In this paper, we present an implementation of the concept of Multiple Option Resource Allocation (MORA) in the context of Multitenant Edge computing. We assume a Network Operator (NO) owns computational resources on ...
详细信息
ISBN:
(数字)9781665486279
ISBN:
(纸本)9781665486279
In this paper, we present an implementation of the concept of Multiple Option Resource Allocation (MORA) in the context of Multitenant Edge computing. We assume a Network Operator (NO) owns computational resources on the edge, e.g., storage and CPU co-located with a mobile base station, and opens them to 3rd party Service Providers (SPs), which in this work are video streaming services. Each SP is fully containerized in Kubernetes pods. Following MORA concept, in order to cope withthe limited resources on the edge, we assume that each SP can run under different configurations, consuming more or less amount of resources, so as to adapt to the actual resource availability. therefore, the NO can choose the best configuration per each SP, in order to optimize some NO's related performance (the upstream traffic, in our case). We implement a test-bed showcasing such a system and we measure its performance. All the code is released as open source [1].
the rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding nat...
详细信息
Making friends with some common attributes is one of the most popular applications in the mobile social networking (MSN). However, how to preserve the users' privacy while matchmaking has been considered as the ke...
详细信息
In industrial, scientific and commercial fields, geographically dispersed large data sets are necessary to be analyzed to get a lot of useful information by using distributed data mining (DDM). However, DDM now confro...
详细信息
ISBN:
(纸本)9812565329
In industrial, scientific and commercial fields, geographically dispersed large data sets are necessary to be analyzed to get a lot of useful information by using distributed data mining (DDM). However, DDM now confronts many new challenges such as seamless-cooperation which can not easily be solved on current distributedcomputing environment. As the latest development of distributedcomputing technology, the gird computing may play a key role in solving these challenges. In this paper, the shortcoming of current existing DDM systems is showed, and a service-oriented architecture of DDM on the grid is proposed. the mining algorithm, distributed data sets and computing power are abstracted as web service resource (WS-Resource), which can cooperate to perform DDM as required dynamically. In addition, the paper describes the mining process on the proposed framework in detail.
Most service providers and data owners desire to control the access to sensitive resources. the user may express restrictions, such as who can access the resources, at which point in time and from which location. Howe...
详细信息
ISBN:
(纸本)9781467377010
Most service providers and data owners desire to control the access to sensitive resources. the user may express restrictions, such as who can access the resources, at which point in time and from which location. However, the location requirement is difficult to achieve in an indoor environment. Determining user locations inside of buildings is based on a variety of solutions. Moreover, current access control solutions do not consider restricting access to sensitive data in indoor environments. this article presents a graphical web interface based on OpenStreetMap (OSM), called Indoor Mapping Web Interface (IMWI), which is designed to use indoor maps and floor plans of several real-world objects, such as hospitals, universities and other premises. By placing Bluetooth Low Energy (BLE) beacons inside buildings and by labeling them on digital indoor maps, the web interface back-end will provide the stored location data within an access control environment. Using the stored information will enable users to express indoor access control restrictions. Moreover, the IMWI enables and ensures the accurate determination of a user device location in indoor scenarios. By defining several scenarios the usability of the IMWI and the validity of the policies have been evaluated.
Implementation of a kernel-level consistency control mechanism called invocation-based consistency control (IBCC) is presented. IBCC supports general-purpose persistent object-based distributedcomputing. IBCC provide...
详细信息
ISBN:
(纸本)0818621443
Implementation of a kernel-level consistency control mechanism called invocation-based consistency control (IBCC) is presented. IBCC supports general-purpose persistent object-based distributedcomputing. IBCC provides mechanisms that support a range of powerful, well-defined consistency semantics. IBCC mechanisms can also be used to implement custom recovery and synchronization. An operating-system-level implementation of IBCC as part of the Clouds distributed operating system that uses memory faulting to initiate locking and intermediate version creation is also given. Performance aspects are discussed, as well as the overhead incurred by supporting IBCC in terms of additional data structures needed in the operating system, and the additional amount of required code.
In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as en...
详细信息
ISBN:
(纸本)9781509049066
In distributed environments, entities are distributed among different security domains and they do not have prior knowledge of one another. In this setting, distributed systems and their security components such as entities, certificates, credentials, policies and trust values are dynamic and constantly changing. thus, access control models and trust approaches are necessary to support the dynamic and distributed features of such systems and their components. the objective of this paper is to present a comprehensive survey about the security research in distributed systems. We have reviewed the dynamic and distributed nature of the components and evaluation methods of major authorization systems and access control models in existing literature. Based on this overview, we present a survey of selected trust schemes. We provide a categorization for recommendation-based and reputation-based trust models based on trust evaluation. Additionally, we use credential or certificate storage and chain discovery methods for categorizing evidence based and policy-based trust models. this work can be used as a reference guide to understand authorization and trust management and to further research fully decentralized and distributed authorization systems.
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must ...
详细信息
ISBN:
(纸本)9781538655047
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must conform to applications' resource requirements in a heterogeneous fog infrastructure, and deal withthe complexity brought by Internet of things (IoT) applications tied to sensors and actuators. this paper presents four heuristics to address the problem of placing distributed IoT applications in the fog. By combining proposed heuristics, our approach is able to deal with large scale problems, and to efficiently make placement decisions fitting the objective: minimizing placed applications' average response time. the proposed approach is validated through comparative simulation of different heuristic combinations with varying sizes of infrastructures and applications.
A two-level hierarchical model is proposed to analyze the availability of distributed systems as perceived by their users. At the higher level (user level), the availability of the tasks (processes) is analyzed in ter...
详细信息
ISBN:
(纸本)0818621443
A two-level hierarchical model is proposed to analyze the availability of distributed systems as perceived by their users. At the higher level (user level), the availability of the tasks (processes) is analyzed in terms of the availability of the system components. At the lower level (component level), detailed Markov models are developed to analyze the component availabilities. these models take into account the hardware/software failures, congestion and collisions in communication links, allocation of resources, and the redundancy level. Also presented is the availability analysis of some of the services provided by the Unified Workstation Environment (UWE) currently being implemented at AT&T Bell Laboratories.
Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way t...
详细信息
ISBN:
(纸本)9780769528915
Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way to guarantee the integrity, of the information on the client (or service requestor) platform. the Trusted computing Group proposed a quantum leap in security, a hardware based "root of trust" by which the integrity of a platform - be a client or service provider can be verified. However there is no approach for the integration of this novel but essentially straightforward concept into the distributed application development. We believe that the complexity of Trusted computing (TC) is one of the key factors that will hinder its successful integration within the web services based distributed application realm. Model-driven techniques offer a promising approach to alleviate the complexity of platforms. this contribution has three objectives. First, we detail SECTET - a model-driven framework for leveraging TC concepts at a higher level of abstraction. We secondly elaborate the integration of platform-independent XACML policies withthe platform-specific SELinux policies. thirdly, we share our experiences regarding the implementation results of the SECTET on TC based systems.
暂无评论