2010 IEEE Second International Conference on Cloud Computing Technology and Science最新文献

筛选
英文 中文
Image Distribution Mechanisms in Large Scale Cloud Providers 大型云提供商中的映像分发机制
R. Wartel, T. Cass, B. Moreira, E. Roche, M. Guijarro, S. Goasguen, U. Schwickerath
{"title":"Image Distribution Mechanisms in Large Scale Cloud Providers","authors":"R. Wartel, T. Cass, B. Moreira, E. Roche, M. Guijarro, S. Goasguen, U. Schwickerath","doi":"10.1109/CloudCom.2010.73","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.73","url":null,"abstract":"This paper presents the various mechanisms for virtual machine image distribution within a large batch farm and between sites that offer cloud computing services. The work is presented within the context of the Large Hadron Collider Computing Grid (LCG), it has two main goals. First it aims at presenting the CERN specific mechanisms that have been put in place to test the pre-staging of virtual machine images within a large cloud infrastructure of several hundred physical hosts. Second it introduces the basis of a policy for trusting and distributing virtual machine images between sites of the LCG. Finally experimental results are shown for the distribution of a 10 GB virtual machine image distributed to over 400 physical nodes using a binary tree and a Bit Torrent algorithm. Results show that images can be pre-staged within 30 minutes.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning 按需基础设施服务发放中的安全服务生命周期管理
Y. Demchenko, C. D. Laat, D. López, J. A. G. Espín
{"title":"Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning","authors":"Y. Demchenko, C. D. Laat, D. López, J. A. G. Espín","doi":"10.1109/CloudCom.2010.91","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.91","url":null,"abstract":"Modern e-Science and high technology industry require high-performance and complicated network and computer infrastructure to support distributed collaborating groups of researchers and applications that should be provisioned on-demand. The effective use and management of the dynamically provisioned services can be achieved by using the Service Delivery Framework (SDF) proposed by Tele Management Forum that provides a good basis for defining the whole services life cycle management and supporting infrastructure services. The paper discusses conceptual issues, basic requirements and practical suggestions for provisioning consistent security services as a part of the general e-Science infrastructure provisioning, in particular Grid and Cloud based. The proposed Security Services Lifecycle Management (SSLM) model extends the existing frameworks with additional stages such as “Reservation Session Binding” and “Registration and Synchronisation” that specifically target such security issues as the provisioned resources restoration, upgrade or migration and provide a mechanism for remote executing environment and data protection by binding them to the session context. The paper provides a short overview of the existing standards and technologies and refers to the on-going projects and experience in developing dynamic distributed security services.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Dynamic Resource Provisioning for Data Streaming Applications in a Cloud Environment 云环境中数据流应用的动态资源调配
S. Vijayakumar, Qian Zhu, G. Agrawal
{"title":"Dynamic Resource Provisioning for Data Streaming Applications in a Cloud Environment","authors":"S. Vijayakumar, Qian Zhu, G. Agrawal","doi":"10.1109/CloudCom.2010.95","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.95","url":null,"abstract":"The recent emergence of, cloud computing is making the, vision, of, utility computing, realizable, i.e., computing resources and services from a cloud can be delivered, utilized, and paid for in the same fashion as utilities like water or electricity. Current, cloud service providers have taken some steps towards supporting the true, pay-as-you-go or a utility-like pricing model, and current research points towards more fine-grained, allocation and pricing of resources in the future., In such environments, resource provisioning becomes a challenging problem, since one needs to avoid both under-provisioning (leading to application slowdown) and over-provisioning (leading to unnecessary resource costs). In this paper, we consider this problem in the context of streaming applications., In these applications, since the data is generated by external sources, the goal is to, carefully allocate resources so that the processing rate can, match the rate of data, arrival. We have developed a solution that can, handle, unexpected data rates, including, the, transient rates., We evaluate our approach using two streaming applications in a virtualized environment.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
User Demand Prediction from Application Usage Pattern in Virtual Smartphone 基于应用使用模式的虚拟智能手机用户需求预测
Joon Heo, K. Terada, M. Toyama, S. Kurumatani, E. Chen
