首页 > 最新文献

2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)最新文献

英文 中文
Detecting Present Events to Predict Future: Detection and Evolution of Events on Twitter 检测当前事件以预测未来:Twitter上事件的检测和演变
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00023
Muhammad K. Ali, Lu Liu, Mohsen Farid
Event is not a one-off occurrence of something, rather it is a continuous chain of small events. Along with event detection, the event evolution is equally important. Most existing methods ignore the evolution of the events and further fails to identify the influential spreaders of that event. Moreover, for the impact of the continuous developing events, predicting the linkages with other premature events, will help in the domains of economy such as commodities and stock markets. Twitter is widely used as an effective source of data collection and provides unique keywords (hashtags). However, it does not provide insights about the trend which makes it difficult to detect events. The research experiment environment and preliminary results presented in this paper are currently based upon the Brexit’s historical dataset. However, we plan to define proper way to simultaneously snapshot whole dynamic dataset at different times and eventually use real-time data. Our motivation for the research is to develop a new data analytic system and supporting techniques to find events for enhancing the decision-making,,,, process.
事件不是某件事的一次性发生,而是一连串连续不断的小事件。与事件检测一样,事件演化也同样重要。大多数现有的方法都忽略了事件的演变,进一步无法确定该事件的有影响力的传播者。此外,对于持续发展事件的影响,预测与其他过早事件的联系,将有助于商品和股票市场等经济领域。Twitter被广泛用作有效的数据收集来源,并提供独特的关键字(标签)。然而,它没有提供关于趋势的见解,这使得很难发现事件。本文的研究实验环境和初步结果目前基于英国脱欧的历史数据集。但是,我们计划定义合适的方法,在不同时间同时对整个动态数据集进行快照,最终使用实时数据。我们的研究动机是开发一种新的数据分析系统和支持技术来发现事件,以增强决策,,,,过程。
{"title":"Detecting Present Events to Predict Future: Detection and Evolution of Events on Twitter","authors":"Muhammad K. Ali, Lu Liu, Mohsen Farid","doi":"10.1109/SOSE.2018.00023","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00023","url":null,"abstract":"Event is not a one-off occurrence of something, rather it is a continuous chain of small events. Along with event detection, the event evolution is equally important. Most existing methods ignore the evolution of the events and further fails to identify the influential spreaders of that event. Moreover, for the impact of the continuous developing events, predicting the linkages with other premature events, will help in the domains of economy such as commodities and stock markets. Twitter is widely used as an effective source of data collection and provides unique keywords (hashtags). However, it does not provide insights about the trend which makes it difficult to detect events. The research experiment environment and preliminary results presented in this paper are currently based upon the Brexit’s historical dataset. However, we plan to define proper way to simultaneously snapshot whole dynamic dataset at different times and eventually use real-time data. Our motivation for the research is to develop a new data analytic system and supporting techniques to find events for enhancing the decision-making,,,, process.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124783340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PoPF: A Consensus Algorithm for JCLedger PoPF:一种JCLedger的一致性算法
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00034
Xiang Fu, Huaimin Wang, Peichang Shi, Haibo Mi
JointCloud is a new generation of cloud computing model which facilitates developers to customize cloud services. JCLedger is a blockchain based distributed ledger for JointCloud computing which can make cloud resources exchange more reliable and convenient, and it is the combination of JointCloud and BlockChain. One of the most important elements for creating JCLedger is the consensus algorithm. PoW (Proof of Work) is the consensus algorithm for Bitcoin, which is proved to be quite safe but needs much computing power. The original PoW is not suitable for JCLedger because the identities of participants are not equal in computing power, which may lead to accounting monopoly, and the throughput cannot satisfy the requirement of the massive and high-frequency transactions in JointCloud. In this paper, we propose a PoW based consensus algorithm called Proof of Participation and Fees (PoPF), which can save much computing power and handled transactions more efficiently for JCLedger. In our design, only the candidates have the opportunities for mining and the candidates are chosen according to the ranking which is determined by two factors: the times of the participant to be the accountant and the fees the participant has paid. The difficulty for candidates of solving the PoW hash puzzle is different (the higher ranking means easier for mining). The simulation experiment shows that the distribution of accountants is well-balanced, that is to say, the unequal computing power of participants in JointCloud is shielded, and all the users who have enough contribution in JCLedger will have the opportunities to be accountants.
