting and storing ciphertext and relieving resource limitations on devices. We then prove the privacy and authenticity of the scheme in the random oracle model. Finally, the comprehensive performance comparison and analysis demonstrate the efficiency of the proposed scheme.
移动云计算(MCC)整合了移动网络和云计算的优势,使用户可以不受时间和地点的限制,享受个性化服务。这在带来便利的同时,也带来了隐私泄露和未经授权访问外包数据等风险。双边访问控制是解决这些问题的一种有前途的技术。然而,目前的双边访问控制方案无法解决单点故障等问题。为了进一步增强和丰富现有方案,我们提出了分层双边访问控制。在提出的方案中,生成加密密钥和解密密钥的权限可以下放给子节点,从而减轻了父节点的计算和通信开销,削弱了单点故障的潜在风险。此外,密文大小保持不变,降低了传输和存储密文的成本,缓解了设备的资源限制。然后,我们证明了该方案在随机甲骨文模型中的隐私性和真实性。最后,全面的性能比较和分析证明了所提方案的效率。
{"title":"Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing","authors":"Axin Wu;Yinghui Zhang;Jianhao Zhu;Qiuxia Zhao;Yu Zhang","doi":"10.1109/TCC.2024.3386126","DOIUrl":"10.1109/TCC.2024.3386126","url":null,"abstract":"Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud computing, enabling users to enjoy personalized services without constraints and restrictions of time and place. While this brings convenience, it also comes with risks such as privacy breaches and unauthorized access to outsourced data. Bilateral access control is a promising technique for addressing these issues. However, the current bilateral access control schemes cannot solve problems such as single point failure. To further enhance and enrich the existing schemes, we propose hierarchical bilateral access control. In the proposed scheme, the permission of generating encryption keys and decryption keys can be delegated to its child nodes, which alleviates the computation and communication overheads of the parent nodes and weaken the potential risks of single-point failure. Additionally, the ciphertext size remains constant, reducing the costs of transmitting and storing ciphertext and relieving resource limitations on devices. We then prove the privacy and authenticity of the scheme in the random oracle model. Finally, the comprehensive performance comparison and analysis demonstrate the efficiency of the proposed scheme.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"659-670"},"PeriodicalIF":6.5,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Scheduling of Time-Sensitive Coflows 对时间敏感的同流加权调度
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-03 DOI: 10.1109/TCC.2024.3384514
Olivier Brun;Rachid El-Azouzi;Quang-Trung Luu;Francesco De Pellegrini;Balakrishna J. Prabhu;Cédric Richier
Datacenter networks commonly facilitate the transmission of data in distributed computing frameworks through coflows, which are collections of parallel flows associated with a common task. Most of the existing research has concentrated on scheduling coflows to minimize the time required for their completion, i.e., to optimize the average dispatch rate of coflows in the network fabric. Nevertheless, modern applications often produce coflows that are specifically intended for online services and mission-crucial computational tasks, necessitating adherence to specific deadlines for their completion. In this paper, we introduce $mathtt {WDCoflow}$, a new algorithm to maximize the weighted number of coflows that complete before their deadline. By combining a dynamic programming algorithm along with parallel inequalities, our heuristic solution performs at once coflow admission control and coflow prioritization, imposing a $sigma$-order on the set of coflows. With extensive simulation, we demonstrate the effectiveness of our algorithm in improving up to $3times$ more coflows that meet their deadline in comparison the best SoA solution, namely $mathtt {CStext{-}MHA}$. Furthermore, when weights are used to differentiate coflow classes, $mathtt {WDCoflow}$ is able to improve the admission per class up to $4times$, while increasing the average weighted coflow admission rate.
