首页 > 最新文献

2014 IEEE International Conference on Cloud Engineering最新文献

英文 中文
Deploying PaaS for Accelerating Cloud Uptake in the Guifi Community Network 在贵飞社区网络中部署PaaS加速云吸收
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.53
Javi Jimenez, P. Garcia, Roger Baig, Felix Freitag, Leandro Navarro-Moldes
Community networks is an emerging model in which communities of citizens build and own open shared networks. But currently, cloud computing infrastructures, common in today's Internet, hardy exist in community networks. We present in this paper our approach for bringing clouds into community networks. The main element of our strategy for achieving cloud uptake is the deployment of the Guifi-Community-Distribution (GCODIS) on all cloud nodes, a distribution containing common services and applications. We argue in the paper the reasons why this approach is appropriate for the scenario of community networks, where the user acceptance needs to be gained. We show the steps and the on-going process with which we actually implement our approach in the Guifi community network. With these key elements in place, we conclude that we are closer to the vision that the users of community networks ultimately will not need to consume cloud applications from the Internet, but find them within the community network. An interesting open issue is to what extend our approach can be applied to the more generic volunteer computing scenario.
社区网络是一种新兴的模式,在这种模式中,公民社区建立并拥有开放的共享网络。但是目前,云计算基础设施,在今天的互联网中很常见,很难存在于社区网络中。在本文中,我们提出了将云引入社区网络的方法。我们实现云吸收战略的主要要素是在所有云节点上部署gui - community - distribution (GCODIS),这是一个包含通用服务和应用程序的分布。我们在论文中讨论了为什么这种方法适用于需要获得用户接受的社区网络场景的原因。我们展示了在Guifi社区网络中实际实施我们的方法的步骤和正在进行的过程。有了这些关键元素,我们得出的结论是,我们离社区网络的用户最终不需要使用来自Internet的云应用程序,而是在社区网络中找到它们的愿景更近了一步。一个有趣的开放性问题是,我们的方法在多大程度上可以应用于更通用的志愿者计算场景。
{"title":"Deploying PaaS for Accelerating Cloud Uptake in the Guifi Community Network","authors":"Javi Jimenez, P. Garcia, Roger Baig, Felix Freitag, Leandro Navarro-Moldes","doi":"10.1109/IC2E.2014.53","DOIUrl":"https://doi.org/10.1109/IC2E.2014.53","url":null,"abstract":"Community networks is an emerging model in which communities of citizens build and own open shared networks. But currently, cloud computing infrastructures, common in today's Internet, hardy exist in community networks. We present in this paper our approach for bringing clouds into community networks. The main element of our strategy for achieving cloud uptake is the deployment of the Guifi-Community-Distribution (GCODIS) on all cloud nodes, a distribution containing common services and applications. We argue in the paper the reasons why this approach is appropriate for the scenario of community networks, where the user acceptance needs to be gained. We show the steps and the on-going process with which we actually implement our approach in the Guifi community network. With these key elements in place, we conclude that we are closer to the vision that the users of community networks ultimately will not need to consume cloud applications from the Internet, but find them within the community network. An interesting open issue is to what extend our approach can be applied to the more generic volunteer computing scenario.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116152838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Distributed Diversification of Large Datasets 大型数据集的分布式多样化
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.19
M. Hasan, A. Mueen, V. Tsotras
Diversification has been recently proposed as an approach to allow a user to better grasp a large result set without having to look through all relevant results. In this paper, we expand the use of diversification as an analytical tool to explore large datasets dispersed over many nodes. The diversification problem is in general NP-complete and existing uniprocessor algorithms are unfortunately not suitable for the distributed setting of our environment. Using the MapReduce framework we consider two distinct approaches to solve the distributed diversification problem, one that focuses on optimizing disk I/O and one that optimizes for network I/O. Our approaches are iterative in nature, allowing the user to continue refining the diversification process if more time is available. Moreover, we prove that (i) this iteration process converges and (ii) it produces a 2-approximate diversified result set when compared to the optimal solution. We also develop a cost model to predict the run-time for both approaches based on the network and disk characteristics. We implemented our approaches on a cluster of 40 cores and showed that they are scalable and produce the same quality results as the state-of-the-art uniprocessor algorithms.