JointCloud是新一代的云计算模型,它帮助开发者定制云服务。JCLedger是一种基于区块链的分布式账本,用于JointCloud计算,可以使云资源交换更加可靠和方便,是JointCloud和blockchain的结合。创建JCLedger最重要的元素之一是共识算法。PoW(工作量证明)是比特币的共识算法,它被证明是相当安全的,但需要很大的计算能力。原来的PoW不适合JCLedger,因为参与者的身份在计算能力上不相等,可能导致会计垄断,并且吞吐量不能满足JointCloud中海量高频交易的要求。在本文中,我们提出了一种基于PoW的共识算法,称为参与和费用证明(PoPF),它可以为JCLedger节省大量的计算能力,并更有效地处理交易。在我们的设计中,只有候选人有挖掘的机会,候选人是根据排名来选择的,排名是由两个因素决定的:参与者担任会计的次数和参与者支付的费用。解决PoW哈希难题的候选难度是不同的(排名越高意味着更容易挖掘)。模拟实验表明,会计人员的分布是均衡的,即屏蔽了JointCloud中参与者计算能力的不平等,所有在JCLedger中有足够贡献的用户都有机会成为会计人员。
{"title":"PoPF: A Consensus Algorithm for JCLedger","authors":"Xiang Fu, Huaimin Wang, Peichang Shi, Haibo Mi","doi":"10.1109/SOSE.2018.00034","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00034","url":null,"abstract":"JointCloud is a new generation of cloud computing model which facilitates developers to customize cloud services. JCLedger is a blockchain based distributed ledger for JointCloud computing which can make cloud resources exchange more reliable and convenient, and it is the combination of JointCloud and BlockChain. One of the most important elements for creating JCLedger is the consensus algorithm. PoW (Proof of Work) is the consensus algorithm for Bitcoin, which is proved to be quite safe but needs much computing power. The original PoW is not suitable for JCLedger because the identities of participants are not equal in computing power, which may lead to accounting monopoly, and the throughput cannot satisfy the requirement of the massive and high-frequency transactions in JointCloud. In this paper, we propose a PoW based consensus algorithm called Proof of Participation and Fees (PoPF), which can save much computing power and handled transactions more efficiently for JCLedger. In our design, only the candidates have the opportunities for mining and the candidates are chosen according to the ranking which is determined by two factors: the times of the participant to be the accountant and the fees the participant has paid. The difficulty for candidates of solving the PoW hash puzzle is different (the higher ranking means easier for mining). The simulation experiment shows that the distribution of accountants is well-balanced, that is to say, the unequal computing power of participants in JointCloud is shielded, and all the users who have enough contribution in JCLedger will have the opportunities to be accountants.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MQTT-Driven Node Discovery for Integrated IoT-Fog Settings Revisited: The Impact of Advertiser Dynamicity mqtt驱动节点发现集成物联网雾设置重访:广告动态的影响
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00013
Riccardo Venanzi, B. Kantarci, L. Foschini, P. Bellavista
The recent advances in telecommunications, wide availability of powerful and always-connected smart devices, and the wide adoption of cloud computing services are paving the way towards the concept of fog computing. An outstanding problem in this area is the availability of effective application-layer protocols between service seekers and providers at the Internet of Things (IoT) level because most IoT nodes run on batteries. Hence, IoT-Fog discovery service must be energy efficient to prolong the lifetime of smart objects. This paper presents a thorough study of our previously proposed MQTT-driven IoT-fog integration, namely the Power Efficient Node Discovery (PEND), and investigates the impact of dynamic arrival patterns on its performance. The MQTT broker serves as a fog node to trigger turning on/off the Bluetooth Low Energy (BLE) interfaces of the surrounding objects by monitoring their trajectories. Furthermore it leverages this additional location awareness to significantly reduce the power consumption of the device discovery process for mobile devices. With this motivation, we present a detailed performance study of PEND under various settings and provide in-depth discussions of some lessons about the obtainable energy saving and the effectiveness of the our enhanced BLE device discovery solution. The results we present are valuable for the fog community to design new optimizations and to refine the whole IoT device discovery process to the purpose of better efficiency and scalability.
