首页 > 最新文献

ACM SIGOPS Oper. Syst. Rev.最新文献

英文 中文
Raft Refloated: Do We Have Consensus? 筏子重新浮起:我们有共识吗?
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723876
H. Howard, Malte Schwarzkopf, Anil Madhavapeddy, J. Crowcroft
The Paxos algorithm is famously difficult to reason about and even more so to implement, despite having been synonymous with distributed consensus for over a decade. The recently proposed Raft protocol lays claim to being a new, understandable consensus algorithm, improving on Paxos without making compromises in performance or correctness. In this study, we repeat the Raft authors' performance analysis. We developed a clean-slate implementation of the Raft protocol and built an event-driven simulation framework for prototyping it on experimental topologies. We propose several optimizations to the Raft protocol and demonstrate their effectiveness under contention. Finally, we empirically validate the correctness of the Raft protocol invariants and evaluate Raft's understandability claims.
Paxos算法是出了名的难以推理,更难以实现,尽管十多年来它一直是分布式共识的代名词。最近提出的Raft协议声称是一种新的,可理解的共识算法,在Paxos的基础上进行改进,而不会在性能或正确性上做出妥协。在本研究中,我们重复了Raft作者的性能分析。我们开发了Raft协议的全新实现,并构建了一个事件驱动的仿真框架,用于在实验拓扑上对其进行原型设计。我们对Raft协议提出了几种优化方案,并在竞争中证明了它们的有效性。最后,我们通过经验验证了Raft协议不变量的正确性,并评估了Raft的可理解性声明。
{"title":"Raft Refloated: Do We Have Consensus?","authors":"H. Howard, Malte Schwarzkopf, Anil Madhavapeddy, J. Crowcroft","doi":"10.1145/2723872.2723876","DOIUrl":"https://doi.org/10.1145/2723872.2723876","url":null,"abstract":"The Paxos algorithm is famously difficult to reason about and even more so to implement, despite having been synonymous with distributed consensus for over a decade. The recently proposed Raft protocol lays claim to being a new, understandable consensus algorithm, improving on Paxos without making compromises in performance or correctness.\u0000 In this study, we repeat the Raft authors' performance analysis. We developed a clean-slate implementation of the Raft protocol and built an event-driven simulation framework for prototyping it on experimental topologies. We propose several optimizations to the Raft protocol and demonstrate their effectiveness under contention. Finally, we empirically validate the correctness of the Raft protocol invariants and evaluate Raft's understandability claims.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88694765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Reconstructable Software Appliances with Kameleon 可重构软件设备与Kameleon
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723883
Cristian Ruiz, Salem Harrache, Michael Mercier, Olivier Richard
A software appliance builder bundles together an application with its needed middleware and an operating system to allow easy deployment on Infrastructure as a Service (IaaS) providers. These builders have the potential to address a key need in our community: the ability to reproduce an experiment. This paper reports the experiences on developing a software appliance builder called Kameleon that leverages popular and well tested tools. Kameleon simplifies the creation of complex software appliances that are targeted at research on operating systems, HPC and distributed computing. It does so by proposing a highly modular description format that encourages collaboration and reuse of procedures. Moreover, it provides debugging mechanisms for improving experimenter's productivity. To justify that our appliance builder stands above others, we compare it with the most known tools used by developers and researchers to automate the construction of software environments for virtual machines and IaaS infrastructures.
