首页 > 最新文献

2013 IEEE Ninth World Congress on Services最新文献

英文 中文
A Workflow Framework for Big Data Analytics: Event Recognition in a Building 大数据分析的工作流程框架:建筑物中的事件识别
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.29
Changbing Chen, Xia Yang, Z. Bong, Sivadon Chaisiri, Bu-Sung Lee
This paper studies event recognition in a building based on the patterns of power consumption. It is a big challenge to identify what kinds of events happened in a building without additional devices such as camera and motion sensors, etc. Instead, we learn when and how the events happened from the historical record of power consumption and apply the lesson into the design of an event recognition system (ERS). The ERS will find out abnormal power usage to avoid wasting power, which leads to the energy savings in a building. The ERS involves big data analytics with a large size of dataset collected in a real time. Such a data intensive system is usually viewed as a workflow. A workflow management is a significant task of the system requiring data analysis in terms of the system scalability to maintain high throughput or fast speed analysis. We propose a workflow framework that allows users to perform remote and parallel workflow execution, whose tasks are efficiently scheduled and distributed in cloud computing environment. We run the ERS as a target system for the proposed framework with power consumption data (whose size is approximately 20GB or more) collected from each of over 240 rooms in a building at Dept. of Engineering, Tokyo University in 2011. We show that the proposed framework accelerates the speed of data analysis by providing scaling infrastructure and parallel processing feature utilizing cloud computing technologies. We also share our experience and results on the big data analytics and discuss how the studies contribute to achieve Green Campus.
本文研究了基于建筑能耗模式的事件识别问题。在没有摄像头和运动传感器等额外设备的情况下,识别建筑物中发生的事件是一个很大的挑战。相反,我们从电力消耗的历史记录中了解事件发生的时间和方式,并将经验教训应用到事件识别系统(ERS)的设计中。ERS会发现异常的电力使用情况,避免浪费电力,从而达到建筑物节能的目的。ERS涉及实时收集大量数据集的大数据分析。这样的数据密集型系统通常被视为工作流。工作流管理是系统的一项重要任务,它要求系统进行数据分析,以保持系统的高吞吐量或快速分析。提出了一种工作流框架,允许用户远程并行执行工作流,在云计算环境中高效地调度和分配工作流任务。我们将ERS作为目标系统运行,并使用2011年从东京大学工程系一栋建筑的240多个房间中收集的功耗数据(其大小约为20GB或更多)。我们表明,所提出的框架通过利用云计算技术提供可扩展基础设施和并行处理功能来加快数据分析的速度。我们也会分享我们在大数据分析方面的经验和成果,并讨论这些研究如何为实现绿色校园做出贡献。
{"title":"A Workflow Framework for Big Data Analytics: Event Recognition in a Building","authors":"Changbing Chen, Xia Yang, Z. Bong, Sivadon Chaisiri, Bu-Sung Lee","doi":"10.1109/SERVICES.2013.29","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.29","url":null,"abstract":"This paper studies event recognition in a building based on the patterns of power consumption. It is a big challenge to identify what kinds of events happened in a building without additional devices such as camera and motion sensors, etc. Instead, we learn when and how the events happened from the historical record of power consumption and apply the lesson into the design of an event recognition system (ERS). The ERS will find out abnormal power usage to avoid wasting power, which leads to the energy savings in a building. The ERS involves big data analytics with a large size of dataset collected in a real time. Such a data intensive system is usually viewed as a workflow. A workflow management is a significant task of the system requiring data analysis in terms of the system scalability to maintain high throughput or fast speed analysis. We propose a workflow framework that allows users to perform remote and parallel workflow execution, whose tasks are efficiently scheduled and distributed in cloud computing environment. We run the ERS as a target system for the proposed framework with power consumption data (whose size is approximately 20GB or more) collected from each of over 240 rooms in a building at Dept. of Engineering, Tokyo University in 2011. We show that the proposed framework accelerates the speed of data analysis by providing scaling infrastructure and parallel processing feature utilizing cloud computing technologies. We also share our experience and results on the big data analytics and discuss how the studies contribute to achieve Green Campus.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130322030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Smarter Task Applications 迈向更智能的任务应用
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.60
P. Lach, H. Müller
Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior and are better at satisfying user utility. Applications need to become smart applications and as software engineers we can make this happen by looking at the lessons learned from self-adaptive systems. Data structures, models, and an unfettered resolve to simplifying the user experience will help us get there.