最近电信技术的进步、强大且始终连接的智能设备的广泛可用性以及云计算服务的广泛采用正在为雾计算的概念铺平道路。该领域的一个突出问题是,在物联网(IoT)层面,服务寻求者和提供商之间有效的应用层协议的可用性,因为大多数物联网节点都是靠电池运行的。因此,物联网雾发现服务必须节能,以延长智能对象的使用寿命。本文对我们之前提出的mqtt驱动的物联网雾集成,即节能节点发现(PEND)进行了深入研究,并研究了动态到达模式对其性能的影响。MQTT代理充当雾节点,通过监视周围对象的轨迹来触发打开/关闭蓝牙低功耗(BLE)接口。此外,它利用这种额外的位置感知来显著降低移动设备的设备发现过程的功耗。基于这一动机,我们对PEND在各种设置下的性能进行了详细的研究,并就可获得的节能和我们的增强型BLE设备发现解决方案的有效性进行了深入的讨论。我们提出的结果对于雾社区设计新的优化和完善整个物联网设备发现过程具有价值,以提高效率和可扩展性。
{"title":"MQTT-Driven Node Discovery for Integrated IoT-Fog Settings Revisited: The Impact of Advertiser Dynamicity","authors":"Riccardo Venanzi, B. Kantarci, L. Foschini, P. Bellavista","doi":"10.1109/SOSE.2018.00013","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00013","url":null,"abstract":"The recent advances in telecommunications, wide availability of powerful and always-connected smart devices, and the wide adoption of cloud computing services are paving the way towards the concept of fog computing. An outstanding problem in this area is the availability of effective application-layer protocols between service seekers and providers at the Internet of Things (IoT) level because most IoT nodes run on batteries. Hence, IoT-Fog discovery service must be energy efficient to prolong the lifetime of smart objects. This paper presents a thorough study of our previously proposed MQTT-driven IoT-fog integration, namely the Power Efficient Node Discovery (PEND), and investigates the impact of dynamic arrival patterns on its performance. The MQTT broker serves as a fog node to trigger turning on/off the Bluetooth Low Energy (BLE) interfaces of the surrounding objects by monitoring their trajectories. Furthermore it leverages this additional location awareness to significantly reduce the power consumption of the device discovery process for mobile devices. With this motivation, we present a detailed performance study of PEND under various settings and provide in-depth discussions of some lessons about the obtainable energy saving and the effectiveness of the our enhanced BLE device discovery solution. The results we present are valuable for the fog community to design new optimizations and to refine the whole IoT device discovery process to the purpose of better efficiency and scalability.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129474698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Semantic Integration of System Specifications to Support Different System Engineering Disciplines 支持不同系统工程学科的系统规范的语义集成
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00016
Alexander Rauh, Wolfgang Golubski, Stefan Queins
The assurance of high quality requirements and system specifications takes a huge effort and requires semantically integrated requirements. Especially when using different representations of requirements, the semantic integration is quite difficult. Today’s requirements management tools integrate requirements only syntactically and, thereby, provide only limited features to support the requirements analyst during quality assurance. The following paper describes a concept for the semantic integration of requirements documented in different representations into one common model. This model allows analysing and measuring the quality of the integrated requirements by applying algorithms. The mentioned integration concept is applied to a use case driven requirements elicitation and analysis process using different representations like several UML diagrams or even template based textual requirements. The foundation to measure the quality of the integrated requirements is explained.
