{"title":"Risk and Energy Consumption Tradeoffs in Cloud Computing Service via Stochastic Optimization Models","authors":"Jue Wang, Siqian Shen","doi":"10.1109/UCC.2012.37","DOIUrl":"https://doi.org/10.1109/UCC.2012.37","url":null,"abstract":"Energy efficiency and computational reliability are two key concerns associated with modern computations that involve computational resource sharing and highly uncertain job arrivals from various sources (customers). In 2010, large-scale data center operations consume around 2% of the total energy use in the US. Meanwhile, the development of cloud computing in the IT industry possesses great potential for lowering energy consumption by partitioning and scheduling job requests among multiple computational servers. In this paper, we formulate stochastic integer programming models to minimize energy consumption of cloud computing servers over finite time periods, while maintaining a pre-specified quality of service (QoS) level for satisfying uncertain computational requests. The models dynamically monitor and predict customer requests for each period, and proactively switch servers on/off according to estimated customer requests. QoS levels are maintained by either enforcing zero unsatisfied requests, or imposing a joint chance constraint to bound possible failures in a backlogging model. When uncertain requests follow continuous distributions, we employ the Sampling Average Approximation for generating scenario-based requests. Such an approach transforms the original probabilistic model into deterministic mixed-integer linear programs. We further demonstrate computational results of all models by testing instances with different parameter combinations, and investigate how backlogging, unit penalty cost and QoS levels influence computational performances and optimal solutions.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic Tail-Phase Optimization for Bag-of-Tasks Execution in Clouds","authors":"Ana Oprescu, T. Kielmann, H. Leahu","doi":"10.1109/UCC.2012.23","DOIUrl":"https://doi.org/10.1109/UCC.2012.23","url":null,"abstract":"Elastic applications like bags of tasks benefit greatly from Infrastructure as a Service (IaaS) clouds that let users allocate compute resources on demand, charging based on reserved time intervals. Users, however, still need guidance for mapping their applications onto multiple IaaS offerings, both minimizing execution time and respecting budget limitations. For budget-controlled execution of bags of tasks, we built Bats, a scheduler that estimates possible budget and make spancombinations using a tiny task sample, and then executes a bag within the user's budget constraints. Previous work has shown the efficacy of this approach. There remains, however, the risk of outlier tasks causing the execution to exceed the predicted make span. In this work, we present a stochastic optimization of the tail phase for Bats' execution. The main idea is to use the otherwise idling machines up until the end of their (already paid-for) allocation time. Using the task completion time information acquired during the execution, BaTS decides which tasks to replicate onto idle machines in the tail phase, reducing the make span and improving the tolerance to outlier tasks. Our evaluation results show that this effect is robust w.r.t. the quality of runtime predictions and is the strongest with more expensive schedules in which many fast machines are available.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tackling Insider Threat in Cloud Relational Databases","authors":"Qussai M. Yaseen, B. Panda","doi":"10.1109/UCC.2012.18","DOIUrl":"https://doi.org/10.1109/UCC.2012.18","url":null,"abstract":"Cloud security is one of the major issues that worry individuals and organizations about cloud computing. Therefore, defending cloud systems against attacks such asinsiders' attacks has become a key demand. This paper investigates insider threat in cloud relational database systems(cloud RDMS). It discusses some vulnerabilities in cloud computing structures that may enable insiders to launch attacks, and shows how load balancing across multiple availability zones may facilitate insider threat. To prevent such a threat, the paper suggests three models, which are Peer-to-Peer model, Centralized model and Mobile-Knowledgebase model, and addresses the conditions under which they work well.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BlueShield: A Layer 2 Appliance for Enhanced Isolation and Security Hardening among Multi-tenant Cloud Workloads","authors":"Saurabh Barjatiya, P. Saripalli","doi":"10.1109/UCC.2012.21","DOIUrl":"https://doi.org/10.1109/UCC.2012.21","url":null,"abstract":"Enhanced Isolation and Security (EIS) in a cloud are of significant concern. Many organizations are hesitant in migrating to a cloud based infrastructure due to the perceived limitations with EIS. Earlier, we had presented the quantitative risk and impact assessment framework (QUIRC) [1]. QUIRC can be used to assess the security risks associated with the cloud computing platforms. In the present work, design and implementation of Blue Shield is presented. Blue Shield is a Layer2 appliance for an EIS hardening among multi-tenant cloud workloads. Blue Shield architecture provides EIS, significantly reducing the threats faced by the tenants in a cloud environment. EIS provided by Blue Shield is validated using a proof of concept implementation. Then shortcomings of the various present approaches in addressing the identified security threats are explained. It is shown that the present security applications, deployed in a non-cloud environment, do not require modification during migration to Blue Shield based clouds. Furthermore, the proposed design provides high level of protection among the VMs in the same VLAN.