首页 > 最新文献

2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)最新文献

英文 中文
Parameterized and Runtime-Tunable Snapshot Isolation in Distributed Transactional Key-Value Stores 分布式事务性键值存储中的参数化和运行时可调快照隔离
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.11
Hengfeng Wei, Yu Huang, Jian Lu
Several relaxed variants of Snapshot Isolation (SI) have been proposed for improved performance in distributed transactional key-value stores. These relaxed variants, however, provide no specification or control of the severity of the anomalies with respect to SI. They have also been designed to be used statically throughout the whole system life cycle. To overcome these drawbacks, we propose the idea of parameterized and runtime-tunable snapshot isolation. We first define a new transactional consistency model called Relaxed Version Snapshot Isolation (RVSI), which can formally and quantitatively specify the anomalies it may produce with respect to SI. To this end, we decompose SI into three "view properties", for each of which we introduce a parameter to quantify one of three kinds of possible anomalies: k1-BV (k1-version bounded backward view), k2-FV (k2-version bounded forward view), and k3-SV (k3-version bounded snapshot view). We then implement a prototype partitioned replicated distributed transactional key-value store called Chameleon across multiple data centers. While achieving RVSI, Chameleon allows each transaction to dynamically tune its consistency level at runtime. The experiments show that RVSI helps to reduce the transaction abort rates when applications are willing to tolerate certain anomalies. We also evaluate the individual impacts of k1-BV, k2-FV, and k3-SV on reducing the transaction abort rates in various scenarios. We find that it depends on the issue delays between clients and replicas which of k1 and k2 plays a major role in reducing transaction abort rates.
为了提高分布式事务性键值存储的性能,已经提出了快照隔离(SI)的几个宽松变体。然而,这些宽松的变体没有提供SI异常严重程度的规范或控制。它们还被设计为在整个系统生命周期中静态使用。为了克服这些缺点,我们提出了参数化和运行时可调快照隔离的思想。我们首先定义了一个新的事务一致性模型,称为放松版本快照隔离(RVSI),它可以正式和定量地指定它可能产生的相对于SI的异常。为此,我们将SI分解为三个“视图属性”,为每个属性引入一个参数来量化三种可能的异常之一:k1-BV (k1-版本有界后向视图),k2-FV (k2-版本有界前向视图)和k3-SV (k3-版本有界快照视图)。然后,我们跨多个数据中心实现一个名为Chameleon的原型分区复制分布式事务性键值存储。在实现RVSI的同时,变色龙允许每个事务在运行时动态调整其一致性级别。实验表明,当应用程序愿意容忍某些异常时,RVSI有助于降低事务中断率。我们还评估了k1-BV、k2-FV和k3-SV在不同场景下对降低事务中断率的个别影响。我们发现它取决于客户端和副本之间的问题延迟,k1和k2在降低事务中止率方面起主要作用。
{"title":"Parameterized and Runtime-Tunable Snapshot Isolation in Distributed Transactional Key-Value Stores","authors":"Hengfeng Wei, Yu Huang, Jian Lu","doi":"10.1109/SRDS.2017.11","DOIUrl":"https://doi.org/10.1109/SRDS.2017.11","url":null,"abstract":"Several relaxed variants of Snapshot Isolation (SI) have been proposed for improved performance in distributed transactional key-value stores. These relaxed variants, however, provide no specification or control of the severity of the anomalies with respect to SI. They have also been designed to be used statically throughout the whole system life cycle. To overcome these drawbacks, we propose the idea of parameterized and runtime-tunable snapshot isolation. We first define a new transactional consistency model called Relaxed Version Snapshot Isolation (RVSI), which can formally and quantitatively specify the anomalies it may produce with respect to SI. To this end, we decompose SI into three \"view properties\", for each of which we introduce a parameter to quantify one of three kinds of possible anomalies: k1-BV (k1-version bounded backward view), k2-FV (k2-version bounded forward view), and k3-SV (k3-version bounded snapshot view). We then implement a prototype partitioned replicated distributed transactional key-value store called Chameleon across multiple data centers. While achieving RVSI, Chameleon allows each transaction to dynamically tune its consistency level at runtime. The experiments show that RVSI helps to reduce the transaction abort rates when applications are willing to tolerate certain anomalies. We also evaluate the individual impacts of k1-BV, k2-FV, and k3-SV on reducing the transaction abort rates in various scenarios. We find that it depends on the issue delays between clients and replicas which of k1 and k2 plays a major role in reducing transaction abort rates.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"35 1","pages":"21-33"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89189458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fine-Grained Consistency Upgrades for Online Services 在线服务的细粒度一致性升级
