首页 > 最新文献

2015 IEEE International Conference on Autonomic Computing最新文献

英文 中文
Early Work on the Brain Patch, a Reflective Service for System of Systems Integration 系统集成系统的反射服务——大脑补丁的早期工作
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.73
K. Bellman, C. Landauer
In previous work we've shown that reflection supports the integration of components and of self-optimization within a complex system. In this paper, we discuss some early work on how some of these capabilities could support a similar integration and conflict resolution among the members of a system of systems (SoS). We start with a brief overview of the Wrappings approach to reflection, the notion of a web of reflection, and the CARS test bed where we are developing our concepts. We then introduce some early work on a new reflective service, the Brain Patch which helps to integrate a system into a System of Systems (SoS) by being both a domain specific expert on the reason for the formation of the SoS and its goals, situation, operating rules, etc. And by also continually observing and building a model of the system assigned to it.
在之前的工作中,我们已经证明了反射支持复杂系统中组件的集成和自我优化。在本文中,我们讨论了一些早期的工作,这些工作是关于这些功能如何在系统的系统(so)的成员之间支持类似的集成和冲突解决。我们首先简要概述一下wrappers的反射方法、反射网络的概念,以及我们正在开发这些概念的CARS测试平台。然后,我们介绍了一些关于新的反射服务的早期工作,大脑补丁,它有助于将系统集成到系统的系统(SoS)中,通过成为SoS形成的原因及其目标,情况,操作规则等领域的特定专家。通过不断观察和建立分配给它的系统模型。
{"title":"Early Work on the Brain Patch, a Reflective Service for System of Systems Integration","authors":"K. Bellman, C. Landauer","doi":"10.1109/ICAC.2015.73","DOIUrl":"https://doi.org/10.1109/ICAC.2015.73","url":null,"abstract":"In previous work we've shown that reflection supports the integration of components and of self-optimization within a complex system. In this paper, we discuss some early work on how some of these capabilities could support a similar integration and conflict resolution among the members of a system of systems (SoS). We start with a brief overview of the Wrappings approach to reflection, the notion of a web of reflection, and the CARS test bed where we are developing our concepts. We then introduce some early work on a new reflective service, the Brain Patch which helps to integrate a system into a System of Systems (SoS) by being both a domain specific expert on the reason for the formation of the SoS and its goals, situation, operating rules, etc. And by also continually observing and building a model of the system assigned to it.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"118 1","pages":"249-254"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86900296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation 基于动态冗余计算的大数据处理完整性保护
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.34
Zhimin Gao, Nicholas DeSalvo, P. D. Khoa, Seung-Hun Kim, Lei Xu, W. Ro, Rakesh M. Verma, W. Shi
Big data is a hot topic and has found various applications in different areas such as scientific research, financial analysis, and market studies. The development of cloud computing technology provides an adequate platform for big data applications. No matter public or private, the outsourcing and sharing characteristics of the computation model make security a big concern for big data processing in the cloud. Most existing works focus on protection of data privacy but integrity protection of the processing procedure receives little attention, which may lead the big data application user to wrong conclusions and cause serious consequences. To address this challenge, we design an integrity protection solution for big data processing in cloud environments using reputation based redundancy computation. The implementation and experiment results show that the solution only adds limited cost to achieve integrity protection and is practical for real world applications.
