首页 > 最新文献

2014 IEEE 7th International Conference on Cloud Computing最新文献

英文 中文
Virtual Numbers for Virtual Machines? 虚拟机的虚拟号码?
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.147
Yu Shyang Tan, R. Ko, V. Mendiratta
Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardware's specifications. Such naive and linear estimation methods mostly yield impractical limits as to how many VMs the hardware can actually support. It was found that if we base on the naive division method, user experience on VMs at those limits would be severely degraded. In this paper, we demonstrate through experimental results, the significant gap between the limits derived using the estimation method mentioned above and the actual situation. We believe for a more practicable estimation of the limits of the underlying infrastructure, dominant workload of VMs should also be factored in.
了解云物理硬件可以(进一步)支持的虚拟机(vm)的数量至关重要,因为它影响到供应和硬件采购。然而,目前估计给定硬件上可能的最大虚拟机数量的方法通常是虚拟机规格与底层云硬件规格的比率。这种幼稚的线性估计方法通常会对硬件实际支持的虚拟机数量产生不切实际的限制。我们发现,如果我们基于朴素的除法,在这些限制下的vm上的用户体验将会严重下降。在本文中,我们通过实验结果证明,使用上述估计方法得出的极限与实际情况有很大的差距。我们认为,为了更切实可行地估计底层基础设施的限制,还应该考虑vm的主要工作负载。
{"title":"Virtual Numbers for Virtual Machines?","authors":"Yu Shyang Tan, R. Ko, V. Mendiratta","doi":"10.1109/CLOUD.2014.147","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.147","url":null,"abstract":"Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardware's specifications. Such naive and linear estimation methods mostly yield impractical limits as to how many VMs the hardware can actually support. It was found that if we base on the naive division method, user experience on VMs at those limits would be severely degraded. In this paper, we demonstrate through experimental results, the significant gap between the limits derived using the estimation method mentioned above and the actual situation. We believe for a more practicable estimation of the limits of the underlying infrastructure, dominant workload of VMs should also be factored in.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elastic Message Queues 弹性消息队列
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.13
Ahmed El-Rheddane, N. D. Palma, A. Tchana, D. Hagimont
Today's systems are often distributed, and connecting their different components can be challenging. Message-Oriented-Middleware (MOM) is a popular tool to insure simple and reliable communication. With the ever growing loads of today's applications, MOMs needs to be scalable. But as the load changes, static scalability often underuses the resources it requires. This paper presents an elastic message queuing system leveraging cloud's on-demand resource provisioning, which allows the use of just enough resources to handle the current load. We will detail when and how provisioning decisions are made, and show the result of our system's evaluation on Amazon EC2 public cloud. This work is based on Joram, an open-source JMS compliant MOM and is now part of its distribution on OW2 consortium's website.
当今的系统通常是分布式的,连接它们的不同组件可能具有挑战性。面向消息的中间件(message - oriented middleware, MOM)是一种确保简单可靠通信的流行工具。随着当今应用程序负载的不断增长,mom需要具有可伸缩性。但是,随着负载的变化,静态可伸缩性通常无法充分利用所需的资源。本文介绍了一个利用云的按需资源配置的弹性消息队列系统,它允许使用刚好足够的资源来处理当前负载。我们将详细说明何时以及如何做出供应决策,并展示我们的系统在Amazon EC2公共云上的评估结果。这项工作基于Joram,这是一个兼容JMS的开源MOM,现在是OW2联盟网站上发布的一部分。
{"title":"Elastic Message Queues","authors":"Ahmed El-Rheddane, N. D. Palma, A. Tchana, D. Hagimont","doi":"10.1109/CLOUD.2014.13","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.13","url":null,"abstract":"Today's systems are often distributed, and connecting their different components can be challenging. Message-Oriented-Middleware (MOM) is a popular tool to insure simple and reliable communication. With the ever growing loads of today's applications, MOMs needs to be scalable. But as the load changes, static scalability often underuses the resources it requires. This paper presents an elastic message queuing system leveraging cloud's on-demand resource provisioning, which allows the use of just enough resources to handle the current load. We will detail when and how provisioning decisions are made, and show the result of our system's evaluation on Amazon EC2 public cloud. This work is based on Joram, an open-source JMS compliant MOM and is now part of its distribution on OW2 consortium's website.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Federating Web-Based Applications on a Hierarchical Cloud 在分层云上联合基于web的应用程序
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.136
Dan Han, Eleni Stroulia
Cloud-based infrastructures enable applications to collect and analyze massive amounts of data. Sometimes these applications are the product of green-field engineering, but frequently they are the product of the evolution of traditional RDBMS-based implementations. In any case, NoSQL databases, endowed with high availability, elasticity and scalability through their easy deployment on cloud-computing platforms, have become an attractive data-storage solution for these big-data applications. Unfortunately, to date, there is little methodological and tool support for migrating existing applications to these new platforms. In this paper, we describe a hybrid architecture for location-aware applications on hierarchical cloud, a methodology for mapping relational (including spatio-temporal) data to HBase, and a process for migrating legacy applications to the new architecture.
