首页 > 最新文献

2014 IEEE 6th International Conference on Cloud Computing Technology and Science最新文献

英文 中文
VSE: Virtual Switch Extension for Adaptive CPU Core Assignment in Softirq 在Softirq中自适应CPU核心分配的虚拟交换机扩展
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.68
S. Muramatsu, Ryota Kawashima, S. Saito, H. Matsuo
An Edge-Overlay model constructing virtual networks using both virtual switches and IP tunnels is promising in cloud datacenter networks. But software-implemented virtual switches can cause performance problems because the packet processing load is concentrated on a particular CPU core. Although multi queue functions like Receive Side Scaling (RSS) can distribute the load onto multiple CPU cores, there are still problems to be solved such as IRQ core collision of heavy traffic flows as well as competitive resource use between physical and virtual for packet processing. In this paper, we propose a software packet processing unit named VSE (Virtual Switch Extension) to address these problems by adaptively determining softirq cores based on both CPU load and VM-running information. Furthermore, the behavior of VSE can be managed by Open Flow controllers. Our performance evaluation results showed that throughput of our approach was higher than an existing RSSbased model as packet processing load increased. In addition, we show that our method prevented performance of high-loaded flows from being degraded by priority-based CPU core selection.
利用虚拟交换机和IP隧道构建虚拟网络的边缘覆盖模型在云数据中心网络中具有广阔的应用前景。但是,软件实现的虚拟交换机可能会导致性能问题,因为数据包处理负载集中在特定的CPU核心上。虽然像接收端缩放(Receive Side Scaling, RSS)这样的多队列功能可以将负载分配到多个CPU内核上,但是仍然存在一些问题需要解决,比如大流量的IRQ内核碰撞,以及物理和虚拟之间在数据包处理方面的资源竞争。在本文中,我们提出了一个名为VSE (Virtual Switch Extension)的软件包处理单元,通过基于CPU负载和虚拟机运行信息自适应地确定软件内核来解决这些问题。此外,VSE的行为可以通过开放流量控制器进行管理。我们的性能评估结果表明,随着数据包处理负载的增加,我们的方法的吞吐量高于现有的基于rss的模型。此外,我们还表明,我们的方法可以防止基于优先级的CPU内核选择降低高负载流的性能。
{"title":"VSE: Virtual Switch Extension for Adaptive CPU Core Assignment in Softirq","authors":"S. Muramatsu, Ryota Kawashima, S. Saito, H. Matsuo","doi":"10.1109/CloudCom.2014.68","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.68","url":null,"abstract":"An Edge-Overlay model constructing virtual networks using both virtual switches and IP tunnels is promising in cloud datacenter networks. But software-implemented virtual switches can cause performance problems because the packet processing load is concentrated on a particular CPU core. Although multi queue functions like Receive Side Scaling (RSS) can distribute the load onto multiple CPU cores, there are still problems to be solved such as IRQ core collision of heavy traffic flows as well as competitive resource use between physical and virtual for packet processing. In this paper, we propose a software packet processing unit named VSE (Virtual Switch Extension) to address these problems by adaptively determining softirq cores based on both CPU load and VM-running information. Furthermore, the behavior of VSE can be managed by Open Flow controllers. Our performance evaluation results showed that throughput of our approach was higher than an existing RSSbased model as packet processing load increased. In addition, we show that our method prevented performance of high-loaded flows from being degraded by priority-based CPU core selection.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual Network Allocation for Fault Tolerance with Bandwidth Efficiency in a Multi-tenant Data Center 多租户数据中心基于容错和带宽效率的虚拟网络分配
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.64
Yukio Ogawa, G. Hasegawa, M. Murata
In a multitenant data center, nodes and links of tenants' virtual networks (VNs) share a single component of the physical substrate network (SN). A failure of the single SN component can thereby cause simultaneous failures of multiple nodes and links in a VN, this complex of failures must significantly disrupt the services offered on the VN. In the present paper, we clarify how the fault tolerance of a VN is affected by a SN failure, especially from the perspective of VN allocation in the SN. We propose a VN allocation model for multitenant data centers and formulate a problem that deals with the bandwidth loss in the VN due the SN failure. We conduct numerical simulations with the setting that has 1.7 × 108 bit/s bandwidth demand on each VN. The results show that the bandwidth loss can be reduced to 5.3 × 102 bit/s per VN, but the required bandwidth between physical servers in the SN increases to 1.0 × 109 bit/s per VN when each node in the VN is mapped to an individual physical server. The balance between the bandwidth loss and the required bandwidth between physical servers can be optimized by assigning every four nodes of the VN to each physical server, meaning that we minimize the bandwidth loss without providing too sufficient bandwidth in the core area of the SN.