移动设备提供了前所未有的海量用户信息。对这种情况的管理就像试图在噪音中找到信号。那些能够发现信号的应用程序为自己打开了新的商业机会。这些商业机会是突发行为的结果,能够更好地满足用户效用。应用程序需要成为智能应用程序,作为软件工程师,我们可以通过从自适应系统中吸取经验教训来实现这一目标。数据结构、模型和简化用户体验的无拘无束的决心将帮助我们实现这一目标。
{"title":"Towards Smarter Task Applications","authors":"P. Lach, H. Müller","doi":"10.1109/SERVICES.2013.60","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.60","url":null,"abstract":"Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior and are better at satisfying user utility. Applications need to become smart applications and as software engineers we can make this happen by looking at the lessons learned from self-adaptive systems. Data structures, models, and an unfettered resolve to simplifying the user experience will help us get there.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Cloud Computing for Large-Scale Scientific Applications 探索大规模科学应用的云计算
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.13
Guang Lin, Binh Han, Jian Yin, I. Gorton
This paper explores cloud computing for large-scale data intensive scientific applications. Cloud computing is attractive because it provides hardware and software resources on-demand, which relieves the burden of acquiring and maintaining a huge amount of resources that may be used only once by a scientific application. However, unlike typical commercial applications that often just requires a moderate amount of ordinary resources, large-scale scientific applications often need to process enormous amount of data in the terabyte or even petabyte range and require special high performance hardware with low latency connections to complete computation in a reasonable amount of time. To address these challenges, we build an infrastructure that can dynamically select high performance computing hardware across institutions and dynamically adapt the computation to the selected resources to achieve high performance. We have also demonstrated the effectiveness of our infrastructure by building a system biology application and an uncertainty quantification application for carbon sequestration, which can efficiently utilize data and computation resources across several institutions.
本文探讨了大规模数据密集型科学应用中的云计算。云计算之所以具有吸引力,是因为它按需提供硬件和软件资源,从而减轻了获取和维护科学应用程序可能只使用一次的大量资源的负担。然而,与通常只需要适量普通资源的典型商业应用程序不同,大规模科学应用程序通常需要处理tb甚至pb范围内的大量数据,并且需要具有低延迟连接的特殊高性能硬件才能在合理的时间内完成计算。为了应对这些挑战,我们构建了一个基础设施,它可以动态地跨机构选择高性能计算硬件,并动态地使计算适应所选资源,以实现高性能。我们还通过构建系统生物学应用程序和碳封存的不确定性量化应用程序来证明我们的基础设施的有效性,这些应用程序可以有效地利用多个机构的数据和计算资源。
{"title":"Exploring Cloud Computing for Large-Scale Scientific Applications","authors":"Guang Lin, Binh Han, Jian Yin, I. Gorton","doi":"10.1109/SERVICES.2013.13","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.13","url":null,"abstract":"This paper explores cloud computing for large-scale data intensive scientific applications. Cloud computing is attractive because it provides hardware and software resources on-demand, which relieves the burden of acquiring and maintaining a huge amount of resources that may be used only once by a scientific application. However, unlike typical commercial applications that often just requires a moderate amount of ordinary resources, large-scale scientific applications often need to process enormous amount of data in the terabyte or even petabyte range and require special high performance hardware with low latency connections to complete computation in a reasonable amount of time. To address these challenges, we build an infrastructure that can dynamically select high performance computing hardware across institutions and dynamically adapt the computation to the selected resources to achieve high performance. We have also demonstrated the effectiveness of our infrastructure by building a system biology application and an uncertainty quantification application for carbon sequestration, which can efficiently utilize data and computation resources across several institutions.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
BIGSIR: A Bipartite Graph Based Service Recommendation Method 一种基于二部图的服务推荐方法
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.24
Bo Jiang, Xiao-xiao Zhang, Weifeng Pan, Bo Hu
Cloud computing is an Internet-based computing. It relies on sharing computing resources which are delivered as services on the Internet. Web service is one of the most important types of services that can be used in cloud computing. But many of them may be similar in some functional or nonfunctional properties, making how to recommend a suitable web service a problem facing many developers. Researchers have taken the QoS attributes into consideration. However, their research is on the premise that all the recommended web services are compatible, i.e., the recommended web services can be composed with existing web services. It may not always be true. In this paper, we only take the compatibility of web services into consideration, and present a BIpartite Graph based Service Recommendation (BIGSIR) method to address the service compatibility problem. BIGSIR uses the historical usage data of web services to recommend web services to developers. Different from existing web service recommendation approaches, BIGSIR adopts a bipartite graph to visual the web services and the relationship between them. Based on the graph model, an effective recommendation algorithm is introduced to recommend the suitable web services. Our approach is evaluated on a dataset constructed from myExperiment, a search engine that contains about 1, 851 web services and 2, 000 workflows. Experimental results demonstrate that apart from some isolated web services or workflows, BIGSIR can obtain promising results. And we also explore the factors that will influence the performance of BIGSIR. This work not only provides a new dataset, but also highlights a new perspective for service recommendation, i.e. services as a bipartite network.