软件设备构建者将应用程序与其所需的中间件和操作系统捆绑在一起,以便在基础设施即服务(IaaS)提供商上轻松部署。这些构建者有潜力解决我们社区的一个关键需求:重现实验的能力。本文报告了开发一个名为Kameleon的软件设备构建器的经验,它利用了流行的和经过良好测试的工具。Kameleon简化了针对操作系统、高性能计算和分布式计算研究的复杂软件设备的创建。它通过提出一种高度模块化的描述格式来实现,这种格式鼓励过程的协作和重用。此外,它还提供了调试机制,以提高实验人员的工作效率。为了证明我们的设备构建器优于其他工具,我们将其与开发人员和研究人员使用的最知名的工具进行比较,以自动构建虚拟机和IaaS基础架构的软件环境。
{"title":"Reconstructable Software Appliances with Kameleon","authors":"Cristian Ruiz, Salem Harrache, Michael Mercier, Olivier Richard","doi":"10.1145/2723872.2723883","DOIUrl":"https://doi.org/10.1145/2723872.2723883","url":null,"abstract":"A software appliance builder bundles together an application with its needed middleware and an operating system to allow easy deployment on Infrastructure as a Service (IaaS) providers. These builders have the potential to address a key need in our community: the ability to reproduce an experiment. This paper reports the experiences on developing a software appliance builder called Kameleon that leverages popular and well tested tools. Kameleon simplifies the creation of complex software appliances that are targeted at research on operating systems, HPC and distributed computing. It does so by proposing a highly modular description format that encourages collaboration and reuse of procedures. Moreover, it provides debugging mechanisms for improving experimenter's productivity. To justify that our appliance builder stands above others, we compare it with the most known tools used by developers and researchers to automate the construction of software environments for virtual machines and IaaS infrastructures.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80291111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Foreword: Special Issue on Repeatability and Sharing of Experimental Artifacts 前言:实验工件的可重复性和共享特刊
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723874
E. Eide
Welcome to this special issue of Operating Systems Review dedicated to the topics of repeatability and sharing of experimental artifacts in systems research. The twelve papers in this issue present na snapshot of activities, results, and viewpoints on this theme. As the guest editor of this issue, I hope that you find these papers to be both inspiring and useful. I hope that by reading them, you will be motivated to carefully think about repeatability and artifact sharing as you pursue your own systems experiments. Several of the papers in this special issue present tools or testbeds that support repeatability and sharing, so I expect that you will discover one or more "new tricks" that will make it easier for you to create and share high-quality, sound, and repeatable experiments.
欢迎来到本期《操作系统评论》专刊,讨论系统研究中实验工件的可重复性和共享问题。本期的12篇论文简要介绍了关于这一主题的活动、结果和观点。作为本期的特邀编辑,我希望这些论文对大家有所启发和帮助。我希望通过阅读它们,在您进行自己的系统实验时,您将受到激励,仔细考虑可重复性和工件共享。本特刊中的几篇论文介绍了支持可重复性和共享的工具或测试平台,因此我希望您能发现一个或多个“新技巧”,使您更容易创建和共享高质量、可靠和可重复的实验。
{"title":"Foreword: Special Issue on Repeatability and Sharing of Experimental Artifacts","authors":"E. Eide","doi":"10.1145/2723872.2723874","DOIUrl":"https://doi.org/10.1145/2723872.2723874","url":null,"abstract":"Welcome to this special issue of Operating Systems Review dedicated to the topics of repeatability and sharing of experimental artifacts in systems research. The twelve papers in this issue present na snapshot of activities, results, and viewpoints on this theme. As the guest editor of this issue, I hope that you find these papers to be both inspiring and useful. I hope that by reading them, you will be motivated to carefully think about repeatability and artifact sharing as you pursue your own systems experiments. Several of the papers in this special issue present tools or testbeds that support repeatability and sharing, so I expect that you will discover one or more \"new tricks\" that will make it easier for you to create and share high-quality, sound, and repeatable experiments.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87000649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Data Placement in Distributed Systems 分布式系统中的数据放置
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723890
João Paiva, L. Rodrigues
Data placement refers to the problem of deciding how to assign data items to nodes in a distributed system to optimize one or several of a number of performance criteria such as reducing network congestion, improving load balancing, among others. This document reports on our experience when addressing this problem in distributed systems of different scales, namely: medium size datacenter-scale and internet-scale systems.
