首页 > 最新文献

2013 IEEE 5th International Conference on Cloud Computing Technology and Science最新文献

英文 中文
Adding a Live Migration Model into SimGrid: One More Step Toward the Simulation of Infrastructure-as-a-Service Concerns 向SimGrid中添加实时迁移模型:向模拟基础设施即服务关注点又迈进了一步
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.20
Takahiro Hirofuchi, A. Lèbre, L. Pouilloux
Although virtual machine (VM) placement problem has been an active research area over the past decade, the research community is still looking for an open simulation framework that can simulate in an accurate as well as scalable manner VM operations including live migrations. Existing frameworks, however, leverage a naive migration model that considers neither memory update operations nor resource sharing contention, resulting in an underestimate of both the duration of a live migration and the size of migration traffic. In this paper, we propose a simulation framework of virtualized distributed systems with the first class support of live migration operations. We developed a resource share calculation mechanism for VMs and a live migration model implementing the precopy migration algorithm of Qemu/KVM. We extended a widely used simulation toolkit, SimGrid, which allows users to simulate large-scale distributed systems by using user-friendly programming API. Through experiments, we confirmed that our simulation framework correctly reproduced live migration behaviors of the real world under various conditions. Through a first use case, we also confirmed that it is possible to conduct large-scale simulations of complex virtualized workloads upon hundred thousands of VMs upon thousands of physical machines (PMs).
尽管虚拟机(VM)放置问题在过去十年中一直是一个活跃的研究领域,但研究界仍在寻找一种开放的模拟框架,能够以准确和可扩展的方式模拟虚拟机操作,包括实时迁移。然而,现有框架利用了一种幼稚的迁移模型,既不考虑内存更新操作,也不考虑资源共享争用,从而低估了实时迁移的持续时间和迁移流量的大小。在本文中,我们提出了一个虚拟分布式系统的仿真框架,它具有实时迁移操作的一流支持。开发了虚拟机资源共享计算机制和实现Qemu/KVM预拷贝迁移算法的实时迁移模型。我们扩展了一个广泛使用的仿真工具包SimGrid,它允许用户通过使用用户友好的编程API来模拟大规模分布式系统。通过实验,我们证实了我们的模拟框架正确地再现了现实世界在各种条件下的实时迁移行为。通过第一个用例,我们还确认可以在成千上万的物理机器(pm)上对数十万vm上的复杂虚拟工作负载进行大规模模拟。
{"title":"Adding a Live Migration Model into SimGrid: One More Step Toward the Simulation of Infrastructure-as-a-Service Concerns","authors":"Takahiro Hirofuchi, A. Lèbre, L. Pouilloux","doi":"10.1109/CloudCom.2013.20","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.20","url":null,"abstract":"Although virtual machine (VM) placement problem has been an active research area over the past decade, the research community is still looking for an open simulation framework that can simulate in an accurate as well as scalable manner VM operations including live migrations. Existing frameworks, however, leverage a naive migration model that considers neither memory update operations nor resource sharing contention, resulting in an underestimate of both the duration of a live migration and the size of migration traffic. In this paper, we propose a simulation framework of virtualized distributed systems with the first class support of live migration operations. We developed a resource share calculation mechanism for VMs and a live migration model implementing the precopy migration algorithm of Qemu/KVM. We extended a widely used simulation toolkit, SimGrid, which allows users to simulate large-scale distributed systems by using user-friendly programming API. Through experiments, we confirmed that our simulation framework correctly reproduced live migration behaviors of the real world under various conditions. Through a first use case, we also confirmed that it is possible to conduct large-scale simulations of complex virtualized workloads upon hundred thousands of VMs upon thousands of physical machines (PMs).","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131622466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware 在LBS中实现匿名:一种基于云的不可信中间件
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.143
Fizza Abbas, Rasheed Hussain, Junggab Son, Hasoo Eun, Heekuck Oh
Technological advancements in mobile technology and cloud computing open the door for another paradigm known as Mobile Cloud Computing (MCC). This integration of cloud computing and mobile technology gives numerous facilities to a mobile user, such as the ubiquitous availability of Location Based Services (LBS). The utilization of these LBS services require the knowledge of a user's location, hence threatens the privacy of a user. In this paper we take advantages of ultra-fast processing and reliability of cloud computing and aim to solve the privacy threat issue faced by a mobile user while getting LBS services. We propose a model that utilizes a cloud based server which helps in making of a cloaking region. We highlight that how our model utilizes an untrusted cloud based server and eliminates the use of a trusted anonymizer while providing LBS services to a user securely and anonymously.
