{"title":"Intent-based cloud service management","authors":"Chaofeng Wu, Shingo Horiuchi","doi":"10.1109/ICIN.2018.8401600","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401600","url":null,"abstract":"Currently, cloud operators mainly rely on their skills and experience when making decisions about cloud resources in accordance with cloud users' service requirements. However, such manual decisions tend to be costly and error- prone given the huge number of cloud service orders, wide variety of requirements, and complexity of cloud configuration options. In this work, we take cloud users' service requirements as intent and propose an Intent-based Cloud Service Management (ICSM) framework to automate or support operators' decision-making process for cloud resources. We have realized a proof-of-concept ICSM implementation in a lab environment and evaluated its performance.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimenting with cache peering in multi-tenant 5G networks","authors":"K. Katsaros, Vasilis Glykantzis","doi":"10.1109/ICIN.2018.8401623","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401623","url":null,"abstract":"The introduction of virtualized compute and storage resources at the edge of 5G mobile networks is expected to facilitate the flexible instantiation and management of services and applications at the network vicinity of the end users, including content caching. At the same time, virtualization fosters the emergence of multiple-tenants of the shared 5G infrastructure, separately operating such services. In this context, this paper examines the potential benefits presented by the cooperation of co-located tenants in the form of cache peering relationships. Building a proof of concept testbed, we experimentally validate these benefits further investigating aspects related to resource allocation and isolation in a sliced networking environment. Our preliminary results show that cache peering can increase cache hit ratio by approximately 15.3%, an increase otherwise achieved by the lease of an additional 33% of storage resources. This comes at the cost of limited CPU utilization overheads (8.7%) due to peering load.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing authentication for mobile networks, a survey on 4G issues and 5G answers","authors":"Shanay Behrad, E. Bertin, N. Crespi","doi":"10.1109/ICIN.2018.8401619","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401619","url":null,"abstract":"The upcoming fifth generation of mobile networks is expected to support a set of many requirements and use cases. However, it should be able to provide a high level of security by considering the different aspects such as authentication mechanisms. The current 4G AKA protocols designed to address the AAA needs present some weaknesses and will also be impacted by the new requirements of 5G systems. In this paper, we survey the vulnerabilities of 4G AKA protocol, as well as the current 5G architectural answers brought by the 3GPP.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116153941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GreenPOD: Leveraging queuing networks for reducing energy consumption in data centers","authors":"Fatoumata Balde, H. Elbiaze, B. Gueye","doi":"10.1109/ICIN.2018.8401602","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401602","url":null,"abstract":"Reducing the energy consumed in Clouds is becoming an increasingly challenging research direction due to the exponential growth of services hosted there and delivered. The big concern of data center providers is to find a trade-off between the offered resources and the current traffic load. GreenPOD aims to reduce the consumed energy as well as to satisfy pre-defined response time for fat-tree data center networks by using queuing theory based on mathematical model. GreenPOD considers different activation thresholds based on request queuing to switch ON/OFF different POD which is formed by a certain group of servers when needed. Our results show that GreenPOD outperforms previous energy-aware queuing theoretical model. In respect of a moderately demanded system (resp. highly demanded system), GreenPOD saves up to 61.72% (resp. 47.75%).","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pricing and quantization of memory for cloud services with uniform request distribution","authors":"Anwar Alyatama","doi":"10.1109/ICIN.2018.8401636","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401636","url":null,"abstract":"Cloud computing services has emerged as the preferred technological option for future source of computing power across personal, enterprise and mobile computing applications. In this context, memory allocation has a significant bearing on the cloud based services. This paper reviews the problem of pricing and quantization when memory size requests follow a uniform distribution. We proposed a cloud computing service that advertises continuous (any) memory request size while actually supporting a small number of quantized memory sizes. We utilized simulation to investigate different factors that affect pricing and quantization such as worth model, memory size and granularity.