Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing最新文献

筛选
英文 中文
The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems 云存储系统中机密性和客户端加密的开销
Eric Henziger, Niklas Carlsson
{"title":"The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems","authors":"Eric Henziger, Niklas Carlsson","doi":"10.1145/3344341.3368808","DOIUrl":"https://doi.org/10.1145/3344341.3368808","url":null,"abstract":"Client-side encryption (CSE) is important to ensure that only the intended users have access to information stored in public cloud services. However, CSE complicates file synchronization methods such as deduplication and delta encoding, important to reduce the large network bandwidth overheads associated with cloud storage services. To investigate the overhead penalty associated with CSE, in this paper, we present a comprehensive overhead analysis that includes empirical experiments using four popular CSE services (CSEs) and four popular non-CSEs. Our results show that existing CSEs are able to implement CSE together with bandwidth saving features such as compression and deduplication with low additional overhead compared to the non-CSEs. The most noticeable differences between CSEs and non-CSEs are instead related to whether they implement delta encoding and how effectively such solutions are implemented. In particular, fewer CSEs than non-CSEs implement delta encoding, and the bandwidth saving differences between the applications that implement delta encoding can be substantial.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Edge Affinity-based Management of Applications in Fog Computing Environments 雾计算环境下基于边缘亲和力的应用管理
Md. Redowan Mahmud, K. Ramamohanarao, R. Buyya
{"title":"Edge Affinity-based Management of Applications in Fog Computing Environments","authors":"Md. Redowan Mahmud, K. Ramamohanarao, R. Buyya","doi":"10.1145/3344341.3368795","DOIUrl":"https://doi.org/10.1145/3344341.3368795","url":null,"abstract":"Fog computing overcomes the limitations of executing Internet of Things (IoT) applications in remote Cloud datacentres by extending the computation facilities closer to data sources. Since most of the Fog nodes are resource constrained, accommodation of every IoT application within Fog environments is very challenging. Hence, we need to efficiently identify which set of applications should be deployed in Fog. It becomes even more complicated when the application characteristics in terms of urgency, size and flow of inputs are considered simultaneously. The necessity of time-optimized execution further intensifies the application management problem. In this work, we propose a policy for Fog environments that distributes application management tasks across the gateway and the infrastructure level. It classifies and places applications according to their Edge affinity. Edge affinity of an application denotes the relative intensity of different attributes coherent with its characteristics such as user-defined deadline, amount of data per input and sensing frequency of IoT devices, which are required to be addressed within Fog environments to meet its Quality of Service (QoS). The proposed policy also minimizes the service delivery time of applications in Fog infrastructure. Its performance is compared with existing application management policies in both iFogSim-simulated and FogBus-based real environments. The experiment results show that our policy outperforms others in combined QoS enhancement, network relaxation and resource utilization.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
FogDocker: Start Container Now, Fetch Image Later FogDocker:现在启动容器,稍后获取映像
L. Civolani, G. Pierre, P. Bellavista
{"title":"FogDocker: Start Container Now, Fetch Image Later","authors":"L. Civolani, G. Pierre, P. Bellavista","doi":"10.1145/3344341.3368811","DOIUrl":"https://doi.org/10.1145/3344341.3368811","url":null,"abstract":"Slow software deployment is an important issue in environments such as fog computing where this operation lies in the critical path of providing online services to the end users. The problem is even worse when the virtualized resources are made of modest machines such as single-board computers. This paper leverages the observation that, although Docker images are often very large, only a small fraction of their content is actually accessed by the containers during startup. We therefore propose to reorganize container images and download only the strictly necessary files before starting a container. The remaining image contents can then be downloaded asynchronously while the container is already running. Our performance evaluations show that FogDocker reduces container deployment times in the order of 3-5x on single-board computers and 2-3x on powerful servers, while incurring low runtime overhead and maintaining correctness even in the case a container accesses a file which was not downloaded yet.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"Suppl 89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Container-based Sandboxes for Malware Analysis: A Compromise Worth Considering 基于容器的恶意软件分析沙箱:一个值得考虑的折衷方案
A. Khalimov, Sofiane Benahmed, Rasheed Hussain, S. Kazmi, A. Oracevic, Fatima Hussain, Farhan Ahmad, Kerrache Chaker Abdelaziz
