首页 > 最新文献

2019 15th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Look Ahead Distributed Planning For Application Management In Cloud 展望云应用管理的分布式规划
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012693
F. Zaker, Marin Litoiu, Mark Shtern
In this paper, we propose and implement a distributed autonomic manager to maintain service level agreements (SLA) for each application’ scenario. The proposed autonomic manager seeks to support SLAs by configuring bandwidth ratios for each application scenario using overlay network before provisioning more computing resources. The most important aspect of the proposed autonomic manager is scalability which allows us to deal with geographically distributed cloud-based applications and large volume of computation. This can be useful in look ahead optimization and when using complex models, such as machine learning. Through experiments on Amazon AWS cloud, we demonstrate the elasticity of the autonomic manager.
在本文中,我们提出并实现了一个分布式自治管理器,用于维护每个应用程序场景的服务水平协议(SLA)。提议的自治管理器寻求通过在提供更多计算资源之前使用覆盖网络为每个应用程序场景配置带宽比率来支持sla。提出的自治管理器最重要的方面是可伸缩性,它允许我们处理地理上分布式的基于云的应用程序和大量的计算。这在前瞻性优化和使用复杂模型(如机器学习)时非常有用。通过在Amazon AWS云上的实验,证明了自治管理器的弹性。
{"title":"Look Ahead Distributed Planning For Application Management In Cloud","authors":"F. Zaker, Marin Litoiu, Mark Shtern","doi":"10.23919/CNSM46954.2019.9012693","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012693","url":null,"abstract":"In this paper, we propose and implement a distributed autonomic manager to maintain service level agreements (SLA) for each application’ scenario. The proposed autonomic manager seeks to support SLAs by configuring bandwidth ratios for each application scenario using overlay network before provisioning more computing resources. The most important aspect of the proposed autonomic manager is scalability which allows us to deal with geographically distributed cloud-based applications and large volume of computation. This can be useful in look ahead optimization and when using complex models, such as machine learning. Through experiments on Amazon AWS cloud, we demonstrate the elasticity of the autonomic manager.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Can you hear me now? A call detail record based end-to-end diagnostics system for mobile networks 你现在能听到我说话吗?基于通话细节记录的移动网络端到端诊断系统
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012749
Anssi Tauriainen
Automation of mobile network fault diagnostics and troubleshooting is critical for successful transformation to new network technologies such as 5G and core Network Function Virtualization (NFV). This paper presents a decision tree-based call detail record (CDR) labeling process, which is used to construct an automated end-to-end diagnostics system for mobile network faults. The presented diagnostics system will enable the utilization of automated troubleshooting systems, and the execution of automated corrective actions in third party systems such as Self-Organizing Network (SON) and NFV domain orchestrator.
移动网络故障诊断和故障排除自动化对于成功向5G和核心网络功能虚拟化(NFV)等新网络技术转型至关重要。提出了一种基于决策树的呼叫详细记录(CDR)标注过程,用于构建移动网络故障的端到端自动诊断系统。所提出的诊断系统将能够利用自动故障排除系统,并在第三方系统(如自组织网络(SON)和NFV域协调器)中执行自动纠正措施。
{"title":"Can you hear me now? A call detail record based end-to-end diagnostics system for mobile networks","authors":"Anssi Tauriainen","doi":"10.23919/CNSM46954.2019.9012749","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012749","url":null,"abstract":"Automation of mobile network fault diagnostics and troubleshooting is critical for successful transformation to new network technologies such as 5G and core Network Function Virtualization (NFV). This paper presents a decision tree-based call detail record (CDR) labeling process, which is used to construct an automated end-to-end diagnostics system for mobile network faults. The presented diagnostics system will enable the utilization of automated troubleshooting systems, and the execution of automated corrective actions in third party systems such as Self-Organizing Network (SON) and NFV domain orchestrator.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Causal analysis of network logs with layered protocols and topology knowledge 利用分层协议和拓扑知识对网络日志进行原因分析
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012718
Satoru Kobayashi, Kazuki Otomo, K. Fukuda
To detect root causes of failures in large-scale networks, we need to extract contextual information from operational data automatically. Correlation-based methods are widely used for this purpose, but they have a problem of spurious correlation, which buries truly important information. In this work, we propose a method for extracting contextual information in network logs by combining a graph-based causal inference algorithm and a pruning method based on domain knowledge (i.e., network protocols and topologies). Applying the proposed method to a set of log data collected from a nation-wide R & E network, we demonstrate that the pruning method reduced processing time by 74% compared with a single-handed causal analysis method, and it detected more useful information for troubleshooting compared with an existing area-based method.
