首页 > 最新文献

2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)最新文献

英文 中文
Trichotomic Search for Thermal-Aware Data Centre Workload Optimisation 热感知数据中心工作负载优化的三分体搜索
Ignacio Castiñeiras, Danuta Sorina Chisca, D. Mehta, B. O’Sullivan
The power consumption of a data centre (DC) can be attributed to the power consumed by running the servers and the power consumed for cooling them. The challenge is to optimally balance IT and cooling power requirements, which demands the minimisation of a non-linear energy utilisation function. In this paper we propose a problem decomposition-based approach to tackle a non-linear energy utilisation function and successfully apply it to minimising the energy consumption of a DC.
数据中心的功耗包括服务器运行所需的功耗和服务器冷却所需的功耗。挑战在于最佳地平衡IT和冷却功率需求,这需要最小化非线性能量利用功能。在本文中,我们提出了一种基于问题分解的方法来处理非线性能量利用函数,并成功地将其应用于最小化直流的能量消耗。
{"title":"Trichotomic Search for Thermal-Aware Data Centre Workload Optimisation","authors":"Ignacio Castiñeiras, Danuta Sorina Chisca, D. Mehta, B. O’Sullivan","doi":"10.1109/UCC.2015.94","DOIUrl":"https://doi.org/10.1109/UCC.2015.94","url":null,"abstract":"The power consumption of a data centre (DC) can be attributed to the power consumed by running the servers and the power consumed for cooling them. The challenge is to optimally balance IT and cooling power requirements, which demands the minimisation of a non-linear energy utilisation function. In this paper we propose a problem decomposition-based approach to tackle a non-linear energy utilisation function and successfully apply it to minimising the energy consumption of a DC.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Docker Containers across Multiple Clouds and Data Centers 跨多个云和数据中心的Docker容器
Moustafa AbdelBaky, J. Montes, M. Parashar, Merve Unuvar, M. Steinder
Emerging lightweight cloud technologies, such as Docker containers, are gaining wide traction in IT due to the fact that they allow users to deploy applications in any environment faster and more efficiently than using virtual machines. However, current Docker-based container deployment solutions are aimed at managing containers in a single-site, which limits their capabilities. As more users look to adopt Docker containers in dynamic, heterogenous environments, the ability to deploy and effectively manage containers across multiple clouds and data centers becomes of utmost importance. In this paper, we propose a prototype framework, called C-Ports, that enables the deployment and management of Docker containers across multiple hybrid clouds and traditional clusters while taking into consideration user and resource provider objectives and constraints. The framework leverages a constraint-programming model for resource selection and uses CometCloud to allocate/deallocate resources as well as to deploy containers on top of these resources. Our prototype has been effectively used to deploy and manage containers in a dynamic federation composed of five clouds and two clusters.
新兴的轻量级云技术,如Docker容器,在IT界获得了广泛的关注,因为它们允许用户在任何环境中比使用虚拟机更快、更有效地部署应用程序。然而,当前基于docker的容器部署解决方案的目标是在单站点管理容器,这限制了它们的能力。随着越来越多的用户希望在动态、异构的环境中采用Docker容器,跨多个云和数据中心部署和有效管理容器的能力变得至关重要。在本文中,我们提出了一个原型框架,称为C-Ports,它可以跨多个混合云和传统集群部署和管理Docker容器,同时考虑到用户和资源提供者的目标和约束。该框架利用约束编程模型进行资源选择,并使用CometCloud来分配/释放资源,以及在这些资源之上部署容器。我们的原型已被有效地用于在由五个云和两个集群组成的动态联邦中部署和管理容器。
{"title":"Docker Containers across Multiple Clouds and Data Centers","authors":"Moustafa AbdelBaky, J. Montes, M. Parashar, Merve Unuvar, M. Steinder","doi":"10.1109/UCC.2015.58","DOIUrl":"https://doi.org/10.1109/UCC.2015.58","url":null,"abstract":"Emerging lightweight cloud technologies, such as Docker containers, are gaining wide traction in IT due to the fact that they allow users to deploy applications in any environment faster and more efficiently than using virtual machines. However, current Docker-based container deployment solutions are aimed at managing containers in a single-site, which limits their capabilities. As more users look to adopt Docker containers in dynamic, heterogenous environments, the ability to deploy and effectively manage containers across multiple clouds and data centers becomes of utmost importance. In this paper, we propose a prototype framework, called C-Ports, that enables the deployment and management of Docker containers across multiple hybrid clouds and traditional clusters while taking into consideration user and resource provider objectives and constraints. The framework leverages a constraint-programming model for resource selection and uses CometCloud to allocate/deallocate resources as well as to deploy containers on top of these resources. Our prototype has been effectively used to deploy and manage containers in a dynamic federation composed of five clouds and two clusters.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Analytical Modelling and Performability Analysis for Cloud Computing Using Queuing System 基于排队系统的云计算分析建模与性能分析
