The scalability of a content-based publish subscribe system typically depends on efficient subscription matching (brokering) and dissemination. As the number of subscribers increases, the matching and dissemination processes can increase bandwidth usage and overwhelm the server. Peer Assisted Publish and Subscribe (PAPaS) is a hybrid broker/P2P content-based publish and subscribe (pub/sub) system with varying event sizes. Publishers and subscribers share the burden through self-brokering and dissemination in P2P fashion. The practical implications inherent in combining pub/sub and P2P protocols are explored. Scalability analysis of the overall broker workloads and event distribution are demonstrated to show the benefits of PAPaS. Experimental results show that our approach is simple and highly effective at minimizing the brokering and event forwarding overhead as well as supporting the dynamicity of mobile clients in pub/sub middleware systems.
{"title":"PAPaS: peer assisted publish and subscribe","authors":"Norman Ahmed, M. Linderman, Jason Bryant","doi":"10.1145/2405178.2405185","DOIUrl":"https://doi.org/10.1145/2405178.2405185","url":null,"abstract":"The scalability of a content-based publish subscribe system typically depends on efficient subscription matching (brokering) and dissemination. As the number of subscribers increases, the matching and dissemination processes can increase bandwidth usage and overwhelm the server. Peer Assisted Publish and Subscribe (PAPaS) is a hybrid broker/P2P content-based publish and subscribe (pub/sub) system with varying event sizes. Publishers and subscribers share the burden through self-brokering and dissemination in P2P fashion. The practical implications inherent in combining pub/sub and P2P protocols are explored. Scalability analysis of the overall broker workloads and event distribution are demonstrated to show the benefits of PAPaS. Experimental results show that our approach is simple and highly effective at minimizing the brokering and event forwarding overhead as well as supporting the dynamicity of mobile clients in pub/sub middleware systems.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117033297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet is evolving away from its original architecture and toward the use of multiple, customized protocol stacks. A pluralistic architecture is best explained by the "geomorphic view" of networks, in which each layer is a microcosm of networking, and layers can be instantiated at many different levels, scopes, and purposes. Exploiting the commonalities identified by the geomorphic view, an abstract layer model can lead to architectural insights that help extend communication services, derive design principles, and generate network software.
{"title":"The geomorphic view of networking: a network model and its uses","authors":"P. Zave, J. Rexford","doi":"10.1145/2405178.2405179","DOIUrl":"https://doi.org/10.1145/2405178.2405179","url":null,"abstract":"The Internet is evolving away from its original architecture and toward the use of multiple, customized protocol stacks. A pluralistic architecture is best explained by the \"geomorphic view\" of networks, in which each layer is a microcosm of networking, and layers can be instantiated at many different levels, scopes, and purposes. Exploiting the commonalities identified by the geomorphic view, an abstract layer model can lead to architectural insights that help extend communication services, derive design principles, and generate network software.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents our work in progress on efficient and confidentiality-aware access control for Software-as-a-Service applications. In SaaS, a tenant organization rents access to a shared, typically web-based application. Access control for these applications requires large amounts of fine-grained data, also from the remaining on-premise applications, of which often sensitive application data. With current SaaS applications the provider evaluates both provider and tenant policies. This forces the tenant to disclose its sensitive access control data and limits policy evaluation performance by having to fetch this data. To address these challenges, we propose to decompose the tenant policies and deploy them across tenant and provider in order to evaluate parts of the policies near the data they require as much as possible, while taking into account the tenant confidentiality constraints. We present a policy decomposition algorithm based on a general attribute-based policy model and describe a supporting middleware system. In the future, we plan to refine this work and evaluate the impact on performance using real-life policies from research projects.