移动技术和云计算的技术进步为另一种被称为移动云计算(MCC)的范式打开了大门。云计算和移动技术的这种集成为移动用户提供了许多便利,例如无处不在的基于位置的服务(LBS)。利用这些LBS服务需要了解用户的位置,因此威胁到用户的隐私。本文利用云计算的超快速处理和可靠性,旨在解决移动用户在获得LBS服务时面临的隐私威胁问题。我们提出了一个模型,利用基于云的服务器,这有助于制造一个隐形区域。我们强调了我们的模型如何利用一个不受信任的基于云的服务器,并消除了可信匿名器的使用,同时安全匿名地向用户提供LBS服务。
{"title":"Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware","authors":"Fizza Abbas, Rasheed Hussain, Junggab Son, Hasoo Eun, Heekuck Oh","doi":"10.1109/CloudCom.2013.143","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.143","url":null,"abstract":"Technological advancements in mobile technology and cloud computing open the door for another paradigm known as Mobile Cloud Computing (MCC). This integration of cloud computing and mobile technology gives numerous facilities to a mobile user, such as the ubiquitous availability of Location Based Services (LBS). The utilization of these LBS services require the knowledge of a user's location, hence threatens the privacy of a user. In this paper we take advantages of ultra-fast processing and reliability of cloud computing and aim to solve the privacy threat issue faced by a mobile user while getting LBS services. We propose a model that utilizes a cloud based server which helps in making of a cloaking region. We highlight that how our model utilizes an untrusted cloud based server and eliminates the use of a trusted anonymizer while providing LBS services to a user securely and anonymously.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130677178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Support for Latency-Sensitive Telephony Applications 对延迟敏感的电话应用的云支持
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.61
Jong-Yul Kim, H. Schulzrinne
Cloud computing is great for scaling applications but the latency in a guest VM can be unpredictable due to resource contention between neighbors. For telephony applications, which are latency-sensitive, we propose a system to monitor telephony server latencies and adapt the server load based on the measured latencies. We implemented the system and evaluated it on an Amazon EC2 test bed. We show indirectly by comparing our server on EC2 and on a local VM, that there may be contention between EC2 VMs in the wild that leads to higher server latency. While there is some overhead due to constant monitoring of the server, our system manages to lower latency by reducing the load to the server.
云计算非常适合扩展应用程序,但是由于邻居之间的资源争用,客户机VM中的延迟可能是不可预测的。对于对延迟敏感的电话应用程序,我们提出了一种监控电话服务器延迟的系统,并根据测量到的延迟调整服务器负载。我们实现了该系统,并在Amazon EC2测试平台上对其进行了评估。通过比较我们在EC2上的服务器和在本地VM上的服务器,我们可以间接地看到,EC2 VM之间可能存在争用,从而导致更高的服务器延迟。虽然持续监控服务器会带来一些开销,但我们的系统通过减少服务器的负载来降低延迟。
{"title":"Cloud Support for Latency-Sensitive Telephony Applications","authors":"Jong-Yul Kim, H. Schulzrinne","doi":"10.1109/CloudCom.2013.61","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.61","url":null,"abstract":"Cloud computing is great for scaling applications but the latency in a guest VM can be unpredictable due to resource contention between neighbors. For telephony applications, which are latency-sensitive, we propose a system to monitor telephony server latencies and adapt the server load based on the measured latencies. We implemented the system and evaluated it on an Amazon EC2 test bed. We show indirectly by comparing our server on EC2 and on a local VM, that there may be contention between EC2 VMs in the wild that leads to higher server latency. While there is some overhead due to constant monitoring of the server, our system manages to lower latency by reducing the load to the server.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126882687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Trusted Cloud Transfer Protocol 可信云传输协议
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.126
Mathias Slawik
