首页 > 最新文献

2014 IEEE 6th International Conference on Cloud Computing Technology and Science最新文献

英文 中文
Performance Study of Spindle, A Web Analytics Query Engine Implemented in Spark 基于Spark实现的Web分析查询引擎Spindle的性能研究
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.111
Brandon Amos, David Tompkins
This paper shares our experiences building and benchmarking Spindle as an open source Spark-based web analytics platform. Spindle's design has been motivated by real-world queries and data requiring concurrent, low latency query execution. We identify a search space of Spark tuning options and study their impact on Spark's performance. Results from a self-hosted six node cluster with one week of analytics data (13.1GB) indicate tuning options such as proper partitioning can cause a 5x performance improvement.
本文将分享我们构建和测试Spindle作为一个基于spark的开源web分析平台的经验。Spindle的设计是由现实世界的查询和需要并发、低延迟查询执行的数据驱动的。我们确定了Spark调优选项的搜索空间,并研究了它们对Spark性能的影响。一个带有一周分析数据(13.1GB)的自托管六节点集群的结果表明,适当分区等调优选项可以使性能提高5倍。
{"title":"Performance Study of Spindle, A Web Analytics Query Engine Implemented in Spark","authors":"Brandon Amos, David Tompkins","doi":"10.1109/CloudCom.2014.111","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.111","url":null,"abstract":"This paper shares our experiences building and benchmarking Spindle as an open source Spark-based web analytics platform. Spindle's design has been motivated by real-world queries and data requiring concurrent, low latency query execution. We identify a search space of Spark tuning options and study their impact on Spark's performance. Results from a self-hosted six node cluster with one week of analytics data (13.1GB) indicate tuning options such as proper partitioning can cause a 5x performance improvement.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The CACTOS Vision of Context-Aware Cloud Topology Optimization and Simulation 上下文感知云拓扑优化与仿真的CACTOS远景
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.62
Per-Olov Östberg, Henning Groenda, S. Wesner, James Byrne, Dimitrios S. Nikolopoulos, Craig Sheridan, Jakub Krzywda, A. Ali-Eldin, Johan Tordsson, E. Elmroth, Christian Stier, K. Krogmann, Jörg Domaschka, Christopher B. Hauser, P. J. Byrne, Sergej Svorobej, B. McCollum, Zafeirios C. Papazachos, D. Whigham, S. Ruth, Dragana Paurevic
Recent advances in hardware development coupled with the rapid adoption and broad applicability of cloud computing have introduced widespread heterogeneity in data centers, significantly complicating the management of cloud applications and data center resources. This paper presents the CACTOS approach to cloud infrastructure automation and optimization, which addresses heterogeneity through a combination of in-depth analysis of application behavior with insights from commercial cloud providers. The aim of the approach is threefold: to model applications and data center resources, to simulate applications and resources for planning and operation, and to optimize application deployment and resource use in an autonomic manner. The approach is based on case studies from the areas of business analytics, enterprise applications, and scientific computing.
硬件开发的最新进展,加上云计算的迅速采用和广泛适用性,在数据中心中引入了广泛的异构性,使云应用程序和数据中心资源的管理大大复杂化。本文介绍了CACTOS实现云基础设施自动化和优化的方法,该方法通过对应用程序行为的深入分析与商业云提供商的见解相结合来解决异构问题。该方法的目的有三个:为应用程序和数据中心资源建模,为规划和操作模拟应用程序和资源,并以自主的方式优化应用程序部署和资源使用。该方法基于来自业务分析、企业应用程序和科学计算领域的案例研究。
{"title":"The CACTOS Vision of Context-Aware Cloud Topology Optimization and Simulation","authors":"Per-Olov Östberg, Henning Groenda, S. Wesner, James Byrne, Dimitrios S. Nikolopoulos, Craig Sheridan, Jakub Krzywda, A. Ali-Eldin, Johan Tordsson, E. Elmroth, Christian Stier, K. Krogmann, Jörg Domaschka, Christopher B. Hauser, P. J. Byrne, Sergej Svorobej, B. McCollum, Zafeirios C. Papazachos, D. Whigham, S. Ruth, Dragana Paurevic","doi":"10.1109/CloudCom.2014.62","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.62","url":null,"abstract":"Recent advances in hardware development coupled with the rapid adoption and broad applicability of cloud computing have introduced widespread heterogeneity in data centers, significantly complicating the management of cloud applications and data center resources. This paper presents the CACTOS approach to cloud infrastructure automation and optimization, which addresses heterogeneity through a combination of in-depth analysis of application behavior with insights from commercial cloud providers. The aim of the approach is threefold: to model applications and data center resources, to simulate applications and resources for planning and operation, and to optimize application deployment and resource use in an autonomic manner. The approach is based on case studies from the areas of business analytics, enterprise applications, and scientific computing.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Artificial Immune System Inspired Algorithm for Flow-Based Internet Traffic Classification 基于人工免疫系统的互联网流量分类算法
Pub Date : 2014-12-15 DOI: 10.1109/CLOUDCOM.2014.108
Brian Schmidt, D. Kountanis, Ala Al-Fuqaha