数据放置是指决定如何将数据项分配给分布式系统中的节点的问题,以优化许多性能标准中的一个或几个,例如减少网络拥塞、改善负载平衡等。本文报告了我们在不同规模的分布式系统中解决这个问题的经验,即:中等规模的数据中心规模和互联网规模的系统。
{"title":"On Data Placement in Distributed Systems","authors":"João Paiva, L. Rodrigues","doi":"10.1145/2723872.2723890","DOIUrl":"https://doi.org/10.1145/2723872.2723890","url":null,"abstract":"Data placement refers to the problem of deciding how to assign data items to nodes in a distributed system to optimize one or several of a number of performance criteria such as reducing network congestion, improving load balancing, among others. This document reports on our experience when addressing this problem in distributed systems of different scales, namely: medium size datacenter-scale and internet-scale systems.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77745688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Effective Git And Org-Mode Based Workflow For Reproducible Research 一个有效的基于Git和组织模式的可重复研究工作流
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723881
Luka Stanisic, Arnaud Legrand, Vincent Danjean
In this paper we address the question of developing a lightweight and effective workflow for conducting experimental research on modern parallel computer systems in a reproducible way. Our approach builds on two well-known tools (Git and Org-mode) and enables to address, at least partially, issues such as running experiments, provenance tracking, experimental setup reconstruction or replicable analysis. We have been using such a methodology for two years now and it enabled us to recently publish a fully reproducible article [12]. To fully demonstrate the effectiveness of our proposal, we have opened our two year laboratory notebook with all the attached experimental data. This notebook and the underlying Git revision control system enable to illustrate and to better understand the workflow we used.
在本文中,我们解决了开发一个轻量级和有效的工作流程的问题,以一种可重复的方式进行现代并行计算机系统的实验研究。我们的方法建立在两个著名的工具(Git和Org-mode)之上,并能够解决,至少部分地,诸如运行实验,来源跟踪,实验设置重建或可复制分析等问题。我们已经使用这种方法两年了,它使我们最近发表了一篇完全可重复的文章[12]。为了充分证明我们的建议的有效性,我们打开了我们两年的实验笔记本,并附上了所有的实验数据。这个笔记本和底层的Git版本控制系统能够更好地说明和理解我们使用的工作流。
{"title":"An Effective Git And Org-Mode Based Workflow For Reproducible Research","authors":"Luka Stanisic, Arnaud Legrand, Vincent Danjean","doi":"10.1145/2723872.2723881","DOIUrl":"https://doi.org/10.1145/2723872.2723881","url":null,"abstract":"In this paper we address the question of developing a lightweight and effective workflow for conducting experimental research on modern parallel computer systems in a reproducible way. Our approach builds on two well-known tools (Git and Org-mode) and enables to address, at least partially, issues such as running experiments, provenance tracking, experimental setup reconstruction or replicable analysis. We have been using such a methodology for two years now and it enabled us to recently publish a fully reproducible article [12]. To fully demonstrate the effectiveness of our proposal, we have opened our two year laboratory notebook with all the attached experimental data. This notebook and the underlying Git revision control system enable to illustrate and to better understand the workflow we used.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82471361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
The dataref versuchung: Saving Time through Better Internal Repeatability 数据交换:通过更好的内部可重复性节省时间
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723880
Christian J. Dietrich, D. Lohmann
Compared to more traditional disciplines, such as the natural sciences, computer science is said to have a somewhat sloppy relationship with the external repeatability of published results. However, from our experience the problem starts even earlier: In many cases, authors are not even able to replicate their own results a year later, or to explain how exactly that number on page three of the paper was ncomputed. Because of constant time pressure and strict submission deadlines, the successful researcher has to favor timely results over experiment documentation and data traceability. We consider internal repeatability to be one of the most important prerequisites for external replicability and the scientific process. We describe our approach to foster internal repeatability in our own research projects with the help of dedicated tools for the automation of traceable experimental setups and for data presentation in scientific papers. By employing these tools, measures for ensuring internal repeatability no longer waste valuable working time and pay off quickly: They save time by eliminating recurring, and therefore error-prone, manual work steps, and at the same time increase confidence in experimental results.
