{"title":"A Proactive Cloud Application Auto-Scaler using Reinforcement Learning","authors":"Albin Heimerson, Johan Eker, Karl-Erik Årzén","doi":"10.1109/UCC56403.2022.00040","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00040","url":null,"abstract":"This work explores the use of reinforcement learning to design a proactive cloud resource auto-scaler that is able to predict usage across a distributed microservice application. The focus is on serving time-sensitive workloads, e.g., industrial automation, connected XRNR (eXtended Reality/Virtual Reality), etc., where each job has a deadline and there is some cost associated with missing a deadline. A simple workload model, as well as a microservice application model, is presented. A reinforcement learning agent is trained to identify workloads and predict needed utilization for identified service chains. The results are compared to standard purely reactive techniques.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132760163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pankaj Sahu, S. Roy, M. Gharote, Sutapa Mondal, S. Lodha
{"title":"Cloud Storage and Processing Service Selection considering Tiered Pricing and Data Regulations","authors":"Pankaj Sahu, S. Roy, M. Gharote, Sutapa Mondal, S. Lodha","doi":"10.1109/UCC56403.2022.00020","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00020","url":null,"abstract":"Most countries have come up with varied data privacy regulations. Some countries have stringent data storage and processing regulations, while others allow conditional data transfer across borders. For enterprises with geographically distributed data sources (users), it becomes challenging to select cloud data centers that meet data regulations and have minimal overall operational costs. In this work, we propose a joint optimization model for the selection of storage and processing services from multiple cloud service providers, taking into practical consideration of data regulations and tiered pricing, which has not been addressed in the prior art. To solve this hard multi-objective combinatorial optimization problem, we propose a greedy cost-reductionbased algorithm. The proposed algorithm gives multiple nondominating solutions, which are on average 2.5% away from the optimal solution. Further, we demonstrate the implications of data regulations and the benefits of joint optimization.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Deepak Garg
{"title":"FLBCPS: Federated Learning based Secured Computation Offloading in Blockchain-Assisted Cyber-Physical Systems","authors":"Prakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Deepak Garg","doi":"10.1109/UCC56403.2022.00071","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00071","url":null,"abstract":"Mobile-edge computing (MEC) is a in demand method for improving the quality of computation experience on mobile devices (MD) since it helps MD’s to offload computing activities to MEC servers, which provide strong computing capabilities. However, there are certain unresolved concerns in present computation-offloading works: 1) safety issue; 2) joint computation offloading; and 3) flexible optimization. To solve safety and privacy concerns, we use Federated Learning-based blockchain technology, which provides data accuracy and irreversibility in MEC systems. Federated Learning (FL) is a promising technique towards effective machine learning while protecting privacy in dispersed situations such as the Internet of Things (IoT) and MEC. FL’s effectiveness is dependent on a network of participant nodes contributing their data and computational resources to the collective training of a globally model. As a result, preventing malicious nodes from interfering with model training while rewarding trustworthy nodes to assist to the learning process is critical for improved FL security and performance. We created an efficient resource allocation technique that optimizes computational offloading using a Blockchain-based Federated Learning (FL) method in order to add to the literature. The experimental findings show’s that the recommended FLBCPS technique improve system latency while maintaining consensus security.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TAROT: Spatio-Temporal Function Placement for Serverless Smart City Applications","authors":"Vincenzo De Maio, David Bermbach, I. Brandić","doi":"10.1109/UCC56403.2022.00013","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00013","url":null,"abstract":"Emerging smart city applications (i.e., traffic management, smart tourism) have to (i) process data coming from different IoT devices and (ii) deliver results of data processing to various user devices (e.g., smart vehicles or smartphone) while considering applications’ latency constraints. Serverless edge computing has proven to be very effective for latency-aware processing of IoT data, since it allows application developers to define data processing logic in terms of functions which react to data events. However, data processing functions should be dynamically placed and migrated while considering IoT data sources’ location and user devices’ mobility to minimize end-to-end latency. Unfortunately, current serverless computing solutions do not support mobility-aware placement of functions. In this paper, we propose dynamic function placement based on user devices’ mobility to address latency requirements of smart city applications. We consider serverless smart city applications, since this computational model allows to model application as a function execution in response to specific events, which makes it suitable for event-driven applications typical of smart city and IoT. First, we identify the parameters affecting end-to-end latency of serverless smart cities’ applications. Then, based on our findings, we design TAROT, a latency-aware function placement method based on data-driven mobility predictions. Results show improvements up to 46% for average end-to-end latency in comparison to state-of-the-art solutions.