首页 > 最新文献

2015 IEEE International Conference on Cloud Engineering最新文献

英文 中文
Substring Position Search over Encrypted Cloud Data Using Tree-Based Index 使用基于树的索引在加密云数据上搜索子字符串位置
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.33
M. Strizhov, I. Ray
Existing Searchable Encryption (SE) solutions are able to handle simple boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involves identifying the position of the substring within the document. These types of queries are relevant in areas such as searching DNA data. In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. Our solution efficiently finds occurrences of a substrings over encrypted cloud data. We formally define the leakage functions and security properties of SSP-SSE. Then, we prove that the proposed scheme is secure against chosen-keyword attacks that involve an adaptive adversary. Our analysis demonstrates that SSP-SSE introduces very low overhead on computation and storage.
现有的可搜索加密(Searchable Encryption, SE)解决方案能够处理简单的布尔搜索查询,比如单关键字或多关键字查询,但不能处理加密数据上的子字符串搜索查询,这些查询还涉及识别子字符串在文档中的位置。这些类型的查询与搜索DNA数据等领域相关。在本文中,我们提出了一种基于树的子串位置可搜索对称加密(SSP-SSE)来克服现有的缺陷。我们的解决方案有效地查找加密云数据上出现的子字符串。正式定义了SSP-SSE的泄漏函数和安全特性。然后,我们证明了所提出的方案对于涉及自适应对手的选择关键字攻击是安全的。我们的分析表明,SSP-SSE在计算和存储方面的开销非常低。
{"title":"Substring Position Search over Encrypted Cloud Data Using Tree-Based Index","authors":"M. Strizhov, I. Ray","doi":"10.1109/IC2E.2015.33","DOIUrl":"https://doi.org/10.1109/IC2E.2015.33","url":null,"abstract":"Existing Searchable Encryption (SE) solutions are able to handle simple boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involves identifying the position of the substring within the document. These types of queries are relevant in areas such as searching DNA data. In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. Our solution efficiently finds occurrences of a substrings over encrypted cloud data. We formally define the leakage functions and security properties of SSP-SSE. Then, we prove that the proposed scheme is secure against chosen-keyword attacks that involve an adaptive adversary. Our analysis demonstrates that SSP-SSE introduces very low overhead on computation and storage.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Multi-resource Sharing-Aware Approximation Algorithm for Virtual Machine Maximization 一种感知多资源共享的虚拟机最大化逼近算法
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.20
Safraz Rampersaud, Daniel Grosu
Cloud providers face the challenge of efficiently managing their infrastructure through minimizing resource consumption while allocating requests such that their profit is maximized. We address this challenge by designing a greedy approximation algorithm for solving the multi-resource sharing-aware virtual machine maximization (MSAVMM) problem. The MSAVMM problem requires determining the set of VMs that can be instantiated on a given server such that the profit derived from hosting the VMs is maximized. The solution to this problem has to consider the sharing of memory pages among VMs and the restricted capacities of each type of resource requested by the VMs. We analyze the performance of the proposed algorithm by determining its approximation ratio and by performing extensive experiments against other sharing-aware VM allocation algorithms.