与自然科学等更传统的学科相比,据说计算机科学与已发表结果的外部可重复性之间的关系有些草率。然而,从我们的经验来看,问题开始得更早:在许多情况下,作者甚至无法在一年后复制他们自己的结果,或者解释论文第三页上的数字是如何精确计算出来的。由于持续的时间压力和严格的提交期限,成功的研究人员必须支持及时的结果,而不是实验文件和数据可追溯性。我们认为内部可重复性是外部可重复性和科学过程最重要的先决条件之一。我们描述了我们的方法,以促进内部可重复性在我们自己的研究项目的帮助下,专用工具的自动化可追溯的实验设置和科学论文中的数据呈现。通过使用这些工具,确保内部可重复性的措施不再浪费宝贵的工作时间,并迅速获得回报:它们通过消除重复的、因此容易出错的手工工作步骤节省了时间,同时增加了对实验结果的信心。
{"title":"The dataref versuchung: Saving Time through Better Internal Repeatability","authors":"Christian J. Dietrich, D. Lohmann","doi":"10.1145/2723872.2723880","DOIUrl":"https://doi.org/10.1145/2723872.2723880","url":null,"abstract":"Compared to more traditional disciplines, such as the natural sciences, computer science is said to have a somewhat sloppy relationship with the external repeatability of published results. However, from our experience the problem starts even earlier: In many cases, authors are not even able to replicate their own results a year later, or to explain how exactly that number on page three of the paper was ncomputed. Because of constant time pressure and strict submission deadlines, the successful researcher has to favor timely results over experiment documentation and data traceability.\u0000 We consider internal repeatability to be one of the most important prerequisites for external replicability and the scientific process. We describe our approach to foster internal repeatability in our own research projects with the help of dedicated tools for the automation of traceable experimental setups and for data presentation in scientific papers. By employing these tools, measures for ensuring internal repeatability no longer waste valuable working time and pay off quickly: They save time by eliminating recurring, and therefore error-prone, manual work steps, and at the same time increase confidence in experimental results.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81240646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Principles and Performance Characteristics of Algorithms for Live VM Migration 虚拟机热迁移算法原理及性能特点
Pub Date : 2015-01-20 DOI: 10.1145/2723872.2723894
Petter Svärd, B. Hudzia, Steve Walsh, Johan Tordsson, E. Elmroth
Since first demonstrated by Clark et al. in 2005, live migration of virtual machines has both become a standard feature of hypervisors and created an active field of research. However, the rich ongoing research in live migration focusmainly on performance improvements to well-known techniques, most of them being variations of the Clark approach. In order to advance live migration beyond incremental performance improvements, it is important to gain a deeper understanding of the live migration problem itself and its underlying principles. To address this issue, this contribution takes a step back and investigates the essential characteristics of live migration. The paper identifies five fundamental properties of live migration and uses these to investigate, categorize, and compare three approaches to live migration: precopy, postcopy and hybrid. The evaluated algorithms include well-known techniques derived from that of Clark as well as novel RDMA in-kernel approaches. Our analysis of the fundamental properties of the algorithms is validated by a set of experiments. In these, we migrate virtual machines with large memory sizes hosting workloads with high page dirtying rates to expose differences and limitations of the different approaches. Finally, we provide guidelines for which approach to use in different scenarios.
自Clark等人在2005年首次演示以来,虚拟机的实时迁移已经成为管理程序的标准特性,并创建了一个活跃的研究领域。然而,正在进行的大量实时迁移研究主要集中在对已知技术的性能改进上,其中大多数是Clark方法的变体。为了使实时迁移超越增量性能改进,有必要更深入地了解实时迁移问题本身及其基本原则。为了解决这个问题,本文将退一步研究实时迁移的基本特征。本文确定了实时迁移的五个基本特性,并利用这些特性对三种实时迁移方法进行了调查、分类和比较:预拷贝、后拷贝和混合。评估的算法包括来自Clark的著名技术以及新颖的RDMA内核方法。我们对算法基本特性的分析通过一组实验得到了验证。在这些方法中,我们迁移具有大内存大小的虚拟机,以托管具有高页面污染率的工作负载,以暴露不同方法的差异和限制。最后,我们提供了在不同场景中使用哪种方法的指导方针。