Yonal Kirsal, Y. K. Ever, L. Mostarda, O. Gemikonakli
In recent years, cloud computing becomes a new computing model emerged from the rapid development of the internet. Users can reach their resources with high flexibility using the cloud computing systems all over the world. However, such systems are prone to failures. In order to obtain realistic quality of service (QoS) measurements, failure and recovery behaviours of the system should be considered. System's failures and repairs are associated with availability context in QoS measurements. In this paper, performance issues are considered with the availability of the system. Markov Reward Model (MRM) method is used to get QoS measurements. The mean queue length (MQL) results are calculated using the MRM. The results explicitly show that failures and repairs affect the system performance significantly.
近年来,随着互联网的快速发展,云计算成为一种新的计算模式。用户可以使用遍布全球的云计算系统以高度的灵活性访问他们的资源。然而,这样的系统容易出现故障。为了获得真实的服务质量(QoS)度量,必须考虑系统的故障和恢复行为。系统的故障和修复与QoS测量中的可用性上下文相关。在本文中,性能问题考虑了系统的可用性。采用马尔可夫奖励模型(MRM)方法进行QoS度量。使用MRM计算平均队列长度(MQL)结果。结果表明,故障和维修对系统性能有显著影响。
{"title":"Analytical Modelling and Performability Analysis for Cloud Computing Using Queuing System","authors":"Yonal Kirsal, Y. K. Ever, L. Mostarda, O. Gemikonakli","doi":"10.1109/UCC.2015.115","DOIUrl":"https://doi.org/10.1109/UCC.2015.115","url":null,"abstract":"In recent years, cloud computing becomes a new computing model emerged from the rapid development of the internet. Users can reach their resources with high flexibility using the cloud computing systems all over the world. However, such systems are prone to failures. In order to obtain realistic quality of service (QoS) measurements, failure and recovery behaviours of the system should be considered. System's failures and repairs are associated with availability context in QoS measurements. In this paper, performance issues are considered with the availability of the system. Markov Reward Model (MRM) method is used to get QoS measurements. The mean queue length (MQL) results are calculated using the MRM. The results explicitly show that failures and repairs affect the system performance significantly.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132959797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scheduling Live-Migrations for Fast, Adaptable and Energy-Efficient Relocation Operations 调度实时迁移以实现快速、适应性强和节能的迁移操作
Vincent Kherbache, E. Madelaine, Fabien Hermenier
Every day, numerous VMs are migrated inside a datacenter to balance the load, save energy or prepare production servers for maintenance. Despite VM placement problems are carefully studied, the underlying migration scheduler rely on vague adhoc models. This leads to unnecessarily long and energy-intensive migrations. We present mVM, a new and extensible migration scheduler. mVM takes into account the VM memory workload and the network topology to estimate precisely the migration duration and take wiser scheduling decisions. mVM is implemented as a plugin of BtrPlace and can be customized with additional scheduling constraints to finely control the migrations. Experiments on a real testbed show mVM outperforms schedulers that cap the migration parallelism by a constant to reduce the completion time. Besides an optimal capping, mVM reduces the migration duration by 20.4% on average and the completion time by 28.1%. In a maintenance operation involving 96 VMs to migrate between 72 servers, mVM saves 21.5% Joules against BtrPlace. Finally, its current library of 6 constraints allows administrators to address temporal and energy concerns, for example to adapt the schedule and fit a power budget.
