{"title":"Exploring the Performance Fluctuations of HPC Workloads on Clouds","authors":"Y. E. Khamra, Hyunjoo Kim, S. Jha, M. Parashar","doi":"10.1109/CloudCom.2010.84","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.84","url":null,"abstract":"Clouds enable novel execution modes often supported by advanced capabilities such as autonomic schedulers. These capabilities are predicated upon an accurate estimation and calculation of runtimes on a given infrastructure. Using a well understood high-performance computing workload, we find strong fluctuations from the mean performance on EC2 and Eucalyptus-based cloud systems. Our analysis eliminates variations in IO and computational times as possible causes, we find that variations in communication times account for the bulk of the experiment-to-experiment fluctuations of the performance.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114609856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framing the Issues of Cloud Computing & Sustainability: A Design Perspective","authors":"Yue Pan, S. Maini, Eli Blevis","doi":"10.1109/CloudCom.2010.77","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.77","url":null,"abstract":"In this paper, we describe the present lack of understanding about if the potential environmental effects of transitions to cloud computing are positive or negative. We describe that research about the human interactivity implications of and for cloud computing has yet to enter the arena of Human Computer Interaction (HCI) in a significant way. We describe a short inventory of what is presently in the HCI literature apropos of cloud computing and interactivity. In addition, we offer a description of how we think the issues of cloud computing in the perspective of HCI may be framed, as well as an inventory of social issues implicated in cloud computing. Finally, we suggest some projects and problems that may be appropriate for advancing cloud computing in the perspective of HCI with sustainability as a key goal.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do You Get What You Pay For? Using Proof-of-Work Functions to Verify Performance Assertions in the Cloud","authors":"Falk Koeppe, Jörg Schneider","doi":"10.1109/CloudCom.2010.100","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.100","url":null,"abstract":"In the Cloud, the operators usually offer resources on a pay per use price model. The client gets access to a newly created virtual machine and has no direct access to the underlying hardware. Therefore, the client cannot verify whether the Cloud operator provides the negotiated amount of resources or only a fraction thereof. Especially, the assigned share of CPU time can be easily forged by the operator. The client could use a normal benchmark to verify the performance of his virtual machine. However, as the Cloud operator owns the underlying infrastructure, the operator could also tamper with the benchmark execution. We identified four attack vectors to modify the results of the benchmark. Based on these attack vectors, we showed that using proof-of-work functions can disable three of them. Proof-of-work functions are challenge response systems, where it is simple to generate a challenge and verify the result while solving the challenge is compute intensive. We implemented three proof-of-work functions in a prototype benchmark. Experiments showed that the runtime of the proof-of-work functions sufficiently relates to the results of the reference benchmark suite SPEC CPU2006.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115151908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steven Lewis, Sheila M. Reynolds, Hector Rovira, Mike O'Leary, S. Killcoyne, I. Shmulevich, J. Boyle
{"title":"Howdah - A Flexible Pipeline Framework for Analyzing Genomic Data","authors":"Steven Lewis, Sheila M. Reynolds, Hector Rovira, Mike O'Leary, S. Killcoyne, I. Shmulevich, J. Boyle","doi":"10.1109/CloudCom.2010.75","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.75","url":null,"abstract":"The advent of new high-throughput sequencing technologies has led to a flood of genomic data which overwhelms the capabilities of single processor machines. We present a MapReduce pipeline called Howdah that supports the analysis of genomic sequence data allowing multiple tests to be plugged in to a single MapReduce job. The pipeline is used to detect chromosomal abnormalities such as insertions, deletions and translocations as well as single nucleotide polymorphisms (SNPs).","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122581166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Dong, Xiao Zhong, Q. Zheng, L. Jian, Jian Liu, J. Qiu, Ying Li
{"title":"Correlation Based File Prefetching Approach for Hadoop","authors":"B. Dong, Xiao Zhong, Q. Zheng, L. Jian, Jian Liu, J. Qiu, Ying Li","doi":"10.1109/CloudCom.2010.60","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.60","url":null,"abstract":"Hadoop Distributed File System (HDFS) has been widely adopted to support Internet applications because of its reliable, scalable and low-cost storage capability. Blue Sky, one of the most popular e-Learning resource sharing systems in China, is utilizing HDFS to store massive courseware. However, due to the inefficient access mechanism of HDFS, access latency of reading files from HDFS significantly impacts the performance of processing user requests. This paper introduces a two-level correlation based file prefetching approach, taking the characteristics of HDFS into consideration, to improve performance by reducing access latency. Four placement patterns to store prefetched data are presented, with policies to achieve trade-off between performance and efficiency of HDFS prefetching. Moreover, a dynamic replica selection algorithm is investigated to improve the efficiency of HDFS prefetching. The proposed prefetching approach has been implemented in Blue Sky, and experimental results prove that correlation based file prefetching can significantly reduce access latency therefore improve performance of Hadoop-based Internet applications.