大数据是一个热门话题,在科学研究、财务分析和市场研究等不同领域都有不同的应用。云计算技术的发展为大数据应用提供了充分的平台。无论是公有的还是私有的,计算模型的外包和共享特性使得云中的大数据处理的安全性成为一个大问题。现有的工作大多注重对数据隐私的保护,而对处理过程的完整性保护关注较少,这可能导致大数据应用用户得出错误的结论,造成严重的后果。为了应对这一挑战,我们设计了一种基于信誉冗余计算的云环境下大数据处理完整性保护解决方案。实现和实验结果表明,该方案只增加了有限的成本,实现了完整性保护,具有实际应用价值。
{"title":"Integrity Protection for Big Data Processing with Dynamic Redundancy Computation","authors":"Zhimin Gao, Nicholas DeSalvo, P. D. Khoa, Seung-Hun Kim, Lei Xu, W. Ro, Rakesh M. Verma, W. Shi","doi":"10.1109/ICAC.2015.34","DOIUrl":"https://doi.org/10.1109/ICAC.2015.34","url":null,"abstract":"Big data is a hot topic and has found various applications in different areas such as scientific research, financial analysis, and market studies. The development of cloud computing technology provides an adequate platform for big data applications. No matter public or private, the outsourcing and sharing characteristics of the computation model make security a big concern for big data processing in the cloud. Most existing works focus on protection of data privacy but integrity protection of the processing procedure receives little attention, which may lead the big data application user to wrong conclusions and cause serious consequences. To address this challenge, we design an integrity protection solution for big data processing in cloud environments using reputation based redundancy computation. The implementation and experiment results show that the solution only adds limited cost to achieve integrity protection and is practical for real world applications.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"7 1","pages":"159-160"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86992018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Organic Architecture for Energy Management and Smart Grids 能源管理和智能电网的有机架构
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.10
Ingo Mauser, Christian Hirsch, Sebastian Kochanneck, H. Schmeck
An unprecedented rise of renewable and distributed energy resources imposes unprecedented challenges in terms of complexity to power grids. Multitudes of devices are not only connected to the electricity grid but need appropriate information and communication technologies for proving their services. These devices ask for novel control mechanisms on different levels and regional scales. In this paper, we show how concepts from Organic Computing may support the controlled self-organization of the future smart grid. We propose a generic hierarchical architecture as a framework for various energy management systems. This architecture is able to reflect the physical power grid structure as well as the interdependencies of its stakeholders, user objectives, subsystems, and devices. It enables adaptive responses to changing objectives as well as disturbances in the system. Various simulations of systems based on the proposed architecture show the applicability of the proposed architecture to domains of energy management in smart grids.
可再生能源和分布式能源的空前崛起,对电网的复杂性提出了前所未有的挑战。大量的设备不仅连接到电网,而且需要适当的信息和通信技术来证明它们的服务。这些设备要求在不同的水平和区域尺度上建立新的控制机制。在本文中,我们展示了有机计算的概念如何支持未来智能电网的受控自组织。我们提出了一个通用的分层架构作为各种能源管理系统的框架。该体系结构能够反映物理电网结构以及其利益相关者、用户目标、子系统和设备之间的相互依赖关系。它能够对不断变化的目标以及系统中的干扰做出自适应反应。基于该体系结构的各种系统仿真表明了该体系结构在智能电网能源管理领域的适用性。
{"title":"Organic Architecture for Energy Management and Smart Grids","authors":"Ingo Mauser, Christian Hirsch, Sebastian Kochanneck, H. Schmeck","doi":"10.1109/ICAC.2015.10","DOIUrl":"https://doi.org/10.1109/ICAC.2015.10","url":null,"abstract":"An unprecedented rise of renewable and distributed energy resources imposes unprecedented challenges in terms of complexity to power grids. Multitudes of devices are not only connected to the electricity grid but need appropriate information and communication technologies for proving their services. These devices ask for novel control mechanisms on different levels and regional scales. In this paper, we show how concepts from Organic Computing may support the controlled self-organization of the future smart grid. We propose a generic hierarchical architecture as a framework for various energy management systems. This architecture is able to reflect the physical power grid structure as well as the interdependencies of its stakeholders, user objectives, subsystems, and devices. It enables adaptive responses to changing objectives as well as disturbances in the system. Various simulations of systems based on the proposed architecture show the applicability of the proposed architecture to domains of energy management in smart grids.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"48 6 1","pages":"101-108"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90696251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Secure OM2M Service Platform 安全的OM2M业务平台
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.59
S. Sicari, A. Rizzardi, A. Coen-Porisini, L. Grieco, T. Monteil
Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (ETSI) released a set of specifications for a common M2M service platform. An ETSI-compliant M2M service platform has been proposed in the context of the open source OM2M project. However such a platform currently only marginally addresses security and privacy issues, which are fundamental requirements for its large-scale adoption. Therefore, an extension of the OM2M platform is proposed, defining a new policy enforcement plug in, which aims to manage the access to the resources provided by the platform itself and to handle any violation attempts of the policies.