{"title":"User Demand Prediction from Application Usage Pattern in Virtual Smartphone","authors":"Joon Heo, K. Terada, M. Toyama, S. Kurumatani, E. Chen","doi":"10.1109/CloudCom.2010.52","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.52","url":null,"abstract":"The numbers of smart phone users and related applications are growing rapidly, and applications continue to become more data-intensive. In the cloud based service for smart phone, if user demand on virtual machines exceeds the hardware capacity of the server, the server incurs an overload and bottleneck, network delay, latency, and packet loss rate are increased in 3G and Wi-Fi connections. Therefore, it is important to predict user demand and to use this information for resource allocation methods such as network virtualization and load balancing. We present a novel user demand prediction method that uses analysis results of application usage patterns. By analysis of log data and using the proposed method, we can predict execution time and average volume of transmitted application data. The proposed method is mainly considered for adoption in our virtual smart phone system. We show results from an experiment performed in an implemented test-bed, including prediction results and performance of wireless media.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigating Business-Driven Cloudburst Schedulers for E-Science Bag-of-Tasks Applications 为电子科学任务包应用程序研究业务驱动的Cloudburst调度器
David Candeia, Ricardo Araújo Santos, R. Lopes, F. Brasileiro
{"title":"Investigating Business-Driven Cloudburst Schedulers for E-Science Bag-of-Tasks Applications","authors":"David Candeia, Ricardo Araújo Santos, R. Lopes, F. Brasileiro","doi":"10.1109/CloudCom.2010.67","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.67","url":null,"abstract":"The new ways of doing science, rooted on the unprecedented processing, communication and storage infrastructures that became available to scientists, are collectively called e-Science. Many research labs now need non-trivial computational power to run e-Science applications. Grid and voluntary computing are well-established solutions that cater to this need, but are not accessible for all labs and institutions. Besides, there is an uncertainty about the future amount of resources that will be available in such infrastructures, which prevents the researchers from planning their activities to guarantee that deadlines will be met. With the emergence of the cloud computing paradigm come new opportunities. One possibility is to run e-Science activities at resources acquired on-demand from cloud providers. However, although very low, there is a cost associated with the usage of cloud resources. Besides that, the amount of resources that can be simultaneously acquired is, in practice, limited. Another possibility is the not new idea of composing hybrid infrastructures in which the huge amount of computational resources shared by the grid infrastructures are used whenever possible and extra capacity is acquired from cloud computing providers. We here investigate how to schedule e-Science activities in such hybrid infrastructures so that deadlines are met and costs are reduced.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125500112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Novel Approach for Cooperative Overlay-Maintenance in Multi-overlay Environments 一种多覆盖环境下协同覆盖维护的新方法
Chin-Jung Hsu, Wu-Chun Chung, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung
{"title":"A Novel Approach for Cooperative Overlay-Maintenance in Multi-overlay Environments","authors":"Chin-Jung Hsu, Wu-Chun Chung, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung","doi":"10.1109/CloudCom.2010.12","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.12","url":null,"abstract":"Overlay networks are widely adopted in many distributed systems for efficient resource sharing. Recently, issues in overlay network have also been introduced into cloud systems, in order to organize thousands of virtualized resources. In parallel, the explosion of P2P applications introduces the multi-overlay environment in which a number of nodes simultaneously participate in multiple overlays. When multiple applications running over a large set of nodes, some of nodes may take repeated efforts to preserve multi-overlay networks. Therefore, maintaining these co-existing overlays brings the redundant maintenance overhead. This paper presents a cooperative strategy to analyze the overlay maintenance of multi-overlay environments and to elaborate multiple overlays for simplifying the overlay maintenance. The proposed strategy exploits the synergy of co-existing overlays to handle their common overlay-maintenance, so that the redundant maintenance overhead could be eliminated while keeping performance. To evaluate the system performance, this paper not only analyzes several overlays but also considers realistic multi-overlay environments by varying the intersection ratio of diverse overlays and the combination of multiple overlays. Experimental results show that the proposed cooperative strategy significantly decreases the redundant overlay-maintenance overhead, where the reduction ratio of maintaining multiple overlays is higher than 60 percent in some of cases.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Privacy, Security and Trust Issues Arising from Cloud Computing 云计算带来的隐私、安全和信任问题
Siani Pearson, Azzedine Benameur
{"title":"Privacy, Security and Trust Issues Arising from Cloud Computing","authors":"Siani Pearson, Azzedine Benameur","doi":"10.1109/CloudCom.2010.66","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.66","url":null,"abstract":"Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these mechanisms are no longer adequate, but need to be rethought to fit this new paradigm. In this paper we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115275772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 574
