首页 > 最新文献

2010 IEEE 3rd International Conference on Cloud Computing最新文献

英文 中文
Secure Virtual Machine Execution under an Untrusted Management OS 在不受信任的管理操作系统下安全执行虚拟机
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.29
Chunxiao Li, A. Raghunathan, N. Jha
Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.
虚拟化是一种快速发展的技术,可用于为计算系统提供一系列好处,包括改进资源利用率、软件可移植性和可靠性。对于安全关键型应用程序,非常希望有一个小的可信计算基础(TCB),因为它可以最大限度地减少可能危及整个系统安全性的攻击。在传统的虚拟化体系结构中,应用程序的TCB不仅包括硬件和虚拟机监视器(VMM),还包括包含设备驱动程序和虚拟机管理功能的整个管理操作系统(OS)。对于许多应用程序来说,信任这个管理操作系统是不可接受的,因为它有大量的代码库和大量的漏洞。在本文中,我们解决了在不可信管理操作系统的假设下,在虚拟化计算平台上提供安全执行环境的问题。我们提出了一种安全的虚拟化体系结构,它为来宾虚拟机提供安全的运行时环境、网络接口和二级存储。所提出的架构显著降低了对安全至关重要的来宾虚拟机的TCB,从而在不可信的管理环境中提高了安全性。我们已经使用Xen虚拟化系统实现了所建议方法的原型,并演示了如何使用它来促进安全的远程计算服务。我们评估了所提议的体系结构所带来的性能损失,并证明这些损失是最小的。
{"title":"Secure Virtual Machine Execution under an Untrusted Management OS","authors":"Chunxiao Li, A. Raghunathan, N. Jha","doi":"10.1109/CLOUD.2010.29","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.29","url":null,"abstract":"Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125048826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Model-Based Planning for State-Related Changes to Infrastructure and Software as a Service Instances in Large Data Centers 大型数据中心中基础设施和软件即服务实例的状态相关变更的基于模型的规划
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.14
Sebastian Hagen, A. Kemper
To deliver 3-tier applications as a Service in the Cloud state-related constraints crossing Infrastructure- and Software as a Service boundaries need to be managed. By automating the lifecycle of applications like databases, load balancers, and web application servers rich SaaS business services can be provided in the Cloud. We propose an object oriented planning approach based on state constraints to plan for changes of SaaS and IaaS components in the Cloud. We evaluate techniques for fast storing and restoring of large object oriented Configuration Management Databases and show that enforcing constraints in a procedural instead of a declarative way offers huge performance improvements. The advantages of our approach lie within the tight integration of the planning algorithm with object oriented models frequently used for Configuration Management Databases. In addition to that, the algorithm scales to a large number of nodes and preserves its runtime even for large, heavily loaded data centers.
为了在云中交付三层应用程序即服务,需要管理跨基础设施和软件即服务边界的状态相关约束。通过自动化数据库、负载平衡器和web应用服务器等应用程序的生命周期,可以在云中提供丰富的SaaS业务服务。我们提出了一种基于状态约束的面向对象的规划方法来规划云中的SaaS和IaaS组件的变化。我们评估了用于快速存储和恢复大型面向对象的配置管理数据库的技术,并表明以过程方式而不是声明方式强制约束提供了巨大的性能改进。我们的方法的优点在于将规划算法与经常用于配置管理数据库的面向对象模型紧密集成。除此之外,该算法可以扩展到大量节点,并且即使对于大型、负载沉重的数据中心,也可以保留其运行时。
{"title":"Model-Based Planning for State-Related Changes to Infrastructure and Software as a Service Instances in Large Data Centers","authors":"Sebastian Hagen, A. Kemper","doi":"10.1109/CLOUD.2010.14","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.14","url":null,"abstract":"To deliver 3-tier applications as a Service in the Cloud state-related constraints crossing Infrastructure- and Software as a Service boundaries need to be managed. By automating the lifecycle of applications like databases, load balancers, and web application servers rich SaaS business services can be provided in the Cloud. We propose an object oriented planning approach based on state constraints to plan for changes of SaaS and IaaS components in the Cloud. We evaluate techniques for fast storing and restoring of large object oriented Configuration Management Databases and show that enforcing constraints in a procedural instead of a declarative way offers huge performance improvements. The advantages of our approach lie within the tight integration of the planning algorithm with object oriented models frequently used for Configuration Management Databases. In addition to that, the algorithm scales to a large number of nodes and preserves its runtime even for large, heavily loaded data centers.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Is Server Consolidation Beneficial to MMORPG? A Case Study of World of Warcraft 服务器整合对MMORPG有利吗?以《魔兽世界》为例
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.57
Yeng-Ting Lee, Kuan-Ta Chen