Internet traffic classification has been researched extensively in the last 10 years, with a few different algorithms applied to it. Internet traffic classification has also become more relevant because of its potential applications in the business world. Having information about network traffic has many benefits in network design, security, management, and accounting. The classification of network traffic is most easily achieved by Machine Learning algorithms, which can automatically build a model from training data, without much input from humans. Artificial Immune System classification algorithms have been used previously to classify network connections in network security systems [1]. They have proven to be very versatile, as well as having low sensitivity to input parameters. Because of this we are encouraged to explore the value of AIS algorithms to the Internet traffic classification problem. In this research, we propose an AIS-inspired algorithm for flow-based traffic classification, where each network flow is classified into an application class. We measure the algorithm's performance with and without the use of kernel functions, using a publicly available data set. We also compare the algorithm's performance with SVM and Naive Bayes classifiers. The algorithm generalizes well and gives high accuracy even with a small training set when compared to other algorithms, although the training and classification times were higher. The algorithm is also insensitive to the use of kernels, which makes it attractive for embedded and IoT applications.
在过去的十年里,人们对互联网流量分类进行了广泛的研究,并应用了几种不同的算法。由于其在商业世界中的潜在应用,互联网流量分类也变得更加相关。拥有有关网络流量的信息在网络设计、安全、管理和会计方面有许多好处。网络流量的分类最容易通过机器学习算法实现,机器学习算法可以从训练数据自动构建模型,而无需人工输入太多。人工免疫系统分类算法已被用于网络安全系统中的网络连接分类[1]。它们已被证明是非常通用的,以及对输入参数的低灵敏度。正因为如此,我们被鼓励去探索AIS算法对互联网流量分类问题的价值。在这项研究中,我们提出了一种受ai启发的基于流的流量分类算法,其中每个网络流被分类到一个应用类中。我们使用公开可用的数据集,在使用和不使用核函数的情况下测量算法的性能。我们还比较了该算法与支持向量机和朴素贝叶斯分类器的性能。尽管训练时间和分类时间较高,但与其他算法相比,该算法泛化良好,即使训练集较小,也能给出较高的准确率。该算法对内核的使用也不敏感,这使得它对嵌入式和物联网应用具有吸引力。
{"title":"Artificial Immune System Inspired Algorithm for Flow-Based Internet Traffic Classification","authors":"Brian Schmidt, D. Kountanis, Ala Al-Fuqaha","doi":"10.1109/CLOUDCOM.2014.108","DOIUrl":"https://doi.org/10.1109/CLOUDCOM.2014.108","url":null,"abstract":"Internet traffic classification has been researched extensively in the last 10 years, with a few different algorithms applied to it. Internet traffic classification has also become more relevant because of its potential applications in the business world. Having information about network traffic has many benefits in network design, security, management, and accounting. The classification of network traffic is most easily achieved by Machine Learning algorithms, which can automatically build a model from training data, without much input from humans. Artificial Immune System classification algorithms have been used previously to classify network connections in network security systems [1]. They have proven to be very versatile, as well as having low sensitivity to input parameters. Because of this we are encouraged to explore the value of AIS algorithms to the Internet traffic classification problem. In this research, we propose an AIS-inspired algorithm for flow-based traffic classification, where each network flow is classified into an application class. We measure the algorithm's performance with and without the use of kernel functions, using a publicly available data set. We also compare the algorithm's performance with SVM and Naive Bayes classifiers. The algorithm generalizes well and gives high accuracy even with a small training set when compared to other algorithms, although the training and classification times were higher. The algorithm is also insensitive to the use of kernels, which makes it attractive for embedded and IoT applications.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multi-tenant Services Monitoring for Accountability in Cloud Computing 云计算中的多租户服务责任监控
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.152
Fatma Masmoudi, M. Loulou, A. Kacem
Software as a Service (SaaS) is a delivery model in which software resources are accessed remotely by users. Multi-tenancy is one of key properties of SaaS to achieve higher profit margin by leveraging the economies of scale. This feature empowered by virtualization comes several new complexities introduced related to the area of accountability. For this purpose, we tackle the problem of integrating multi-tenancy in cloud services accountability and determine crucial issues that can be solved. To do this, we propose a multitenant services monitoring approach that keeps monitoring service execution at runtime and detecting privacy violations. This approach is based on multitenant accountability patterns for integrating multi-tenancy architecture and expressing rules that are enforced using AOP. Furthermore, we propose a middleware layer for implementing our approach into conventional cloud architecture. The performed evaluation proves the flexibility and the efficiency of our approach for services based applications in the cloud computing.