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.9
Filipe Freitas, J. Leitao, Nuno M. Preguiça, R. Rodrigues
Online services such as Facebook or Twitter have public APIs to enable an easy integration of these services with third party applications. However, the developers who design these applications have no information about the consistency provided by these services, which exacerbates the complexity of reasoning about the semantics of the applications they are developing. In this paper, we show that is possible to deploy a transparent middleware between the application and the service, which enables a fine-grained control over the session guarantees that comprise the consistency semantics provided by these APIs, without having to gain access to the implementation of the underlying services. We evaluated our middleware using the Facebook public API and the Redis datastore, and our results show that we are able to provide fine-grained control of the consistency semantics incurring in a small local storage and modest latency overhead.
诸如Facebook或Twitter之类的在线服务具有公共api,可以轻松地将这些服务与第三方应用程序集成在一起。然而,设计这些应用程序的开发人员没有关于这些服务提供的一致性的信息,这加剧了他们正在开发的应用程序的语义推理的复杂性。在本文中,我们展示了在应用程序和服务之间部署透明中间件的可能性,它支持对包含这些api提供的一致性语义的会话保证进行细粒度控制,而无需访问底层服务的实现。我们使用Facebook公共API和Redis数据存储评估了我们的中间件,结果表明我们能够在小的本地存储和适度的延迟开销中提供对一致性语义的细粒度控制。
{"title":"Fine-Grained Consistency Upgrades for Online Services","authors":"Filipe Freitas, J. Leitao, Nuno M. Preguiça, R. Rodrigues","doi":"10.1109/SRDS.2017.9","DOIUrl":"https://doi.org/10.1109/SRDS.2017.9","url":null,"abstract":"Online services such as Facebook or Twitter have public APIs to enable an easy integration of these services with third party applications. However, the developers who design these applications have no information about the consistency provided by these services, which exacerbates the complexity of reasoning about the semantics of the applications they are developing. In this paper, we show that is possible to deploy a transparent middleware between the application and the service, which enables a fine-grained control over the session guarantees that comprise the consistency semantics provided by these APIs, without having to gain access to the implementation of the underlying services. We evaluated our middleware using the Facebook public API and the Redis datastore, and our results show that we are able to provide fine-grained control of the consistency semantics incurring in a small local storage and modest latency overhead.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"58 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86379853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correlation-Aware Stripe Organization for Efficient Writes in Erasure-Coded Storage Systems 基于关联感知的条带组织在擦除编码存储系统中的高效写
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.18
Zhirong Shen, P. Lee, J. Shu, Wenzhong Guo
Erasure coding has been extensively employed for data availability protection in production storage systems by maintaining a low degree of data redundancy. However, how to mitigate the parity update overhead of partial stripe writes in erasure-coded storage systems is still a critical concern. In this paper, we reconsider this problem from two new perspectives: data correlation and stripe organization, and propose CASO, a correlation-aware stripe organization algorithm. CASO captures data correlation of a data access stream. It packs correlated data into a small number of stripes to reduce the incurred I/Os in partial stripe writes, and further organizes uncorrelated data into stripes to leverage the spatial locality in later accesses. By differentiating correlated and uncorrelated data in stripe organization, we show via extensive trace-driven evaluation that CASO reduces up to 25.1% of parity updates and accelerates the write speed by up to 28.4%.