为了检测大规模网络故障的根本原因,我们需要从运行数据中自动提取上下文信息。基于相关性的方法被广泛用于此目的,但它们存在虚假相关性的问题,这掩盖了真正重要的信息。在这项工作中,我们提出了一种通过结合基于图的因果推理算法和基于领域知识(即网络协议和拓扑)的修剪方法来提取网络日志中上下文信息的方法。将所提出的方法应用于从全国r&e网络收集的一组日志数据,我们表明,与单手因果分析方法相比,修剪方法减少了74%的处理时间,并且与现有的基于区域的方法相比,它可以检测到更多有用的故障排除信息。
{"title":"Causal analysis of network logs with layered protocols and topology knowledge","authors":"Satoru Kobayashi, Kazuki Otomo, K. Fukuda","doi":"10.23919/CNSM46954.2019.9012718","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012718","url":null,"abstract":"To detect root causes of failures in large-scale networks, we need to extract contextual information from operational data automatically. Correlation-based methods are widely used for this purpose, but they have a problem of spurious correlation, which buries truly important information. In this work, we propose a method for extracting contextual information in network logs by combining a graph-based causal inference algorithm and a pruning method based on domain knowledge (i.e., network protocols and topologies). Applying the proposed method to a set of log data collected from a nation-wide R & E network, we demonstrate that the pruning method reduced processing time by 74% compared with a single-handed causal analysis method, and it detected more useful information for troubleshooting compared with an existing area-based method.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Dynamic architecture based on network virtualization and distributed orchestration for management of autonomic network 基于网络虚拟化和分布式编排的自治网络管理动态体系结构
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012731
Guy Saadon, Yoram Haddad, N. Simoni
In network management architectures of 5G and IoT networks, standardization groups often consider the network resource virtualization layer between the physical network and the SDN controller, as a means to allow deployment and placement of network services with their virtual network functions. However, the following question arises: is this layer enough to react to real-time changes originating from customers or the network without interrupting the service? We consider that a dynamic architecture should allow different and evolving assemblies to be provisioned during a session, in order to meet modification requests without requiring total redesign of the network service. Therefore, in this study, we propose an enhanced architecture. This novel architecture adds a network virtualization layer above the SDN controller with its associated orchestrator. Then, efficiently distributing orchestration among the different layers ensures network autonomy. In this context, we show how real-time service modifications and network failures are handled without losing the existing services and how network management gains additional dynamicity and flexibility.