每天都有大量的虚拟机在数据中心内迁移,以平衡负载、节省能源或准备生产服务器进行维护。尽管对VM放置问题进行了仔细研究,但底层迁移调度器依赖于模糊的临时模型。这将导致不必要的长时间和能源密集型迁移。我们提出了mVM,一个新的可扩展迁移调度器。mVM考虑虚拟机内存工作负载和网络拓扑,以精确估计迁移持续时间,并做出更明智的调度决策。mVM是作为BtrPlace的插件实现的,并且可以使用额外的调度约束进行定制,以精细地控制迁移。在真实测试平台上的实验表明,mVM优于调度器,调度器通过一个常数来限制迁移并行性,以减少完成时间。除了最佳封顶之外,mVM还将迁移持续时间平均减少20.4%,完成时间平均减少28.1%。对于在72台服务器之间迁移96台虚拟机的维护操作,mVM比BtrPlace节省21.5%焦耳。最后,它当前的6个约束库允许管理员解决时间和能源问题,例如调整时间表和适应电力预算。
{"title":"Scheduling Live-Migrations for Fast, Adaptable and Energy-Efficient Relocation Operations","authors":"Vincent Kherbache, E. Madelaine, Fabien Hermenier","doi":"10.1109/UCC.2015.37","DOIUrl":"https://doi.org/10.1109/UCC.2015.37","url":null,"abstract":"Every day, numerous VMs are migrated inside a datacenter to balance the load, save energy or prepare production servers for maintenance. Despite VM placement problems are carefully studied, the underlying migration scheduler rely on vague adhoc models. This leads to unnecessarily long and energy-intensive migrations. We present mVM, a new and extensible migration scheduler. mVM takes into account the VM memory workload and the network topology to estimate precisely the migration duration and take wiser scheduling decisions. mVM is implemented as a plugin of BtrPlace and can be customized with additional scheduling constraints to finely control the migrations. Experiments on a real testbed show mVM outperforms schedulers that cap the migration parallelism by a constant to reduce the completion time. Besides an optimal capping, mVM reduces the migration duration by 20.4% on average and the completion time by 28.1%. In a maintenance operation involving 96 VMs to migrate between 72 servers, mVM saves 21.5% Joules against BtrPlace. Finally, its current library of 6 constraints allows administrators to address temporal and energy concerns, for example to adapt the schedule and fit a power budget.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127878005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Survey on Context Security Policies in the Cloud 云环境安全策略研究综述
Giannis Verginadis, G. Mentzas, Simeon Veloudis, I. Paraskakis
With the pervasion of cloud computing new security risks are created. A promising approach to alleviating these risks is to provide a security-by-design framework that will assist cloud application developers in defining appropriate context-driven access control policies. This paper surveys different approaches to context-driven access control, as well as different modelling formalisms for representing access control policies. The aim of this survey is to assess the appropriateness of existing approaches for the construction of a generic security-by-design framework, in particular one which is exposed as a PaaS offering.