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploratory Project: State of the Cloud, from University of Michigan and Beyond","authors":"T. Ruthkoski","doi":"10.1109/CloudCom.2010.50","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.50","url":null,"abstract":"As data center costs rise and space availability diminishes many organizations are investigating the viability of cloud computing for research use. Yet the majority of research investigators have not readily embraced cloud capability, regardless of the potential cost savings. Through interviews, case studies, and up-to-the-minute blog posts from top experts, it is possible to extract a basic framework of barriers that dampen widespread cloud adoption. Insight gained through examining these barriers can then be used to design an organizational strategic plan to build a cloud-enhanced campus cyber infrastructure.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jesús Montes, Bogdan Nicolae, Gabriel Antoniu, Alberto Sánchez, María S. Pérez
{"title":"Using Global Behavior Modeling to Improve QoS in Cloud Data Storage Services","authors":"Jesús Montes, Bogdan Nicolae, Gabriel Antoniu, Alberto Sánchez, María S. Pérez","doi":"10.1109/CloudCom.2010.33","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.33","url":null,"abstract":"The cloud computing model aims to make large-scale data-intensive computing affordable even for users with limited financial resources, that cannot invest into expensive infrastructures necesssary to run them. In this context, MapReduce is emerging as a highly scalable programming paradigm that enables high-throughput data-intensive processing as a cloud service. Its performance is highly dependent on the underlying storage service, responsible to efficiently support massively parallel data accesses by guaranteeing a high throughput under heavy access concurrency. In this context, quality of service plays a crucial role: the storage service needs to sustain a stable throughput for each individual accesss, in addition to achieving a high aggregated throughput under concurrency. In this paper we propose a technique to address this problem using component monitoring, application-side feedback and behavior pattern analysis to automatically infer useful knowledge about the causes of poor quality of service and provide an easy way to reason in about potential improvements. We apply our proposal to Blob Seer, a representative data storage service specifically designed to achieve high aggregated throughputs and show through extensive experimentation substantial improvements in the stability of individual data read accesses under MapReduce workloads.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abstractions for Loosely-Coupled and Ensemble-Based Simulations on Azure","authors":"André Luckow, S. Jha","doi":"10.1109/CloudCom.2010.85","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.85","url":null,"abstract":"Azure is an emerging cloud platform developed and operated by Microsoft. It provides a range of abstractions and building blocks for creating scalable and reliable scientific applications. In this paper we investigate the applicability of the Azure abstractions to the well-known class of loosely coupled and ensemble-based applications. We propose the Big Job API as a novel abstraction for managing groups of Azure worker roles and for remotely executing tasks on them. We demonstrate that Azure enhanced with Big Job functionality provides performance comparable to other grid and cloud offerings loosely-coupled applications.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Impact of Privacy in Cloud Computing","authors":"R. Esteves, Chunming Rong","doi":"10.1109/CloudCom.2010.98","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.98","url":null,"abstract":"Cloud computing is emerging as a serious paradigm shift in the way we use computers. It relies on several technologies that are not new. However, the increasing availability of bandwidth allows new combinations and opens new IT perspectives. The data storage and processing power are being moved to more efficient and centralized structures over the web. Costs are being reduced with the loss of our data control as a trade-off. It will almost be inevitable for companies not to follow this trend. Yet, there are some important challenges to overcome. This paper discusses Cloud Computing concept concerning privacy and how it may affect our freedom of speech.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117029373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sustainable Network Resource Management System for Virtual Private Clouds","authors":"T. Miyamoto, M. Hayashi, Kosuke Nishimura","doi":"10.1109/CloudCom.2010.63","DOIUrl":"https://doi.org/10.1109/CloudCom.2010.63","url":null,"abstract":"To satisfy the requirement of secure isolation of Infrastructure–as-a-Service (IaaS) for enterprise customers, virtual private clouds, which are separated from others by using virtualization technologies, are deployed. However, isolation with virtualization technologies cannot avoid the affect of performance degradation, such as traffic congestion. Therefore, bandwidth-guaranteed virtual private clouds are needed for excluding unintentional and unwanted influence among multiple customers. In this paper, we propose a sustainable network resource management system (NRM) introducing a Changing Mechanism of software module based on the context (CHAMELEON) and a virtual network point for multipoint network provisioning. With the proposed mechanisms, we successfully demonstrated the sustainability of the NRM, which controls six kinds of network equipment without any modification itself.","PeriodicalId":130987,"journal":{"name":"2010 IEEE Second International Conference on Cloud Computing Technology and Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}