Erasure编码已被广泛应用于生产存储系统的数据可用性保护,以保持低程度的数据冗余。然而,如何减轻在擦除编码存储系统中部分条带写入的奇偶校验更新开销仍然是一个关键问题。本文从数据关联和条带组织两个新的角度重新考虑了这一问题,提出了一种关联感知的条带组织算法CASO。CASO捕获数据访问流的数据相关性。它将相关数据打包到少量的条带中,以减少部分条带写入时产生的I/ o,并进一步将不相关的数据组织到条带中,以便在以后的访问中利用空间局部性。通过区分条带组织中的相关和不相关数据,我们通过广泛的跟踪驱动评估表明,CASO减少了多达25.1%的奇偶更新,并将写入速度提高了高达28.4%。
{"title":"Correlation-Aware Stripe Organization for Efficient Writes in Erasure-Coded Storage Systems","authors":"Zhirong Shen, P. Lee, J. Shu, Wenzhong Guo","doi":"10.1109/SRDS.2017.18","DOIUrl":"https://doi.org/10.1109/SRDS.2017.18","url":null,"abstract":"Erasure coding has been extensively employed for data availability protection in production storage systems by maintaining a low degree of data redundancy. However, how to mitigate the parity update overhead of partial stripe writes in erasure-coded storage systems is still a critical concern. In this paper, we reconsider this problem from two new perspectives: data correlation and stripe organization, and propose CASO, a correlation-aware stripe organization algorithm. CASO captures data correlation of a data access stream. It packs correlated data into a small number of stripes to reduce the incurred I/Os in partial stripe writes, and further organizes uncorrelated data into stripes to leverage the spatial locality in later accesses. By differentiating correlated and uncorrelated data in stripe organization, we show via extensive trace-driven evaluation that CASO reduces up to 25.1% of parity updates and accelerates the write speed by up to 28.4%.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"32 1","pages":"134-143"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86971347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Stateless Reliable Geocasting 无状态可靠的地理铸造
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.13
Jordan Adamek, Mikhail Nesterenko, J. Robinson, S. Tixeuil
We present two geometric routing algorithms that reliably deliver messages to all devices in a geocast region. One algorithm is based on flooding, the other on concurrent geometric routing. They are the fist known stateless geocasting algorithms. We formally prove the algorithms correct, evaluate their performance through abstract and concrete simulation and estimate their message complexity.
我们提出了两种几何路由算法,可靠地将消息传递到地理广播区域内的所有设备。一种算法基于泛洪,另一种算法基于并发几何路由。它们是已知的第一个无状态地理投射算法。我们正式证明了这些算法的正确性,通过抽象和具体的仿真来评估它们的性能,并估计了它们的消息复杂度。
{"title":"Stateless Reliable Geocasting","authors":"Jordan Adamek, Mikhail Nesterenko, J. Robinson, S. Tixeuil","doi":"10.1109/SRDS.2017.13","DOIUrl":"https://doi.org/10.1109/SRDS.2017.13","url":null,"abstract":"We present two geometric routing algorithms that reliably deliver messages to all devices in a geocast region. One algorithm is based on flooding, the other on concurrent geometric routing. They are the fist known stateless geocasting algorithms. We formally prove the algorithms correct, evaluate their performance through abstract and concrete simulation and estimate their message complexity.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"20 1","pages":"44-53"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91220080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Practical Framework for Privacy-Preserving NoSQL Databases 隐私保护NoSQL数据库的实用框架
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.10
Ricardo Macedo, J. Paulo, Rogério Pontes, Bernardo Portela, Tiago Oliveira, M. Matos, R. Oliveira
Cloud infrastructures provide database services as cost-efficient and scalable solutions for storing and processing large amounts of data. To maximize performance, these services require users to trust sensitive information to the cloud provider, which raises privacy and legal concerns. This represents a major obstacle to the adoption of the cloud computing paradigm. Recent work addressed this issue by extending databases to compute over encrypted data. However, these approaches usually support a single and strict combination of cryptographic techniques invariably making them application specific. To assess and broaden the applicability of cryptographic techniques in secure cloud storage and processing, these techniques need to be thoroughly evaluated in a modular and configurable database environment. This is even more noticeable for NoSQL data stores where data privacy is still mostly overlooked. In this paper, we present a generic NoSQL framework and a set of libraries supporting data processing cryptographic techniques that can be used with existing NoSQL engines and composed to meet the privacy and performance requirements of different applications. This is achieved through a modular and extensible design that enables data processing over multiple cryptographic techniques applied on the same database. For each technique, we provide an overview of its security model, along with an extensive set of experiments. The framework is evaluated with the YCSB benchmark, where we assess the practicality and performance tradeoffs for different combinations of cryptographic techniques. The results for a set of macro experiments show that the average overhead in NoSQL operations performance is below 15%, when comparing our system with a baseline database without privacy guarantees.
