2012 IEEE Fifth International Conference on Utility and Cloud Computing最新文献

筛选
英文 中文
Risk and Energy Consumption Tradeoffs in Cloud Computing Service via Stochastic Optimization Models 基于随机优化模型的云计算服务风险与能耗权衡
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.37
Jue Wang, Siqian Shen
{"title":"Risk and Energy Consumption Tradeoffs in Cloud Computing Service via Stochastic Optimization Models","authors":"Jue Wang, Siqian Shen","doi":"10.1109/UCC.2012.37","DOIUrl":"https://doi.org/10.1109/UCC.2012.37","url":null,"abstract":"Energy efficiency and computational reliability are two key concerns associated with modern computations that involve computational resource sharing and highly uncertain job arrivals from various sources (customers). In 2010, large-scale data center operations consume around 2% of the total energy use in the US. Meanwhile, the development of cloud computing in the IT industry possesses great potential for lowering energy consumption by partitioning and scheduling job requests among multiple computational servers. In this paper, we formulate stochastic integer programming models to minimize energy consumption of cloud computing servers over finite time periods, while maintaining a pre-specified quality of service (QoS) level for satisfying uncertain computational requests. The models dynamically monitor and predict customer requests for each period, and proactively switch servers on/off according to estimated customer requests. QoS levels are maintained by either enforcing zero unsatisfied requests, or imposing a joint chance constraint to bound possible failures in a backlogging model. When uncertain requests follow continuous distributions, we employ the Sampling Average Approximation for generating scenario-based requests. Such an approach transforms the original probabilistic model into deterministic mixed-integer linear programs. We further demonstrate computational results of all models by testing instances with different parameter combinations, and investigate how backlogging, unit penalty cost and QoS levels influence computational performances and optimal solutions.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Stochastic Tail-Phase Optimization for Bag-of-Tasks Execution in Clouds 云中任务袋执行的随机尾相位优化
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.23
Ana Oprescu, T. Kielmann, H. Leahu
{"title":"Stochastic Tail-Phase Optimization for Bag-of-Tasks Execution in Clouds","authors":"Ana Oprescu, T. Kielmann, H. Leahu","doi":"10.1109/UCC.2012.23","DOIUrl":"https://doi.org/10.1109/UCC.2012.23","url":null,"abstract":"Elastic applications like bags of tasks benefit greatly from Infrastructure as a Service (IaaS) clouds that let users allocate compute resources on demand, charging based on reserved time intervals. Users, however, still need guidance for mapping their applications onto multiple IaaS offerings, both minimizing execution time and respecting budget limitations. For budget-controlled execution of bags of tasks, we built Bats, a scheduler that estimates possible budget and make spancombinations using a tiny task sample, and then executes a bag within the user's budget constraints. Previous work has shown the efficacy of this approach. There remains, however, the risk of outlier tasks causing the execution to exceed the predicted make span. In this work, we present a stochastic optimization of the tail phase for Bats' execution. The main idea is to use the otherwise idling machines up until the end of their (already paid-for) allocation time. Using the task completion time information acquired during the execution, BaTS decides which tasks to replicate onto idle machines in the tail phase, reducing the make span and improving the tolerance to outlier tasks. Our evaluation results show that this effect is robust w.r.t. the quality of runtime predictions and is the strongest with more expensive schedules in which many fast machines are available.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Tackling Insider Threat in Cloud Relational Databases 解决云关系数据库中的内部威胁
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.18
Qussai M. Yaseen, B. Panda
{"title":"Tackling Insider Threat in Cloud Relational Databases","authors":"Qussai M. Yaseen, B. Panda","doi":"10.1109/UCC.2012.18","DOIUrl":"https://doi.org/10.1109/UCC.2012.18","url":null,"abstract":"Cloud security is one of the major issues that worry individuals and organizations about cloud computing. Therefore, defending cloud systems against attacks such asinsiders' attacks has become a key demand. This paper investigates insider threat in cloud relational database systems(cloud RDMS). It discusses some vulnerabilities in cloud computing structures that may enable insiders to launch attacks, and shows how load balancing across multiple availability zones may facilitate insider threat. To prevent such a threat, the paper suggests three models, which are Peer-to-Peer model, Centralized model and Mobile-Knowledgebase model, and addresses the conditions under which they work well.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
