Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015493
Sashank Dara
Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.
{"title":"Network Telemetry Anonymization for Cloud Based Security Analysis - Best Practices","authors":"Sashank Dara","doi":"10.1109/CCEM.2014.7015493","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015493","url":null,"abstract":"Availability of network telemetry data aides in identifying security compromises, malicious traffic patterns, malware spread etc. There are varieties of Cloud based security services available for consumers to benefit from but on another hand there is a compelling need for ensuring privacy of sensitive fields before data is shared with any cloud provider. Anonymization techniques based on micro-data or macro-data have challenges in terms of attacks possible, scalability and practicality. In this paper we discuss challenges in privacy-preserving cloudification of network telemetry data. We present practical and scalable techniques for network data anonymization. These techniques ensure the privacy of the sensitive fields while retaining the ability to perform security forensics and analytics. We also provide best practices for ensuring successful data anonymization.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015484
Chetan Awasthi, P. Kanungo
The Cloud has become platform to provide variety of services and a broker is needed for quality service at competitive rate and to help the vendors in increasing revenue by keeping their resources. In this paper, we have proposed a resource broker mechanism that will help the vendors to identify frequent clients (FC) and provide quality services thereby improving trust on client side. The broker mechanism helps the clients and vendors in locating, resources and increasing their revenue respectively.
{"title":"Client Requirement Modeling Using Resource Broker Architecture in Cloud Computing Environment","authors":"Chetan Awasthi, P. Kanungo","doi":"10.1109/CCEM.2014.7015484","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015484","url":null,"abstract":"The Cloud has become platform to provide variety of services and a broker is needed for quality service at competitive rate and to help the vendors in increasing revenue by keeping their resources. In this paper, we have proposed a resource broker mechanism that will help the vendors to identify frequent clients (FC) and provide quality services thereby improving trust on client side. The broker mechanism helps the clients and vendors in locating, resources and increasing their revenue respectively.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015474
V. Binu, N. D. Gangadhar
Service Level Agreements (SLAs) are essential to the service oriented business model of Cloud Computing. SLA Frameworks for cloud computing need methodology for negotiation and monitoring of service delivery. The success and acceptability of SLAs requires their trusted and secure monitoring. In this paper an SLA Framework which incorporates negotiation and secure monitoring mechanism involving a third-party is developed. A reference implementation of the Framework is carried out and used to develop a case study of video transcoding service by a provider hosted on a cloud. The case study illustrates the effectiveness of the developed framework in creating SLAs for complex scenarios encountered in cloud computing services. Workload characterization is used to characterise the SLA service parameters which are employed in defining services.
{"title":"A Cloud Computing Service Level Agreement Framework with Negotiation and Secure Monitoring","authors":"V. Binu, N. D. Gangadhar","doi":"10.1109/CCEM.2014.7015474","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015474","url":null,"abstract":"Service Level Agreements (SLAs) are essential to the service oriented business model of Cloud Computing. SLA Frameworks for cloud computing need methodology for negotiation and monitoring of service delivery. The success and acceptability of SLAs requires their trusted and secure monitoring. In this paper an SLA Framework which incorporates negotiation and secure monitoring mechanism involving a third-party is developed. A reference implementation of the Framework is carried out and used to develop a case study of video transcoding service by a provider hosted on a cloud. The case study illustrates the effectiveness of the developed framework in creating SLAs for complex scenarios encountered in cloud computing services. Workload characterization is used to characterise the SLA service parameters which are employed in defining services.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121762808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015492
S. Sahni, Vasudeva Varma
Current PaaS solutions use an underlying IaaS provider and restrict themselves to a few geographical regions. They operate in one/two zones only and use others for failover or disaster recovery. In this paper, we present the design of MultiPaaS, a PaaS solution which runs on multiple cloud/IaaS providers and leverages the combined global span. Unlike traditional scaling techniques where app servers are scaled up or down in a specific region or data center, we present a design to perform it on a global scale. Origin of the request burst is identified and instances are booted in a data center closest to it. It ensures database persistence and cross-region scalability via a combination of replication techniques. We identify common features available across all IaaS providers and use that as a provider interface to ensure interoperability, but use provider specific extensions to leverage unique offerings and benefits.
