首页 > 最新文献

2014 IEEE 6th International Conference on Cloud Computing Technology and Science最新文献

英文 中文
FlowK: Information Flow Control for the Cloud FlowK:面向云的信息流控制
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.11
Thomas Pasquier, J. Bacon, D. Eyers
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. Our Cloud Safety Net project aims to show that Information Flow Control (IFC) can augment existing security mechanisms and provide continuous enforcement of extended. Finer-grained application-level security policy in the cloud. We present FlowK, a loadable kernel module for Linux, as part of a proof of concept that IFC can be provided for cloud computing. Following the principle of policy-mechanism separation, IFC policy is assumed to be expressed at application level and FlowK provides mechanisms to enforce IFC policy at runtime. FlowK's design minimises the changes required to existing software when IFC is provided. To show how FlowK can be integrated with cloud software we have designed and evaluated a framework for deploying IFC-aware web applications, suitable for use in a PaaS cloud.
安全问题被广泛视为采用云计算解决方案的一个障碍,尽管已经出现了大量的法律和法规,但执行和证明合规的技术基础仍然落后。我们的云安全网络项目旨在展示信息流控制(IFC)可以增强现有的安全机制,并提供扩展的持续执行。云中的细粒度应用程序级安全策略。我们提出了FlowK,一个Linux的可加载内核模块,作为IFC可以用于云计算的概念证明的一部分。遵循策略-机制分离的原则,假定IFC策略在应用程序级别表示,而FlowK提供了在运行时执行IFC策略的机制。当提供IFC时,FlowK的设计最大限度地减少了对现有软件的更改。为了展示FlowK如何与云软件集成,我们设计并评估了一个框架,用于部署ifc感知的web应用程序,适合在PaaS云中使用。
{"title":"FlowK: Information Flow Control for the Cloud","authors":"Thomas Pasquier, J. Bacon, D. Eyers","doi":"10.1109/CloudCom.2014.11","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.11","url":null,"abstract":"Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. Our Cloud Safety Net project aims to show that Information Flow Control (IFC) can augment existing security mechanisms and provide continuous enforcement of extended. Finer-grained application-level security policy in the cloud. We present FlowK, a loadable kernel module for Linux, as part of a proof of concept that IFC can be provided for cloud computing. Following the principle of policy-mechanism separation, IFC policy is assumed to be expressed at application level and FlowK provides mechanisms to enforce IFC policy at runtime. FlowK's design minimises the changes required to existing software when IFC is provided. To show how FlowK can be integrated with cloud software we have designed and evaluated a framework for deploying IFC-aware web applications, suitable for use in a PaaS cloud.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Monetary-and-QoS Aware Replica Placements in Cloud-Based Storage Systems 基于云的存储系统中的货币和qos感知副本放置
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.109
Lingfang Zeng, Shijie Xu, Yang Wang, Xiang Cui, Tan Wee Kiat, David Bremner, K. Kent
This paper proposes a replication cost model and two greedy algorithms, named GS QoS and GS QoS C1, for replication placements in cloud-based storage systems. The model aims to minimize replication cost with full consideration of quality of user access to storage nodes. Our two algorithms employ a utility measurement to guide placement procedures. Our final experimental results show that 1) GS QoS outperforms GS QoS C1, 2) both algorithms have more economical results than those from existing greedy replica placement algorithm.