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logical Optimisation and Cost Modelling of Stream-Processing Programs Written in a Purely-Functional Framework","authors":"Jonathan Dowland, P. Watson, Adam Cattermole","doi":"10.1109/UCC56403.2022.00048","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00048","url":null,"abstract":"We present a vision for the automatic optimisation of distributed stream processing programs. StrIoT -a distributed stream-processing framework built using purely-functional programming – enables a set of validated logical optimisation rules to generate a set of possible deployment plans. A cost model then filters and ranks the plans before the best is automatically deployed across the cloud and edge devices. We describe StrIoT’s functional operators for writing stream-processing programs; the design, implementation and performance of StrIoT’s logical optimiser; and the cost model, which filters and ranks re-written programs and deployment plans in terms of two non-functional requirements: bandwidth and cost. The StrIoT vision is being explored through an open-source proof-of-concept implementation. We present our initial results with a motivating example before outlining the success criteria for future work in this area.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Autonomic Cloud Application Management","authors":"M. Rózanska, G. Horn","doi":"10.1109/UCC56403.2022.00021","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00021","url":null,"abstract":"Applications running in the Cloud can adapt to the varying demands by autonomic management of their resource configurations. The reconfiguration can be done as a reaction to the changed situation, or proactively to ensure the good performance of the application at some future point. However, it is difficult to predict the future behaviour of the application as it depends both on the changing contexts and the reconfiguration actions. This paper describes the approach for proactive autonomic Cloud application management and introduces a distinction between ‘independent metrics’,’performance metrics’ influenced by the reconfigurations, and ‘performance indicators’ related to the application’s utility and reconfigurations. It is shown how performance metrics and performance indicators can be learned as regression functions, and used in the proactive autonomic Cloud application optimization. Finally, the results of an evaluation by simulation show that the proposed approach is more accurate than reactive application control, and it gives better results in terms of the application’s utility.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joel Scheuner, Rui Deng, Jan-Philipp Steghöfer, P. Leitner
{"title":"CrossFit: Fine-grained Benchmarking of Serverless Application Performance across Cloud Providers","authors":"Joel Scheuner, Rui Deng, Jan-Philipp Steghöfer, P. Leitner","doi":"10.1109/UCC56403.2022.00016","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00016","url":null,"abstract":"Serverless computing emerged as a promising cloud computing paradigm for deploying cloud-native applications but raises new performance challenges. Existing performance evaluation studies focus on micro-benchmarking to measure an individual aspect of serverless functions, such as CPU speed, but lack an in-depth analysis of differences in application performance across cloud providers. This paper presents CrossFit, an approach for detailed and fair cross-provider performance benchmarking of serverless applications based on a providerindependent tracing model. Our case study demonstrates how detailed distributed tracing enables drill-down analysis to explain performance differences between two leading cloud providers, AWS and Azure. The results for an asynchronous application show that trigger time contributes most delay to the end-to-end latency and explains the main performance difference between cloud providers. Our results further reveal how increasing and bursty workloads affect performance stability, median latency, and tail latency.