首页 > 最新文献

2014 IEEE International Conference on Cloud Engineering最新文献

英文 中文
Provisioning, Placement and Pipelining Strategies for Data-Intensive Applications in Cloud Environments 云环境中数据密集型应用程序的配置、放置和流水线策略
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.66
D. Ghoshal, L. Ramakrishnan
Clouds are increasingly being used for running data-intensive scientific applications. Data-intensive science applications need performance, scalability and reliability. However, these can be hard to achieve in cloud environments. Intelligent strategies are required to obtain better performance, scalability and reliability on cloud platforms. In this paper, we propose a set of pipelining strategies to effectively utilize provisioned cloud resources. Our experiments on the ExoGENI cloud testbed demonstrates the effectiveness of our approach in increasing performance and reducing failures.
云越来越多地被用于运行数据密集型科学应用程序。数据密集型科学应用需要性能、可扩展性和可靠性。然而,这些在云环境中很难实现。为了在云平台上获得更好的性能、可扩展性和可靠性,需要智能策略。在本文中,我们提出了一套流水线策略来有效地利用所提供的云资源。我们在ExoGENI云测试平台上的实验证明了我们的方法在提高性能和减少故障方面的有效性。
{"title":"Provisioning, Placement and Pipelining Strategies for Data-Intensive Applications in Cloud Environments","authors":"D. Ghoshal, L. Ramakrishnan","doi":"10.1109/IC2E.2014.66","DOIUrl":"https://doi.org/10.1109/IC2E.2014.66","url":null,"abstract":"Clouds are increasingly being used for running data-intensive scientific applications. Data-intensive science applications need performance, scalability and reliability. However, these can be hard to achieve in cloud environments. Intelligent strategies are required to obtain better performance, scalability and reliability on cloud platforms. In this paper, we propose a set of pipelining strategies to effectively utilize provisioned cloud resources. Our experiments on the ExoGENI cloud testbed demonstrates the effectiveness of our approach in increasing performance and reducing failures.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130954868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cloud Password Manager Using Privacy-Preserved Biometrics 云密码管理使用隐私保护的生物识别技术
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.91
Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan V. Petrovic, C. Busch
Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts, while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience dilemma by storing and retrieving multiple existing passwords using one master password. On the other hand, a password manager liberates human brain by enabling people to generate strong passwords without worry about memorizing them. While a password manager provides a convenient and secure way to managing multiple passwords, it centralizes the passwords storage and shifts the risk of passwords leakage from distributed service providers to a software or token authenticated by a single master password. Concerned about this one master password based security, biometrics could be used as a second factor for authentication by verifying the ownership of the master password. However, biometrics based authentication is more privacy concerned than a non-biometric password manager. In this paper we propose a cloud password manager scheme exploiting privacy enhanced biometrics, which achieves both security and convenience in a privacy-enhanced way. The proposed password manager scheme relies on a cloud service to synchronize all local password manager clients in an encrypted form, which is efficient to deploy the updates and secure against untrusted cloud service providers.
