首页 > 最新文献

2013 IEEE Ninth World Congress on Services最新文献

英文 中文
QoS Auditing for Evaluation of SLA in Cloud-based Distributed Services 面向云分布式服务SLA评估的QoS审计
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.74
K. Ravindran
Given cloud-based realization of a distributed system S, QoS auditing enables risk analysis and accounting of SLA violations under various security threats and resource depletions faced by S. The problem of QoS failures and security infringements arises due to the third-party control of cloud resources and components that are used in realizing the application-oriented service exported by S. The less-than-100% trust between the various sub-systems of S is a major issue that necessitates a probabilistic analysis of the application behavior relative to the SLA negotiated with S. In this light, QoS auditing allows reasoning about how good the SLA is complied by S in the face of hostile environment conditions. The paper describes case studies of CDN and replicated web service realized on a cloud.
给定分布式系统S基于云的实现,QoS审计可以对S面临的各种安全威胁和资源消耗情况下的SLA违规行为进行风险分析和核算。由于S输出面向应用的服务所使用的云资源和组件被第三方控制,导致了QoS失效和安全违规的问题。S各子系统之间的信任低于100%是一个主要问题,需要对其相关的应用行为进行概率分析从这个角度来看,QoS审计允许推断S在面对恶劣环境条件时遵守SLA的程度。本文介绍了在云上实现CDN和复制web服务的案例研究。
{"title":"QoS Auditing for Evaluation of SLA in Cloud-based Distributed Services","authors":"K. Ravindran","doi":"10.1109/SERVICES.2013.74","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.74","url":null,"abstract":"Given cloud-based realization of a distributed system S, QoS auditing enables risk analysis and accounting of SLA violations under various security threats and resource depletions faced by S. The problem of QoS failures and security infringements arises due to the third-party control of cloud resources and components that are used in realizing the application-oriented service exported by S. The less-than-100% trust between the various sub-systems of S is a major issue that necessitates a probabilistic analysis of the application behavior relative to the SLA negotiated with S. In this light, QoS auditing allows reasoning about how good the SLA is complied by S in the face of hostile environment conditions. The paper describes case studies of CDN and replicated web service realized on a cloud.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Storing, Indexing and Querying Large Provenance Data Sets as RDF Graphs in Apache HBase 在Apache HBase中以RDF图的形式存储、索引和查询大型数据源集
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.32
Artem Chebotko, John Abraham, P. Brazier, Anthony Piazza, A. Kashlev, Shiyong Lu
Provenance, which records the history of an in-silico experiment, has been identified as an important requirement for scientific workflows to support scientific discovery reproducibility, result interpretation, and problem diagnosis. Large provenance datasets are composed of many smaller provenance graphs, each of which corresponds to a single workflow execution. In this work, we explore and address the challenge of efficient and scalable storage and querying of large collections of provenance graphs serialized as RDF graphs in an Apache HBase database. Specifically, we propose: (i) novel storage and indexing techniques for RDF data in HBase that are better suited for provenance datasets rather than generic RDF graphs and (ii) novel SPARQL query evaluation algorithms that solely rely on indices to compute expensive join operations, make use of numeric values that represent triple positions rather than actual triples, and eliminate the need for intermediate data transfers over a network. The empirical evaluation of our algorithms using provenance datasets and queries of the University of Texas Provenance Benchmark confirms that our approach is efficient and scalable.