机器对机器(M2M)模式是物联网(IoT)的主要关注点之一。它的范围是连接数十亿的异构设备,这些设备能够在不同的应用领域进行交互。由于当前M2M市场存在高度垂直分裂,且缺乏标准,欧洲电信标准协会(ETSI)发布了一套通用M2M服务平台的规范。在开源OM2M项目的背景下,提出了一个符合etsi的M2M服务平台。然而,这样的平台目前只能勉强解决安全和隐私问题,而这是其大规模采用的基本要求。因此,建议对OM2M平台进行扩展,定义一个新的策略实施插件,该插件旨在管理对平台本身提供的资源的访问,并处理任何违反策略的尝试。
{"title":"Secure OM2M Service Platform","authors":"S. Sicari, A. Rizzardi, A. Coen-Porisini, L. Grieco, T. Monteil","doi":"10.1109/ICAC.2015.59","DOIUrl":"https://doi.org/10.1109/ICAC.2015.59","url":null,"abstract":"Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (ETSI) released a set of specifications for a common M2M service platform. An ETSI-compliant M2M service platform has been proposed in the context of the open source OM2M project. However such a platform currently only marginally addresses security and privacy issues, which are fundamental requirements for its large-scale adoption. Therefore, an extension of the OM2M platform is proposed, defining a new policy enforcement plug in, which aims to manage the access to the resources provided by the platform itself and to handle any violation attempts of the policies.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"1 1","pages":"313-318"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90260535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Self-Healing Framework for Online Sensor Data 在线传感器数据的自修复框架
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.61
T. Nguyen, Marco Aiello, Takuro Yonezawa, K. Tei
In pervasive computing environments, wireless sensor networks (WSNs) play an important role, collecting reliable and accurate context information so that applications are able to provide services to users on demand. In such environments, sensors should be self-adaptive by taking correct decisions based on sensed data in real-time. However, sensor data is often faulty. Faults are not so exceptional and in most deployments tend to occur frequently. Therefore, the capability of self-healing is important to ensure higher levels of reliability and availability. We design a framework which provides self-healing capabilities, enabling a flexible choice of components for detection, classification, and correction of faults at runtime. Within our framework, a variety of fault detection and classification algorithms can be applied, depending on the characteristics of the sensor data types as well as the topology of the sensor networks. A set of mechanisms for each and every step of the self-healing framework, covering detection, classification, and correction of faults are proposed. To validate the applicability, we illustrate a case study where our solution is implemented as an adaptation engine and integrated seamlessly into the ClouT system. The engine processes data coming from physical sensors deployed in Santander, Spain, providing corrected sensor data to other smart city applications developed in the ClouT project.
