{"title":"A performance estimation model for high-performance computing on clouds","authors":"Jih-Sheng Chang, R. Chang","doi":"10.1109/CloudCom.2012.6427567","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427567","url":null,"abstract":"In this research, we propose a performance estimation model based on the queuing theorem including execution time and network transmission delay. With the evaluation, the proposed delay model enables a cloud system to perform resource allocation for cloud applications with lower delay and the lowest cost. Both the numerical analyses and simulation results clearly show the enough evidences to validate the proposed model. The findings are also in favor of the applicability of the proposed model for HPC (High-Performance Computing) applications in a distributed computing environment such as cloud systems.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116788476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Military reconstructive simulation in the cloud to aid battlefield excavations","authors":"P. Wittek, X. Rubio-Campillo","doi":"10.1109/CLOUDCOM.2012.6427538","DOIUrl":"https://doi.org/10.1109/CLOUDCOM.2012.6427538","url":null,"abstract":"Archaeological studies on battlefields may see great benefits from simulated military engagements: simulations help testing hypotheses based on historical data and may also help with validating methodologies used on the site. Such methods, however, require high-performance computing expertise and considerable computational power. With the emergence of on-demand computing instances in the cloud, distributed computations have become available to technically every organization or individual. This puts large-scale battlefield simulations within the reach of archaeologists, and the cloud paradigm also lowers the required technological expertise, potentially leading to a more widespread adoption of such simulation methods.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eghbal Ghazizadeh, M. Zamani, J. Manan, Abolghasem Pashang
{"title":"A survey on security issues of federated identity in the cloud computing","authors":"Eghbal Ghazizadeh, M. Zamani, J. Manan, Abolghasem Pashang","doi":"10.1109/CloudCom.2012.6427513","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427513","url":null,"abstract":"Cloud computing is a new generation of the technology that has been designed to cater for commercial necessities and to run suitable applications or solve IT management issues. While cost and ease of use are two top benefits of cloud, trust and security are the two top concerns of cloud computing users. Federated identity as a useful feature for user management and Single Sign-on (SSO) has also become an important part of federated identity environment. Misuse of the identity, identity theft, and platform trustworthiness are some of the problems in the federated identity environment. OAuth, OpenID, SAML are three main concept in cloud authentication and federated environment. This paper overviews the security issues of federated identity in the cloud authentication and highlights the proposed models to solve identity theft in the federated environment.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A broadband embedded computing system for MapReduce utilizing Hadoop","authors":"Y. Jung, Richard Neill, L. Carloni","doi":"10.1109/CloudCom.2012.6427483","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427483","url":null,"abstract":"An expanding wealth of ubiquitous, heterogeneous, and interconnected embedded devices is behind most of the exponential growth of the “Big Data” phenomenon. Meanwhile, the same embedded devices continue to improve in terms of computational capabilities, thus closing the gap with more traditional computers. Motivated by these trends, we developed a heterogeneous computing system for MapReduce applications that couples cloud computing with distributed embedded computing. Specifically, our system combines a central cluster of Linux servers with a broadband network of embedded set-top box (STB) devices. The MapReduce platform is based on the Hadoop software framework, which we modified and optimized for execution on the STBs. Experimental results confirm that this type of heterogeneous computing system can offer a scalable and energy-efficient platform for the processing of large-scale data-intensive applications.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted fairness guaranteed data aggregation scheduling algorithm in wireless sensor networks","authors":"Jian Xu, Yanli Chen, Wei Zhu","doi":"10.1109/CloudCom.2012.6427502","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427502","url":null,"abstract":"Data aggregation from a set of sensors to a common sink over a tree-based routing topology is a fundamental traffic pattern in wireless sensor networks (WSNs). The time division multiple access (TDMA)-based scheduling protocols are suitable for such data aggregation applications. Most of the previously proposed TDMA schemes focus on a particular objective, such as minimizing schedule delay, latency, and energy consumption etc. In this paper, we investigate another important aspect of aggregation, i.e., weighted fairness, and propose a novel weighted fairness guaranteed aggregation scheduling algorithm (WAS) under the protocol interference model. We use node weight to reflect the importance of each node, and introduce the weighted delay as the weighted fairness guaranteed metric. Then the problem of weighted fairness guaranteed can be translated into minimizing the weighted delay. In order to achieve this purpose, WAS utilizes the approximate maximum weighted set to allocate time slots for each node according to different accumulative weight. The results of simulation demonstrate that the weighted fairness of WAS is much better than the existing TDMA scheduling algorithm. In particular, the proposed scheduling scheme can achieve a good trade-off between weighted fairness guarantee and aggregation delay.