{"title":"Container-based Sandboxes for Malware Analysis: A Compromise Worth Considering","authors":"A. Khalimov, Sofiane Benahmed, Rasheed Hussain, S. Kazmi, A. Oracevic, Fatima Hussain, Farhan Ahmad, Kerrache Chaker Abdelaziz","doi":"10.1145/3344341.3368810","DOIUrl":"https://doi.org/10.1145/3344341.3368810","url":null,"abstract":"Malware analysis relies on monitoring the behavior of a suspected application within a confined, controlled and secure environment. These environments are commonly referred to as \"Sandboxes'' and are often virtualized replicas of a regular system. Hypervisor-based sandboxes were among the most commonly used techniques for malware analysis during the last decade; however, these sandboxes do not often provide the required stealth and transparency to deceive the malware in believing that it is being run in a target machine. This is due to the difference between virtualized systems and bare metal ones; differences which are exploited by the malware as detection artifacts. In this paper, we address the aforementioned problem by exploring the use of container-based environments as an alternative to hypervisor-based sandboxes for malware analysis. More precisely, we explore different ways to monitor containerized applications and make these containers act and look as close to real systems as possible. Our experimental results revealed that Docker containers are a promising option for a sandbox. However, this option comes at the cost of new detection artifacts which make containers subject to fingerprinting through different sources that malware can easily find. We explore these sources and try to address them by various means including system-call introspection. Finally, based on our discoveries, we introduce a container detection tool that will give the research community an opportunity to investigate malware analysis through containers in more details.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Proactive, Cost-aware, Optimized Data Replication Strategy in Geo-distributed Cloud Datastores 地理分布式云数据存储中的前瞻性、成本意识、优化的数据复制策略
T. Hsu, A. Kshemkalyani
{"title":"A Proactive, Cost-aware, Optimized Data Replication Strategy in Geo-distributed Cloud Datastores","authors":"T. Hsu, A. Kshemkalyani","doi":"10.1145/3344341.3368799","DOIUrl":"https://doi.org/10.1145/3344341.3368799","url":null,"abstract":"Geo-replicated cloud datastores adopt the replication methodology by placing multiple data replicas at suitable storage zones. This can provide reliable services to customers with high availability, low access latency, low system cost, and decreased bandwidth consumption. However, this has the potential to increase the whole system overheads of maintaining more resource replicas, and to also degrade the system utilization due to unnecessary storage space cost. Thus, it is important to determine the suitable replication zones on-the-fly to increase the availability of data resources and maximize the system utilization. Specifically, it is essential to determine the appropriate number of replicas for different data resources at each zone in a particular time interval. We propose Cost Optimization Replica Placement (CORP) algorithms to enable state-of-art proactive provisioning replication of data resources based on an one-step look-ahead workload behavior pattern forecast over the distributed data storage infrastructure using statistical techniques. The experimental results show the cost effectiveness of the proposed replication strategies.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Systematic Mapping Study on Engineering Function-as-a-Service Platforms and Tools 工程功能即服务平台与工具的系统映射研究
Vladimir Yussupov, Uwe Breitenbücher, F. Leymann, Michael Wurster
{"title":"A Systematic Mapping Study on Engineering Function-as-a-Service Platforms and Tools","authors":"Vladimir Yussupov, Uwe Breitenbücher, F. Leymann, Michael Wurster","doi":"10.1145/3344341.3368803","DOIUrl":"https://doi.org/10.1145/3344341.3368803","url":null,"abstract":"Function-as-a-Service (FaaS) is a novel cloud service model allowing to develop fine-grained, provider-managed cloud applications. In this work, we investigate which challenges motivate researchers to introduce or enhance FaaS platforms and tools. We use a systematic mapping study method to collect and analyze the relevant scientific literature, which helps us answering the three clearly-defined research questions. We design our study using well-established guidelines and systematically apply it to 62 selected publications. The collected and synthesized data provides useful insights into the main challenges that motivate researchers to work on this topic and can be helpful in identifying research gaps for future research.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126825375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
LESS
L. Liu, Jun Xu, Mohit Singh
{"title":"LESS","authors":"L. Liu, Jun Xu, Mohit Singh","doi":"10.1145/3344341.3368807","DOIUrl":"https://doi.org/10.1145/3344341.3368807","url":null,"abstract":"Since about 1950 the inflow of the San Joaquin River to the Delta has been, and still is being greatly reduced. There are long periods when there is no net outflow from the river to the Central -Delta (WRINT-SDWA 19). This causes stagnant water reaches with loss of salinity control and inadequate dissolved oxygen for fish. Upstream appropriative rights granted by the State Board often exceed the total yield of the river system, and direct diversion rights are based on diversion amounts rather than on consumptive use. Appropriators, therefore, are able to keep increasing their consumptive use of the water they divert with a consequent reduction in return flows. Exports from the Tuolumne River to the Bay Area bypass the stream system and have increased about five fold over the last forty years. SDWA 121 shows the effects of some of these diversions on the Delta in a dry year such as 1977. Appropriators on the tributaries with junior water rights have not been required to bypass sufficient unimpaired flows to protect senior water rights and natural channel depletions in the San Joaquin River and southern Delta. The net effect of CVP operations alone is to reduce river flow upstream of Vernalis by about 130,000 acre feet in dry years and 560,000 acre feet in below normal years. This is discussed in the June 1980 joint report by USBR and SDWA on \"The Effects of the CVP Upon The Southern Delta Water Supply\". That report was submitted in Phase I of the Delta Hearings as SDWA 4 and a graph depicting those effects is at SDWA 26.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122756753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Microservices-based IoT Application Placement within Heterogeneous and Resource Constrained Fog Computing Environments 基于微服务的物联网应用在异构和资源约束雾计算环境中的放置