云提供商面临的挑战是,如何在分配请求的同时最小化资源消耗,从而实现利润最大化,从而有效地管理其基础设施。我们通过设计一个贪心逼近算法来解决多资源共享感知虚拟机最大化(MSAVMM)问题来解决这一挑战。MSAVMM问题需要确定可以在给定服务器上实例化的虚拟机集,以便从托管虚拟机中获得的利润最大化。此问题的解决方案必须考虑虚拟机之间的内存页面共享以及虚拟机请求的每种资源的有限容量。我们通过确定其近似比率并通过对其他共享感知VM分配算法进行广泛的实验来分析所提出算法的性能。
{"title":"A Multi-resource Sharing-Aware Approximation Algorithm for Virtual Machine Maximization","authors":"Safraz Rampersaud, Daniel Grosu","doi":"10.1109/IC2E.2015.20","DOIUrl":"https://doi.org/10.1109/IC2E.2015.20","url":null,"abstract":"Cloud providers face the challenge of efficiently managing their infrastructure through minimizing resource consumption while allocating requests such that their profit is maximized. We address this challenge by designing a greedy approximation algorithm for solving the multi-resource sharing-aware virtual machine maximization (MSAVMM) problem. The MSAVMM problem requires determining the set of VMs that can be instantiated on a given server such that the profit derived from hosting the VMs is maximized. The solution to this problem has to consider the sharing of memory pages among VMs and the restricted capacities of each type of resource requested by the VMs. We analyze the performance of the proposed algorithm by determining its approximation ratio and by performing extensive experiments against other sharing-aware VM allocation algorithms.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automated Capturing and Systematic Usage of DevOps Knowledge for Cloud Applications 自动捕获和系统地使用云应用程序的DevOps知识
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.23
Johannes Wettinger, V. Andrikopoulos, F. Leymann
DevOps is an emerging paradigm to actively foster the collaboration between system developers and operations in order to enable efficient end-to-end automation of software deployment and management processes. DevOps is typically combined with Cloud computing, which enables rapid, on-demand provisioning of underlying resources such as virtual servers, storage, or database instances using APIs in a self-service manner. Today, an ever-growing amount of DevOps tools, reusable artifacts such as scripts, and Cloud services are available to implement DevOps automation. Thus, informed decision making on the appropriate approach (es) for the needs of an application is hard. In this work we present a collaborative and holistic approach to capture DevOps knowledge in a knowledgebase. Beside the ability to capture expert knowledge and utilize crowd sourcing approaches, we implemented a crawling framework to automatically discover and capture DevOps knowledge. Moreover, we show how this knowledge is utilized to deploy and operate Cloud applications.
DevOps是一种新兴的范例,它积极促进系统开发人员和操作人员之间的协作,从而实现有效的端到端软件部署和管理流程的自动化。DevOps通常与云计算相结合,云计算能够以自助方式使用api快速、按需地提供底层资源,如虚拟服务器、存储或数据库实例。如今,越来越多的DevOps工具、可重用工件(如脚本)和云服务可用于实现DevOps自动化。因此,根据应用程序的需要对适当的方法做出明智的决策是困难的。在这项工作中,我们提出了一种协作和整体的方法来获取知识库中的DevOps知识。除了能够获取专家知识和利用众包方法之外,我们还实现了一个爬行框架来自动发现和获取DevOps知识。此外,我们还展示了如何利用这些知识来部署和操作云应用程序。
{"title":"Automated Capturing and Systematic Usage of DevOps Knowledge for Cloud Applications","authors":"Johannes Wettinger, V. Andrikopoulos, F. Leymann","doi":"10.1109/IC2E.2015.23","DOIUrl":"https://doi.org/10.1109/IC2E.2015.23","url":null,"abstract":"DevOps is an emerging paradigm to actively foster the collaboration between system developers and operations in order to enable efficient end-to-end automation of software deployment and management processes. DevOps is typically combined with Cloud computing, which enables rapid, on-demand provisioning of underlying resources such as virtual servers, storage, or database instances using APIs in a self-service manner. Today, an ever-growing amount of DevOps tools, reusable artifacts such as scripts, and Cloud services are available to implement DevOps automation. Thus, informed decision making on the appropriate approach (es) for the needs of an application is hard. In this work we present a collaborative and holistic approach to capture DevOps knowledge in a knowledgebase. Beside the ability to capture expert knowledge and utilize crowd sourcing approaches, we implemented a crawling framework to automatically discover and capture DevOps knowledge. Moreover, we show how this knowledge is utilized to deploy and operate Cloud applications.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115579219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Container Orchestration for Scientific Workflows 科学工作流的容器编排
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.87
Wolfgang Gerlach, Wei Tang, Andreas Wilke, Dan Olson, Folker Meyer
Recently, Linux container technology has been gaining attention as it promises to transform the way software is developed and deployed. The portability and ease of deployment makes Linux containers an ideal technology to be used in scientific workflow platforms. AWE/Shock is a scalable data analysis platform designed to execute data intensive scientific workflows. Recently we introduced Skyport, an extension to AWE/Shock, that uses Docker container technology to orchestrate and automate the deployment of individual workflow tasks onto the worker machines. The installation of software in independent execution environments for each task reduces complexity and offers an elegant solution to installation problems such as library version conflicts. The systematic use of isolated execution environments for workflow tasks also offers a convenient and simple mechanism to reproduce scientific results.