基于云的基础设施使应用程序能够收集和分析大量数据。有时,这些应用程序是新领域工程的产物,但它们通常是传统的基于rdbms的实现发展的产物。无论如何,NoSQL数据库由于易于在云计算平台上部署,具有高可用性、弹性和可扩展性,成为这些大数据应用的一种极具吸引力的数据存储解决方案。不幸的是,到目前为止,几乎没有将现有应用程序迁移到这些新平台的方法和工具支持。在本文中,我们描述了一种用于分层云上位置感知应用程序的混合架构,一种将关系(包括时空)数据映射到HBase的方法,以及将遗留应用程序迁移到新架构的过程。
{"title":"Federating Web-Based Applications on a Hierarchical Cloud","authors":"Dan Han, Eleni Stroulia","doi":"10.1109/CLOUD.2014.136","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.136","url":null,"abstract":"Cloud-based infrastructures enable applications to collect and analyze massive amounts of data. Sometimes these applications are the product of green-field engineering, but frequently they are the product of the evolution of traditional RDBMS-based implementations. In any case, NoSQL databases, endowed with high availability, elasticity and scalability through their easy deployment on cloud-computing platforms, have become an attractive data-storage solution for these big-data applications. Unfortunately, to date, there is little methodological and tool support for migrating existing applications to these new platforms. In this paper, we describe a hybrid architecture for location-aware applications on hierarchical cloud, a methodology for mapping relational (including spatio-temporal) data to HBase, and a process for migrating legacy applications to the new architecture.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"87 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System 云的“时间”到了?基于时间的云资源管理系统的设计与实现
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.77
R. Ko, Yu Shyang Tan, Grace P. Y. Ng
The current pay-per-use model adopted by public cloud service providers has influenced the perception on how a cloud should provide its resources to end-users, i.e. on-demand and access to an unlimited amount of resources. However, not all clouds are equal. While such provisioning models work for well-endowed public clouds, they may not always work well in private clouds with limited budget and resources such as research and education clouds. Private clouds also stand to be impacted greatly by issues such as user resource hogging and the misuse of resources for nefarious activities. These problems are usually caused by challenges such as (1) limited physical servers/ budget, (2) growing number of users and (3) the inability to gracefully and automatically relinquish resources from inactive users. Currently, cloud resource management frameworks used for private cloud setups, such as OpenStack and CloudStack, only uses the pay-per-use model as the basis when provisioning resources to users. In this paper, we propose OpenStack Café, a novel methodology adopting the concepts of 'time' and booking systems' to manage resources of private clouds. By allowing users to book resources over specific time-slots, our proposed solution can efficiently and automatically help administrators manage users' access to resource, addressing the issue of resource hogging and gracefully relinquish resources back to the pool in resource-constrained private cloud setups. Work is currently in progress to adopt Café into OpenStack as a feature, and results of our prototype show promises. We also present some insights to lessons learnt during the design and implementation of our proposed methodology in this paper.