保证高质量的需求和系统规范需要付出巨大的努力,并且需要语义上集成的需求。特别是当使用不同的需求表示时,语义集成是相当困难的。今天的需求管理工具只在语法上集成需求,因此,在质量保证期间只提供有限的特性来支持需求分析师。下面的文章描述了将以不同表示形式记录的需求语义集成到一个公共模型中的概念。该模型允许通过应用算法来分析和度量集成需求的质量。前面提到的集成概念应用于用例驱动的需求提取和分析过程,使用不同的表示,比如几个UML图,甚至是基于模板的文本需求。阐述了测量集成需求质量的基础。
{"title":"Semantic Integration of System Specifications to Support Different System Engineering Disciplines","authors":"Alexander Rauh, Wolfgang Golubski, Stefan Queins","doi":"10.1109/SOSE.2018.00016","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00016","url":null,"abstract":"The assurance of high quality requirements and system specifications takes a huge effort and requires semantically integrated requirements. Especially when using different representations of requirements, the semantic integration is quite difficult. Today’s requirements management tools integrate requirements only syntactically and, thereby, provide only limited features to support the requirements analyst during quality assurance. The following paper describes a concept for the semantic integration of requirements documented in different representations into one common model. This model allows analysing and measuring the quality of the integrated requirements by applying algorithms. The mentioned integration concept is applied to a use case driven requirements elicitation and analysis process using different representations like several UML diagrams or even template based textual requirements. The foundation to measure the quality of the integrated requirements is explained.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Policy Evaluation Framework for Flexible Service Provision 灵活服务提供的适应性政策评估框架
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00024
Hiroyuki Sato, S. Tanimoto, Toru Kobayashi, Atsushi Kanai
In the past decade, the framework of service polices has been established to ensure the transparency and accountability of operations of ICT services. This is generally called a "trust framework." The framework provides trust to its participants, in which economical operations are enabled. A modern framework of services are enpowered by IoT, where the environments often change in time. Here, we have to re-evaluate the policies when we observe changes in the environments. In this paper, we propose a formal model of adaptive policy evaluation framework that reflects the trust for the evaluation policy and the collection of environmental data by IoT devices. PDP runs under a given trust circle, receives assertions including policies of peers, and make a decision. Furthermore, we formalize the adaptive evalua- tion scheme of policies that reflects the dynamics of a trust circle which is affected by the environment of PDP. Monitor plays an essential role in controlling the trust circle by sensing the dynamic change of environments, which gives growth or shrink of a trust circle.
在过去十年中,已经建立了服务政策框架,以确保信息和通信技术服务运营的透明度和问责制。这通常被称为“信任框架”。该框架为其参与者提供信任,从而使经济运作成为可能。现代服务框架由物联网提供支持,其中环境经常随时间变化。在这里,当我们观察到环境的变化时,我们必须重新评估政策。在本文中,我们提出了一个正式的自适应政策评估框架模型,该模型反映了物联网设备对评估政策和环境数据收集的信任。PDP在给定的信任圈下运行,接收包括对等体策略在内的断言,并做出决策。此外,我们还形式化了反映受PDP环境影响的信任圈动态的策略自适应评价方案。Monitor通过感知环境的动态变化来控制信任圈,从而决定信任圈的增长或缩小,在这方面发挥着至关重要的作用。
{"title":"Adaptive Policy Evaluation Framework for Flexible Service Provision","authors":"Hiroyuki Sato, S. Tanimoto, Toru Kobayashi, Atsushi Kanai","doi":"10.1109/SOSE.2018.00024","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00024","url":null,"abstract":"In the past decade, the framework of service polices has been established to ensure the transparency and accountability of operations of ICT services. This is generally called a \"trust framework.\" The framework provides trust to its participants, in which economical operations are enabled. A modern framework of services are enpowered by IoT, where the environments often change in time. Here, we have to re-evaluate the policies when we observe changes in the environments. In this paper, we propose a formal model of adaptive policy evaluation framework that reflects the trust for the evaluation policy and the collection of environmental data by IoT devices. PDP runs under a given trust circle, receives assertions including policies of peers, and make a decision. Furthermore, we formalize the adaptive evalua- tion scheme of policies that reflects the dynamics of a trust circle which is affected by the environment of PDP. Monitor plays an essential role in controlling the trust circle by sensing the dynamic change of environments, which gives growth or shrink of a trust circle.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Server Push Technologies for Scalable Client-Server Communication 可扩展客户端-服务器通信的服务器推送技术评价
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00010
E. Soares, R. Thiago, L. Azevedo, M. D. Bayser, Viviane Torres da Silva, Renato Cerqueira
When a consumer (or client) invokes a provider’s service that has a long time processing, a synchronous call is not a good option. This kind of communication blocks the consumer until the response arrives, and, besides, the invocation timeout can be reached raising a timeout error. Hence, an asynchronous call is more appropriate where the consumer calls the provider’s service and continues processing, and, when the provider’s service finishes it pushes the response to the consumer. There are different ways for implementing an asynchronous communication. A simple way is the consumer providing a callback function which the provider’s service invokes when it finishes the processing, performing a server push operation. However, there are many cases where this solution cannot be applied requiring other alternatives, e.g.: the consumer keeps up with the service execution checking for its readiness or state, and when it finishes, it calls another provider’s service to get the result; the consumer and provider keep an open connection for the asynchronous communication. This work analyzes the main server push technologies used for web development, presenting their weaknesses and strengths, and the existing main challenges. As a result, we provide a technologies comparison, and a classification based on multiple qualitative dimensions that helps one to choose the technology that fits its requirements and/or can be used to guide future researches in this field.
