首页 > 最新文献

2015 IEEE International Conference on Cloud Engineering最新文献

英文 中文
Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud 高效检索关键材料,用于检测云中的潜在恶意流量
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.26
John T. Saxon, B. Bordbar, K. Harrison
Cloud providers must detect malicious traffic in and out of their network, virtual or otherwise. The use of Intrusion Detection Systems (IDS) has been hampered by the encryption of network communication. The result is that current signatures cannot match potentially malicious requests. A method to acquire the encryption keys is Virtual Machine Introspection (VMI). VMI is a technique to view the internal, and yet raw, representation of a Virtual Machine (VM). Current methods to find keys are expensive and use sliding windows or entropy. This inevitably requires reading the memory space of the entire process, or worse the OS, in a live environment where performance is paramount. This paper describes a structured walk of memory to find keys, particularly RSA, using as fewer reads from the VM as possible. In doing this we create a scalable mechanism to populate an IDS with keys to analyse traffic.
云提供商必须检测进出其网络的恶意流量,无论是虚拟的还是其他的。入侵检测系统(IDS)的应用一直受到网络通信加密的制约。结果是当前签名无法匹配潜在的恶意请求。获取加密密钥的一种方法是虚拟机自省(VMI)。VMI是一种查看虚拟机(VM)内部原始表示的技术。目前寻找密钥的方法是昂贵的,并且使用滑动窗口或熵。这不可避免地需要读取整个进程的内存空间,或者更糟糕的是,在性能至关重要的实时环境中读取操作系统。本文描述了一种结构化的内存漫游来查找键,特别是RSA,使用尽可能少的从VM读取。在这样做的过程中,我们创建了一个可扩展的机制,用键填充IDS来分析流量。
{"title":"Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud","authors":"John T. Saxon, B. Bordbar, K. Harrison","doi":"10.1109/IC2E.2015.26","DOIUrl":"https://doi.org/10.1109/IC2E.2015.26","url":null,"abstract":"Cloud providers must detect malicious traffic in and out of their network, virtual or otherwise. The use of Intrusion Detection Systems (IDS) has been hampered by the encryption of network communication. The result is that current signatures cannot match potentially malicious requests. A method to acquire the encryption keys is Virtual Machine Introspection (VMI). VMI is a technique to view the internal, and yet raw, representation of a Virtual Machine (VM). Current methods to find keys are expensive and use sliding windows or entropy. This inevitably requires reading the memory space of the entire process, or worse the OS, in a live environment where performance is paramount. This paper describes a structured walk of memory to find keys, particularly RSA, using as fewer reads from the VM as possible. In doing this we create a scalable mechanism to populate an IDS with keys to analyse traffic.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
National Cloud Computing Principles: Guidance for Public Sector Authorities Moving to the Cloud 国家云计算原则:公共部门主管部门转向云的指南
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.104
Stephen Mutkoski
Governments around the world are actively seeking to leverage the many benefits of cloud computing while also ensuring that they manage risks that deployment of the new technologies can raise. While laws and regulations related to the privacy and security of government data may already exist, many were drafted in the "pre-cloud" era and could therefore benefit from an update and revision. This paper explores some of the concepts that should be incorporated into new or amended laws that seek to guide public sector entities as they move their data and workloads to the cloud.