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"28 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive policy based SON management demonstrator","authors":"Tony Daher, S. B. Jemaa, L. Decreusefond","doi":"10.1109/ICIN.2018.8401579","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401579","url":null,"abstract":"Policy Based SON Management (PBSM) framework has been introduced to manage Self-Organizing Networks (SON) functions in a way that they fulfill all together the operator global goals and provide a unique self-organized network that can be controlled as a whole. This framework mainly translates operator global objectives into policies to be followed by individual SON functions. To cope with the complexity of radio networks due to the impact of radio environment and traffic dynamics, we propose to empower the PBSM with cognition capability. We propose a Cognitive PBSM (CPBSM) that relies on a Reinforcement Learning (RL) algorithm which learns the optimal configuration of SON functions and steers them towards the global operator objectives. The visitor will see how changing the operator objectives leads to a reconfiguration of the SON functions in such a way that the new objectives are fulfilled. The operation of a RL based cognitive management will be illustrated and the exploration/exploitation and scalability dilemmas will be explained.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable request routing for VR-ready CDNs","authors":"Pierre-Louis Poirion, Jérémie Leguay, Liu Ruosi","doi":"10.1109/ICIN.2018.8401609","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401609","url":null,"abstract":"Content Delivery Networks (CDN) are witnessing the outburst of video traffic and must get ready for streaming services based on Virtual Reality (VR). The immersive experience that VR provides for live events or video on demand dramatically increases the need for network and computing resources and VR sessions are foreseen to be elephants flows in service providers' infrastructures. This paper analyzes the challenges of request routing in VR-ready CDNs and argues that decisions must be taken at a finer granularity compared to today's practice. To make such decisions at scale, we propose a hybrid control framework, called VR-ready Admission Control (VRAC), to decompose and solve the underlying optimization problem in real-time. We demonstrate in a realistic setting that it will be decisive to withstand the ever increasing penetration of data- hungry VR video streams.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123960914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ITU-T network model extension for virtualized network architectures","authors":"B. Lemoine","doi":"10.1109/ICIN.2018.8401610","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401610","url":null,"abstract":"The new Network Virtualization paradigm permits the automated deployment of Virtual Network Functions over an abstracted Virtualization Infrastructure. The stacking of each layer requires some complex networking that may lead to misconfiguration. We think that the ITU-T layer network models used for legacy transport networks are appropriate to depict the corresponding architecture. We propose to extend them with an additional IP layer model. We illustrate how the ITU-T layer network models have helped to troubleshoot the deployment of an OpenStack infrastructure.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based content classification with global-connected net (GC-Net)","authors":"Zhi Chen, P. Ho","doi":"10.1109/ICIN.2018.8401601","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401601","url":null,"abstract":"Real-time classification of video content has been envisioned to revolutionize human lives. The paper introduces a cloud-based video classification system that is able to perform lightweight video classification on real-time captured video content. An Internet of things (IoT) device, called Content Classification Box (CCB), is defined as an add-on to one or a number of cameras in vicinity for content classification. The CCB will communicate with the cloud server once any interested content/event (such as abnormality) is identified, in which the corresponding video content is transported to the cloud server for further inspection. To achieve the lightweight and intelligent video content classification at the CCB, a novel convolutional neural network (CNN) framework, namely Global-Connected Net (GC-Net), is introduced. GC-Net is featured by a novel deep learning architecture for exploitation of all the earlier hidden layer neurons, as well as an activation function that has the potential to approximate complexity functions. We will show that the proposed CNN framework can achieve similar performance in a number of object recognition benchmark tasks, namely MNIST and CIFAR-10/100, under significantly less number of parameters, thus being able to apply to low-computation and low-memory scenarios.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving user identity in Identity-as-a-Service","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann","doi":"10.1109/ICIN.2018.8401613","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401613","url":null,"abstract":"In Federated Identity Management, providers from different security domains exchange messages containing authentication and authorisation credentials of users. As a result, a user can use his Personal Identifiable Information (PII) from one or more Identity Providers to gain access to other sites. Disseminating PII over intermediaries also requires protecting PII from being misused and unauthorised access. Identity-as-a- Service (IDaaS) provides a federated identity for users to access multiple Cloud services on demand but may preserve user privacy. In this paper, we present a novel approach for preserving privacy in IDaaS by combining Purpose Based Access Control and Attribute-based Encryption with multi-authorities support. Our approach is suitable for sharing sensitive user information in a large distributed and heterogeneous environment.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}