云基础设施提供数据库服务,作为存储和处理大量数据的经济高效且可扩展的解决方案。为了最大限度地提高性能,这些服务要求用户将敏感信息委托给云提供商,这引起了隐私和法律问题。这是采用云计算范式的一个主要障碍。最近的工作通过扩展数据库以在加密数据上进行计算来解决这个问题。然而,这些方法通常支持单一且严格的加密技术组合,并且总是使它们特定于应用程序。为了评估和扩大加密技术在安全云存储和处理中的适用性,需要在模块化和可配置的数据库环境中对这些技术进行彻底评估。对于数据隐私仍然被忽视的NoSQL数据存储来说,这一点更加明显。在本文中,我们提出了一个通用的NoSQL框架和一组支持数据处理加密技术的库,这些库可以与现有的NoSQL引擎一起使用,并组成以满足不同应用程序的隐私和性能要求。这是通过模块化和可扩展的设计实现的,该设计支持在同一数据库上应用多种加密技术进行数据处理。对于每种技术,我们提供了其安全模型的概述,以及一组广泛的实验。使用YCSB基准对框架进行了评估,在该基准中,我们评估了不同加密技术组合的实用性和性能权衡。一组宏实验的结果表明,当将我们的系统与没有隐私保证的基线数据库进行比较时,NoSQL操作性能的平均开销低于15%。
{"title":"A Practical Framework for Privacy-Preserving NoSQL Databases","authors":"Ricardo Macedo, J. Paulo, Rogério Pontes, Bernardo Portela, Tiago Oliveira, M. Matos, R. Oliveira","doi":"10.1109/SRDS.2017.10","DOIUrl":"https://doi.org/10.1109/SRDS.2017.10","url":null,"abstract":"Cloud infrastructures provide database services as cost-efficient and scalable solutions for storing and processing large amounts of data. To maximize performance, these services require users to trust sensitive information to the cloud provider, which raises privacy and legal concerns. This represents a major obstacle to the adoption of the cloud computing paradigm. Recent work addressed this issue by extending databases to compute over encrypted data. However, these approaches usually support a single and strict combination of cryptographic techniques invariably making them application specific. To assess and broaden the applicability of cryptographic techniques in secure cloud storage and processing, these techniques need to be thoroughly evaluated in a modular and configurable database environment. This is even more noticeable for NoSQL data stores where data privacy is still mostly overlooked. In this paper, we present a generic NoSQL framework and a set of libraries supporting data processing cryptographic techniques that can be used with existing NoSQL engines and composed to meet the privacy and performance requirements of different applications. This is achieved through a modular and extensible design that enables data processing over multiple cryptographic techniques applied on the same database. For each technique, we provide an overview of its security model, along with an extensive set of experiments. The framework is evaluated with the YCSB benchmark, where we assess the practicality and performance tradeoffs for different combinations of cryptographic techniques. The results for a set of macro experiments show that the average overhead in NoSQL operations performance is below 15%, when comparing our system with a baseline database without privacy guarantees.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"1 1","pages":"11-20"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82829222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Greedy-Based Method for Modified Condition/Decision Coverage Testing Criterion 一种基于贪婪的条件/决策覆盖测试准则修正方法
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.33
Bo-His Li, Chin-Yu Huang
During software regression testing, the code coverage of target program is a crucial factor while we perform test case reduction and prioritization. Modified Condition/ Decision Coverage (MC/DC) is one of the most strict and high-accuracy criterion in code coverage and it is usually considered necessary for adequate testing of critical software. In the past, Hayhurst et al proposed a method to implement the MC/DC criterion that complies with regulatory guidance for DO-178B level A software. Hayhurst's MC/DC approach was to find some test cases which are satisfied by MC/DC criterion for each operator (and, or, not, or xor) in the Boolean expression. However, there could be some problems when using Hayhurst's MC/DC approach to select test cases. In this paper, we discuss how to improve and/or enhance Hayhurst's MC/DC approach by using a greedy-based method. Some experiments are performed based on real programs to evaluate as well as compare the performance of our proposed and Hayhurst's approaches.
