首页 > 最新文献

2010 29th IEEE Symposium on Reliable Distributed Systems最新文献

英文 中文
Protection of Identity Information in Cloud Computing without Trusted Third Party 无可信第三方云计算中身份信息的保护
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.57
R. Ranchal, B. Bhargava, L. B. Othmane, L. Lilien, Anya Kim, Myong H. Kang, M. Linderman
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts. We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle—which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user’s privacy policies.
云计算允许使用基于internet的服务来支持业务流程,并在类似实用程序的基础上租赁it服务。它提供了资源的集中,但也带来了数据隐私的风险。一次违规就可能造成重大损失。“用户”的异质性代表了多重协作威胁的危险。在云计算中,实体可能拥有与单个或多个服务提供商(sp)关联的多个帐户。跨服务共享敏感身份信息(即个人身份信息或PII)以及同一实体的相关属性可能导致将身份映射到实体,相当于隐私丢失。身份管理(IDM)是云隐私和安全的核心组件之一,可以帮助缓解与云计算相关的一些问题。可用的解决方案使用可信第三方(TTP)向服务提供商识别实体。解决方案提供商不建议在不受信任的主机上使用其解决方案。我们提出了一种IDM方法,它独立于TTP,并且能够在不受信任的主机上使用身份数据。该方法基于在加密数据和多方计算上使用谓词来协商云服务的使用。它使用活动包——这是一种中间件代理,包括PII数据、隐私策略、执行策略的虚拟机,并且有一组保护机制来保护自己。活动包代表用户进行交互,使用用户的隐私策略对云服务进行身份验证。
{"title":"Protection of Identity Information in Cloud Computing without Trusted Third Party","authors":"R. Ranchal, B. Bhargava, L. B. Othmane, L. Lilien, Anya Kim, Myong H. Kang, M. Linderman","doi":"10.1109/SRDS.2010.57","DOIUrl":"https://doi.org/10.1109/SRDS.2010.57","url":null,"abstract":"Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of “users” represents a danger of multiple, collaborative threats. In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss. Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts. We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle—which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user’s privacy policies.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Data-Mining-Based Link Failure Detection for Wireless Mesh Networks 基于数据挖掘的无线网状网络链路故障检测
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.51
Timo Lindhorst, G. Lukas, E. Nett, M. Mock
Mobile robot applications operating in wireless environments require fast detection of link failures in order to enable fast repair. In previous work, we have shown that cross-layer failure detection can reduce failure detection latency significantly. In particular, we monitor the behavior of the WLAN MAC layer to predict failures on the link layer. In this paper, we investigate data mining techniques to determine which parameters, i.e., the events, or combination and timing of events, occurring on the MAC layer most probably lead to link failures. Our results show, that the parameters revealed with the data mining approach produce similar or even more accurate failure predictions than achieved so far.
在无线环境中运行的移动机器人应用需要快速检测链路故障,以便快速修复。在之前的工作中,我们已经证明了跨层故障检测可以显着降低故障检测延迟。特别是,我们监视WLAN MAC层的行为以预测链路层上的故障。在本文中,我们研究数据挖掘技术,以确定哪些参数,即事件,或事件的组合和时间,发生在MAC层上最有可能导致链路故障。我们的结果表明,数据挖掘方法所揭示的参数产生的故障预测与目前所实现的相似甚至更准确。
{"title":"Data-Mining-Based Link Failure Detection for Wireless Mesh Networks","authors":"Timo Lindhorst, G. Lukas, E. Nett, M. Mock","doi":"10.1109/SRDS.2010.51","DOIUrl":"https://doi.org/10.1109/SRDS.2010.51","url":null,"abstract":"Mobile robot applications operating in wireless environments require fast detection of link failures in order to enable fast repair. In previous work, we have shown that cross-layer failure detection can reduce failure detection latency significantly. In particular, we monitor the behavior of the WLAN MAC layer to predict failures on the link layer. In this paper, we investigate data mining techniques to determine which parameters, i.e., the events, or combination and timing of events, occurring on the MAC layer most probably lead to link failures. Our results show, that the parameters revealed with the data mining approach produce similar or even more accurate failure predictions than achieved so far.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real Distribution of Response Time Instability in Service-Oriented Architecture 面向服务体系结构中响应时间不稳定性的真实分布
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.40
A. Gorbenko, V. Kharchenko, Seyran Mamutov, O. Tarasyuk, Yuhui Chen, A. Romanovsky
is paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium. We present the results of our statistical data analysis and distributions which fit and predict the response time instability typical of Service-Oriented Architectures (SOAs) built over the Internet. Our experiment has shown that the request processing time of the target e-science Web Service (WS) has a higher instability than the network round trip time. It has been found that by using a particular theoretical distribution, within short time intervals the request processing time can be represented better than the network round trip time. Moreover, certain characteristics of the probability distribution series of the round trip time make it particularly difficult to fit them theoretically. The experimental work reported in the paper supports our claim that dealing with the uncertainty inherent in the very nature of SOA and WSs is one of the main challenges in building dependable service-oriented systems. In particular, this uncertainty exhibits itself through very unstable web service response times and Internet data transfer delays that are hard to predict. Our findings indicate that the more experimental data is considered the less precise distributional approximations become. The paper concludes with a discussion of the lessons learnt about the analysis techniques to be used in such experiments, the validity of the data, the main causes of uncertainty and possible remedial actions.