{"title":"Toward efficient and confidentiality-aware federation of access control policies","authors":"Maarten Decat, B. Lagaisse, W. Joosen","doi":"10.1145/2405178.2405182","DOIUrl":"https://doi.org/10.1145/2405178.2405182","url":null,"abstract":"This paper presents our work in progress on efficient and confidentiality-aware access control for Software-as-a-Service applications. In SaaS, a tenant organization rents access to a shared, typically web-based application. Access control for these applications requires large amounts of fine-grained data, also from the remaining on-premise applications, of which often sensitive application data. With current SaaS applications the provider evaluates both provider and tenant policies. This forces the tenant to disclose its sensitive access control data and limits policy evaluation performance by having to fetch this data. To address these challenges, we propose to decompose the tenant policies and deploy them across tenant and provider in order to evaluate parts of the policies near the data they require as much as possible, while taking into account the tenant confidentiality constraints. We present a policy decomposition algorithm based on a general attribute-based policy model and describe a supporting middleware system. In the future, we plan to refine this work and evaluate the impact on performance using real-life policies from research projects.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile multimedia applications often need to adapt in real-time to changes in the network. Such cross-layer adaptation mechanisms retrieve and analyse data from the underlying protocols, e.g., at the link layer. This destroys the independence of applications from network technology that is provided by IP, i.e., applications are "hard-wired" to the lower-level protocols they adapt to. We developed CLiSuite to re-create this transparency and at the same time simplify development of cross-layer adaptive applications. CLiSuite enables applications to perform protocol independent cross-layer adaptations through the concept of protocol independent network states and their mapping to protocol specific data. Adaptive application development is simplified by relieving the developer from understanding the details of the lower layer protocols. Efficiency is achieved using core techniques from complex event processing and source filtering. Our ns-3 implementation and extensive simulation studies with two adaptive applications and several network protocols demonstrate the advantages and efficiency of CLiSuite.
{"title":"CLiSuite: simplifying the development of cross-layer adaptive applications","authors":"M. Lindeberg, V. Goebel, T. Plagemann","doi":"10.1145/2405178.2405180","DOIUrl":"https://doi.org/10.1145/2405178.2405180","url":null,"abstract":"Mobile multimedia applications often need to adapt in real-time to changes in the network. Such cross-layer adaptation mechanisms retrieve and analyse data from the underlying protocols, e.g., at the link layer. This destroys the independence of applications from network technology that is provided by IP, i.e., applications are \"hard-wired\" to the lower-level protocols they adapt to. We developed CLiSuite to re-create this transparency and at the same time simplify development of cross-layer adaptive applications. CLiSuite enables applications to perform protocol independent cross-layer adaptations through the concept of protocol independent network states and their mapping to protocol specific data. Adaptive application development is simplified by relieving the developer from understanding the details of the lower layer protocols. Efficiency is achieved using core techniques from complex event processing and source filtering. Our ns-3 implementation and extensive simulation studies with two adaptive applications and several network protocols demonstrate the advantages and efficiency of CLiSuite.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Walraven, Tanguy Monheim, E. Truyen, W. Joosen
Multi-tenancy has shown promising results in achieving high operational cost efficiency by sharing hardware and software resources among multiple customer organisations, called tenants. In the context of cloud computing, this paradigm enables cloud providers to reduce operational costs by dividing resources and to simplify application management and maintenance. Maximum cost efficiency is achieved with application-level multi-tenancy. However, this high level of resource sharing complicates performance isolation between the different tenants, i.e. ensuring compliance with the SLAs of the different tenants and ensuring that the behaviour of one tenant cannot adversely affect the performance of the other tenants. This paper explores the challenges of performance isolation in the context of multi-tenant SaaS applications. In addition, we propose a middleware architecture to enforce performance isolation based on the tenant-specific SLAs, using a tenant-aware profiler and a scheduler. Our prototype reveals promising initial results.