公共云服务提供商目前采用的按使用付费模式影响了人们对云应如何向最终用户提供资源的看法,即按需和无限量地访问资源。然而,并非所有的云都是一样的。虽然这种配置模型适用于资源丰富的公共云,但它们可能并不总是适用于预算和资源有限的私有云,如研究和教育云。私有云还会受到用户资源占用和资源滥用等问题的严重影响。这些问题通常是由以下挑战引起的:(1)有限的物理服务器/预算;(2)不断增长的用户数量;(3)无法优雅地、自动地放弃非活动用户的资源。目前,用于私有云设置的云资源管理框架,如OpenStack和CloudStack,在向用户提供资源时仅使用按使用付费模式作为基础。在本文中,我们提出了OpenStack cafeit,这是一种采用“时间”和“预订系统”概念来管理私有云资源的新方法。通过允许用户在特定时间段预订资源,我们提出的解决方案可以有效且自动地帮助管理员管理用户对资源的访问,解决资源占用问题,并在资源受限的私有云设置中优雅地将资源释放回池中。目前,将cafee作为一项功能引入OpenStack的工作正在进行中,我们的原型结果显示出了希望。在本文中,我们还提出了在设计和实施我们提出的方法过程中吸取的一些经验教训。
{"title":"'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System","authors":"R. Ko, Yu Shyang Tan, Grace P. Y. Ng","doi":"10.1109/CLOUD.2014.77","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.77","url":null,"abstract":"The current pay-per-use model adopted by public cloud service providers has influenced the perception on how a cloud should provide its resources to end-users, i.e. on-demand and access to an unlimited amount of resources. However, not all clouds are equal. While such provisioning models work for well-endowed public clouds, they may not always work well in private clouds with limited budget and resources such as research and education clouds. Private clouds also stand to be impacted greatly by issues such as user resource hogging and the misuse of resources for nefarious activities. These problems are usually caused by challenges such as (1) limited physical servers/ budget, (2) growing number of users and (3) the inability to gracefully and automatically relinquish resources from inactive users. Currently, cloud resource management frameworks used for private cloud setups, such as OpenStack and CloudStack, only uses the pay-per-use model as the basis when provisioning resources to users. In this paper, we propose OpenStack Café, a novel methodology adopting the concepts of 'time' and booking systems' to manage resources of private clouds. By allowing users to book resources over specific time-slots, our proposed solution can efficiently and automatically help administrators manage users' access to resource, addressing the issue of resource hogging and gracefully relinquish resources back to the pool in resource-constrained private cloud setups. Work is currently in progress to adopt Café into OpenStack as a feature, and results of our prototype show promises. We also present some insights to lessons learnt during the design and implementation of our proposed methodology in this paper.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
User-Friendly Visualization of Cloud Quality 用户友好的云质量可视化
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.122
Yvonne Thoß, Christoph Pohl, M. Hoffmann, Josef Spillner, A. Schill
The cloud computing paradigm is one of the most promising of its kind. The demand and supply of online delivered software have been continuously growing. However, reports have shown that various Software as a service solutions have not succeeded in reaching cloud user expectations. Hence, users need to be satisfied with the service quality which is determined by the fulfillment of both functional and non-functional requirements. Currently, the evaluation of the cloud service quality consider-ing individual requirements is up to the user. Unfortunately, the amount of non-functional quality criteria is very high and some are laborious to determine. We believe that an information system could support and enable users without specific knowledge to evaluate comprehensively and rapidly the quality of their cloud. In this paper we first present a quality model for SaaS. In addition, we demonstrate how the quality information should be structured and visualized in a user-friendly way. With the provided transparency users are able to establish quality awareness in the long term.