多样化最近被提议作为一种方法,允许用户更好地掌握一个大的结果集,而不必查看所有相关的结果。在本文中,我们扩展了多样化作为分析工具的使用,以探索分散在许多节点上的大型数据集。多样化问题一般是np完全的,现有的单处理器算法不适合我们环境的分布式设置。使用MapReduce框架,我们考虑了两种不同的方法来解决分布式多样化问题,一种侧重于优化磁盘I/O,另一种侧重于优化网络I/O。我们的方法本质上是迭代的,如果有更多的时间,允许用户继续改进多样化的过程。此外,我们证明了(i)该迭代过程是收敛的,(ii)与最优解相比,它产生了一个2-近似的多样化结果集。我们还开发了一个成本模型来预测基于网络和磁盘特性的两种方法的运行时间。我们在40核的集群上实现了我们的方法,并证明了它们是可扩展的,并且产生了与最先进的单处理器算法相同的质量结果。
{"title":"Distributed Diversification of Large Datasets","authors":"M. Hasan, A. Mueen, V. Tsotras","doi":"10.1109/IC2E.2014.19","DOIUrl":"https://doi.org/10.1109/IC2E.2014.19","url":null,"abstract":"Diversification has been recently proposed as an approach to allow a user to better grasp a large result set without having to look through all relevant results. In this paper, we expand the use of diversification as an analytical tool to explore large datasets dispersed over many nodes. The diversification problem is in general NP-complete and existing uniprocessor algorithms are unfortunately not suitable for the distributed setting of our environment. Using the MapReduce framework we consider two distinct approaches to solve the distributed diversification problem, one that focuses on optimizing disk I/O and one that optimizes for network I/O. Our approaches are iterative in nature, allowing the user to continue refining the diversification process if more time is available. Moreover, we prove that (i) this iteration process converges and (ii) it produces a 2-approximate diversified result set when compared to the optimal solution. We also develop a cost model to predict the run-time for both approaches based on the network and disk characteristics. We implemented our approaches on a cluster of 40 cores and showed that they are scalable and produce the same quality results as the state-of-the-art uniprocessor algorithms.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116562609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TIOSA: Testing VM Interoperability at an OS and Application Level -- A Hypervisor Testing Method and Interoperability Survey TIOSA:在操作系统和应用程序级别测试VM互操作性——一个管理程序测试方法和互操作性调查
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.21
Alexander Lenk, G. Katsaros, Michael Menzel, J. Rake, Ryan Skipp, E. Castro-Leon, P. GopanV.
Virtualization is the foundation of modern, cloud-based applications. The existence of virtual machines (VM) that host the components of such applications enables their portability and scalability. VMs are used in cloud infrastructures, and with dynamic operational requirements there is a need to move VMs within and across different clouds. The successful migration of VMs from one cloud to another should not always be considered as given. The goal of this paper is to devise and implement methods and conduct functional tests towards evaluating interoperability in cloud environments. We suggest a methodology for assessing the interoperability across different systems and we conduct a survey with a series of hypervisors and operating systems.
虚拟化是现代基于云的应用程序的基础。托管这些应用程序组件的虚拟机(VM)的存在使它们具有可移植性和可伸缩性。虚拟机用于云基础设施,并且由于动态操作需求,需要在不同的云内部和跨云移动虚拟机。vm从一个云到另一个云的成功迁移不应该总是被认为是给定的。本文的目标是设计和实现方法,并进行功能测试,以评估云环境中的互操作性。我们建议使用一种方法来评估不同系统之间的互操作性,并对一系列管理程序和操作系统进行了调查。
{"title":"TIOSA: Testing VM Interoperability at an OS and Application Level -- A Hypervisor Testing Method and Interoperability Survey","authors":"Alexander Lenk, G. Katsaros, Michael Menzel, J. Rake, Ryan Skipp, E. Castro-Leon, P. GopanV.","doi":"10.1109/IC2E.2014.21","DOIUrl":"https://doi.org/10.1109/IC2E.2014.21","url":null,"abstract":"Virtualization is the foundation of modern, cloud-based applications. The existence of virtual machines (VM) that host the components of such applications enables their portability and scalability. VMs are used in cloud infrastructures, and with dynamic operational requirements there is a need to move VMs within and across different clouds. The successful migration of VMs from one cloud to another should not always be considered as given. The goal of this paper is to devise and implement methods and conduct functional tests towards evaluating interoperability in cloud environments. We suggest a methodology for assessing the interoperability across different systems and we conduct a survey with a series of hypervisors and operating systems.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Information-Theoretic View of Cloud Workloads 云工作负载的信息论观点
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.73
L. Varshney, K. Ratakonda
Analytics-as-a-service is emerging as a key offering for cloud systems, however in the petascale regime, data transfer bottlenecks are a limiting factor. Often information has to be transmitted to the cloud by physical transportation. Efficient information representations that leverage the functional purpose of data for the analytics service to be offered can serve to ameliorate many of these information flow bottlenecks. In this paper, we provide an information-theoretic view on optimal information representations for big data analytics in the cloud. We also provide some structural design principles for building a petascale analytics appliance.