世界各国政府都在积极寻求利用云计算的诸多好处,同时也确保管理部署新技术可能带来的风险。虽然与政府数据隐私和安全有关的法律法规可能已经存在,但许多法律法规是在“前云”时代起草的,因此可以从更新和修订中受益。本文探讨了应纳入新法律或修订法律的一些概念,这些法律旨在指导公共部门实体将数据和工作负载迁移到云。
{"title":"National Cloud Computing Principles: Guidance for Public Sector Authorities Moving to the Cloud","authors":"Stephen Mutkoski","doi":"10.1109/IC2E.2015.104","DOIUrl":"https://doi.org/10.1109/IC2E.2015.104","url":null,"abstract":"Governments around the world are actively seeking to leverage the many benefits of cloud computing while also ensuring that they manage risks that deployment of the new technologies can raise. While laws and regulations related to the privacy and security of government data may already exist, many were drafted in the \"pre-cloud\" era and could therefore benefit from an update and revision. This paper explores some of the concepts that should be incorporated into new or amended laws that seek to guide public sector entities as they move their data and workloads to the cloud.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125821526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards an Ontology-Based Intercloud Resource Catalogue -- The IEEE P2302 Intercloud Approach for a Semantic Resource Exchange 迈向基于本体的云间资源目录——IEEE P2302云间语义资源交换方法
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.76
B. D. Martino, Giuseppina Cretella, A. Esposito, A. Willner, A. Alloush, D. Bernstein, D. Vij, J. Weinman
The Cloud Computing paradigm has been adopted in countless areas of application and forms the basis of a growing number of business cases. Similar to the situation with service providers in the 1980th, it becomes apparent that different Cloud providers build walled gardens around their offerings. While multiple projects and organizations are working on standards for federating Cloud domains, the scalable exchange of descriptions about heterogeneous resources are often not well considered. Our approach is to adopt both, ideas initially developed for the Internet to define a scalable architecture and concepts from the Semantic Web to define a canonical Intercloud ontology. An initial implementation of the architecture has been developed to form a basis for further refinement of the proposed concepts. As a result, we have defined an initial ontology for Intercloud resources and implemented a catalog for the IEEE Intercloud architecture.
云计算范式已被应用于无数领域,并成为越来越多业务案例的基础。与服务提供商在20世纪80年代的情况类似,很明显,不同的云提供商在他们的产品周围建立了围墙花园。当多个项目和组织正在制定联合云域的标准时,关于异构资源描述的可伸缩交换通常没有得到很好的考虑。我们的方法是两者兼而有之,最初为互联网开发的想法是定义一个可扩展的体系结构,而语义网的概念是定义一个规范的云间本体。该体系结构的初步实现已经开发出来,为进一步细化所提议的概念奠定了基础。因此,我们为Intercloud资源定义了一个初始本体,并为IEEE Intercloud架构实现了一个目录。
{"title":"Towards an Ontology-Based Intercloud Resource Catalogue -- The IEEE P2302 Intercloud Approach for a Semantic Resource Exchange","authors":"B. D. Martino, Giuseppina Cretella, A. Esposito, A. Willner, A. Alloush, D. Bernstein, D. Vij, J. Weinman","doi":"10.1109/IC2E.2015.76","DOIUrl":"https://doi.org/10.1109/IC2E.2015.76","url":null,"abstract":"The Cloud Computing paradigm has been adopted in countless areas of application and forms the basis of a growing number of business cases. Similar to the situation with service providers in the 1980th, it becomes apparent that different Cloud providers build walled gardens around their offerings. While multiple projects and organizations are working on standards for federating Cloud domains, the scalable exchange of descriptions about heterogeneous resources are often not well considered. Our approach is to adopt both, ideas initially developed for the Internet to define a scalable architecture and concepts from the Semantic Web to define a canonical Intercloud ontology. An initial implementation of the architecture has been developed to form a basis for further refinement of the proposed concepts. As a result, we have defined an initial ontology for Intercloud resources and implemented a catalog for the IEEE Intercloud architecture.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cloud Storage Services: A Model of (In)Consistency 云存储服务:一致性模型
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.82
D. Terry
Summary form only given. Cloud storage systems invariably replicate data for high availability and low latency access. Application designers, as well as cloud providers, must deal with trade-offs between consistency, performance, and availability. Some cloud services provide strong data consistency to their clients while others have chosen eventual consistency. Increasingly, systems are offering a choice of consistency when reading shared data. This talk examines the implications of such a choice and explores a broader class of consistency guarantees that can, and perhaps should, be provided within the cloud.