软件即服务(SaaS)是一种交付模型,在这种模型中,用户可以远程访问软件资源。多租户是SaaS通过利用规模经济实现更高利润率的关键属性之一。虚拟化赋予的这一特性带来了与问责制领域相关的几个新的复杂性。为此,我们将解决在云服务问责制中集成多租户的问题,并确定可以解决的关键问题。为此,我们提出了一种多租户服务监视方法,该方法在运行时监视服务执行并检测隐私侵犯。这种方法基于多租户责任模式,用于集成多租户体系结构和表达使用AOP强制执行的规则。此外,我们提出了一个中间件层,用于将我们的方法实现到传统的云架构中。所执行的评估证明了我们的方法对于云计算中基于服务的应用程序的灵活性和效率。
{"title":"Multi-tenant Services Monitoring for Accountability in Cloud Computing","authors":"Fatma Masmoudi, M. Loulou, A. Kacem","doi":"10.1109/CloudCom.2014.152","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.152","url":null,"abstract":"Software as a Service (SaaS) is a delivery model in which software resources are accessed remotely by users. Multi-tenancy is one of key properties of SaaS to achieve higher profit margin by leveraging the economies of scale. This feature empowered by virtualization comes several new complexities introduced related to the area of accountability. For this purpose, we tackle the problem of integrating multi-tenancy in cloud services accountability and determine crucial issues that can be solved. To do this, we propose a multitenant services monitoring approach that keeps monitoring service execution at runtime and detecting privacy violations. This approach is based on multitenant accountability patterns for integrating multi-tenancy architecture and expressing rules that are enforced using AOP. Furthermore, we propose a middleware layer for implementing our approach into conventional cloud architecture. The performed evaluation proves the flexibility and the efficiency of our approach for services based applications in the cloud computing.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
When to Schedule an Application? An Energy-Aware Decision 何时安排申请?有能源意识的决定
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.41
Ansuman Dash, A. Banerjee
Making mobile applications energy efficient immensely builds user satisfaction. Apart from the fact that there are not many efficient techniques for evaluating energy consumption for applications on mobile devices, the methods used are static in nature. Static techniques assume that during the running of an application, no other process can run concurrently, and the concerned application has the entire CPU at its disposal. In this paper, we propose a novel idea of measuring the energy consumption of an application running on a mobile device considering the fact that not always the entire CPU is available. This is because the application may sometimes run in the foreground when the mobile is idle and therefore, use the maximum CPU available, at other times, there maybe other tasks being run (apart from the routine background tasks) by the user for which this application is forced to run in the background. The major highlight of this paper is in considering the concept of variable CPU availability in energy analysis. We have also suggested to model the energy consumption problem of a mobile phone as a finite state automaton, where our aim is to find if a state can be reached where the entire battery of the mobile phone is exhausted.