“分析即服务”正在成为云系统的关键产品,然而在千万亿级系统中,数据传输瓶颈是一个限制因素。通常,信息必须通过物理传输传输到云端。利用要提供的分析服务的数据的功能性目的的有效信息表示可以改善许多这些信息流瓶颈。在本文中,我们提供了一个信息论的观点,为云中的大数据分析的最佳信息表示。我们还为构建千兆级分析设备提供了一些结构设计原则。
{"title":"An Information-Theoretic View of Cloud Workloads","authors":"L. Varshney, K. Ratakonda","doi":"10.1109/IC2E.2014.73","DOIUrl":"https://doi.org/10.1109/IC2E.2014.73","url":null,"abstract":"Analytics-as-a-service is emerging as a key offering for cloud systems, however in the petascale regime, data transfer bottlenecks are a limiting factor. Often information has to be transmitted to the cloud by physical transportation. Efficient information representations that leverage the functional purpose of data for the analytics service to be offered can serve to ameliorate many of these information flow bottlenecks. In this paper, we provide an information-theoretic view on optimal information representations for big data analytics in the cloud. We also provide some structural design principles for building a petascale analytics appliance.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scalable Business Process Execution in the Cloud 云中的可伸缩业务流程执行
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.13
Seven Euting, Christian Janiesch, R. Fischer, S. Tai, I. Weber
Business processes orchestrate service requests in a structured fashion. Process knowledge, however, has rarely been used to predict and decide about cloud infrastructure resource usage. In this paper, we present an approach for BPM-aware cloud computing that builds on process knowledge to improve the timeliness and quality of resource scaling decisions. We introduce an IaaS resource controller based on fuzzy theory that monitors process execution and that is used to predict and control resource requirements for subsequent process tasks. In a laboratory experiment, we evaluate the controller design against a commercially available state-of-the-art auto scaler. Based on the results, we discuss improvements and limitations, and suggest directions for further research.
业务流程以结构化的方式编排服务请求。然而,流程知识很少用于预测和决定云基础设施资源的使用情况。在本文中,我们提出了一种基于流程知识的bpm感知云计算方法,以提高资源扩展决策的及时性和质量。我们引入了一个基于模糊理论的IaaS资源控制器,用于监控流程执行,并用于预测和控制后续流程任务的资源需求。在实验室实验中,我们根据市售的最先进的自动缩放器评估控制器设计。在此基础上,讨论了该方法的改进和不足,并提出了进一步研究的方向。
{"title":"Scalable Business Process Execution in the Cloud","authors":"Seven Euting, Christian Janiesch, R. Fischer, S. Tai, I. Weber","doi":"10.1109/IC2E.2014.13","DOIUrl":"https://doi.org/10.1109/IC2E.2014.13","url":null,"abstract":"Business processes orchestrate service requests in a structured fashion. Process knowledge, however, has rarely been used to predict and decide about cloud infrastructure resource usage. In this paper, we present an approach for BPM-aware cloud computing that builds on process knowledge to improve the timeliness and quality of resource scaling decisions. We introduce an IaaS resource controller based on fuzzy theory that monitors process execution and that is used to predict and control resource requirements for subsequent process tasks. In a laboratory experiment, we evaluate the controller design against a commercially available state-of-the-art auto scaler. Based on the results, we discuss improvements and limitations, and suggest directions for further research.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129447360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud 一种可扩展的k -匿名化解决方案在原地老龄化福利互联云中保护隐私
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.43
Antorweep Chakravorty, T. Wlodarczyk, Chunming Rong
Aging-in-Place solutions are becoming increasingly prevalent in our society. New age big data technologies can harness upon enormous amount of data generated from sensors in smart homes to provide enabling services. Added care and preventive services can be furnished through interoperability and bidirectional dataflow across the value chain. However the nature of the problem domain which although allows establishing better care through sharing of information also risks disclosing complete living behavior of individuals. In this paper, we introduce and evaluate a novel scalable k-anonymization solution based upon the distributed map-reduce paradigm for preserving privacy of the shared data in a welfare intercloud. Our evaluation benchmarks both information loss and data quality metrics and demonstrates better scalability/performance than any other available solutions.