云计算是一种基于互联网的计算。它依赖于共享计算资源,这些资源作为服务在互联网上传递。Web服务是可以在云计算中使用的最重要的服务类型之一。但是它们中的许多可能在某些功能或非功能属性上是相似的,这使得如何推荐合适的web服务成为许多开发人员面临的问题。研究人员已经将QoS属性考虑在内。然而,他们的研究是在所有推荐的web服务都是兼容的前提下进行的,即推荐的web服务可以与现有的web服务组合在一起。这可能并不总是正确的。本文只考虑web服务的兼容性,提出了一种基于二部图的服务推荐(BIGSIR)方法来解决服务兼容性问题。BIGSIR使用web服务的历史使用数据向开发人员推荐web服务。与现有的web服务推荐方法不同,BIGSIR采用二部分图来可视化web服务及其之间的关系。在图模型的基础上,引入了一种有效的web服务推荐算法。我们的方法是在myExperiment构建的数据集上进行评估的,myExperiment是一个搜索引擎,包含大约1851个web服务和2000个工作流。实验结果表明,除了一些孤立的web服务或工作流外,BIGSIR可以获得令人满意的结果。并探讨了影响大sir性能的因素。这项工作不仅提供了一个新的数据集,而且为服务推荐提供了一个新的视角,即服务作为一个二部网络。
{"title":"BIGSIR: A Bipartite Graph Based Service Recommendation Method","authors":"Bo Jiang, Xiao-xiao Zhang, Weifeng Pan, Bo Hu","doi":"10.1109/SERVICES.2013.24","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.24","url":null,"abstract":"Cloud computing is an Internet-based computing. It relies on sharing computing resources which are delivered as services on the Internet. Web service is one of the most important types of services that can be used in cloud computing. But many of them may be similar in some functional or nonfunctional properties, making how to recommend a suitable web service a problem facing many developers. Researchers have taken the QoS attributes into consideration. However, their research is on the premise that all the recommended web services are compatible, i.e., the recommended web services can be composed with existing web services. It may not always be true. In this paper, we only take the compatibility of web services into consideration, and present a BIpartite Graph based Service Recommendation (BIGSIR) method to address the service compatibility problem. BIGSIR uses the historical usage data of web services to recommend web services to developers. Different from existing web service recommendation approaches, BIGSIR adopts a bipartite graph to visual the web services and the relationship between them. Based on the graph model, an effective recommendation algorithm is introduced to recommend the suitable web services. Our approach is evaluated on a dataset constructed from myExperiment, a search engine that contains about 1, 851 web services and 2, 000 workflows. Experimental results demonstrate that apart from some isolated web services or workflows, BIGSIR can obtain promising results. And we also explore the factors that will influence the performance of BIGSIR. This work not only provides a new dataset, but also highlights a new perspective for service recommendation, i.e. services as a bipartite network.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a Collaborative Simulation Platform for Renewable Energy Systems 面向可再生能源系统的协同仿真平台
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.31
Shuai Lu, Yan Liu, Da Meng
To integrate wind and solar energy in electric systems, new technologies, such as energy storage and demand response, have been proposed to increase system flexibility. Control approaches and market rules are being developed accordingly to better manage these resources in multiple time scales. Therefore, models and software tools capable of performing hourly scheduling, intra-hour dispatch, and automatic generation control simulations are needed for testing these control approaches and for evaluating new market rules. At Pacific Northwest National Laboratory, we have developed an Electric System Intra-Hour Operation Simulator (ESIOS). Expanding this simulator as a service platform can benefit a larger community involved in exploring new models and controls and reducing the burden of maintaining a computing platform. Moreover the feedback and contribution from community users can help further improve the features of this simulation ecosystem. In this paper, we describe the function of this simulator. Based on our experience, we discuss the architecture design perspectives for transforming this simulator to an integrated collaborative service platform.