使移动应用节能极大地构建用户满意度。除了没有很多有效的技术来评估移动设备上的应用程序的能耗这一事实外,所使用的方法本质上是静态的。静态技术假设在应用程序运行期间,没有其他进程可以并发运行,并且相关应用程序拥有整个CPU。在本文中,我们提出了一个测量在移动设备上运行的应用程序的能耗的新想法,考虑到并非总是整个CPU可用。这是因为当手机空闲时,应用程序有时会在前台运行,因此,使用最大可用的CPU,在其他时候,可能有其他任务正在运行(除了常规的后台任务),用户可能会强制该应用程序在后台运行。本文的主要亮点是在能量分析中考虑了可变CPU可用性的概念。我们还建议将手机的能源消耗问题建模为有限状态自动机,我们的目标是找出是否可以达到手机的整个电池耗尽的状态。
{"title":"When to Schedule an Application? An Energy-Aware Decision","authors":"Ansuman Dash, A. Banerjee","doi":"10.1109/CloudCom.2014.41","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.41","url":null,"abstract":"Making mobile applications energy efficient immensely builds user satisfaction. Apart from the fact that there are not many efficient techniques for evaluating energy consumption for applications on mobile devices, the methods used are static in nature. Static techniques assume that during the running of an application, no other process can run concurrently, and the concerned application has the entire CPU at its disposal. In this paper, we propose a novel idea of measuring the energy consumption of an application running on a mobile device considering the fact that not always the entire CPU is available. This is because the application may sometimes run in the foreground when the mobile is idle and therefore, use the maximum CPU available, at other times, there maybe other tasks being run (apart from the routine background tasks) by the user for which this application is forced to run in the background. The major highlight of this paper is in considering the concept of variable CPU availability in energy analysis. We have also suggested to model the energy consumption problem of a mobile phone as a finite state automaton, where our aim is to find if a state can be reached where the entire battery of the mobile phone is exhausted.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power-Efficient and Predictable Data Centers with Sliding Scheduled Tenant Requests 具有滑动计划租户请求的高能效和可预测数据中心
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.117
Aissan Dalvandi, G. Mohan, K. Chua
Power efficiency and predictable performance have become major concerns for cloud service providers as they significantly affect cloud adoption and tenancy cost. Providing guaranteed resources for predictable performance in data centers drives the need for a request model which abstracts the traffic characteristics as well as the resource requirements of tenant applications. In this paper, we propose a novel Sliding Scheduled Tenant (SST) request model which enables tenants to request their resources for an estimated required time duration which can slide within a certain time-window. We investigate the power-efficient resource-guaranteed Virtual Machine (VM) -placement and routing problem for dynamically arriving SST requests. The problem requires provisioning of the specified resources in a data center for the required duration of requests by choosing an appropriate start- and end-time within their specified time-window, so as to maximize the number of accepted requests while consuming as low power as possible. We develop a mixed integer linear programming (MILP) optimization problem formulation based on the multi-component utilization-based power model. Since this problem which is a combination of VMplacement, scheduling and routing problems, is computationally rohibitive, we develop a fast and scalable heuristic algorithm. We demonstrate the effectiveness of the proposed algorithm and SST request model in terms of power saving and acceptance ratio through comprehensive simulation results.
电源效率和可预测性能已成为云服务提供商的主要关注点,因为它们显著影响云采用和租赁成本。为数据中心中的可预测性能提供有保证的资源,需要一个请求模型,该模型抽象了流量特征以及租户应用程序的资源需求。在本文中,我们提出了一种新颖的滑动计划租户(SST)请求模型,该模型使租户能够在估计的所需时间内请求资源,该时间可以在特定的时间窗口内滑动。我们研究了动态到达的SST请求的节能资源保证虚拟机(VM)的放置和路由问题。该问题要求在指定的时间窗口内选择适当的开始时间和结束时间,为所需的请求持续时间在数据中心中提供指定的资源,以便在消耗尽可能低的功耗的同时最大限度地增加接受的请求数量。提出了一种基于多分量利用率功率模型的混合整数线性规划(MILP)优化问题公式。由于这个问题是VMplacement,调度和路由问题的组合,在计算上是难以实现的,因此我们开发了一个快速且可扩展的启发式算法。通过综合仿真结果验证了该算法和SST请求模型在节能和接受率方面的有效性。
{"title":"Power-Efficient and Predictable Data Centers with Sliding Scheduled Tenant Requests","authors":"Aissan Dalvandi, G. Mohan, K. Chua","doi":"10.1109/CloudCom.2014.117","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.117","url":null,"abstract":"Power efficiency and predictable performance have become major concerns for cloud service providers as they significantly affect cloud adoption and tenancy cost. Providing guaranteed resources for predictable performance in data centers drives the need for a request model which abstracts the traffic characteristics as well as the resource requirements of tenant applications. In this paper, we propose a novel Sliding Scheduled Tenant (SST) request model which enables tenants to request their resources for an estimated required time duration which can slide within a certain time-window. We investigate the power-efficient resource-guaranteed Virtual Machine (VM) -placement and routing problem for dynamically arriving SST requests. The problem requires provisioning of the specified resources in a data center for the required duration of requests by choosing an appropriate start- and end-time within their specified time-window, so as to maximize the number of accepted requests while consuming as low power as possible. We develop a mixed integer linear programming (MILP) optimization problem formulation based on the multi-component utilization-based power model. Since this problem which is a combination of VMplacement, scheduling and routing problems, is computationally rohibitive, we develop a fast and scalable heuristic algorithm. We demonstrate the effectiveness of the proposed algorithm and SST request model in terms of power saving and acceptance ratio through comprehensive simulation results.