MMORPG is shown to be a killer application of Internet, with a global subscriber number increased to 17 millions in 2010. However, MMORPG servers tend to be overly provisioned because 1)such games do not have standard architectures thus dedicated hardware is assumed; 2) MMORPGs normally adopt a ``sharded design'' to resolve the scalability challenges of content production and workload distribution; and 3) a game is commonly deployed in geographically distributed data centers to protect gamers from excessive network latencies. Therefore, an operator needs to deploy dedicated hardware for each game in each datacenter, even though hardware utilization is low. In this paper, we propose a zone-based server consolidation strategy for MMORPGs, which exploits the unique locality property of players' interactions, to cut down the games' considerable hardware requirement and energy use. We evaluate the effectiveness of our strategy based on a nine-month trace from a popular MMORPG World of War craft. The evaluation results show that, with a per-hour dynamic zone reallocation policy, the server number required can be reduced by 52% and the total energy consumption can be reduced by 62%, while the user-experienced latency remains undegraded.
MMORPG被证明是互联网的杀手级应用,2010年全球用户数量增加到1700万。然而,MMORPG服务器往往会被过度配置,因为1)这类游戏没有标准架构,因此需要专用硬件;2) mmorpg通常采用“分片设计”来解决内容制作和工作量分配的可扩展性挑战;3)游戏通常部署在地理分布的数据中心,以保护玩家免受过度的网络延迟。因此,运营商需要在每个数据中心为每个游戏部署专用硬件,即使硬件利用率很低。在本文中,我们提出了一种基于区域的mmorpg服务器整合策略,该策略利用玩家交互的独特局域性,以减少游戏可观的硬件需求和能源消耗。我们基于流行的MMORPG《战争世界》9个月的追踪来评估我们策略的有效性。评估结果表明,采用每小时动态区域重新分配策略,所需的服务器数量可以减少52%,总能耗可以减少62%,而用户体验的延迟保持不变。
{"title":"Is Server Consolidation Beneficial to MMORPG? A Case Study of World of Warcraft","authors":"Yeng-Ting Lee, Kuan-Ta Chen","doi":"10.1109/CLOUD.2010.57","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.57","url":null,"abstract":"MMORPG is shown to be a killer application of Internet, with a global subscriber number increased to 17 millions in 2010. However, MMORPG servers tend to be overly provisioned because 1)such games do not have standard architectures thus dedicated hardware is assumed; 2) MMORPGs normally adopt a ``sharded design'' to resolve the scalability challenges of content production and workload distribution; and 3) a game is commonly deployed in geographically distributed data centers to protect gamers from excessive network latencies. Therefore, an operator needs to deploy dedicated hardware for each game in each datacenter, even though hardware utilization is low. In this paper, we propose a zone-based server consolidation strategy for MMORPGs, which exploits the unique locality property of players' interactions, to cut down the games' considerable hardware requirement and energy use. We evaluate the effectiveness of our strategy based on a nine-month trace from a popular MMORPG World of War craft. The evaluation results show that, with a per-hour dynamic zone reallocation policy, the server number required can be reduced by 52% and the total energy consumption can be reduced by 62%, while the user-experienced latency remains undegraded.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124583648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security QUIRC:云安全的定量影响和风险评估框架
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.22
P. Saripalli, Ben Walters
A quantitative risk and impact assessment framework (QUIRC) is presented, to assess the security risks associated with cloud computing platforms. This framework, called QUIRC, defines risk as a combination of the Probability of a security threat event and it’s Severity, measured as its Impact. Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories. Wide-band Delphi method is proposed as a scientific means to collect the information necessary for assessing security risks. Risk assessment knowledgebases could be developed specific to each industry vertical, which then serve as inputs for security risk assessment of cloud computing platforms. QUIRC’s key advantage is its fully quantitative and iterative convergence approach, which enables stakeholders to comparatively assess the relative robustness of different cloud vendor offerings and approaches in a defensible manner.
