2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)最新文献

筛选
英文 中文
Performance Prediction of NUMA Placement: A Machine-Learning Approach NUMA放置的性能预测:一种机器学习方法
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00064
Fanourios Arapidis, Vasileios Karakostas, Nikela Papadopoulou, K. Nikas, G. Goumas, N. Koziris
{"title":"Performance Prediction of NUMA Placement: A Machine-Learning Approach","authors":"Fanourios Arapidis, Vasileios Karakostas, Nikela Papadopoulou, K. Nikas, G. Goumas, N. Koziris","doi":"10.1109/CloudCom2018.2018.00064","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00064","url":null,"abstract":"In this paper we present a machine-learning approach to predict the impact on performance of core and memory placement in non-uniform memory access (NUMA) systems. The impact on performance depends on the architecture and the application's characteristics. We focus our study on features that can be easily extracted with hardware performance counters that are found in commodity off-the-self systems. We run various single-threaded benchmarks from Spec2006 and Parsec under different placement scenarios, and we use this benchmarking data to train multiple regression models that could serve as performance predictors. Our experimental results show notable accuracy in predicting the impact on performance with relatively simple prediction models.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125091548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PerSoNet: Software-Defined Overlay Virtual Networks Spanning Personal Devices Across Social Network Users PerSoNet:跨社交网络用户的跨个人设备的软件定义覆盖虚拟网络
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00043
Saumitra Aditya, Kensworth C. Subratie, R. Figueiredo
{"title":"PerSoNet: Software-Defined Overlay Virtual Networks Spanning Personal Devices Across Social Network Users","authors":"Saumitra Aditya, Kensworth C. Subratie, R. Figueiredo","doi":"10.1109/CloudCom2018.2018.00043","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00043","url":null,"abstract":"New techniques are actively being researched to enable processing of information at the network's edge, closer to where data is generated. A nascent application enabled by such fog/edge computing model is that of community-based collaboration, where members pool personal resources together to accomplish a task, and data moves across edge resources. In such an environment, nodes that produce, store, and process data are often ephemeral, owned by different individuals, and distributed across multiple local networks. This poses new challenges at the network layer: how to automatically configure a network connecting distributed personal devices of social peers end-to-end, while enforcing privacy in communication among edge devices? We present PerSoNet, a novel virtual private network (VPN) that 1) automatically creates and manages private, authenticated overlay links across personal devices of social network peers, and 2) automatically manages software-defined networking (SDN) rules in software switches for packet forwarding, name resolution and mapping (for IP addresses and DNS names), and device network access control. PerSoNet abstracts away complexities, self-organizing a VPN that exposes IP/Ethernet network semantics, thereby enabling existing applications and middleware to be used in community-based fog/edge systems. In this work we describe the PerSoNet design and a prototype implementation based on SDN/OpenFlow and an open-source overlay. A prototype smart-task overlay application has also been built on top of PerSoNet to demonstrate its applicability and to evaluate key performance metrics of the system.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132834788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XeniumNFV: A Unified, Dynamic, Distributed and Event-Driven SDN/NFV Testbed XeniumNFV:一个统一、动态、分布式和事件驱动的SDN/NFV测试平台
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00068
A. Kusedghi, A.H. Ghorab, A. Akbari
{"title":"XeniumNFV: A Unified, Dynamic, Distributed and Event-Driven SDN/NFV Testbed","authors":"A. Kusedghi, A.H. Ghorab, A. Akbari","doi":"10.1109/CloudCom2018.2018.00068","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00068","url":null,"abstract":"The advent of Network Function Virtualization has changed the way of service provisioning in Telco networks. The ongoing evolutions in NFV can leverage network management facilities offered by Software-Defined Networks but there is not a complete environment for researchers at academia and industry to test and deploy their solutions. In this paper we present XNFV, an open-source emulator for SDN/NFV environment which can be used to design and deploy scalable scenarios on distributed infrastructure. The deployed scenarios in XNFV can be changed dynamically at the run-time without network connectivity interference. To the best of our knowledge, XNFV is the first Event-Driven SDN/NFV testbed that can be used to design complex events and program reaction chains through its user-friendly Web-GUI. We provide a Proof of Capability for XNFV through a case study scenario.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115193931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CloudMiner: A Systematic Failure Diagnosis Framework in Enterprise Cloud Environments CloudMiner:企业云环境中的系统故障诊断框架