{"title":"MultiPaaS - PaaS on Multiple Clouds","authors":"S. Sahni, Vasudeva Varma","doi":"10.1109/CCEM.2014.7015492","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015492","url":null,"abstract":"Current PaaS solutions use an underlying IaaS provider and restrict themselves to a few geographical regions. They operate in one/two zones only and use others for failover or disaster recovery. In this paper, we present the design of MultiPaaS, a PaaS solution which runs on multiple cloud/IaaS providers and leverages the combined global span. Unlike traditional scaling techniques where app servers are scaled up or down in a specific region or data center, we present a design to perform it on a global scale. Origin of the request burst is identified and instances are booted in a data center closest to it. It ensures database persistence and cross-region scalability via a combination of replication techniques. We identify common features available across all IaaS providers and use that as a provider interface to ensure interoperability, but use provider specific extensions to leverage unique offerings and benefits.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130690637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015490
K. Dsouza, M. Sujatha
A critical challenge in the design of Ad Hoc networks is the development of an efficient routing protocol which provides high quality communication. The node's in MANET have limited communication resources such as bandwidth, buffer space, battery power etc. The resource constraints in MANET require the traffic to be properly distributed among the mobile host. The distance based multi-level elliptic routing protocol proposed in this paper is an efficient method of selecting the node as a next hop node, while communicating in a mobile Ad hoc network. The proposed method selects the node's which are orthogonal to the centroid. Here the node uses the position information to identify the nodes which lie in orthogonal direction. The node obtains location information from the GPS location service. The GPS location service fails to give accurate position information in constrained environments such as node not exposed to GPS satellites. In these scenarios, the node fails to get the location information. The error caused leads to locating the node to improper position. Therefore DBMLE protocol used in this paper uses communication signal strength along with the GPS information. The nodes keep track of neighbor node's position, velocity and signal strength information.
Ad Hoc网络设计的一个关键挑战是开发一种高效的路由协议,以提供高质量的通信。在MANET中,节点的通信资源有限,如带宽、缓冲空间、电池电量等。MANET中的资源限制要求流量在移动主机之间合理分配。本文提出的基于距离的多级椭圆路由协议是移动自组网通信中选择节点作为下一跳节点的一种有效方法。该方法选择与质心正交的节点。在这里,节点使用位置信息来识别位于正交方向的节点。节点从GPS定位服务中获取位置信息。GPS定位服务在不暴露于GPS卫星的节点等受限环境中无法提供准确的位置信息。在这种情况下,节点获取位置信息失败。该错误将导致节点定位错误。因此本文采用的DBMLE协议利用了GPS信息的通信信号强度。节点跟踪邻居节点的位置、速度和信号强度信息。
{"title":"DBMLE: Distance-Based Multi-Level Elliptic Routing Protocol for Ad Hoc Networks","authors":"K. Dsouza, M. Sujatha","doi":"10.1109/CCEM.2014.7015490","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015490","url":null,"abstract":"A critical challenge in the design of Ad Hoc networks is the development of an efficient routing protocol which provides high quality communication. The node's in MANET have limited communication resources such as bandwidth, buffer space, battery power etc. The resource constraints in MANET require the traffic to be properly distributed among the mobile host. The distance based multi-level elliptic routing protocol proposed in this paper is an efficient method of selecting the node as a next hop node, while communicating in a mobile Ad hoc network. The proposed method selects the node's which are orthogonal to the centroid. Here the node uses the position information to identify the nodes which lie in orthogonal direction. The node obtains location information from the GPS location service. The GPS location service fails to give accurate position information in constrained environments such as node not exposed to GPS satellites. In these scenarios, the node fails to get the location information. The error caused leads to locating the node to improper position. Therefore DBMLE protocol used in this paper uses communication signal strength along with the GPS information. The nodes keep track of neighbor node's position, velocity and signal strength information.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015480
R. Millham
Cloud computing provides low initial cost for clients, scalability, and the ability to optimally use and share computing resources which makes cloud computing particularly attractive for emerging countries. In this paper, we provide several concrete examples of how cloud computing enhances the business/social environment of the client emerging nation, particularly in the areas of supply chain management, education, and health care. The field of healthcare, within cloud computing, in South Africa is examined in particular due to its need of sharing of patient data in order to improve the processes of patient transfer and to allocate health care resources optionally. An enhanced model to share patient data is present with increased capacity for the sharing of data and with improved security.
{"title":"An Enhanced Cloud Computing Model for Patient Record Management in South Africa","authors":"R. Millham","doi":"10.1109/CCEM.2014.7015480","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015480","url":null,"abstract":"Cloud computing provides low initial cost for clients, scalability, and the ability to optimally use and share computing resources which makes cloud computing particularly attractive for emerging countries. In this paper, we provide several concrete examples of how cloud computing enhances the business/social environment of the client emerging nation, particularly in the areas of supply chain management, education, and health care. The field of healthcare, within cloud computing, in South Africa is examined in particular due to its need of sharing of patient data in order to improve the processes of patient transfer and to allocate health care resources optionally. An enhanced model to share patient data is present with increased capacity for the sharing of data and with improved security.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015483
A. Murugan, D. Mylaraswamy, Brian Xu, P. Dietrich
This paper describes our approach towards developing and using a big data infrastructure for analyzing aviation data. In this paper, we briefly introduce our data sources, nature of data collected, cluster design, data loading and storage strategy and our language and library of choice for analytics and visualization. We present some of the analytics we have implemented for health monitoring of auxiliary power units (APUs) using our big data infrastructure. Best practices to implement big data analytics and pitfalls are discussed and substantiated with our experiences.