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131495227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cooperative Scheduling of Bag-of-Tasks Workflows on Hybrid Clouds 混合云上任务袋工作流的协同调度
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.58
Rubing Duan, R. Prodan
We address the problem of scheduling a class of large-scale applications inspired from real-world on hybrid Clouds, characterized by a large number of homogeneous and concurrent tasks that are the main sources of bottlenecks but open great potential for optimization. We formulate the scheduling problem as a new sequential cooperative game and propose a communication- and storage-aware multi-objective algorithm that optimizes two user objectives (execution time and economic cost) while fulfilling two constraints (network bandwidth and storage requirements). We present comprehensive experiments using both simulation and real-world applications that demonstrate the efficiency and effectiveness of our approach in terms of algorithm complexity, make span, cost, system-level efficiency, fairness, and other aspects compared with other related algorithms.
我们解决了在混合云上调度一类受现实世界启发的大规模应用程序的问题,其特点是大量同构和并发任务,这些任务是瓶颈的主要来源,但也为优化打开了巨大的潜力。我们将调度问题表述为一个新的顺序合作博弈,并提出了一种通信和存储感知的多目标算法,该算法在满足网络带宽和存储需求两个约束条件的同时,优化了两个用户目标(执行时间和经济成本)。与其他相关算法相比,我们通过模拟和实际应用进行了全面的实验,证明了我们的方法在算法复杂性、制作跨度、成本、系统级效率、公平性等方面的效率和有效性。
{"title":"Cooperative Scheduling of Bag-of-Tasks Workflows on Hybrid Clouds","authors":"Rubing Duan, R. Prodan","doi":"10.1109/CloudCom.2014.58","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.58","url":null,"abstract":"We address the problem of scheduling a class of large-scale applications inspired from real-world on hybrid Clouds, characterized by a large number of homogeneous and concurrent tasks that are the main sources of bottlenecks but open great potential for optimization. We formulate the scheduling problem as a new sequential cooperative game and propose a communication- and storage-aware multi-objective algorithm that optimizes two user objectives (execution time and economic cost) while fulfilling two constraints (network bandwidth and storage requirements). We present comprehensive experiments using both simulation and real-world applications that demonstrate the efficiency and effectiveness of our approach in terms of algorithm complexity, make span, cost, system-level efficiency, fairness, and other aspects compared with other related algorithms.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Trustworthiness Evaluation Framework in Cloud Computing for Service Selection 面向服务选择的云计算可信度评估框架
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.107
Lifeng Wang, Zhengping Wu
Cloud computing provides many benefits for individuals and enterprises by offering a range of computing services. The service dynamism, elasticity, economy and choices are too attractive to ignore. At the meantime, cloud computing has opened up a new frontier of challenges by introducing trust scenario. The Trustworthiness Evaluation of cloud Services is a paramount concern. In this paper, we present a framework to quantitatively measure and rank the trustworthiness of cloud services. In particular, we address the fundamental understanding of trustworthiness, quantitative trustworthiness metrics, unified scale of trust factors, trust factors categorization, trust coordinate and multi-criteria analysis for trustworthiness decision making. Our comprehensive framework of trustworthiness evaluation contains five basic building blocks. The preprocessing block query and calculate the existent trustworthiness record. Then the trust factors are collected, if there was no match record found. The trust factor management block categorize the trust factors and convert them by using unified scale. The trust factor processing block is for weighting and positioning of trust factors. The trustworthiness decision making block provide calculation of cloud service trustworthiness, and the results are recorded in our trustworthiness record block. The proposed trustworthiness measurement framework is employed in several experiments by using existing trust dataset. The analysis based on the experiment result indicates our trustworthiness evaluation is accurate and flexible.