随着云计算的普及,新的安全风险也随之产生。减轻这些风险的一种有希望的方法是提供一个设计安全框架,该框架将帮助云应用程序开发人员定义适当的上下文驱动的访问控制策略。本文研究了上下文驱动访问控制的不同方法,以及表示访问控制策略的不同建模形式。本调查的目的是评估构建通用设计安全框架的现有方法的适当性,特别是作为PaaS产品公开的方法。
{"title":"A Survey on Context Security Policies in the Cloud","authors":"Giannis Verginadis, G. Mentzas, Simeon Veloudis, I. Paraskakis","doi":"10.1109/UCC.2015.103","DOIUrl":"https://doi.org/10.1109/UCC.2015.103","url":null,"abstract":"With the pervasion of cloud computing new security risks are created. A promising approach to alleviating these risks is to provide a security-by-design framework that will assist cloud application developers in defining appropriate context-driven access control policies. This paper surveys different approaches to context-driven access control, as well as different modelling formalisms for representing access control policies. The aim of this survey is to assess the appropriateness of existing approaches for the construction of a generic security-by-design framework, in particular one which is exposed as a PaaS offering.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enforcing Security and Assurance Properties in Cloud Environment 在云环境中执行安全和保证属性
Aline Bousquet, Jérémy Briffaut, E. Caron, E. M. Domínguez, Javier Franco, Arnaud Lefray, Ó. López, Saioa Ros, Jonathan Rouzaud-Cornabas, C. Toinard, Mikel Uriarte
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task. To address this issue, in [1], we have proposed a language that can be used to express both security and assurance properties on distributed resources. Then, we have shown how these global properties can be cut into a set of properties to be enforced locally. In this paper, we show how these local properties can be used to automatically configure security mechanisms. Our language is context-based which allows it to be easily adapted to any resource naming systems e.g., Linux and Android (with SELinux) or PostgreSQL. Moreover, by abstracting low-level functionalities (e.g., deny write to a file) through capabilities, our language remains independent from the security mechanisms. These capabilities can then be combined into security and assurance properties in order to provide high-level functionalities, such as confidentiality or integrity. Furthermore, we propose a global architecture that receives these properties and automatically configures the security and assurance mechanisms accordingly. Finally, we express the security and assurance policies of an industrial environment for a commercialized product and show how its security is enforced.
在将基础设施(资源、数据、通信)部署到云计算平台之前,公司希望确保它将得到适当的保护。在部署时,公司通过一组属性提供描述其安全需求的安全策略。一旦部署了基础设施,公司希望确保该策略得到应用和执行。但是描述和执行安全属性并获得强有力的证据是一项复杂的任务。为了解决这个问题,在[1]中,我们提出了一种语言,可以用来表达分布式资源的安全性和保证属性。然后,我们展示了如何将这些全局属性分割成一组属性以在本地执行。在本文中,我们将展示如何使用这些本地属性来自动配置安全机制。我们的语言是基于上下文的,这使得它可以很容易地适应任何资源命名系统,例如Linux和Android(带有SELinux)或PostgreSQL。此外,通过功能抽象底层功能(例如,拒绝写入文件),我们的语言保持独立于安全机制。然后可以将这些功能组合到安全性和保证属性中,以提供高级功能,例如机密性或完整性。此外,我们提出了一个接收这些属性并相应地自动配置安全和保证机制的全局体系结构。最后,我们表达了一个商业化产品的工业环境的安全和保证政策,并展示了它的安全性是如何执行的。
{"title":"Enforcing Security and Assurance Properties in Cloud Environment","authors":"Aline Bousquet, Jérémy Briffaut, E. Caron, E. M. Domínguez, Javier Franco, Arnaud Lefray, Ó. López, Saioa Ros, Jonathan Rouzaud-Cornabas, C. Toinard, Mikel Uriarte","doi":"10.1109/UCC.2015.45","DOIUrl":"https://doi.org/10.1109/UCC.2015.45","url":null,"abstract":"Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But describing and enforcing security properties and getting strong evidences of it is a complex task. To address this issue, in [1], we have proposed a language that can be used to express both security and assurance properties on distributed resources. Then, we have shown how these global properties can be cut into a set of properties to be enforced locally. In this paper, we show how these local properties can be used to automatically configure security mechanisms. Our language is context-based which allows it to be easily adapted to any resource naming systems e.g., Linux and Android (with SELinux) or PostgreSQL. Moreover, by abstracting low-level functionalities (e.g., deny write to a file) through capabilities, our language remains independent from the security mechanisms. These capabilities can then be combined into security and assurance properties in order to provide high-level functionalities, such as confidentiality or integrity. Furthermore, we propose a global architecture that receives these properties and automatically configures the security and assurance mechanisms accordingly. Finally, we express the security and assurance policies of an industrial environment for a commercialized product and show how its security is enforced.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PLAN: A Policy-Aware VM Management Scheme for Cloud Data Centres PLAN:基于策略的云数据中心虚拟机管理方案
Lin Cui, Fung Po Tso, D. Pezaros, Weijia Jia
Policies play an important role in network configuration and therefore in offering secure and high performance services especially over multi-tenant Cloud Data Center (DC) environments. At the same time, elastic resource provisioning through virtualization often disregards policy requirements, assuming that the policy implementation is handled by the underlying network infrastructure. This can result in policy violations, performance degradation and security vulnerabilities. In this paper, we define PLAN, a PoLicy-Aware and Network-aware VM management scheme to jointly consider DC communication cost reduction through Virtual Machine (VM) migration while meeting network policy requirements. We show that the problem is NP-hard and derive an efficient approximate algorithm to reduce communication cost while adhering to policy constraints. Through extensive evaluation, we show that PLAN can reduce topology-wide communication cost by 38% over diverse aggregate traffic and configuration policies.
