2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)最新文献

筛选
英文 中文
Cloud Supervised Device Health Management 云监督设备运行状况管理
Ashwin Vijayendra, Shivank Nayak
{"title":"Cloud Supervised Device Health Management","authors":"Ashwin Vijayendra, Shivank Nayak","doi":"10.1109/CCEM.2015.33","DOIUrl":"https://doi.org/10.1109/CCEM.2015.33","url":null,"abstract":"Every electronic device works best under a well know configuration. Changes to these configuration may hamper the device's health, performance and may also cause blip in the hardware. Having the device(s) connected to cloud can ease the maintenance, there by cloud based servers can supervise device(s)' health on periodic basis and suggest the suitable configuration adjustments to avoid any adversity in the future.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121110812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Routing Scheme for Heterogeneous Data-Flows Using Openflow 基于Openflow的异构数据流自适应路由方案
P. Goel, Lakshminarayan Srinivasan, Vasudeva Varma
{"title":"An Adaptive Routing Scheme for Heterogeneous Data-Flows Using Openflow","authors":"P. Goel, Lakshminarayan Srinivasan, Vasudeva Varma","doi":"10.1109/CCEM.2015.23","DOIUrl":"https://doi.org/10.1109/CCEM.2015.23","url":null,"abstract":"In this paper, we propose an open flow controller that takes into account different application's needs such as latency, bandwidth, reliability, network jitter, etc and optimizes the flow on a combination of such factors. It is a dynamic system that constantly keeps track of these parameters and adapts to changes happening in the network and pushes updated rules on the fly to the switches. Such a system can efficiently route traffic in data-center by routing packets from different applications in separate routes as per requirement, thereby utilizing the resources more judiciously. We built a prototype controller using POX and studied its routing characteristics extensively. We used network-bandwidth, latency and reliability as the parameters to test the system and simulated the network using mininet and found that the system was able to balance these three parameters for different loads according to the requirements.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PriDynSim a Simulator for Dynamic Priority Based I/O Scheduling for Cloud Applications PriDynSim是一个基于云应用程序动态优先级的I/O调度模拟器
Nitisha Jain, N. Grozev, J. Lakshmi, R. Buyya
{"title":"PriDynSim a Simulator for Dynamic Priority Based I/O Scheduling for Cloud Applications","authors":"Nitisha Jain, N. Grozev, J. Lakshmi, R. Buyya","doi":"10.1109/CCEM.2015.17","DOIUrl":"https://doi.org/10.1109/CCEM.2015.17","url":null,"abstract":"Cloud computing facilitates flexible on-demand provisioning of IT resources over the Internet. It has proven to be very advantageous for a wide range of industries in the emerging markets by allowing them to match the infrastructure capabilities of their already established competitors. However, Cloud computing also poses several unique challenges in terms of resource allocation and scheduling. In particular, I/O bound applications have been mostly neglected in the research efforts in the area. Simulation tools play a key role in the evaluation of new resource management policies by providing an affordable and replicable testing environment. In this paper, we propose a novel simulation framework PriDynSim for priority based I/O policies, which manage the available resources to ensure adequate performance in the presence of deadline constraints. In a case study, we demonstrate how PriDynSim can be used to evaluate a resource management policy, which guarantees Quality of Service (QoS) for I/O bound applications running in a typical Cloud environment.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Benchmarking Bare Metal Cloud Servers for HPC Applications 为HPC应用程序测试裸机云服务器
P. Rad, Anthony T. Chronopoulos, P. Lama, P. Madduri, C. Loader
{"title":"Benchmarking Bare Metal Cloud Servers for HPC Applications","authors":"P. Rad, Anthony T. Chronopoulos, P. Lama, P. Madduri, C. Loader","doi":"10.1109/CCEM.2015.13","DOIUrl":"https://doi.org/10.1109/CCEM.2015.13","url":null,"abstract":"Cloud Computing is an ever-growing paradigm shift in computing allowing user's commodity access to compute and storage services. As such cloud computing is an emerging promising approach for High Performance Computing (HPC) application development. Automation of resource provision offered by Cloud computing facilitates the eScience programmer usage of computing and storage resources. Currently, there are many commercial services for compute, storage, network and many others from big name companies. However, these services typically do not have performance guarantees associated with them. This results in unexpected performance degradation of user's applications that can be somewhat random to the user. In order to overcome this, a user must be well versed in the tools and technologies that drive Cloud Computing. One of the state of the art cloud systems, is a cloud system that provides bare metal server instances on demand. Unlike traditional cloud servers, bare metal cloud servers are free from virtualization overheads, and thus promise to be more suitable for HPC applications. In this paper, we present our study on the performance and scalability of Open stack based bare metal cloud servers, using a popular HPC benchmark suite. Our experiments conducted at UTSA Open Cloud Institute's cloud system with 200 cores demonstrate excellent scaling performance of bare metal cloud servers.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Experimental Evaluation of Network Telemetry Anonymization for Cloud Based Security Analysis 基于云安全分析的网络遥测匿名化实验评估