出处,它记录了一个硅实验的历史,已经被确定为科学工作流程的一个重要要求,以支持科学发现的可重复性、结果解释和问题诊断。大型来源数据集由许多较小的来源图组成,每个来源图对应于单个工作流执行。在这项工作中,我们探索并解决了在Apache HBase数据库中序列化为RDF图的大型来源图集合的高效和可伸缩存储和查询的挑战。具体来说,我们建议:(i) HBase中RDF数据的新颖存储和索引技术,它更适合于起源数据集,而不是通用的RDF图;(ii)新颖的SPARQL查询计算算法,它只依赖于索引来计算昂贵的连接操作,使用表示三元组位置的数值而不是实际的三元组,并且消除了通过网络传输中间数据的需要。我们的算法使用来源数据集和德克萨斯大学来源基准的查询进行了实证评估,证实了我们的方法是高效和可扩展的。
{"title":"Storing, Indexing and Querying Large Provenance Data Sets as RDF Graphs in Apache HBase","authors":"Artem Chebotko, John Abraham, P. Brazier, Anthony Piazza, A. Kashlev, Shiyong Lu","doi":"10.1109/SERVICES.2013.32","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.32","url":null,"abstract":"Provenance, which records the history of an in-silico experiment, has been identified as an important requirement for scientific workflows to support scientific discovery reproducibility, result interpretation, and problem diagnosis. Large provenance datasets are composed of many smaller provenance graphs, each of which corresponds to a single workflow execution. In this work, we explore and address the challenge of efficient and scalable storage and querying of large collections of provenance graphs serialized as RDF graphs in an Apache HBase database. Specifically, we propose: (i) novel storage and indexing techniques for RDF data in HBase that are better suited for provenance datasets rather than generic RDF graphs and (ii) novel SPARQL query evaluation algorithms that solely rely on indices to compute expensive join operations, make use of numeric values that represent triple positions rather than actual triples, and eliminate the need for intermediate data transfers over a network. The empirical evaluation of our algorithms using provenance datasets and queries of the University of Texas Provenance Benchmark confirms that our approach is efficient and scalable.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Research of Intrusion Detection System on Android 基于Android的入侵检测系统研究
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.77
Fangfang Yuan, Lidong Zhai, Yanan Cao, Li Guo
In this paper, we proposed an intrusion detection system for detecting anomaly on Android smartphones. The intrusion detection system continuously monitors and collects the information of smartphone under normal conditions and attack state. It extracts various features obtained from the Android system, such as the network traffic of smartphones, battery consumption, CPU usage, the amount of running processes and so on. Then, it applies Bayes Classifying Algorithm to determine whether there is an invasion. In order to further analyze the Android system abnormalities and locate malicious software, along with system state monitoring the intrusion detection system monitors the process and network flow of the smartphone. Finally, experiments on the system which was designed in this paper have been carried out. Empirical results suggest that the proposed intrusion detection system is effective in detecting anomaly on Android smartphones.
本文提出了一种用于Android智能手机异常检测的入侵检测系统。入侵检测系统持续监控并收集智能手机在正常状态和攻击状态下的信息。它提取了从Android系统中获得的各种特性,如智能手机的网络流量、电池消耗、CPU使用率、运行进程数量等。然后,应用贝叶斯分类算法判断是否存在入侵。为了进一步分析Android系统的异常情况,定位恶意软件,入侵检测系统在监控系统状态的同时,对智能手机的进程和网络流量进行监控。最后,对所设计的系统进行了实验。实证结果表明,本文提出的入侵检测系统对Android智能手机的异常检测是有效的。
{"title":"Research of Intrusion Detection System on Android","authors":"Fangfang Yuan, Lidong Zhai, Yanan Cao, Li Guo","doi":"10.1109/SERVICES.2013.77","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.77","url":null,"abstract":"In this paper, we proposed an intrusion detection system for detecting anomaly on Android smartphones. The intrusion detection system continuously monitors and collects the information of smartphone under normal conditions and attack state. It extracts various features obtained from the Android system, such as the network traffic of smartphones, battery consumption, CPU usage, the amount of running processes and so on. Then, it applies Bayes Classifying Algorithm to determine whether there is an invasion. In order to further analyze the Android system abnormalities and locate malicious software, along with system state monitoring the intrusion detection system monitors the process and network flow of the smartphone. Finally, experiments on the system which was designed in this paper have been carried out. Empirical results suggest that the proposed intrusion detection system is effective in detecting anomaly on Android smartphones.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using Rules for Web Service Client Side Testing 使用规则进行Web服务客户端测试
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.63
Nabil El Ioini, A. Sillitti, G. Succi
Web Services (WS) are software components accessible over the Internet through a well-defined set of standards. When consumers invoke a service, they expect to receive a valid response. However, the problem is to determine the structure of a valid request [21]. WS specifications are used to solve this problem since they are considered the primary piece of information for building service requests. Unfortunately, existing specifications do not provide enough support for this type information (e.g., WSDL) or there is little support on the client side (e.g., OWL-S). In this paper we address this issue by implementing a technique to reduce the number of faulty requests. We specifically propose an approach for extending WSDL with service input parameters rules that help consumers and integrators to verify their calls on the client side.