Contemporary cloud computing solutions incorporate HTTP intermediaries, such as reverse proxies, load balancers, and intrusion prevention systems. These act as TLS server connection ends and access HTTP/TLS plaintext to carry out their functions. This raises many concerns: increased security efforts, the risk of losing confidentiality and integrity, and potentially unauthorized data access. Current HTTP entity-body encryption technologies address these concerns by providing end-to-end security between user agents and origin servers. However, they present disparate deficiencies, e.g., inefficient presentation languages, message-flow vulnerabilities, and the circumvention of HTTP streaming. This paper introduces the Trusted Cloud Transfer Protocol (TCTP), which presents a novel approach to entity-body encryption overcoming these deficiencies. The pivotal idea of TCTP are HTTP application layer encryption channels (HALECs), which integrate TLS functionality into the HTTP application layer. TCTP can be deployed immediately, as it is fully HTTP compliant, and rapidly implemented, as required TLS libraries are widely available. The reliance upon the mature TLS protocol minimizes the risk of introducing new security threats. Furthermore, TLS brings the benefit of relative efficiency, which is demonstrated on the basis of an example TCTP implementation.
当代云计算解决方案包含HTTP中介,例如反向代理、负载平衡器和入侵防御系统。它们作为TLS服务器连接端,通过访问HTTP/TLS明文来实现其功能。这引起了许多关注:增加安全工作,失去机密性和完整性的风险,以及潜在的未经授权的数据访问。当前的HTTP实体体加密技术通过在用户代理和原始服务器之间提供端到端安全性来解决这些问题。然而,它们也存在着不同的缺陷,例如,低效的表示语言、消息流漏洞和对HTTP流的规避。本文介绍了可信云传输协议(可信云传输协议),它提出了一种新的实体-实体加密方法,克服了这些缺陷。tcp的核心思想是HTTP应用层加密通道(HALECs),它将TLS功能集成到HTTP应用层中。tcp可以立即部署,因为它完全符合HTTP,并且可以快速实现,因为所需的TLS库广泛可用。对成熟的TLS协议的依赖将引入新安全威胁的风险降至最低。此外,TLS带来了相对效率的好处,这在一个tcp实现示例的基础上得到了证明。
{"title":"The Trusted Cloud Transfer Protocol","authors":"Mathias Slawik","doi":"10.1109/CloudCom.2013.126","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.126","url":null,"abstract":"Contemporary cloud computing solutions incorporate HTTP intermediaries, such as reverse proxies, load balancers, and intrusion prevention systems. These act as TLS server connection ends and access HTTP/TLS plaintext to carry out their functions. This raises many concerns: increased security efforts, the risk of losing confidentiality and integrity, and potentially unauthorized data access. Current HTTP entity-body encryption technologies address these concerns by providing end-to-end security between user agents and origin servers. However, they present disparate deficiencies, e.g., inefficient presentation languages, message-flow vulnerabilities, and the circumvention of HTTP streaming. This paper introduces the Trusted Cloud Transfer Protocol (TCTP), which presents a novel approach to entity-body encryption overcoming these deficiencies. The pivotal idea of TCTP are HTTP application layer encryption channels (HALECs), which integrate TLS functionality into the HTTP application layer. TCTP can be deployed immediately, as it is fully HTTP compliant, and rapidly implemented, as required TLS libraries are widely available. The reliance upon the mature TLS protocol minimizes the risk of introducing new security threats. Furthermore, TLS brings the benefit of relative efficiency, which is demonstrated on the basis of an example TCTP implementation.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126371512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Hydra: A Layered, Redundant Configuration Management Approach for Cloud-Agnostic Disaster Recovery Hydra:用于与云无关的灾难恢复的分层、冗余配置管理方法
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.158
Ke Huang, Kyrre M. Begnum
This paper demonstrates a bottom-up approach to developing autonomic fault tolerance and disaster recovery on cloud-based deployments. We avoid lock-in to specific recovery features provided by the cloud itself, and instead show that tools used in system administration today can provide the foundation for recovery processes with few additions. The resulting system, Hydra, is capable of detecting failures in instances and can redeploy any instance at a new location without human intervention. The layered design of configuration management tools enables separation of recovery processes and the actual service, making the Hydra applicable to a wide range of scenarios. The implementation was tested and an analysis of the recovery time is provided, demonstrating that the Hydra is capable of completely rebuilding a new site in 15 minutes.