{"title":"Principles and Performance Characteristics of Algorithms for Live VM Migration","authors":"Petter Svärd, B. Hudzia, Steve Walsh, Johan Tordsson, E. Elmroth","doi":"10.1145/2723872.2723894","DOIUrl":"https://doi.org/10.1145/2723872.2723894","url":null,"abstract":"Since first demonstrated by Clark et al. in 2005, live migration of virtual machines has both become a standard feature of hypervisors and created an active field of research. However, the rich ongoing research in live migration focusmainly on performance improvements to well-known techniques, most of them being variations of the Clark approach. In order to advance live migration beyond incremental performance improvements, it is important to gain a deeper understanding of the live migration problem itself and its underlying principles.\u0000 To address this issue, this contribution takes a step back and investigates the essential characteristics of live migration. The paper identifies five fundamental properties of live migration and uses these to investigate, categorize, and compare three approaches to live migration: precopy, postcopy and hybrid. The evaluated algorithms include well-known techniques derived from that of Clark as well as novel RDMA in-kernel approaches. Our analysis of the fundamental properties of the algorithms is validated by a set of experiments. In these, we migrate virtual machines with large memory sizes hosting workloads with high page dirtying rates to expose differences and limitations of the different approaches. Finally, we provide guidelines for which approach to use in different scenarios.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86743887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Insider Threat Assessment: a Model-Based Methodology 内部威胁评估:基于模型的方法
Pub Date : 2014-12-05 DOI: 10.1145/2694737.2694740
Nicola Nostro, A. Ceccarelli, A. Bondavalli, F. Brancati
Security is a major challenge for today's companies, especially ICT ones which manage large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insider attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attackers, which often are company's employees motivated by socio-economical reasons, and to the fact that attackers operate within their granted restrictions. It is a consequence that insider attackers constitute an actual threat for ICT organizations. In this paper we present our methodology, together with the application of existing supporting libraries and tools from the state-of-the-art, for insider threats assessment and mitigation. The ultimate objective is to define the motivations and the target of an insider, investigate the likeliness and severity of potential violations, and finally identify appropriate countermeasures. The methodology also includes a maintenance phase during which the assessment can be updated to reflect system changes. As case study, we apply our methodology to the crisis management system Secure!, which includes different kinds of users and consequently is potentially exposed to a large set of insider threats.
安全是当今公司面临的主要挑战,尤其是那些管理大规模网络关键系统的信息通信技术公司。在系统可能面临的众多攻击和威胁中,有内部攻击者,即具有合法访问权限的用户滥用或误用其权限,从而导致意外的安全违规(例如,获取和传播敏感信息)。由于攻击者的性质(通常是出于社会经济原因的公司员工)以及攻击者在其授予的限制范围内操作的事实,这些攻击非常难以检测和减轻。这是内部攻击者对ICT组织构成实际威胁的结果。在本文中,我们介绍了我们的方法,以及现有支持库和最先进工具的应用,用于内部威胁评估和缓解。最终目标是确定内部人员的动机和目标,调查潜在违规行为的可能性和严重性,并最终确定适当的对策。该方法还包括一个维护阶段,在此期间可以更新评估以反映系统更改。作为案例研究,我们将我们的方法应用于危机管理系统Secure!,其中包括不同类型的用户,因此可能面临大量内部威胁。
{"title":"Insider Threat Assessment: a Model-Based Methodology","authors":"Nicola Nostro, A. Ceccarelli, A. Bondavalli, F. Brancati","doi":"10.1145/2694737.2694740","DOIUrl":"https://doi.org/10.1145/2694737.2694740","url":null,"abstract":"Security is a major challenge for today's companies, especially ICT ones which manage large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insider attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attackers, which often are company's employees motivated by socio-economical reasons, and to the fact that attackers operate within their granted restrictions. It is a consequence that insider attackers constitute an actual threat for ICT organizations. In this paper we present our methodology, together with the application of existing supporting libraries and tools from the state-of-the-art, for insider threats assessment and mitigation. The ultimate objective is to define the motivations and the target of an insider, investigate the likeliness and severity of potential violations, and finally identify appropriate countermeasures. The methodology also includes a maintenance phase during which the assessment can be updated to reflect system changes. As case study, we apply our methodology to the crisis management system Secure!, which includes different kinds of users and consequently is potentially exposed to a large set of insider threats.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75126734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing 云计算可靠性:第二届云计算可靠性问题国际研讨会报告和扩展论文