在我们的社会中,“原地老龄化”解决方案正变得越来越普遍。新时代的大数据技术可以利用智能家居中传感器产生的大量数据来提供支持服务。通过跨价值链的互操作性和双向数据流,可以提供额外的护理和预防服务。然而,问题域的性质虽然允许通过信息共享建立更好的护理,但也有暴露个人完整生活行为的风险。在本文中,我们介绍并评估了一种基于分布式map-reduce范式的新型可扩展k-匿名化解决方案,用于保护福利间云中共享数据的隐私。我们的评估对信息丢失和数据质量指标进行了基准测试,并展示了比任何其他可用解决方案更好的可伸缩性/性能。
{"title":"A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud","authors":"Antorweep Chakravorty, T. Wlodarczyk, Chunming Rong","doi":"10.1109/IC2E.2014.43","DOIUrl":"https://doi.org/10.1109/IC2E.2014.43","url":null,"abstract":"Aging-in-Place solutions are becoming increasingly prevalent in our society. New age big data technologies can harness upon enormous amount of data generated from sensors in smart homes to provide enabling services. Added care and preventive services can be furnished through interoperability and bidirectional dataflow across the value chain. However the nature of the problem domain which although allows establishing better care through sharing of information also risks disclosing complete living behavior of individuals. In this paper, we introduce and evaluate a novel scalable k-anonymization solution based upon the distributed map-reduce paradigm for preserving privacy of the shared data in a welfare intercloud. Our evaluation benchmarks both information loss and data quality metrics and demonstrates better scalability/performance than any other available solutions.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cloud Platform Support for API Governance 对API治理的云平台支持
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.90
C. Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, A. Pucher, R. Wolski, T. Bultan
As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require curation as web-accessible services. "Service-izing" digital assets consists of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, application programming interfaces (APIs). In this paper, we postulate that recent advances in cloud computing make cloud platforms as-a-service (PaaS) ideal for deployment, lifecycle management, and policy-based control i.e. API governance - for extant and future digital assets. Toward this end, we overview API governance as a PaaS technology and outline some early results generated by our investigation of a prototype we are developing, called EAGER, for implementing API governance at scale.
随着可扩展的信息技术向更像云的模式发展,数字资产(代码、数据和软件环境)越来越需要作为网络可访问服务进行管理。“服务化”数字资产包括将资产封装在软件中,通过定义良好但灵活的、网络可访问的应用程序编程接口(api)将其暴露给web和移动应用程序。在本文中,我们假设云计算的最新进展使云平台即服务(PaaS)成为部署、生命周期管理和基于策略的控制(即API治理)的理想选择,适用于现有和未来的数字资产。为此,我们概述了作为PaaS技术的API治理,并概述了我们对正在开发的用于大规模实现API治理的原型(称为EAGER)的调查所产生的一些早期结果。
{"title":"Cloud Platform Support for API Governance","authors":"C. Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, A. Pucher, R. Wolski, T. Bultan","doi":"10.1109/IC2E.2014.90","DOIUrl":"https://doi.org/10.1109/IC2E.2014.90","url":null,"abstract":"As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require curation as web-accessible services. \"Service-izing\" digital assets consists of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, application programming interfaces (APIs). In this paper, we postulate that recent advances in cloud computing make cloud platforms as-a-service (PaaS) ideal for deployment, lifecycle management, and policy-based control i.e. API governance - for extant and future digital assets. Toward this end, we overview API governance as a PaaS technology and outline some early results generated by our investigation of a prototype we are developing, called EAGER, for implementing API governance at scale.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Platform-level Support for Authorization in Cloud Services with OAuth 2 使用OAuth 2对云服务中的授权提供平台级支持
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.60
Jakub Sendor, Yann Lehmann, Gabriel Serme, Anderson Santana de Oliveira
The OAuth 2 web authorization framework allows services to act on behalf of users when interacting with other services. It avoids sharing username and passwords across services, thus, in principle protecting users from several threats. However, it is known that the implementation of this kind of authorization protocol is tricky, and potentially leads to vulnerable web services. In this paper we present a toolkit for Java-based Cloud platforms which facilitates the deployment of the OAuth 2 authorization framework into existing web services. We developed a set of interceptors, using aspect-oriented programming techniques for SOA, to handle the main OAuth flow. Secondly, we created an Eclipse plug-in to integrate OAuth into cloud services with minimum effort.
