Anna Giannakou, Louis Rilling, C. Morin, Jean-Louis Pazat
{"title":"Automatic Reconfiguration of NIDSs in IaaS Clouds with SAIDS","authors":"Anna Giannakou, Louis Rilling, C. Morin, Jean-Louis Pazat","doi":"10.1109/CloudCom2018.2018.00031","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00031","url":null,"abstract":"Infrastructure as a Service (IaaS) clouds are very dynamic with at runtime frequent changes at different levels of the virtual infrastructure. For cloud tenants, this affects the ability of a security monitoring framework to successfully detect attacks. In this paper, we propose SAIDS, a self-adaptable intrusion detection system for IaaS clouds that is able to adapt its components based on dynamic events that occur in a cloud infrastructure. We implemented and experimentally evaluated SAIDS, and show that it is a scalable solution that successfully detects attacks even during the adaptation process while imposing negligible overhead to cloud operations and tenant applications.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132715765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards High-Level Software Approaches to Reduce Virtualization Overhead for Parallel Applications","authors":"Stijn Schildermans, Kris Aerts","doi":"10.1109/CloudCom2018.2018.00046","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00046","url":null,"abstract":"Due to its numerous advantages, the IT industry is moving more and more towards the cloud for hosting applications. Reducing the virtualization overhead inherent to cloud computing has therefore been a topic of much research and innovation, resulting in a drastic reduction of this overhead for most workloads. For specific tasks however, challenges remain. One example is parallel, CPU-intensive workloads. Studies concerning this specific workload exist, but focus on low-level properties of the virtualization process, which are often out of reach of the application programmer in commercial cloud environments. Therefore, we aim to approach virtualization overhead from an application architecture and implementation perspective, and provide guidelines for application programmers to develop their software in such a way that they avoid virtualization overhead without the need for access to the hypervisor or specific hardware. As a first step towards this goal, this paper offers a proof of concept applied to the dedup benchmark from the PARSEC benchmark suite, which is notorious for its high virtualization overhead. We provide an alternative implementation of this benchmark, which suffers negligible virtualization overhead compared to the original, thus increasing performance by up to 45%.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Dynamic Multi-task Schedulling of OpenCL Programs on Emerging CPU-GPU-FPGA Heterogeneous Platforms: A Fuzzy Logic Approach","authors":"Ahmad Al-Zoubi, K. Tatas, C. Kyriacou","doi":"10.1109/CloudCom2018.2018.00055","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00055","url":null,"abstract":"Heterogeneous systems featuring multiple kinds of processors are becoming increasingly attractive due to their high performance and energy saving over the homogeneous systems. With the OpenCL as a unified programming language providing programs portability, and the recent advances in transistor technology allowing multi-core CPUs, GPUs and FPGA to be on the same chip, finding the best task-to-device mapping will be the key to gain such high performance and leverage their use from application dedicated devices to platforms for concurrent user applications. This work proposes an energy-efficient scheduling scheme to schedule concurrent OpenCl tasks targeting CPU+GPU+FPGA heterogeneous systems by setting the best kernel-device pair at run-time. The scheme is expected to provide the best mapping in terms of throughput and energy consumption under the constraints of hardware resources, concurrent execution and contention scenarios.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Resilient Agent-Based Architecture for Efficient Usage of Transient Servers in Cloud Computing","authors":"J. P. A. Neto, D. Pianto, C. Ralha","doi":"10.1109/CloudCom2018.2018.00050","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00050","url":null,"abstract":"Unused resources are being exploited by cloud computing providers, which are offering transient servers without availability guarantees. Spot instances are transient servers offered by Amazon AWS, with rules that define prices according to supply and demand. These instances will run for as long as the current price is lower than the maximum bid price given by users. Spot instances have been increasingly used for executing computation and memory intensive applications. By using dynamic fault tolerant mechanisms and appropriate strategies, users can effectively use spot instances to run applications at a cheaper price. This paper presents a resilient agent-based cloud computing architecture. For an efficient usage of transient servers, the architecture combines machine learning and a statistical model to predict instance survival times, refine fault tolerance parameters and reduce total execution time. We evaluate our strategies and the experiments demonstrate high levels of accuracy, reaching a 94% survival prediction success rate, which indicates that the model can be effectively used to define execution strategies to prevent failures at revocation events under realistic working conditions.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validating Data Integrity with Blockchain","authors":"Rosco Kalis, A. Belloum","doi":"10.1109/CloudCom2018.2018.00060","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00060","url":null,"abstract":"Data manipulation is often named as a serious threat to data integrity. Data can be tampered with, and malicious actors could use this to their advantage. Data users in various application domains want to be ensured that the data they are consuming are accurate and have not been tampered with. To validate the integrity of these data, we describe a blockchain-based hash validation method. The method assumes that the actual data is stored separately from the blockchain, and then allows a data identifier and a hash of these data to be submitted to the blockchain. The actual data can be validated against the hash on the blockchain at any time. Several use cases are described for blockchain-based hash validation, and to validate the method it is implemented inside an application audit trail to validate the audit trail data. This implementation shows that blockchain-based hash validation is able to detect malicious and accidental changes that were made to the data.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127543171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Proposals for Enabling Dynamic Heterogeneous Execution of Big Data Frameworks","authors":"Maria Xekalaki, J. Fumero, Christos Kotselidis","doi":"10.1109/CloudCom2018.2018.00070","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00070","url":null,"abstract":"The efficient execution of Big Data applications requires a large quantity of compute and memory resources. Typically, these resources are in the form of data centres with numerous processing elements connected through a computer network. Although initially the majority of data centers were utilizing only CPU resources, nowadays we can find heterogeneous accelerators such as GPUs and FPGAs. Ideally, Big Data frameworks and applications should exploit those diverse hardware resources in order to push their performance boundaries or increase resource utilization. Despite ongoing work to enable such functionality, the majority of the solutions revolve around external libraries that provide pre-compiled kernels for heterogeneous accelerators. This fact imposes programmability and code fragmentation challenges that can only be addressed by enabling Big Data platforms to dynamically compile and execute their code on such devices. In this paper we analyze and discuss the major challenges for programming and executing Big Data processing applications on distributed systems with heterogeneous hardware. In addition, we present our work-in-progress towards providing a heterogeneous programming framework for running Big Data applications on systems that include diverse hardware resources including CPUs, GPUs, and FPGAs. In contrast to existing approaches, our envisioned solution employs JIT compilation and runtime support, integrated in the data flow engine, enabling the automatic acceleration of Big Data platforms completely transparently to the user and without sacrificing programmability.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121410532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offloading Execution from Edge to Cloud: A Dynamic Node-RED Based Approach","authors":"Román Sosa, C. Király, J. Rodriguez","doi":"10.1109/CloudCom2018.2018.00039","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00039","url":null,"abstract":"Fog computing enables use cases where data produced in end devices are stored, processed, and acted on directly at the edges of the network, yet computation can be offloaded to more powerful instances through the edge to cloud continuum. Such offloading mechanism is especially needed in case of modern multi-purpose IoT gateways, where both demand and operation conditions can vary largely between deployments. To facilitate the development and operations of gateways, we implement offloading directly as part of the IoT rapid prototyping process embedded in the software stack, based on Node-RED. We evaluate the implemented method using an image processing example, and compare various offloading strategies based on resource consumption and other system metrics, highlighting the differences in handling demand and service levels reached.","PeriodicalId":365939,"journal":{"name":"2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}