提出了一种定量风险和影响评估框架(QUIRC),以评估与云计算平台相关的安全风险。这个被称为QUIRC的框架将风险定义为安全威胁事件的概率及其严重性的组合,以其影响来衡量。确定了云平台的六个关键安全目标(SO),并提出大多数典型的攻击向量和事件映射到这六个类别之一。宽带德尔菲法是一种收集安全风险评估所需信息的科学方法。可以针对每个垂直行业开发特定的风险评估知识库,然后作为云计算平台安全风险评估的输入。QUIRC的关键优势在于其完全定量和迭代的收敛方法,使利益相关者能够以可防御的方式比较评估不同云供应商产品和方法的相对健壮性。
{"title":"QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security","authors":"P. Saripalli, Ben Walters","doi":"10.1109/CLOUD.2010.22","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.22","url":null,"abstract":"A quantitative risk and impact assessment framework (QUIRC) is presented, to assess the security risks associated with cloud computing platforms. This framework, called QUIRC, defines risk as a combination of the Probability of a security threat event and it’s Severity, measured as its Impact. Six key Security Objectives (SO) are identified for cloud platforms, and it is proposed that most of the typical attack vectors and events map to one of these six categories. Wide-band Delphi method is proposed as a scientific means to collect the information necessary for assessing security risks. Risk assessment knowledgebases could be developed specific to each industry vertical, which then serve as inputs for security risk assessment of cloud computing platforms. QUIRC’s key advantage is its fully quantitative and iterative convergence approach, which enables stakeholders to comparatively assess the relative robustness of different cloud vendor offerings and approaches in a defensible manner.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121675890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 256
Open Source Cloud Computing Tools: A Case Study with a Weather Application 开源云计算工具:天气应用程序的案例研究
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.81
M. Rodríguez-Martínez, J. Seguel, Melvin Greer
Cloud Computing is a promising paradigm designed to harness the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capacity to serve a wide and constantly expanding range of information processing needs, including government, military, business and education. The Cloud Computing paradigm is maturing rapidly and is being considered for adoption in government and business platforms. Open source systems refer to software systems whose source code is available, allowing for immediate incorporation of improvements and adaptations of the system by its users. This paper reports on an evaluation of open source development tools for Cloud Computing. The main tools examined are Eucalyptus, Apache Hadoop, and the Django-Python stack. These tools were used at different layers in the construction of a notional application for managing weather data. The results of our experience are reported in terms of a capability matrix that grades nine different aspects associated with the use of these tools in the development and deployment of applications in open source Cloud Computing environments.
云计算是一种很有前途的范例,旨在以更经济有效的方式利用计算机和通信网络的力量。云提供弹性容量,以满足广泛且不断扩展的信息处理需求,包括政府、军事、商业和教育。云计算范式正在迅速成熟,并且正在考虑在政府和商业平台中采用。开放源码系统指的是源代码是可用的软件系统,允许用户立即对系统进行改进和调整。本文报告了对云计算开源开发工具的评估。研究的主要工具是Eucalyptus、Apache Hadoop和Django-Python堆栈。在构建用于管理天气数据的概念应用程序的不同层次上使用了这些工具。我们的经验结果是根据一个能力矩阵来报告的,这个能力矩阵对在开源云计算环境中应用程序的开发和部署中与这些工具的使用相关的九个不同方面进行了分级。
{"title":"Open Source Cloud Computing Tools: A Case Study with a Weather Application","authors":"M. Rodríguez-Martínez, J. Seguel, Melvin Greer","doi":"10.1109/CLOUD.2010.81","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.81","url":null,"abstract":"Cloud Computing is a promising paradigm designed to harness the power of networks of computers and communications in a more cost effective way. Clouds provide elastic capacity to serve a wide and constantly expanding range of information processing needs, including government, military, business and education. The Cloud Computing paradigm is maturing rapidly and is being considered for adoption in government and business platforms. Open source systems refer to software systems whose source code is available, allowing for immediate incorporation of improvements and adaptations of the system by its users. This paper reports on an evaluation of open source development tools for Cloud Computing. The main tools examined are Eucalyptus, Apache Hadoop, and the Django-Python stack. These tools were used at different layers in the construction of a notional application for managing weather data. The results of our experience are reported in terms of a capability matrix that grades nine different aspects associated with the use of these tools in the development and deployment of applications in open source Cloud Computing environments.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126530213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment THEMIS:在云计算环境中实现可相互验证的计费交易