Web服务(WS)是通过一组定义良好的标准在Internet上访问的软件组件。当消费者调用服务时,他们希望收到有效的响应。但是,问题在于确定有效请求[21]的结构。WS规范被用来解决这个问题,因为它们被认为是构建服务请求的主要信息。不幸的是,现有的规范没有为这种类型信息提供足够的支持(例如,WSDL),或者在客户端几乎没有支持(例如,OWL-S)。在本文中,我们通过实现一种技术来减少错误请求的数量来解决这个问题。我们特别提出了一种使用服务输入参数规则扩展WSDL的方法,该规则可帮助消费者和集成商在客户端验证其调用。
{"title":"Using Rules for Web Service Client Side Testing","authors":"Nabil El Ioini, A. Sillitti, G. Succi","doi":"10.1109/SERVICES.2013.63","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.63","url":null,"abstract":"Web Services (WS) are software components accessible over the Internet through a well-defined set of standards. When consumers invoke a service, they expect to receive a valid response. However, the problem is to determine the structure of a valid request [21]. WS specifications are used to solve this problem since they are considered the primary piece of information for building service requests. Unfortunately, existing specifications do not provide enough support for this type information (e.g., WSDL) or there is little support on the client side (e.g., OWL-S). In this paper we address this issue by implementing a technique to reduce the number of faulty requests. We specifically propose an approach for extending WSDL with service input parameters rules that help consumers and integrators to verify their calls on the client side.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hierarchical Cloud Pricing System 分级云定价系统
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.78
Zhijie Li, Ming Li
Cloud computing is experiencing phenomenal growth and there are now many vendors offering their cloud services. In cloud computing, cloud providers cooperate together to offer their computing resource as a utility and software as a service to customers. The demands and the price of cloud service should be negotiated between providers and users based on the Service Level Agreement (SLA). In order to help cloud providers achieving an agreeable price for their services and maximizing the benefits of both cloud providers and clients, this paper proposes a cloud pricing system consisting of hierarchical system, M/M/c queuing model and pricing model. Simulation results verify the efficiency of our proposed system.
云计算正在经历惊人的增长,现在有许多供应商提供他们的云服务。在云计算中,云提供商共同合作,将其计算资源作为实用工具提供给客户,并将软件作为服务提供给客户。云服务的需求和价格应由提供商和用户根据服务水平协议(SLA)进行协商。为了帮助云提供商获得一个令人满意的服务价格,使云提供商和客户双方的利益最大化,本文提出了一种由分层体系、M/M/c排队模型和定价模型组成的云定价体系。仿真结果验证了系统的有效性。
{"title":"A Hierarchical Cloud Pricing System","authors":"Zhijie Li, Ming Li","doi":"10.1109/SERVICES.2013.78","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.78","url":null,"abstract":"Cloud computing is experiencing phenomenal growth and there are now many vendors offering their cloud services. In cloud computing, cloud providers cooperate together to offer their computing resource as a utility and software as a service to customers. The demands and the price of cloud service should be negotiated between providers and users based on the Service Level Agreement (SLA). In order to help cloud providers achieving an agreeable price for their services and maximizing the benefits of both cloud providers and clients, this paper proposes a cloud pricing system consisting of hierarchical system, M/M/c queuing model and pricing model. Simulation results verify the efficiency of our proposed system.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cloud Based Architecture for Enabling Intuitive Decision Making 支持直觉决策的基于云的架构
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.11
Brian Xu, S. Kumar, Manonmani Kumar
To address the current need of innovative technologies that blend rapid data processing capabilities of computers with intuitive decision making skills of humans, we have developed a prototype of Cloud Enabled Brain Computer Interface (CEB) decision making technologies. The implemented architecture integrates cloud enabled big data analytics capabilities, networked BCI (Brain Computer Interface) devices, and Decision Making Engine. The novel CEB technology comprises of 1. Cloud-enabled BCI (Brain-Computer Interface) headsets, which is developed and networked in a cloud to enable rapid decision making and 2. Genetic algorithm based decision making engine, to intelligently assist the users in decision making; Advantage of our architecture is that when CEB loads the data, it will automatically recommend the best applicable Machine Learning (ML) algorithms after being evaluated to solve a given problem. Hence, with such automated machine learning techniques, CEB users workload is significantly reduced. Our experiments on DARPA dataset indicate that CEB technologies performed 10 times faster and about 4 times less false negative rate than current computational methods in seeking and understanding information. Our results demonstrate that these CEB technologies would enable humans to accurately and quickly detect meaningful information from a mass amount of data. The novel CEB technologies ensure that the reduced manpower does not result in reduced performance.