{"title":"Towards performance isolation in multi-tenant SaaS applications","authors":"Stefan Walraven, Tanguy Monheim, E. Truyen, W. Joosen","doi":"10.1145/2405178.2405184","DOIUrl":"https://doi.org/10.1145/2405178.2405184","url":null,"abstract":"Multi-tenancy has shown promising results in achieving high operational cost efficiency by sharing hardware and software resources among multiple customer organisations, called tenants. In the context of cloud computing, this paradigm enables cloud providers to reduce operational costs by dividing resources and to simplify application management and maintenance. Maximum cost efficiency is achieved with application-level multi-tenancy. However, this high level of resource sharing complicates performance isolation between the different tenants, i.e. ensuring compliance with the SLAs of the different tenants and ensuring that the behaviour of one tenant cannot adversely affect the performance of the other tenants.\u0000 This paper explores the challenges of performance isolation in the context of multi-tenant SaaS applications. In addition, we propose a middleware architecture to enforce performance isolation based on the tenant-specific SLAs, using a tenant-aware profiler and a scheduler. Our prototype reveals promising initial results.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A lot of research effort has been invested to support efficient content-based routing. Nevertheless, practitioners often fall back to far less expressive communication paradigms like multicast groups. The benefits of content-based routing in minimizing bandwidth consumption are often rendered useless by simpler communication paradigms that rely on line-rate processing of data packets at the switches of the network providers. Contrary content-based routing protocols face the inherent overhead in matching the content of events against subscriptions leading to far lower throughput rates and higher end-to-end delays. However, recent trends in networking such as software defined networking in combination with network virtualization have tremendous potential to change the picture. In our opinion this will significantly increase acceptance of sophisticated middleware like content-based routing in the future. To support our claims we outline in this paper a reference architecture that may be used to build middleware for Future Internet applications. Furthermore, we provide a solution for realizing content-based routing at line-rate relying on this reference architecture and illustrate research problems that need to be addressed.
{"title":"The power of software-defined networking: line-rate content-based routing using OpenFlow","authors":"B. Koldehofe, Frank Dürr, M. Tariq, K. Rothermel","doi":"10.1145/2405178.2405181","DOIUrl":"https://doi.org/10.1145/2405178.2405181","url":null,"abstract":"A lot of research effort has been invested to support efficient content-based routing. Nevertheless, practitioners often fall back to far less expressive communication paradigms like multicast groups. The benefits of content-based routing in minimizing bandwidth consumption are often rendered useless by simpler communication paradigms that rely on line-rate processing of data packets at the switches of the network providers. Contrary content-based routing protocols face the inherent overhead in matching the content of events against subscriptions leading to far lower throughput rates and higher end-to-end delays. However, recent trends in networking such as software defined networking in combination with network virtualization have tremendous potential to change the picture. In our opinion this will significantly increase acceptance of sophisticated middleware like content-based routing in the future. To support our claims we outline in this paper a reference architecture that may be used to build middleware for Future Internet applications. Furthermore, we provide a solution for realizing content-based routing at line-rate relying on this reference architecture and illustrate research problems that need to be addressed.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124172017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we describe the architecture of a quality-of-service (QoS) infrastructure for achieving controlled application performance over NoSQL distributed storage systems. We present an implementation of our architecture as an extension to the Apache Cassandra storage system and provide results from a preliminary evaluation using the Yahoo Cloud Serving Benchmark (YCSB). Along the way we also present details of an ongoing alternative implementation of our QoS infrastructure in the context of the Apache HBase storage system. Our evaluation provides evidence that our QoS infrastructure can achieve the type of controlled performance required by data intensive performance-critical applications.
{"title":"Managing service performance in NoSQL distributed storage systems","authors":"M. Chalkiadaki, K. Magoutis","doi":"10.1145/2405178.2405183","DOIUrl":"https://doi.org/10.1145/2405178.2405183","url":null,"abstract":"In this paper we describe the architecture of a quality-of-service (QoS) infrastructure for achieving controlled application performance over NoSQL distributed storage systems. We present an implementation of our architecture as an extension to the Apache Cassandra storage system and provide results from a preliminary evaluation using the Yahoo Cloud Serving Benchmark (YCSB). Along the way we also present details of an ongoing alternative implementation of our QoS infrastructure in the context of the Apache HBase storage system. Our evaluation provides evidence that our QoS infrastructure can achieve the type of controlled performance required by data intensive performance-critical applications.","PeriodicalId":342705,"journal":{"name":"MW4NG '12","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127666338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}