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Deployment Model Selection Assessment for SMEs: Renting or Buying a Cloud","authors":"J. Keung, F. Kwok","doi":"10.1109/UCC.2012.29","DOIUrl":"https://doi.org/10.1109/UCC.2012.29","url":null,"abstract":"Cloud computing technology is increasingly important in the industry with the promise of increased performance, dynamic resource allocation capabilities and provides a convincing opportunity for organizations to outsource their IT infrastructure under the pay-per-use model offered by many public cloud providers. But there are concerns when selecting between the private cloud and the public cloud that must be taken into account. Many SME enterprises with scarce in-house IT support and limited knowledge about different cloud technologies encounter difficulties in making the most appropriate choice on 'buying' a private cloud or 'renting' a public cloud service. Through a number of interviews with potential cloud adopters from the industry, this paper identifies the most relevant factors concerning cloud adoption and develops a cloud deployment model assessment method called Cloud Deployment Selection Model (CDSM). The model has been validated in real case studies, and recommendations derived have been compared with real adoption cases. Result shows it is able to accurately recommend a suitable cloud deployment model based on the factors identified from many SME organizations, an important tool for SMEs to decide between the private or the public cloud solution.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133728059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting MPI to MapReduce PaaS Clouds: An Experiment in Cross-Paradigm Execution","authors":"Jaroslaw Slawinski, V. Sunderam","doi":"10.1109/UCC.2012.52","DOIUrl":"https://doi.org/10.1109/UCC.2012.52","url":null,"abstract":"One desired attribute of utility computing is the ability for any provider's offering to meet any user's requirement, but the variety of programming paradigms and platform models make this non-trivial. While higher specializations may be implemented on more generic layers, e.g. SaaS on PaaS, or PaaS on IaaS clouds, we attempt the inverse - deploying procedural message passing programs on a MapReduce platform. Although begun as an academic exercise, our experiences provide several insights into the feasibility of such a mapping and highlight some collateral benefits of deploying certain classes of MPI applications on MapReduce platforms. More generally, this potential for cross-paradigm execution marks a characteristic in the utility-like nature of cloud computing. Our approach is based on the concept of adapters, common in traditional utilities, to reconcile application requirements to platform facilities. Our design philosophy, middleware components, and results from a simple experiment are described.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Neural Predictor to Auto-administrate the Cloud Infrastructure","authors":"Hanen Chihi, Walid Chainbi, K. Ghédira","doi":"10.1109/UCC.2012.35","DOIUrl":"https://doi.org/10.1109/UCC.2012.35","url":null,"abstract":"Due to all the pollutants generated by it and the steady increases in its rates, energy consumption has become a key issue. Cloud computing is an emerging model for distributed utility computing and is being considered as an attractive opportunity for saving energy through central management of computational resources. Obviously, a substantial reduction in energy consumption can be made by powering down servers when they are not in use. This work presents a resources provisioning approach based on an unsupervised predictor model in the form of an unsupervised, recurrent neural network based on a self-organizing map. Unsupervised learning in computers has for long been considered as the desired ambition of computer problems. Unlike conventional prediction-learning methods which assign credit by means of the difference between predicted and actual outcomes, the proposed study assigns credit by means of the difference between temporally successive predictions. We have shown that the proposed approach gives promising results.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Enhanced Pixel-Level Image Processing in the Clouds","authors":"Arash Nourian, Muthucumaru Maheswaran","doi":"10.1109/UCC.2012.13","DOIUrl":"https://doi.org/10.1109/UCC.2012.13","url":null,"abstract":"Image processing and storage are enormously resource intensive tasks that can benefit from cloud computing. Lack of robust mechanisms for controlling the privacy of the data outsourced to clouds is one of the concerns in using clouds for image processing. This paper presents a new image encoding scheme that enhances the privacy of the images outsourced to the clouds while allowing the clouds to perform certain forms of computations on the images. Our prototype shows the feasibility of performing a class of image processing tasks on images encoded for privacy.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Event Driven Multi-agent Architecture for Enabling Cloud Governance","authors":"V. Munteanu, Teodor-Florin Fortiş, V. Negru","doi":"10.1109/UCC.2012.50","DOIUrl":"https://doi.org/10.1109/UCC.2012.50","url":null,"abstract":"Cloud adoption is consistent within IT-based industries at different maturity levels. While cloud migration is an ongoing process, its base characteristics are not yet fully exploited. As Cloud Governance is built on top of requirements like security, reliability, trust, portability, interoperability, or fail over, a highly distributed and concurrent, and fault tolerant solution is required in order to achieve above specified requirements. This paper describes the core of an event-driven multi-agent architecture for supporting Cloud Governance activities, built around Akka/Clojure actor characteristics and fully exploiting the Enterprise Integration Patterns. The modeling process follows the Gaia methodology for agent-oriented analysis and design.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Cloud Computing Elasticity","authors":"Guilherme Galante, L. C. E. Bona","doi":"10.1109/UCC.2012.30","DOIUrl":"https://doi.org/10.1109/UCC.2012.30","url":null,"abstract":"Elasticity is a key feature in the cloud computing context, and perhaps what distinguishes this computing paradigm of the other ones, such as cluster and grid computing. Considering the importance of elasticity in cloud computing context, the objective of this paper is to present a comprehensive study about the elasticity mechanisms available today. Initially, we propose a classification for elasticity mechanisms, based on the main features found in the analysed commercial and academic solutions. In a second moment, diverse related works are reviewed in order to define the state of the art of elasticity in clouds. We also discuss some of the challenges and open issues associated with the use of elasticity features in cloud computing.","PeriodicalId":122639,"journal":{"name":"2012 IEEE Fifth International Conference on Utility and Cloud Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}