在软件回归测试期间,当我们执行测试用例减少和优先级排序时,目标程序的代码覆盖率是一个至关重要的因素。修改条件/决策覆盖率(MC/DC)是代码覆盖率中最严格、精度最高的标准之一,通常被认为是对关键软件进行充分测试的必要条件。过去,Hayhurst等人针对DO-178B a级软件提出了一种符合法规指导的MC/DC标准的实现方法。Hayhurst的MC/DC方法是为布尔表达式中的每个操作符(and, or, not, or xor)找到一些满足MC/DC标准的测试用例。然而,当使用Hayhurst的MC/DC方法来选择测试用例时,可能会有一些问题。在本文中,我们讨论了如何通过使用基于贪婪的方法来改进和/或增强Hayhurst的MC/DC方法。基于实际程序进行了一些实验,以评估和比较我们提出的方法和Hayhurst方法的性能。
{"title":"A Greedy-Based Method for Modified Condition/Decision Coverage Testing Criterion","authors":"Bo-His Li, Chin-Yu Huang","doi":"10.1109/SRDS.2017.33","DOIUrl":"https://doi.org/10.1109/SRDS.2017.33","url":null,"abstract":"During software regression testing, the code coverage of target program is a crucial factor while we perform test case reduction and prioritization. Modified Condition/ Decision Coverage (MC/DC) is one of the most strict and high-accuracy criterion in code coverage and it is usually considered necessary for adequate testing of critical software. In the past, Hayhurst et al proposed a method to implement the MC/DC criterion that complies with regulatory guidance for DO-178B level A software. Hayhurst's MC/DC approach was to find some test cases which are satisfied by MC/DC criterion for each operator (and, or, not, or xor) in the Boolean expression. However, there could be some problems when using Hayhurst's MC/DC approach to select test cases. In this paper, we discuss how to improve and/or enhance Hayhurst's MC/DC approach by using a greedy-based method. Some experiments are performed based on real programs to evaluate as well as compare the performance of our proposed and Hayhurst's approaches.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"24 1","pages":"244-246"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85838847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Fine Tuning of Probabilistic Self-Stabilizing Algorithms 概率自稳定算法的自动微调
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.22
Saba Aflaki, Matthias Volk, Borzoo Bonakdarpour, J. Katoen, A. Storjohann
Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results, it is currently unclear what type of randomization leads to the best performance in such algorithms. This paper proposes three automated techniques to find the probability distribution that achieves minimum average recovery time for an input randomized distributed self-stabilizing protocol without changing the behavior of the algorithm. Our first technique is based on solving symbolic linear algebraic equations in order to identify fastest state reachability in parametric discrete-time Markov chains. The second approach applies parameter synthesis techniques from probabilistic model checking to compute the rational function describing the average recovery time and then uses dedicated solvers to find the optimal parameter valuation. The third approach computes over- and under-approximations of the result for a given parameter region and iteratively refines the regions with minimal recovery time up to the desired precision. The latter approach finds sub-optimal solutions with negligible errors, but it is significantly more scalable in orders of magnitude as compared to the other approaches.