对所有web服务使用一个密码是不安全的,因为密码泄露会危及所有web服务帐户,而对不同的web服务使用独立的密码则不方便身份索赔者记忆。密码管理器通过使用一个主密码存储和检索多个现有密码来解决这种安全性-便利性难题。另一方面,密码管理器解放了人类的大脑,让人们不用担心记住它们,就能生成强密码。虽然密码管理器提供了一种方便和安全的方式来管理多个密码,但它集中了密码存储,并将密码泄露的风险从分布式服务提供商转移到由单个主密码验证的软件或令牌上。考虑到这种基于主密码的安全性,生物识别技术可以通过验证主密码的所有权来作为身份验证的第二个因素。然而,基于生物识别的身份验证比非生物识别密码管理器更关注隐私。本文提出了一种利用隐私增强生物识别技术的云密码管理方案,以增强隐私的方式实现了安全性和便利性。所提出的密码管理器方案依赖于云服务以加密形式同步所有本地密码管理器客户端,从而有效地部署更新并防止不受信任的云服务提供商。
{"title":"Cloud Password Manager Using Privacy-Preserved Biometrics","authors":"Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan V. Petrovic, C. Busch","doi":"10.1109/IC2E.2014.91","DOIUrl":"https://doi.org/10.1109/IC2E.2014.91","url":null,"abstract":"Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts, while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience dilemma by storing and retrieving multiple existing passwords using one master password. On the other hand, a password manager liberates human brain by enabling people to generate strong passwords without worry about memorizing them. While a password manager provides a convenient and secure way to managing multiple passwords, it centralizes the passwords storage and shifts the risk of passwords leakage from distributed service providers to a software or token authenticated by a single master password. Concerned about this one master password based security, biometrics could be used as a second factor for authentication by verifying the ownership of the master password. However, biometrics based authentication is more privacy concerned than a non-biometric password manager. In this paper we propose a cloud password manager scheme exploiting privacy enhanced biometrics, which achieves both security and convenience in a privacy-enhanced way. The proposed password manager scheme relies on a cloud service to synchronize all local password manager clients in an encrypted form, which is efficient to deploy the updates and secure against untrusted cloud service providers.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
CloudVMI: Virtual Machine Introspection as a Cloud Service CloudVMI:作为云服务的虚拟机自省
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.82
H. Baek, Abhinav Srivastava, J. Merwe
Virtual machine introspection (VMI) is a mechanism that allows indirect inspection and manipulation of the state of virtual machines. The indirection of this approach offers attractive isolation properties that has resulted in a variety of VMI-based applications dealing with security, performance, and debugging in virtual machine environments. Because it requires privileged access to the virtual machine monitor, VMI functionality is unfortunately not available to cloud users on public cloud platforms. In this paper, we present our work on the CloudVMI architecture to address this concern. CloudVMI virtualizes the VMI interface and makes it available as-a-service in a cloud environment. Because it allows introspection of users' VMs running on arbitrary physical machines in a cloud environment, our VMI-as-a-service abstraction allows a new class of cloud-centric VMI applications to be developed. We present the design and implementation of CloudVMI in the Xen hypervisor environment. We evaluate our implementation using a number of VMI applications, including a simple application that illustrates the cross-physical machine capabilities of CloudVMI.
虚拟机自省(VMI)是一种允许间接检查和操作虚拟机状态的机制。这种方法的间接性提供了有吸引力的隔离属性,从而产生了在虚拟机环境中处理安全性、性能和调试的各种基于vmi的应用程序。由于VMI需要对虚拟机监视器的特权访问,因此遗憾的是,公共云平台上的云用户无法使用VMI功能。在本文中,我们介绍了我们在CloudVMI架构上的工作,以解决这个问题。CloudVMI对VMI接口进行虚拟化,并使其在云环境中作为服务可用。因为它允许对运行在云环境中任意物理机器上的用户vm进行自省,所以我们的VMI即服务抽象允许开发一类新的以云为中心的VMI应用程序。我们介绍了在Xen管理程序环境中CloudVMI的设计和实现。我们使用许多VMI应用程序来评估我们的实现,其中包括一个简单的应用程序,它演示了CloudVMI的跨物理机功能。
