{"title":"Trident: A Provider-Oriented Resource Management Framework for Serverless Computing Platforms","authors":"Botao Zhu;Yifei Zhu;Chen Chen;Linghe Kong","doi":"10.1109/TSC.2025.3603867","DOIUrl":"10.1109/TSC.2025.3603867","url":null,"abstract":"Serverless computing has become increasingly popular due to its flexible and hassle-free service, relieving users from traditional resource management burdens. However, the shift in responsibility has led to unprecedented challenges for serverless providers in managing virtual machines (VMs) and serving heterogeneous function instances. Serverless providers need to purchase, provision and manage VM instances from IaaS providers, aiming to minimize VM provisioning costs while ensuring compliance with Service Level Objectives (SLOs). In this paper, we propose Trident, a provider-oriented resource management framework for serverless computing platforms. Trident optimizes three major serverless computing provisioning problems for serverless providers: workload prediction, VM provisioning, and function placement. Specifically, Trident introduces a novel dynamic model selection algorithm for more accurate workload prediction. With the prediction results, Trident then carefully designs a hierarchical reinforcement learning (HRL)-based approach for VM provisioning with a mix of types and configurations. To further improve resource utilization, Trident employs an effective collocation placement strategy for efficient function container scheduling. Evaluations on the Azure Function dataset demonstrate that Trident maintains the lowest probability of violating SLOs while simultaneously achieving substantial cost savings of up to 71.8% in provisioning expense compared to state-of-the-art methods from industry and academia.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 5","pages":"3334-3347"},"PeriodicalIF":5.8,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144915645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingxing Chen, Qingfeng Cheng, Xiaofeng Chen, Xiangyang Luo
{"title":"A Blockchain-Based Cross-Domain Data Transmission Scheme for Industrial Internet of Things with Edge-Cloud Computing","authors":"Xingxing Chen, Qingfeng Cheng, Xiaofeng Chen, Xiangyang Luo","doi":"10.1109/tsc.2025.3603155","DOIUrl":"https://doi.org/10.1109/tsc.2025.3603155","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"104 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144905925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comment on “RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare”","authors":"Jiseung Kim;Hyung Tae Lee","doi":"10.1109/TSC.2025.3601977","DOIUrl":"10.1109/TSC.2025.3601977","url":null,"abstract":"Recently, Yang et al. proposed a reputation incentive committee consensus-based matchmaking scheme (IEEE Transactions on Services Computing, 2024), claiming to achieve indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2). In this work, we present a plaintext recovery attack against their scheme under the adaptive chosen ciphertext attack model, analyze the design and proof flaws enabling the attacks, and suggest a countermeasure to achieve the IND-CCA2 security.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 5","pages":"3362-3363"},"PeriodicalIF":5.8,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144900518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}