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127071925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deadline Aware Data Offloading in Fog Computing","authors":"Addis Tsega, Ayalew Belay Habtie","doi":"10.1109/UCC56403.2022.00045","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00045","url":null,"abstract":"Fog computing is an extension of cloud computing where services are provided at the edge of a network. With the growth of the Internet of Things (IoT), different applications have emerged. Many of these applications such as the Intelligent Transportation system (ITS), Tactile Internet applications (telerobot and robot surgery) and healthcare emergency application are delay-sensitive and need high reliability. Fog computing becomes an essential and integral part of cloud computing to provide a better quality of service for these applications to fulfill latency requirements and needed reliability. Under the fog computing environment, different resource allocation, task scheduling algorithms, and task offloading techniques are proposed to manage applications. These deployed algorithms and techniques enhance resource utilization, power consumption and overall response time fully or partially. But it is still difficult to accomplish the required latency requirement of applications with these algorithms. To solve this problem, with the use of a design science approach a deadline-aware data offloading model as well as algorithm is proposed and implemented to fog nodes. The proposed algorithm considers the deadline of a task, computation power of fog nodes, task nature and transmission delay during scheduling. After the evaluation of these parameters, the node controller offloads the task at the appropriate fog node. The evaluation of the proposed algorithm is done with a simulator. The effectiveness of the proposed algorithm is evaluated and compared with the existing first come first served (FCFS) and dynamic task offloading algorithms. According to the literature these algorithms are found to be the best algorithms from other scheduling algorithms. The experimental results show that the proposed algorithm achieves 24% and 17% less overall delay time when compared to FCFS and Dynamic Offloading algorithms respectively.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"1159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114161664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianyu Bai, Haili Wang, Jingda Guo, Xu Ma, Mahendra Talasila, Sihai Tang, Song Fu, Qing Yang
{"title":"Online Self-Evolving Anomaly Detection for Reliable Cloud Computing","authors":"Tianyu Bai, Haili Wang, Jingda Guo, Xu Ma, Mahendra Talasila, Sihai Tang, Song Fu, Qing Yang","doi":"10.1109/UCC56403.2022.00014","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00014","url":null,"abstract":"Production cloud computing systems consist of hundreds to thousands of computing and storage nodes. Such a scale, combined with ever-growing system complexity, is causing a key challenge to failure and resource management for dependable cloud computing. Efficient system monitoring and failure detection are crucial for understanding emergent, cloudwide phenomena and intelligently managing cloud resources for system-level dependability assurance and application-level performance assurance. To detect failures, we need to monitor the cloud execution and collect runtime performance data. These data are usually unlabeled at runtime in real-world systems, and thus a prior failure history is not always available. In this paper, we present a self-evolving anomaly detection framework for cloud dependability assurance. Our framework does not require any prior failure history, and it self-evolves by continuously exploring newly verified anomaly records and continuously updating the anomaly detector at runtime without expensive model retraining. A distinct advantage of our framework is that cloud system operators only need to check a small number of detected anomalies (compared with thousands-millions of system/application event records) and their decisions are leveraged to update the detector. Thus, the detector evolves following the upgrade of system hardware, update of software stack, and change of user workloads. Moreover, we design two types of detectors, one for general anomaly detection and the other for type-specific anomaly detection. Leveraging self-evolution and online learning techniques, our detectors can achieve 88.94% of sensitivity and 94.60% of specificity on average, which makes them suitable for real-world deployment.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational Data in the Cloud Legal Implications and Technical Recommendations","authors":"Ben Cohen, Ashley Hu, Deisy Patino, Joel Coffman","doi":"10.1109/UCC56403.2022.00032","DOIUrl":"https://doi.org/10.1109/UCC56403.2022.00032","url":null,"abstract":"Moving operations to the cloud has become a way of life for educational institutions. Much of the information these institutions store in the cloud is protected by the Family Educational Rights and Privacy Act (FERPA), which was last amended in 2002, well before cloud computing became ubiquitous. The application of a 1974 law to 21st-century technology presents a plethora of legal and technical questions. This work presents an interdisciplinary analysis of existing statutes (i.e., FERPA) and case law. We find that FERPA excludes information that students and faculty often believe is protected and that lower-court decisions have created further ambiguity. Given current technology, the statute is no longer sufficient to protect student data, and we offer recommendations based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework to improve educational institutions’ management of protected data.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"378 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114790809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}