User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium 云中的用户体验和安全——芬兰云联盟的实证研究
Nilay V. Oza, K. Karppinen, R. Savola
{"title":"User Experience and Security in the Cloud -- An Empirical Study in the Finnish Cloud Consortium","authors":"Nilay V. Oza, K. Karppinen, R. Savola","doi":"10.1109/CloudCom.2010.114","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.114","url":null,"abstract":"This paper presents an empirical analysis of security and user experience issues in cloud computing. The study is based on the assumption that superior user experience and user-centric security are the two crucial issues that help to build an overall experience for the cloud service user. Qualitative research analysis is used to collect perspectives of eleven experts from Finnish Cloud Software Program Consortium. The perspectives of these experts are then analyzed qualitatively and a thematic analysis is presented. As a result a range of issues related to user experience and security are identified, leading to a perspective of marrying security and user experience.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
CloudView: Describe and Maintain Resource View in Cloud CloudView:描述和维护云中的资源视图
Dehui Zhou, Liang Zhong, Tianyu Wo, Junbin Kang
{"title":"CloudView: Describe and Maintain Resource View in Cloud","authors":"Dehui Zhou, Liang Zhong, Tianyu Wo, Junbin Kang","doi":"10.1109/CloudCom.2010.26","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.26","url":null,"abstract":"Resource view is the user defined table to provide specific view on resource status in cloud computing environment. It provides a convenient way to retrieve resource data for applications at infrastructure, platform and service layers. But the description and maintenance of these diverse resource views are inconvenient and dramatically difficult due to massive, heterogeneous and dynamic characteristics of the cloud resources involved. In this paper we present a resource view description scheme RQL and the corresponding system Cloud View to address these difficulties. RQL provides users a scheme to specify the data processing flow from resource raw data collected to resource view data objected. By constructing data processing a cyclic graph based on view definitions and using basic routines, view maintenance mechanism update user defined resource views automatically and periodically. Cloud View use a centralized scheduler to distribute maintenance jobs to a set of scalable worker nodes. It leverages distributed key-value database to store view data. Compared to related resource monitoring and discovering systems, Cloud View is flexible in application oriented view description and maintenance. Experiments show it updates typical user defined views with desired performance.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122470211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Self-Caring IT Systems: A Proof-of-Concept Implementation in Virtualized Environments 自我关怀IT系统:虚拟环境中的概念验证实现
S. Kadirvel, J. Fortes
{"title":"Self-Caring IT Systems: A Proof-of-Concept Implementation in Virtualized Environments","authors":"S. Kadirvel, J. Fortes","doi":"10.1109/CloudCom.2010.83","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.83","url":null,"abstract":"In self-caring IT systems, faults are handled proactively, e.g. by slowing down the deterioration of system health thereby effectively avoiding or delaying system failures. This requires health management which entails health monitoring, diagnosis, prognosis, planning of recovery and remediation actions. A brief overview of our prior work, which proposes a general methodology to capture system properties and incorporate health management using Petri nets, is provided. We describe in detail an application of the proposed formal method to the design and development of middleware that can manage the health of a batch-based, job submission system on a virtualized platform. First, we describe how a real world job submission IT system is converted to a Petri net model. Secondly, we show system validation and analysis using this model to understand resource needs of different activities in the IT chain. Thirdly, we describe how the executable model is used as a system manager to control operation and health management of a virtualized test bed. Fourthly, we illustrate the use of a feedback controller to manage health deterioration due to resource depletion in the job-execution stage of the modeled IT chain. Using a proof-of-concept implementation, we show that the early detection and handling of health deteriorations results in significant benefits in terms of cost savings and down time reduction. Experimental results show that our health management framework can be used to effectively prevent job failures, while imposing low overhead to the managed system. We have shown that for a typical workload consisting of jobs that suffer from potential resource depletion faults, our feedback controller can be used to gain useful life that is needed for critical planning and remediation actions in up to 82% of the jobs.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信