最近,Linux容器技术因为承诺改变软件开发和部署的方式而备受关注。可移植性和易于部署使Linux容器成为科学工作流平台中使用的理想技术。AWE/Shock是一个可扩展的数据分析平台,旨在执行数据密集型科学工作流程。最近我们介绍了Skyport,这是AWE/Shock的扩展,它使用Docker容器技术来编排和自动部署单个工作流任务到工作机器上。在每个任务的独立执行环境中安装软件降低了复杂性,并为库版本冲突等安装问题提供了一种优雅的解决方案。系统地使用工作流任务的隔离执行环境也提供了一种方便和简单的机制来重现科学结果。
{"title":"Container Orchestration for Scientific Workflows","authors":"Wolfgang Gerlach, Wei Tang, Andreas Wilke, Dan Olson, Folker Meyer","doi":"10.1109/IC2E.2015.87","DOIUrl":"https://doi.org/10.1109/IC2E.2015.87","url":null,"abstract":"Recently, Linux container technology has been gaining attention as it promises to transform the way software is developed and deployed. The portability and ease of deployment makes Linux containers an ideal technology to be used in scientific workflow platforms. AWE/Shock is a scalable data analysis platform designed to execute data intensive scientific workflows. Recently we introduced Skyport, an extension to AWE/Shock, that uses Docker container technology to orchestrate and automate the deployment of individual workflow tasks onto the worker machines. The installation of software in independent execution environments for each task reduces complexity and offers an elegant solution to installation problems such as library version conflicts. The systematic use of isolated execution environments for workflow tasks also offers a convenient and simple mechanism to reproduce scientific results.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126119357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Compressed Hierarchical Bitmaps for Efficiently Processing Different Query Workloads 压缩分层位图,有效处理不同的查询工作负载
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.99
P. Nagarkar
Today the amount of data that is being processed is growing manyfold. Fast and scalable data processing systems are the need of the hour because of the data deluge. Indexing is a very common mechanism used in data processing systems for fast and efficient search of the data. In many systems, the I/O needed to read and fetch the relevant part of the index into the main memory dominates the overall query processing cost. My research is focused on reducing this I/O cost by effective indexing algorithms. I have particularly focused on using bitmap indices, which are a very efficient indexing mechanism particularly used in data warehouse environments due to their high compressibility and ability to perform bitwise operations even on compressed bitmaps. Column-store architecture is preferred in such environments because of their ability to leverage bitmap indices. Column domains are often hierarchical in nature, and hence using hierarchical bitmap indices is often beneficial. I have designed algorithms for choosing a subset of these hierarchical bitmap indices for 1D as well as spatial data in order to execute range query workloads for various different scenarios. I have shown experimentally that these solutions are very efficient and scalable. Currently, I am focusing on leveraging hierarchical bitmap indices to solve approximate nearest neighbor queries.