{"title":"CloudVMI: Virtual Machine Introspection as a Cloud Service","authors":"H. Baek, Abhinav Srivastava, J. Merwe","doi":"10.1109/IC2E.2014.82","DOIUrl":"https://doi.org/10.1109/IC2E.2014.82","url":null,"abstract":"Virtual machine introspection (VMI) is a mechanism that allows indirect inspection and manipulation of the state of virtual machines. The indirection of this approach offers attractive isolation properties that has resulted in a variety of VMI-based applications dealing with security, performance, and debugging in virtual machine environments. Because it requires privileged access to the virtual machine monitor, VMI functionality is unfortunately not available to cloud users on public cloud platforms. In this paper, we present our work on the CloudVMI architecture to address this concern. CloudVMI virtualizes the VMI interface and makes it available as-a-service in a cloud environment. Because it allows introspection of users' VMs running on arbitrary physical machines in a cloud environment, our VMI-as-a-service abstraction allows a new class of cloud-centric VMI applications to be developed. We present the design and implementation of CloudVMI in the Xen hypervisor environment. We evaluate our implementation using a number of VMI applications, including a simple application that illustrates the cross-physical machine capabilities of CloudVMI.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122077479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy 用于多租户的软件定义的可扩展和自治架构
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.46
M. F. Ahmed, C. Talhi, M. Pourzandi, M. Cheriet
Scalability for distributed Data Center Networks (DCNs) has long been a goal of the network research and industrial community. To support dynamically increasing demands from multi-tenants, the network providers have to duplicate or share virtual resources for satisfying tenants' requests. However, current Software-Defined Networking (SDN) architectures have major drawbacks including lack of scalability and cross Virtual Tenant Network (VTN) communication. They rely only on the flexibility of control plane and neglect management plane important role. SDN scalability bottleneck affects directly the network/VTN scalability. In front of the fast growing network, it is widely accepted that the network of the future will require more capabilities such as self-awareness, self-control and self-management. At the core of these challenges is providing elastic isolation for multi-tenancy and involving tenant in management and control to reach the scalability objective and reduce the complexity of management operations of large DCNs. To address these challenges, the Open virtual Network Management and Security (Open vNMS) is proposed for supporting transparent multi-tenancy while both network and VTN scalability is solved. Basing on elastic L2 isolation using SDN components' flexibility, we design an autonomic architecture to provide self-control, self-management and self-adaptive capabilities for the network. The experiment results showed that the proposed design offers negligible overhead and guarantees the network performance.
分布式数据中心网络(DCNs)的可扩展性一直是网络研究和工业界所追求的目标。为了支持多租户动态增长的需求,网络提供商必须复制或共享虚拟资源,以满足租户的请求。然而,当前的软件定义网络(SDN)架构存在主要缺陷,包括缺乏可扩展性和跨虚拟租户网络(VTN)通信。它们只依赖于控制平面的灵活性,而忽视了管理平面的重要作用。SDN可扩展性瓶颈直接影响到网络/VTN的可扩展性。面对快速增长的网络,人们普遍认为未来的网络将需要更多的能力,如自我意识、自我控制和自我管理。这些挑战的核心是为多租户提供弹性隔离,并让租户参与管理和控制,以达到可伸缩性目标并降低大型dcn管理操作的复杂性。为了应对这些挑战,开放虚拟网络管理和安全(Open vNMS)被提出,以支持透明的多租户,同时解决网络和VTN的可扩展性。基于弹性L2隔离,利用SDN组件的灵活性,我们设计了一个自主架构,为网络提供自我控制、自我管理和自适应能力。实验结果表明,该设计可以忽略开销,保证了网络性能。
{"title":"A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy","authors":"M. F. Ahmed, C. Talhi, M. Pourzandi, M. Cheriet","doi":"10.1109/IC2E.2014.46","DOIUrl":"https://doi.org/10.1109/IC2E.2014.46","url":null,"abstract":"Scalability for distributed Data Center Networks (DCNs) has long been a goal of the network research and industrial community. To support dynamically increasing demands from multi-tenants, the network providers have to duplicate or share virtual resources for satisfying tenants' requests. However, current Software-Defined Networking (SDN) architectures have major drawbacks including lack of scalability and cross Virtual Tenant Network (VTN) communication. They rely only on the flexibility of control plane and neglect management plane important role. SDN scalability bottleneck affects directly the network/VTN scalability. In front of the fast growing network, it is widely accepted that the network of the future will require more capabilities such as self-awareness, self-control and self-management. At the core of these challenges is providing elastic