为了解决当前对将计算机的快速数据处理能力与人类的直觉决策技能相结合的创新技术的需求,我们开发了一种云支持脑机接口(CEB)决策技术的原型。实现的架构集成了云支持的大数据分析功能、联网BCI(脑机接口)设备和决策引擎。新型CEB技术包括:1。云支持的BCI(脑机接口)耳机,它是在云中开发和联网的,以实现快速决策和2。基于遗传算法的决策引擎,智能协助用户进行决策;我们架构的优势在于,当CEB加载数据时,它会在评估以解决给定问题后自动推荐最佳适用的机器学习(ML)算法。因此,使用这种自动化的机器学习技术,CEB用户的工作量大大减少。我们在DARPA数据集上的实验表明,CEB技术在寻找和理解信息方面的速度比现有计算方法快10倍,假阴性率低4倍左右。我们的研究结果表明,这些CEB技术将使人类能够准确、快速地从大量数据中检测出有意义的信息。新的CEB技术确保减少的人力不会导致性能下降。
{"title":"Cloud Based Architecture for Enabling Intuitive Decision Making","authors":"Brian Xu, S. Kumar, Manonmani Kumar","doi":"10.1109/SERVICES.2013.11","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.11","url":null,"abstract":"To address the current need of innovative technologies that blend rapid data processing capabilities of computers with intuitive decision making skills of humans, we have developed a prototype of Cloud Enabled Brain Computer Interface (CEB) decision making technologies. The implemented architecture integrates cloud enabled big data analytics capabilities, networked BCI (Brain Computer Interface) devices, and Decision Making Engine. The novel CEB technology comprises of 1. Cloud-enabled BCI (Brain-Computer Interface) headsets, which is developed and networked in a cloud to enable rapid decision making and 2. Genetic algorithm based decision making engine, to intelligently assist the users in decision making; Advantage of our architecture is that when CEB loads the data, it will automatically recommend the best applicable Machine Learning (ML) algorithms after being evaluated to solve a given problem. Hence, with such automated machine learning techniques, CEB users workload is significantly reduced. Our experiments on DARPA dataset indicate that CEB technologies performed 10 times faster and about 4 times less false negative rate than current computational methods in seeking and understanding information. Our results demonstrate that these CEB technologies would enable humans to accurately and quickly detect meaningful information from a mass amount of data. The novel CEB technologies ensure that the reduced manpower does not result in reduced performance.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Auditing and Analysis of Network Traffic in Cloud Environment 云环境下网络流量审计与分析
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.42
S. Shetty
Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.
云计算允许用户将他们的数据远程存储到云中,并从可配置计算资源的共享池中提供按需应用程序和服务。云上外包数据的安全性依赖于云计算系统和网络的安全性。尽管在保护云计算系统上的数据安全方面已经有了许多努力,但是评估云提供商及其用户之间网络上的数据安全性仍然是一项非常具有挑战性的任务。对云计算系统和网络的审计将提供对多个数据中心、云提供商管理的云内网络以及云用户和云提供商之间的广域网上的虚拟机和操作系统的安全性和性能的见解。因此,云审计中的网络流量分析至关重要,以便用户可以借助外部审计方来验证云提供商与其用户之间网络上的数据安全性。本文提出了云计算环境下网络流量分析所需的关键技术:云提供商与用户之间网络设备的IP地理定位、云网络路径的数据安全监控、云网络流量产生的海量云审计日志的在线挖掘。
{"title":"Auditing and Analysis of Network Traffic in Cloud Environment","authors":"S. Shetty","doi":"10.1109/SERVICES.2013.42","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.42","url":null,"abstract":"Cloud computing allows users to remotely store their data into the cloud and provides on-demand applications and services from a shared pool of configurable computing resources. The security of the outsourced data in the cloud is dependent on the security of the cloud computing system and network. Though, there have been numerous efforts on securing data on the cloud computing system, evaluation of data security on the network between cloud provider and its users is still a very challenging task. The audit of the cloud computing system and network will provide insights on the security and performance of VMs and the operating system on multiple data centers and the intra-cloud network managed by cloud providers and the wide-area network between the cloud user and cloud provider. Thus, network traffic analysis for cloud auditing is of critical importance so that users can resort to an external audit party to verify the data security on the network between cloud provider and its users. This paper presents the following key technologies required to analyze network traffic in the cloud computing environment: IP geolocation of network devices between cloud provider and its users, monitoring the data security of the cloud network path, and online mining of massive cloud auditing logs generated by cloud network traffic.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Unitizing Performance of IaaS Cloud Deployments 统一IaaS云部署性能
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.25
P. Berndt, Johannes Watzl
In order to establish a broader market for cloud computing, offers must be made comparable. Several efforts exist to compare performance of products from different providers and convey an idea of what to expect by means of (periodical) reports. Yet, buying IaaS cloud compute resources remains a blind bargain. The actual performance of a customer's deployment may, for various reasons, be substantially different from such third-party reports. Particularly, a cloud user cannot rely on receiving the same performance, be it because of higher load or arbitrary cloud reconfiguration. To render service levels of different cloud products meaningful and comparable within and across providers, these will have to commit themselves to providing performance according to some reference measure that also regards virtualization, resource allocation and isolation. Though the actual benchmarks will likely differ across application and market niches, the methodology to define, measure and guarantee performance remains the same. In this paper we propose a method for quantifying, determining and ensuring performance on the basis of a performance unit that conveys what performance can be expected from a VM deployment and is suitable for use in SLAs. The abstract approach is exemplified and validated by a case study with concrete benchmarks on a KVM-based cloud.