策略在网络配置中扮演着重要的角色,因此在提供安全和高性能的服务时,尤其是在多租户云数据中心(DC)环境中。同时,通过虚拟化提供弹性资源通常忽略策略需求,假设策略实现是由底层网络基础设施处理的。这可能导致违反策略、性能下降和安全漏洞。本文定义了一种策略感知和网络感知的虚拟机管理方案PLAN,在满足网络策略要求的同时,通过虚拟机迁移来降低数据中心通信成本。我们证明了这个问题是np困难的,并推导了一个有效的近似算法来降低通信成本,同时遵守策略约束。通过广泛的评估,我们表明PLAN可以在不同的聚合流量和配置策略下将拓扑范围的通信成本降低38%。
{"title":"PLAN: A Policy-Aware VM Management Scheme for Cloud Data Centres","authors":"Lin Cui, Fung Po Tso, D. Pezaros, Weijia Jia","doi":"10.1109/UCC.2015.30","DOIUrl":"https://doi.org/10.1109/UCC.2015.30","url":null,"abstract":"Policies play an important role in network configuration and therefore in offering secure and high performance services especially over multi-tenant Cloud Data Center (DC) environments. At the same time, elastic resource provisioning through virtualization often disregards policy requirements, assuming that the policy implementation is handled by the underlying network infrastructure. This can result in policy violations, performance degradation and security vulnerabilities. In this paper, we define PLAN, a PoLicy-Aware and Network-aware VM management scheme to jointly consider DC communication cost reduction through Virtual Machine (VM) migration while meeting network policy requirements. We show that the problem is NP-hard and derive an efficient approximate algorithm to reduce communication cost while adhering to policy constraints. Through extensive evaluation, we show that PLAN can reduce topology-wide communication cost by 38% over diverse aggregate traffic and configuration policies.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Many-objective virtual machine placement for dynamic environments 动态环境下的多目标虚拟机布局
Diego Ihara, Fabio Lopez Pires, B. Barán
This paper presents for the first time a formulation of the Virtual Machine Placement as a Many-Objective problem (MaVMP), considering the simultaneous optimization of the following five objective functions for dynamic environments: (1) power consumption, (2) inter-VM network traffic, (3) economical revenue, (4) number of VM migrations and (5) network traffic overhead for VM migrations. To solve the formulated MaVMP problem, a novel Memetic Algorithm is proposed. As a potentially large number of feasible solutions at any time is one of the challenges of MaVMP, five selection strategies are evaluated in order to automatically select one solution at each time. The proposed algorithm with the considered selection strategies were evaluated in two different scenarios.