针对基于云的存储系统中的复制位置,本文提出了一种复制成本模型和两种贪心算法,分别称为GS QoS和GS QoS C1。该模型在充分考虑用户访问存储节点质量的前提下,以最小化复制成本为目标。我们的两种算法采用效用测量来指导安置程序。最后的实验结果表明:1)GS QoS优于GS QoS C1; 2)两种算法都比现有的贪婪副本放置算法具有更经济的结果。
{"title":"Monetary-and-QoS Aware Replica Placements in Cloud-Based Storage Systems","authors":"Lingfang Zeng, Shijie Xu, Yang Wang, Xiang Cui, Tan Wee Kiat, David Bremner, K. Kent","doi":"10.1109/CloudCom.2014.109","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.109","url":null,"abstract":"This paper proposes a replication cost model and two greedy algorithms, named GS QoS and GS QoS C1, for replication placements in cloud-based storage systems. The model aims to minimize replication cost with full consideration of quality of user access to storage nodes. Our two algorithms employ a utility measurement to guide placement procedures. Our final experimental results show that 1) GS QoS outperforms GS QoS C1, 2) both algorithms have more economical results than those from existing greedy replica placement algorithm.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130317569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anomaly Detection through Enhanced Sentiment Analysis on Social Media Data 基于增强情感分析的社交媒体数据异常检测
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.69
Zhaoxia Wang, Victor Joo Chuan Tong, Xin Xin, H. Chin
Anomaly detection in sentiment analysis refers to detecting abnormal opinions, sentiment patterns or special temporal aspects of such patterns in a collection of data. The anomalies detected may be due to sudden sentiment changes hidden in large amounts of text. If these anomalies are undetected or poorly managed, the consequences may be severe, e.g. A business whose customers reveal negative sentiments and will no longer support the establishment. Social media platforms, such as Twitter, provide a vast source of information, which includes user feedback, opinion and information on most issues. Many organizations also leverage social media platforms to publish information about events, products, services, policies and other topics frequently. Thus, analyzing social media data to identify abnormal events in a timely manner is a beneficial topic. It will enable the businesses and government organizations to intervene early or adopt proper strategies if needed. However, it is also a challenge due to the diversity and size of social media data. In this study, we survey existing anomaly analysis as well as sentiment analysis methods and analyze their limitations and challenges. To tackle the challenges, an enhanced sentiment classification method is proposed and discussed. We study the possibility of employing the proposed method to perform anomaly detection through sentiment analysis on social media data. We tested the applicability and robustness of the method through sentiment analysis on tweet data. The results demonstrate the capabilities of the proposed method and provide meaningful insights into this research area.
情感分析中的异常检测是指在数据集合中发现异常的观点、情感模式或这些模式的特殊时间方面。检测到的异常可能是由于隐藏在大量文本中的突然情绪变化。如果这些异常未被发现或管理不善,后果可能会很严重,例如,一个企业的客户表现出负面情绪,将不再支持该企业。Twitter等社交媒体平台提供了大量的信息来源,其中包括大多数问题的用户反馈、意见和信息。许多组织还经常利用社交媒体平台发布有关事件、产品、服务、政策和其他主题的信息。因此,分析社交媒体数据,及时发现异常事件是一个有益的课题。这将使企业和政府机构能够及早干预,或在必要时采取适当的战略。然而,由于社交媒体数据的多样性和规模,这也是一个挑战。在本研究中,我们回顾了现有的异常分析和情感分析方法,并分析了它们的局限性和挑战。为了解决这一问题,提出并讨论了一种增强的情感分类方法。我们研究了采用该方法通过对社交媒体数据的情感分析进行异常检测的可能性。通过对tweet数据的情感分析,验证了该方法的适用性和鲁棒性。结果证明了所提出的方法的能力,并为该研究领域提供了有意义的见解。
{"title":"Anomaly Detection through Enhanced Sentiment Analysis on Social Media Data","authors":"Zhaoxia Wang, Victor Joo Chuan Tong, Xin Xin, H. Chin","doi":"10.1109/CloudCom.2014.69","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.69","url":null,"abstract":"Anomaly detection in sentiment analysis refers to detecting abnormal opinions, sentiment patterns or special temporal aspects of such patterns in a collection of data. The anomalies detected may be due to sudden sentiment changes hidden in large amounts of text. If these anomalies are undetected or poorly managed, the consequences may be severe, e.g. A business whose customers reveal negative sentiments and will no longer support the establishment. Social media platforms, such as Twitter, provide a vast source of information, which includes user feedback, opinion and information on most issues. Many organizations also leverage social media platforms to publish information about events, products, services, policies and other topics frequently. Thus, analyzing social media data to identify abnormal events in a timely manner is a beneficial topic. It will enable the businesses and government organizations to intervene early or adopt proper strategies if needed. However, it is also a challenge due to the diversity and size of social media data. In this study, we survey existing anomaly analysis as well as sentiment analysis methods and analyze their limitations and challenges. To tackle the challenges, an enhanced sentiment classification method is proposed and discussed. We study the possibility of employing the proposed method to perform anomaly detection through sentiment analysis on social media data. We tested the applicability and robustness of the method through sentiment analysis on tweet data. The results demonstrate the capabilities of the proposed method and provide meaningful insights into this research area.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116993690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Application-Oriented Bandwidth and Latency Aware Routing with Open Flow Network 开放流网络中面向应用的带宽和延迟感知路由