在多租户数据中心中,租户的虚拟网络(VNs)的节点和链路共享一个物理基板网络(SN)组件。单个SN组件的故障可能导致VN中多个节点和链路同时故障,这种复杂的故障必须严重中断VN上提供的服务。在本文中,我们阐明了网络故障对网络容错性的影响,特别是从网络中网络分配的角度。提出了一种多租户数据中心的VN分配模型,并提出了一个解决由于SN故障导致的VN带宽损失的问题。我们在每个VN的带宽需求为1.7 × 108 bit/s的设置下进行了数值模拟。结果表明,当网络中的每个节点映射到单个物理服务器时,网络中物理服务器之间的带宽需求增加到1.0 × 109 bit/s / VN。通过将VN的每4个节点分配给每个物理服务器,可以优化物理服务器之间的带宽损失和所需带宽之间的平衡,从而最大限度地减少带宽损失,而不会在SN的核心区提供过多的带宽。
{"title":"Virtual Network Allocation for Fault Tolerance with Bandwidth Efficiency in a Multi-tenant Data Center","authors":"Yukio Ogawa, G. Hasegawa, M. Murata","doi":"10.1109/CloudCom.2014.64","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.64","url":null,"abstract":"In a multitenant data center, nodes and links of tenants' virtual networks (VNs) share a single component of the physical substrate network (SN). A failure of the single SN component can thereby cause simultaneous failures of multiple nodes and links in a VN, this complex of failures must significantly disrupt the services offered on the VN. In the present paper, we clarify how the fault tolerance of a VN is affected by a SN failure, especially from the perspective of VN allocation in the SN. We propose a VN allocation model for multitenant data centers and formulate a problem that deals with the bandwidth loss in the VN due the SN failure. We conduct numerical simulations with the setting that has 1.7 × 108 bit/s bandwidth demand on each VN. The results show that the bandwidth loss can be reduced to 5.3 × 102 bit/s per VN, but the required bandwidth between physical servers in the SN increases to 1.0 × 109 bit/s per VN when each node in the VN is mapped to an individual physical server. The balance between the bandwidth loss and the required bandwidth between physical servers can be optimized by assigning every four nodes of the VN to each physical server, meaning that we minimize the bandwidth loss without providing too sufficient bandwidth in the core area of the SN.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology 多层和多租户云保障评估方法
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.85
Aleksandar Hudic, Markus Tauber, T. Lorünser, M. Krotsiani, G. Spanoudakis, A. Mauthe, E. Weippl
Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.
对安全性要求较高的数据在云中处理和存储的频率越来越高。为了保证以安全的方式处理数据,我们调查了保证方法的适用性。在典型的云环境中,多层和不同涉众的设置决定了用于组成云应用程序的各个组件的安全属性。我们提出了一种根据通用标准改编的方法,用于聚合反映云应用程序各个组成组件的安全属性的信息。此聚合信息用于根据保证级别对整个应用程序安全性进行分类,并提供持续的保证级别评估。它为服务所有者提供了服务安全性的概述,而不需要对日志文件进行详细的手动分析。
{"title":"A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology","authors":"Aleksandar Hudic, Markus Tauber, T. Lorünser, M. Krotsiani, G. Spanoudakis, A. Mauthe, E. Weippl","doi":"10.1109/CloudCom.2014.85","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.85","url":null,"abstract":"Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security Challenges in Cloud Storages 云存储中的安全挑战
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.171
F. Yahya, V. Chang, R. Walters, G. Wills
As cloud becomes the tool of choice for more data storage services, the number of service providers has also increased. With these choices, organisations have a wide selection of services available to move their data to the cloud. However, the responsibility to maintain the security of sensitive data stored therein remains paramount. This paper will discuss some of the challenges of securing a cloud storage and putting it into context by reviewing relevant literature. The challenges associated with the three important security aspects (confidentiality, integrity and availability) are discussed together with the vulnerabilities linked to them. It is important to look into these challenges as cloud storage is not only about technological evolution but involves security considerations. We aim to provide insights of security challenges and its solutions to enhance cloud storage implementation.