数据中心网络通常通过协流(与共同任务相关的并行流集合)促进分布式计算框架中的数据传输。现有的大部分研究都集中在对共同流进行调度,以尽量减少其完成所需的时间,即优化网络结构中共同流的平均调度率。然而,现代应用经常会产生专门用于在线服务和关键计算任务的协流,这就要求协流的完成必须遵守特定的截止日期。在本文中,我们引入了 $mathtt {WDCoflow}$,这是一种新算法,用于最大化在截止日期前完成的共同流的加权数量。通过将动态编程算法与并行不等式相结合,我们的启发式解决方案可同时执行共同流接纳控制和共同流优先级排序,并对共同流集合实施 $sigma$ 排序。通过大量的仿真,我们证明了我们的算法的有效性,与最佳 SoA 解决方案(即 $mathtt {CStext{-}MHA}$ )相比,我们的算法能改善多达 3times$ 的共同流,使其在截止日期前达到要求。此外,当使用权重来区分共同流类别时,$mathtt {WDCoflow}$能够将每个类别的接纳率提高4倍,同时提高平均加权共同流接纳率。
{"title":"Weighted Scheduling of Time-Sensitive Coflows","authors":"Olivier Brun;Rachid El-Azouzi;Quang-Trung Luu;Francesco De Pellegrini;Balakrishna J. Prabhu;Cédric Richier","doi":"10.1109/TCC.2024.3384514","DOIUrl":"10.1109/TCC.2024.3384514","url":null,"abstract":"Datacenter networks commonly facilitate the transmission of data in distributed computing frameworks through coflows, which are collections of parallel flows associated with a common task. Most of the existing research has concentrated on scheduling coflows to minimize the time required for their completion, i.e., to optimize the average dispatch rate of coflows in the network fabric. Nevertheless, modern applications often produce coflows that are specifically intended for online services and mission-crucial computational tasks, necessitating adherence to specific deadlines for their completion. In this paper, we introduce \u0000<inline-formula><tex-math>$mathtt {WDCoflow}$</tex-math></inline-formula>\u0000, a new algorithm to maximize the weighted number of coflows that complete before their deadline. By combining a dynamic programming algorithm along with parallel inequalities, our heuristic solution performs at once coflow admission control and coflow prioritization, imposing a \u0000<inline-formula><tex-math>$sigma$</tex-math></inline-formula>\u0000-order on the set of coflows. With extensive simulation, we demonstrate the effectiveness of our algorithm in improving up to \u0000<inline-formula><tex-math>$3times$</tex-math></inline-formula>\u0000 more coflows that meet their deadline in comparison the best SoA solution, namely \u0000<inline-formula><tex-math>$mathtt {CStext{-}MHA}$</tex-math></inline-formula>\u0000. Furthermore, when weights are used to differentiate coflow classes, \u0000<inline-formula><tex-math>$mathtt {WDCoflow}$</tex-math></inline-formula>\u0000 is able to improve the admission per class up to \u0000<inline-formula><tex-math>$4times$</tex-math></inline-formula>\u0000, while increasing the average weighted coflow admission rate.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"644-658"},"PeriodicalIF":6.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains 针对共享缓存攻击的空间硬混淆及其在确保基于云的区块链 ECDSA 安全中的应用
IF 6.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1109/TCC.2024.3383661
Yang Shi;Yimin Li;Tianyuan Luo;Xiong Jiang;Bowen Du;Hongfei Fan
In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in software modules. Program obfuscation serves as a promising countermeasure against key compromises by transforming a program into an unintelligent form while preserving its functionality. Unfortunately, for certain cryptographic algorithms such as the digital signature schemes, it is extremely difficult to construct provably secure obfuscators using traditional obfuscation approaches. To address such a challenge, this study proposes a novel approach to construct obfuscators for cryptographic algorithms named space-hard obfuscation, which can mitigate the threats from adversaries with the capability of acquiring a limited size of memory in shared cache attacks. Considering the extensive use of the Elliptic Curve Digital Signature Algorithm (ECDSA) in cloud-based Blockchain-as-a-Service (BaaS) and its potential vulnerability to shared cache attacks, we construct an exemplary scheme with provable security using space-hard obfuscation for ECDSA. Experimental results have demonstrated the scheme's high efficiency on cloud servers, as well as its successful integration with Hyperledger Fabric and Ethereum, two widely used blockchain systems.