云计算通过提供一系列计算服务,为个人和企业提供了许多好处。服务的动态性、弹性、经济性和选择太有吸引力了,不容忽视。同时,云计算通过引入信任场景,开辟了一个新的挑战领域。云服务的可信性评估是一个重要的问题。在本文中,我们提出了一个框架来定量测量和排名云服务的可信度。重点介绍了对可信性的基本认识、可信性量化指标、可信性因素统一量表、可信性因素分类、可信性坐标以及可信性决策的多准则分析。我们的可信度评估综合框架包含五个基本组成部分。预处理块查询和计算存在的可信记录。如果没有匹配记录,则收集信任因子。信任因素管理块对信任因素进行分类,并采用统一的尺度进行转换。信任因子处理块用于对信任因子进行加权和定位。可信度决策块提供云服务可信度的计算,结果记录在我们的可信度记录块中。利用已有的信任数据集,将提出的可信度测量框架应用于多个实验。基于实验结果的分析表明,我们的可信度评估是准确和灵活的。
{"title":"A Trustworthiness Evaluation Framework in Cloud Computing for Service Selection","authors":"Lifeng Wang, Zhengping Wu","doi":"10.1109/CloudCom.2014.107","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.107","url":null,"abstract":"Cloud computing provides many benefits for individuals and enterprises by offering a range of computing services. The service dynamism, elasticity, economy and choices are too attractive to ignore. At the meantime, cloud computing has opened up a new frontier of challenges by introducing trust scenario. The Trustworthiness Evaluation of cloud Services is a paramount concern. In this paper, we present a framework to quantitatively measure and rank the trustworthiness of cloud services. In particular, we address the fundamental understanding of trustworthiness, quantitative trustworthiness metrics, unified scale of trust factors, trust factors categorization, trust coordinate and multi-criteria analysis for trustworthiness decision making. Our comprehensive framework of trustworthiness evaluation contains five basic building blocks. The preprocessing block query and calculate the existent trustworthiness record. Then the trust factors are collected, if there was no match record found. The trust factor management block categorize the trust factors and convert them by using unified scale. The trust factor processing block is for weighting and positioning of trust factors. The trustworthiness decision making block provide calculation of cloud service trustworthiness, and the results are recorded in our trustworthiness record block. The proposed trustworthiness measurement framework is employed in several experiments by using existing trust dataset. The analysis based on the experiment result indicates our trustworthiness evaluation is accurate and flexible.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Delegated Access for Hadoop Clusters in the Cloud 云中的Hadoop集群的委派访问
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.50
David Nuñez, Isaac Agudo, Javier López
Among Big Data technologies, Hadoop stands out for its capacity to store and process large-scale datasets. However, although Hadoop was not designed with security in mind, it is widely used by plenty of organizations, some of which have strong data protection requirements. Traditional access control solutions are not enough, and cryptographic solutions must be put in place to protect sensitive information. In this paper, we describe a cryptographically-enforced access control system for Hadoop, based on proxy re-encryption. Our proposed solution fits in well with the outsourcing of Big Data processing to the cloud, since information can be stored in encrypted form in external servers in the cloud and processed only if access has been delegated. Experimental results show that the overhead produced by our solution is manageable, which makes it suitable for some applications.