随着云成为更多数据存储服务的首选工具,服务提供商的数量也在增加。有了这些选择,组织就有了广泛的服务选择,可以将数据迁移到云上。然而,维护存储在其中的敏感数据的安全仍然是最重要的责任。本文将讨论保护云存储的一些挑战,并通过回顾相关文献将其置于上下文中。本文将讨论与三个重要安全方面(机密性、完整性和可用性)相关的挑战以及与它们相关的漏洞。研究这些挑战非常重要,因为云存储不仅涉及技术发展,还涉及安全考虑。我们的目标是提供安全挑战的见解及其解决方案,以增强云存储的实施。
{"title":"Security Challenges in Cloud Storages","authors":"F. Yahya, V. Chang, R. Walters, G. Wills","doi":"10.1109/CloudCom.2014.171","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.171","url":null,"abstract":"As cloud becomes the tool of choice for more data storage services, the number of service providers has also increased. With these choices, organisations have a wide selection of services available to move their data to the cloud. However, the responsibility to maintain the security of sensitive data stored therein remains paramount. This paper will discuss some of the challenges of securing a cloud storage and putting it into context by reviewing relevant literature. The challenges associated with the three important security aspects (confidentiality, integrity and availability) are discussed together with the vulnerabilities linked to them. It is important to look into these challenges as cloud storage is not only about technological evolution but involves security considerations. We aim to provide insights of security challenges and its solutions to enhance cloud storage implementation.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Saving the Planet with Bin Packing - Experiences Using 2D and 3D Bin Packing of Virtual Machines for Greener Clouds 用垃圾箱包装拯救地球-使用虚拟机的2D和3D垃圾箱包装实现绿色云的体验
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.155
Thomas Hage, Kyrre M. Begnum, A. Yazidi
Greener cloud computing has recently become an extremely pertinent research topic in academy and among practitioners. Despite the abundance of the state of the art studies that tackle the problem, the vast majority of them solely rely on simulation, and do not report real settings experience. Thus, the theoretical models might overlook some of the practical details that might emerge in real life scenarios. In this paper, we try to bridge the aforementioned gap in the literature by devising and also deploying algorithms for saving power in real-life cloud environments based on variants of the 2D/3D bin packing algorithms. The algorithms are tested on a large Open Stack deployment in use by staff and students at Oslo and Akers us University College, Norway. We present three different adoptions of 2D and 3D bin packing, incorporating different aspects of the cloud as constraints. Our real-life experimental results show that although the three algorithms yield a decrease in power consumption, they distinctly affect the way the cloud has to be managed. A simple bin packing algorithm provides useful mechanism to reduce power consumption while more sophisticated algorithms do not merely achieve power savings but also minimize the number of migrations.
近年来,绿色云计算已成为学术界和实践者中一个非常相关的研究课题。尽管解决这个问题的最先进的研究有很多,但绝大多数研究都仅仅依赖于模拟,而没有报告真实的设置经验。因此,理论模型可能会忽略现实生活场景中可能出现的一些实际细节。在本文中,我们试图通过设计和部署基于2D/3D装箱算法变体的实际云环境中的节能算法来弥合上述文献中的差距。这些算法在挪威奥斯陆和埃克斯乌斯大学学院的工作人员和学生使用的大型开放堆栈部署中进行了测试。我们提出了三种不同的2D和3D装箱方式,结合了云的不同方面作为约束。我们的实际实验结果表明,尽管这三种算法降低了功耗,但它们明显影响了云的管理方式。简单的装箱算法提供了有效的机制来降低功耗,而更复杂的算法不仅可以节省功耗,还可以最大限度地减少迁移次数。
{"title":"Saving the Planet with Bin Packing - Experiences Using 2D and 3D Bin Packing of Virtual Machines for Greener Clouds","authors":"Thomas Hage, Kyrre M. Begnum, A. Yazidi","doi":"10.1109/CloudCom.2014.155","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.155","url":null,"abstract":"Greener cloud computing has recently become an extremely pertinent research topic in academy and among practitioners. Despite the abundance of the state of the art studies that tackle the problem, the vast majority of them solely rely on simulation, and do not report real settings experience. Thus, the theoretical models might overlook some of the practical details that might emerge in real life scenarios. In this paper, we try to bridge the aforementioned gap in the literature by devising and also deploying algorithms for saving power in real-life cloud environments based on variants of the 2D/3D bin packing algorithms. The algorithms are tested on a large Open Stack deployment in use by staff and students at Oslo and Akers us University College, Norway. We present three different adoptions of 2D and 3D bin packing, incorporating different aspects of the cloud as constraints. Our real-life experimental results show that although the three algorithms yield a decrease in power consumption, they distinctly affect the way the cloud has to be managed. A simple bin packing algorithm provides useful mechanism to reduce power consumption while more sophisticated algorithms do not merely achieve power savings but also minimize the number of migrations.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bejo: Behavior Based Job Classification for Resource Consumption Prediction in the Cloud Bejo:基于行为的作业分类,用于云资源消耗预测
