首页 > 最新文献

10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
Achieving security assurance with assertion-based application construction 通过基于断言的应用程序构造实现安全保证
Carlos E. Rubio-Medrano, Gail-Joon Ahn, K. Sohr
Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may be consequently occurred. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.
现代软件应用程序通常是利用预制模块构建的,例如应用程序编程接口(api),这些模块对于实现软件应用程序所需的功能至关重要,有助于减少整体开发成本和时间。当api处理与安全相关的功能时,确保它们符合其设计需求是至关重要的,因为否则可能会出现意想不到的缺陷和漏洞。通常,这样的api可能缺乏足够的规范细节,或者可能实现所需安全模型的语义不同版本,从而可能使安全属性的运行时实施复杂化,并使最小化严重漏洞的存在变得更加困难。本文提出了一种利用软件断言的概念来解决这一关键挑战的新方法。我们将重点关注基于角色的访问控制模型中的安全需求,并展示如何使用我们建议的方法以及基于断言的自动化最新技术在源代码级别执行适当的验证。
{"title":"Achieving security assurance with assertion-based application construction","authors":"Carlos E. Rubio-Medrano, Gail-Joon Ahn, K. Sohr","doi":"10.4108/eai.21-12-2015.150819","DOIUrl":"https://doi.org/10.4108/eai.21-12-2015.150819","url":null,"abstract":"Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may be consequently occurred. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"7 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distribution, correlation and prediction of response times in Stack Overflow 堆栈溢出中响应时间的分布、相关性和预测
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257265
Preeti Arunapuram, Jacob W. Bartel, P. Dewan
The sending of a message raises two important questions about its response: When will the first response arrive? When will the first acceptable response arrive? These questions can be partly or completely answered by identifying distributions of response times, correlating features with response times, and/or predicting the actual response times. We address distribution, correlation and prediction of response times in Stack Overflow. We analyzed response times of over two million question-answer threads. We found no strong correlation between response times and features studied in other messaging domains: (a) use of various kinds of pronouns and punctuations, and (b) the time of day, and day of week when messages were sent. We found that title lengths show a quadratic relationship with median response time and that mean response times vary according to the tags used in a post. We explored a large design space of prediction algorithms based on the distributions of response times. These approaches predicted ranges of time that were automatically determined using a clustering algorithm. The best results were given by an approach that combines, using an index-base weighted-average algorithm introduced here, the most frequent time-ranges in the distributions for the tags in the posts.
消息的发送会引起关于其响应的两个重要问题:第一个响应何时到达?第一个可接受的响应何时到达?通过识别响应时间的分布、将特性与响应时间关联起来,以及/或预测实际响应时间,可以部分或完全回答这些问题。我们在Stack Overflow中讨论响应时间的分布、相关性和预测。我们分析了超过200万个问答线程的响应时间。我们发现响应时间与其他消息传递领域研究的特征之间没有很强的相关性:(a)使用各种代词和标点符号,以及(b)发送消息的时间和星期几。我们发现标题长度与中位数响应时间呈二次关系,平均响应时间根据帖子中使用的标签而变化。我们探索了基于响应时间分布的预测算法的大设计空间。这些方法预测的时间范围是使用聚类算法自动确定的。使用本文介绍的基于索引的加权平均算法,结合帖子中标签分布中最频繁的时间范围的方法可以获得最佳结果。
{"title":"Distribution, correlation and prediction of response times in Stack Overflow","authors":"Preeti Arunapuram, Jacob W. Bartel, P. Dewan","doi":"10.4108/ICST.COLLABORATECOM.2014.257265","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257265","url":null,"abstract":"The sending of a message raises two important questions about its response: When will the first response arrive? When will the first acceptable response arrive? These questions can be partly or completely answered by identifying distributions of response times, correlating features with response times, and/or predicting the actual response times. We address distribution, correlation and prediction of response times in Stack Overflow. We analyzed response times of over two million question-answer threads. We found no strong correlation between response times and features studied in other messaging domains: (a) use of various kinds of pronouns and punctuations, and (b) the time of day, and day of week when messages were sent. We found that title lengths show a quadratic relationship with median response time and that mean response times vary according to the tags used in a post. We explored a large design space of prediction algorithms based on the distributions of response times. These approaches predicted ranges of time that were automatically determined using a clustering algorithm. The best results were given by an approach that combines, using an index-base weighted-average algorithm introduced here, the most frequent time-ranges in the distributions for the tags in the posts.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114439806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward energy efficient multistream collaborative compression in wireless sensor networks 无线传感器网络中节能多流协同压缩的研究
