{"title":"Load Balancer as a Service in Cloud Computing","authors":"Mazedur Rahman, S. Iqbal, J. Gao","doi":"10.1109/SOSE.2014.31","DOIUrl":"https://doi.org/10.1109/SOSE.2014.31","url":null,"abstract":"The explosive growth of cloud computing in recent years has led to a massive increase in both the amount of traffic and the number of service requests to cloud servers. This growth trend of load poses serious challenges to the cloud load balancer in efficient balancing of the load, already a daunting job. The cloud load balancing is a highly researched field where numerous solutions to balance load have been proposed. Unfortunately, no research papers provided a comprehensive review focusing Load Balancer as a Service (LBaaS) model. In this paper, we first understand the concepts of load balancing, its importance and desired characteristics in cloud. Then we provide complete review on the existing load balancing strategies, their strength, shortcomings and a comparative study. Finally, we presented load balancer as a service model adopted by the major market players, and our observation, future needs and challenges.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaos and Fractal for Creative Computing","authors":"Runjie Liu, Hongji Yang","doi":"10.1109/SOSE.2014.83","DOIUrl":"https://doi.org/10.1109/SOSE.2014.83","url":null,"abstract":"Creative Computing is about using computers in ways that nobody has ever thought of before. It is desirable that Creative Computing can be done by computing itself. This means that on one hand certain rules need to be used but on the other hand novel methods and/or results should be produced. It is observed that Chaos and Fractals, two mathematical entities, may supply properties that were needed for Creative Computing. This article reports initial studies on Chaos and Fractals from the angle of Creative Computing: properties of Chaos and Fractals, how to link these with Creative Computing and how to possibly construct a tool, and examples of from a creative computing tool.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines","authors":"Ziyang Li, Zhaoning Zhang, Huiba Li, Yuxing Peng","doi":"10.1109/SOSE.2014.42","DOIUrl":"https://doi.org/10.1109/SOSE.2014.42","url":null,"abstract":"By analyzing the problems and challenges of virtual machine image store system in cloud computing environment, we present a cooperative persistent cache (CoCache) for virtual disks. CoCache takes advantage of the service ability of the cached nodes by providing virtual image data service for other nodes. CoCache can transfer data between nodes in a P2P pattern, for extending data service ability of the system. CoCache is realized in the kernel space of Linux, can support any kind of VMM. Experiments show that CoCache can effectively reduce the cost during virtual machines read data, and promote the service ability of virtual machine storage system. Layer-aware cache policy is proposed specially for improving cache hit rate in the multi-layer and multipath environment.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hussain Aljahdali, Abdulaziz Albatli, P. Garraghan, P. Townend, L. Lau, Jie Xu
{"title":"Multi-tenancy in Cloud Computing","authors":"Hussain Aljahdali, Abdulaziz Albatli, P. Garraghan, P. Townend, L. Lau, Jie Xu","doi":"10.1109/SOSE.2014.50","DOIUrl":"https://doi.org/10.1109/SOSE.2014.50","url":null,"abstract":"As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. Such understanding is needed in order to recognize attack vectors and attack surfaces. In this paper we will propose an attack model based on a threat model designed to take advantage of Multi-Tenancy situation only. Before that, a clear understanding of Multi-Tenancy, its origin and its benefits will be demonstrated. Also, a novel way on how to approach Multi-Tenancy will be illustrated. Finally, we will try to sense any suspicious behavior that may indicate to a possible attack where we will try to recognize the proposed attack model empirically from Google trace logs. Google trace logs are a 29-day worth of data released by Google. The data set was utilized in reliability and power consumption studies, but not been utilized in any security study to the extent of our knowledge.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test as a Service: A Framework for Web Security TaaS Service in Cloud Environment","authors":"Yuan-Hsin Tung, Chen-Chiu Lin, Hwai-Ling Shan","doi":"10.1109/SOSE.2014.36","DOIUrl":"https://doi.org/10.1109/SOSE.2014.36","url":null,"abstract":"As its name suggests, cloud testing is a form of software testing which uses cloud infrastructure. Its effective unlimited storage, quick availability of the infrastructure with scalability, flexibility and availability of distributed testing environment translate to reducing the execution time of testing of large applications and hence lead to cost-effective solutions. In cloud testing, Testing-as-a-Service (TaaS) is a new model to effectively provide testing capabilities and on-demand testing to end users. There are many studies and solutions to support TaaS service. And security testing is the most suitable form for TaaS service. To leverage the features of TaaS, we propose a framework of TaaS for security testing. We implement the prototype system, Security TaaS (abbrev. S-TaaS) based on our proposed framework. The experiments are conducted to evaluate the performance of our framework and prototype system. The experiment results indicate that our prototype system can provide quality and stable service.