Pub Date : 2014-12-05 DOI: 10.1145/2694737.2694739
M. Correia, N. Mittal
One year after our first workshop on dependability issues in cloud computing, it is possible to say that cloud adoption reached ubiquity, paraphrasing a 2014 report [2]. In that document, RightScale, a cloud portfolio management company, says that 94% of the organisations they surveyed are running applications or at least experimenting with Infrastructure-as-a-Service. Moreover, 87% of these companies are using public clouds, often following a hybrid cloud approach. In a 2013 report, Verizon said that organisations were no longer using clouds just for development and testing, as production applications accounted for 60% of cloud usage [3]. A last January post in Forbes estimates that US businesses will spend $13 Billion in cloud computing in 2014 [1]. This level of cloud computing adoption suggests that the time is ripe for research on services and processes for cloud dependability and security. Governments are now aware of the benefits and challenges of cloud computing, as shown by initiatives such as the European Commission’s Cloud Computing Strategy and the U.S. Chief Information Officer and Federal CIO Council cloud.cio.gov . The academic community is not behind with a large number of conferences being promoted by professional societies such as the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). Consequently, research in the area is thriving. The Second International Workshop on Dependability Issues in Cloud Computing – DISCCO 2013 – aimed to contribute to this trend on research on cloud computing with a focus on dependability and security. This section of the present issue of the Operating Systems Review aims to report the activities of the workshop and present extended versions of two papers selected from its program based on their timeliness and quality.
在我们第一次关于云计算可靠性问题的研讨会一年后,可以说云的采用已经无处不在,这是2014年的一份报告[2]。在这份文件中,云投资组合管理公司RightScale表示,他们调查的94%的组织正在运行应用程序,或者至少在试验基础设施即服务。此外,这些公司中有87%正在使用公共云,通常采用混合云方法。在2013年的一份报告中,Verizon表示,组织不再仅仅将云用于开发和测试,因为生产应用程序占云使用的60%[3]。福布斯去年1月的一篇文章估计,2014年美国企业将在云计算上花费130亿美元[1]。这种级别的云计算采用表明,研究云可靠性和安全性的服务和流程的时机已经成熟。各国政府现在已经意识到云计算的好处和挑战,如欧盟委员会的云计算战略和美国首席信息官和联邦首席信息官委员会的cloud. CIO .gov。学术团体也不落后于诸如计算机协会(ACM)和电气与电子工程师协会(IEEE)等专业团体所推动的大量会议。因此,该领域的研究正在蓬勃发展。第二届云计算可靠性问题国际研讨会(DISCCO 2013)旨在促进云计算研究的这一趋势,重点关注可靠性和安全性。本期《操作系统评论》的本节旨在报告研讨会的活动,并介绍根据其及时性和质量从其计划中选出的两篇论文的扩展版本。
{"title":"Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing","authors":"M. Correia, N. Mittal","doi":"10.1145/2694737.2694739","DOIUrl":"https://doi.org/10.1145/2694737.2694739","url":null,"abstract":"One year after our first workshop on dependability issues in cloud computing, it is possible to say that cloud adoption reached ubiquity, paraphrasing a 2014 report [2]. In that document, RightScale, a cloud portfolio management company, says that 94% of the organisations they surveyed are running applications or at least experimenting with Infrastructure-as-a-Service. Moreover, 87% of these companies are using public clouds, often following a hybrid cloud approach. In a 2013 report, Verizon said that organisations were no longer using clouds just for development and testing, as production applications accounted for 60% of cloud usage [3]. A last January post in Forbes estimates that US businesses will spend $13 Billion in cloud computing in 2014 [1]. This level of cloud computing adoption suggests that the time is ripe for research on services and processes for cloud dependability and security. Governments are now aware of the benefits and challenges of cloud computing, as shown by initiatives such as the European Commission’s Cloud Computing Strategy and the U.S. Chief Information Officer and Federal CIO Council cloud.cio.gov . The academic community