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257289
Tommy Szalapski, S. Madria
Wireless sensor networks possess significant limitations in storage, bandwidth, and power. This has led to the development of several compression algorithms designed for sensor networks. Many of these methods exploit the correlation often present between the data on different sensor nodes in the network; however, correlation can also exist between different sensing modules on the same sensor node. Exploiting this correlation can improve compression ratios and reduce energy consumption without the cost of increased traffic in the network. We investigate and analyze approaches for compression utilizing collaboration between separate sensing modules on the same sensor node. The compression can be lossless or lossy with a parameter for maximum tolerable error. Performance evaluations over real world sensor data show increased energy efficiency and bandwidth utilization with a decrease in latency compared to some recent approaches for both lossless and loss tolerant compression.
无线传感器网络在存储、带宽和功率方面有很大的限制。这导致了为传感器网络设计的几种压缩算法的发展。其中许多方法利用了网络中不同传感器节点上的数据之间经常存在的相关性;但是,同一传感器节点上的不同传感模块之间也可能存在相关性。利用这种相关性可以提高压缩比并减少能源消耗,而不会增加网络中的流量。我们研究和分析了利用同一传感器节点上不同传感模块之间的协作进行压缩的方法。压缩可以是无损的,也可以是带有最大可容忍误差参数的有损压缩。对真实世界传感器数据的性能评估表明,与最近的一些无损和容损压缩方法相比,该方法提高了能效和带宽利用率,降低了延迟。
{"title":"Toward energy efficient multistream collaborative compression in wireless sensor networks","authors":"Tommy Szalapski, S. Madria","doi":"10.4108/ICST.COLLABORATECOM.2014.257289","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257289","url":null,"abstract":"Wireless sensor networks possess significant limitations in storage, bandwidth, and power. This has led to the development of several compression algorithms designed for sensor networks. Many of these methods exploit the correlation often present between the data on different sensor nodes in the network; however, correlation can also exist between different sensing modules on the same sensor node. Exploiting this correlation can improve compression ratios and reduce energy consumption without the cost of increased traffic in the network. We investigate and analyze approaches for compression utilizing collaboration between separate sensing modules on the same sensor node. The compression can be lossless or lossy with a parameter for maximum tolerable error. Performance evaluations over real world sensor data show increased energy efficiency and bandwidth utilization with a decrease in latency compared to some recent approaches for both lossless and loss tolerant compression.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134496812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preventing session hijacking in collaborative applications with hybrid cache-supported one-way hash chains 使用混合缓存支持的单向散列链防止协作应用程序中的会话劫持
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257327
Amerah A. Alabrah, M. Bassiouni
Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications efficiently. The solution, which presents a major redesign from [18], is based on utilizing two-dimensional OHC chains equipped with sparse caching capabilities to carry out authentication during social networks users' sessions. We analyze the proposed hybrid scheme mathematically to determine the cost of authentication and develop a quartic equation to check the optimal configuration of the two dimensions. We also evaluate the hybrid scheme with simulation experiments of different configurations and scenarios. The results of the simulation experiments show that the hybrid scheme improves performance of the OHC tremendously while efficiently and securely handling authentication.