只提供摘要形式。云存储系统总是复制数据以实现高可用性和低延迟访问。应用程序设计人员以及云提供商必须在一致性、性能和可用性之间进行权衡。一些云服务为其客户提供强大的数据一致性,而其他云服务则选择最终一致性。越来越多的系统在读取共享数据时提供一致性选择。本次演讲将探讨这种选择的含义,并探讨可以(也许应该)在云中提供的更广泛的一致性保证。
{"title":"Cloud Storage Services: A Model of (In)Consistency","authors":"D. Terry","doi":"10.1109/IC2E.2015.82","DOIUrl":"https://doi.org/10.1109/IC2E.2015.82","url":null,"abstract":"Summary form only given. Cloud storage systems invariably replicate data for high availability and low latency access. Application designers, as well as cloud providers, must deal with trade-offs between consistency, performance, and availability. Some cloud services provide strong data consistency to their clients while others have chosen eventual consistency. Increasingly, systems are offering a choice of consistency when reading shared data. This talk examines the implications of such a choice and explores a broader class of consistency guarantees that can, and perhaps should, be provided within the cloud.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130342827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approving Updates in Collaborative Databases 批准协作数据库中的更新
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.31
Khaleel W. Mershad, Q. Malluhi, M. Ouzzani, Mingjie Tang, Walid G. Aref
Data curation activities in collaborative databases mandate that collaborators interact until they converge and agree on the content of their data. Typically, updates by a member of the collaboration are made visible to all collaborators for comments but at the same time are pending the approval or rejection of the data custodian, e.g., the principal scientist or investigator (PI). In current database technologies, approval and authorization of updates is based solely on the identity of the user, e.g., via the SQL GRANT and REVOKE commands. However, in collaborative environments, the updated data is open for collaborators for discussion and further editing and is finally approved or rejected by the PI based on the content of the data and not on the identity of the updater. In this paper, we introduce a cloud-based collaborative database system that promotes and enables collaboration and data curation scenarios. We realize content-based update approval and history tracking of updates inside HBase, a distributed and scalable open-source cluster-based database. The design and implementation as well as a detailed performance study of several approaches for update approval are presented and contrasted in the paper.
协作数据库中的数据管理活动要求协作者进行交互,直到他们在数据内容上达成一致。通常,协作成员的更新对所有合作者都是可见的,以供评论,但同时也等待数据管理员的批准或拒绝,例如,首席科学家或研究员(PI)。在当前的数据库技术中,更新的批准和授权完全基于用户的身份,例如,通过SQL GRANT和REVOKE命令。然而,在协作环境中,更新后的数据是开放的,供合作者讨论和进一步编辑,最终由PI根据数据的内容批准或拒绝,而不是根据更新者的身份。在本文中,我们介绍了一个基于云的协作数据库系统,该系统促进并实现了协作和数据管理场景。我们在HBase中实现了基于内容的更新审批和更新的历史跟踪,HBase是一个分布式、可扩展的开源集群数据库。本文介绍了几种更新审批方法的设计、实现和详细的性能研究,并进行了对比。
{"title":"Approving Updates in Collaborative Databases","authors":"Khaleel W. Mershad, Q. Malluhi, M. Ouzzani, Mingjie Tang, Walid G. Aref","doi":"10.1109/IC2E.2015.31","DOIUrl":"https://doi.org/10.1109/IC2E.2015.31","url":null,"abstract":"Data curation activities in collaborative databases mandate that collaborators interact until they converge and agree on the content of their data. Typically, updates by a member of the collaboration are made visible to all collaborators for comments but at the same time are pending the approval or rejection of the data custodian, e.g., the principal scientist or investigator (PI). In current database technologies, approval and authorization of updates is based solely on the identity of the user, e.g., via the SQL GRANT and REVOKE commands. However, in collaborative environments, the updated data is open for collaborators for discussion and further editing and is finally approved or rejected by the PI based on the content of the data and not on the identity of the updater. In this paper, we introduce a cloud-based collaborative database system that promotes and enables collaboration and data curation scenarios. We realize content-based update approval and history tracking of updates inside HBase, a distributed and scalable open-source cluster-based database. The design and implementation as well as a detailed performance study of several approaches for update approval are presented and contrasted in the paper.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Finding the Big Data Sweet Spot: Towards Automatically Recommending Configurations for Hadoop Clusters on Docker Containers 寻找大数据的最佳点:在Docker容器上自动推荐Hadoop集群配置
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.101
Rui Zhang, Min Li, Dean Hildebrand
The complexity of cloud-based analytics environments threatens to undermine their otherwise tremendous values. In particular, configuring such environments presents a great challenge. We propose to alleviate this issue with an engine that recommends configurations for a newly submitted analytics job in an intelligent and timely manner. The engine is rooted in a modified k-nearest neighbor algorithm, which finds desirable configurations from similar past jobs that have performed well. We apply the method to configuring an important class of analytics environments: Hadoop on container-driven clouds. Preliminary evaluation suggests up to 28% performance gain could result from our method.