今天,正在处理的数据量增长了许多倍。由于数据泛滥,快速和可扩展的数据处理系统是当前的需求。索引是数据处理系统中用于快速有效地搜索数据的一种非常常见的机制。在许多系统中,从主存中读取和获取索引相关部分所需的I/O占据了总体查询处理成本。我的研究重点是通过有效的索引算法来减少这种I/O成本。我特别关注位图索引的使用,这是一种非常有效的索引机制,特别是在数据仓库环境中使用,因为它们具有高压缩性,并且即使在压缩的位图上也能执行按位操作。列存储体系结构在这种环境中是首选,因为它们能够利用位图索引。列域在本质上通常是分层的,因此使用分层位图索引通常是有益的。我设计了一些算法,用于为1D和空间数据选择这些分层位图索引的子集,以便为各种不同的场景执行范围查询工作负载。我已经通过实验证明了这些解决方案是非常有效和可扩展的。目前,我专注于利用分层位图索引来解决近似最近邻查询。
{"title":"Compressed Hierarchical Bitmaps for Efficiently Processing Different Query Workloads","authors":"P. Nagarkar","doi":"10.1109/IC2E.2015.99","DOIUrl":"https://doi.org/10.1109/IC2E.2015.99","url":null,"abstract":"Today the amount of data that is being processed is growing manyfold. Fast and scalable data processing systems are the need of the hour because of the data deluge. Indexing is a very common mechanism used in data processing systems for fast and efficient search of the data. In many systems, the I/O needed to read and fetch the relevant part of the index into the main memory dominates the overall query processing cost. My research is focused on reducing this I/O cost by effective indexing algorithms. I have particularly focused on using bitmap indices, which are a very efficient indexing mechanism particularly used in data warehouse environments due to their high compressibility and ability to perform bitwise operations even on compressed bitmaps. Column-store architecture is preferred in such environments because of their ability to leverage bitmap indices. Column domains are often hierarchical in nature, and hence using hierarchical bitmap indices is often beneficial. I have designed algorithms for choosing a subset of these hierarchical bitmap indices for 1D as well as spatial data in order to execute range query workloads for various different scenarios. I have shown experimentally that these solutions are very efficient and scalable. Currently, I am focusing on leveraging hierarchical bitmap indices to solve approximate nearest neighbor queries.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Real World Data Corruptions in Cloud Systems 理解云系统中真实世界的数据损坏
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.41
Peipei Wang, D. Dean, Xiaohui Gu
Big data processing is one of the killer applications for cloud systems. MapReduce systems such as Hadoop are the most popular big data processing platforms used in the cloud system. Data corruption is one of the most critical problems in cloud data processing, which not only has serious impact on the integrity of individual application results but also affects the performance and availability of the whole data processing system. In this paper, we present a comprehensive study on 138 real world data corruption incidents reported in Hadoop bug repositories. We characterize those data corruption problems in four aspects: 1) what impact can data corruption have on the application and system? 2) how is data corruption detected? 3) what are the causes of the data corruption? and 4) what problems can occur while attempting to handle data corruption? Our study has made the following findings: 1) the impact of data corruption is not limited to data integrity, 2) existing data corruption detection schemes are quite insufficient: only 25% of data corruption problems are correctly reported, 42% are silent data corruption without any error message, and 21% receive imprecise error report. We also found the detection system raised 12% false alarms, 3) there are various causes of data corruption such as improper runtime checking, race conditions, inconsistent block states, improper network failure handling, and improper node crash handling, and 4) existing data corruption handling mechanisms (i.e., data replication, replica deletion, simple re-execution) make frequent mistakes including replicating corrupted data blocks, deleting uncorrupted data blocks, or causing undesirable resource hogging.