本文报告了我们对一个复杂的系统生物学网络服务进行基准测试的实践经验,并研究了其行为的不稳定性和由通信介质引起的延迟。我们给出了统计数据分析和分布的结果,这些结果符合并预测了在Internet上构建的面向服务的体系结构(soa)典型的响应时间不稳定性。实验表明,目标电子科学Web服务(WS)的请求处理时间比网络往返时间具有更高的不稳定性。研究发现,通过使用特定的理论分布,在短时间间隔内,请求处理时间可以比网络往返时间更好地表示。此外,往返时间的概率分布序列的某些特征使得它们在理论上特别难以拟合。本文中报告的实验工作支持了我们的观点,即处理SOA和web服务本质中固有的不确定性是构建可靠的面向服务系统的主要挑战之一。特别是,这种不确定性表现为非常不稳定的web服务响应时间和难以预测的Internet数据传输延迟。我们的发现表明,考虑的实验数据越多,分布近似就越不精确。本文最后讨论了在此类实验中使用的分析技术的经验教训,数据的有效性,不确定性的主要原因和可能的补救措施。
{"title":"Real Distribution of Response Time Instability in Service-Oriented Architecture","authors":"A. Gorbenko, V. Kharchenko, Seyran Mamutov, O. Tarasyuk, Yuhui Chen, A. Romanovsky","doi":"10.1109/SRDS.2010.40","DOIUrl":"https://doi.org/10.1109/SRDS.2010.40","url":null,"abstract":"is paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium. We present the results of our statistical data analysis and distributions which fit and predict the response time instability typical of Service-Oriented Architectures (SOAs) built over the Internet. Our experiment has shown that the request processing time of the target e-science Web Service (WS) has a higher instability than the network round trip time. It has been found that by using a particular theoretical distribution, within short time intervals the request processing time can be represented better than the network round trip time. Moreover, certain characteristics of the probability distribution series of the round trip time make it particularly difficult to fit them theoretically. The experimental work reported in the paper supports our claim that dealing with the uncertainty inherent in the very nature of SOA and WSs is one of the main challenges in building dependable service-oriented systems. In particular, this uncertainty exhibits itself through very unstable web service response times and Internet data transfer delays that are hard to predict. Our findings indicate that the more experimental data is considered the less precise distributional approximations become. The paper concludes with a discussion of the lessons learnt about the analysis techniques to be used in such experiments, the validity of the data, the main causes of uncertainty and possible remedial actions.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126010313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage Systems 高卢:用于诊断大型企业存储系统中反复出现问题的非结构化日志的格式塔分析
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.25
Pin Zhou, Binny S. Gill, W. Belluomini, Avani Wildani
We present GAUL, a system to automate the whole log comparison between a new problem and the ones diagnosed in the past to identify recurring problems. GAUL uses a fuzzy match algorithm based on the contextual overlap between log lines and efficiently implements this using scalable index/search. The accuracy and efficiency of the comparison is further improved by leveraging problem set information and noise tolerance techniques. We evaluate GAUL using 4339 customer problems that occurred in all field deployments of an enterprise storage system over the course of a year. Our results show that with human-filtered logs, GAUL can identify the correct problem set 66% of the time among the top10 matches, which is 15% more accurate than the VSM system that uses cosine similarity and 19% more accurate than the ERRCMP system that uses error codes for log comparison. With unfiltered logs, the top10 match accuracy of GAUL is 40%, which is 22% more accurate than VSM and 26% more accurate than ERRCMP.