当使用者(或客户端)调用具有长时间处理的提供者服务时,同步调用不是一个好的选择。这种类型的通信会阻塞使用者,直到响应到达,此外,调用超时可能会引发超时错误。因此,异步调用更适合使用者调用提供者的服务并继续处理,当提供者的服务完成时,它将响应推送给使用者。实现异步通信有不同的方法。一种简单的方法是消费者提供一个回调函数,当提供者的服务完成处理时调用它,执行服务器推送操作。然而,在许多情况下,该解决方案不能应用,需要其他替代方案,例如:消费者跟踪服务执行,检查其准备情况或状态,当它完成时,它调用另一个提供者的服务来获得结果;使用者和提供者为异步通信保持一个打开的连接。本文分析了用于web开发的主要服务器推送技术,指出了它们的优缺点,以及存在的主要挑战。因此,我们提供了一种技术比较,以及基于多个定性维度的分类,帮助人们选择符合其要求和/或可用于指导该领域未来研究的技术。
{"title":"Evaluation of Server Push Technologies for Scalable Client-Server Communication","authors":"E. Soares, R. Thiago, L. Azevedo, M. D. Bayser, Viviane Torres da Silva, Renato Cerqueira","doi":"10.1109/SOSE.2018.00010","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00010","url":null,"abstract":"When a consumer (or client) invokes a provider’s service that has a long time processing, a synchronous call is not a good option. This kind of communication blocks the consumer until the response arrives, and, besides, the invocation timeout can be reached raising a timeout error. Hence, an asynchronous call is more appropriate where the consumer calls the provider’s service and continues processing, and, when the provider’s service finishes it pushes the response to the consumer. There are different ways for implementing an asynchronous communication. A simple way is the consumer providing a callback function which the provider’s service invokes when it finishes the processing, performing a server push operation. However, there are many cases where this solution cannot be applied requiring other alternatives, e.g.: the consumer keeps up with the service execution checking for its readiness or state, and when it finishes, it calls another provider’s service to get the result; the consumer and provider keep an open connection for the asynchronous communication. This work analyzes the main server push technologies used for web development, presenting their weaknesses and strengths, and the existing main challenges. As a result, we provide a technologies comparison, and a classification based on multiple qualitative dimensions that helps one to choose the technology that fits its requirements and/or can be used to guide future researches in this field.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Extract the Architecture of Microservice-Based Software Systems 基于微服务的软件系统体系结构提取方法
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00012
Benjamin Mayer, R. Weinreich
Microservices decouple network-accessible system components to support independent development, deployment, and scalability. The architecture of microservice-based software systems is typically not de?ned upfront but emerges by dynamically assembling services to systems. This makes it hard to extract component relations from static sources since component relationships may only become evident at runtime. Existing systems focus either on the static structure of service relations, neglecting runtime properties, or on (short-term) monitoring of runtime properties to detect errors. We present an approach to extract and analyze the architecture of a microservice-based software system based on a combination of static service information with infrastructure-related and aggregated runtime information.