Pub Date : 2014-12-15 DOI: 10.1109/CLOUDCOM.2014.48
Lin Xu, Jiannong Cao, Yan Wang, Lei Yang, Jing Li
Resource prediction (e.g. CPU/memory utilization) of cloud computing jobs has attracted substantial amount of attention. Existing works use regression methods based on historical information of jobs, with an impractical assumption that the job to be predicted has the same class as the historical jobs. To address this problem, we propose to take the category of the jobs into consideration for effective resource prediction. Existing works on job classification either ignores the temporal variance of resource consumption during job execution or use it in a naive way, resulting in unsatisfactory classification accuracy and/or slow speed. In this paper, we introduce a new and efficient job classification approach, called Bejo. Inspired by the textual document classification methods, which use distribution of text words to describe and classify a document, Bejo treats the job as a document, assigns each collected resource consumption snapshot to a certain "resource word", and uses the distribution of the words to describe and classify a job. An ℓ1 norm minimization formulation is used to assign each resource snapshot to a resource word, to especially address the unique challenges of high noise and tight time budget of cloud job classification. We collect a comprehensive dataset for job classification and resource consumption prediction on cloud platforms, and demonstrate superior quality and efficiency of Bejo over state-of-the-art algorithms. Experiments also show the relative error of resource consumption prediction can be dramatically reduced by adding an extra job classification step to the existing regression methods.
云计算作业的资源预测(例如CPU/内存利用率)吸引了大量的关注。现有的作品使用基于作业历史信息的回归方法,不切实际地假设待预测的作业与历史作业具有相同的类别。为了解决这个问题,我们建议考虑工作的类别,以便有效地预测资源。现有的作业分类工作或忽略了作业执行过程中资源消耗的时间变化,或使用方法幼稚,导致分类精度不理想,或分类速度慢。在本文中,我们引入了一种新的高效的工作分类方法,称为Bejo。受文本文档分类方法的启发,Bejo将作业视为文档,将每个收集到的资源消耗快照分配给某个“资源词”,并使用单词的分布来描述和分类作业。采用1范数最小化公式将每个资源快照分配给一个资源词,特别解决了云作业分类高噪声和时间预算紧张的独特挑战。我们收集了一个全面的数据集,用于云平台上的作业分类和资源消耗预测,并展示了Bejo优于最先进算法的质量和效率。实验还表明,在现有的回归方法中增加一个额外的作业分类步骤,可以显著降低资源消耗预测的相对误差。
{"title":"Bejo: Behavior Based Job Classification for Resource Consumption Prediction in the Cloud","authors":"Lin Xu, Jiannong Cao, Yan Wang, Lei Yang, Jing Li","doi":"10.1109/CLOUDCOM.2014.48","DOIUrl":"https://doi.org/10.1109/CLOUDCOM.2014.48","url":null,"abstract":"Resource prediction (e.g. CPU/memory utilization) of cloud computing jobs has attracted substantial amount of attention. Existing works use regression methods based on historical information of jobs, with an impractical assumption that the job to be predicted has the same class as the historical jobs. To address this problem, we propose to take the category of the jobs into consideration for effective resource prediction. Existing works on job classification either ignores the temporal variance of resource consumption during job execution or use it in a naive way, resulting in unsatisfactory classification accuracy and/or slow speed. In this paper, we introduce a new and efficient job classification approach, called Bejo. Inspired by the textual document classification methods, which use distribution of text words to describe and classify a document, Bejo treats the job as a document, assigns each collected resource consumption snapshot to a certain \"resource word\", and uses the distribution of the words to describe and classify a job. An ℓ1 norm minimization formulation is used to assign each resource snapshot to a resource word, to especially address the unique challenges of high noise and tight time budget of cloud job classification. We collect a comprehensive dataset for job classification and resource consumption prediction on cloud platforms, and demonstrate superior quality and efficiency of Bejo over state-of-the-art algorithms. Experiments also show the relative error of resource consumption prediction can be dramatically reduced by adding an extra job classification step to the existing regression methods.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Issues of Social Data Analytics with a New Method for Sentiment Analysis of Social Media Data 基于社交媒体数据情感分析新方法的社交数据分析问题
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.40
Zhaoxia Wang, Victor Joo Chuan Tong, David Chan