尽管随机算法已经广泛地应用于分布式计算中,作为处理不可能结果的一种手段,但目前尚不清楚哪种类型的随机化会导致这种算法的最佳性能。本文提出了三种自动化技术,在不改变算法行为的情况下,为输入随机分布自稳定协议找到实现最小平均恢复时间的概率分布。我们的第一种技术是基于求解符号线性代数方程,以确定参数离散马尔可夫链中最快的状态可达性。第二种方法采用概率模型检验的参数综合技术,计算描述平均恢复时间的有理函数,然后使用专用求解器求出最优参数值。第三种方法计算给定参数区域的结果的过近似值和欠近似值,并以最小的恢复时间迭代地细化区域,达到所需的精度。后一种方法可以找到次优的解决方案,误差可以忽略不计,但与其他方法相比,它的可伸缩性明显更高。
{"title":"Automated Fine Tuning of Probabilistic Self-Stabilizing Algorithms","authors":"Saba Aflaki, Matthias Volk, Borzoo Bonakdarpour, J. Katoen, A. Storjohann","doi":"10.1109/SRDS.2017.22","DOIUrl":"https://doi.org/10.1109/SRDS.2017.22","url":null,"abstract":"Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results, it is currently unclear what type of randomization leads to the best performance in such algorithms. This paper proposes three automated techniques to find the probability distribution that achieves minimum average recovery time for an input randomized distributed self-stabilizing protocol without changing the behavior of the algorithm. Our first technique is based on solving symbolic linear algebraic equations in order to identify fastest state reachability in parametric discrete-time Markov chains. The second approach applies parameter synthesis techniques from probabilistic model checking to compute the rational function describing the average recovery time and then uses dedicated solvers to find the optimal parameter valuation. The third approach computes over- and under-approximations of the result for a given parameter region and iteratively refines the regions with minimal recovery time up to the desired precision. The latter approach finds sub-optimal solutions with negligible errors, but it is significantly more scalable in orders of magnitude as compared to the other approaches.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"19 4 1","pages":"94-103"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83206307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automated Resource Sharing for Virtualized GPU with Self-Configuration 基于自配置的虚拟化GPU资源自动共享
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.35
Jianguo Yao, Q. Lu, Zhengwei Qi
In this paper, we propose Auto-vGPU, a framework of automated resource sharing for virtualized GPU with self-configuration, to reduce manual intervention in system management while ensuring Service Level Agreement (SLA) targets. Auto-vGPU automatically collects the measurements of system metrics and learns a linear model for each application with dimension reduction. In order to fulfill the automated configuration of controller parameters, we propose a self-control-configuration method featuring the theory of automatic tuning of proportional-integral (PI) regulators. The experimental results of cloud gaming implementation demonstrate that Auto-vGPU is able to automatically build the low-dimension model and configure the control parameters without any manual interventions and the derived controller can adaptively allocate virtualized GPU resource to ensure the high performance of cloud applications.
在本文中,我们提出了Auto-vGPU,一个自配置的虚拟化GPU自动资源共享框架,以减少对系统管理的人工干预,同时保证服务水平协议(SLA)的目标。Auto-vGPU自动收集系统指标的测量值,并通过降维学习每个应用程序的线性模型。为了实现控制器参数的自动组态,我们提出了一种基于比例积分调节器自动整定理论的自控制组态方法。云游戏实现的实验结果表明,Auto-vGPU能够在不需要人工干预的情况下自动构建低维模型和配置控制参数,派生的控制器能够自适应分配虚拟化GPU资源,保证云应用的高性能。
{"title":"Automated Resource Sharing for Virtualized GPU with Self-Configuration","authors":"Jianguo Yao, Q. Lu, Zhengwei Qi","doi":"10.1109/SRDS.2017.35","DOIUrl":"https://doi.org/10.1109/SRDS.2017.35","url":null,"abstract":"In this paper, we propose Auto-vGPU, a framework of automated resource sharing for virtualized GPU with self-configuration, to reduce manual intervention in system management while ensuring Service Level Agreement (SLA) targets. Auto-vGPU automatically collects the measurements of system metrics and learns a linear model for each application with dimension reduction. In order to fulfill the automated configuration of controller parameters, we propose a self-control-configuration method featuring the theory of automatic tuning of proportional-integral (PI) regulators. The experimental results of cloud gaming implementation demonstrate that Auto-vGPU is able to automatically build the low-dimension model and configure the control parameters without any manual interventions and the derived controller can adaptively allocate virtualized GPU resource to ensure the high performance of cloud applications.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"1 1","pages":"250-252"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88251798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting TCP-Based DDoS Attacks in Baidu Cloud Computing Data Centers 百度云计算数据中心基于tcp的DDoS攻击检测