在5G和物联网网络的网络管理架构中,标准化组织经常考虑在物理网络和SDN控制器之间的网络资源虚拟化层,作为一种允许部署和放置网络服务及其虚拟网络功能的手段。然而,下面的问题出现了:这一层是否足以在不中断服务的情况下对来自客户或网络的实时更改做出反应?我们认为动态架构应该允许在会话期间提供不同的和不断发展的程序集,以便在不需要完全重新设计网络服务的情况下满足修改请求。因此,在本研究中,我们提出了一个增强的架构。这种新颖的体系结构在SDN控制器及其相关的编排器之上添加了一个网络虚拟化层。然后,在不同层之间有效地分配业务流程,确保网络的自主性。在此上下文中,我们将展示如何在不丢失现有服务的情况下处理实时服务修改和网络故障,以及网络管理如何获得额外的动态和灵活性。
{"title":"Dynamic architecture based on network virtualization and distributed orchestration for management of autonomic network","authors":"Guy Saadon, Yoram Haddad, N. Simoni","doi":"10.23919/CNSM46954.2019.9012731","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012731","url":null,"abstract":"In network management architectures of 5G and IoT networks, standardization groups often consider the network resource virtualization layer between the physical network and the SDN controller, as a means to allow deployment and placement of network services with their virtual network functions. However, the following question arises: is this layer enough to react to real-time changes originating from customers or the network without interrupting the service? We consider that a dynamic architecture should allow different and evolving assemblies to be provisioned during a session, in order to meet modification requests without requiring total redesign of the network service. Therefore, in this study, we propose an enhanced architecture. This novel architecture adds a network virtualization layer above the SDN controller with its associated orchestrator. Then, efficiently distributing orchestration among the different layers ensures network autonomy. In this context, we show how real-time service modifications and network failures are handled without losing the existing services and how network management gains additional dynamicity and flexibility.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MENTOR: The Design and Evaluation of a Protection Services Recommender System 一个保护服务推荐系统的设计和评估
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012686
M. Franco, B. Rodrigues, B. Stiller
Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to operate such services, determines a considerable part of the investment in technologies around the world. Although a vast number of protection services are available, it is neither trivial for network operators nor end-users to choose one of them in order to prevent or mitigate an imminent attack. As the next-generation cybersecurity solutions are on the horizon, systems that simplify their adoption are still required in support of security management tasks. Thus, this paper introduces MENTOR, a support tool for cyber-security, focusing on the recommendation of protection services. MENTOR is able to (${a}$) to deal with different demands from the user and (${b}$) to recommend the adequate protection service in order to provide a proper level of cybersecurity in different scenarios. Four similarity measurements are implemented in order to prove the feasibility of the MENTOR’${s}$ engine. An evaluation determines the performance and accuracy of each measurement used during the recommendation process.
过去几年,网络攻击给政府和企业造成了几起损害。这种损害不仅包括敏感信息的泄露,还包括服务中断造成的经济损失。价值数十亿美元的安全市场规模决定了全球相当一部分的技术投资,这代表了获得保护服务和培训响应团队来运营此类服务的投资。尽管有大量可用的保护服务,但对于网络运营商和最终用户来说,为了防止或减轻迫在眉睫的攻击,选择其中一种服务绝非易事。随着下一代网络安全解决方案的出现,简化其采用的系统仍然需要支持安全管理任务。因此,本文介绍了网络安全支持工具MENTOR,重点介绍了防护服务的推荐。MENTOR能够(${a}$)处理用户的不同需求,(${b}$)推荐适当的保护服务,以便在不同场景下提供适当的网络安全级别。为了证明MENTOR ' ${s}$引擎的可行性,我们实施了四种相似度测量。评估决定了在推荐过程中使用的每个度量的性能和准确性。
{"title":"MENTOR: The Design and Evaluation of a Protection Services Recommender System","authors":"M. Franco, B. Rodrigues, B. Stiller","doi":"10.23919/CNSM46954.2019.9012686","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012686","url":null,"abstract":"Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to operate such services, determines a considerable part of the investment in technologies around the world. Although a vast number of protection services are available, it is neither trivial for network operators nor end-users to choose one of them in order to prevent or mitigate an imminent attack. As the next-generation cybersecurity solutions are on the horizon, systems that simplify their adoption are still required in support of security management tasks. Thus, this paper introduces MENTOR, a support tool for cyber-security, focusing on the recommendation of protection services. MENTOR is able to (${a}$) to deal with different demands from the user and (${b}$) to recommend the adequate protection service in order to provide a proper level of cybersecurity in different scenarios. Four similarity measurements are implemented in order to prove the feasibility of the MENTOR’${s}$ engine. An evaluation determines the performance and accuracy of each measurement used during the recommendation process.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Flow-based Throughput Prediction using Deep Learning and Real-World Network Traffic 使用深度学习和真实网络流量的基于流量的吞吐量预测
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012716
Christoph Hardegen, Benedikt Pfülb, Sebastian Rieger, A. Gepperth, Sven Reissmann
We present a processing pipeline for flow-based throughput classification based on a machine learning component using deep neural networks (DNNs) that is trained to predict the likely bit rate of a real-world network traffic flow ahead of time. The DNN is trained and evaluated on a flow data stream as well as on a reference dataset collected from a university data center. Predicted bit rates are quantized into three classes instead of the common binary classification into “mice” and “elephant” flows. An in-depth description of the data acquisition process, including preprocessing steps and anonymization used to protect sensitive information, is given. We employ t-SNE (a state-of-the-art data visualization algorithm) to visualize network traffic data, thus enabling us to analyze and understand the characteristics of network traffic data and relations between communication flows at a glance. Additionally, an architecture for flow-based routing utilizing the developed pipeline is proposed as a possible use-case.