is not behind with a large number of conferences being promoted by professional societies such as the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). Consequently, research in the area is thriving. The Second International Workshop on Dependability Issues in Cloud Computing – DISCCO 2013 – aimed to contribute to this trend on research on cloud computing with a focus on dependability and security. This section of the present issue of the Operating Systems Review aims to report the activities of the workshop and present extended versions of two papers selected from its program based on their timeliness and quality.","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85489476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOSP Professional Travel Scholarship: Reflections by Recipient William Tetzlaff SOSP专业旅游奖学金:获得者William Tetzlaff的反思
Pub Date : 2014-12-05 DOI: 10.1145/2694737.2694743
W. Tetzlaff
I was delighted that the ACM extended the professional travel program to create an Emeritus-Discount on the SOSP registration, particularly since it was driving distance for me, and would have been a shame to miss. I also attended the Sunday workshop on non-volatile memory. I have been an ACM member pretty continuously since I was an Undergraduate at Northwestern, in the early 1960s. During my carrier I participated in many ACM program committees, and conferences, but my favorite has always been SOSP. During my carrier at IBM I spent a sabbatical at UC Berkeley CS, and being in the Research Division, was following university research, mainly systems, for decades. Visiting Universities, going to conferences, especially SOSP ” meeting the Faculty and Graduate students and seeing their research projects, was part of my role at IBM, but also just great fun. I enjoyed finding the projects that related to IBM work, and getting people connected. I fondly remember many SOSP conferences, and the graduate students I met for the first time, and later hired. When I retired, then the Past President of the IBM Academy of Technology, I was invited, as one of the senior scientists, to continue as an Emeritus Distinguished Engineer. It makes for a nice transition into mostly retirement, but I also continue to have a role in the research, and keep track of projects I am interested in. It also let’s me continue to play my role as a matchmaker between researchers at IBM and in Academia, and look for promising graduate students who might want to work at IBM research. I also continue to be active in the ACM, as a member of the Professional Development Committee, and am on some university advisory boards. Attending SOSP fit very well with my situation as an Emeritus at IBM. I saw many interesting presentations and poster sessions. In some cases they were in areas where I have worked over the years, and I feel I was able to provide some historical context for the people doing the work. Knowing about work in IBM, as well as other universities, I was also able to suggest to the people I met, other work that I thought would interest them, and in some cases provided email introductions. I had attended the SOSP at Big Sky, at my expense, Emeritus, Retired academics and industrial researchers don’t have grant money with travel, or a corporate expense account. I combined it with vacation time in Yellowstone, the Teatons, and Jackson, and just barely justified the extra, quite high cost of the SOSP conference. Hopefully SOSP, and other conferences, will value having older researchers, who are still active, with connections to other university or corporate research, but are no longer coming ”free” because their job pays for it, and have a long connection with ACM and the particular conference. I fully expect to pay for lodging and transportation, and turn the trip into a bit of vacation travel, but help on the high cost of the conference itself is a big help. The economics of a