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00028
Ibrahim El-Shekeil, Amitangshu Pal, K. Kant
{"title":"CloudMiner: A Systematic Failure Diagnosis Framework in Enterprise Cloud Environments","authors":"Ibrahim El-Shekeil, Amitangshu Pal, K. Kant","doi":"10.1109/CloudCom2018.2018.00028","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00028","url":null,"abstract":"Applications and network services in enterprise cloud environments have direct and indirect dependencies. The configuration of these services varies based on business needs. However, accurate and complete documentation of the configuration may not exist at all times. Thus, failure diagnosis becomes further complex with such unknown/uncertain dependencies. To cope with this, some probing stations need to be installed in suitable locations in the network to provide full monitoring and diagnosing capability. In this paper we develop a novel CloudMiner architecture for failure diagnosis in enterprise clouds that consist of developing intelligent probing station selection, failure detection and diagnosis across the network components using the minimum set of network probes, considering the inter-dependencies across the network services/components. Extensive simulation results show that CloudMiner can always identify the faulty components among the list of a small set of suspected components, the size of which is as low as ~3 for a network with 460 components.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yodea: Workload Pattern Assessment Tool for Cloud Migration Yodea:云迁移的工作负载模式评估工具
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00019
Rukma Talwadker, Cijo George
{"title":"Yodea: Workload Pattern Assessment Tool for Cloud Migration","authors":"Rukma Talwadker, Cijo George","doi":"10.1109/CloudCom2018.2018.00019","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00019","url":null,"abstract":"As the news around cloud repatriations gets real, many cloud technologists associate them with poor understanding of the applications and their usage patterns by the enterprises. Our solution, Yodea, is a tool cum methodology to analyze work-load patterns in the light of cloud suitability. We bring forward compute patterns which can benefit from cloud economics with on-demand compute scaling. Yodea further ranks workloads in terms of their cloud suitability on the basis of these metrics. After the fact analysis of storage workloads for a customer install-base, features 38% of the \"already in cloud\" volumes in the top 100 ranked list by Yodea.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126865083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers 使用事件触发器增强虚拟机内省内存分析
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00036
M. Muscat, Mark Vella
{"title":"Enhancing Virtual Machine Introspection-Based Memory Analysis with Event Triggers","authors":"M. Muscat, Mark Vella","doi":"10.1109/CloudCom2018.2018.00036","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00036","url":null,"abstract":"Virtual Machine Introspection (VMI) has the potential to provide secure cloud monitoring, but its hardware level monitoring gives rise to the 'semantic gap', where software-level behaviour loses its meaning. Memory forensics tools can offer a deployment-ready solution as compared to automated semantics derivation techniques, in the form of an integrated VMI-memory forensics architecture. A pending issue concerns the appropriate points in time at which to execute memory analysis routines. Analysis is required to execute in a manner not to overwhelm virtual machines but neither to lose out on short-lived in-memory data structures. This paper presents an on-going study to address what we call the 'event semantic gap', or rather the lost semantics of software-level events associated with the monitored behaviour. As opposed to deriving these events directly from the hardware level, we argue that translating them at the software level to recognizable events at the hardware level is more pragmatic, thus providing a fully integrated VMI-memory forensics architecture. Dynamic binary instrumentation (DBI) is a key enabler and promising results are demonstrated for the Xen hypervisor.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128157803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FaultVisor2: Testing Hypervisor Device Drivers Against Real Hardware Failures FaultVisor2:针对实际硬件故障测试虚拟化环境设备驱动程序
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00048
Masanori Misono, Masahiro Ogino, Takaaki Fukai, Takahiro Shinagawa