基于云的分析环境的复杂性可能会破坏它们原本巨大的价值。特别是,配置这样的环境是一个巨大的挑战。我们建议使用一个引擎来缓解这个问题,该引擎可以智能及时地为新提交的分析工作推荐配置。该引擎基于一种改进的k近邻算法,该算法从过去表现良好的类似作业中找到理想的配置。我们将该方法应用于配置一类重要的分析环境:容器驱动云上的Hadoop。初步评估表明,我们的方法可以使性能提高28%。
{"title":"Finding the Big Data Sweet Spot: Towards Automatically Recommending Configurations for Hadoop Clusters on Docker Containers","authors":"Rui Zhang, Min Li, Dean Hildebrand","doi":"10.1109/IC2E.2015.101","DOIUrl":"https://doi.org/10.1109/IC2E.2015.101","url":null,"abstract":"The complexity of cloud-based analytics environments threatens to undermine their otherwise tremendous values. In particular, configuring such environments presents a great challenge. We propose to alleviate this issue with an engine that recommends configurations for a newly submitted analytics job in an intelligent and timely manner. The engine is rooted in a modified k-nearest neighbor algorithm, which finds desirable configurations from similar past jobs that have performed well. We apply the method to configuring an important class of analytics environments: Hadoop on container-driven clouds. Preliminary evaluation suggests up to 28% performance gain could result from our method.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133199381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A Two-Level Cluster-Based Cognitive Radio Sensor Network: System Architecture, Hardware Design, and Distributed Protocols 基于两级集群的认知无线电传感器网络:系统架构、硬件设计和分布式协议
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.46
H. Salameh, Mohammed F. Dhainat, Ali Al-Hajji, Raed Aqeli, Mohammad Fathi
In this paper, we present an integrated hardware design and software implementation for a cognitive-radio wireless sensor network (CR-WSN). The implemented CR-WSN is an event-driven cluster-based network, where the sensor nodes in the network are organized into a two-level hierarchy of clusters, each with its own cognitive-enabled cluster-head (CR-CH). According to CR-WSN, the sensed data by a sensor node is reported to the associated CR-CH. The CR-CH opportunistically transmits the collected information over one of the idle primary radio channels to the data collecting node (sink). Specifically, we first describe the hardware design and implementation of the CRWSN. Then, we propose a novel hybrid MAC design for the CR-WSN that ensures reliable and timely data delivery. The proposed protocol divides the MAC-layer operation into two domains: single-channel intra-cluster and cognitive inter-cluster domains. Experimental results are provided, which verify the effectiveness of the proposed MAC protocol and demonstrate a reliable, robust and scalable performance of the proposed system.
在本文中,我们提出了一种认知无线电无线传感器网络(CR-WSN)的集成硬件设计和软件实现。实现的CR-WSN是一个事件驱动的基于集群的网络,其中网络中的传感器节点被组织成两个层次的集群,每个集群都有自己的认知支持簇头(CR-CH)。根据CR-WSN,一个传感器节点的感知数据被报告给相关的CR-CH。CR-CH机会性地将收集到的信息通过一个空闲的主无线电信道传输到数据收集节点(sink)。具体来说,我们首先描述了CRWSN的硬件设计和实现。然后,我们提出了一种新的混合MAC设计,以确保CR-WSN数据的可靠和及时传输。该协议将mac层操作分为两个域:单通道集群内域和认知集群间域。实验结果验证了所提出的MAC协议的有效性,并证明了所提出的系统具有可靠、鲁棒和可扩展的性能。
{"title":"A Two-Level Cluster-Based Cognitive Radio Sensor Network: System Architecture, Hardware Design, and Distributed Protocols","authors":"H. Salameh, Mohammed F. Dhainat, Ali Al-Hajji, Raed Aqeli, Mohammad Fathi","doi":"10.1109/IC2E.2015.46","DOIUrl":"https://doi.org/10.1109/IC2E.2015.46","url":null,"abstract":"In this paper, we present an integrated hardware design and software implementation for a cognitive-radio wireless sensor network (CR-WSN). The implemented CR-WSN is an event-driven cluster-based network, where the sensor nodes in the network are organized into a two-level hierarchy of clusters, each with its own cognitive-enabled cluster-head (CR-CH). According to CR-WSN, the sensed data by a sensor node is reported to the associated CR-CH. The CR-CH opportunistically transmits the collected