G. Juve, E. Deelman, K. Vahi, Gaurang Mehta, G. Berriman, Benjamin P. Berman, P. Maechling
{"title":"Scientific workflow applications on Amazon EC2","authors":"G. Juve, E. Deelman, K. Vahi, Gaurang Mehta, G. Berriman, Benjamin P. Berman, P. Maechling","doi":"10.1109/ESCIW.2009.5408002","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5408002","url":null,"abstract":"The proliferation of commercial cloud computing providers has generated significant interest in the scientific computing community. Much recent research has attempted to determine the benefits and drawbacks of cloud computing for scientific applications. Although clouds have many attractive features, such as virtualization, on-demand provisioning, and “pay as you go” usage-based pricing, it is not clear whether they are able to deliver the performance required for scientific applications at a reasonable price. In this paper we examine the performance and cost of clouds from the perspective of scientific workflow applications. We use three characteristic workflows to compare the performance of a commercial cloud with that of a typical HPC system, and we analyze the various costs associated with running those workflows in the cloud. We find that the performance of clouds is not unreasonable given the hardware resources provided, and that performance comparable to HPC systems can be achieved given similar resources. We also find that the cost of running workflows on a commercial cloud can be reduced by storing data in the cloud rather than transferring it from outside.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132558585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight supercomputing Web portal for inferring phylogenetic trees","authors":"David Johnson, A. Meade, V. Alexandrov","doi":"10.1109/ESCIW.2009.5407990","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407990","url":null,"abstract":"In this paper we describe a lightweight Web portal developed for running computational jobs on a IBM JS21 Bladecenter cluster, ThamesBlue, for inferring and analyzing evolutionary histories. We first discuss the need for leveraging HPC as a enabler for molecular phylogenetics research. We go on to describe how the portal is designed to interface with existing open-source software that is typical of a HPC resource configuration, and how by design this portal is generic enough to be portable to other similarly configured compute clusters, and for other applications.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126299212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A middleware independent Grid workflow builder for scientific applications","authors":"David Johnson, K. Meacham, H. Kornmayer","doi":"10.1109/ESCIW.2009.5407993","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407993","url":null,"abstract":"Grid workflow authoring tools are typically specific to particular workflow engines built into Grid middleware, or are application specific and are designed to interact with specific software implementations. g-Eclipse is a middleware independent Grid workbench that aims to provide a unified abstraction of the Grid and includes a Grid workflow builder to allow users to author and deploy workflows to the Grid. This paper describes the g-Eclipse Workflow Builder and its implementations for two Grid middlewares, gLite and GRIA, and a case study utilizing the Workflow Builder in a Grid user's scientific workflow deployment.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126881745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting cloud computing with the virtual block store system","authors":"Xiaoming Gao, Mike Lowe, Yu Ma, M. Pierce","doi":"10.1109/E-SCIENCE.2009.37","DOIUrl":"https://doi.org/10.1109/E-SCIENCE.2009.37","url":null,"abstract":"The fast development of cloud computing systems stimulates the needs for a standalone block storage system to provide persistent block storage services to virtual machines maintained by clouds. This paper presents the Virtual Block Store (VBS) System, a standalone block storage system built on the basis of LVM, iSCSI, and Xen hypervisor, which can provide basic block storage services such as volume creation and attachment. The concept and functional interface of VBS are based on Amazon Elastic Block Store (EBS) service; moreover, VBS works independently with an existing LVM volume server and Xen nodes, and thus can be easily extended to support other types of volume servers and virtual machine managers, or integrated with various cloud computing systems. Preliminary I/O benchmark results are presented and analyzed, indicating that a VBS volume can provide throughput that is similar to an ATA over Ethernet virtual device.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Executable Acceptable Use Policies (execAUPs) for email clouds","authors":"Lee Gillam, Neil Cooke, Jonathan Skinner","doi":"10.1109/ESCIW.2009.5408004","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5408004","url":null,"abstract":"In this paper, we discuss the potential use of Cloud Computing for hosting and analysis of email. In particular, we are working towards the development of Executable Acceptable Use Policies (execAUPs) that assist organizations in preventing certain kinds of detrimental employee activities. We consider requirements for execAUPs, and outline initial efforts in using Microsoft's Azure as an environment for providing hosted storage for such research.