我们提出了GAUL系统,它可以自动将新问题与过去诊断的问题进行整个日志比较,以识别重复出现的问题。GAUL使用基于日志行之间上下文重叠的模糊匹配算法,并使用可扩展的索引/搜索有效地实现了这一点。通过利用问题集信息和噪声容忍技术,进一步提高了比较的准确性和效率。我们使用在一年中企业存储系统的所有现场部署中出现的4339个客户问题来评估GAUL。我们的研究结果表明,在人工过滤日志的情况下,GAUL在top10匹配中识别正确问题集的准确率为66%,比使用余弦相似度的VSM系统高出15%,比使用错误码进行日志比较的ERRCMP系统高出19%。在未过滤日志的情况下,gaaul的top10匹配准确率为40%,比VSM高22%,比ERRCMP高26%。
{"title":"GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage Systems","authors":"Pin Zhou, Binny S. Gill, W. Belluomini, Avani Wildani","doi":"10.1109/SRDS.2010.25","DOIUrl":"https://doi.org/10.1109/SRDS.2010.25","url":null,"abstract":"We present GAUL, a system to automate the whole log comparison between a new problem and the ones diagnosed in the past to identify recurring problems. GAUL uses a fuzzy match algorithm based on the contextual overlap between log lines and efficiently implements this using scalable index/search. The accuracy and efficiency of the comparison is further improved by leveraging problem set information and noise tolerance techniques. We evaluate GAUL using 4339 customer problems that occurred in all field deployments of an enterprise storage system over the course of a year. Our results show that with human-filtered logs, GAUL can identify the correct problem set 66% of the time among the top10 matches, which is 15% more accurate than the VSM system that uses cosine similarity and 19% more accurate than the ERRCMP system that uses error codes for log comparison. With unfiltered logs, the top10 match accuracy of GAUL is 40%, which is 22% more accurate than VSM and 26% more accurate than ERRCMP.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing 云计算中以实体为中心的隐私和身份管理方法
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.28
Pelin Angin, B. Bhargava, R. Ranchal, Noopur Singh, M. Linderman, L. B. Othmane, L. Lilien
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. We propose an entity-centric approach for IDM in the cloud. The approach is based on: (1) active bundles—each including a payload of PII, privacy policies and a virtual machine that enforces the policies and uses a set of protection mechanisms to protect themselves, (2) anonymous identification to mediate interactions between the entity and cloud services using entity’s privacy policies. The main characteristics of the approach are: it is independent of third party, gives minimum information to the SP and provides ability to use identity data on untrusted hosts.
实体(例如,用户、服务)必须向服务提供者(sp)验证自己,才能使用其服务。实体向服务提供商提供唯一标识它的个人身份信息(PII)。在传统的以应用程序为中心的身份管理(IDM)模型中,每个应用程序都跟踪使用它的实体的身份。在云计算中,实体可能有多个账户与不同的服务提供商相关联,也可能有一个服务提供商。跨服务共享同一实体的pii以及相关属性可能导致pii映射到实体。我们为云中的IDM提出了一种以实体为中心的方法。该方法基于:(1)活动包——每个包都包括PII的有效载荷、隐私策略和一个虚拟机,该虚拟机执行这些策略并使用一组保护机制来保护自己;(2)使用实体的隐私策略来协调实体和云服务之间的交互的匿名标识。该方法的主要特点是:它独立于第三方,向SP提供最少的信息,并提供在不受信任的主机上使用身份数据的能力。
{"title":"An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing","authors":"Pelin Angin, B. Bhargava, R. Ranchal, Noopur Singh, M. Linderman, L. B. Othmane, L. Lilien","doi":"10.1109/SRDS.2010.28","DOIUrl":"https://doi.org/10.1109/SRDS.2010.28","url":null,"abstract":"Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may have multiple accounts associated with different SPs, or one SP. Sharing PIIs of the same entity across services along with associated attributes can lead to mapping of PIIs to the entity. We propose an entity-centric approach for IDM in the cloud. The approach is based on: (1) active bundles—each including a payload of PII, privacy policies and a virtual machine that enforces the policies and uses a set of protection mechanisms to protect themselves, (2) anonymous identification to mediate interactions between the entity and cloud services using entity’s privacy policies. The main characteristics of the approach are: it is independent of third party, gives minimum information to the SP and provides ability to use identity data on untrusted hosts.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization VMDriver:一种基于驱动的虚拟化监控机制
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.38
Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao