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.90
Pongsakorn U-chupala, Koheix Ichikawa, Hajimu Iida, Nawawit Kessaraphong, P. Uthayopas, S. Date, H. Abe, Hiroaki Yamanaka, Eiji Kawai
Bandwidth and latency are two major factors that contribute the most to network application performance. Between each pair of switches in a network, there may be multiple paths connecting them. Each path has different properties because of multiple factors. Traditional shortest-path routing does not take this knowledge into consideration and may result in sub-optimal performance of applications and underutilization of network. We proposed a concept of "bandwidth and latency aware routing". The idea is that we could improve overall performance of the network by separating application into bandwidth-oriented and latency-oriented application and allocate different route for each type of application accordingly. We also proposed a design of this network system implemented using Open Flow. Routes are calculated from monitored information using Dijkstra algorithm and its variation. To support our design, we show a use case in which our design performs better than traditional routing as well as evaluation results.
带宽和延迟是影响网络应用程序性能的两个主要因素。在网络中,每对交换机之间可能有多条路径连接。由于多种因素,每个路径具有不同的属性。传统的最短路径路由没有考虑到这一点,可能会导致应用程序性能不理想和网络利用率不足。我们提出了“带宽和延迟感知路由”的概念。我们的想法是,我们可以通过将应用程序分为面向带宽和面向延迟的应用程序,并相应地为每种类型的应用程序分配不同的路由来提高网络的整体性能。我们还提出了一个使用Open Flow实现的网络系统的设计方案。利用Dijkstra算法及其变化量从监测信息中计算出路由。为了支持我们的设计,我们展示了一个用例,在这个用例中,我们的设计比传统的路由和评估结果执行得更好。
{"title":"Application-Oriented Bandwidth and Latency Aware Routing with Open Flow Network","authors":"Pongsakorn U-chupala, Koheix Ichikawa, Hajimu Iida, Nawawit Kessaraphong, P. Uthayopas, S. Date, H. Abe, Hiroaki Yamanaka, Eiji Kawai","doi":"10.1109/CloudCom.2014.90","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.90","url":null,"abstract":"Bandwidth and latency are two major factors that contribute the most to network application performance. Between each pair of switches in a network, there may be multiple paths connecting them. Each path has different properties because of multiple factors. Traditional shortest-path routing does not take this knowledge into consideration and may result in sub-optimal performance of applications and underutilization of network. We proposed a concept of \"bandwidth and latency aware routing\". The idea is that we could improve overall performance of the network by separating application into bandwidth-oriented and latency-oriented application and allocate different route for each type of application accordingly. We also proposed a design of this network system implemented using Open Flow. Routes are calculated from monitored information using Dijkstra algorithm and its variation. To support our design, we show a use case in which our design performs better than traditional routing as well as evaluation results.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluating Impact of Live Migration on Data Center Energy Saving 热迁移对数据中心节能的影响评估
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.42
Soramichi Akiyama, Takahiro Hirofuchi, S. Honiden
Energy efficiency of cloud data centers is of great concern today and has been tackled by many researchers. Dynamic VM placement is a well-known strategy to improve energy efficiency of a data center. Virtual machines (VMs) under light load are consolidated into a small number of physical machines (PMs) to turn idle PMs into low-power states. Although live migration is essential for dynamic VM placement, former studies have not yet revealed how energy overhead of live migration has impact on energy efficiency of dynamic VM placement. To tackle this problem, we conducted integrated simulation of energy overhead of live migration and dynamic VM placement sing Sim Grid. We used three dynamic VM placement policies and two live migration mechanisms (existing pre-copy and an accelerated mechanism invented by us) to thoroughly evaluate the energy overhead. The results showed that in the worst case energy overhead of live migration occupies 5.8% of total energy consumption of a data center.