{"title":"FaultVisor2: Testing Hypervisor Device Drivers Against Real Hardware Failures","authors":"Masanori Misono, Masahiro Ogino, Takaaki Fukai, Takahiro Shinagawa","doi":"10.1109/CloudCom2018.2018.00048","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00048","url":null,"abstract":"Hardware failures are inevitable, especially in cloud environments where there are many hardware devices. To improve the hypervisor's reliability, hypervisor device drivers must handle hardware failures appropriately. Our goal is to allow cloud vendors to test closed-source hypervisor device drivers against failures of their real hardware. Previous studies either require source code, can only test against virtual hardware, or cannot be applied to hypervisors. In this paper, we propose FaultVisor2, a hypervisor device driver testing framework that combines fault injection and nested virtualization. To test closed-source hypervisor device drivers, we inject pseudo faults to the I/O data returned from hardware to hypervisor device drivers. To test against real hardware, we allow the target hypervisors pass-through access to the physical hardware and manipulate I/O data of the target devices by intercepting I/O access. To apply to hypervisors, we exploit nested virtualization and run a small hypervisor underneath the target hypervisor to inject pseudo faults. We omit some nested virtualization functions, including nested paging virtualization, to achieve a close to real execution environment and reduce runtime overhead. In our experiment using the VMWare ESXi hypervisor, we found three types of errors which led to critical system failures.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building IoT Systems Using Distributed First-Class Reactive Programming 使用分布式一级响应式编程构建物联网系统
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00045
C. Troyer, Jens Nicolay, W. Meuter
{"title":"Building IoT Systems Using Distributed First-Class Reactive Programming","authors":"C. Troyer, Jens Nicolay, W. Meuter","doi":"10.1109/CloudCom2018.2018.00045","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00045","url":null,"abstract":"Contemporary IoT systems are challenging to develop, deploy, and maintain. This is because of their ever-increasing scale, dynamic network topologies, heterogeneity and resource constraints of the involved devices, and failures that may occur as a result of these characteristics. Existing approaches are either not at the right level of abstraction, require developers to learn specialized languages, or miss certain key features to address all these challenges in a uniform manner. In this paper we leverage reactive programming and code mobility to support the entire life-cycle of large-scale IoT systems. Our approach is based on existing programming technologies and offers simple and composable abstractions to developers. We implemented our approach in a middleware called Potato and used it to develop and deploy an IoT application on a Raspberry Pi cluster. We found that using Potato reduces much of the accidental complexity associated with developing and deploying IoT systems, resulting in clean and maintainable programs.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CORUS: Blockchain-Based Trustworthy Evaluation System for Efficacy of Healthcare Remedies CORUS:基于区块链的医疗补救措施疗效可信评估系统
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00044
Junseok Park, Seongkuk Park, Kwangmin Kim, Doheon Lee
{"title":"CORUS: Blockchain-Based Trustworthy Evaluation System for Efficacy of Healthcare Remedies","authors":"Junseok Park, Seongkuk Park, Kwangmin Kim, Doheon Lee","doi":"10.1109/CloudCom2018.2018.00044","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00044","url":null,"abstract":"We present a healthcare remedy evaluation system, called CORUS, using blockchain-based crowdsourcing on a cloud computing platform. Efficacy of healthcare remedies such as functional foods and dietary supplements usually spreads by subjective word of mouth. Though regular clinical trials could be employed, it requires significant cost in time and budget. We expect crowdsourcing can be an effective and efficient alternative to the costly clinical trials to achieve objective evaluation on healthcare remedies. The blockchain technology can alleviate the problem of information quality in most of crowdsourcing systems. Properly designed reward distribution schemes can motivate voluntary participants to provide with credible information. The distributed replication of blockchains can increase the information credibility by prohibiting malicious forgery. We also utilize the Amazon cloud system to enhance availability and scalability. To our knowledge, CORUS is the first system to utilize crowdsourcing, blockchains, and cloud computing for healthcare remedy evaluation. It is available at https://corus.kaist.edu.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Program and Technical Committee 程序和技术委员会
2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Pub Date : 2018-12-01 DOI: 10.1109/cloudcom2018.2018.00009
{"title":"Program and Technical Committee","authors":"","doi":"10.1109/cloudcom2018.2018.00009","DOIUrl":"https://doi.org/10.1109/cloudcom2018.2018.00009","url":null,"abstract":"","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信