{"title":"Big Data Infrastructure for Aviation Data Analytics","authors":"A. Murugan, D. Mylaraswamy, Brian Xu, P. Dietrich","doi":"10.1109/CCEM.2014.7015483","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015483","url":null,"abstract":"This paper describes our approach towards developing and using a big data infrastructure for analyzing aviation data. In this paper, we briefly introduce our data sources, nature of data collected, cluster design, data loading and storage strategy and our language and library of choice for analytics and visualization. We present some of the analytics we have implemented for health monitoring of auxiliary power units (APUs) using our big data infrastructure. Best practices to implement big data analytics and pitfalls are discussed and substantiated with our experiences.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015475
Bholanathsingh Surajbali, Adrian Juan-Verdejo, S. Alexakis, H. Bar, M. Bauer
Collaboration through sharing competencies and resources has been a key approach to both creating new competitive environments, as well as achieving the needed agility to rapidly answer to emerging market demands. Establishing proper collaborative networks for service-enhanced products is challenging given the wide diversity of business operations and involved resources. The creation of software solutions to support such collaboration is an effort-intensive task, especially when these solutions are designed to run in the cloud and to be highly customizable to different end-user scenarios. In this paper we describe how a cloud- based platform can support the creation of software solutions for the collaborative development and operation of highly customized and service-enhanced products. The platform has been designed based on numerous key requirements that have been generated from the analysis of different business scenarios from various use cases and domains, as well as general key requirements a cloud-based platform should provide to support collaboration among organizations.
{"title":"A Cloud-Based Collaborative Platform Supporting Serviced-Enhanced Products for Emerging Markets","authors":"Bholanathsingh Surajbali, Adrian Juan-Verdejo, S. Alexakis, H. Bar, M. Bauer","doi":"10.1109/CCEM.2014.7015475","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015475","url":null,"abstract":"Collaboration through sharing competencies and resources has been a key approach to both creating new competitive environments, as well as achieving the needed agility to rapidly answer to emerging market demands. Establishing proper collaborative networks for service-enhanced products is challenging given the wide diversity of business operations and involved resources. The creation of software solutions to support such collaboration is an effort-intensive task, especially when these solutions are designed to run in the cloud and to be highly customizable to different end-user scenarios. In this paper we describe how a cloud- based platform can support the creation of software solutions for the collaborative development and operation of highly customized and service-enhanced products. The platform has been designed based on numerous key requirements that have been generated from the analysis of different business scenarios from various use cases and domains, as well as general key requirements a cloud-based platform should provide to support collaboration among organizations.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015478
C. Vorugunti, M. Sarvabhatla, G. Murugan
Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment.
{"title":"A Secure Mutual Authentication Protocol for Cloud Computing Using Secret Sharing and Steganography","authors":"C. Vorugunti, M. Sarvabhatla, G. Murugan","doi":"10.1109/CCEM.2014.7015478","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015478","url":null,"abstract":"Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"12 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/CCEM.2014.7015482
R. Khanna, M. Ganguli, Ananth S. Narayan, R. Abhiram, P. Gupta
In a cloud service management environment, service level agreements (SLA) define the expectation of quality (Quality-of-Service) for managing performance loss in a given service-hosting environment comprising of a pool of compute resources. Typically, complexity of resource inter-dependencies in a server system often results to sub-optimal behaviors leading to performance loss. A well behaved model can anticipate the demand patterns and proactively react to the dynamic stresses in a timely and well optimized manner. Dynamic characterization methods can synthesize self-correcting workload fingerprint code-book that facilitates phase prediction to achieve continuous tuning through proactive workload-allocation and load-balancing. In this paper we introduce the methodology that facilitates the coordinated tuning of the system resources through phase-assisted dynamic characterization. We describe the method to develop a multi-variate phase model by learning and classifying the run-time behavior of workloads. We demonstrate the workload phase forecasting method using phase extraction using a combination of machine learning approach. Results show the new model is about 98% accurate in phase identification and 97.15% accurate in forecasting the compute demands.
{"title":"Autonomic Characterization of Workloads Using Workload Fingerprinting","authors":"R. Khanna, M. Ganguli, Ananth S. Narayan, R. Abhiram, P. Gupta","doi":"10.1109/CCEM.2014.7015482","DOIUrl":"https://doi.org/10.1109/CCEM.2014.7015482","url":null,"abstract":"In a cloud service management environment, service level agreements (SLA) define the expectation of quality (Quality-of-Service) for managing performance loss in a given service-hosting environment comprising of a pool of compute resources. Typically, complexity of resource inter-dependencies in a server system often results to sub-optimal behaviors leading to performance loss. A well behaved model can anticipate the demand patterns and proactively react to the dynamic stresses in a timely and well optimized manner. Dynamic characterization methods can synthesize self-correcting workload fingerprint code-book that facilitates phase prediction to achieve continuous tuning through proactive workload-allocation and load-balancing. In this paper we introduce the methodology that facilitates the coordinated tuning of the system resources through phase-assisted dynamic characterization. We describe the method to develop a multi-variate phase model by learning and classifying the run-time behavior of workloads. We demonstrate the workload phase forecasting method using phase extraction using a combination of machine learning approach. Results show the new model is about 98% accurate in phase identification and 97.15% accurate in forecasting the compute demands.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}