云数据中心的能源效率是当今备受关注的问题,已经被许多研究者所解决。动态VM放置是一种众所周知的提高数据中心能源效率的策略。将轻负载下的虚拟机合并为少量物理机,使空闲的物理机进入低功耗状态。尽管动态迁移对于动态VM放置至关重要,但以前的研究尚未揭示动态迁移的能源开销如何影响动态VM放置的能源效率。为了解决这一问题,我们在Sim Grid中对动态迁移和动态VM放置的能量开销进行了综合仿真。我们使用三种动态VM放置策略和两种实时迁移机制(现有的预复制和我们发明的加速机制)来彻底评估能源开销。结果表明,在最坏的情况下,实时迁移的能源开销占数据中心总能耗的5.8%。
{"title":"Evaluating Impact of Live Migration on Data Center Energy Saving","authors":"Soramichi Akiyama, Takahiro Hirofuchi, S. Honiden","doi":"10.1109/CloudCom.2014.42","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.42","url":null,"abstract":"Energy efficiency of cloud data centers is of great concern today and has been tackled by many researchers. Dynamic VM placement is a well-known strategy to improve energy efficiency of a data center. Virtual machines (VMs) under light load are consolidated into a small number of physical machines (PMs) to turn idle PMs into low-power states. Although live migration is essential for dynamic VM placement, former studies have not yet revealed how energy overhead of live migration has impact on energy efficiency of dynamic VM placement. To tackle this problem, we conducted integrated simulation of energy overhead of live migration and dynamic VM placement sing Sim Grid. We used three dynamic VM placement policies and two live migration mechanisms (existing pre-copy and an accelerated mechanism invented by us) to thoroughly evaluate the energy overhead. The results showed that in the worst case energy overhead of live migration occupies 5.8% of total energy consumption of a data center.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hierarchical Density-Based Clustering Using Level-Sets 使用水平集的分层密度聚类
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.126
F. Indaco, Teng-Sheng Moh
This paper introduces the concept of graphing the size of a level-set against its respective density threshold. This is used to develop a new recursive version of DBSCAN that successfully performs hierarchical clustering, called Level-Set Clustering (LSC).
本文介绍了相对于其各自的密度阈值绘制水平集的大小的概念。这用于开发DBSCAN的新递归版本,该版本成功地执行分层聚类,称为水平集聚类(Level-Set clustering, LSC)。
{"title":"Hierarchical Density-Based Clustering Using Level-Sets","authors":"F. Indaco, Teng-Sheng Moh","doi":"10.1109/CloudCom.2014.126","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.126","url":null,"abstract":"This paper introduces the concept of graphing the size of a level-set against its respective density threshold. This is used to develop a new recursive version of DBSCAN that successfully performs hierarchical clustering, called Level-Set Clustering (LSC).","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-Aware Partial Compression for Big Textual Data Analysis Acceleration 面向大文本数据分析加速的内容感知部分压缩
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.76
Dapeng Dong, J. Herbert
Analysing text-based data has become increasingly important due to the importance of text from sources such as social media, web contents, web searches. The growing volume of such data creates challenges for data analysis including efficient and scalable algorithm, effective computing platforms and energy efficiency. Compression is a standard method for reducing data size but current standard compression algorithms are destructive to the organisation of data contents. This work introduces Content-aware, Partial Compression (CaPC) for text using a dictionary-based approach. We simply use shorter codes to replace strings while maintaining the original data format and structure, so that the compressed contents can be directly consumed by analytic platforms. We evaluate our approach with a set of real-world datasets and several classical MapReduce jobs on Hadoop. We also provide a supplementary utility library for Hadoop, hence, existing MapReduce programs can be used directly on the compressed datasets with little or no modification. In evaluation, we demonstrate that CaPC works well with a wide variety of data analysis scenarios, experimental results show ~30% average data size reduction, and up to ~32% performance increase on some I/O intensive jobs on an in-house Hadoop cluster. While the gains may seem modest, the point is that these gains are 'for free' and act as supplementary to all other optimizations.