社交网站会话劫持攻击是当今互联网上常见的网络威胁之一,特别是随着无线网络和移动应用程序的空前普及。为了解决这个问题,我们提出了一种支持缓存的混合二维单向哈希构造,以有效地处理协作应用中社交网络用户会话的身份验证。该解决方案是对[18]的重大重新设计,它基于利用具有稀疏缓存功能的二维OHC链在社交网络用户会话期间进行身份验证。我们从数学上分析了所提出的混合方案,以确定认证成本,并建立了一个四次方程来检查两个维度的最优配置。通过不同配置和场景的仿真实验,对混合方案进行了评价。仿真实验结果表明,该混合方案在有效、安全地处理身份验证的同时,极大地提高了OHC的性能。
{"title":"Preventing session hijacking in collaborative applications with hybrid cache-supported one-way hash chains","authors":"Amerah A. Alabrah, M. Bassiouni","doi":"10.4108/ICST.COLLABORATECOM.2014.257327","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257327","url":null,"abstract":"Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications efficiently. The solution, which presents a major redesign from [18], is based on utilizing two-dimensional OHC chains equipped with sparse caching capabilities to carry out authentication during social networks users' sessions. We analyze the proposed hybrid scheme mathematically to determine the cost of authentication and develop a quartic equation to check the optimal configuration of the two dimensions. We also evaluate the hybrid scheme with simulation experiments of different configurations and scenarios. The results of the simulation experiments show that the hybrid scheme improves performance of the OHC tremendously while efficiently and securely handling authentication.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detection of plugin misuse drive-by download attacks using kernel machines 检测插件误用驱动下载攻击使用内核机
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257749
Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin
Malware distribution using drive-by download attacks has become the most prominent threat for organizations and individuals. Compromised web services and web applications hosted on the cloud act as the delivery medium for the exploits. The exploits included often target the vulnerabilities within the plugins of the web browsers. Implementing security controls to counter the exploits within the browsers for ensuring end point security has become a challenge. In this paper, a set of features is proposed and is extracted by monitoring the communications between the browser and the plugins during the rendering of webpages. The Support Vector Machines are trained using the defined features and the performance of the trained classifier is evaluated using a dataset with both malicious and benign use cases of the plugins. The dataset included 10,239 malicious use cases and 37,369 benign use cases. To compensate the imbalance in the distribution of the dataset, experiments were performed using weighted costs and oversampling. Our analysis shows that the Support Vector Machines trained by using the proposed set of features classified with an average accuracy of about 99.4%. On integrating the proposed approach as an inline defense, an average performance overhead of 5.14% was observed.
恶意软件分发使用的驱动下载攻击已经成为最突出的威胁组织和个人。被破坏的web服务和托管在云上的web应用程序充当了漏洞利用的交付媒介。这些漏洞通常针对web浏览器插件中的漏洞。实现安全控制来对抗浏览器中的漏洞,以确保端点安全性已经成为一项挑战。本文提出了一组特征,并通过监控浏览器和插件在网页呈现过程中的通信来提取这些特征。使用定义的特征训练支持向量机,并使用包含插件恶意和良性用例的数据集评估训练后的分类器的性能。该数据集包括10,239个恶意用例和37,369个良性用例。为了补偿数据集分布的不平衡,使用加权代价和过采样进行实验。我们的分析表明,使用所提出的特征集训练的支持向量机分类的平均准确率约为99.4%。在将提出的方法集成为内联防御时,观察到平均性能开销为5.14%。
{"title":"Detection of plugin misuse drive-by download attacks using kernel machines","authors":"Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin","doi":"10.4108/ICST.COLLABORATECOM.2014.257749","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257749","url":null,"abstract":"Malware distribution using drive-by download attacks has become the most prominent threat for organizations and individuals. Compromised web services and web applications hosted on the cloud act as the delivery medium for the exploits. The exploits included often target the vulnerabilities within the plugins of the web browsers. Implementing security controls to counter the exploits within the browsers for ensuring end point security has become a challenge. In this paper, a set of features is proposed and is extracted by monitoring the communications between the browser and the plugins during the rendering of webpages. The Support Vector Machines are trained using the defined features and the performance of the trained classifier is evaluated using a dataset with both malicious and benign use cases of the plugins. The dataset included 10,239 malicious use cases and 37,369 benign use cases. To compensate the imbalance in the distribution of the dataset, experiments were performed using weighted costs and oversampling. Our analysis shows that the Support Vector Machines trained by using the proposed set of features classified with an average accuracy of about 99.4%. On integrating the proposed approach as an inline defense, an average performance overhead of 5.14% was observed.