isolation for multi-tenancy and involving tenant in management and control to reach the scalability objective and reduce the complexity of management operations of large DCNs. To address these challenges, the Open virtual Network Management and Security (Open vNMS) is proposed for supporting transparent multi-tenancy while both network and VTN scalability is solved. Basing on elastic L2 isolation using SDN components' flexibility, we design an autonomic architecture to provide self-control, self-management and self-adaptive capabilities for the network. The experiment results showed that the proposed design offers negligible overhead and guarantees the network performance.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud QoS Scaling by Fuzzy Logic 基于模糊逻辑的云QoS扩展
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.30
Stefan Frey, Claudia Lüthje, C. Reich, N. Clarke
One of the biggest advantages of cloud infrastructures is the elasticity. Cloud services are monitored and based on the resource utilization and performance load, they get scaled up or down, by provision or de-provision of cloud resources. The goal is to guarantee the customers an acceptable performance with a minimum of resources. Such Quality of Service (QoS) characteristics are stated in a contract, called Service Level Agreement (SLA) negotiated between customer and provider. The approach of this paper shows that with additional imprecise information (e.g. expected daytime/week- time performance) modeled with fuzzy logic and used in a behavior, load and performance prediction model, the up and down scaling mechanism of a cloud service can be optimized. Evaluation results confirm, that using this approach, SLA violation can be minimized.
云基础设施的最大优势之一是弹性。对云服务进行监控,并基于资源利用率和性能负载,通过提供或取消云资源来扩展或缩小云服务。目标是用最少的资源保证客户获得可接受的性能。这种服务质量(QoS)特征是在客户和提供商之间协商的称为服务水平协议(SLA)的合同中说明的。本文的方法表明,在行为、负载和性能预测模型中使用模糊逻辑建模的附加不精确信息(例如期望的白天/周时间性能),可以优化云服务的上下扩展机制。评估结果证实,使用该方法可以最大限度地减少SLA违规。
{"title":"Cloud QoS Scaling by Fuzzy Logic","authors":"Stefan Frey, Claudia Lüthje, C. Reich, N. Clarke","doi":"10.1109/IC2E.2014.30","DOIUrl":"https://doi.org/10.1109/IC2E.2014.30","url":null,"abstract":"One of the biggest advantages of cloud infrastructures is the elasticity. Cloud services are monitored and based on the resource utilization and performance load, they get scaled up or down, by provision or de-provision of cloud resources. The goal is to guarantee the customers an acceptable performance with a minimum of resources. Such Quality of Service (QoS) characteristics are stated in a contract, called Service Level Agreement (SLA) negotiated between customer and provider. The approach of this paper shows that with additional imprecise information (e.g. expected daytime/week- time performance) modeled with fuzzy logic and used in a behavior, load and performance prediction model, the up and down scaling mechanism of a cloud service can be optimized. Evaluation results confirm, that using this approach, SLA violation can be minimized.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Data Loss: An Empirical Analysis in Search of Best Practices for Prevention 数据丢失:寻找最佳预防措施的实证分析
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.11
L. Fiondella, R. El-Kharboutly, S. Gokhale
The cost an convenience of cloud computing has motivated many organizations to migrate their data and application services to cloud platforms, yet information security concerns persist. Data loss incidents experienced by organizations over the past decade offer many valuable lessons, which are highly relevant to the present trend of storing sensitive data in clouds. This paper presents our analysis of the DataLoss db, an Open Source Foundation project to collect information on data loss incidents throughout the world. The historical probability of recovering data after it is lost is low, suggesting that the design and implementation of an enterprise wide data protection plan may be the most effective method to mitigate the risk of data loss. Our analysis includes an examination of the cases where data was recovered, drawing insights where better data protection policies and procedures could avoid similar losses in the future.