为了将风能和太阳能整合到电力系统中,人们提出了储能和需求响应等新技术,以增加系统的灵活性。正在制定相应的控制办法和市场规则,以便在多个时间尺度上更好地管理这些资源。因此,需要能够执行小时调度、小时内调度和自动发电控制模拟的模型和软件工具来测试这些控制方法和评估新的市场规则。在太平洋西北国家实验室,我们开发了一个电力系统小时内运行模拟器(ESIOS)。将该模拟器扩展为服务平台可以使参与探索新模型和控件的更大社区受益,并减少维护计算平台的负担。此外,来自社区用户的反馈和贡献可以帮助进一步改进这个模拟生态系统的功能。在本文中,我们描述了该模拟器的功能。根据我们的经验,我们将讨论将该模拟器转换为集成协作服务平台的体系结构设计视角。
{"title":"Towards a Collaborative Simulation Platform for Renewable Energy Systems","authors":"Shuai Lu, Yan Liu, Da Meng","doi":"10.1109/SERVICES.2013.31","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.31","url":null,"abstract":"To integrate wind and solar energy in electric systems, new technologies, such as energy storage and demand response, have been proposed to increase system flexibility. Control approaches and market rules are being developed accordingly to better manage these resources in multiple time scales. Therefore, models and software tools capable of performing hourly scheduling, intra-hour dispatch, and automatic generation control simulations are needed for testing these control approaches and for evaluating new market rules. At Pacific Northwest National Laboratory, we have developed an Electric System Intra-Hour Operation Simulator (ESIOS). Expanding this simulator as a service platform can benefit a larger community involved in exploring new models and controls and reducing the burden of maintaining a computing platform. Moreover the feedback and contribution from community users can help further improve the features of this simulation ecosystem. In this paper, we describe the function of this simulator. Based on our experience, we discuss the architecture design perspectives for transforming this simulator to an integrated collaborative service platform.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Unitizing Performance of IaaS Cloud Deployments 统一IaaS云部署性能
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.25
P. Berndt, Johannes Watzl
In order to establish a broader market for cloud computing, offers must be made comparable. Several efforts exist to compare performance of products from different providers and convey an idea of what to expect by means of (periodical) reports. Yet, buying IaaS cloud compute resources remains a blind bargain. The actual performance of a customer's deployment may, for various reasons, be substantially different from such third-party reports. Particularly, a cloud user cannot rely on receiving the same performance, be it because of higher load or arbitrary cloud reconfiguration. To render service levels of different cloud products meaningful and comparable within and across providers, these will have to commit themselves to providing performance according to some reference measure that also regards virtualization, resource allocation and isolation. Though the actual benchmarks will likely differ across application and market niches, the methodology to define, measure and guarantee performance remains the same. In this paper we propose a method for quantifying, determining and ensuring performance on the basis of a performance unit that conveys what performance can be expected from a VM deployment and is suitable for use in SLAs. The abstract approach is exemplified and validated by a case study with concrete benchmarks on a KVM-based cloud.
为了为云计算建立一个更广阔的市场,报价必须具有可比性。目前存在一些比较不同供应商产品性能的努力,并通过(定期)报告传达期望的想法。然而,购买IaaS云计算资源仍然是盲目的交易。由于各种原因,客户部署的实际性能可能与此类第三方报告存在很大差异。特别是,由于更高的负载或任意的云重新配置,云用户不能依赖于获得相同的性能。为了使不同云产品的服务水平在提供商内部和提供商之间具有意义和可比性,这些提供商必须承诺根据一些参考度量来提供性能,这些度量也考虑到虚拟化、资源分配和隔离。尽管实际的基准可能会因应用程序和市场而异,但定义、测量和保证性能的方法是相同的。在本文中,我们提出了一种基于性能单元的量化、确定和确保性能的方法,该性能单元传达了从VM部署中可以预期的性能,并且适合在sla中使用。抽象的方法通过在基于kvm的云上使用具体基准的案例研究进行了举例和验证。
{"title":"Unitizing Performance of IaaS Cloud Deployments","authors":"P. Berndt, Johannes Watzl","doi":"10.1109/SERVICES.2013.25","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.25","url":null,"abstract":"In order to establish a broader market for cloud computing, offers must be made comparable. Several efforts exist to compare performance of products from different providers and convey an idea of what to expect by means of (periodical) reports. Yet, buying IaaS cloud compute resources remains a blind bargain. The actual performance of a customer's deployment may, for various reasons, be substantially different from such third-party reports. Particularly, a cloud user cannot rely on receiving the same performance, be it because of higher load or arbitrary cloud reconfiguration. To render service levels of different cloud products meaningful and comparable within and across providers, these will have to commit themselves to providing performance according to some reference measure that also regards virtualization, resource allocation and isolation. Though the actual benchmarks will likely differ across application and market niches, the methodology to define, measure and guarantee performance remains the same. In this paper we propose a method for quantifying, determining and ensuring performance on the basis of a performance unit that conveys what performance can be expected from a VM deployment and is suitable for use in SLAs. The abstract approach is exemplified and validated by a case study with concrete benchmarks on a KVM-based cloud.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Auditing and Analysis of Network Traffic in Cloud Environment 云环境下网络流量审计与分析
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.42
S. Shetty
Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.