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSO-HC: Particle swarm optimization protocol for hierarchical clustering in Wireless Sensor Networks PSO-HC:无线传感器网络分层聚类的粒子群优化协议
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257336
Riham S. Elhabyan, M. Yagoub
Clustering is an efficient topology control approach for maximizing the lifetime and scalability of Wireless Sensor Networks (WSNs). Many cluster-based routing techniques have been proposed in the literature. However, in most of the proposed protocols, the communication between a sensor node and its designated cluster head (CH) is assumed to be single-hop. Multi-hop communication can be used when the communication range of the sensor nodes is limited or the number of sensor nodes is very large in a network. Moreover, they used a predetermined percentage of CHs regardless of the network density or the number of live nodes. Clustering is known to be non-deterministic polynomial (NP)-hard problems for a WSN. Particle Swarm Optimization (PSO) is a swarm intelligent approach that can be applied for finding fast and efficient solutions of such problems. In this paper, we propose a novel centralized PSO protocol for Hierarchical Clustering (PSO-HC) in WSNs. Our objective is to maximize the network lifetime by minimizing the number of active CHs and to maximize the network scalability by using two-hop communication between the sensor nodes and their respective CHs. The effect of using a realistic network and energy consumption model in cluster-based communication for WSN was investigated. Extensive simulations show that PSO-HC outperforms the well-known cluster-based sensor network protocols in terms of average consumed energy and throughput.
聚类是一种有效的拓扑控制方法,可以最大限度地提高无线传感器网络的生存期和可扩展性。文献中提出了许多基于集群的路由技术。然而,在大多数提出的协议中,传感器节点与其指定的簇头(CH)之间的通信被假设为单跳。当网络中传感器节点的通信范围有限或传感器节点数量很大时,可以采用多跳通信。此外,无论网络密度或活动节点的数量如何,他们都使用预定百分比的CHs。对于WSN来说,聚类是一个非确定性多项式(NP)难题。粒子群优化算法(PSO)是一种用于快速有效地求解此类问题的群体智能方法。在本文中,我们提出了一种新的用于WSNs分层聚类(PSO- hc)的集中式PSO协议。我们的目标是通过最小化活动CHs的数量来最大化网络生命周期,并通过在传感器节点与其各自的CHs之间使用两跳通信来最大化网络可伸缩性。研究了在基于集群的无线传感器网络通信中使用真实网络和能耗模型的效果。大量的仿真表明,PSO-HC在平均消耗能量和吞吐量方面优于众所周知的基于集群的传感器网络协议。
{"title":"PSO-HC: Particle swarm optimization protocol for hierarchical clustering in Wireless Sensor Networks","authors":"Riham S. Elhabyan, M. Yagoub","doi":"10.4108/ICST.COLLABORATECOM.2014.257336","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257336","url":null,"abstract":"Clustering is an efficient topology control approach for maximizing the lifetime and scalability of Wireless Sensor Networks (WSNs). Many cluster-based routing techniques have been proposed in the literature. However, in most of the proposed protocols, the communication between a sensor node and its designated cluster head (CH) is assumed to be single-hop. Multi-hop communication can be used when the communication range of the sensor nodes is limited or the number of sensor nodes is very large in a network. Moreover, they used a predetermined percentage of CHs regardless of the network density or the number of live nodes. Clustering is known to be non-deterministic polynomial (NP)-hard problems for a WSN. Particle Swarm Optimization (PSO) is a swarm intelligent approach that can be applied for finding fast and efficient solutions of such problems. In this paper, we propose a novel centralized PSO protocol for Hierarchical Clustering (PSO-HC) in WSNs. Our objective is to maximize the network lifetime by minimizing the number of active CHs and to maximize the network scalability by using two-hop communication between the sensor nodes and their respective CHs. The effect of using a realistic network and energy consumption model in cluster-based communication for WSN was investigated. Extensive simulations show that PSO-HC outperforms the well-known cluster-based sensor network protocols in terms of average consumed energy and throughput.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123010203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Design considerations to realize automated SLA negotiations in a multi-Cloud brokerage system 在多云代理系统中实现自动SLA协商的设计注意事项