大数据处理是云系统的杀手级应用之一。Hadoop等MapReduce系统是云系统中使用的最流行的大数据处理平台。数据损坏是云数据处理中最关键的问题之一,它不仅严重影响单个应用结果的完整性,而且影响整个数据处理系统的性能和可用性。在本文中,我们对Hadoop bug库中报告的138个真实世界的数据损坏事件进行了全面研究。我们从四个方面来描述这些数据损坏问题:1)数据损坏对应用程序和系统有什么影响?2)如何检测数据损坏?3)数据损坏的原因是什么?4)在尝试处理数据损坏时会发生什么问题?我们的研究得出以下结论:1)数据损坏的影响不仅仅局限于数据完整性;2)现有的数据损坏检测方案相当不足:只有25%的数据损坏问题被正确报告,42%的数据损坏是无声的,没有任何错误消息,21%的错误报告不精确。我们还发现检测系统产生了12%的虚警,3)数据损坏的原因多种多样,如运行时检查不当,竞争条件,块状态不一致,网络故障处理不当,节点崩溃处理不当,4)现有的数据损坏处理机制(即数据复制,副本删除,简单的重新执行)经常出现错误,包括复制损坏的数据块,删除未损坏的数据块,或者导致不希望的资源占用。
{"title":"Understanding Real World Data Corruptions in Cloud Systems","authors":"Peipei Wang, D. Dean, Xiaohui Gu","doi":"10.1109/IC2E.2015.41","DOIUrl":"https://doi.org/10.1109/IC2E.2015.41","url":null,"abstract":"Big data processing is one of the killer applications for cloud systems. MapReduce systems such as Hadoop are the most popular big data processing platforms used in the cloud system. Data corruption is one of the most critical problems in cloud data processing, which not only has serious impact on the integrity of individual application results but also affects the performance and availability of the whole data processing system. In this paper, we present a comprehensive study on 138 real world data corruption incidents reported in Hadoop bug repositories. We characterize those data corruption problems in four aspects: 1) what impact can data corruption have on the application and system? 2) how is data corruption detected? 3) what are the causes of the data corruption? and 4) what problems can occur while attempting to handle data corruption? Our study has made the following findings: 1) the impact of data corruption is not limited to data integrity, 2) existing data corruption detection schemes are quite insufficient: only 25% of data corruption problems are correctly reported, 42% are silent data corruption without any error message, and 21% receive imprecise error report. We also found the detection system raised 12% false alarms, 3) there are various causes of data corruption such as improper runtime checking, race conditions, inconsistent block states, improper network failure handling, and improper node crash handling, and 4) existing data corruption handling mechanisms (i.e., data replication, replica deletion, simple re-execution) make frequent mistakes including replicating corrupted data blocks, deleting uncorrupted data blocks, or causing undesirable resource hogging.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards Secure Agile Agent-Oriented System Design 面向安全敏捷代理的系统设计
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.95
S. H. Adelyar
Agile methods are criticized to be inadequate for developing secure digital services. Currently, the softwareresearch community only partially studies security for agile practices. Our more holistic approach is identifying the security challenges / benefits of agile practices that relate to the core "embrace-changes" principle. For this case-study based research, we consider eXtreme Programming (XP) for a holistic security integration into agile practices.
敏捷方法被批评为不适合开发安全的数字服务。目前,软件研究社区只对敏捷实践的安全性进行了部分研究。我们更全面的方法是识别与核心“拥抱变化”原则相关的敏捷实践的安全挑战/好处。对于这个基于案例研究的研究,我们考虑将极限编程(XP)集成到敏捷实践中。
{"title":"Towards Secure Agile Agent-Oriented System Design","authors":"S. H. Adelyar","doi":"10.1109/IC2E.2015.95","DOIUrl":"https://doi.org/10.1109/IC2E.2015.95","url":null,"abstract":"Agile methods are criticized to be inadequate for developing secure digital services. Currently, the softwareresearch community only partially studies security for agile practices. Our more holistic approach is identifying the security challenges / benefits of agile practices that relate to the core \"embrace-changes\" principle. For this case-study based research, we consider eXtreme Programming (XP) for a holistic security integration into agile practices.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transforming Vertical Web Applications into Elastic Cloud Applications 将垂直Web应用程序转换为弹性云应用程序
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.15
Nikola Tanković, Tihana Galinac Grbac, Hong Linh Truong, S. Dustdar
There exists a huge amount of vertical applications that are developed for isolated computing environments. Due to increasing demand for additional resources there is a clear need to adapt these applications to the distributed environments. However, this is not an easy task and numerous variants are possible. Moreover, in this transition a new quality requirements become important, such as application elasticity. Application elasticity has to be built into a software system to enable smooth cost optimization at the run-time. In this paper, we provide a framework for evaluating different transformation variants of vertical Java EE multi-tiered applications into elastic cloud applications. With support of this framework the software developer is guided how to transform its application achieving optimal elasticity strategy. The framework is evaluated on slicing and evaluating elasticity of existing SaaS multi-tiered Java application used in Croatian market.