在普适计算环境下,无线传感器网络(wsn)收集可靠、准确的上下文信息,使应用程序能够按需向用户提供服务,发挥着重要作用。在这样的环境中,传感器应该能够根据实时感知到的数据做出正确的决策,从而实现自适应。然而,传感器数据经常是错误的。故障并不罕见,在大多数部署中往往会频繁发生。因此,自我修复的能力对于确保更高级别的可靠性和可用性非常重要。我们设计了一个框架,它提供了自修复功能,可以灵活地选择组件来检测、分类和在运行时纠正错误。在我们的框架内,根据传感器数据类型的特征以及传感器网络的拓扑结构,可以应用各种故障检测和分类算法。针对自修复框架的每一步,提出了一套涵盖故障检测、分类和纠正的机制。为了验证其适用性,我们举例说明了一个案例研究,其中我们的解决方案被实现为适配引擎并无缝集成到ClouT系统中。该引擎处理来自部署在西班牙桑坦德的物理传感器的数据,为ClouT项目中开发的其他智能城市应用程序提供校正后的传感器数据。
{"title":"A Self-Healing Framework for Online Sensor Data","authors":"T. Nguyen, Marco Aiello, Takuro Yonezawa, K. Tei","doi":"10.1109/ICAC.2015.61","DOIUrl":"https://doi.org/10.1109/ICAC.2015.61","url":null,"abstract":"In pervasive computing environments, wireless sensor networks (WSNs) play an important role, collecting reliable and accurate context information so that applications are able to provide services to users on demand. In such environments, sensors should be self-adaptive by taking correct decisions based on sensed data in real-time. However, sensor data is often faulty. Faults are not so exceptional and in most deployments tend to occur frequently. Therefore, the capability of self-healing is important to ensure higher levels of reliability and availability. We design a framework which provides self-healing capabilities, enabling a flexible choice of components for detection, classification, and correction of faults at runtime. Within our framework, a variety of fault detection and classification algorithms can be applied, depending on the characteristics of the sensor data types as well as the topology of the sensor networks. A set of mechanisms for each and every step of the self-healing framework, covering detection, classification, and correction of faults are proposed. To validate the applicability, we illustrate a case study where our solution is implemented as an adaptation engine and integrated seamlessly into the ClouT system. The engine processes data coming from physical sensors deployed in Santander, Spain, providing corrected sensor data to other smart city applications developed in the ClouT project.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"13 1","pages":"295-300"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90283318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cost Minimization Using Renewable Cooling and Thermal Energy Storage in CDNs 在cdn中使用可再生冷却和热能储存的成本最小化
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.39
Stephen Lee, Rahul Urgaonkar, R. Sitaraman, P. Shenoy
Content delivery networks (CDNs) employ hundreds of data centers that are distributed across various geographical locations. These data centers consume a significant amount of energy to power and cool their servers. This paper investigates the joint effectiveness of using two new cooling technologies - open air cooling (OAC) and thermal energy storage (TES) - in CDNs to reduce their dependence on traditional chiller-based cooling and minimize its energy costs. Our Lyapunov-based online algorithm optimally distributes workload to data centers leveraging price and weather variations. We conduct a trace based simulation using weather data from NOAA and workload data from a global CDN. Our results show that CDNs can achieve at least 64% and 98% cooling energy savings during summer and winter respectively. Further, CDNs can significantly reduce their cooling energy footprint by switching to renewable open air cooling. We also empirically evaluate our approach and show that it performs optimally.
内容交付网络(cdn)使用分布在不同地理位置的数百个数据中心。这些数据中心消耗大量的能源来驱动和冷却它们的服务器。本文研究了在cdn中使用两种新型冷却技术-露天冷却(OAC)和热能储存(TES)的联合效果,以减少对传统冷水机组冷却的依赖,并最大限度地降低其能源成本。我们基于lyapunov的在线算法利用价格和天气变化将工作负载最佳地分配到数据中心。我们使用来自NOAA的天气数据和来自全球CDN的工作负载数据进行了基于轨迹的模拟。我们的研究结果表明,cdn在夏季和冬季分别可以实现至少64%和98%的制冷节能。此外,cdn可以通过转换为可再生的露天冷却来显着减少其冷却能源足迹。我们还对我们的方法进行了实证评估,并证明了它的最佳性能。
{"title":"Cost Minimization Using Renewable Cooling and Thermal Energy Storage in CDNs","authors":"Stephen Lee, Rahul Urgaonkar, R. Sitaraman, P. Shenoy","doi":"10.1109/ICAC.2015.39","DOIUrl":"https://doi.org/10.1109/ICAC.2015.39","url":null,"abstract":"Content delivery networks (CDNs) employ hundreds of data centers that are distributed across various geographical locations. These data centers consume a significant amount of energy to power and cool their servers. This paper investigates the joint effectiveness of using two new cooling technologies - open air cooling (OAC) and thermal energy storage (TES) - in CDNs to reduce their dependence on traditional chiller-based cooling and minimize its energy costs. Our Lyapunov-based online algorithm optimally distributes workload to data centers leveraging price and weather variations. We conduct a trace based simulation using weather data from NOAA and workload data from a global CDN. Our results show that CDNs can achieve at least 64% and 98% cooling energy savings during summer and winter respectively. Further, CDNs can significantly reduce their cooling energy footprint by switching to renewable open air cooling. We also empirically evaluate our approach and show that it performs optimally.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"682 1","pages":"121-126"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76872450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Workload, Performance and Resource Usage A工作负载、性能和资源使用情况