本文演示了在基于云的部署上开发自主容错和灾难恢复的自底向上方法。我们避免拘泥于云本身提供的特定恢复特性,相反,我们展示了当今系统管理中使用的工具可以为恢复过程提供基础,而且添加的东西很少。由此产生的Hydra系统能够检测实例中的故障,并且可以在没有人工干预的情况下将任何实例重新部署到新的位置。配置管理工具的分层设计使恢复过程和实际服务分离,使Hydra适用于广泛的场景。对实施进行了测试,并提供了恢复时间分析,表明Hydra能够在15分钟内完全重建一个新站点。
{"title":"The Hydra: A Layered, Redundant Configuration Management Approach for Cloud-Agnostic Disaster Recovery","authors":"Ke Huang, Kyrre M. Begnum","doi":"10.1109/CloudCom.2013.158","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.158","url":null,"abstract":"This paper demonstrates a bottom-up approach to developing autonomic fault tolerance and disaster recovery on cloud-based deployments. We avoid lock-in to specific recovery features provided by the cloud itself, and instead show that tools used in system administration today can provide the foundation for recovery processes with few additions. The resulting system, Hydra, is capable of detecting failures in instances and can redeploy any instance at a new location without human intervention. The layered design of configuration management tools enables separation of recovery processes and the actual service, making the Hydra applicable to a wide range of scenarios. The implementation was tested and an analysis of the recovery time is provided, demonstrating that the Hydra is capable of completely rebuilding a new site in 15 minutes.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114635671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring Personal Data Transfers in the Cloud 监控云中的个人数据传输
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.52
Anderson Santana de Oliveira, Jakub Sendor, Alexandr Garaga, Kateline Jenatton
Cloud computing brings a number of compliance risks to organisations because physical perimeters are not clearly delimited. Many regulations relate to the location of the data processing (and storage), including the EU Data protection directive. A major problem for cloud service consumers, acting as data controllers, is how to demonstrate compliance to data transfer constraints. We address the lack of tools to support accountable data localization and transfer across cloud software, platform and infrastructure services, usually run by data processors. In this paper we design a framework for automating the collection of evidence that obligations with respect to personal data handling are being carried out in what concerns personal data transfers. We experiment our approach in the Open Stack open source IaaS implementation, showing how auditors can verify whether data transfers were compliant.
云计算给组织带来了许多合规风险,因为物理边界没有明确划定。许多法规与数据处理(和存储)的位置有关,包括欧盟数据保护指令。作为数据控制器的云服务消费者面临的一个主要问题是如何证明对数据传输约束的遵从性。我们解决了缺乏工具来支持负责任的数据本地化和跨云软件、平台和基础设施服务传输的问题,这些通常由数据处理器运行。在本文中,我们设计了一个框架,用于自动收集证据,这些证据表明,在涉及个人数据转移的情况下,正在执行有关个人数据处理的义务。我们在Open Stack开源IaaS实现中试验了我们的方法,展示了审计员如何验证数据传输是否符合要求。
{"title":"Monitoring Personal Data Transfers in the Cloud","authors":"Anderson Santana de Oliveira, Jakub Sendor, Alexandr Garaga, Kateline Jenatton","doi":"10.1109/CloudCom.2013.52","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.52","url":null,"abstract":"Cloud computing brings a number of compliance risks to organisations because physical perimeters are not clearly delimited. Many regulations relate to the location of the data processing (and storage), including the EU Data protection directive. A major problem for cloud service consumers, acting as data controllers, is how to demonstrate compliance to data transfer constraints. We address the lack of tools to support accountable data localization and transfer across cloud software, platform and infrastructure services, usually run by data processors. In this paper we design a framework for automating the collection of evidence that obligations with respect to personal data handling are being carried out in what concerns personal data transfers. We experiment our approach in the Open Stack open source IaaS implementation, showing how auditors can verify whether data transfers were compliant.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Multi-layered Architecture for the Management of Virtualized Application Environments within Inter-cloud Platforms 云平台内虚拟化应用环境管理的多层体系结构
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.138
Omar Abdul-Rahman, K. Aida
Resource allocation is an active direction of research that is drawing interest within academic and technological circles. Resource allocation imposes numerous challenges. This is especially true for Inter-Clouds, a recent paradigm for horizontal expansion and integration of disparate and heterogeneous cloud platforms. In an attempt to realize an efficient resource management system, this work-in-progress paper proposes and describes a new multi-layered management framework to address the tasks of virtualized resource control, dynamic resource provisioning, life-cycle management and resource exchange within Inter-Cloud environments.