Samodha Pallewatta, V. Kostakos, R. Buyya
{"title":"Microservices-based IoT Application Placement within Heterogeneous and Resource Constrained Fog Computing Environments","authors":"Samodha Pallewatta, V. Kostakos, R. Buyya","doi":"10.1145/3344341.3368800","DOIUrl":"https://doi.org/10.1145/3344341.3368800","url":null,"abstract":"Fog computing paradigm has created innovation opportunities within Internet of Things (IoT) domain by extending cloud services to the edge of the network. Due to the distributed, heterogeneous and resource constrained nature of the Fog computing nodes, Fog applications need to be developed as a collection of interdependent, lightweight modules. Since this concept aligns with the goals of microservices architecture, efficient placement of microservices-based IoT applications within Fog environments has the potential to fully leverage capabilities of Fog devices. In this paper, we propose a decentralized microservices-based IoT application placement policy for heterogeneous and resource constrained Fog environments. The proposed policy utilizes the independently deployable and scalable nature of microservices to place them as close as possible to the data source to minimize latency and network usage. Moreover, it aims to handle service discovery and load balancing related challenges of the microservices architecture. We implement and evaluate our policy using iFogSim simulated Fog environment. Results of the simulations show around 85% improvement in latency and network usage for the proposed microservice placement policy when compared with Cloud-only placement approach and around 40% improvement over an alternative Fog application placement method known as Edge-ward placement policy. Moreover, the decentralized placement approach proposed in this paper demonstrates significant reduction in microservice placement delay over centralized placement.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134026547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Modelling and Prediction of Resource Utilization of Hadoop Clusters: A Machine Learning Approach Hadoop集群资源利用建模与预测:一种机器学习方法
H. Tariq, Harith Al-Sahaf, I. Welch
{"title":"Modelling and Prediction of Resource Utilization of Hadoop Clusters: A Machine Learning Approach","authors":"H. Tariq, Harith Al-Sahaf, I. Welch","doi":"10.1145/3344341.3368821","DOIUrl":"https://doi.org/10.1145/3344341.3368821","url":null,"abstract":"Hadoop is a distributed computing framework that has a large number of configurable parameters. These parameters have impact on system resources and execution time. Optimizing the performance of a Hadoop cluster by tuning such a large number of parameters is a tedious task. Most current big data modeling approaches does not include complex interaction between configuration parameters and the cluster environment changes such as different datasets or query. This makes it difficult to predict the performance or resource utilization of a cluster when we use real-world datasets because of their size and content. This paper presents the modeling of resource utilization of Hadoop cluster on the basis of Hadoop configuration parameters and dataset structure. Our approach builds a machine learning based-model using Hive-based Hadoop query and then predict the outcome for a particular parameter setting and query type. We used decision trees to build models for each of our performance metric measures. Decision rules were extracted from these tree-based models and evaluated for their ability to generalize to unseen data. Our experiments predicted that the percentage of columns selected, mappers and replica has a statistically significant impact over the utilization of different resources in Hadoop cluster.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SLO-ML: A Language for Service Level Objective Modelling in Multi-cloud Applications l - ml:多云应用中服务水平目标建模语言
Abdessalam Elhabbash, Assylbek Jumagaliyev, G. Blair, Yehia El-khatib
{"title":"SLO-ML: A Language for Service Level Objective Modelling in Multi-cloud Applications","authors":"Abdessalam Elhabbash, Assylbek Jumagaliyev, G. Blair, Yehia El-khatib","doi":"10.1145/3344341.3368805","DOIUrl":"https://doi.org/10.1145/3344341.3368805","url":null,"abstract":"Cloud modelling languages (CMLs) are designed to assist customers in tackling the diversity of services in the current cloud market. While many CMLs have been proposed in the literature, they lack practical support for automating the selection of services based on the specific service level objectives of a customer's application. We put forward SLO-ML, a novel and generative CML to capture service level requirements. Subsequently, SLO-ML selects the services to honour the customer's requirements and generates the deployment code appropriate to these services. We present the architectural design of SLO-ML and the associated broker that realises the deployment operations. We evaluate SLO-ML using an experimental case study with a group of researchers and developers using a real-world cloud application. We also assess SLO-ML's overheads through empirical scalability tests. We express the promises of SLO-ML in terms of gained productivity and experienced usability, and we highlight its limitations by analysing it as application requirements grow.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信