Sashank Dara, Bhanu Prakash Gopularam, V. Muralidhara, N. Nalini
{"title":"Experimental Evaluation of Network Telemetry Anonymization for Cloud Based Security Analysis","authors":"Sashank Dara, Bhanu Prakash Gopularam, V. Muralidhara, N. Nalini","doi":"10.1109/CCEM.2015.10","DOIUrl":"https://doi.org/10.1109/CCEM.2015.10","url":null,"abstract":"Network telemetry data is considered a gold mine for researchers for performing traffic analysis, QoS, security forensics, malware spread etc. Cloud Consumers could benefit from variety of Cloud based security services if such telemetry data is made available. But there is a compelling need for ensuring privacy of sensitive fields before data is shared with any Cloud provider. In this paper we provide thorough experimental evaluation of data anonymization techniques. We explore the viability of onion layered encryption techniques for practical security forensics on anonymized data. We provide results of such experiments and our analysis of the same. Our major observation is that onion layered techniques do not scale for more advanced analytic use cases.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SMAC: Scalable Access Control in IoT SMAC:物联网中的可扩展访问控制
A. Saxena, Pradeepkumar Duraisamy, Vikrant S. Kaulgud
{"title":"SMAC: Scalable Access Control in IoT","authors":"A. Saxena, Pradeepkumar Duraisamy, Vikrant S. Kaulgud","doi":"10.1109/CCEM.2015.22","DOIUrl":"https://doi.org/10.1109/CCEM.2015.22","url":null,"abstract":"We describe a messaging service called Simple Messaging and Access Control (SMAC), which has inbuilt access control features. SMAC extends previous works on capability-based-messaging and applies access policies at the communication layer, thereby eliminating the need for any additional access control at the endpoints. Furthermore, policy administration (revocation, delegation, etc) can be done in a decentralized manner by third parties. Additionally, SMAC prevents unauthorized communication, saving overall bandwidth. Finally, in SMAC, public keys can map to communication channels without any prior setup. This can assist in device discovery and system bootstrap. All these features make SMAC suitable for deploying large-scale IoT systems.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129588835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Compact Workflow Model for Cloud Computing 面向云计算的紧凑工作流模型
C. Rajeshwari, K. Srinivasa
{"title":"A Compact Workflow Model for Cloud Computing","authors":"C. Rajeshwari, K. Srinivasa","doi":"10.1109/CCEM.2015.32","DOIUrl":"https://doi.org/10.1109/CCEM.2015.32","url":null,"abstract":"Scheduling tasks in the cloud computing environment, particularly for data intensive applications is of great importance and interest. In this paper, we propose a new workflow model presented in a rigorous graph-theoretic setting. In this new model, we would like to incorporate possible similarities between requisite files which are needed to complete the given set of tasks. We show that it is NP-Complete to compute the make span in this model even with oracle access to the cost of retrieving a file.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124638944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High Availability Cluster Failover Mechanism Using Artificial Neural Networks 基于人工神经网络的高可用性集群故障转移机制
Venkateswar R. Yerravalli, Aditya Tharigonda
{"title":"High Availability Cluster Failover Mechanism Using Artificial Neural Networks","authors":"Venkateswar R. Yerravalli, Aditya Tharigonda","doi":"10.1109/CCEM.2015.28","DOIUrl":"https://doi.org/10.1109/CCEM.2015.28","url":null,"abstract":"Cloud computing is popular for its utility based computing model for business. As we consume compute as a utility, There comes a question about Availability and reliability of the service. Business requires high available computation/application infrastructure which provides nearly continuous application availability. Many High Availability applications in market are configured into a cluster, which typically involves at least two systems or more. The cluster monitors the critical resources for changes that may indicate a failure and trigger fall over operation to one of the cluster system based on policies (explained in detail in further sections). When a high available cluster is deployed having large number of systems as a part of cluster, it becomes cumbersome for a cluster to monitor the health and to detect the best available node for the resource to fall over. In Cloud environment where cluster systems can be used for other applications during idle time, these policies may not serve the purpose for fall over as the required CPU/memory/network for the highly available application may fall short because of the applications already running on the fall over node. So in this paper we present the way to detect the best system on which application has to fall over using artificial neural networks. Based on the parameters such as available CPU, Memory, Network load. Artificial neural network monitors the nodes and chooses the best node on which application to fallover.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信