information over one of the idle primary radio channels to the data collecting node (sink). Specifically, we first describe the hardware design and implementation of the CRWSN. Then, we propose a novel hybrid MAC design for the CR-WSN that ensures reliable and timely data delivery. The proposed protocol divides the MAC-layer operation into two domains: single-channel intra-cluster and cognitive inter-cluster domains. Experimental results are provided, which verify the effectiveness of the proposed MAC protocol and demonstrate a reliable, robust and scalable performance of the proposed system.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Understanding the Linguistic Characteristics of Network Signaling for the 'Internet of Things' Using n-Grams 使用n-Grams理解“物联网”网络信号的语言特征
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.22
S. P. Emmons, F. Kamangar
In the expanding 'Internet of Things' (IoT), 'Machine-to-Machine' (M2M) applications exist with large homogeneous populations of devices that utilize general-purpose communications infrastructures, and in particular, cellular wireless networks. Understanding the behavior of these applications at large scale can be challenging since they often operate within an environment with various layers of abstraction and where system activity at one layer may lead to unanticipated consequences at other layers. This paper investigates several commercial M2M applications at the cellular wireless "signaling layer," and looks specifically at how the linguistic characteristics, in the form of n-grams, of device interactions with cellular carrier network elements help provide insights into the systems' behavior.
在不断扩大的“物联网”(IoT)中,“机器对机器”(M2M)应用存在于大量同类设备中,这些设备利用通用通信基础设施,特别是蜂窝无线网络。大规模地理解这些应用程序的行为可能具有挑战性,因为它们通常在具有各种抽象层的环境中运行,其中一层的系统活动可能会导致其他层的意外后果。本文研究了蜂窝无线“信号层”的几个商业M2M应用,并特别关注设备与蜂窝运营商网络元素交互的n-grams形式的语言特征如何有助于洞察系统的行为。
{"title":"Understanding the Linguistic Characteristics of Network Signaling for the 'Internet of Things' Using n-Grams","authors":"S. P. Emmons, F. Kamangar","doi":"10.1109/IC2E.2015.22","DOIUrl":"https://doi.org/10.1109/IC2E.2015.22","url":null,"abstract":"In the expanding 'Internet of Things' (IoT), 'Machine-to-Machine' (M2M) applications exist with large homogeneous populations of devices that utilize general-purpose communications infrastructures, and in particular, cellular wireless networks. Understanding the behavior of these applications at large scale can be challenging since they often operate within an environment with various layers of abstraction and where system activity at one layer may lead to unanticipated consequences at other layers. This paper investigates several commercial M2M applications at the cellular wireless \"signaling layer,\" and looks specifically at how the linguistic characteristics, in the form of n-grams, of device interactions with cellular carrier network elements help provide insights into the systems' behavior.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of a Cloud-Federation Agent for Software Defined Networking 软件定义网络的云联合代理的设计与实现
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.58
Constantin Gaul, Marc Körner, O. Kao
This paper introduces a cloud-federation agent which enables a horizontal network federation between different cloud providers, based on Software Defined Networking (SDN). Furthermore, tenants, using the cloud's Infrastructureas a Service (IaaS) model, have a fine grained access to the resources via an exposed Open Flow interface, deployed on top of the SDN router's virtualized control plane. This provides complete management and control capabilities of a virtual SDN (vSDN) substrate and gives tenants the freedom to deploy virtual network-appliances or services using Network Function Virtualization (NFV) on top of the allocated vSDN.