由于来自社交媒体、网络内容、网络搜索等来源的文本的重要性,分析基于文本的数据变得越来越重要。这些数据量的增长为数据分析带来了挑战,包括高效和可扩展的算法、有效的计算平台和能源效率。压缩是减少数据大小的标准方法,但目前的标准压缩算法对数据内容的组织具有破坏性。这项工作介绍了使用基于字典的方法对文本进行内容感知的部分压缩(CaPC)。我们在保持原始数据格式和结构的同时,简单地使用更短的代码来替换字符串,这样压缩后的内容就可以直接被分析平台使用。我们用一组真实世界的数据集和Hadoop上的几个经典MapReduce作业来评估我们的方法。我们还为Hadoop提供了一个补充的实用程序库,因此,现有的MapReduce程序可以直接在压缩的数据集上使用,几乎不需要修改。在评估中,我们证明了CaPC在各种数据分析场景下都能很好地工作,实验结果表明,在内部Hadoop集群上,平均数据大小减少了30%,在一些I/O密集型任务上,性能提高了32%。虽然收益可能看起来不大,但关键是这些收益是“免费的”,并且可以作为所有其他优化的补充。
{"title":"Content-Aware Partial Compression for Big Textual Data Analysis Acceleration","authors":"Dapeng Dong, J. Herbert","doi":"10.1109/CloudCom.2014.76","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.76","url":null,"abstract":"Analysing text-based data has become increasingly important due to the importance of text from sources such as social media, web contents, web searches. The growing volume of such data creates challenges for data analysis including efficient and scalable algorithm, effective computing platforms and energy efficiency. Compression is a standard method for reducing data size but current standard compression algorithms are destructive to the organisation of data contents. This work introduces Content-aware, Partial Compression (CaPC) for text using a dictionary-based approach. We simply use shorter codes to replace strings while maintaining the original data format and structure, so that the compressed contents can be directly consumed by analytic platforms. We evaluate our approach with a set of real-world datasets and several classical MapReduce jobs on Hadoop. We also provide a supplementary utility library for Hadoop, hence, existing MapReduce programs can be used directly on the compressed datasets with little or no modification. In evaluation, we demonstrate that CaPC works well with a wide variety of data analysis scenarios, experimental results show ~30% average data size reduction, and up to ~32% performance increase on some I/O intensive jobs on an in-house Hadoop cluster. While the gains may seem modest, the point is that these gains are 'for free' and act as supplementary to all other optimizations.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"os-14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reflecting on Whether Checklists Can Tick the Box for Cloud Security 关于清单是否能够为云安全打勾的思考
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.165
B. Duncan, M. Whittington
All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.
所有云计算标准都依赖于清单方法来实现,然后审计公司或操作是否符合已设置的标准。对其他学术领域检查表使用情况的调查表明,检查表解决方案在实施和审计方面都存在重大缺陷,这些缺陷只会随着云的快速变化和发展而加剧。我们检查了使用清单所固有的问题,并试图确定一些可能采用的缓解策略,以提高其有效性。
{"title":"Reflecting on Whether Checklists Can Tick the Box for Cloud Security","authors":"B. Duncan, M. Whittington","doi":"10.1109/CloudCom.2014.165","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.165","url":null,"abstract":"All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the fast-changing and developing nature of clouds. We examine the problems that are inherent with using checklists and seek to identify some mitigating strategies that might be adopted to improve their efficacy.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Modeling and Understanding TCP's Fairness Problem in Data Center Networks 数据中心网络中TCP公平性问题的建模与理解
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.153
Shuli Zhang, Yan Zhang, Yifang Qin, Yanni Han, S. Ci
Due to the special topologies and communication pattern, in today's data center networks it is common that a large set of TCP flows and a small set of TCP flows get into different ingress ports of a switch and compete for a same egress port. However, in this case the throughput share of flows in the two sets will not be fair even though all flows have the same RTT. In this paper, we study this problem and find that TCP's fairness in data center networks is related with not only the network capacity but also the number of flows in the two sets. We propose a mathematical model of the average throughput ratio of the large set of flows to the small set of flows. This model can reveal the variation of TCP's fairness along with the change of network parameters (including buffer size, bandwidth, and propagation delay) as well as the number of flows in the two sets. We validate our model by comparing its numerical results with simulation results, finding that they match well.