微服务将网络可访问的系统组件解耦,以支持独立的开发、部署和可伸缩性。基于微服务的软件系统的体系结构通常是不可靠的。Ned在前面,但是通过动态地将服务组装到系统中出现。这使得从静态源中提取组件关系变得困难,因为组件关系可能只在运行时变得明显。现有系统要么关注服务关系的静态结构,而忽略运行时属性,要么关注(短期)监控运行时属性以检测错误。我们提出了一种基于静态服务信息与基础设施相关的聚合运行时信息相结合的方法来提取和分析基于微服务的软件系统的体系结构。
{"title":"An Approach to Extract the Architecture of Microservice-Based Software Systems","authors":"Benjamin Mayer, R. Weinreich","doi":"10.1109/SOSE.2018.00012","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00012","url":null,"abstract":"Microservices decouple network-accessible system components to support independent development, deployment, and scalability. The architecture of microservice-based software systems is typically not de?ned upfront but emerges by dynamically assembling services to systems. This makes it hard to extract component relations from static sources since component relationships may only become evident at runtime. Existing systems focus either on the static structure of service relations, neglecting runtime properties, or on (short-term) monitoring of runtime properties to detect errors. We present an approach to extract and analyze the architecture of a microservice-based software system based on a combination of static service information with infrastructure-related and aggregated runtime information.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Secure and Efficient In-Hypervisor Memory Introspection Using Nested Virtualization 使用嵌套虚拟化的安全高效的管理程序内存内省
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00031
Weiwen Tang, Zeyu Mi
In JointCloud computing, the hypervisor used by each cloud plays a key role in providing services and protection for guest virtual machines (VMs). Unfortunately, the commodity hypervisor usually has a considerable attack surface and its memory is especially prone to be tampered with by an attacker who resides in one VM and then threatens the security of other co-located VMs. To mitigate such threat, previous solutions proposed an out-of-the-box design which leverages the nested virtualization to introduce a higher privileged software layer (a nested hypervisor) below the hypervisor. It also installs a security monitor into a trusted VM which is protected by the nested hypervisor and isolated from the untrusted hypervisor. The monitor is responsible for dynamically validating the behaviors of the untrusted hypervisor. Although monitoring from outside of the hypervisor can help ensure security, the large number of context switches caused by the nested virtualization incurs unacceptable overheads and makes this approach unsuitable for the cloud environment. In this paper, we introduce In-Hypervisor Memory Introspection (IHMI), an in-the-box way to monitor the hypervisor based on the nested virtualization. Our system puts the monitor into the untrusted hypervisor for efficiency while guaranteeing the same level of memory security as monitoring the hypervisor from a separated secure VM. By leveraging hardware virtualization features of current processors, IHMI isolates the monitor from the hypervisor via the nested page table and implements an efficient switch between them. Further, IHMI configures a uni-directional mapping for the monitor which allows the monitor to access the hypervisor’s memory at native speed while forbidding the hypervisor from accessing the monitor’s memory. Our IHMI system is currently still in an early stage and we report our design as well as preliminary evaluation results in this paper.
在JointCloud计算中,每个云使用的管理程序在为客户虚拟机(vm)提供服务和保护方面起着关键作用。不幸的是,商品管理程序通常具有相当大的攻击面,其内存特别容易被驻留在一个VM中的攻击者篡改,然后威胁到其他共置VM的安全性。为了减轻这种威胁,以前的解决方案提出了一种开箱即用的设计,它利用嵌套虚拟化在管理程序下面引入更高特权的软件层(嵌套管理程序)。它还将安全监视器安装到受信任的VM中,该VM受到嵌套管理程序的保护,并与不受信任的管理程序隔离。监视器负责动态验证不受信任的管理程序的行为。尽管从管理程序外部进行监视可以帮助确保安全性,但嵌套虚拟化导致的大量上下文切换会带来不可接受的开销,并且使这种方法不适合云环境。在本文中,我们介绍了一种基于嵌套虚拟化的虚拟机监控方法——虚拟机监控内存内省(IHMI)。我们的系统将监视器放入不受信任的管理程序中以提高效率,同时保证与从分离的安全VM监视管理程序相同级别的内存安全性。通过利用当前处理器的硬件虚拟化特性,IHMI通过嵌套页表将监视器与hypervisor隔离开来,并在它们之间实现有效的切换。此外,IHMI为监视器配置了单向映射,允许监视器以本机速度访问管理程序的内存,同时禁止管理程序访问监视器的内存。我们的IHMI系统目前仍处于早期阶段,我们在本文中报告了我们的设计和初步评估结果。
{"title":"Secure and Efficient In-Hypervisor Memory Introspection Using Nested Virtualization","authors":"Weiwen Tang, Zeyu Mi","doi":"10.1109/SOSE.2018.00031","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00031","url":null,"abstract":"In JointCloud computing, the hypervisor used by each cloud plays a key role in providing services and protection for guest virtual machines (VMs). Unfortunately, the commodity hypervisor usually has a considerable attack surface and its memory is especially prone to be tampered with by an attacker who resides in one VM and then threatens the security of other co-located VMs. To mitigate such threat, previous solutions proposed an out-of-the-box design which leverages the nested virtualization to introduce a higher privileged software layer (a nested hypervisor) below the hypervisor. It also installs a security monitor into a trusted VM which is protected by the nested hypervisor and isolated from the untrusted hypervisor. The monitor is responsible for dynamically validating the behaviors of the untrusted hypervisor. Although monitoring from outside of the hypervisor can help ensure security, the large number of context switches caused by the nested virtualization incurs unacceptable overheads and makes this approach unsuitable for the cloud environment. In this paper, we introduce In-Hypervisor Memory Introspection (IHMI), an in-the-box way to monitor the hypervisor based on the nested virtualization. Our system puts the monitor into the untrusted hypervisor for efficiency while guaranteeing the same level of memory security as monitoring the hypervisor from a separated secure VM. By leveraging hardware virtualization features of current processors, IHMI isolates the monitor from the hypervisor via the nested page table and implements an efficient switch between them. Further, IHMI configures a uni-directional mapping for the monitor which allows the monitor to access the hypervisor’s memory at native speed while forbidding the hypervisor from accessing the monitor’s memory. Our IHMI system is currently still in an early stage and we report our design as well as preliminary evaluation results in this paper.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131866515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
If Docker is the Answer, What is the Question? 如果Docker是答案,那么问题是什么?