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"19 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audited credential delegation: A sensible approach to grid authentication","authors":"B. Beckles, A. Haidar, S. Zasada, P. Coveney","doi":"10.1109/ESCIW.2009.5407980","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407980","url":null,"abstract":"If the authentication process in a computational grid environment is difficult for end-users, they will either be unable to use the system at all, or, in their attempts to circumvent the aspects of the authentication process which they find “difficult”, they will probably increase the likelihood of a security compromise of the system. In this paper we examine a proposed authentication architecture, audited credential delegation (ACD), that uses the familiar username/password paradigm to improve the usability (and so the security) of the authentication process in these environments. We report on a usability trial of this architecture in which it is compared to the traditional PKI-based authentication used in many existing computational grid environments. We also discuss how this architecture suggests that computational grid resource providers (and potentially the Certificate Authorities accepted by these providers) need to rethink their “one digital certificate = one user” security model.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text, images and statistics: Integrating data and approaches using geospatial computing","authors":"I. Gregory","doi":"10.1109/ESCIW.2009.5407966","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407966","url":null,"abstract":"Geographical Information Systems (GIS) originated as a quantitative technology with a social science paradigm. Its early uses in humanities disciplines followed this approach such that much of the best developed research in ‘Historical GIS’ is associated with quantitative statistical analysis. Technological advances mean that it has become increasingly easy to use GIS with qualitative sources such as texts and images. This in turn has led to an increasing uptake in geo-technologies across the humanities and the development of ‘Spatial Humanities’. This paper explores how the different types of data can be used to deliver new research outcomes and examines how GIS allows different academic paradigms to be used in a synergistic way to bring together traditionally separate disciplines and approaches.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Wiebelitz, S. Piger, Christopher Kunz, C. Grimm
{"title":"Transparent identity-based firewall transition for eScience","authors":"J. Wiebelitz, S. Piger, Christopher Kunz, C. Grimm","doi":"10.1109/ESCIW.2009.5407985","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407985","url":null,"abstract":"As new concepts for eSciene like Grid computing and Cloud computing tend to leave the research phase and develop towards production quality, the security eventually moves into focus. Up to now research in the security area concentrates on authentication and authorization on the resources themselves, but to enhance network security more generally, access control must be pushed back to the entry point of the resource providers' network. In this paper TCP-AuthN is presented, an approach for dynamic firewall operation, which uses the TCP three-way handshake to transport users' authentication information for dynamic firewall operation. The authentication information enables firewalls to authorize each connection establishment individually, based on the user's proven identity. To prevent man-in-the-middle attacks and replay attacks, a challenge-response procedure must be accomplished before the connection is finally allowed. To distinguish the authentication information from application level data, a new TCP option tcpauthn was designed. The presented approach is intended to withdraw the initial authorization decision from the resources and therefore from the internal network and move this decision to firewalls, which are employed to protect networks and services.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Projecting place: Mapping the city in film","authors":"J. Hallam, L. Roberts","doi":"10.1109/ESCIW.2009.5407972","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407972","url":null,"abstract":"Drawing on on-going archival research into Liverpool and Merseyside on film, this paper explores the role of Geographic Information Systems (GIS) technology in historiographical research into film, place and space in an urban setting. Mapping the correlations between categories of genre, date, and location as assessed in relation to records in a spatial database consisting of over 1700 Merseyside films, we examine ways in which cartographic readings of film texts and practices can illuminate historical understandings of urban and regional place-making. Reflecting broader theoretical trends, a growth of interest in cartographic methods in recent historical studies on film is indicative of an emergent ‘spatial turn’ in social science and humanities research. Responding to these developments, we argue that digital and geospatial resources such as those offered by GIS technology enable researchers to: (1) ‘navigate’ the spatial histories attached to landscapes in film; (2) develop new frameworks of analytical enquiry in relation to film, place and memory; and (3) to re-think and reformulate some of the questions critically addressing the ‘place’ of archival images of cities in discourses of cultural memory, regeneration, and urban place-making.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128847831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A suggestion for a data structure for temporal GIS","authors":"V. Kantabutra, D. Ames","doi":"10.1109/ESCIW.2009.5407973","DOIUrl":"https://doi.org/10.1109/ESCIW.2009.5407973","url":null,"abstract":"A new data structure for the implementation of temporal geographic information systems is presented. This data structure, based on Kantabutra's ILE database management system, treats both time and place as first-class citizens and utilizes direct linkages among entities that are related to each other. The suggested data structure supports naturally the three types of queries suggested by Peuquet as queries that a temporal GIS database should be able to answer.","PeriodicalId":416133,"journal":{"name":"2009 5th IEEE International Conference on E-Science Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}