云计算允许用户将他们的数据远程存储到云中,并从可配置计算资源的共享池中提供按需应用程序和服务。云上外包数据的安全性依赖于云计算系统和网络的安全性。尽管在保护云计算系统上的数据安全方面已经有了许多努力,但是评估云提供商及其用户之间网络上的数据安全性仍然是一项非常具有挑战性的任务。对云计算系统和网络的审计将提供对多个数据中心、云提供商管理的云内网络以及云用户和云提供商之间的广域网上的虚拟机和操作系统的安全性和性能的见解。因此,云审计中的网络流量分析至关重要,以便用户可以借助外部审计方来验证云提供商与其用户之间网络上的数据安全性。本文提出了云计算环境下网络流量分析所需的关键技术:云提供商与用户之间网络设备的IP地理定位、云网络路径的数据安全监控、云网络流量产生的海量云审计日志的在线挖掘。
{"title":"Auditing and Analysis of Network Traffic in Cloud Environment","authors":"S. Shetty","doi":"10.1109/SERVICES.2013.42","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.42","url":null,"abstract":"Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research of Intrusion Detection System on Android 基于Android的入侵检测系统研究
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.77
Fangfang Yuan, Lidong Zhai, Yanan Cao, Li Guo
In this paper, we proposed an intrusion detection system for detecting anomaly on Android smartphones. The intrusion detection system continuously monitors and collects the information of smartphone under normal conditions and attack state. It extracts various features obtained from the Android system, such as the network traffic of smartphones, battery consumption, CPU usage, the amount of running processes and so on. Then, it applies Bayes Classifying Algorithm to determine whether there is an invasion. In order to further analyze the Android system abnormalities and locate malicious software, along with system state monitoring the intrusion detection system monitors the process and network flow of the smartphone. Finally, experiments on the system which was designed in this paper have been carried out. Empirical results suggest that the proposed intrusion detection system is effective in detecting anomaly on Android smartphones.
本文提出了一种用于Android智能手机异常检测的入侵检测系统。入侵检测系统持续监控并收集智能手机在正常状态和攻击状态下的信息。它提取了从Android系统中获得的各种特性,如智能手机的网络流量、电池消耗、CPU使用率、运行进程数量等。然后,应用贝叶斯分类算法判断是否存在入侵。为了进一步分析Android系统的异常情况,定位恶意软件,入侵检测系统在监控系统状态的同时,对智能手机的进程和网络流量进行监控。最后,对所设计的系统进行了实验。实证结果表明,本文提出的入侵检测系统对Android智能手机的异常检测是有效的。
{"title":"Research of Intrusion Detection System on Android","authors":"Fangfang Yuan, Lidong Zhai, Yanan Cao, Li Guo","doi":"10.1109/SERVICES.2013.77","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.77","url":null,"abstract":"In this paper, we proposed an intrusion detection system for detecting anomaly on Android smartphones. The intrusion detection system continuously monitors and collects the information of smartphone under normal conditions and attack state. It extracts various features obtained from the Android system, such as the network traffic of smartphones, battery consumption, CPU usage, the amount of running processes and so on. Then, it applies Bayes Classifying Algorithm to determine whether there is an invasion. In order to further analyze the Android system abnormalities and locate malicious software, along with system state monitoring the intrusion detection system monitors the process and network flow of the smartphone. Finally, experiments on the system which was designed in this paper have been carried out. Empirical results suggest that the proposed intrusion detection system is effective in detecting anomaly on Android smartphones.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Is Your Cloud-Hosted Database Truly Elastic? 你的云托管数据库真的有弹性吗?