我很高兴ACM延长了专业旅行计划,为SOSP注册提供了荣誉会员折扣,特别是因为对我来说这是开车的距离,如果错过就太可惜了。我还参加了周日的非易失性存储器研讨会。从20世纪60年代初我在西北大学读本科开始,我就一直是美国计算机协会的会员。在我的职业生涯中,我参加了许多ACM项目委员会和会议,但我最喜欢的一直是SOSP。在IBM工作期间,我在加州大学伯克利分校计算机科学部休了一个假,在研究部从事大学研究,主要是系统研究,持续了几十年。访问大学,参加会议,特别是SOSP“会见教师和研究生,看看他们的研究项目,这是我在IBM工作的一部分,但也是非常有趣的。我喜欢寻找与IBM工作相关的项目,并将人们联系起来。我深情地记得许多SOSP会议,以及我第一次见到的研究生,以及后来聘用的学生。当我退休时,当时是IBM技术学院的前任院长,我被邀请作为资深科学家之一,继续担任名誉杰出工程师。这是一个很好的过渡,基本上是退休,但我也继续在研究中发挥作用,并跟踪我感兴趣的项目。这也让我继续扮演我的角色,在IBM和学术界的研究人员之间牵线搭桥,寻找有前途的研究生,他们可能想在IBM的研究部门工作。我还作为专业发展委员会的成员继续活跃在ACM,并在一些大学顾问委员会任职。参加SOSP非常适合我作为IBM退休人员的情况。我看到了许多有趣的演讲和海报会议。在某些情况下,它们是在我工作多年的地区,我觉得我能够为从事这项工作的人提供一些历史背景。了解了IBM和其他大学的工作,我也能够向我遇到的人推荐我认为他们会感兴趣的其他工作,在某些情况下还提供电子邮件介绍。我自费参加了Big Sky的SOSP,退休学者和工业研究人员没有旅费补助,也没有公司报销账户。我把它与在黄石、蒂顿和杰克逊的假期时间结合起来,勉强证明了SOSP会议额外的、相当高的成本是合理的。希望SOSP和其他会议将重视那些仍然活跃的老研究人员,他们与其他大学或公司的研究有联系,但不再是“免费”的,因为他们的工作支付了费用,并且与ACM和特定会议有长期的联系。我完全可以承担住宿费和交通费,并把这次旅行变成一点度假旅行,但在会议的高昂费用上提供帮助本身就是一个很大的帮助。一个会议的经济需要相当大的客人保证,以及会议室和食物的成本,但额外的荣誉/退休或学生的增量成本,远远低于平均成本。我认为这是有价值的,就像学生折扣和旅行津贴一样,我希望ACM能更广泛地为名誉/退休会员创造会议折扣。
{"title":"SOSP Professional Travel Scholarship: Reflections by Recipient William Tetzlaff","authors":"W. Tetzlaff","doi":"10.1145/2694737.2694743","DOIUrl":"https://doi.org/10.1145/2694737.2694743","url":null,"abstract":"I was delighted that the ACM extended the professional travel program to create an Emeritus-Discount on the SOSP registration, particularly since it was driving distance for me, and would have been a shame to miss. I also attended the Sunday workshop on non-volatile memory. I have been an ACM member pretty continuously since I was an Undergraduate at Northwestern, in the early 1960s. During my carrier I participated in many ACM program committees, and conferences, but my favorite has always been SOSP. During my carrier at IBM I spent a sabbatical at UC Berkeley CS, and being in the Research Division, was following university research, mainly systems, for decades. Visiting Universities, going to conferences, especially SOSP ” meeting the Faculty and Graduate students and seeing their research projects, was part of my role at IBM, but also just great fun. I enjoyed finding the projects that related to IBM work, and getting people connected. I fondly remember many SOSP conferences, and the graduate students I met for the first time, and later hired. When I retired, then the Past President of the IBM Academy of Technology, I was invited, as one of the senior scientists, to continue as an Emeritus Distinguished Engineer. It makes for a nice transition into mostly retirement, but I also continue to have a role in the research, and keep track of projects I am interested in. It also let’s me continue to play my role as a matchmaker between researchers at IBM and in Academia, and look for promising graduate students who might want to work at IBM research. I also continue to be active in the ACM, as a member of the Professional Development Committee, and am on some university advisory boards. Attending SOSP fit very well with my situation as an Emeritus at IBM. I saw many interesting presentations and poster sessions. In some cases they were in areas where I have worked over the years, and I feel I was able to provide some historical context for the people doing the work. Knowing about work in IBM, as well as other universities, I was also able to suggest to the people I met, other work that I thought would interest them, and in some cases provided email introductions. I had attended the SOSP at Big Sky, at my expense, Emeritus, Retired academics and industrial researchers don’t have grant money with travel, or a corporate expense account. I combined it with vacation time in Yellowstone, the Teatons, and Jackson, and just barely justified the extra, quite high cost of the SOSP conference. Hopefully SOSP, and other conferences, will value having older researchers, who are still active, with connections to other university or corporate research, but are no longer coming ”free” because their job pays for it, and have a long connection with ACM and the particular conference. I fully expect to pay for lodging and transportation, and turn the trip into a bit of vacation travel, but help on the high cost of the conference itself is a big help. The economics of a ","PeriodicalId":7046,"journal":{"name":"ACM SIGOPS Oper. Syst. Rev.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81502453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM SIGOPS Oper. Syst. Rev.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1