云计算的成本和便利性促使许多组织将其数据和应用程序服务迁移到云平台,但信息安全问题仍然存在。组织在过去十年中经历的数据丢失事件提供了许多宝贵的经验教训,这些经验教训与当前在云中存储敏感数据的趋势高度相关。本文介绍了我们对DataLoss数据库的分析,DataLoss数据库是一个开源基金会项目,用于收集世界各地数据丢失事件的信息。数据丢失后恢复的历史概率很低,这表明设计和实施企业范围的数据保护计划可能是减轻数据丢失风险的最有效方法。我们的分析包括对数据恢复案例的检查,从中得出更好的数据保护政策和程序可以避免未来类似损失的见解。
{"title":"Data Loss: An Empirical Analysis in Search of Best Practices for Prevention","authors":"L. Fiondella, R. El-Kharboutly, S. Gokhale","doi":"10.1109/IC2E.2014.11","DOIUrl":"https://doi.org/10.1109/IC2E.2014.11","url":null,"abstract":"The cost an convenience of cloud computing has motivated many organizations to migrate their data and application services to cloud platforms, yet information security concerns persist. Data loss incidents experienced by organizations over the past decade offer many valuable lessons, which are highly relevant to the present trend of storing sensitive data in clouds. This paper presents our analysis of the DataLoss db, an Open Source Foundation project to collect information on data loss incidents throughout the world. The historical probability of recovering data after it is lost is low, suggesting that the design and implementation of an enterprise wide data protection plan may be the most effective method to mitigate the risk of data loss. Our analysis includes an examination of the cases where data was recovered, drawing insights where better data protection policies and procedures could avoid similar losses in the future.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns 异构云间环境中的联邦访问控制:基本模型和体系结构模式
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.84
Y. Demchenko, C. Ngo, C. D. Laat, Craig A. Lee
This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF) which is a part of the general Intercloud Architecture Framework (ICAF) proposed by authors in earlier works. ICFF attempts to address the interoperability and integration issues in provisioning on-demand multi-provider multi-domain heterogeneous cloud infrastructure services. The paper describes the major inter-cloud federation scenarios that in general involve two types of federations: customer-side federation that includes federation between cloud based services and customer campus or enterprise infrastructure, and provider-side federation that is created by a group of cloud providers to outsource or broker their resources when provisioning services to customers. The proposed federated access control model uses Federated Identity Management (FIDM) model that can be also supported by the trusted third party entities such as Cloud Service Broker (CSB) and/or trust broker to establish dynamic trust relations between entities without previously existing trust. The research analyses different federated identity management scenarios, defines the basic architecture patterns and the main components of the distributed federated multi-domain Authentication and Authorisation infrastructure.
本文介绍了在异构(多提供者)多云和云间环境中定义联邦访问控制的基本模型和体系结构模式的研究进展。所提出的研究有助于进一步定义云间联合框架(ICFF),该框架是作者在早期工作中提出的通用云间架构框架(ICAF)的一部分。ICFF试图解决供应按需多提供者多域异构云基础设施服务中的互操作性和集成问题。本文描述了主要的云间联合场景,通常涉及两种类型的联合:客户端联合,包括基于云的服务与客户园区或企业基础设施之间的联合;提供商端联合,由一组云提供商创建,用于在向客户提供服务时外包或代理其资源。建议的联邦访问控制模型使用联邦身份管理(FIDM)模型,该模型也可以由受信任的第三方实体(如云服务代理(CSB)和/或信任代理)支持,以在实体之间建立动态信任关系,而不需要先前存在的信任。本研究分析了不同的联邦身份管理场景,定义了分布式联邦多域认证与授权基础架构的基本体系结构模式和主要组件。
{"title":"Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns","authors":"Y. Demchenko, C. Ngo, C. D. Laat, Craig A. Lee","doi":"10.1109/IC2E.2014.84","DOIUrl":"https://doi.org/10.1109/IC2E.2014.84","url":null,"abstract":"This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF) which is a part of the general Intercloud Architecture Framework (ICAF) proposed by authors in earlier works. ICFF attempts to address the interoperability and integration issues in provisioning on-demand multi-provider multi-domain heterogeneous cloud infrastructure services. The paper describes the major inter-cloud federation scenarios that in general involve