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257551
Seokho Son, Dong-Jae Kang, Jin-Mee Kim
Cloud broker concept is considered as one of solutions for federating distributed multi-Cloud. In order to design and realize a Cloud brokerage system, we need to devise establishment and management of SLA (Service Level Agreement). Whereas a SLA negotiation in a Cloud is assumed to be a basic functionality to establish a SLA, there has been some lack of efforts to apply, configure, and design SLA negotiation mechanism for a Cloud broker, which arbitrates multiple Cloud providers. In this paper, therefore, we design a multi-Cloud broker and reveal design considerations to realize an automated SLA negotiation in a multi-Cloud broker. Briefly, the decision issues to realize a SLA negotiation are as follows: 1) Negotiation lifecycles according to types of Cloud broker, 2) negotiation protocol, 3) negotiable SLA issues, 4) multi-issue negotiation support, and 5) deployment position of negotiation agents.
云代理概念被认为是联合分布式多云的解决方案之一。为了设计和实现云代理系统,我们需要设计SLA (Service Level Agreement)的建立和管理。虽然云中的SLA协商被认为是建立SLA的基本功能,但在应用、配置和设计用于仲裁多个云提供商的云代理的SLA协商机制方面一直缺乏努力。因此,在本文中,我们设计了一个多云代理,并揭示了在多云代理中实现自动SLA协商的设计考虑。简而言之,实现SLA协商的决策问题如下:1)根据云代理类型的协商生命周期;2)协商协议;3)可协商的SLA问题;4)多问题协商支持;5)协商代理的部署位置。
{"title":"Design considerations to realize automated SLA negotiations in a multi-Cloud brokerage system","authors":"Seokho Son, Dong-Jae Kang, Jin-Mee Kim","doi":"10.4108/ICST.COLLABORATECOM.2014.257551","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257551","url":null,"abstract":"Cloud broker concept is considered as one of solutions for federating distributed multi-Cloud. In order to design and realize a Cloud brokerage system, we need to devise establishment and management of SLA (Service Level Agreement). Whereas a SLA negotiation in a Cloud is assumed to be a basic functionality to establish a SLA, there has been some lack of efforts to apply, configure, and design SLA negotiation mechanism for a Cloud broker, which arbitrates multiple Cloud providers. In this paper, therefore, we design a multi-Cloud broker and reveal design considerations to realize an automated SLA negotiation in a multi-Cloud broker. Briefly, the decision issues to realize a SLA negotiation are as follows: 1) Negotiation lifecycles according to types of Cloud broker, 2) negotiation protocol, 3) negotiable SLA issues, 4) multi-issue negotiation support, and 5) deployment position of negotiation agents.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combining human and machine computing elements for analysis via crowdsourcing 将人和机器计算元素结合起来,通过众包进行分析
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257298
Julian Jarrett, Iman Saleh, M. Blake, Rohan Malcolm, Sean S. E. Thorpe, Tyrone Grandison
Crowd computing leverages human input in order to execute tasks that are computationally expensive, due to complexity and/or scale. Combined with automation, crowd computing can help solve problems efficiently and effectively. In this work, we introduce an elasticity framework that adaptively optimizes the use of human and automated software resources in order to maximize overall performance. This framework includes a quantitative model that supports elasticity when performing complex tasks. Our model defines a task complexity index and an elasticity index that is used to aid in decision support for assigning tasks to respective computing elements. Experiments demonstrate that the framework can effectively optimize the use of human and machine computing elements simultaneously. Also, as a consequence, overall performance is significantly enhanced.