有大量的垂直应用程序是为孤立的计算环境开发的。由于对额外资源的需求不断增加,显然需要使这些应用程序适应分布式环境。然而,这不是一件容易的事,可能有许多变体。此外,在这种转变中,新的质量要求变得很重要,例如应用程序的弹性。必须将应用程序弹性构建到软件系统中,才能在运行时实现平稳的成本优化。在本文中,我们提供了一个框架,用于评估垂直Java EE多层应用程序到弹性云应用程序的不同转换变体。在此框架的支持下,指导软件开发人员如何转换其应用程序以实现最优弹性策略。对克罗地亚市场上现有的SaaS多层Java应用程序的弹性进行了切片和评估。
{"title":"Transforming Vertical Web Applications into Elastic Cloud Applications","authors":"Nikola Tanković, Tihana Galinac Grbac, Hong Linh Truong, S. Dustdar","doi":"10.1109/IC2E.2015.15","DOIUrl":"https://doi.org/10.1109/IC2E.2015.15","url":null,"abstract":"There exists a huge amount of vertical applications that are developed for isolated computing environments. Due to increasing demand for additional resources there is a clear need to adapt these applications to the distributed environments. However, this is not an easy task and numerous variants are possible. Moreover, in this transition a new quality requirements become important, such as application elasticity. Application elasticity has to be built into a software system to enable smooth cost optimization at the run-time. In this paper, we provide a framework for evaluating different transformation variants of vertical Java EE multi-tiered applications into elastic cloud applications. With support of this framework the software developer is guided how to transform its application achieving optimal elasticity strategy. The framework is evaluated on slicing and evaluating elasticity of existing SaaS multi-tiered Java application used in Croatian market.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cross-Layer Scheduling in Cloud Systems 云系统中的跨层调度
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.36
H. Alkaff, Indranil Gupta, Luke M. Leslie
Today, cloud computing engines such as stream-processing Storm and batch-processing Hadoop are being increasingly run atop software-defined networks (SDNs). In such cloud stacks, the scheduler of the application engine (which allocates tasks to servers) remains decoupled from the SDN scheduler (which allocates network routes). We propose a new approach that performs cross-layer scheduling between the application layer and the networking layer. This coordinated scheduling orchestrates the placement of application tasks (e.g., Hadoop maps and reduces, or Storm bolts) in tandem with the selection of network routes that arise from these tasks. We present results from both cluster deployment and simulation, and using two representative network topologies: Fat-tree and Jellyfish. Our results show that cross-layer scheduling can improve throughput of Hadoop and Storm by between 26% to 34% in a 30-host cluster, and it scales well.