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.37
Jiahui Jiao, Benjun Ye, Yue Zhao, Rebecca J. Stones, G. Wang, X. Liu, Shaoyan Wang, Gu-Ya Xie
Cloud computing data centers have become one of the most important infrastructures in the big-data era. When considering the security of data centers, distributed denial of service (DDoS) attacks are one of the most serious problems. Here we consider DDoS attacks leveraging TCP traffic, which are increasingly rampant but are difficult to detect. To detect DDoS attacks, we identify two attack modes: fixed source IP attacks (FSIA) and random source IP attacks (RSIA), based on the source IP address used by attackers. We also propose a real-time TCP-based DDoS detection approach, which extracts effective features of TCP traffic and distinguishes malicious traffic from normal traffic by two decision tree classifiers. We evaluate the proposed approach using a simulated dataset and real datasets, including the ISCX IDS dataset, the CAIDA DDoS Attack 2007 dataset, and a Baidu Cloud Computing Platform dataset. Experimental results show that the proposed approach can achieve attack detection rate higher than 99% with a false alarm rate less than 1%. This approach will be deployed to the victim-end DDoS defense system in Baidu cloud computing data center.
云计算数据中心已经成为大数据时代最重要的基础设施之一。在考虑数据中心的安全性时,分布式拒绝服务(DDoS)攻击是最严重的问题之一。这里我们考虑利用TCP流量的DDoS攻击,这种攻击越来越猖獗,但很难检测到。为了检测DDoS攻击,我们根据攻击者使用的源IP地址,区分了两种攻击模式:固定源IP攻击(FSIA)和随机源IP攻击(RSIA)。我们还提出了一种基于TCP的实时DDoS检测方法,该方法提取TCP流量的有效特征,并通过两个决策树分类器区分恶意流量和正常流量。我们使用模拟数据集和真实数据集来评估所提出的方法,包括ISCX IDS数据集、CAIDA DDoS攻击2007数据集和百度云计算平台数据集。实验结果表明,该方法可以实现攻击检测率大于99%,虚警率小于1%的目标。该方法将部署在百度云计算数据中心的受害端DDoS防御系统中。
{"title":"Detecting TCP-Based DDoS Attacks in Baidu Cloud Computing Data Centers","authors":"Jiahui Jiao, Benjun Ye, Yue Zhao, Rebecca J. Stones, G. Wang, X. Liu, Shaoyan Wang, Gu-Ya Xie","doi":"10.1109/SRDS.2017.37","DOIUrl":"https://doi.org/10.1109/SRDS.2017.37","url":null,"abstract":"Cloud computing data centers have become one of the most important infrastructures in the big-data era. When considering the security of data centers, distributed denial of service (DDoS) attacks are one of the most serious problems. Here we consider DDoS attacks leveraging TCP traffic, which are increasingly rampant but are difficult to detect. To detect DDoS attacks, we identify two attack modes: fixed source IP attacks (FSIA) and random source IP attacks (RSIA), based on the source IP address used by attackers. We also propose a real-time TCP-based DDoS detection approach, which extracts effective features of TCP traffic and distinguishes malicious traffic from normal traffic by two decision tree classifiers. We evaluate the proposed approach using a simulated dataset and real datasets, including the ISCX IDS dataset, the CAIDA DDoS Attack 2007 dataset, and a Baidu Cloud Computing Platform dataset. Experimental results show that the proposed approach can achieve attack detection rate higher than 99% with a false alarm rate less than 1%. This approach will be deployed to the victim-end DDoS defense system in Baidu cloud computing data center.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"15 1","pages":"256-258"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75875644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
CausalSpartan: Causal Consistency for Distributed Data Stores Using Hybrid Logical Clocks CausalSpartan:使用混合逻辑时钟的分布式数据存储的因果一致性
Pub Date : 2017-09-01 DOI: 10.1109/SRDS.2017.27