Monitoring virtual machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained – monitoring in granularity of VM level, or not general – only support specific monitoring functions for particular guest operating system (OS). Thus they do not satisfy the monitoring requirement in large-scale server cluster such as data center and public cloud platform, where each physical platform runs hundreds of VMs with different guest OSes. In this paper, we propose VMDriver, a general and fine-grained approach for virtualization monitoring. The novel design of VMDriver is the separation of event interception point in VMM level and rich guest OS semantic reconstructions in management domain. With this design, variant monitoring drivers in management domain can mask the differences of guest OSes. We implement VMDriver on Xen and our experimental study shows that it introduces very small performance overhead. We demonstrate its generality by inspecting four aspects information about the target virtual machines with different guest OSes. The unified interface of VMDriver brings convenience to develop complex monitoring tools for distributed virtualization environment.
监控虚拟机是虚拟化平台的必备功能。现有的解决方案要么是粗粒度的(按VM级别粒度进行监控),要么不是通用的(仅支持针对特定客户机操作系统的特定监控功能)。在数据中心和公有云平台等大规模服务器集群中,每个物理平台运行数百个虚拟机,使用不同的客户机操作系统,因此无法满足监控需求。在本文中,我们提出了VMDriver,这是一种用于虚拟化监控的通用和细粒度方法。VMDriver的新设计是在VMM层分离事件截获点,在管理域实现丰富的客户操作系统语义重构。通过这种设计,管理域中的各种监视驱动程序可以掩盖客户机操作系统的差异。我们在Xen上实现了VMDriver,我们的实验研究表明它带来了非常小的性能开销。我们通过检查使用不同客户机操作系统的目标虚拟机的四个方面信息来展示其通用性。VMDriver的统一接口为开发复杂的分布式虚拟化环境监控工具提供了方便。
{"title":"VMDriver: A Driver-Based Monitoring Mechanism for Virtualization","authors":"Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao","doi":"10.1109/SRDS.2010.38","DOIUrl":"https://doi.org/10.1109/SRDS.2010.38","url":null,"abstract":"Monitoring virtual machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained – monitoring in granularity of VM level, or not general – only support specific monitoring functions for particular guest operating system (OS). Thus they do not satisfy the monitoring requirement in large-scale server cluster such as data center and public cloud platform, where each physical platform runs hundreds of VMs with different guest OSes. In this paper, we propose VMDriver, a general and fine-grained approach for virtualization monitoring. The novel design of VMDriver is the separation of event interception point in VMM level and rich guest OS semantic reconstructions in management domain. With this design, variant monitoring drivers in management domain can mask the differences of guest OSes. We implement VMDriver on Xen and our experimental study shows that it introduces very small performance overhead. We demonstrate its generality by inspecting four aspects information about the target virtual machines with different guest OSes. The unified interface of VMDriver brings convenience to develop complex monitoring tools for distributed virtualization environment.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134028484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Adaptare-FD: A Dependability-Oriented Adaptive Failure Detector Adaptive - fd:一个面向可靠性的自适应故障检测器
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.24
M. Dixit, A. Casimiro
Unreliable failure detectors are a fundamental building block in the design of reliable distributed systems. But unreliability must be bounded, despite the uncertainties affecting the timeliness of communication. This is why it is important to reason in terms of the quality of service (QoS) of failure detectors, both in their specification and evaluation. We propose a novel dependability-oriented approach for specifying the QoS of failure detectors, and introduce Adapt are-FD, an autonomous and adaptive failure detector that executes according to this new specification. The main distinguishing features of Adapt are-FD with respect to existing adaptive failure detection approaches are discussed and explained in detail. A comparative evaluation of Adapt are-FD is presented. We highlight the practical differences between our approach and the well known Chen et al. approach for the specification of QoS requirements. We show that Adapt are-FD is easily configured, independently of the specific network environment. Furthermore, the results obtained using the Planet Lab platform indicate that Adapt are-FD outperforms other timeout-based solutions, combining versatility with improved QoS and dependability assurance.