OAuth 2 web授权框架允许服务在与其他服务交互时代表用户行事。它避免了跨服务共享用户名和密码,因此,原则上保护用户免受多种威胁。然而,众所周知,这种授权协议的实现是棘手的,并且可能导致易受攻击的web服务。在本文中,我们为基于java的云平台提供了一个工具包,该工具包有助于将OAuth 2授权框架部署到现有的web服务中。我们开发了一组拦截器,使用面向方面的SOA编程技术来处理主要的OAuth流。其次,我们创建了一个Eclipse插件,以最小的工作量将OAuth集成到云服务中。
{"title":"Platform-level Support for Authorization in Cloud Services with OAuth 2","authors":"Jakub Sendor, Yann Lehmann, Gabriel Serme, Anderson Santana de Oliveira","doi":"10.1109/IC2E.2014.60","DOIUrl":"https://doi.org/10.1109/IC2E.2014.60","url":null,"abstract":"The OAuth 2 web authorization framework allows services to act on behalf of users when interacting with other services. It avoids sharing username and passwords across services, thus, in principle protecting users from several threats. However, it is known that the implementation of this kind of authorization protocol is tricky, and potentially leads to vulnerable web services. In this paper we present a toolkit for Java-based Cloud platforms which facilitates the deployment of the OAuth 2 authorization framework into existing web services. We developed a set of interceptors, using aspect-oriented programming techniques for SOA, to handle the main OAuth flow. Secondly, we created an Eclipse plug-in to integrate OAuth into cloud services with minimum effort.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Combining Declarative and Imperative Cloud Application Provisioning Based on TOSCA 结合基于TOSCA的声明式和命令式云应用程序供应
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.56
Uwe Breitenbücher, Tobias Binz, Kálmán Képes, Oliver Kopp, F. Leymann, Johannes Wettinger
The automation of application provisioning is one of the most important issues in Cloud Computing. The Topology and Orchestration Specification for Cloud Applications (TOSCA) supports automating provisioning by two different flavors: (i) declarative processing is based on interpreting application topology models by a runtime that infers provisioning logic whereas (ii) imperative processing employs provisioning plans that explicitly describe the provisioning tasks to be executed. Both flavors come with benefits and drawbacks. This paper presents a means to combine both flavors to resolve drawbacks and to profit from benefits of both worlds: we propose a standards-based approach to generate provisioning plans based on TOSCA topology models. These provisioning plans are workflows that can be executed fully automatically and may be customized by application developers after generation. We prove the technical feasibility of the approach by an end-to-end open source toolchain and evaluate its extensibility, performance, and complexity.