云计算范式是这类范式中最有前途的一种。在线交付软件的需求和供给不断增长。然而,报告显示,各种软件即服务解决方案并没有成功地达到云用户的期望。因此,用户需要对服务质量感到满意,而服务质量是由功能需求和非功能需求的实现决定的。目前,考虑个人需求的云服务质量评估取决于用户。不幸的是,非功能性质量标准的数量非常多,有些标准很难确定。我们认为,一个信息系统可以支持并使没有特定知识的用户全面、快速地评估其云的质量。在本文中,我们首先提出了SaaS的质量模型。此外,我们还演示了如何以用户友好的方式对质量信息进行结构化和可视化。通过提供的透明度,用户能够长期建立质量意识。
{"title":"User-Friendly Visualization of Cloud Quality","authors":"Yvonne Thoß, Christoph Pohl, M. Hoffmann, Josef Spillner, A. Schill","doi":"10.1109/CLOUD.2014.122","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.122","url":null,"abstract":"The cloud computing paradigm is one of the most promising of its kind. The demand and supply of online delivered software have been continuously growing. However, reports have shown that various Software as a service solutions have not succeeded in reaching cloud user expectations. Hence, users need to be satisfied with the service quality which is determined by the fulfillment of both functional and non-functional requirements. Currently, the evaluation of the cloud service quality consider-ing individual requirements is up to the user. Unfortunately, the amount of non-functional quality criteria is very high and some are laborious to determine. We believe that an information system could support and enable users without specific knowledge to evaluate comprehensively and rapidly the quality of their cloud. In this paper we first present a quality model for SaaS. In addition, we demonstrate how the quality information should be structured and visualized in a user-friendly way. With the provided transparency users are able to establish quality awareness in the long term.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"631 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Deletion of Outsourced Data in Cloud Computing 论云计算中外包数据的删除
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.54
Zhen Mo, Qingjun Xiao, Yian Zhou, Shigang Chen
Data security is a major concern in cloud computing. After clients outsource their data to the cloud, will they lose control of the data? Prior research has proposed various schemes for clients to confirm the existence of their data on the cloud servers, and the goal is to ensure data integrity. This paper investigates a complementary problem: When clients delete data, how can they be sure that the deleted data will never resurface in the future if the clients do not perform the actual data removal themselves? How to confirm the non-existence of their data when the data is not in their possession? One obvious solution is to encrypt the outsourced data, but this solution has a significant technical challenge because a huge amount of key materials may have to be maintained if we allow fine-grained deletion. In this paper, we explore the feasibility of relieving clients from such a burden by outsourcing keys (after encryption) to the cloud. We propose a novel multi-layered key structure, called Recursively Encrypted Red-black Key tree (RERK), that ensures no key materials will be leaked, yet the client is able to manipulate keys by performing tree operations in collaboration with the servers. We implement our solution on the Amazon EC2. The experimental results show that our solution can efficiently support the deletion of outsourced data in cloud computing.
数据安全是云计算中的一个主要问题。客户将数据外包到云端后,他们会失去对数据的控制吗?之前的研究已经为客户提出了各种方案来确认其数据在云服务器上的存在,目标是确保数据的完整性。本文研究了一个补充问题:当客户端删除数据时,如果客户端自己不执行实际的数据删除,他们如何确保被删除的数据将来不会重新出现?当数据不属于他们时,如何确认数据不存在?一个显而易见的解决方案是对外包数据进行加密,但该解决方案具有重大的技术挑战,因为如果我们允许细粒度删除,可能需要维护大量的关键材料。在本文中,我们探讨了通过将密钥(加密后)外包给云来减轻客户端这种负担的可行性。我们提出了一种新的多层密钥结构,称为递归加密红黑密钥树(RERK),它确保不会泄露密钥材料,但客户端能够通过与服务器协作执行树操作来操纵密钥。我们在Amazon EC2上实现我们的解决方案。实验结果表明,该方案能够有效地支持云计算中外包数据的删除。
{"title":"On Deletion of Outsourced Data in Cloud Computing","authors":"Zhen Mo, Qingjun Xiao, Yian Zhou, Shigang Chen","doi":"10.1109/CLOUD.2014.54","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.54","url":null,"abstract":"Data security is a major concern in cloud computing. After clients outsource their data to the cloud, will they lose control of the data? Prior research has proposed various schemes for clients to confirm the existence of their data on the cloud servers, and the goal is to ensure data integrity. This paper investigates a complementary problem: When clients delete data, how can they be sure that the deleted data will never resurface in the future if the clients do not perform the actual data removal themselves? How to confirm the non-existence of their data when the data is not in their possession? One obvious solution is to encrypt the outsourced data, but this solution has a significant technical challenge because a huge amount of key materials may have to be maintained if we allow fine-grained deletion. In this paper, we explore the feasibility of relieving clients from such a burden by outsourcing keys (after encryption) to the cloud. We propose a novel multi-layered key structure, called Recursively Encrypted Red-black Key tree (RERK), that ensures no key materials will be leaked, yet the client is able to manipulate keys by performing tree operations in collaboration with the servers. We implement our solution on the Amazon EC2. The experimental results show that our solution can efficiently support the deletion of outsourced data in cloud computing.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114767660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Performance Modeling to Divide Performance Interference of Virtualization and Virtual Machine Combination 划分虚拟化与虚拟机组合性能干扰的性能建模
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.43
Daichi Kimura, Eriko Numata, Masato Kawatsu
When we evaluate performance of a virtualized system, we should consider two aspects, performance interference and the number of virtual machine (VM) combinations. Performance interference is caused by sharing physical resources among VMs and virtual machine monitor (VMM) scheduling. We should precisely incorporate these effects into performance evaluation. We also need to evaluate many VM combinations to find the optimal consolidation of servers, therefore, it is important we apply an efficient evaluation method to reduce evaluation time. We propose a layered performance model to address these aspects. We regard a virtualized system as a combination of two layers: one consisting of VMs and the other consisting of VMM and physical resources. We construct a performance model for each layer. We apply the white-box approach to the VM layer model and the black-box approach to the VMM/physical resource layer model. The white-box model is flexible for representing many VM combinations and the black-box model incorporates performance interference. By allocating each aspect to each model, our proposed model evaluates performance precisely and efficiently. We discuss the effectiveness of our proposed model with a case study of storage I/O contention.