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.21
K. Park, S. Park, Jaesun Han, Kyu Ho Park
The ability to record and keep account of the usage of cloud resources in a credible and verifiable way is a precursor to widespread cloud deployment and availability because usage information is potentially sensitive and must be verifiably accurate. In an attempt to provide a mutually verifiable resource usage and billing mechanism, we found that the frequent asymmetric key operations of a digital signature lead to excessive computations and a bottleneck of billing transactions. As a remedy for these limitations, we propose a mutually verifiable billing system called THEMIS. The system, which introduces the concept of a cloud notary authority for the supervision of billing, makes billing more objective and acceptable to users and cloud service providers. THEMIS generates mutually verifiable binding information that can be used to resolve future disputes between a user and a cloud service provider. Because THEMIS does not require any asymmetric key operations of users and providers, it provides a level of security that is identical to that of a Public Key Infrastructure (PKI) and it minimizes the latency of billing transactions. This work has been undertaken on a real cloud computing service called iCube Cloud.
能够以可信和可核查的方式记录和记录云资源的使用情况,是云部署和可用性广泛普及的前兆,因为使用情况信息可能很敏感,必须准确可核查。为了提供一种可相互验证的资源使用和计费机制,我们发现数字签名频繁的非对称密钥操作导致了过度的计算和计费事务的瓶颈。作为对这些限制的补救措施,我们提出了一个称为THEMIS的可相互验证的计费系统。该系统引入了云公证机构的概念,对计费进行监管,使计费更加客观,用户和云服务提供商都能接受。THEMIS生成可相互验证的绑定信息,这些信息可用于解决用户和云服务提供商之间未来的争议。由于THEMIS不需要用户和提供者进行任何非对称密钥操作,因此它提供了与公钥基础设施(Public key Infrastructure, PKI)相同的安全级别,并最大限度地减少了计费事务的延迟。这项工作是在一个名为iCube cloud的真正的云计算服务上进行的。
{"title":"THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment","authors":"K. Park, S. Park, Jaesun Han, Kyu Ho Park","doi":"10.1109/CLOUD.2010.21","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.21","url":null,"abstract":"The ability to record and keep account of the usage of cloud resources in a credible and verifiable way is a precursor to widespread cloud deployment and availability because usage information is potentially sensitive and must be verifiably accurate. In an attempt to provide a mutually verifiable resource usage and billing mechanism, we found that the frequent asymmetric key operations of a digital signature lead to excessive computations and a bottleneck of billing transactions. As a remedy for these limitations, we propose a mutually verifiable billing system called THEMIS. The system, which introduces the concept of a cloud notary authority for the supervision of billing, makes billing more objective and acceptable to users and cloud service providers. THEMIS generates mutually verifiable binding information that can be used to resolve future disputes between a user and a cloud service provider. Because THEMIS does not require any asymmetric key operations of users and providers, it provides a level of security that is identical to that of a Public Key Infrastructure (PKI) and it minimizes the latency of billing transactions. This work has been undertaken on a real cloud computing service called iCube Cloud.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Preventing Information Leakage from Indexing in the Cloud 防止信息在云端被索引泄露
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.82
A. Squicciarini, Smitha Sundareswaran, D. Lin
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud have not been carefully addressed at current stage. Users' fear of confidential data (particularly financial and health data) leakage and loss of privacy in the cloud may become a significant barrier to the wide adoption of cloud services. In this paper, we explore a newly emerging problem of information leakage caused by indexing in the cloud. We design a three-tier data protection architecture to accommodate various levels of privacy concerns by users. According to the architecture, we develop a novel portable data binding technique to ensure strong enforcement of users' privacy requirements at server side.