应用程序供应的自动化是云计算中最重要的问题之一。云应用程序的拓扑和编排规范(TOSCA)通过两种不同的方式支持自动化供应:(i)声明性处理基于通过推断供应逻辑的运行时来解释应用程序拓扑模型,而(ii)命令式处理采用显式描述要执行的供应任务的供应计划。这两种口味各有利弊。本文提出了一种结合这两种风格来解决缺点并从两者的优点中获益的方法:我们提出了一种基于标准的方法来生成基于TOSCA拓扑模型的供应计划。这些供应计划是可以完全自动执行的工作流,并且可以由应用程序开发人员在生成后进行定制。我们通过端到端开源工具链证明了该方法的技术可行性,并评估了其可扩展性、性能和复杂性。
{"title":"Combining Declarative and Imperative Cloud Application Provisioning Based on TOSCA","authors":"Uwe Breitenbücher, Tobias Binz, Kálmán Képes, Oliver Kopp, F. Leymann, Johannes Wettinger","doi":"10.1109/IC2E.2014.56","DOIUrl":"https://doi.org/10.1109/IC2E.2014.56","url":null,"abstract":"The automation of application provisioning is one of the most important issues in Cloud Computing. The Topology and Orchestration Specification for Cloud Applications (TOSCA) supports automating provisioning by two different flavors: (i) declarative processing is based on interpreting application topology models by a runtime that infers provisioning logic whereas (ii) imperative processing employs provisioning plans that explicitly describe the provisioning tasks to be executed. Both flavors come with benefits and drawbacks. This paper presents a means to combine both flavors to resolve drawbacks and to profit from benefits of both worlds: we propose a standards-based approach to generate provisioning plans based on TOSCA topology models. These provisioning plans are workflows that can be executed fully automatically and may be customized by application developers after generation. We prove the technical feasibility of the approach by an end-to-end open source toolchain and evaluate its extensibility, performance, and complexity.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":" 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Preservation of Security Configurations in the Cloud 在云中保存安全配置
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.14
A. Eghtesadi, Yosr Jarraya, M. Debbabi, M. Pourzandi
The dynamic and elastic nature of cloud computing introduces new security challenges when it comes to maintaining consistent security configurations. This is emphasized by the fact that virtual machines are abruptly migrated between physical hosts, in the same or even in different data centers under different security policies. If security is not correctly enforced at the destination locations, and not properly updated in the source locations, security of the migrating virtual machine as well as the co-located machines can be compromised. In this paper, we intend to tackle this problem, specifically for intrusion detection/prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems. The obtained constraints are then submitted to a constraint solver, namely Sugar, in order to verify the properties and to pinpoint potential misconfiguration problems.
在维护一致的安全配置时,云计算的动态和弹性特性带来了新的安全挑战。虚拟机在物理主机之间、在相同甚至不同的数据中心、在不同的安全策略下突然迁移,这一事实强调了这一点。如果在目标位置没有正确地执行安全性,并且在源位置没有正确地更新安全性,则迁移虚拟机以及同址机器的安全性可能会受到损害。在本文中,我们打算解决这个问题,特别是入侵检测/防御和VPN/IPsec作为主要的安全机制。更准确地说,我们提出了一种系统的验证方法来检查安全配置的遵从性。为此,我们首先阐述了入侵监控配置保存和VPN/IPsec保护配置保存两个属性。然后,我们推导出一组公式来比较迁移前后的安全配置。这允许对上述安全属性是否成立进行推理。为此,我们将这些公式编码为约束满足问题。然后将获得的约束提交给约束求解器,即Sugar,以验证属性并查明潜在的错误配置问题。
{"title":"Preservation of Security Configurations in the Cloud","authors":"A. Eghtesadi, Yosr Jarraya, M. Debbabi, M. Pourzandi","doi":"10.1109/IC2E.2014.14","DOIUrl":"https://doi.org/10.1109/IC2E.2014.14","url":null,"abstract":"The dynamic and elastic nature of cloud computing introduces new security challenges when it comes to maintaining consistent security configurations. This is emphasized by the fact that virtual machines are abruptly migrated between physical hosts, in the same or even in different data centers under different security policies. If security is not correctly enforced at the destination locations, and not properly updated in the source locations, security of the migrating virtual machine as well as the co-located machines can be compromised. In this paper, we intend to tackle this problem, specifically for intrusion detection/prevention and VPN/IPsec as main security mechanisms. More precisely, we propose a systematic verification approach to check the compliance of security configurations. To this end, we first elaborate on two properties, namely intrusion monitoring configuration preservation and VPN/IPsec protection configuration preservation. Then, we derive a set of formulas that compare security configurations before and after migration. This allows reasoning on whether the aforementioned security properties hold. To this end, we encode these formulas as constraint satisfaction problems. The obtained constraints are then submitted to a constraint solver, namely Sugar, in order to verify the properties and to pinpoint potential misconfiguration problems.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124072344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 IEEE International Conference on Cloud Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1