由于特殊的拓扑结构和通信模式,在当今的数据中心网络中,经常会出现大组TCP流和小组TCP流进入交换机的不同入口端口并争夺同一出口端口的情况。然而,在这种情况下,即使所有流具有相同的RTT,两个集合中的流的吞吐量份额也不会公平。本文对这一问题进行了研究,发现数据中心网络中TCP的公平性不仅与网络容量有关,还与两个集合中的流数有关。我们提出了大流量与小流量的平均吞吐量比的数学模型。该模型可以揭示TCP公平性随网络参数(包括缓冲区大小、带宽和传播延迟)的变化以及两组流的数量的变化。通过数值结果与仿真结果的比较,验证了模型的正确性。
{"title":"Modeling and Understanding TCP's Fairness Problem in Data Center Networks","authors":"Shuli Zhang, Yan Zhang, Yifang Qin, Yanni Han, S. Ci","doi":"10.1109/CloudCom.2014.153","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.153","url":null,"abstract":"Due to the special topologies and communication pattern, in today's data center networks it is common that a large set of TCP flows and a small set of TCP flows get into different ingress ports of a switch and compete for a same egress port. However, in this case the throughput share of flows in the two sets will not be fair even though all flows have the same RTT. In this paper, we study this problem and find that TCP's fairness in data center networks is related with not only the network capacity but also the number of flows in the two sets. We propose a mathematical model of the average throughput ratio of the large set of flows to the small set of flows. This model can reveal the variation of TCP's fairness along with the change of network parameters (including buffer size, bandwidth, and propagation delay) as well as the number of flows in the two sets. We validate our model by comparing its numerical results with simulation results, finding that they match well.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques 使用分布式机器学习技术的传感器数据预测分析
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.44
Girma Kejela, R. Esteves, Chunming Rong
This work is based on a real-life data-set collected from sensors that monitor drilling processes and equipment in an oil and gas company. The sensor data stream-in at an interval of one second, which is equivalent to 86400 rows of data per day. After studying state-of-the-art Big Data analytics tools including Mahout, RHadoop and Spark, we chose Ox data's H2O for this particular problem because of its fast in-memory processing, strong machine learning engine, and ease of use. Accurate predictive analytics of big sensor data can be used to estimate missed values, or to replace incorrect readings due malfunctioning sensors or broken communication channel. It can also be used to anticipate situations that help in various decision makings, including maintenance planning and operation.
这项工作基于从监测石油和天然气公司钻井过程和设备的传感器收集的真实数据集。传感器数据以一秒的间隔流入,相当于每天86400行数据。在研究了包括Mahout、rha和Spark在内的最先进的大数据分析工具后,我们选择了Ox Data的H2O来解决这个特殊的问题,因为它具有快速的内存处理、强大的机器学习引擎和易用性。大传感器数据的准确预测分析可用于估计缺失值,或替换由于传感器故障或通信通道中断而导致的错误读数。它还可以用于预测有助于各种决策制定的情况,包括维护计划和操作。
{"title":"Predictive Analytics of Sensor Data Using Distributed Machine Learning Techniques","authors":"Girma Kejela, R. Esteves, Chunming Rong","doi":"10.1109/CloudCom.2014.44","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.44","url":null,"abstract":"This work is based on a real-life data-set collected from sensors that monitor drilling processes and equipment in an oil and gas company. The sensor data stream-in at an interval of one second, which is equivalent to 86400 rows of data per day. After studying state-of-the-art Big Data analytics tools including Mahout, RHadoop and Spark, we chose Ox data's H2O for this particular problem because of its fast in-memory processing, strong machine learning engine, and ease of use. Accurate predictive analytics of big sensor data can be used to estimate missed values, or to replace incorrect readings due malfunctioning sensors or broken communication channel. It can also be used to anticipate situations that help in various decision makings, including maintenance planning and operation.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1