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.69
S. Sakr, Anna Liu
Elasticity has been recognized as one of the most appealing features for users of cloud services. It represents the ability to dynamically and rapidly scale up or down the allocated computing resources on demand. In practice, it is difficult to understand the elasticity requirements of a given application and workload, and to assess if the elasticity provided by a cloud service will meet these requirements. In this experience paper, we take the position that a deep understanding of the capabilities of cloud-hosted database services is a crucial requirement for cloud users in order to bring forward the vision of deploying data-intensive applications on cloud platforms. We argue that it is important that cloud users become able to paint a comprehensive picture of the relationship between the capabilities of the different type of cloud database services, the application characteristics and workloads, and the geographical distribution of the application clients and the underlying database replicas. We discuss the current elasticity capabilities of the different categories of cloud database services and identify some of the main challenges for deploying a truly elastic database tier on cloud environments. Finally, we propose a benchmarking mechanism that can evaluate the elasticity capabilities of cloud database services in different application scenarios and workloads.
弹性已经被认为是云服务用户最吸引人的特性之一。它代表了根据需要动态、快速地增加或减少分配的计算资源的能力。在实践中,很难理解给定应用程序和工作负载的弹性需求,也很难评估云服务提供的弹性是否满足这些需求。在这篇经验论文中,我们认为,为了在云平台上部署数据密集型应用程序,对云托管数据库服务功能的深入理解是云用户的关键要求。我们认为,重要的是,云用户能够全面了解不同类型的云数据库服务的功能、应用程序特征和工作负载、应用程序客户端和底层数据库副本的地理分布之间的关系。我们讨论了不同类别的云数据库服务的当前弹性功能,并确定了在云环境中部署真正的弹性数据库层的一些主要挑战。最后,我们提出了一种基准测试机制,可以评估云数据库服务在不同应用场景和工作负载下的弹性能力。
{"title":"Is Your Cloud-Hosted Database Truly Elastic?","authors":"S. Sakr, Anna Liu","doi":"10.1109/SERVICES.2013.69","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.69","url":null,"abstract":"Elasticity has been recognized as one of the most appealing features for users of cloud services. It represents the ability to dynamically and rapidly scale up or down the allocated computing resources on demand. In practice, it is difficult to understand the elasticity requirements of a given application and workload, and to assess if the elasticity provided by a cloud service will meet these requirements. In this experience paper, we take the position that a deep understanding of the capabilities of cloud-hosted database services is a crucial requirement for cloud users in order to bring forward the vision of deploying data-intensive applications on cloud platforms. We argue that it is important that cloud users become able to paint a comprehensive picture of the relationship between the capabilities of the different type of cloud database services, the application characteristics and workloads, and the geographical distribution of the application clients and the underlying database replicas. We discuss the current elasticity capabilities of the different categories of cloud database services and identify some of the main challenges for deploying a truly elastic database tier on cloud environments. Finally, we propose a benchmarking mechanism that can evaluate the elasticity capabilities of cloud database services in different application scenarios and workloads.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data Integrity Evaluation in Cloud Database-as-a-Service 云数据库即服务中的数据完整性评估
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.40
Puya Ghazizadeh, R. Mukkamala, S. Olariu
Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.
数据完整性是云计算等外包IT服务的主要关注点。云计算因为降低成本、节省时间和服务的移动性而变得流行。然而,数据完整性在云服务中仍然是一个未解决的问题。我们提出了一种评估云数据库即服务中数据完整性的有效机制。我们的方法是将假元组插入数据库。在我们的模型中,数据的所有者是唯一受信任的一方,而作为服务提供者的服务器或任何其他用户都不受信任。我们将不受信任的一方称为潜在的恶意攻击者。在我们的方法中,我们定义了生成函数来创建均匀分布的伪元组。恶意攻击者无法区分假元组和真元组。我们的方法不使用加密,这使得它更有效。我们通过描述我们的方法来探索这些生成函数的优点和局限性。
{"title":"Data Integrity Evaluation in Cloud Database-as-a-Service","authors":"Puya Ghazizadeh, R. Mukkamala, S. Olariu","doi":"10.1109/SERVICES.2013.40","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.40","url":null,"abstract":"Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into the database. In our model the owner of the data is the only trusted party and the server as a service provider or any other users are not trusted. We refer to distrusted party as a potentially malicious attacker. In our approach we define generating functions to create fake tuples with uniform distribution. Malicious attackers are not able to distinguish between fake tuples and real tuples. Our approach does not use encryption which makes it more efficient. We explore the strengths and limitations of these generating functions by describing our approach.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2013 IEEE Ninth World Congress on Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1