为了为云计算建立一个更广阔的市场,报价必须具有可比性。目前存在一些比较不同供应商产品性能的努力,并通过(定期)报告传达期望的想法。然而,购买IaaS云计算资源仍然是盲目的交易。由于各种原因,客户部署的实际性能可能与此类第三方报告存在很大差异。特别是,由于更高的负载或任意的云重新配置,云用户不能依赖于获得相同的性能。为了使不同云产品的服务水平在提供商内部和提供商之间具有意义和可比性,这些提供商必须承诺根据一些参考度量来提供性能,这些度量也考虑到虚拟化、资源分配和隔离。尽管实际的基准可能会因应用程序和市场而异,但定义、测量和保证性能的方法是相同的。在本文中,我们提出了一种基于性能单元的量化、确定和确保性能的方法,该性能单元传达了从VM部署中可以预期的性能,并且适合在sla中使用。抽象的方法通过在基于kvm的云上使用具体基准的案例研究进行了举例和验证。
{"title":"Unitizing Performance of IaaS Cloud Deployments","authors":"P. Berndt, Johannes Watzl","doi":"10.1109/SERVICES.2013.25","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.25","url":null,"abstract":"In order to establish a broader market for cloud computing, offers must be made comparable. Several efforts exist to compare performance of products from different providers and convey an idea of what to expect by means of (periodical) reports. Yet, buying IaaS cloud compute resources remains a blind bargain. The actual performance of a customer's deployment may, for various reasons, be substantially different from such third-party reports. Particularly, a cloud user cannot rely on receiving the same performance, be it because of higher load or arbitrary cloud reconfiguration. To render service levels of different cloud products meaningful and comparable within and across providers, these will have to commit themselves to providing performance according to some reference measure that also regards virtualization, resource allocation and isolation. Though the actual benchmarks will likely differ across application and market niches, the methodology to define, measure and guarantee performance remains the same. In this paper we propose a method for quantifying, determining and ensuring performance on the basis of a performance unit that conveys what performance can be expected from a VM deployment and is suitable for use in SLAs. The abstract approach is exemplified and validated by a case study with concrete benchmarks on a KVM-based cloud.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud IaaS云移动用户的SaaS认证中间件
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.34
Richard K. Lomotey, R. Deters
The mobile terrain is rapidly establishing itself as the reliable node for accessing cloud hosted data. Today, commodity cloud providers especially from the Infrastructure-as-a-Service (IaaS) cloud expose their service APIs which facilitates the "app-ification" of enterprise workflows on mobile devices. However, these IaaS providers require the customer (i.e., the data consumer) to submit multiple security credentials which are computation intensive for the purposes of authentication and authorization. As a result, the authentication process introduces undesired delays in a mobile network when consuming enterprise data due to the increasing computational demand and the voluminous HTTP header that is transported across the wireless bandwidth.This paper introduces an application called MiLAMob that is a middleware-layer that handles the authentication process on behalf of the consumer devices in real time and with minimal HTTP traffic. The middleware currently supports mobile consumption of data on IaaS clouds such as Amazon S3, Dropbox, and MEGA. Further, the middleware employs the OAuth 2.0 technique (E.g. Facebook, Google+, and Personal Login) to identify the mobile end-user and uses security tokens to handle the tedious authentication with the IaaS cloud. Also, the deployment of the middleware enforces additional data protection because the security credentials and the IaaS abstractions are shielded from the mobile application domain and the end users.