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.36
Yeali S. Sun, Cheng-En Du, Meng Chang Chen
This paper proposes a canonical correlation analysis (CCA) based workload-performance-resource (WPR) model which can capture and compare the complex many-to-many workload, performance and resource consumption relationship of an application running in physical and in virtual machines. The model can also establish complex relationships of the usage variables of four potentially interrelating resources (CPU, memory, disk I/O and network I/O) used by the application. The model is intended to be used in planning application resource requirements prior to cloud migration. Experimental results show that the WPR model can model and capture the complex resource consumption behavior of an application and the system modules that perform operations on its behalf, as well as the intricate correlation between the four types of resources, and gives good prediction performance.
本文提出了一个基于典型相关分析(CCA)的工作负载-性能-资源(WPR)模型,该模型可以捕获和比较运行在物理机和虚拟机中的应用程序复杂的多对多工作负载、性能和资源消耗关系。该模型还可以建立应用程序所使用的四种可能相互关联的资源(CPU、内存、磁盘I/O和网络I/O)的使用变量之间的复杂关系。该模型旨在用于在云迁移之前规划应用程序资源需求。实验结果表明,WPR模型可以对应用程序和代表其执行操作的系统模块的复杂资源消耗行为以及四种资源之间的复杂关联进行建模和捕获,并具有良好的预测性能。
{"title":"A Workload, Performance and Resource Usage","authors":"Yeali S. Sun, Cheng-En Du, Meng Chang Chen","doi":"10.1109/ICAC.2015.36","DOIUrl":"https://doi.org/10.1109/ICAC.2015.36","url":null,"abstract":"This paper proposes a canonical correlation analysis (CCA) based workload-performance-resource (WPR) model which can capture and compare the complex many-to-many workload, performance and resource consumption relationship of an application running in physical and in virtual machines. The model can also establish complex relationships of the usage variables of four potentially interrelating resources (CPU, memory, disk I/O and network I/O) used by the application. The model is intended to be used in planning application resource requirements prior to cloud migration. Experimental results show that the WPR model can model and capture the complex resource consumption behavior of an application and the system modules that perform operations on its behalf, as well as the intricate correlation between the four types of resources, and gives good prediction performance.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"4 1","pages":"215-218"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83529014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Security-Aware Virtual Server Migration Optimization to the Cloud 面向安全意识的虚拟服务器迁移优化到云
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.45
Bowu Zhang, Jinho Hwang, Liran Ma, Timothy Wood
Cloud computing, featured by shared servers and location independent services, has been widely adopted by various businesses to increase computing efficiency, and reduce operational costs. Despite significant benefits and interests, enterprises have a hard time to decide whether or not to migrate thousands of servers into the cloud because of various reasons such as lack of holistic migration (planning) tools, concerns on data security and cloud vendor lock-in. In particular, cloud security has become the major concern for decision makers, due to the nature weakness of virtualization -- the fact that the cloud allows multiple users to share resources through Internet-facing interfaces can be easily taken advantage of by hackers. Therefore, setting up a secure environment for resource migration becomes the top priority for both enterprises and cloud providers. To achieve the goal of security, security policies such as firewalls and access control have been widely adopted, leading to significant cost as additional resources need to employed. In this paper, we address the challenge of the security-aware virtual server migration, and propose a migration strategy that minimizes the migration cost while promising the security needs of enterprises. We prove that the proposed security-aware cost minimization problem is NP hard and our solution can achieve an approximate factor of 2. We perform an extensive simulation study to evaluate the performance of the proposed solution under various settings. Our simulation results demonstrate that our approach can save 53%moving cost for a single enterprise case, and 66% for multiple enterprises case comparing to a random migration strategy.