在大数据技术中,Hadoop因其存储和处理大规模数据集的能力而脱颖而出。然而,尽管Hadoop在设计时并没有考虑到安全性,但它被许多组织广泛使用,其中一些组织对数据保护有很强的要求。传统的访问控制解决方案是不够的,必须采用加密解决方案来保护敏感信息。在本文中,我们描述了一个基于代理重加密的Hadoop加密强制访问控制系统。我们提出的解决方案非常适合将大数据处理外包给云,因为信息可以以加密形式存储在云中的外部服务器中,并且只有在授权访问时才能进行处理。实验结果表明,该方案产生的开销是可控的,适用于某些应用。
{"title":"Delegated Access for Hadoop Clusters in the Cloud","authors":"David Nuñez, Isaac Agudo, Javier López","doi":"10.1109/CloudCom.2014.50","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.50","url":null,"abstract":"Among Big Data technologies, Hadoop stands out for its capacity to store and process large-scale datasets. However, although Hadoop was not designed with security in mind, it is widely used by plenty of organizations, some of which have strong data protection requirements. Traditional access control solutions are not enough, and cryptographic solutions must be put in place to protect sensitive information. In this paper, we describe a cryptographically-enforced access control system for Hadoop, based on proxy re-encryption. Our proposed solution fits in well with the outsourcing of Big Data processing to the cloud, since information can be stored in encrypted form in external servers in the cloud and processed only if access has been delegated. Experimental results show that the overhead produced by our solution is manageable, which makes it suitable for some applications.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114611207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Virtual Network Embedding in Hybrid Datacenters with Dynamic Wavelength Grouping 动态波长分组混合数据中心虚拟网络嵌入
Pub Date : 2014-12-15 DOI: 10.1109/CloudCom.2014.34
Raksha Srinivas, S. Hegde, D. Divakaran, G. Mohan
With ever increasing traffic demands, data enter networks are envisioned to be a hybrid of both optical and electrical networks. In this context, we consider the recently proposed dynamic wavelength grouping (DWG) architecture for the optical network. This architecture can dynamically group wavelengths from different ports onto a single fiber carrying fixed number of wavelength groups. We focus on the joint problem of VM-placement and bandwidth allocation in such a hybrid optical-electrical data enter network with DWG capability. There are multiple challenges: (i) the number of edge-switches that can be simultaneously reached using optical paths from an edge-switch is limited by cost, and (ii) wavelength-group continuity constraint. Abstracting the requests of tenants as virtual networks, we study the novel problem of embedding virtual networks on this hybrid datacenter, which translates to the joint problem of bandwidth allocation and placement such that the requirements of virtual networks are satisfied. We develop and analyse two algorithms for embedding dynamically arriving virtual network demands on a hybrid datacenter with DWG capability. The performance studies demonstrate the effectiveness of exploiting existing optical paths as well as using electrical links in the face of multiple constraints to accept higher number of requests.
随着流量需求的不断增长,数据输入网络被设想为光和电网络的混合。在这种背景下,我们考虑了最近提出的用于光网络的动态波长分组(DWG)架构。这种架构可以动态地将来自不同端口的波长分组到携带固定数量波长组的单个光纤上。重点研究了具有DWG能力的光-电混合数据输入网络中vm的放置和带宽分配的联合问题。存在多重挑战:(i)可以使用光路从边缘交换机同时到达的边缘交换机的数量受到成本的限制,以及(ii)波长组连续性的限制。将租户的需求抽象为虚拟网络,研究了在混合数据中心中嵌入虚拟网络的新问题,将其转化为满足虚拟网络需求的带宽分配和布局的联合问题。我们开发并分析了两种算法,用于在具有DWG功能的混合数据中心上嵌入动态到达的虚拟网络需求。性能研究证明了利用现有光路的有效性,以及在面对多种约束时使用电气链路来接受更多请求的有效性。
{"title":"Virtual Network Embedding in Hybrid Datacenters with Dynamic Wavelength Grouping","authors":"Raksha Srinivas, S. Hegde, D. Divakaran, G. Mohan","doi":"10.1109/CloudCom.2014.34","DOIUrl":"https://doi.org/10.1109/CloudCom.2014.34","url":null,"abstract":"With ever increasing traffic demands, data enter networks are envisioned to be a hybrid of both optical and electrical networks. In this context, we consider the recently proposed dynamic wavelength grouping (DWG) architecture for the optical network. This architecture can dynamically group wavelengths from different ports onto a single fiber carrying fixed number of wavelength groups. We focus on the joint problem of VM-placement and bandwidth allocation in such a hybrid optical-electrical data enter network with DWG capability. There are multiple challenges: (i) the number of edge-switches that can be simultaneously reached using optical paths from an edge-switch is limited by cost, and (ii) wavelength-group continuity constraint. Abstracting the requests of tenants as virtual networks, we study the novel problem of embedding virtual networks on this hybrid datacenter, which translates to the joint problem of bandwidth allocation and placement such that the requirements of virtual networks are satisfied. We develop and analyse two algorithms for embedding dynamically arriving virtual network demands on a hybrid datacenter with DWG capability. The performance studies demonstrate the effectiveness of exploiting existing optical paths as well as using electrical links in the face of multiple constraints to accept higher number of requests.","PeriodicalId":249306,"journal":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114794126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1