云计算使高度可伸缩的服务可以根据需要在Internet上轻松地使用。虽然云计算正在迅速发展,并被许多个人和组织在国际上使用,但在目前阶段,云中的数据保护问题尚未得到认真解决。用户担心机密数据(特别是财务和健康数据)在云中泄露和隐私丧失,这可能成为广泛采用云服务的一个重大障碍。本文探讨了一个新出现的问题,即在云中索引所导致的信息泄漏。我们设计了一个三层的数据保护架构,以适应用户不同级别的隐私问题。根据该体系结构,我们开发了一种新的便携式数据绑定技术,以确保在服务器端强有力地执行用户的隐私需求。
{"title":"Preventing Information Leakage from Indexing in the Cloud","authors":"A. Squicciarini, Smitha Sundareswaran, D. Lin","doi":"10.1109/CLOUD.2010.82","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.82","url":null,"abstract":"Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud have not been carefully addressed at current stage. Users' fear of confidential data (particularly financial and health data) leakage and loss of privacy in the cloud may become a significant barrier to the wide adoption of cloud services. In this paper, we explore a newly emerging problem of information leakage caused by indexing in the cloud. We design a three-tier data protection architecture to accommodate various levels of privacy concerns by users. According to the architecture, we develop a novel portable data binding technique to ensure strong enforcement of users' privacy requirements at server side.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
An Architecture for Distributed High Performance Video Processing in the Cloud 云中的分布式高性能视频处理体系结构
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.73
R. Pereira, M. Azambuja, K. Breitman, M. Endler
Video processing applications are notably data intense, time, and resource consuming. Upfront infrastructure investment is usually high, specially when dealing with applications where time-to- market is a crucial requirement, e.g., breaking news and journalism. Such infrastructures are often inefficient, because due to demand variations, resources may end up idle a good portion of the time. In this paper, we propose the Split&Merge architecture for high performance video processing, a generalization of the MapReduce paradigm that rationalizes the use of resources by exploring on demand computing. To illustrate the approach, we discuss an implementation of the Split&Merge architecture, that reduces video encoding times to fixed duration, independently of the input size of the video file, by using dynamic resource provisioning in the Cloud.
视频处理应用程序是一个数据密集、时间和资源消耗非常大的应用程序。前期基础设施投资通常很高,特别是在处理对上市时间有重要要求的应用程序时,例如突发新闻和新闻。这种基础设施通常效率低下,因为由于需求的变化,资源可能会在很长一段时间内处于闲置状态。在本文中,我们提出了用于高性能视频处理的Split&Merge架构,这是MapReduce范式的一种推广,通过探索按需计算来合理化资源使用。为了说明这种方法,我们讨论了Split&Merge架构的实现,通过使用云中的动态资源配置,将视频编码时间减少到固定的持续时间,而不依赖于视频文件的输入大小。
{"title":"An Architecture for Distributed High Performance Video Processing in the Cloud","authors":"R. Pereira, M. Azambuja, K. Breitman, M. Endler","doi":"10.1109/CLOUD.2010.73","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.73","url":null,"abstract":"Video processing applications are notably data intense, time, and resource consuming. Upfront infrastructure investment is usually high, specially when dealing with applications where time-to- market is a crucial requirement, e.g., breaking news and journalism. Such infrastructures are often inefficient, because due to demand variations, resources may end up idle a good portion of the time. In this paper, we propose the Split&Merge architecture for high performance video processing, a generalization of the MapReduce paradigm that rationalizes the use of resources by exploring on demand computing. To illustrate the approach, we discuss an implementation of the Split&Merge architecture, that reduces video encoding times to fixed duration, independently of the input size of the video file, by using dynamic resource provisioning in the Cloud.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Bridging the Gap between Desktop and the Cloud for eScience Applications 为eScience应用程序弥合桌面和云之间的差距
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.72
Yogesh L. Simmhan, C. Ingen, Girish Subramanian, Jie Li
The widely discussed scientific data deluge creates a need to computationally scale out eScience applications beyond the local desktop and cope with variable loads over time. Cloud computing offers a scalable, economic, on-demand model well matched to these needs. Yet cloud computing creates gaps that must be crossed to move existing science applications to the cloud. In this article, we propose a Generic Worker framework to deploy and invoke science applications in the cloud with minimal user effort and predictable cost-effective performance. Our framework addresses three distinct challenges posed by the cloud: the complexity of application deployment, invocation of cloud applications from desktop clients, and efficient transparent data transfers across desktop and the cloud. We present an implementation of the Generic Worker for the Microsoft Azure Cloud and evaluate its use for a genomics application. Our evaluation shows that the user complexity to port and scale the application is substantially reduced while introducing a negligible performance overhead of of <; 5% for the genomics application when scaling to 20 VM instances.