在评估虚拟化系统的性能时,我们应该考虑两个方面:性能干扰和虚拟机(VM)组合的数量。虚拟机之间共享物理资源和VMM (virtual machine monitor)调度会对性能造成干扰。我们应该准确地将这些影响纳入绩效评估。我们还需要评估许多VM组合以找到最佳的服务器整合,因此,应用有效的评估方法来减少评估时间是很重要的。我们提出了一个分层的性能模型来解决这些问题。我们将虚拟化系统视为两层的组合:一层由vm组成,另一层由VMM和物理资源组成。我们为每一层构建一个性能模型。我们对VM层模型采用白盒方法,对VMM/物理资源层模型采用黑盒方法。白盒模型可以灵活地表示许多VM组合,而黑盒模型则包含性能干扰。通过将每个方面分配给每个模型,我们提出的模型可以准确有效地评估性能。我们通过一个存储I/O争用的案例研究来讨论我们提出的模型的有效性。
{"title":"Performance Modeling to Divide Performance Interference of Virtualization and Virtual Machine Combination","authors":"Daichi Kimura, Eriko Numata, Masato Kawatsu","doi":"10.1109/CLOUD.2014.43","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.43","url":null,"abstract":"When we evaluate performance of a virtualized system, we should consider two aspects, performance interference and the number of virtual machine (VM) combinations. Performance interference is caused by sharing physical resources among VMs and virtual machine monitor (VMM) scheduling. We should precisely incorporate these effects into performance evaluation. We also need to evaluate many VM combinations to find the optimal consolidation of servers, therefore, it is important we apply an efficient evaluation method to reduce evaluation time. We propose a layered performance model to address these aspects. We regard a virtualized system as a combination of two layers: one consisting of VMs and the other consisting of VMM and physical resources. We construct a performance model for each layer. We apply the white-box approach to the VM layer model and the black-box approach to the VMM/physical resource layer model. The white-box model is flexible for representing many VM combinations and the black-box model incorporates performance interference. By allocating each aspect to each model, our proposed model evaluates performance precisely and efficiently. We discuss the effectiveness of our proposed model with a case study of storage I/O contention.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Pacemaker Failover Configuration on Mean Time to Recovery for Small Cloud Clusters 起搏器故障切换配置对小型云集群平均恢复时间的影响
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.59
Konstantin Benz, T. Bohnert
In cloud environments High Availability characteristics are established by the usage of failover software (like e.g. HAProxy, Keepalive or Pacemaker). Though these tools enable automatic recovery of cloud services from outages, the recovery can still be very slow if it is not configured adequately. In this paper we developed a "Recovery Time Test" to determine if recovery time depends on configuration of the failover software and how recovery time depends on configuration settings. Another goal of the Recovery Time Test is to determine the factor by which recovery time can be decreased by a given configuration. As proof of concept, we applied the Recovery Time Test to an OpenStack cloud environment which is controlled by the Pacemaker failover software. Pacemaker mean recovery time can take a value between 110 and 160 seconds, if the tool is configured badly. We found that with a proper configuration Pacemaker mean recovery time can be reduced significantly to a value between 15 and 20 seconds.