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Community Evolution Using Mediation System in SOA","authors":"J. Itani, E. Gouardères, P. Aniorté","doi":"10.1109/SOSE.2014.72","DOIUrl":"https://doi.org/10.1109/SOSE.2014.72","url":null,"abstract":"During the last couple of years, virtual communities (VCs) have gained worldwide popularity and conquer different domains, from business to medicine to aviation to education to entertainment to technology. Service Oriented Architecture (SOA) proves to be a major catalyzer in the creation of software applications due to its rapid development, distributed feature and dynamic adaptability. Mediation systems (MS) on the other hand played a critical role in Service Oriented Computing (SOC) to promote loose coupling between service providers and consumers. Dynamic evolution, monitoring and management of services are critical factors that affect the lifespan of VCs. Moreover, providing the right service to the right user on the right time is an ultimate objective for VCs to achieve. We propose a new model that will serve virtual communities regardless of their types or objectives. The model is built on top of SOA and empowered with MS.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Security Patterns for Modelling Security Capabilities in Grid Systems","authors":"B. Aziz, C. Blackwell","doi":"10.1109/SOSE.2014.60","DOIUrl":"https://doi.org/10.1109/SOSE.2014.60","url":null,"abstract":"We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure setting-up and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Pattern Evaluation","authors":"I. Duncan, Jan de Muijnck-Hughes","doi":"10.1109/SOSE.2014.61","DOIUrl":"https://doi.org/10.1109/SOSE.2014.61","url":null,"abstract":"Current Security Pattern evaluation techniques are demonstrated to be incomplete with respect to quantitative measurement and comparison. A proposal for a dynamic testbed system is presented as a potential mechanism for evaluating patterns within a constrained environment.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS-Aware Load Balancing Policy in Multi-tenancy Environment","authors":"Hailong Sun, Tao Zhao, Yu Tang, Xudong Liu","doi":"10.1109/SOSE.2014.21","DOIUrl":"https://doi.org/10.1109/SOSE.2014.21","url":null,"abstract":"Cloud computing aims at providing services on the basis of a shared pool of underpinning resources and load balancing is of paramount importance in such an environment. At the same time, multi-tenancy is widely adopted in cloud computing to reduce the costs of service provisioning and to improve resource utilization. Multi-tenancy brings new challenges to load balancing, since it incurs resource competition and different QoS requirements of hosted applications. Therefore, servers with multiple deployed applications need a proper request scheduling policy to guarantee their quality of service, e.g., response time. However, most of the QoS-aware load balancing algorithms do not concern about the mutual intervention among applications deployed on the same server. When under heavy loads, mean response time of some applications may become too high to be acceptable. In this work, we propose a new load balancing algorithm, \"Server Throughput Restriction(STR)\", based on M/G/s/s+r queueing model, in order to guarantee each application's mean response time and also achieve better server throughput. In addition, we conduct several experiments to analyze the performance of STR in comparison with Round-Robin and Least-Work-Remaining.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Discovery in 6LoWPANs: Classification and Challenges","authors":"Badis Djamaa, M. Richardson, N. Aouf, Bob Walters","doi":"10.1109/SOSE.2014.67","DOIUrl":"https://doi.org/10.1109/SOSE.2014.67","url":null,"abstract":"Seamless integration of heterogeneous constrained networks in the internet of things is still a challenging issue. However, with recent advances in smart objects networking, the IP architecture through 6LoWPAN is made possible and hence service oriented architecture is emerging as a promising solution. The key element to succeed any service oriented system is efficient service discovery. In this paper, we classify emerging 6LoWPANs' service discovery protocols, identify the gap in the 6LoWPAN service discovery literature and then briefly describe our solution aiming to fill this gap.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129432783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}