我们提出了一种基于深度神经网络(dnn)的机器学习组件的基于流量的吞吐量分类的处理管道,该组件经过训练可以提前预测现实世界网络流量的可能比特率。DNN在流动数据流以及从大学数据中心收集的参考数据集上进行训练和评估。预测的比特率被量化为三类,而不是常见的“老鼠”流和“大象”流的二进制分类。深入描述了数据采集过程,包括预处理步骤和用于保护敏感信息的匿名化。我们采用最先进的数据可视化算法t-SNE对网络流量数据进行可视化处理,使我们能够一目了然地分析和了解网络流量数据的特征和通信流之间的关系。此外,还提出了一个利用已开发的管道的基于流的路由体系结构,作为一个可能的用例。
{"title":"Flow-based Throughput Prediction using Deep Learning and Real-World Network Traffic","authors":"Christoph Hardegen, Benedikt Pfülb, Sebastian Rieger, A. Gepperth, Sven Reissmann","doi":"10.23919/CNSM46954.2019.9012716","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012716","url":null,"abstract":"We present a processing pipeline for flow-based throughput classification based on a machine learning component using deep neural networks (DNNs) that is trained to predict the likely bit rate of a real-world network traffic flow ahead of time. The DNN is trained and evaluated on a flow data stream as well as on a reference dataset collected from a university data center. Predicted bit rates are quantized into three classes instead of the common binary classification into “mice” and “elephant” flows. An in-depth description of the data acquisition process, including preprocessing steps and anonymization used to protect sensitive information, is given. We employ t-SNE (a state-of-the-art data visualization algorithm) to visualize network traffic data, thus enabling us to analyze and understand the characteristics of network traffic data and relations between communication flows at a glance. Additionally, an architecture for flow-based routing utilizing the developed pipeline is proposed as a possible use-case.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Learning From Evolving Network Data for Dependable Botnet Detection 从不断发展的网络数据中学习可靠的僵尸网络检测
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012710
Duc C. Le, A. N. Zincir-Heywood
This work presents an emerging problem in real-world applications of machine learning (ML) in cybersecurity, particularly in botnet detection, where the dynamics and the evolution in the deployment environments may render the ML solutions inadequate. We propose an approach to tackle this challenge using Genetic Programming (GP) - an evolutionary computation based approach. Preliminary results show that GP is able to evolve pre-trained classifiers to work under evolved (expanded) feature space conditions. This indicates the potential use of such an approach for botnet detection under non-stationary environments, where much less data and training time are required to obtain a reliable classifier as new network conditions arise.