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BDI agent-based approach for Cloud Application autonomic management","authors":"Li Xu, Guozhen Tan, Xia Zhang, Jingang Zhou","doi":"10.1109/CloudCom.2012.6427571","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427571","url":null,"abstract":"Cloud endows application with the ability of controlling runtime environment dynamically. Comparing with traditional one, Cloud APPlication (CAPP) could be more dynamic and autonomic. However, enabling CAPP to handle problems such as performance optimization or resources utility efficiency improvement in complex cloud environment with existing technologies is difficult and problematic. To address this problem, we propose a BDI (Belief-Desire-Intention) model and multi-agent oriented approach to decouple autonomous management functionality with CAPP, and simplify the management policy configuration process. We use the BDI agent paradigm to specify application and environment fact as belief, the CAPP's SLOs (Service Level Objectives) and Cloud Environment (CE) resources utility improvement desire as goal, means to achieve goal as action plan. A BDI agent oriented architecture and a Bayesian Network based belief inference model for the process of reasoning in intelligent agent is proposed to tackle CAPP autonomic management problem in cloud environment also. A prototype of this design is applied to automatically manage several multi-tiered web applications running in cloud environment to demonstrate the effectiveness of our design.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic scalability and contention prediction in public infrastructure using Internet application profiling","authors":"W. Dawoud, I. Takouna, C. Meinel","doi":"10.1109/CloudCom.2012.6427552","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427552","url":null,"abstract":"Recently, the advance of cloud computing services has attracted many customers to host their Internet applications in the cloud. Infrastructure as a Service (IaaS) is on top of these services where it gives more control over the provisioned resources. The control is based on online monitoring of specific metrics (e.g., CPU, Memory, and Network). Despite the fact that these metrics guide resources provisioning, the lack of understanding application behavior can lead to wrong decisions. Moreover, current monitored metrics alone do not help in resources contention prediction, which is very common in shared infrastructures like IaaS. Nevertheless, the architecture of Internet applications, as multi-tier systems, makes contention prediction more complex while its influence can migrate from one tier to another. In this paper, we propose a pro-active global controller not only for dynamic resources provisioning, but also for predicting and eliminating contentions in multi-tier applications. Our technique combines monitored metrics, which are provided by current IaaS providers, with models that are built depending on the Internet applications profiling. The fitness of the monitored metrics to the application model is used for contention prediction. We examined our technique using RUBiS benchmark. The results express the efficiency of the developed algorithms in maintaining Internet applications performance even in shared infrastructures.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129039540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large-scale multimedia data mining using MapReduce framework","authors":"Hanli Wang, Yun Shen, Lei Wang, Kuangtian Zhufeng, Wei Wang, Cheng Cheng","doi":"10.1109/CloudCom.2012.6427595","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427595","url":null,"abstract":"In this paper, the framework of MapReduce is explored for large-scale multimedia data mining. Firstly, a brief overview of MapReduce and Hadoop is presented to speed up large-scale multimedia data mining. Then, the high-level theory and low-level implementation for several key computer vision technologies involved in this work are introduced, such as 2D/3D interest point detection, clustering, bag of features, and so on. Experimental results on image classification, video event detection and near-duplicate video retrieval are carried out on a five-node Hadoop cluster to demonstrate the efficiency of the proposed MapReduce framework for large-scale multimedia data mining applications.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data layout management for energy-saving key-value storage using a write off-loading technique","authors":"Masaki Kan, D. Kobayashi, H. Yokota","doi":"10.1109/CloudCom.2012.6427514","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427514","url":null,"abstract":"The objective of our research has been to achieve energy-saving key-value store system. We introduce architecture of our distributed key value store and control framework for energy saving. To reduce power consumption, the control framework should reduce the time required before node power-down. Since this time depends heavily on the amount of data migration, we employ an approach which reduce that amount. We describe and evaluate three control strategies that can be executed on this control framework, each consisting of a data allocation algorithm and data control layout algorithm for use when nodes are to be powered down. With a prototype system developed for evaluation purposes, the time required before node power down is reduced by use of our proposed data allocation algorithm, by means of its taking into account the possible presence of Write off-loading nodes.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intercloud Architecture for interoperability and integration","authors":"Y. Demchenko, M. Makkes, R. Strijkers, C. D. Laat","doi":"10.1109/CloudCom.2012.6427607","DOIUrl":"https://doi.org/10.1109/CloudCom.2012.6427607","url":null,"abstract":"This paper presents on-going research to develop the Intercloud Architecture Framework (ICAF) that addresses problems in multi-provider multi-domain heterogeneous cloud based infrastructure services and applications integration and interoperability. The paper refers to existing standards in Cloud Computing, in particular, recently published NIST Cloud Computing Reference Architecture (CCRA). The proposed ICAF defines four complementary components addressing Intercloud integration and interoperability: multilayer Cloud Services Model that combines commonly adopted cloud service models, such as IaaS, PaaS, SaaS, in one multilayer model with corresponding inter-layer interfaces; Intercloud Control and Management Plane that supports cloud based applications interaction; Intercloud Federation Framework, and Intercloud Operation Framework. The paper briefly describes the architectural framework for cloud based infrastructure services provisioned on-demand being developed in the framework of the GEYSERS project that is used as a basis for building multilayer cloud services integration framework that allows optimized provisioning of both computing, storage and networking resources. The proposed architecture is intended to provide an architectural model for developing Intercloud middleware and in this way will facilitate clouds interoperability and integration.","PeriodicalId":430883,"journal":{"name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}