群体计算利用人工输入来执行由于复杂性和/或规模而在计算上很昂贵的任务。与自动化相结合,群体计算可以帮助高效和有效地解决问题。在这项工作中,我们引入了一个弹性框架,该框架自适应地优化了人力和自动化软件资源的使用,以最大限度地提高整体性能。该框架包括一个定量模型,在执行复杂任务时支持弹性。我们的模型定义了一个任务复杂性指数和一个弹性指数,用于帮助决策支持将任务分配给各自的计算元素。实验表明,该框架可以有效地优化人机计算单元的同时使用。因此,总体性能也得到了显著提高。
{"title":"Combining human and machine computing elements for analysis via crowdsourcing","authors":"Julian Jarrett, Iman Saleh, M. Blake, Rohan Malcolm, Sean S. E. Thorpe, Tyrone Grandison","doi":"10.4108/ICST.COLLABORATECOM.2014.257298","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257298","url":null,"abstract":"Crowd computing leverages human input in order to execute tasks that are computationally expensive, due to complexity and/or scale. Combined with automation, crowd computing can help solve problems efficiently and effectively. In this work, we introduce an elasticity framework that adaptively optimizes the use of human and automated software resources in order to maximize overall performance. This framework includes a quantitative model that supports elasticity when performing complex tasks. Our model defines a task complexity index and an elasticity index that is used to aid in decision support for assigning tasks to respective computing elements. Experiments demonstrate that the framework can effectively optimize the use of human and machine computing elements simultaneously. Also, as a consequence, overall performance is significantly enhanced.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
HConfig: Resource adaptive fast bulk loading in HBase HConfig:在HBase中进行资源自适应快速批量加载
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257304
Xianqiang Bao, Ling Liu, Nong Xiao, Fang Liu, Qi Zhang, T. Zhu
NoSQL (Not only SQL) data stores become a vital component in many big data computing platforms due to its inherent horizontal scalability. HBase is an open-source distributed NoSQL store that is widely used by many Internet enterprises to handle their big data computing applications (e.g. Facebook handles millions of messages each day with HBase). Optimizations that can enhance the performance of HBase are of paramount interests for big data applications that use HBase or Big Table like key-value stores. In this paper we study the problems inherent in misconfiguration of HBase clusters, including scenarios where the HBase default configurations can lead to poor performance. We develop HConfig, a semi-automated configuration manager for optimizing HBase system performance from multiple dimensions. Due to the space constraint, this paper will focus on how to improve the performance of HBase data loader using HConfig. Through this case study we will highlight the importance of resource adaptive and workload aware auto-configuration management and the design principles of HConfig. Our experiments show that the HConfig enhanced bulk loading can significantly improve the performance of HBase bulk loading jobs compared to the HBase default configuration, and achieve 2~3.7× speedup in throughput under different client threads while maintaining linear horizontal scalability.