Social media data consists of feedback, critiques and other comments that are posted online by internet users. Collectively, these comments may reflect sentiments that are sometimes not captured in traditional data collection methods such as administering a survey questionnaire. Thus, social media data offers a rich source of information, which can be adequately analyzed and understood. In this paper, we survey the extant research literature on sentiment analysis and discuss various limitations of the existing analytical methods. A major limitation in the large majority of existing research is the exclusive focus on social media data in the English language. There is a need to plug this research gap by developing effective analytic methods and approaches for sentiment analysis of data in non-English languages. These analyses of non-English language data should be integrated with the analysis of data in English language to better understand sentiments and address people-centric issues, particularly in multilingual societies. In addition, developing a high accuracy method, in which the customization of training datasets is not required, is also a challenge in current sentiment analysis. To address these various limitations and issues in current research, we propose a method that employs a new sentiment analysis scheme. The new scheme enables us to derive dominant valence as well as prominent positive and negative emotions by using an adaptive fuzzy inference method (FIM) with linguistics processors to minimize semantic ambiguity as well as multi-source lexicon integration and development. Our proposed method overcomes the limitations of the existing methods by not only improving the accuracy of the algorithm but also having the capability to perform analysis on non-English languages. Several case studies are included in this paper to illustrate the application and utility of our proposed method.
社交媒体数据包括互联网用户在网上发布的反馈、批评和其他评论。总的来说,这些评论可能反映了传统数据收集方法(如管理调查问卷)有时无法捕捉到的情绪。因此,社交媒体数据提供了丰富的信息来源,可以充分分析和理解。本文对现有的情感分析研究文献进行了综述,并讨论了现有分析方法的各种局限性。绝大多数现有研究的一个主要限制是只关注英语的社交媒体数据。有必要通过开发有效的非英语语言数据情感分析的分析方法和方法来填补这一研究空白。这些对非英语数据的分析应该与英语数据的分析相结合,以更好地理解情绪并解决以人为本的问题,特别是在多语言社会中。此外,开发一种不需要定制训练数据集的高精度方法也是当前情感分析中的一个挑战。为了解决当前研究中的这些限制和问题,我们提出了一种采用新的情感分析方案的方法。该方案利用自适应模糊推理方法(FIM)和语言学处理器,以最大限度地减少语义歧义和多源词汇的整合和发展,使我们能够推导出优势效价以及突出的积极和消极情绪。该方法克服了现有方法的局限性,不仅提高了算法的准确性,而且具有对非英语语言进行分析的能力。本文以几个案例来说明我们所提出的方法的应用和效用。
{"title":"Issues of Social Data Analytics with a New Method for Sentiment Analysis of Social Media Data","authors":"Zhaoxia Wang, Victor Joo Chuan Tong, David Chan","doi":"10.1109/CloudCom.2014.40","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.40","url":null,"abstract":"Social media data consists of feedback, critiques and other comments that are posted online by internet users. Collectively, these comments may reflect sentiments that are sometimes not captured in traditional data collection methods such as administering a survey questionnaire. Thus, social media data offers a rich source of information, which can be adequately analyzed and understood. In this paper, we survey the extant research literature on sentiment analysis and discuss various limitations of the existing analytical methods. A major limitation in the large majority of existing research is the exclusive focus on social media data in the English language. There is a need to plug this research gap by developing effective analytic methods and approaches for sentiment analysis of data in non-English languages. These analyses of non-English language data should be integrated with the analysis of data in English language to better understand sentiments and address people-centric issues, particularly in multilingual societies. In addition, developing a high accuracy method, in which the customization of training datasets is not required, is also a challenge in current sentiment analysis. To address these various limitations and issues in current research, we propose a method that employs a new sentiment analysis scheme. The new scheme enables us to derive dominant valence as well as prominent positive and negative emotions by using an adaptive fuzzy inference method (FIM) with linguistics processors to minimize semantic ambiguity as well as multi-source lexicon integration and development. Our proposed method overcomes the limitations of the existing methods by not only improving the accuracy of the algorithm but also having the capability to perform analysis on non-English languages. Several case studies are included in this paper to illustrate the application and utility of our proposed method.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Local Resource Shaper for MapReduce 本地资源整形器用于MapReduce
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.55