移动领域正迅速成为访问云托管数据的可靠节点。今天,商品云提供商,特别是来自基础设施即服务(IaaS)云的提供商公开了他们的服务api,这些api促进了企业工作流在移动设备上的“应用”。然而,这些IaaS提供商要求客户(即数据消费者)提交多个安全凭证,这些凭证对于身份验证和授权来说是计算密集型的。因此,在使用企业数据时,由于不断增加的计算需求和通过无线带宽传输的大量HTTP头,身份验证过程在移动网络中引入了不希望的延迟。本文介绍了一个名为MiLAMob的应用程序,它是一个中间件层,代表消费者设备实时处理身份验证过程,并且使用最小的HTTP流量。该中间件目前支持IaaS云(如Amazon S3、Dropbox和MEGA)上的移动数据消费。此外,中间件采用OAuth 2.0技术(例如Facebook、Google+和Personal Login)来识别移动终端用户,并使用安全令牌来处理IaaS云的繁琐身份验证。此外,中间件的部署强制执行额外的数据保护,因为安全凭证和IaaS抽象对移动应用程序域和最终用户是屏蔽的。
{"title":"SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud","authors":"Richard K. Lomotey, R. Deters","doi":"10.1109/SERVICES.2013.34","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.34","url":null,"abstract":"The mobile terrain is rapidly establishing itself as the reliable node for accessing cloud hosted data. Today, commodity cloud providers especially from the Infrastructure-as-a-Service (IaaS) cloud expose their service APIs which facilitates the \"app-ification\" of enterprise workflows on mobile devices. However, these IaaS providers require the customer (i.e., the data consumer) to submit multiple security credentials which are computation intensive for the purposes of authentication and authorization. As a result, the authentication process introduces undesired delays in a mobile network when consuming enterprise data due to the increasing computational demand and the voluminous HTTP header that is transported across the wireless bandwidth.This paper introduces an application called MiLAMob that is a middleware-layer that handles the authentication process on behalf of the consumer devices in real time and with minimal HTTP traffic. The middleware currently supports mobile consumption of data on IaaS clouds such as Amazon S3, Dropbox, and MEGA. Further, the middleware employs the OAuth 2.0 technique (E.g. Facebook, Google+, and Personal Login) to identify the mobile end-user and uses security tokens to handle the tedious authentication with the IaaS cloud. Also, the deployment of the middleware enforces additional data protection because the security credentials and the IaaS abstractions are shielded from the mobile application domain and the end users.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
ORBI: An Internet Service for Self-Employed Professionals ORBI:为自雇专业人士提供的互联网服务
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.58
Stamatia Rizou, George Angouras
Self-employed professionals need powerful software tools to manage their daily tasks. The increasing need for mobility support in combination with the emergence of Internet-based services make SaaS solutions an attractive option for freelancers to manage their business. In this paper, we present ORBI, a SaaS solution especially designed to meet the needs of self-employed professionals that is currently available in the Greek market. We present the key concepts behind the design and implementation of the ORBI solution and we discuss its main value proposition. Furthermore, as part of the ongoing and future research activities we present the main research directions in an effort to use ORBI as an industrial test bed to test and validate innovative concepts and tools.
自由职业者需要强大的软件工具来管理他们的日常工作。对移动性支持的需求日益增长,加上基于互联网的服务的出现,使得SaaS解决方案成为自由职业者管理业务的一个有吸引力的选择。在本文中,我们介绍了ORBI,这是一个专为满足希腊市场上自雇专业人士需求而设计的SaaS解决方案。我们介绍了ORBI解决方案设计和实现背后的关键概念,并讨论了它的主要价值主张。此外,作为正在进行的和未来的研究活动的一部分,我们提出了主要的研究方向,努力使用ORBI作为工业测试平台来测试和验证创新的概念和工具。
{"title":"ORBI: An Internet Service for Self-Employed Professionals","authors":"Stamatia Rizou, George Angouras","doi":"10.1109/SERVICES.2013.58","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.58","url":null,"abstract":"Self-employed professionals need powerful software tools to manage their daily tasks. The increasing need for mobility support in combination with the emergence of Internet-based services make SaaS solutions an attractive option for freelancers to manage their business. In this paper, we present ORBI, a SaaS solution especially designed to meet the needs of self-employed professionals that is currently available in the Greek market. We present the key concepts behind the design and implementation of the ORBI solution and we discuss its main value proposition. Furthermore, as part of the ongoing and future research activities we present the main research directions in an effort to use ORBI as an industrial test bed to test and validate innovative concepts and tools.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 IEEE Ninth World Congress on Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1