在云计算环境中,云服务器上运行的虚拟机(VM)很容易受到共享缓存攻击,如 Spectre 和 Foreshadow。通过利用虚拟机之间的内存共享,这些攻击可以破坏软件模块中的加密密钥。程序混淆是防止密钥泄露的有效对策,它能在保留程序功能的同时,将程序转换为非智能形式。遗憾的是,对于某些加密算法(如数字签名方案),使用传统的混淆方法构建可证明安全的混淆器极为困难。为了应对这一挑战,本研究提出了一种新的方法来构建加密算法的混淆器,并将其命名为 "空间硬混淆"(space-hard obfuscation),这种方法可以在共享缓存攻击中减轻来自有能力获取有限大小内存的对手的威胁。考虑到椭圆曲线数字签名算法(ECDSA)在基于云的区块链即服务(BaaS)中的广泛应用及其在共享缓存攻击中的潜在脆弱性,我们利用空间硬混淆为ECDSA构建了一个具有可证明安全性的示例方案。实验结果表明了该方案在云服务器上的高效性,以及它与 Hyperledger Fabric 和 Ethereum 这两个广泛使用的区块链系统的成功集成。
{"title":"Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains","authors":"Yang Shi;Yimin Li;Tianyuan Luo;Xiong Jiang;Bowen Du;Hongfei Fan","doi":"10.1109/TCC.2024.3383661","DOIUrl":"10.1109/TCC.2024.3383661","url":null,"abstract":"In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compromise cryptographic keys in software modules. Program obfuscation serves as a promising countermeasure against key compromises by transforming a program into an unintelligent form while preserving its functionality. Unfortunately, for certain cryptographic algorithms such as the digital signature schemes, it is extremely difficult to construct provably secure obfuscators using traditional obfuscation approaches. To address such a challenge, this study proposes a novel approach to construct obfuscators for cryptographic algorithms named space-hard obfuscation, which can mitigate the threats from adversaries with the capability of acquiring a limited size of memory in shared cache attacks. Considering the extensive use of the Elliptic Curve Digital Signature Algorithm (ECDSA) in cloud-based Blockchain-as-a-Service (BaaS) and its potential vulnerability to shared cache attacks, we construct an exemplary scheme with provable security using space-hard obfuscation for ECDSA. Experimental results have demonstrated the scheme's high efficiency on cloud servers, as well as its successful integration with Hyperledger Fabric and Ethereum, two widely used blockchain systems.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 2","pages":"625-643"},"PeriodicalIF":6.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning to Optimize Workflow Scheduling for an Edge–Cloud Computing Environment 学习优化边缘云计算环境的工作流调度
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-31 DOI: 10.1109/TCC.2024.3408006
Kaige Zhu;Zhenjiang Zhang;Sherali Zeadally;Feng Sun
The widespread deployment of intelligent Internet of Things (IoT) devices brings tighter latency demands on complex workload patterns such as workflows. In such applications, tremendous dataflows are generated and processed in accordance with specific service chains. Edge computing has proven its feasibility in reducing the traffic in the core network and relieving cloud datacenters of fragmented computational demands. However, the efficient scheduling of workflows in hybrid edge–cloud networks is still challenging for the intelligent IoT paradigm. Existing works make dispatching decisions prior to real execution, making it difficult to cope with the dynamicity of the environment. Consequently, the schedulers are affected both by the scheduling strategy and by the mutual impact of dynamic workloads. We design an intelligent workflow scheduler for use in an edge–cloud network where workloads are generated with continuous steady arrivals. We develop new graph neural network (GNN)-based representations for task embedding and we design a proximal policy optimization (PPO)-based online learning scheduler. We further introduce an intrinsic reward to obtain an instantaneous evaluation of the dispatching decision and correct the scheduling policy on-the-fly. Numerical results validate the feasibility of our proposal as it outperforms existing works with an improved quality of service (QoS) level.
智能物联网(IoT)设备的广泛部署对工作流等复杂工作负载模式提出了更严格的延迟要求。在此类应用中,会产生大量数据流并根据特定服务链进行处理。边缘计算在减少核心网络流量和缓解云数据中心分散的计算需求方面的可行性已得到证明。然而,对于智能物联网范例来说,在边缘-云混合网络中高效调度工作流仍具有挑战性。现有作品在实际执行之前就做出调度决策,难以应对环境的动态性。因此,调度器既受到调度策略的影响,也受到动态工作负载的相互影响。我们设计了一种智能工作流调度器,可用于工作负载持续稳定到达的边缘云网络。我们开发了新的基于图神经网络(GNN)的任务嵌入表示法,并设计了基于近端策略优化(PPO)的在线学习调度程序。我们进一步引入了内在奖励,以获得对调度决策的即时评估,并即时修正调度策略。数值结果验证了我们建议的可行性,因为它在提高服务质量(QoS)水平方面优于现有作品。