云计算以共享服务器和位置无关服务为特点,被各种企业广泛采用,以提高计算效率,降低运营成本。尽管带来了巨大的好处和利益,但由于缺乏整体迁移(规划)工具、对数据安全性的担忧以及云供应商锁定等各种原因,企业很难决定是否将数千台服务器迁移到云中。特别是,由于虚拟化的本质弱点——云允许多个用户通过面向internet的接口共享资源,这一事实很容易被黑客利用——云安全已经成为决策者的主要关注点。因此,建立一个安全的资源迁移环境成为企业和云提供商的首要任务。为了实现安全目标,防火墙和访问控制等安全策略已被广泛采用,但由于需要使用额外的资源,因此成本很高。在本文中,我们解决了安全感知虚拟服务器迁移的挑战,并提出了一种迁移策略,以最大限度地降低迁移成本,同时保证企业的安全需求。我们证明了所提出的安全感知成本最小化问题是NP困难的,我们的解可以达到近似2的因子。我们进行了广泛的模拟研究,以评估所提出的解决方案在各种设置下的性能。我们的仿真结果表明,与随机迁移策略相比,我们的方法可以为单个企业案例节省53%的迁移成本,为多个企业案例节省66%的迁移成本。
{"title":"Towards Security-Aware Virtual Server Migration Optimization to the Cloud","authors":"Bowu Zhang, Jinho Hwang, Liran Ma, Timothy Wood","doi":"10.1109/ICAC.2015.45","DOIUrl":"https://doi.org/10.1109/ICAC.2015.45","url":null,"abstract":"Cloud computing, featured by shared servers and location independent services, has been widely adopted by various businesses to increase computing efficiency, and reduce operational costs. Despite significant benefits and interests, enterprises have a hard time to decide whether or not to migrate thousands of servers into the cloud because of various reasons such as lack of holistic migration (planning) tools, concerns on data security and cloud vendor lock-in. In particular, cloud security has become the major concern for decision makers, due to the nature weakness of virtualization -- the fact that the cloud allows multiple users to share resources through Internet-facing interfaces can be easily taken advantage of by hackers. Therefore, setting up a secure environment for resource migration becomes the top priority for both enterprises and cloud providers. To achieve the goal of security, security policies such as firewalls and access control have been widely adopted, leading to significant cost as additional resources need to employed. In this paper, we address the challenge of the security-aware virtual server migration, and propose a migration strategy that minimizes the migration cost while promising the security needs of enterprises. We prove that the proposed security-aware cost minimization problem is NP hard and our solution can achieve an approximate factor of 2. We perform an extensive simulation study to evaluate the performance of the proposed solution under various settings. Our simulation results demonstrate that our approach can save 53%moving cost for a single enterprise case, and 66% for multiple enterprises case comparing to a random migration strategy.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"11 1","pages":"71-80"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90551080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
System of Systems Integration Also Includes Hardware Integration: A Small Demonstration of Providing Some Reflection Processes for HW 系统集成的系统也包括硬件集成:为硬件提供一些反射过程的一个小例子
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.74
Phyllis R. Nelson, C. Landauer, K. Bellman, Shotaro Goto, Jesse Taylor
In previous work we showed that reflection and Wrappings are useful tools for system integration. But System of Systems integration also needs to accommodate specific hardware challenges. We discuss simple examples from the operation of a single cyber-physical agent that accepts top-down commands, but uses the Wrappings architecture to self-organize its context specific implementation of them. Our experimental context is CARS (Computational Architectures for Reflective Systems) a test bed for exploring the behavior of distributed autonomous cyber-physical agents in a complex environment.