本文介绍了一种基于软件定义网络(SDN)的云联合代理,它可以实现不同云提供商之间的横向网络联合。此外,租户使用云的基础设施即服务(IaaS)模型,可以通过公开的Open Flow接口(部署在SDN路由器的虚拟化控制平面之上)对资源进行细粒度访问。这为虚拟SDN (virtual SDN)提供了完整的管理和控制功能,并允许租户在已分配的vSDN之上使用网络功能虚拟化(Network Function Virtualization, NFV)自由部署虚拟网络设备或服务。
{"title":"Design and Implementation of a Cloud-Federation Agent for Software Defined Networking","authors":"Constantin Gaul, Marc Körner, O. Kao","doi":"10.1109/IC2E.2015.58","DOIUrl":"https://doi.org/10.1109/IC2E.2015.58","url":null,"abstract":"This paper introduces a cloud-federation agent which enables a horizontal network federation between different cloud providers, based on Software Defined Networking (SDN). Furthermore, tenants, using the cloud's Infrastructureas a Service (IaaS) model, have a fine grained access to the resources via an exposed Open Flow interface, deployed on top of the SDN router's virtualized control plane. This provides complete management and control capabilities of a virtual SDN (vSDN) substrate and gives tenants the freedom to deploy virtual network-appliances or services using Network Function Virtualization (NFV) on top of the allocated vSDN.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Graph Aware Caching Policy for Distributed Graph Stores 分布式图存储的图感知缓存策略
Pub Date : 2015-03-09 DOI: 10.1109/IC2E.2015.39
Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, I. Korpeoglu, Ö. Ulusoy
Graph stores are becoming increasingly popular among NOSQL applications seeking flexibility and heterogeneity in managing linked data. Conceptually and in practice, applications ranging from social networks, knowledge representations to Internet of things benefit from graph data stores built on a combination of relational and non-relational technologies aimed at desired performance characteristics. The most common data access pattern in querying graph stores is to traverse from a node to its neighboring nodes. This paper studies the impact of such traversal pattern to common data caching policies in a partitioned data environment where a big graph is distributed across servers in a cluster. We propose and evaluate a new graph aware caching policy designed to keep and evict nodes, edges and their metadata optimized for query traversal pattern. The algorithm distinguishes the topology of the graph as well as the latency of access to the graph nodes and neighbors. We implemented graph aware caching on a distributed data store Apache HBase in the Hadoop family. Performance evaluations showed up to 15x speedup on the benchmark datasets preferring our new graph aware policy over non-aware policies. We also show how to improve the performance of existing caching algorithms for distributed graphs by exploiting the topology information.
图存储在寻求管理关联数据的灵活性和异构性的NOSQL应用程序中变得越来越流行。从概念上和实践中,从社交网络、知识表示到物联网的应用程序都受益于基于关系和非关系技术的组合构建的图数据存储,这些技术旨在实现所需的性能特征。查询图存储中最常见的数据访问模式是从一个节点遍历到它的邻近节点。本文研究了这种遍历模式对分区数据环境中常见数据缓存策略的影响,其中大图分布在集群中的多个服务器上。我们提出并评估了一种新的图形感知缓存策略,该策略旨在保留和删除针对查询遍历模式优化的节点、边缘及其元数据。该算法区分了图的拓扑结构以及访问图节点和邻居的延迟。我们在Hadoop家族中的分布式数据存储Apache HBase上实现了图形感知缓存。性能评估显示,在基准数据集上,我们更喜欢新的图感知策略,而不是非感知策略,速度提高了15倍。我们还展示了如何通过利用拓扑信息来提高分布式图的现有缓存算法的性能。
{"title":"Graph Aware Caching Policy for Distributed Graph Stores","authors":"Hidayet Aksu, Mustafa Canim, Yuan-Chi Chang, I. Korpeoglu, Ö. Ulusoy","doi":"10.1109/IC2E.2015.39","DOIUrl":"https://doi.org/10.1109/IC2E.2015.39","url":null,"abstract":"Graph stores are becoming increasingly popular among NOSQL applications seeking flexibility and heterogeneity in managing linked data. Conceptually and in practice, applications ranging from social networks, knowledge representations to Internet of things benefit from graph data stores built on a combination of relational and non-relational technologies aimed at desired performance characteristics. The most common data access pattern in querying graph stores is to traverse from a node to its neighboring nodes. This paper studies the impact of such traversal pattern to common data caching policies in a partitioned data environment where a big graph is distributed across servers in a cluster. We propose and evaluate a new graph aware caching policy designed to keep and evict nodes, edges and their metadata optimized for query traversal pattern. The algorithm distinguishes the topology of the graph as well as the latency of access to the graph nodes and neighbors. We implemented graph aware caching on a distributed data store Apache HBase in the Hadoop family. Performance evaluations showed up to 15x speedup on the benchmark datasets preferring our new graph aware policy over non-aware policies. We also show how to improve the performance of existing caching algorithms for distributed graphs by exploiting the topology information.","PeriodicalId":395715,"journal":{"name":"2015 IEEE International Conference on Cloud Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE International Conference on Cloud Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1