two types of federations: customer-side federation that includes federation between cloud based services and customer campus or enterprise infrastructure, and provider-side federation that is created by a group of cloud providers to outsource or broker their resources when provisioning services to customers. The proposed federated access control model uses Federated Identity Management (FIDM) model that can be also supported by the trusted third party entities such as Cloud Service Broker (CSB) and/or trust broker to establish dynamic trust relations between entities without previously existing trust. The research analyses different federated identity management scenarios, defines the basic architecture patterns and the main components of the distributed federated multi-domain Authentication and Authorisation infrastructure.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133176279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Towards Software Product Lines Based Cloud Architectures 面向基于云架构的软件产品线
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.10
Mohammad Abu-Matar, R. Mizouni, Salwa Mohamed Alzahmi
Cloud computing has emerged as a model for utility computing that promotes on-demand scalability, flexible application deployment and reuse. Software product lines (SPL) promote reusable application development for product families. As any computing system, cloud-based systems evolve to respond to changing clients' requirements. Cloud-based applications can be modeled as Software-as-a-Service (SaaS) families similar to the SPL products. As SPL development techniques rely on feature models to describe the commonality and variability of family member applications, such techniques can be used to model variability in SaaS. In this paper, we describe a unified and systematic framework for modeling cloud services in a vendor-neutral manner. In addition, we demonstrate the applicability of the variability framework for building and customizing SaaS multitenant applications. Our approach is based on a meta-model that formalizes the multiple views of service-oriented SaaS applications. A proof of concept tool that automatically generates multitenant applications (to adapt to changing requirements of tenants) is presented. Our approach facilitates development of cloud SaaS families in a systematic, consistent, and platform independent way.
云计算已经成为效用计算的一种模型,它促进了按需可伸缩性、灵活的应用程序部署和重用。软件产品线(SPL)促进产品系列的可重用应用程序开发。与任何计算系统一样,基于云的系统也在不断发展,以响应不断变化的客户需求。基于云的应用程序可以建模为类似于SPL产品的软件即服务(SaaS)系列。由于SPL开发技术依赖于特性模型来描述家族成员应用程序的通用性和可变性,因此此类技术可用于为SaaS中的可变性建模。在本文中,我们描述了一个统一和系统的框架,用于以供应商中立的方式对云服务进行建模。此外,我们还演示了可变性框架在构建和定制SaaS多租户应用程序方面的适用性。我们的方法基于元模型,该模型形式化了面向服务的SaaS应用程序的多个视图。介绍了一个概念验证工具,它可以自动生成多租户应用程序(以适应租户不断变化的需求)。我们的方法以系统、一致和平台独立的方式促进了云SaaS家族的开发。
{"title":"Towards Software Product Lines Based Cloud Architectures","authors":"Mohammad Abu-Matar, R. Mizouni, Salwa Mohamed Alzahmi","doi":"10.1109/IC2E.2014.10","DOIUrl":"https://doi.org/10.1109/IC2E.2014.10","url":null,"abstract":"Cloud computing has emerged as a model for utility computing that promotes on-demand scalability, flexible application deployment and reuse. Software product lines (SPL) promote reusable application development for product families. As any computing system, cloud-based systems evolve to respond to changing clients' requirements. Cloud-based applications can be modeled as Software-as-a-Service (SaaS) families similar to the SPL products. As SPL development techniques rely on feature models to describe the commonality and variability of family member applications, such techniques can be used to model variability in SaaS. In this paper, we describe a unified and systematic framework for modeling cloud services in a vendor-neutral manner. In addition, we demonstrate the applicability of the variability framework for building and customizing SaaS multitenant applications. Our approach is based on a meta-model that formalizes the multiple views of service-oriented SaaS applications. A proof of concept tool that automatically generates multitenant applications (to adapt to changing requirements of tenants) is presented. Our approach facilitates development of cloud SaaS families in a systematic, consistent, and platform independent way.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133285629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Federation and Revenue Sharing in Cloud Computing Environment 云计算环境下的联邦与收益共享