资源配置是学术界和科技界关注的一个活跃的研究方向。资源分配带来了许多挑战。对于Inter-Clouds来说尤其如此,Inter-Clouds是最近出现的一种范例,用于水平扩展和集成不同的异构云平台。为了实现高效的资源管理系统,本文提出并描述了一个新的多层管理框架,以解决云间环境中的虚拟化资源控制、动态资源供应、生命周期管理和资源交换等任务。
{"title":"Multi-layered Architecture for the Management of Virtualized Application Environments within Inter-cloud Platforms","authors":"Omar Abdul-Rahman, K. Aida","doi":"10.1109/CloudCom.2013.138","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.138","url":null,"abstract":"Resource allocation is an active direction of research that is drawing interest within academic and technological circles. Resource allocation imposes numerous challenges. This is especially true for Inter-Clouds, a recent paradigm for horizontal expansion and integration of disparate and heterogeneous cloud platforms. In an attempt to realize an efficient resource management system, this work-in-progress paper proposes and describes a new multi-layered management framework to address the tasks of virtualized resource control, dynamic resource provisioning, life-cycle management and resource exchange within Inter-Cloud environments.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards GPU-Accelerated Large-Scale Graph Processing in the Cloud 面向gpu加速的云中的大规模图形处理
Jianlong Zhong, Bingsheng He
Recently, we have witnessed that cloud providers start to offer heterogeneous computing environments. There have been wide interests in both clusters and cloud of adopting graphics processors (GPUs) as accelerators for various applications. On the other hand, large-scale graph processing is important for many data-intensive applications in the cloud. In this paper, we propose to leverage GPUs to accelerate large-scale graph processing in the cloud. Specifically, we develop an in-memory graph processing engine G2 with three non-trivial GPU-specific optimizations. Firstly, we adopt fine-grained APIs to take advantage of the massive thread parallelism of the GPU. Secondly, G2 embraces a graph partition based approach for load balancing on heterogeneous CPU/GPU architectures. Thirdly, a runtime system is developed to perform transparent memory management on the GPU, and to perform scheduling for an improved throughput of concurrent kernel executions from graph tasks. We have conducted experiments on an Amazon EC2 virtual cluster of eight nodes. Our preliminary results demonstrate that 1) GPU is a viable accelerator for cloud-based graph processing, and 2) the proposed optimizations improve the performance of GPU-based graph processing engine. We further present the lessons learnt and open problems towards large-scale graph processing with GPU accelerations.