NoSQL(不仅仅是SQL)数据存储由于其固有的水平可扩展性而成为许多大数据计算平台的重要组成部分。HBase是一个开源的分布式NoSQL存储,被许多互联网企业广泛用于处理他们的大数据计算应用(例如Facebook每天用HBase处理数百万条消息)。对于使用HBase或大表(如键值存储)的大数据应用程序来说,能够增强HBase性能的优化是最重要的。在本文中,我们研究了HBase集群错误配置所固有的问题,包括HBase默认配置可能导致性能低下的场景。我们开发了HConfig,一个半自动配置管理器,用于从多个维度优化HBase系统性能。由于篇幅限制,本文将重点研究如何使用HConfig来提高HBase数据加载器的性能。通过本案例研究,我们将强调资源自适应和工作负载感知自动配置管理的重要性以及HConfig的设计原则。我们的实验表明,与HBase默认配置相比,HConfig增强的批量加载可以显著提高HBase批量加载作业的性能,在保持线性水平可扩展性的同时,在不同的客户端线程下实现2~3.7倍的吞吐量加速。
{"title":"HConfig: Resource adaptive fast bulk loading in HBase","authors":"Xianqiang Bao, Ling Liu, Nong Xiao, Fang Liu, Qi Zhang, T. Zhu","doi":"10.4108/ICST.COLLABORATECOM.2014.257304","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257304","url":null,"abstract":"NoSQL (Not only SQL) data stores become a vital component in many big data computing platforms due to its inherent horizontal scalability. HBase is an open-source distributed NoSQL store that is widely used by many Internet enterprises to handle their big data computing applications (e.g. Facebook handles millions of messages each day with HBase). Optimizations that can enhance the performance of HBase are of paramount interests for big data applications that use HBase or Big Table like key-value stores. In this paper we study the problems inherent in misconfiguration of HBase clusters, including scenarios where the HBase default configurations can lead to poor performance. We develop HConfig, a semi-automated configuration manager for optimizing HBase system performance from multiple dimensions. Due to the space constraint, this paper will focus on how to improve the performance of HBase data loader using HConfig. Through this case study we will highlight the importance of resource adaptive and workload aware auto-configuration management and the design principles of HConfig. Our experiments show that the HConfig enhanced bulk loading can significantly improve the performance of HBase bulk loading jobs compared to the HBase default configuration, and achieve 2~3.7× speedup in throughput under different client threads while maintaining linear horizontal scalability.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123541175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security with privacy - A research agenda 安全与隐私-一个研究议程
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257687
E. Bertino, B. Samanthula
Data is one of the most valuable assets for organization. It can facilitate users or organizations to meet their diverse goals, ranging from scientific advances to business intelligence. Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain personally identifiable information (PII) and thus the organizations collecting the big data may want to protect their outsourced data from the cloud. In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing.We propose our initial approaches to address two important PE applications: (i) privacy-preserving data management and (ii) privacy-preserving data analysis under the cloud environment. Additionally, we point out research issues that still need to be addressed to develop comprehensive solutions to the problem of effective and efficient privacy-preserving use of data.
数据是组织最有价值的资产之一。它可以帮助用户或组织实现从科学进步到商业智能的各种目标。由于数据的巨大增长,近年来大数据的概念得到了发展。云计算是存储、管理和分析大数据的关键技术。然而,通常从各种数据源(如传感器和社交媒体)收集的如此庞大、复杂且不断增长的数据通常可能包含个人身份信息(PII),因此收集大数据的组织可能希望保护其外包数据不受云的影响。在本文中,我们概述了我们在开发高效和有效的隐私增强(PE)技术以管理和分析云计算中的大数据方面的研究。我们提出了解决两个重要PE应用的初步方法:(i)保护隐私的数据管理和(ii)云环境下保护隐私的数据分析。此外,我们指出了仍然需要解决的研究问题,以制定有效和高效的数据隐私保护问题的综合解决方案。
{"title":"Security with privacy - A research agenda","authors":"E. Bertino, B. Samanthula","doi":"10.4108/ICST.COLLABORATECOM.2014.257687","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257687","url":null,"abstract":"Data is one of the most valuable assets for organization. It can facilitate users or organizations to meet their diverse goals, ranging from scientific advances to business intelligence. Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain personally identifiable information (PII) and thus the organizations collecting the big data may want to protect their outsourced data from the cloud. In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing.We propose our initial approaches to address two important PE applications: (i) privacy-preserving data management and (ii) privacy-preserving data analysis under the cloud environment. Additionally, we point out research issues that still need to be addressed to develop comprehensive solutions to the problem of effective and efficient privacy-preserving use of data.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115251994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1