Mohammad Roohitavaf, M. Demirbas, S. Kulkarni
Causal consistency is an intermediate consistency model that can be achieved together with high availability and high-performance requirements even in presence of network partitions. In the context of partitioned data stores, it has been shown that implicit dependency tracking using clocks is more efficient than explicit dependency tracking by sending dependency check messages. Existing clock-based solutions depend on monotonic psychical clocks that are closely synchronized. These requirements make current protocols vulnerable to clock anomalies. In this paper, we propose a new clock-based algorithm, CausalSpartan, that instead of physical clocks, utilizes Hybrid Logical Clocks (HLCs). We show that using HLCs, without any overhead, we make the system robust on physical clock anomalies. This improvement is more significant in the context of query amplification, where a single query results in multiple GET/PUT operations. We also show that CausalSpartan decreases the visibility latency for a given data item comparing to existing clock-based approaches. In turn, this reduces the completion time of collaborative applications where two clients accessing two different replicas edit same items of the data store. Like previous protocols, CausalSpartan assumes that a given client does not access more than one replica. We show that in presence of network partitions, this assumption (made in several other works) is essential if one were to provide causal consistency as well as immediate availability to local updates.
因果一致性是一种中间一致性模型,即使在存在网络分区的情况下,也可以与高可用性和高性能需求一起实现。在分区数据存储的上下文中,已经证明使用时钟进行隐式依赖跟踪比通过发送依赖检查消息进行显式依赖跟踪更有效。现有的基于时钟的解决方案依赖于紧密同步的单调心理时钟。这些要求使得当前的协议容易受到时钟异常的影响。在本文中,我们提出了一种新的基于时钟的算法,CausalSpartan,它使用混合逻辑时钟(hlc)代替物理时钟。我们表明,使用hlc,在没有任何开销的情况下,我们使系统对物理时钟异常具有鲁棒性。这种改进在查询放大上下文中更为显著,其中单个查询会导致多个GET/PUT操作。我们还表明,与现有的基于时钟的方法相比,CausalSpartan减少了给定数据项的可见性延迟。反过来,这减少了协作应用程序的完成时间,在协作应用程序中,访问两个不同副本的两个客户机编辑数据存储的相同项。与以前的协议一样,CausalSpartan假设给定的客户机不访问多个副本。我们表明,在存在网络分区的情况下,如果要提供因果一致性以及对本地更新的即时可用性,这个假设(在其他几部作品中提出)是必不可少的。
{"title":"CausalSpartan: Causal Consistency for Distributed Data Stores Using Hybrid Logical Clocks","authors":"Mohammad Roohitavaf, M. Demirbas, S. Kulkarni","doi":"10.1109/SRDS.2017.27","DOIUrl":"https://doi.org/10.1109/SRDS.2017.27","url":null,"abstract":"Causal consistency is an intermediate consistency model that can be achieved together with high availability and high-performance requirements even in presence of network partitions. In the context of partitioned data stores, it has been shown that implicit dependency tracking using clocks is more efficient than explicit dependency tracking by sending dependency check messages. Existing clock-based solutions depend on monotonic psychical clocks that are closely synchronized. These requirements make current protocols vulnerable to clock anomalies. In this paper, we propose a new clock-based algorithm, CausalSpartan, that instead of physical clocks, utilizes Hybrid Logical Clocks (HLCs). We show that using HLCs, without any overhead, we make the system robust on physical clock anomalies. This improvement is more significant in the context of query amplification, where a single query results in multiple GET/PUT operations. We also show that CausalSpartan decreases the visibility latency for a given data item comparing to existing clock-based approaches. In turn, this reduces the completion time of collaborative applications where two clients accessing two different replicas edit same items of the data store. Like previous protocols, CausalSpartan assumes that a given client does not access more than one replica. We show that in presence of network partitions, this assumption (made in several other works) is essential if one were to provide causal consistency as well as immediate availability to local updates.","PeriodicalId":6475,"journal":{"name":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","volume":"30 1","pages":"184-193"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74438773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1