本文首次提出了虚拟机放置的多目标问题(MaVMP)的表述,考虑了动态环境下以下五个目标函数的同时优化:(1)功耗,(2)虚拟机间网络流量,(3)经济收入,(4)虚拟机迁移数量和(5)虚拟机迁移的网络流量开销。为了解决公式化的MaVMP问题,提出了一种新的模因算法。由于在任何时候都可能存在大量可行的解决方案是MaVMP的挑战之一,因此评估了五种选择策略,以便每次自动选择一个解决方案。在两种不同的场景下对该算法进行了评价。
{"title":"Many-objective virtual machine placement for dynamic environments","authors":"Diego Ihara, Fabio Lopez Pires, B. Barán","doi":"10.1109/UCC.2015.22","DOIUrl":"https://doi.org/10.1109/UCC.2015.22","url":null,"abstract":"This paper presents for the first time a formulation of the Virtual Machine Placement as a Many-Objective problem (MaVMP), considering the simultaneous optimization of the following five objective functions for dynamic environments: (1) power consumption, (2) inter-VM network traffic, (3) economical revenue, (4) number of VM migrations and (5) network traffic overhead for VM migrations. To solve the formulated MaVMP problem, a novel Memetic Algorithm is proposed. As a potentially large number of feasible solutions at any time is one of the challenges of MaVMP, five selection strategies are evaluated in order to automatically select one solution at each time. The proposed algorithm with the considered selection strategies were evaluated in two different scenarios.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis 开放实现云基础设施的可行性:博弈论分析
C. Kamhoua, Anbang Ruan, Andrew P. Martin, K. Kwiat
Trusting a cloud infrastructure is a hard problem, which urgently needs effective solutions. There are increasing demands for switching to the cloud in the sectors of financial, healthcare, or government etc., where data security protections are among the highest priorities. But most of them are left unsatisfied, due to the current cloud infrastructures' lack of provable trustworthiness. Trusted Computing (TC) technologies implement effective mechanisms for attesting to the genuine behaviors of a software platform. Integrating TC with cloud infrastructure shows a promising method for verifying the cloud's behaviors, which may in turn facilitate provable trustworthiness. However, the side effect of TC also brings concerns: exhibiting genuine behaviors might attract targeted attacks. Consequently, current Trusted Cloud proposals only integrate limited TC capabilities, which hampers the effective and practical trust establishment. In this paper, we aim to justify the benefits of a fully Open-Implementation cloud infrastructure, which means that the cloud's implementation and configuration details can be inspected by both the legitimate and malicious cloud users. We applied game theoretic analysis to discover the new dynamics formed between the Cloud Service Provider (CSP) and cloud users, when the Open-Implementation strategy is introduced. We conclude that, even though Open-Implementation cloud may facilitate attacks, vulnerabilities or misconfiguration are easier to discover, which in turn reduces the total security threats. Also, cyber threat monitoring and sharing are made easier in an Open-Implementation cloud. More importantly, the cloud's provable trustworthiness will attract more legitimate users, which increases CSP's revenue and helps lowering the price. This eventually creates a virtuous cycle, which will benefit both the CSP and legitimate users.
信任云基础设施是一个难题,迫切需要有效的解决方案。在金融、医疗保健或政府等部门,数据安全保护是最优先考虑的,因此转向云的需求越来越大。但由于目前的云基础设施缺乏可证明的可信度,他们中的大多数人都不满意。可信计算(TC)技术实现了有效的机制来证明软件平台的真实行为。将TC与云基础设施集成显示了一种验证云行为的有前途的方法,这可能反过来促进可证明的可信度。然而,TC的副作用也带来了担忧:表现出真实的行为可能会吸引有针对性的攻击。因此,目前的可信云提案只集成了有限的TC功能,这阻碍了有效和实际的信任建立。在本文中,我们的目标是证明一个完全开放实现的云基础设施的好处,这意味着云的实现和配置细节可以被合法和恶意的云用户检查。本文运用博弈论的分析方法,揭示了云服务提供商(CSP)与云用户之间在引入开放实现策略后形成的新的动态关系。我们的结论是,尽管开放实现云可能会促进攻击,但漏洞或错误配置更容易被发现,这反过来又减少了总体安全威胁。此外,网络威胁的监控和共享在开放实施的云中变得更加容易。更重要的是,云计算可证明的可靠性将吸引更多的合法用户,这将增加CSP的收入,并有助于降低价格。这最终会形成一个良性循环,对CSP和合法用户都有利。
{"title":"On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis","authors":"C. Kamhoua, Anbang Ruan, Andrew P. Martin, K. Kwiat","doi":"10.1109/UCC.2015.38","DOIUrl":"https://doi.org/10.1109/UCC.2015.38","url":null,"abstract":"Trusting a cloud infrastructure is a hard problem, which urgently needs effective solutions. There are increasing demands for switching to the cloud in the sectors of financial, healthcare, or government etc., where data security protections are among the highest priorities. But most of them are left unsatisfied, due to the current cloud infrastructures' lack of provable trustworthiness. Trusted Computing (TC) technologies implement effective mechanisms for attesting to the genuine behaviors of a software platform. Integrating TC with cloud infrastructure shows a promising method for verifying the