在之前的工作中,我们展示了反射和包装是系统集成的有用工具。但是系统的系统集成还需要适应特定的硬件挑战。我们将讨论单个网络物理代理操作的简单示例,该代理接受自顶向下的命令,但使用wrappers体系结构自组织其特定于上下文的实现。我们的实验背景是CARS(反射系统的计算架构),这是一个用于探索复杂环境中分布式自主网络物理代理行为的测试平台。
{"title":"System of Systems Integration Also Includes Hardware Integration: A Small Demonstration of Providing Some Reflection Processes for HW","authors":"Phyllis R. Nelson, C. Landauer, K. Bellman, Shotaro Goto, Jesse Taylor","doi":"10.1109/ICAC.2015.74","DOIUrl":"https://doi.org/10.1109/ICAC.2015.74","url":null,"abstract":"In previous work we showed that reflection and Wrappings are useful tools for system integration. But System of Systems integration also needs to accommodate specific hardware challenges. We discuss simple examples from the operation of a single cyber-physical agent that accepts top-down commands, but uses the Wrappings architecture to self-organize its context specific implementation of them. Our experimental context is CARS (Computational Architectures for Reflective Systems) a test bed for exploring the behavior of distributed autonomous cyber-physical agents in a complex environment.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"280 1","pages":"285-288"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90789166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Virtual Machine Resource Management Method with Millisecond Precision 一种毫秒精度的虚拟机资源管理方法
Pub Date : 2015-07-07 DOI: 10.1109/ICAC.2015.24
Y. Kaneko, Toshio Ito, Tomonori Maegawa
There are several research projects ongoing to apply cloud computing to industrial systems. The main focus of them is real-time performance of virtual machines (VMs) since it is important to guarantee a time-critical feature of industrial systems. However, there is another important issue that how much computing resource (CPU, memory, etc.) should be allocated to each VM which runs processes of an industrial system. In this paper, we propose a resource management method which manages VM resources with millisecond precision. In the proposed method, resource usage is measured and predicted, considering several microseconds allocation delay of Xen. Our experimental results show that the proposed method can guarantee 99% operation timing with higher CPU utilization in comparison with conventional resource management methods.
有几个正在进行的研究项目将云计算应用于工业系统。它们的主要焦点是虚拟机(vm)的实时性能,因为它对保证工业系统的时间关键特性非常重要。然而,还有另一个重要的问题,即应该为运行工业系统进程的每个VM分配多少计算资源(CPU、内存等)。本文提出了一种以毫秒级精度管理虚拟机资源的方法。在该方法中,考虑到Xen的几微秒分配延迟,对资源使用情况进行了测量和预测。实验结果表明,与传统的资源管理方法相比,该方法可以保证99%的操作时间,并且具有更高的CPU利用率。
{"title":"A Virtual Machine Resource Management Method with Millisecond Precision","authors":"Y. Kaneko, Toshio Ito, Tomonori Maegawa","doi":"10.1109/ICAC.2015.24","DOIUrl":"https://doi.org/10.1109/ICAC.2015.24","url":null,"abstract":"There are several research projects ongoing to apply cloud computing to industrial systems. The main focus of them is real-time performance of virtual machines (VMs) since it is important to guarantee a time-critical feature of industrial systems. However, there is another important issue that how much computing resource (CPU, memory, etc.) should be allocated to each VM which runs processes of an industrial system. In this paper, we propose a resource management method which manages VM resources with millisecond precision. In the proposed method, resource usage is measured and predicted, considering several microseconds allocation delay of Xen. Our experimental results show that the proposed method can guarantee 99% operation timing with higher CPU utilization in comparison with conventional resource management methods.","PeriodicalId":6643,"journal":{"name":"2015 IEEE International Conference on Autonomic Computing","volume":"71 1","pages":"223-226"},"PeriodicalIF":0.0,"publicationDate":"2015-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89764605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE International Conference on Autonomic Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1