BlueShield: A Layer 2 Appliance for Enhanced Isolation and Security Hardening among Multi-tenant Cloud Workloads BlueShield:用于在多租户云工作负载中增强隔离和安全加固的第2层设备
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.21
Saurabh Barjatiya, P. Saripalli
{"title":"BlueShield: A Layer 2 Appliance for Enhanced Isolation and Security Hardening among Multi-tenant Cloud Workloads","authors":"Saurabh Barjatiya, P. Saripalli","doi":"10.1109/UCC.2012.21","DOIUrl":"https://doi.org/10.1109/UCC.2012.21","url":null,"abstract":"Enhanced Isolation and Security (EIS) in a cloud are of significant concern. Many organizations are hesitant in migrating to a cloud based infrastructure due to the perceived limitations with EIS. Earlier, we had presented the quantitative risk and impact assessment framework (QUIRC) [1]. QUIRC can be used to assess the security risks associated with the cloud computing platforms. In the present work, design and implementation of Blue Shield is presented. Blue Shield is a Layer2 appliance for an EIS hardening among multi-tenant cloud workloads. Blue Shield architecture provides EIS, significantly reducing the threats faced by the tenants in a cloud environment. EIS provided by Blue Shield is validated using a proof of concept implementation. Then shortcomings of the various present approaches in addressing the identified security threats are explained. It is shown that the present security applications, deployed in a non-cloud environment, do not require modification during migration to Blue Shield based clouds. Furthermore, the proposed design provides high level of protection among the VMs in the same VLAN.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud Deployment Model Selection Assessment for SMEs: Renting or Buying a Cloud 中小企业云部署模式选择评估:租用或购买云
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.29
J. Keung, F. Kwok
{"title":"Cloud Deployment Model Selection Assessment for SMEs: Renting or Buying a Cloud","authors":"J. Keung, F. Kwok","doi":"10.1109/UCC.2012.29","DOIUrl":"https://doi.org/10.1109/UCC.2012.29","url":null,"abstract":"Cloud computing technology is increasingly important in the industry with the promise of increased performance, dynamic resource allocation capabilities and provides a convincing opportunity for organizations to outsource their IT infrastructure under the pay-per-use model offered by many public cloud providers. But there are concerns when selecting between the private cloud and the public cloud that must be taken into account. Many SME enterprises with scarce in-house IT support and limited knowledge about different cloud technologies encounter difficulties in making the most appropriate choice on 'buying' a private cloud or 'renting' a public cloud service. Through a number of interviews with potential cloud adopters from the industry, this paper identifies the most relevant factors concerning cloud adoption and develops a cloud deployment model assessment method called Cloud Deployment Selection Model (CDSM). The model has been validated in real case studies, and recommendations derived have been compared with real adoption cases. Result shows it is able to accurately recommend a suitable cloud deployment model based on the factors identified from many SME organizations, an important tool for SMEs to decide between the private or the public cloud solution.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133728059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Adapting MPI to MapReduce PaaS Clouds: An Experiment in Cross-Paradigm Execution 将MPI应用于MapReduce PaaS云:跨范式执行的实验
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.52
Jaroslaw Slawinski, V. Sunderam
{"title":"Adapting MPI to MapReduce PaaS Clouds: An Experiment in Cross-Paradigm Execution","authors":"Jaroslaw Slawinski, V. Sunderam","doi":"10.1109/UCC.2012.52","DOIUrl":"https://doi.org/10.1109/UCC.2012.52","url":null,"abstract":"One desired attribute of utility computing is the ability for any provider's offering to meet any user's requirement, but the variety of programming paradigms and platform models make this non-trivial. While higher specializations may be implemented on more generic layers, e.g. SaaS on PaaS, or PaaS on IaaS clouds, we attempt the inverse - deploying procedural message passing programs on a MapReduce platform. Although begun as an academic exercise, our experiences provide several insights into the feasibility of such a mapping and highlight some collateral benefits of deploying certain classes of MPI applications on MapReduce platforms. More generally, this potential for cross-paradigm execution marks a characteristic in the utility-like nature of cloud computing. Our approach is based on the concept of adapters, common in traditional utilities, to reconcile application requirements to platform facilities. Our design philosophy, middleware components, and results from a simple experiment are described.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Unsupervised Neural Predictor to Auto-administrate the Cloud Infrastructure 自动管理云基础设施的无监督神经预测器