cloud's behaviors, which may in turn facilitate provable trustworthiness. However, the side effect of TC also brings concerns: exhibiting genuine behaviors might attract targeted attacks. Consequently, current Trusted Cloud proposals only integrate limited TC capabilities, which hampers the effective and practical trust establishment. In this paper, we aim to justify the benefits of a fully Open-Implementation cloud infrastructure, which means that the cloud's implementation and configuration details can be inspected by both the legitimate and malicious cloud users. We applied game theoretic analysis to discover the new dynamics formed between the Cloud Service Provider (CSP) and cloud users, when the Open-Implementation strategy is introduced. We conclude that, even though Open-Implementation cloud may facilitate attacks, vulnerabilities or misconfiguration are easier to discover, which in turn reduces the total security threats. Also, cyber threat monitoring and sharing are made easier in an Open-Implementation cloud. More importantly, the cloud's provable trustworthiness will attract more legitimate users, which increases CSP's revenue and helps lowering the price. This eventually creates a virtuous cycle, which will benefit both the CSP and legitimate users.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Biomorphic Model for Automated Cloud Adaptation 自动云适应的生物形态模型
G. Stoykov, A. Yazidi
Although there is an extensive amount of research covering in the area of Cloud computing, the field of bioinspired cloud computing is underinvestigated when compared to the general research area. This study tries to find answers on how a biomorphic model can be implemented in the cloud in order to achieve adaptive cloud behaviour. The process of cellular differentiation where cells transform from one type to another, is chosen to be the foundation model for a developed technical model. We define analogies to the cloud where stem cells are blank servers and web servers are cells with a specific function. With a combination of configuration management, version control and cloud deployment systems, an imitation of this biological process is applied in the cloud. The use of automated cloud scaling as a case of adaptive behaviour is the main goal of the research. One approach has been developed for mapping the biological model to the cloud which consists of a prototype where the signal detection and node activation is being triggered by using the concept of random generated timers. The obtained performance results were varying, depending on the general timer distribution, providing new ideas for future improvements and different algorithm proposals.
尽管在云计算领域有大量的研究,但与一般研究领域相比,生物启发云计算领域的研究不足。本研究试图找到如何在云中实现生物形态模型以实现自适应云行为的答案。细胞从一种类型转化为另一种类型的细胞分化过程被选为已开发的技术模型的基础模型。我们定义了与云的类比,其中干细胞是空白服务器,而web服务器是具有特定功能的细胞。通过组合配置管理、版本控制和云部署系统,在云中应用了对这种生物过程的模仿。使用自动云扩展作为自适应行为的一个案例是研究的主要目标。已经开发了一种将生物模型映射到云的方法,云由一个原型组成,其中信号检测和节点激活是通过使用随机生成的计时器的概念触发的。所获得的性能结果是不同的,这取决于一般的定时器分布,为未来的改进和不同的算法建议提供了新的思路。
{"title":"A Biomorphic Model for Automated Cloud Adaptation","authors":"G. Stoykov, A. Yazidi","doi":"10.1109/UCC.2015.34","DOIUrl":"https://doi.org/10.1109/UCC.2015.34","url":null,"abstract":"Although there is an extensive amount of research covering in the area of Cloud computing, the field of bioinspired cloud computing is underinvestigated when compared to the general research area. This study tries to find answers on how a biomorphic model can be implemented in the cloud in order to achieve adaptive cloud behaviour. The process of cellular differentiation where cells transform from one type to another, is chosen to be the foundation model for a developed technical model. We define analogies to the cloud where stem cells are blank servers and web servers are cells with a specific function. With a combination of configuration management, version control and cloud deployment systems, an imitation of this biological process is applied in the cloud. The use of automated cloud scaling as a case of adaptive behaviour is the main goal of the research. One approach has been developed for mapping the biological model to the cloud which consists of a prototype where the signal detection and node activation is being triggered by using the concept of random generated timers. The obtained performance results were varying, depending on the general timer distribution, providing new ideas for future improvements and different algorithm proposals.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124915654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1