在云环境中,高可用性特性是通过使用故障转移软件(例如HAProxy、Keepalive或Pacemaker)来建立的。尽管这些工具支持从中断中自动恢复云服务,但如果没有充分配置,恢复仍然会非常缓慢。在本文中,我们开发了一个“恢复时间测试”,以确定恢复时间是否取决于故障转移软件的配置,以及恢复时间如何取决于配置设置。恢复时间测试的另一个目标是确定给定配置可以减少恢复时间的因素。作为概念验证,我们将恢复时间测试应用到由Pacemaker故障转移软件控制的OpenStack云环境中。如果起搏器配置不当,起搏器的平均恢复时间可能在110到160秒之间。我们发现,通过适当的配置,起搏器的平均恢复时间可以显着减少到15到20秒之间。
{"title":"Impact of Pacemaker Failover Configuration on Mean Time to Recovery for Small Cloud Clusters","authors":"Konstantin Benz, T. Bohnert","doi":"10.1109/CLOUD.2014.59","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.59","url":null,"abstract":"In cloud environments High Availability characteristics are established by the usage of failover software (like e.g. HAProxy, Keepalive or Pacemaker). Though these tools enable automatic recovery of cloud services from outages, the recovery can still be very slow if it is not configured adequately. In this paper we developed a \"Recovery Time Test\" to determine if recovery time depends on configuration of the failover software and how recovery time depends on configuration settings. Another goal of the Recovery Time Test is to determine the factor by which recovery time can be decreased by a given configuration. As proof of concept, we applied the Recovery Time Test to an OpenStack cloud environment which is controlled by the Pacemaker failover software. Pacemaker mean recovery time can take a value between 110 and 160 seconds, if the tool is configured badly. We found that with a proper configuration Pacemaker mean recovery time can be reduced significantly to a value between 15 and 20 seconds.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Exploiting User Patience for Scaling Resource Capacity in Cloud Services 利用用户耐心扩展云服务中的资源容量
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.67
Renato L. F. Cunha, M. Assunção, C. Cardonha, M. Netto
An important feature of cloud computing is its elasticity, that is, the ability to have resource capacity dynamically modified according to the current system load. Auto-scaling is challenging because it must account for two conflicting objectives: minimising system capacity available to users and maximising QoS, which typically translates to short response times. Current auto-scaling techniques are based solely on load forecasts and ignore the perception that users have from cloud services. As a consequence, providers tend to provision a volume of resources that is significantly larger than necessary to keep users satisfied. In this article, we propose a scheduling algorithm and an auto-scaling triggering technique that explore user patience in order to identify critical times when auto-scaling is needed and the appropriate volume of capacity by which the cloud platform should either extend or shrink. The proposed technique assists service providers in reducing costs related to resource allocation while keeping the same QoS to users. Our experiments show that it is possible to reduce resource-hour by up to approximately 8% compared to auto-scaling based on system utilisation.
云计算的一个重要特征是它的弹性,即能够根据当前系统负载动态修改资源容量。自动扩展是具有挑战性的,因为它必须考虑到两个相互冲突的目标:最小化用户可用的系统容量和最大化QoS,这通常转化为短响应时间。当前的自动扩展技术仅仅基于负载预测,而忽略了用户从云服务中获得的感知。因此,提供商倾向于提供大量的资源,远远超过了保持用户满意所需的资源。在本文中,我们提出了一种调度算法和一种自动缩放触发技术,可以探索用户的耐心,以便确定需要自动缩放的关键时刻,以及云平台应该扩展或缩小的适当容量。所提出的技术帮助服务提供商降低与资源分配相关的成本,同时保持对用户相同的QoS。我们的实验表明,与基于系统利用率的自动扩展相比,可以将资源小时减少大约8%。
{"title":"Exploiting User Patience for Scaling Resource Capacity in Cloud Services","authors":"Renato L. F. Cunha, M. Assunção, C. Cardonha, M. Netto","doi":"10.1109/CLOUD.2014.67","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.67","url":null,"abstract":"An important feature of cloud computing is its elasticity, that is, the ability to have resource capacity dynamically modified according to the current system load. Auto-scaling is challenging because it must account for two conflicting objectives: minimising system capacity available to users and maximising QoS, which typically translates to short response times. Current auto-scaling techniques are based solely on load forecasts and ignore the perception that users have from cloud services. As a consequence, providers tend to provision a volume of resources that is significantly larger than necessary to keep users satisfied. In this article, we propose a scheduling algorithm and an auto-scaling triggering technique that explore user patience in order to identify critical times when auto-scaling is needed and the appropriate volume of capacity by which the cloud platform should either extend or shrink. The proposed technique assists service providers in reducing costs related to resource allocation while keeping the same QoS to users. Our experiments show that it is possible to reduce resource-hour by up to approximately 8% compared to auto-scaling based on system utilisation.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy-Preserving Decentralized Access Control for Cloud Storage Systems 云存储系统中保护隐私的分散访问控制