不可靠的故障检测器是设计可靠的分布式系统的基本组成部分。但是不可靠性必须是有限度的,尽管不确定性影响着通信的及时性。这就是为什么从故障检测器的服务质量(QoS)方面进行推理是很重要的,包括在它们的规范和评估中。我们提出了一种新的面向可靠性的方法来指定故障检测器的QoS,并引入了Adapt are-FD,一种根据这种新规范执行的自主和自适应故障检测器。讨论并详细解释了adaptive - fd与现有自适应故障检测方法的主要区别。对Adapt are-FD进行了比较评价。我们强调了我们的方法与众所周知的Chen等人在QoS需求规范方面的方法之间的实际差异。我们证明了Adapt are-FD很容易配置,独立于特定的网络环境。此外,使用Planet Lab平台获得的结果表明,Adapt are-FD优于其他基于超时的解决方案,将多功能性与改进的QoS和可靠性保证相结合。
{"title":"Adaptare-FD: A Dependability-Oriented Adaptive Failure Detector","authors":"M. Dixit, A. Casimiro","doi":"10.1109/SRDS.2010.24","DOIUrl":"https://doi.org/10.1109/SRDS.2010.24","url":null,"abstract":"Unreliable failure detectors are a fundamental building block in the design of reliable distributed systems. But unreliability must be bounded, despite the uncertainties affecting the timeliness of communication. This is why it is important to reason in terms of the quality of service (QoS) of failure detectors, both in their specification and evaluation. We propose a novel dependability-oriented approach for specifying the QoS of failure detectors, and introduce Adapt are-FD, an autonomous and adaptive failure detector that executes according to this new specification. The main distinguishing features of Adapt are-FD with respect to existing adaptive failure detection approaches are discussed and explained in detail. A comparative evaluation of Adapt are-FD is presented. We highlight the practical differences between our approach and the well known Chen et al. approach for the specification of QoS requirements. We show that Adapt are-FD is easily configured, independently of the specific network environment. Furthermore, the results obtained using the Planet Lab platform indicate that Adapt are-FD outperforms other timeout-based solutions, combining versatility with improved QoS and dependability assurance.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc Networks 一种资源高效的移动自组织网络自适应缓存方案
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.16
D. Hirsch, S. Madria
In a Mobile Ad-Hoc Network environment, wireless devices have finite resources such as memory, energy and they work within the wireless constraints such as limited bandwidth and unreliable communication. Therefore, storage space, bandwidth, and battery life must be managed effectively in order to extend the usefulness and lifespan of wireless devices and the network. Caching is one of those techniques which reduce the latency and tuning time for mobile devices in the wireless network. We propose a novel scheme that seeks to distribute the storage, bandwidth and energy burden through a resource efficient adaptive caching scheme for mobile ad-hoc networks. Our performance results show that our scheme reduces both response time and bandwidth utilization by, 36%, through a reduction in hop count, as well as both a 79% increase in energy efficiency and a 53% reduction in storage utilization when compared with a leading alternate methodology.