最近,我们看到云提供商开始提供异构计算环境。对于采用图形处理器(gpu)作为各种应用程序的加速器,集群和云都有广泛的兴趣。另一方面,大规模图形处理对于云中的许多数据密集型应用程序非常重要。在本文中,我们建议利用gpu来加速云中的大规模图形处理。具体来说,我们开发了一个内存中的图形处理引擎G2,其中包含三个重要的特定于gpu的优化。首先,我们采用细粒度api来利用GPU的大规模线程并行性。其次,G2采用基于图分区的方法在异构CPU/GPU架构上实现负载平衡。第三,开发了一个运行时系统,在GPU上执行透明的内存管理,并执行调度,以提高图形任务并发内核执行的吞吐量。我们在一个有8个节点的Amazon EC2虚拟集群上进行了实验。我们的初步结果表明,1)GPU是一种可行的基于云的图形处理加速器,2)所提出的优化提高了基于GPU的图形处理引擎的性能。我们进一步介绍了使用GPU加速进行大规模图形处理的经验教训和开放问题。
{"title":"Towards GPU-Accelerated Large-Scale Graph Processing in the Cloud","authors":"Jianlong Zhong, Bingsheng He","doi":"10.1109/CloudCom.2013.8","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.8","url":null,"abstract":"Recently, we have witnessed that cloud providers start to offer heterogeneous computing environments. There have been wide interests in both clusters and cloud of adopting graphics processors (GPUs) as accelerators for various applications. On the other hand, large-scale graph processing is important for many data-intensive applications in the cloud. In this paper, we propose to leverage GPUs to accelerate large-scale graph processing in the cloud. Specifically, we develop an in-memory graph processing engine G2 with three non-trivial GPU-specific optimizations. Firstly, we adopt fine-grained APIs to take advantage of the massive thread parallelism of the GPU. Secondly, G2 embraces a graph partition based approach for load balancing on heterogeneous CPU/GPU architectures. Thirdly, a runtime system is developed to perform transparent memory management on the GPU, and to perform scheduling for an improved throughput of concurrent kernel executions from graph tasks. We have conducted experiments on an Amazon EC2 virtual cluster of eight nodes. Our preliminary results demonstrate that 1) GPU is a viable accelerator for cloud-based graph processing, and 2) the proposed optimizations improve the performance of GPU-based graph processing engine. We further present the lessons learnt and open problems towards large-scale graph processing with GPU accelerations.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Defining "The Weakest Link" Comparative Security in Complex Systems of Systems 定义复杂系统的比较安全中的“最薄弱环节”
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.101
W. Pieters
Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears. Humans are then typically said to be the "weakest link" when it comes to security, but no proof is provided for this statement. One reason for this is the fact that there are no unified metrics of security that would apply to physical, digital and social components of complex systems alike. How does one compare the security of a room against the security of a piece of data, and how does social engineering an employee compare to exploiting a server vulnerability? Are we really comparing apples and oranges here, or would it be possible to present a comparative metric that would apply across the different domains? This paper explores the possibility of such a metric for complex systems, and proposes one in terms of the risk induced by an entity in the system. This also provides a foundation for the notion of "weakest link", in terms of the entity (set of entities) with the highest induced risk.
云架构是复杂的社会技术系统,不仅包括技术组件及其连接,还包括物理场所和员工。在分析此类系统的安全性并考虑对策时,经常会出现“最薄弱环节”的概念。当涉及到安全问题时,人类通常被认为是“最薄弱的环节”,但没有证据证明这种说法。造成这种情况的一个原因是,没有统一的安全指标,适用于复杂系统的物理、数字和社会组件。如何将一个房间的安全性与一段数据的安全性进行比较,如何将员工的社会工程与利用服务器漏洞进行比较?我们真的是在比较苹果和橘子吗,还是有可能提出一个适用于不同领域的比较指标?本文探讨了复杂系统中这种度量的可能性,并提出了一种基于系统中实体所引起的风险的度量。这也为“最薄弱环节”的概念提供了基础,就具有最高诱发风险的实体(实体集)而言。
{"title":"Defining \"The Weakest Link\" Comparative Security in Complex Systems of Systems","authors":"W. Pieters","doi":"10.1109/CloudCom.2013.101","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.101","url":null,"abstract":"Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of \"weakest link\" often appears. Humans are then typically said to be the \"weakest link\" when it comes to security, but no proof is provided for this statement. One reason for this is the fact that there are no unified metrics of security that would apply to physical, digital and social components of complex systems alike. How does one compare the security of a room against the security of a piece of data, and how does social engineering an employee compare to exploiting a server vulnerability? Are we really comparing apples and oranges here, or would it be possible to present a comparative metric that would apply across the different domains? This paper explores the possibility of such a metric for complex systems, and proposes one in terms of the risk induced by an entity in the system. This also provides a foundation for the notion of \"weakest link\", in terms of the entity (set of entities) with the highest induced risk.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic Workflow Reconfigurations for Recovering from Faulty Cloud Services 云服务故障恢复的动态工作流重新配置