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.35
Hanen Chihi, Walid Chainbi, K. Ghédira
{"title":"Unsupervised Neural Predictor to Auto-administrate the Cloud Infrastructure","authors":"Hanen Chihi, Walid Chainbi, K. Ghédira","doi":"10.1109/UCC.2012.35","DOIUrl":"https://doi.org/10.1109/UCC.2012.35","url":null,"abstract":"Due to all the pollutants generated by it and the steady increases in its rates, energy consumption has become a key issue. Cloud computing is an emerging model for distributed utility computing and is being considered as an attractive opportunity for saving energy through central management of computational resources. Obviously, a substantial reduction in energy consumption can be made by powering down servers when they are not in use. This work presents a resources provisioning approach based on an unsupervised predictor model in the form of an unsupervised, recurrent neural network based on a self-organizing map. Unsupervised learning in computers has for long been considered as the desired ambition of computer problems. Unlike conventional prediction-learning methods which assign credit by means of the difference between predicted and actual outcomes, the proposed study assigns credit by means of the difference between temporally successive predictions. We have shown that the proposed approach gives promising results.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Enhanced Pixel-Level Image Processing in the Clouds 隐私增强的云中的像素级图像处理
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.13
Arash Nourian, Muthucumaru Maheswaran
{"title":"Privacy Enhanced Pixel-Level Image Processing in the Clouds","authors":"Arash Nourian, Muthucumaru Maheswaran","doi":"10.1109/UCC.2012.13","DOIUrl":"https://doi.org/10.1109/UCC.2012.13","url":null,"abstract":"Image processing and storage are enormously resource intensive tasks that can benefit from cloud computing. Lack of robust mechanisms for controlling the privacy of the data outsourced to clouds is one of the concerns in using clouds for image processing. This paper presents a new image encoding scheme that enhances the privacy of the images outsourced to the clouds while allowing the clouds to perform certain forms of computations on the images. Our prototype shows the feasibility of performing a class of image processing tasks on images encoded for privacy.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Event Driven Multi-agent Architecture for Enabling Cloud Governance 支持云治理的事件驱动多代理体系结构
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.50
V. Munteanu, Teodor-Florin Fortiş, V. Negru
{"title":"An Event Driven Multi-agent Architecture for Enabling Cloud Governance","authors":"V. Munteanu, Teodor-Florin Fortiş, V. Negru","doi":"10.1109/UCC.2012.50","DOIUrl":"https://doi.org/10.1109/UCC.2012.50","url":null,"abstract":"Cloud adoption is consistent within IT-based industries at different maturity levels. While cloud migration is an ongoing process, its base characteristics are not yet fully exploited. As Cloud Governance is built on top of requirements like security, reliability, trust, portability, interoperability, or fail over, a highly distributed and concurrent, and fault tolerant solution is required in order to achieve above specified requirements. This paper describes the core of an event-driven multi-agent architecture for supporting Cloud Governance activities, built around Akka/Clojure actor characteristics and fully exploiting the Enterprise Integration Patterns. The modeling process follows the Gaia methodology for agent-oriented analysis and design.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Survey on Cloud Computing Elasticity 云计算弹性研究综述
2012 IEEE Fifth International Conference on Utility and Cloud Computing Pub Date : 2012-11-05 DOI: 10.1109/UCC.2012.30
Guilherme Galante, L. C. E. Bona
{"title":"A Survey on Cloud Computing Elasticity","authors":"Guilherme Galante, L. C. E. Bona","doi":"10.1109/UCC.2012.30","DOIUrl":"https://doi.org/10.1109/UCC.2012.30","url":null,"abstract":"Elasticity is a key feature in the cloud computing context, and perhaps what distinguishes this computing paradigm of the other ones, such as cluster and grid computing. Considering the importance of elasticity in cloud computing context, the objective of this paper is to present a comprehensive study about the elasticity mechanisms available today. Initially, we propose a classification for elasticity mechanisms, based on the main features found in the analysed commercial and academic solutions. In a second moment, diverse related works are reviewed in order to define the state of the art of elasticity in clouds. We also discuss some of the challenges and open issues associated with the use of elasticity features in cloud computing.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 300
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信