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.78
Bassem El Zant, Isabel Amigo, M. Gagnaire
In Cloud computing, resources such as CPU, RAM, and disk etc. are provided as a service via the Internet. Elasticity is a key feature of Cloud Computing. It aims to enabling a Cloud Service Provider (CSP) to negotiate the possibility to borrow external resources from other CSPs when its own facilities are not able to satisfy a client request. Reciprocally, a CSP may sell some of its unused resources to another CSP in case of under load. Today, Cloud Federation is a key approach considered for Cloud elasticity. In the context of the Easi-Clouds European ITEA 2 research project, we aim to develop Pricing-as-a-Service (PraaS) suited to the Federated Cloud environment. The aim of this paper is twofold. First, we provide a state of the art of the pricing and revenue sharing models in federated environment. We discuss the specifications of Cloud Federation as well as its different drivers and barriers. Three types of pricing strategies (on-demand, spot and reserved) are presented. In the second part, we present the problem of revenue sharing in the federation with some properties we are willing to fulfill. We propose and evaluate our revenue sharing model suited to the Federated environment with numerical analysis via simulation. We compare our approach to the proportional share and the Shapley value method. Finally, we provide and analyze the results of our simulations with our conclusion and perspectives.
在云计算中,诸如CPU、RAM和磁盘等资源通过Internet作为服务提供。弹性是云计算的一个关键特性。它旨在使云服务提供商(CSP)在自身设施无法满足客户请求时,能够协商从其他CSP借用外部资源的可能性。反过来,在负荷不足的情况下,一个CSP可以将一些未使用的资源出售给另一个CSP。今天,云联合是考虑云弹性的关键方法。在Easi-Clouds欧洲ITEA 2研究项目的背景下,我们的目标是开发适合联邦云环境的定价即服务(PraaS)。本文的目的是双重的。首先,我们提供了联邦环境中最先进的定价和收益共享模型。我们讨论了Cloud Federation的规范,以及它的不同驱动因素和障碍。提出了三种类型的定价策略(按需、现货和保留)。在第二部分中,我们提出了联邦制的收入分成问题,并提出了一些我们愿意实现的属性。我们提出并评估了适合联邦环境的收益共享模型,并通过仿真进行了数值分析。我们将我们的方法与比例份额法和Shapley值法进行比较。最后,对模拟结果进行了分析,给出了我们的结论和观点。
{"title":"Federation and Revenue Sharing in Cloud Computing Environment","authors":"Bassem El Zant, Isabel Amigo, M. Gagnaire","doi":"10.1109/IC2E.2014.78","DOIUrl":"https://doi.org/10.1109/IC2E.2014.78","url":null,"abstract":"In Cloud computing, resources such as CPU, RAM, and disk etc. are provided as a service via the Internet. Elasticity is a key feature of Cloud Computing. It aims to enabling a Cloud Service Provider (CSP) to negotiate the possibility to borrow external resources from other CSPs when its own facilities are not able to satisfy a client request. Reciprocally, a CSP may sell some of its unused resources to another CSP in case of under load. Today, Cloud Federation is a key approach considered for Cloud elasticity. In the context of the Easi-Clouds European ITEA 2 research project, we aim to develop Pricing-as-a-Service (PraaS) suited to the Federated Cloud environment. The aim of this paper is twofold. First, we provide a state of the art of the pricing and revenue sharing models in federated environment. We discuss the specifications of Cloud Federation as well as its different drivers and barriers. Three types of pricing strategies (on-demand, spot and reserved) are presented. In the second part, we present the problem of revenue sharing in the federation with some properties we are willing to fulfill. We propose and evaluate our revenue sharing model suited to the Federated environment with numerical analysis via simulation. We compare our approach to the proportional share and the Shapley value method. Finally, we provide and analyze the results of our simulations with our conclusion and perspectives.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133298989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Verification Platform for SDN-Enabled Applications 支持sdn的应用验证平台