{"title":"Learning to Optimize Workflow Scheduling for an Edge–Cloud Computing Environment","authors":"Kaige Zhu;Zhenjiang Zhang;Sherali Zeadally;Feng Sun","doi":"10.1109/TCC.2024.3408006","DOIUrl":"10.1109/TCC.2024.3408006","url":null,"abstract":"The widespread deployment of intelligent Internet of Things (IoT) devices brings tighter latency demands on complex workload patterns such as workflows. In such applications, tremendous dataflows are generated and processed in accordance with specific service chains. Edge computing has proven its feasibility in reducing the traffic in the core network and relieving cloud datacenters of fragmented computational demands. However, the efficient scheduling of workflows in hybrid edge–cloud networks is still challenging for the intelligent IoT paradigm. Existing works make dispatching decisions prior to real execution, making it difficult to cope with the dynamicity of the environment. Consequently, the schedulers are affected both by the scheduling strategy and by the mutual impact of dynamic workloads. We design an intelligent workflow scheduler for use in an edge–cloud network where workloads are generated with continuous steady arrivals. We develop new graph neural network (GNN)-based representations for task embedding and we design a proximal policy optimization (PPO)-based online learning scheduler. We further introduce an intrinsic reward to obtain an instantaneous evaluation of the dispatching decision and correct the scheduling policy on-the-fly. Numerical results validate the feasibility of our proposal as it outperforms existing works with an improved quality of service (QoS) level.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 3","pages":"897-912"},"PeriodicalIF":5.3,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs 面向边缘 VANET 的群车信誉评估方案
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1109/TCC.2024.3406509
Changbo Ke;Fu Xiao;Yan Cao;Zhiqiu Huang
With the development of the smart traffic, the traditional vehicular Ad hoc Networks (VANETs) and Traffic Estimation and Prediction System (TrEPS) do not satisfy the growing safety requirement, due to the network delay, transmit price and privacy security. In this paper, we propose a group-vehicles oriented reputation assessment scheme for edge VANETs. Firstly, based on edge computing, we build a reputation assessment framework for Group-Vehicles, to validate the correctness of message for other vehicles rapidly. Secondly, through filtering the malicious feedback and faulty message, our scheme can effectively defend against the Bad-mouth attack and Zigzag attack to assure the security of VANETs. Thirdly, the message isolation is implemented by the group-vehicles management, to enhance the privacy security of scheme. In the end, we validate the effectiveness of our scheme through experiments. In other words, even though the proportion of Bad-mouth attack vehicles is about 40%, the precision is 92.12%, and the recall is 88.25%. Also, the proportion of Zigzag attack vehicles is about 40%, the precision is 88.52%, and the recall is 86.75%.
随着智能交通的发展,传统的车载 Ad hoc 网络(VANET)和交通估计与预测系统(TrEPS)由于网络延迟、传输价格和隐私安全等问题,已经不能满足日益增长的安全需求。本文提出了一种面向边缘 VANET 的群车信誉评估方案。首先,基于边缘计算,我们构建了一个群车信誉评估框架,以快速验证其他车辆信息的正确性。其次,通过过滤恶意反馈和错误信息,我们的方案可以有效抵御Bad-mouth攻击和Zigzag攻击,确保VANET的安全性。第三,通过群车管理实现信息隔离,增强方案的隐私安全性。最后,我们通过实验验证了方案的有效性。换句话说,即使坏口攻击车辆的比例约为 40%,精确度也达到了 92.12%,召回率为 88.25%。此外,"之 "字形攻击车辆的比例约为 40%,精确度为 88.52%,召回率为 86.75%。
{"title":"A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs","authors":"Changbo Ke;Fu Xiao;Yan Cao;Zhiqiu Huang","doi":"10.1109/TCC.2024.3406509","DOIUrl":"10.1109/TCC.2024.3406509","url":null,"abstract":"With the development of the smart traffic, the traditional vehicular Ad hoc Networks (VANETs) and Traffic Estimation and Prediction System (TrEPS) do not satisfy the growing safety requirement, due to the network delay, transmit price and privacy security. In this paper, we propose a group-vehicles oriented reputation assessment scheme for edge VANETs. Firstly, based on edge computing, we build a reputation assessment framework for Group-Vehicles, to validate the correctness of message for other vehicles rapidly. Secondly, through filtering the malicious feedback and faulty message, our scheme can effectively defend against the Bad-mouth attack and Zigzag attack to assure the security of VANETs. Thirdly, the message isolation is implemented by the group-vehicles management, to enhance the privacy security of scheme. In the end, we validate the effectiveness of our scheme through experiments. In other words, even though the proportion of Bad-mouth attack vehicles is about 40%, the precision is 92.12%, and the recall is 88.25%. Also, the proportion of Zigzag attack vehicles is about 40%, the precision is 88.52%, and the recall is 86.75%.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 3","pages":"859-875"},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1