广泛讨论的科学数据洪流需要将eScience应用程序的计算扩展到本地桌面之外,并随着时间的推移应对可变负载。云计算提供了一种可伸缩的、经济的、按需的模型,可以很好地满足这些需求。然而,云计算产生了必须跨越的鸿沟,才能将现有的科学应用程序迁移到云上。在本文中,我们提出了一个Generic Worker框架,以最小的用户工作量和可预测的经济高效性能在云中部署和调用科学应用程序。我们的框架解决了云带来的三个不同的挑战:应用程序部署的复杂性,从桌面客户端调用云应用程序,以及在桌面和云之间高效透明的数据传输。我们提出了微软Azure云通用工作者的实现,并评估了其在基因组学应用程序中的使用。我们的评估表明,移植和扩展应用程序的用户复杂性大大降低,同时引入了可以忽略不计的性能开销<;当扩展到20个VM实例时,基因组应用程序为5%。
{"title":"Bridging the Gap between Desktop and the Cloud for eScience Applications","authors":"Yogesh L. Simmhan, C. Ingen, Girish Subramanian, Jie Li","doi":"10.1109/CLOUD.2010.72","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.72","url":null,"abstract":"The widely discussed scientific data deluge creates a need to computationally scale out eScience applications beyond the local desktop and cope with variable loads over time. Cloud computing offers a scalable, economic, on-demand model well matched to these needs. Yet cloud computing creates gaps that must be crossed to move existing science applications to the cloud. In this article, we propose a Generic Worker framework to deploy and invoke science applications in the cloud with minimal user effort and predictable cost-effective performance. Our framework addresses three distinct challenges posed by the cloud: the complexity of application deployment, invocation of cloud applications from desktop clients, and efficient transparent data transfers across desktop and the cloud. We present an implementation of the Generic Worker for the Microsoft Azure Cloud and evaluate its use for a genomics application. Our evaluation shows that the user complexity to port and scale the application is substantially reduced while introducing a negligible performance overhead of of <; 5% for the genomics application when scaling to 20 VM instances.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"227 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Toward Ease of Discovery, Selection and Use of Clusters within a Cloud 云中的集群易于发现、选择和使用
Pub Date : 2010-07-05 DOI: 10.1109/CLOUD.2010.39
Michael Brock, A. Goscinski
While the emergence of clouds had lead to a significant paradigm shift in business and research, cloud computing is still in its infancy. Specifically, there is no effective publication and discovery service nor are cloud services easy to use. This paper presents a new technology for offering ease of discovery, selection and use of clusters hosted within clouds. By improving these services, cloud clusters become easily accessible to all clients, software services to non-computing human user.
虽然云的出现导致了商业和研究领域的重大范式转变,但云计算仍处于起步阶段。具体来说,没有有效的发布和发现服务,云服务也不容易使用。本文提出了一种新技术,可以方便地发现、选择和使用托管在云中的集群。通过改进这些服务,所有客户端都可以轻松访问云集群,非计算人类用户可以轻松访问软件服务。
{"title":"Toward Ease of Discovery, Selection and Use of Clusters within a Cloud","authors":"Michael Brock, A. Goscinski","doi":"10.1109/CLOUD.2010.39","DOIUrl":"https://doi.org/10.1109/CLOUD.2010.39","url":null,"abstract":"While the emergence of clouds had lead to a significant paradigm shift in business and research, cloud computing is still in its infancy. Specifically, there is no effective publication and discovery service nor are cloud services easy to use. This paper presents a new technology for offering ease of discovery, selection and use of clusters hosted within clouds. By improving these services, cloud clusters become easily accessible to all clients, software services to non-computing human user.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2010 IEEE 3rd International Conference on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1