如今,流处理Storm和批处理Hadoop等云计算引擎越来越多地运行在软件定义网络(sdn)之上。在这样的云堆栈中,应用程序引擎的调度器(将任务分配给服务器)与SDN调度器(分配网络路由)保持分离。我们提出了一种在应用层和网络层之间执行跨层调度的新方法。这种协调调度协调了应用程序任务的位置(例如,Hadoop映射和减少,或Storm螺栓)与这些任务产生的网络路由的选择。我们展示了集群部署和仿真的结果,并使用了两种代表性的网络拓扑:Fat-tree和Jellyfish。我们的结果表明,在30台主机的集群中,跨层调度可以将Hadoop和Storm的吞吐量提高26%到34%,并且可扩展性很好。
{"title":"Cross-Layer Scheduling in Cloud Systems","authors":"H. Alkaff, Indranil Gupta, Luke M. Leslie","doi":"10.1109/IC2E.2015.36","DOIUrl":"https://doi.org/10.1109/IC2E.2015.36","url":null,"abstract":"Today, cloud computing engines such as stream-processing Storm and batch-processing Hadoop are being increasingly run atop software-defined networks (SDNs). In such cloud stacks, the scheduler of the application engine (which allocates tasks to servers) remains decoupled from the SDN scheduler (which allocates network routes). We propose a new approach that performs cross-layer scheduling between the application layer and the networking layer. This coordinated scheduling orchestrates the placement of application tasks (e.g., Hadoop maps and reduces, or Storm bolts) in tandem with the selection of network routes that arise from these tasks. We present results from both cluster deployment and simulation, and using two representative network topologies: Fat-tree and Jellyfish. Our results show that cross-layer scheduling can improve throughput of Hadoop and Storm by between 26% to 34% in a 30-host cluster, and it scales well.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SDStorage: A Software Defined Storage Experimental Framework SDStorage:软件定义存储实验框架
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.60
Ala Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, A. Rindos
With the rapid growth of data centers and the unprecedented increase in storage demands, the traditional storage control techniques are considered unsuitable to deal with this large volume of data in an efficient manner. The Software Defined Storage (SDStore) comes as a solution for this issue by abstracting the storage control operations from the storage devices and set it inside a centralized controller in the software layer. Building a real SDStore system without any simulation and emulation is considered an expensive solution and may have a lot of risks. Thus, there is a need to simulate such systems before the real-life implementation and deployment. In this paper we present SDStorage, an experimental framework to provide a novel virtualized test bed environment for SDStore systems. The main idea of SDStorage is based on the Mininet Software Defined Network (SDN) Open Flow simulator and is built over of it. The main components of Mininet, which are the host, the switch and the controller, are customized to serve the needs of SDStore simulation environments.
随着数据中心的快速增长和存储需求的空前增长,传统的存储控制技术已经无法有效地处理如此庞大的数据量。软件定义存储(SDStore)通过从存储设备中抽象存储控制操作并将其设置在软件层的集中控制器中来解决这个问题。在没有任何模拟和仿真的情况下构建一个真正的SDStore系统被认为是一个昂贵的解决方案,并且可能有很多风险。因此,有必要在实际实现和部署之前模拟这样的系统。在本文中,我们提出了SDStorage,这是一个实验框架,为SDStore系统提供了一个新的虚拟化测试平台环境。SDStorage的主要思想是基于Mininet软件定义网络(SDN)开放流模拟器,并在其基础上构建。Mininet的主要组件是主机、交换机和控制器,它们是定制的,以满足SDStore仿真环境的需求。
{"title":"SDStorage: A Software Defined Storage Experimental Framework","authors":"Ala Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, A. Rindos","doi":"10.1109/IC2E.2015.60","DOIUrl":"https://doi.org/10.1109/IC2E.2015.60","url":null,"abstract":"With the rapid growth of data centers and the unprecedented increase in storage demands, the traditional storage control techniques are considered unsuitable to deal with this large volume of data in an efficient manner. The Software Defined Storage (SDStore) comes as a solution for this issue by abstracting the storage control operations from the storage devices and set it inside a centralized controller in the software layer. Building a real SDStore system without any simulation and emulation is considered an expensive solution and may have a lot of risks. Thus, there is a need to simulate such systems before the real-life implementation and deployment. In this paper we present SDStorage, an experimental framework to provide a novel virtualized test bed environment for SDStore systems. The main idea of SDStorage is based on the Mininet Software Defined Network (SDN) Open Flow simulator and is built over of it. The main components of Mininet, which are the host, the switch and the controller, are customized to serve the needs of SDStore simulation environments.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123458526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
2015 IEEE International Conference on Cloud Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1