在移动自组织网络环境中,无线设备具有有限的资源(如内存、能量),并且它们在有限的带宽和不可靠的通信等无线约束下工作。因此,必须有效地管理存储空间、带宽和电池寿命,以延长无线设备和网络的可用性和寿命。缓存是减少无线网络中移动设备的延迟和调优时间的技术之一。我们提出了一种新的方案,旨在通过一种资源高效的自适应缓存方案来分配移动自组织网络的存储、带宽和能量负担。我们的性能结果表明,与领先的替代方法相比,我们的方案通过减少跳数将响应时间和带宽利用率降低了36%,同时能源效率提高了79%,存储利用率降低了53%。
{"title":"A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc Networks","authors":"D. Hirsch, S. Madria","doi":"10.1109/SRDS.2010.16","DOIUrl":"https://doi.org/10.1109/SRDS.2010.16","url":null,"abstract":"In a Mobile Ad-Hoc Network environment, wireless devices have finite resources such as memory, energy and they work within the wireless constraints such as limited bandwidth and unreliable communication. Therefore, storage space, bandwidth, and battery life must be managed effectively in order to extend the usefulness and lifespan of wireless devices and the network. Caching is one of those techniques which reduce the latency and tuning time for mobile devices in the wireless network. We propose a novel scheme that seeks to distribute the storage, bandwidth and energy burden through a resource efficient adaptive caching scheme for mobile ad-hoc networks. Our performance results show that our scheme reduces both response time and bandwidth utilization by, 36%, through a reduction in hop count, as well as both a 79% increase in energy efficiency and a 53% reduction in storage utilization when compared with a leading alternate methodology.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Tactical Information Management Middleware for Resource-Constrained Mobile P2P Networks 资源受限的移动P2P网络战术信息管理中间件
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.41
Bo Xu, M. Linderman, S. Madria, O. Wolfson
In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross layer design of a system capable of handling the dynamic data management issues relevant in many mission critical applications.
本文提出了一种用于带宽约束信息管理的战术信息中间件体系结构。我们提出了基于等级的数据传播思想,以及战术信息管理查询语言的使用。这些想法将处理带宽的动态变化,并探索机会数据传播。因此,将导致系统的跨层设计,能够处理与许多关键任务应用程序相关的动态数据管理问题。
{"title":"A Tactical Information Management Middleware for Resource-Constrained Mobile P2P Networks","authors":"Bo Xu, M. Linderman, S. Madria, O. Wolfson","doi":"10.1109/SRDS.2010.41","DOIUrl":"https://doi.org/10.1109/SRDS.2010.41","url":null,"abstract":"In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross layer design of a system capable of handling the dynamic data management issues relevant in many mission critical applications.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Fault-Tolerance for Peer-to-Peer Middleware 点对点中间件的轻量级容错
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.43
Rolando Martins, P. Narasimhan, Luís M. B. Lopes, Fernando M A Silva
We address the problem of providing transparent, lightweight, fault-tolerance mechanisms for generic peer-to-peer middleware systems. The main idea is to use the peer-to-peer overlay to provide for fault-tolerance rather than support it higher up in the middleware architecture, e.g. in the form of services. To evaluate our approach we have implemented a fault-tolerant middleware prototype that uses a hierarchical peer-to-peer overlay in which the leaf peers connect to sensors that provide data streams. Clients connect to the root of the overlay and request streams that are routed upwards through intermediate peers in the overlay up to the client. We report encouraging preliminary results for latency, jitter and resource consumption for both the non-faulty and faulty cases.
我们解决了为通用点对点中间件系统提供透明、轻量级、容错机制的问题。其主要思想是使用点对点覆盖来提供容错,而不是在中间件体系结构中以更高的形式支持容错,例如以服务的形式。为了评估我们的方法,我们实现了一个容错中间件原型,它使用分层点对点覆盖,其中叶子对等体连接到提供数据流的传感器。客户端连接到覆盖层的根,并请求通过覆盖层中的中间对等体向上路由到客户端的流。我们报告了在非故障和故障情况下的延迟、抖动和资源消耗方面令人鼓舞的初步结果。
{"title":"Lightweight Fault-Tolerance for Peer-to-Peer Middleware","authors":"Rolando Martins, P. Narasimhan, Luís M. B. Lopes, Fernando M A Silva","doi":"10.1109/SRDS.2010.43","DOIUrl":"https://doi.org/10.1109/SRDS.2010.43","url":null,"abstract":"We address the problem of providing transparent, lightweight, fault-tolerance mechanisms for generic peer-to-peer middleware systems. The main idea is to use the peer-to-peer overlay to provide for fault-tolerance rather than support it higher up in the middleware architecture, e.g. in the form of services. To evaluate our approach we have implemented a fault-tolerant middleware prototype that uses a hierarchical peer-to-peer overlay in which the leaf peers connect to sensors that provide data streams. Clients connect to the root of the overlay and request streams that are routed upwards through intermediate peers in the overlay up to the client. We report encouraging preliminary results for latency, jitter and resource consumption for both the non-faulty and faulty cases.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128890709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2010 29th IEEE Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1