Pub Date : 2013-12-02 DOI: 10.1109/CloudCom.2013.19
L. Assunção, J. Cunha
The workflow paradigm is a well established approach to deal with application complexity by supporting the application development by composition of multiple activities. Furthermore workflows allow encapsulating parts of a problem inside an activity that can be reused in different workflow application scenarios for instance long-running experiments such as the ones involving data streaming. These workflows are characterized by multiple, eventually infinite, iterations processing datasets in multiple activities according to the workflow graph. Some of these activities can invoke Cloud services often unreliably or with limitations on quality of service provoking faults. After a fault the most common approach requires restarting of the entire workflow which can lead to a waste of execution time due to unnecessarily repeating of computations. This paper discuss how the AWARD (Autonomic Workflow Activities Reconfigurable and Dynamic) framework supports recovery from activity faults using dynamic reconfigurations. This is illustrated through an experimental scenario based on a long-running workflow where an activity fails when invoking a Cloud-hosted Web service with a variable level of availability. On detecting this, the AWARD framework allows the dynamic reconfiguration of the corresponding activity to access a new Web service, and avoiding restarting the complete workflow.
工作流范例是一种建立良好的方法,通过支持多个活动组合的应用程序开发来处理应用程序复杂性。此外,工作流允许将问题的部分封装在活动中,这些活动可以在不同的工作流应用程序场景中重用,例如涉及数据流的长时间运行的实验。这些工作流的特点是根据工作流图在多个活动中处理数据集的多次,最终是无限的迭代。其中一些活动可能经常不可靠地调用云服务,或者对服务质量有限制,从而引发故障。在发生故障后,最常见的方法需要重新启动整个工作流,这可能会导致不必要的重复计算而浪费执行时间。本文讨论了AWARD (Autonomic Workflow Activities Reconfigurable and Dynamic)框架如何通过动态重新配置来支持从活动错误中恢复。通过一个基于长时间运行的工作流的实验场景来说明这一点,其中在调用具有可变可用性级别的云托管Web服务时,活动失败。在检测到这一点后,AWARD框架允许动态重新配置相应的活动以访问新的Web服务,并避免重新启动整个工作流。
{"title":"Dynamic Workflow Reconfigurations for Recovering from Faulty Cloud Services","authors":"L. Assunção, J. Cunha","doi":"10.1109/CloudCom.2013.19","DOIUrl":"https://doi.org/10.1109/CloudCom.2013.19","url":null,"abstract":"The workflow paradigm is a well established approach to deal with application complexity by supporting the application development by composition of multiple activities. Furthermore workflows allow encapsulating parts of a problem inside an activity that can be reused in different workflow application scenarios for instance long-running experiments such as the ones involving data streaming. These workflows are characterized by multiple, eventually infinite, iterations processing datasets in multiple activities according to the workflow graph. Some of these activities can invoke Cloud services often unreliably or with limitations on quality of service provoking faults. After a fault the most common approach requires restarting of the entire workflow which can lead to a waste of execution time due to unnecessarily repeating of computations. This paper discuss how the AWARD (Autonomic Workflow Activities Reconfigurable and Dynamic) framework supports recovery from activity faults using dynamic reconfigurations. This is illustrated through an experimental scenario based on a long-running workflow where an activity fails when invoking a Cloud-hosted Web service with a variable level of availability. On detecting this, the AWARD framework allows the dynamic reconfiguration of the corresponding activity to access a new Web service, and avoiding restarting the complete workflow.","PeriodicalId":198053,"journal":{"name":"2013 IEEE 5th International Conference on Cloud Computing Technology and Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 IEEE 5th International Conference on Cloud Computing Technology and Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1