这项工作提出了机器学习(ML)在网络安全中的实际应用中的一个新问题,特别是在僵尸网络检测中,其中部署环境的动态和演变可能会使ML解决方案不足。我们提出了一种利用遗传规划(GP)——一种基于进化计算的方法来解决这一挑战的方法。初步结果表明,GP能够进化出在演化(扩展)特征空间条件下工作的预训练分类器。这表明这种方法在非平稳环境下用于僵尸网络检测的潜在用途,在这种环境中,随着新网络条件的出现,获得可靠分类器所需的数据和训练时间要少得多。
{"title":"Learning From Evolving Network Data for Dependable Botnet Detection","authors":"Duc C. Le, A. N. Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012710","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012710","url":null,"abstract":"This work presents an emerging problem in real-world applications of machine learning (ML) in cybersecurity, particularly in botnet detection, where the dynamics and the evolution in the deployment environments may render the ML solutions inadequate. We propose an approach to tackle this challenge using Genetic Programming (GP) - an evolutionary computation based approach. Preliminary results show that GP is able to evolve pre-trained classifiers to work under evolved (expanded) feature space conditions. This indicates the potential use of such an approach for botnet detection under non-stationary environments, where much less data and training time are required to obtain a reliable classifier as new network conditions arise.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CNSM 2019 Cover Page CNSM 2019封面
Pub Date : 2019-10-01 DOI: 10.23919/cnsm46954.2019.9012723
{"title":"CNSM 2019 Cover Page","authors":"","doi":"10.23919/cnsm46954.2019.9012723","DOIUrl":"https://doi.org/10.23919/cnsm46954.2019.9012723","url":null,"abstract":"","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network 基于区块链分散存储网络的任务分配池化方法
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012719
Iman Vakilinia, Shahin Vakilinia, S. Badsha, Engin Arslan, S. Sengupta
Blockchain technology has provided a solid system to develop incentivization algorithms using the smart contract. Blockchain applies the distributed ledger to store transaction histories, and the information is stored across a network of computers instead of on a single server. This facilitates the development of a new set of applications such as distributed file storage systems where users can rent out their storage in return for a premium. The distributed file storage systems provide more privacy and security compared to the centralized storage models as there is no need to have a trusted party. New schemes have been developed for distributed file storage systems on top of the blockchain platform, however, the problem of task/service allocation in these models have not been studied before. In this paper, we study the task/service allocation in the distributed file storage systems considering the challenge of computation cost. First, we formalize the problem of task/service allocation in a decentralized storage network, and then we discuss different approaches to allocate storage tasks to storage servers in an efficient manner. Moreover, we study the benefits of the cooperation (a.k.a pooling) in the storage and retrieval markets of distributed storage networks. The evaluation results show the benefit of our proposed pooling based approach in storage and retrieval markets.
区块链技术为使用智能合约开发激励算法提供了一个坚实的系统。区块链应用分布式分类帐来存储交易历史,信息存储在计算机网络上,而不是存储在单个服务器上。这促进了一组新应用程序的开发,比如分布式文件存储系统,用户可以出租他们的存储以获得溢价。与集中式存储模型相比,分布式文件存储系统提供了更多的隐私和安全性,因为不需要有可信的一方。基于区块链平台的分布式文件存储系统已经开发出了新的方案,但是这些模型中的任务/服务分配问题还没有被研究过。本文研究了分布式文件存储系统中任务/服务的分配问题,并考虑了计算成本的挑战。首先,我们形式化了分散存储网络中的任务/服务分配问题,然后讨论了将存储任务有效地分配给存储服务器的不同方法。此外,我们还研究了在分布式存储网络的存储和检索市场中合作(即池化)的好处。评估结果表明,我们提出的基于池的方法在存储和检索市场中是有效的。
{"title":"Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network","authors":"Iman Vakilinia, Shahin Vakilinia, S. Badsha, Engin Arslan, S. Sengupta","doi":"10.23919/CNSM46954.2019.9012719","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012719","url":null,"abstract":"Blockchain technology has provided a solid system to develop incentivization algorithms using the smart contract. Blockchain applies the distributed ledger to store transaction histories, and the information is stored across a network of computers instead of on a single server. This facilitates the development of a new set of applications such as distributed file storage systems where users can rent out their storage in return for a premium. The distributed file storage systems provide more privacy and security compared to the centralized