Peng Lu, Young Choon Lee, V. Gramoli, Luke M. Leslie, Albert Y. Zomaya
Resource capacity is often over provisioned to primarily deal with short periods of peak load. Shaping these peaks by shifting them to low utilization periods (valleys) is referred to as "resource consumption shaping". While originally aimed at the data center level, the resource consumption shaping we consider focuses on local resources, like CPU or I/O as we have identified that individual jobs also incur load peaks and valleys on these resources. In this paper, we present Local Resource Shaper (LRS), which limits fairness in resource sharing between co-located MapReduce tasks. LRS enables Hadoop to maximize resource utilization and minimize resource contention independently of job type. Co-located MapReduce tasks are often prone to resource contention (i.e., Load peak) due to similar resource usage patterns particularly with traditional fair resource sharing. In essence, LRS differentiates co-located tasks through active and passive slots that serve as containers for interchangeable map or reduce tasks. LRS lets an active slot consume as much resources as possible, and a passive slot make use of any unused resources. LRS leverages such slot differentiation with its new scheduler, Interleave. Our results show that LRS always outperforms the best static slot configuration with three Hadoop schedulers in terms of both resource utilization and performance.
资源容量通常被过度配置,主要用于处理短时间的峰值负载。通过将这些峰值转移到低利用率时期(低谷)来塑造这些峰值被称为“资源消耗塑造”。虽然最初的目标是数据中心级别,但我们考虑的资源消耗塑造主要关注本地资源,如CPU或I/O,因为我们已经确定单个作业也会在这些资源上产生负载高峰和低谷。在本文中,我们提出了Local Resource Shaper (LRS),它限制了同址MapReduce任务之间资源共享的公平性。LRS使Hadoop能够最大限度地提高资源利用率,并最小化独立于作业类型的资源争用。由于相似的资源使用模式,特别是传统的公平资源共享,共置MapReduce任务经常容易出现资源争用(即负载峰值)。从本质上讲,LRS通过主动槽和被动槽来区分共定位任务,这些槽作为可互换的map或reduce任务的容器。LRS允许活动槽使用尽可能多的资源,而被动槽使用任何未使用的资源。LRS通过其新的调度器Interleave利用了这种槽位差异。我们的结果表明,在资源利用率和性能方面,LRS总是优于具有三个Hadoop调度器的最佳静态槽配置。
{"title":"Local Resource Shaper for MapReduce","authors":"Peng Lu, Young Choon Lee, V. Gramoli, Luke M. Leslie, Albert Y. Zomaya","doi":"10.1109/CloudCom.2014.55","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.55","url":null,"abstract":"Resource capacity is often over provisioned to primarily deal with short periods of peak load. Shaping these peaks by shifting them to low utilization periods (valleys) is referred to as \"resource consumption shaping\". While originally aimed at the data center level, the resource consumption shaping we consider focuses on local resources, like CPU or I/O as we have identified that individual jobs also incur load peaks and valleys on these resources. In this paper, we present Local Resource Shaper (LRS), which limits fairness in resource sharing between co-located MapReduce tasks. LRS enables Hadoop to maximize resource utilization and minimize resource contention independently of job type. Co-located MapReduce tasks are often prone to resource contention (i.e., Load peak) due to similar resource usage patterns particularly with traditional fair resource sharing. In essence, LRS differentiates co-located tasks through active and passive slots that serve as containers for interchangeable map or reduce tasks. LRS lets an active slot consume as much resources as possible, and a passive slot make use of any unused resources. LRS leverages such slot differentiation with its new scheduler, Interleave. Our results show that LRS always outperforms the best static slot configuration with three Hadoop schedulers in terms of both resource utilization and performance.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123330265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Verifying Secure Information Flow in Federated Clouds 验证联邦云中的安全信息流
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.104
W. Zeng, M. Koutny, P. Watson
Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the resulting combination of secure private clouds and less secure public clouds impacts on the security requirements of the system. Therefore, applications need to be located within different clouds, which strongly affects the information flow security of the entire system. In this paper, the entities of a federated cloud system as well as the clouds are assigned security levels of a given security lattice. Then a dynamic flow sensitive security model for a federated cloud system is proposed within which the Bell-La Padula rules and cloud security rule can be captured. As a result, one can track and verify the security information flow in federated clouds. Moreover, an example is used to explain how Petri nets could be used to represent such a system, making it possible to verify secure information flow in federated clouds using the existing Petri net techniques.