Pub Date : 2014-06-27 DOI: 10.1109/CLOUD.2014.74
Jianwei Chen, Huadong Ma
Along with a large amount of data being outsourced to the cloud, it is imperative to enforce a secure, efficient and privacy-aware access control scheme on the cloud. Decentralized Attribute-based Encryption (ABE) is a variant of multi-authority ABE scheme which is regarded as being more suited to access control in a large-scale cloud. Constructing a decentralized ABE scheme should not need a central Attribute Authority (AA) and any cooperative computing, where most schemes are not efficient enough. Moreover, they introduced a Global Identifier (GID) to resist the collusion attack from users, but corrupt AAs can trace a user by his GID, resulting in the leakage of the user's identity privacy. In this paper, we design a privacy-preserving decentralized access control framework for cloud storage systems, and propose a decentralized CP-ABE access control scheme with the privacy preserving secret key extraction. Our scheme does not require any central AA and coordination among multi-authorities. We adopt Pedersen commitment scheme and oblivious commitment based envelope protocols as the main cryptographic primitives to address the privacy problem, thus the users receive secret keys only for valid identity attributes while the AAs learn nothing about the attributes. Our theoretical analysis and extensive experiment demonstrate the presented scheme's security strength and effectiveness in terms of scalability, computation and storage.
随着大量数据被外包到云,在云上执行安全、高效和隐私敏感的访问控制方案势在必行。分散式基于属性的加密(Decentralized Attribute-based Encryption, ABE)是多权威ABE方案的一种变体,被认为更适合大规模云环境中的访问控制。构建一个去中心化的ABE方案不需要一个中心化的AA (Attribute Authority),也不需要任何协作计算,因为大多数方案的效率都不够高。此外,他们引入了全局标识符(GID)来抵御用户的串通攻击,但腐败的AAs可以通过用户的GID跟踪用户,从而导致用户身份隐私的泄露。本文为云存储系统设计了一个保护隐私的分散访问控制框架,提出了一种具有保护隐私密钥提取的分散CP-ABE访问控制方案。我们的方案不需要任何中央AA和多个机构之间的协调。我们采用Pedersen承诺方案和基于遗忘承诺的信封协议作为主要的加密原语来解决隐私问题,这样用户只能收到有效身份属性的密钥,而AAs对属性一无所知。我们的理论分析和大量的实验证明了该方案在可扩展性、计算和存储方面的安全强度和有效性。
{"title":"Privacy-Preserving Decentralized Access Control for Cloud Storage Systems","authors":"Jianwei Chen, Huadong Ma","doi":"10.1109/CLOUD.2014.74","DOIUrl":"https://doi.org/10.1109/CLOUD.2014.74","url":null,"abstract":"Along with a large amount of data being outsourced to the cloud, it is imperative to enforce a secure, efficient and privacy-aware access control scheme on the cloud. Decentralized Attribute-based Encryption (ABE) is a variant of multi-authority ABE scheme which is regarded as being more suited to access control in a large-scale cloud. Constructing a decentralized ABE scheme should not need a central Attribute Authority (AA) and any cooperative computing, where most schemes are not efficient enough. Moreover, they introduced a Global Identifier (GID) to resist the collusion attack from users, but corrupt AAs can trace a user by his GID, resulting in the leakage of the user's identity privacy. In this paper, we design a privacy-preserving decentralized access control framework for cloud storage systems, and propose a decentralized CP-ABE access control scheme with the privacy preserving secret key extraction. Our scheme does not require any central AA and coordination among multi-authorities. We adopt Pedersen commitment scheme and oblivious commitment based envelope protocols as the main cryptographic primitives to address the privacy problem, thus the users receive secret keys only for valid identity attributes while the AAs learn nothing about the attributes. Our theoretical analysis and extensive experiment demonstrate the presented scheme's security strength and effectiveness in terms of scalability, computation and storage.","PeriodicalId":288542,"journal":{"name":"2014 IEEE 7th International Conference on Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 IEEE 7th International Conference on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1