storage models as there is no need to have a trusted party. New schemes have been developed for distributed file storage systems on top of the blockchain platform, however, the problem of task/service allocation in these models have not been studied before. In this paper, we study the task/service allocation in the distributed file storage systems considering the challenge of computation cost. First, we formalize the problem of task/service allocation in a decentralized storage network, and then we discuss different approaches to allocate storage tasks to storage servers in an efficient manner. Moreover, we study the benefits of the cooperation (a.k.a pooling) in the storage and retrieval markets of distributed storage networks. The evaluation results show the benefit of our proposed pooling based approach in storage and retrieval markets.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"19 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120852830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Systematic Mapping on Orchestration of Container-based Applications in Fog Computing 雾计算中基于容器应用编排的系统映射
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012677
Walter E. Santo, Rubens Souza Munhos Junior, A. Ribeiro, D. Silva, R. Santos
There is an increasing number of Internet of Things (IoT) devices in the border of computer networks, requiring local processing and lightweight virtualization to deal with issues such as heterogeneity, Quality of Service (QoS) management, scalability, mobility, federation, and interoperability. Fog computing can provide the computational resources required by IoT devices to process their data. Low energy consumption and total cost of ownership are among the desirable properties for auxiliar infrastructures such as those deployed for fog computing, which do not require large computational power though. There is a noteworthy trend of undergoing research efforts towards the definition of software and hardware architectures for fog computing in this context. In this sense, this paper presents a Systematic Literature Mapping with the purpose of understanding and identifying metrics and gaps in current literature about orchestration of container-based applications, especially those hosted in clusters of Single Board Computer (SBC) platforms, such as Raspberry Pi, which have been used for deploying fog computing environments.
在计算机网络边界上有越来越多的物联网(IoT)设备,需要本地处理和轻量级虚拟化来处理诸如异构、服务质量(QoS)管理、可伸缩性、移动性、联合和互操作性等问题。雾计算可以提供物联网设备处理其数据所需的计算资源。低能耗和总拥有成本是辅助基础设施(如用于雾计算的辅助基础设施)的理想属性之一,但这些辅助基础设施不需要大量的计算能力。在这种情况下,正在进行的关于雾计算软件和硬件架构定义的研究工作有一个值得注意的趋势。从这个意义上说,本文提出了一个系统文献映射,目的是理解和识别当前文献中关于基于容器的应用程序编排的度量和差距,特别是那些托管在单板计算机(SBC)平台集群中的应用程序,如树莓派,已用于部署雾计算环境。
{"title":"Systematic Mapping on Orchestration of Container-based Applications in Fog Computing","authors":"Walter E. Santo, Rubens Souza Munhos Junior, A. Ribeiro, D. Silva, R. Santos","doi":"10.23919/CNSM46954.2019.9012677","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012677","url":null,"abstract":"There is an increasing number of Internet of Things (IoT) devices in the border of computer networks, requiring local processing and lightweight virtualization to deal with issues such as heterogeneity, Quality of Service (QoS) management, scalability, mobility, federation, and interoperability. Fog computing can provide the computational resources required by IoT devices to process their data. Low energy consumption and total cost of ownership are among the desirable properties for auxiliar infrastructures such as those deployed for fog computing, which do not require large computational power though. There is a noteworthy trend of undergoing research efforts towards the definition of software and hardware architectures for fog computing in this context. In this sense, this paper presents a Systematic Literature Mapping with the purpose of understanding and identifying metrics and gaps in current literature about orchestration of container-based applications, especially those hosted in clusters of Single Board Computer (SBC) platforms, such as Raspberry Pi, which have been used for deploying fog computing environments.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129517597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 15th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1