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00027
Hong Zhu, Ian Bayley
The recent rise of cloud computing poses serious challenges for software engineering because it adds complexity not only to the platform and infrastructure, but to the software too. The demands on system scalability, performance and reliability are ever increasing. Industry solutions with widespread adoption include the microservices architecture, the container technology and the DevOps methodology. These approaches have changed software engineering practice in such a profound way that we argue that it is becoming a paradigm shift. In this paper, we examine the current support of programming languages for the key concepts behind the change in software engineering practice and argue that a novel programming language is required to support the new paradigm. We report a new programming language CAOPLE and its associated Integrated DevOps Environment CIDE and demonstrate the utility of both.
最近云计算的兴起给软件工程带来了严峻的挑战,因为它不仅增加了平台和基础设施的复杂性,也增加了软件的复杂性。人们对系统的可扩展性、性能和可靠性的要求越来越高。广泛采用的行业解决方案包括微服务架构、容器技术和DevOps方法。这些方法以如此深刻的方式改变了软件工程实践,我们认为它正在成为一种范式转变。在本文中,我们研究了当前对软件工程实践中变化背后的关键概念的编程语言的支持,并认为需要一种新的编程语言来支持新的范式。我们报告了一种新的编程语言caole及其相关的集成开发运维环境CIDE,并演示了两者的实用性。
{"title":"If Docker is the Answer, What is the Question?","authors":"Hong Zhu, Ian Bayley","doi":"10.1109/SOSE.2018.00027","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00027","url":null,"abstract":"The recent rise of cloud computing poses serious challenges for software engineering because it adds complexity not only to the platform and infrastructure, but to the software too. The demands on system scalability, performance and reliability are ever increasing. Industry solutions with widespread adoption include the microservices architecture, the container technology and the DevOps methodology. These approaches have changed software engineering practice in such a profound way that we argue that it is becoming a paradigm shift. In this paper, we examine the current support of programming languages for the key concepts behind the change in software engineering practice and argue that a novel programming language is required to support the new paradigm. We report a new programming language CAOPLE and its associated Integrated DevOps Environment CIDE and demonstrate the utility of both.","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Testing IoT Systems 测试物联网系统
Pub Date : 2018-03-26 DOI: 10.1109/SOSE.2018.00015
J. Voas, D. R. Kuhn, P. Laplante
This article presents challenges and solutions to testing systems based on the underlying products and services commonly referred to as the Internet of ‘things’ (IoT).
本文介绍了基于底层产品和服务的测试系统的挑战和解决方案,这些产品和服务通常被称为物联网(IoT)。
{"title":"Testing IoT Systems","authors":"J. Voas, D. R. Kuhn, P. Laplante","doi":"10.1109/SOSE.2018.00015","DOIUrl":"https://doi.org/10.1109/SOSE.2018.00015","url":null,"abstract":"This article presents challenges and solutions to testing systems based on the underlying products and services commonly referred to as the Internet of ‘things’ (IoT).","PeriodicalId":414464,"journal":{"name":"2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1