联邦云系统提高了可靠性,并降低了组织的计算支持成本。但是,安全的私有云和不安全的公共云的组合会对系统的安全需求产生影响。因此,应用程序需要分布在不同的云中,这将严重影响整个系统的信息流安全。在本文中,在给定的安全格中,为联邦云系统的实体和云分配了安全级别。在此基础上,提出了一个联邦云系统的动态流敏感安全模型,该模型可以捕获Bell-La Padula规则和云安全规则。因此,可以跟踪和验证联邦云中的安全信息流。此外,还使用了一个示例来解释如何使用Petri网来表示这样的系统,从而可以使用现有的Petri网技术验证联邦云中的安全信息流。
{"title":"Verifying Secure Information Flow in Federated Clouds","authors":"W. Zeng, M. Koutny, P. Watson","doi":"10.1109/CloudCom.2014.104","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.104","url":null,"abstract":"Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the resulting combination of secure private clouds and less secure public clouds impacts on the security requirements of the system. Therefore, applications need to be located within different clouds, which strongly affects the information flow security of the entire system. In this paper, the entities of a federated cloud system as well as the clouds are assigned security levels of a given security lattice. Then a dynamic flow sensitive security model for a federated cloud system is proposed within which the Bell-La Padula rules and cloud security rule can be captured. As a result, one can track and verify the security information flow in federated clouds. Moreover, an example is used to explain how Petri nets could be used to represent such a system, making it possible to verify secure information flow in federated clouds using the existing Petri net techniques.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework for Measuring the Impact and Effectiveness of the NEES Cyberinfrastructure for Earthquake Engineering 地震工程中NEES网络基础设施的影响和有效性测量框架
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.59
T. Hacker, Alejandra J. Magana
Many cyber infrastructure and cloud computing systems have been developed and deployed over the past decade. Although use metrics are collected by many of these systems, there is not a clear link from these metrics to the ultimate effectiveness and impact of these systems on science communities. This paper describes a framework we developed that seeks to provide context for use and impact metrics to facilitate understanding of how these systems are used and ultimately adopted by science and engineering communities. We use this framework to present metrics of use, impact, and effectiveness collected from the NEES cyber infrastructure.
许多网络基础设施和云计算系统是在过去十年中开发和部署的。尽管许多这些系统收集了使用指标,但这些指标与这些系统对科学界的最终有效性和影响之间并没有明确的联系。本文描述了我们开发的一个框架,该框架旨在为使用和影响度量提供上下文,以促进对这些系统如何使用并最终被科学和工程社区采用的理解。我们使用这个框架来展示从NEES网络基础设施收集的使用、影响和有效性指标。
{"title":"A Framework for Measuring the Impact and Effectiveness of the NEES Cyberinfrastructure for Earthquake Engineering","authors":"T. Hacker, Alejandra J. Magana","doi":"10.1109/CloudCom.2014.59","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.59","url":null,"abstract":"Many cyber infrastructure and cloud computing systems have been developed and deployed over the past decade. Although use metrics are collected by many of these systems, there is not a clear link from these metrics to the ultimate effectiveness and impact of these systems on science communities. This paper describes a framework we developed that seeks to provide context for use and impact metrics to facilitate understanding of how these systems are used and ultimately adopted by science and engineering communities. We use this framework to present metrics of use, impact, and effectiveness collected from the NEES cyber infrastructure.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1