Pub Date : 2014-03-11 DOI: 10.1109/IC2E.2014.72
R. Skowyra, A. Lapets, Azer Bestavros, A. Kfoury
Recent work on integration of SDNs with application-layer systems like Hadoop has created a class of system, SDN-Enabled Applications, which implement application-specific functionality on the network layer by exposing network monitoring and control semantics to application developers. This requires domain-specific knowledge to correctly reason about network behavior and properties, as the SDN is now tightly coupled to the larger system. Existing tools for SDN verification and analysis are insufficiently expressive to capture this composition of network and domain models. Unfortunately, it is exactly this kind of automated reasoning and verification that is necessary to develop robust SDN-enabled applications for real-world systems. In this paper, we present ongoing work on Verificare, a verification platform being built to enable formal verification of SDNs as components of a larger domain-specific system. SLA, safety, and security requirements can selected from a variety of formal libraries and automatically verified using a variety of off-the-shelf tools. This approach not only extends the flexibility of existing SDN verification systems, but can actually provide more fine-grained analysis of possible network states due to extra information supplied by the domain model.
最近将sdn与应用程序层系统(如Hadoop)集成的工作创建了一类系统,SDN-Enabled Applications,它通过向应用程序开发人员公开网络监视和控制语义,在网络层实现特定于应用程序的功能。这需要特定于领域的知识来正确推断网络行为和属性,因为SDN现在与更大的系统紧密耦合。用于SDN验证和分析的现有工具不足以表达网络和领域模型的这种组合。不幸的是,这种自动推理和验证正是为现实世界的系统开发健壮的支持sdn的应用程序所必需的。在本文中,我们介绍了正在进行的关于Verificare的工作,这是一个正在构建的验证平台,用于将sdn作为更大的特定领域系统的组件进行正式验证。可以从各种正式的库中选择SLA、安全性和安全性需求,并使用各种现成的工具进行自动验证。这种方法不仅扩展了现有SDN验证系统的灵活性,而且由于域模型提供了额外的信息,实际上可以对可能的网络状态提供更细粒度的分析。
{"title":"A Verification Platform for SDN-Enabled Applications","authors":"R. Skowyra, A. Lapets, Azer Bestavros, A. Kfoury","doi":"10.1109/IC2E.2014.72","DOIUrl":"https://doi.org/10.1109/IC2E.2014.72","url":null,"abstract":"Recent work on integration of SDNs with application-layer systems like Hadoop has created a class of system, SDN-Enabled Applications, which implement application-specific functionality on the network layer by exposing network monitoring and control semantics to application developers. This requires domain-specific knowledge to correctly reason about network behavior and properties, as the SDN is now tightly coupled to the larger system. Existing tools for SDN verification and analysis are insufficiently expressive to capture this composition of network and domain models. Unfortunately, it is exactly this kind of automated reasoning and verification that is necessary to develop robust SDN-enabled applications for real-world systems. In this paper, we present ongoing work on Verificare, a verification platform being built to enable formal verification of SDNs as components of a larger domain-specific system. SLA, safety, and security requirements can selected from a variety of formal libraries and automatically verified using a variety of off-the-shelf tools. This approach not only extends the flexibility of existing SDN verification systems, but can actually provide more fine-grained analysis of possible network states due to extra information supplied by the domain model.","PeriodicalId":273902,"journal":{"name":"2014 IEEE International Conference on Cloud Engineering","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2014 IEEE International Conference on Cloud Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1