Within this keynote, selected research topics from the field of inter-organizatioanal elastic processes will be discussed, with a focus on the key challenges maintainability, reliability and correctness of such elasti...
详细信息
Regenerating codes based on the approach of interference alignment for wireless interference channel achieve the cut-set bound for distributed storage systems (DSS). these codes are especially important for efficient ...
详细信息
ISBN:
(纸本)9781467388191
Regenerating codes based on the approach of interference alignment for wireless interference channel achieve the cut-set bound for distributed storage systems (DSS). these codes are especially important for efficient repair of a failed node in a minimum storage regenerating (MSR) codes. Moreover, they achieve perfect security against the eavesdropper attacks, i.e., the observer can not reveal the whole message. Here the aim is information protection of individual files and small groups from the entire message, when the attacker has access to a limited number of storage nodes. this paper considers improving the perfect security in such DSS. the enhanced secrecy is presented by performing explicit code construction by using an outer and an inner code. the proposed construction code model includes coset code as an outer code or pre-coding step that ensures the security of the system and an MSR interference alignment code as an inner one that performs an efficient reconstruction and repair process. Using this construction we show that the eavesdropper can not reveal the message, and, that he can not access any subset of individual information from the original message, without any significant loss in the storage capacity.
this paper presents enhancements of Service Oriented SystemJ (SOSJ) framework, which extends a system-level language based on GALS model of computation SystemJ with services, into a new programming paradigm amenable f...
详细信息
ISBN:
(纸本)9781467394697
this paper presents enhancements of Service Oriented SystemJ (SOSJ) framework, which extends a system-level language based on GALS model of computation SystemJ with services, into a new programming paradigm amenable for designing dynamic distributed automation systems such as reconfigurable manufacturing systems. the new paradigm combines correct-by-construction software systems development available in SystemJ withthe dynamic features of service oriented architecture. the new approach introduces macro states into fundamental concurrent and distributed entities of SOSJ, called clock domains, which address typical behaviors in dynamic distributed systems. We showcase the use of the new paradigm on an example of reconfigurable manufacturing scenarios in a dynamic manufacturing system.
Seamless cloud interoperability is highly desired but not yet easily attainable in the current cloud solutions market. this work tackles one aspect of achieving cloud interoperability, namely, inter-cloud networking. ...
详细信息
ISBN:
(纸本)9781467372879
Seamless cloud interoperability is highly desired but not yet easily attainable in the current cloud solutions market. this work tackles one aspect of achieving cloud interoperability, namely, inter-cloud networking. We list the requirements and propose an inter-cloud networking architecture for a case of independent clouds owned by different entities and powered by different cloud management and network virtualization technologies. then we validate the proposed architecture by describing an example of working implementation for OpenStack cloud powered by OpenDayLight OpenDOVE SDN solution. Finally, we compare our architecture to the existing solutions.
Almost all modern online services run on geodistributed data centers, and fault tolerance is one of the primary requirement that decides the revenue of the service provider. Recent experiences have shown that the fail...
详细信息
ISBN:
(纸本)9781467396233
Almost all modern online services run on geodistributed data centers, and fault tolerance is one of the primary requirement that decides the revenue of the service provider. Recent experiences have shown that the failure of a data center (at a site) is inevitable. In order to mask the failure, spare compute capacity needs to be provisioned across the distributed data center, which leads to additional cost. While the existing literature addresses the capacity provisioning problem only to minimize the number of servers, we argue that the operating cost needs to be considered as well. Since the operating cost and client demand vary both across space and time, we consider cost-aware capacity provisioning to account for their impact on the operating cost of data centers. We propose an optimization framework to minimize the Total Cost of Ownership (TCO) of the cloud provider while designing fault-tolerant geo-distributed data centers. We model the variation in the demand, fluctuation of electricity price and carbon tax across different countries, and delay constraints while computingthe spare capacity. On solving the proposed optimization model using real world data, we notice a saving in the TCO (that includes cost of servers and operating cost) of about 17% compared to the model that only minimizes the number of extra servers. Results also highlight the relationship of power usage effectiveness (PUE), over-provisioning for fault tolerance, choice of data center locations, and latency requirements on the TCO. In particular, we notice that the approach of minimizing TCO is beneficial when the electricity prices vary significantly and the PUE is high, which appears to be the case with most of the cloud providers.
In this paper, we propose a simple and efficient real-time energy management system in smart homes withdistributed energy resources and energy storage system. In order to manage smart homes cost efficiently, energy c...
详细信息
ISBN:
(纸本)9781467398466
In this paper, we propose a simple and efficient real-time energy management system in smart homes withdistributed energy resources and energy storage system. In order to manage smart homes cost efficiently, energy consumption cost functions are formulated based on energy pricing scheme. the proposed energy management system utilizes energy consumptions with respect to minimize energy cost by domestic electric appliances.
Despite the modern advancements in networking, TCP congestion control is still one of the key mechanisms that ensure the stability of the Internet. Given its principal role, it is a popular research topic revisited ev...
详细信息
the data mining issue in big data processing which is based on cloud computing has become a hot research topic. Generally, most of the previous work directly analyzes the data through the existing mining approaches, w...
详细信息
ISBN:
(纸本)9781467388191
the data mining issue in big data processing which is based on cloud computing has become a hot research topic. Generally, most of the previous work directly analyzes the data through the existing mining approaches, which may cause problems such as redundant computation, high time complexity, and large storage space. Based on this argument, a novel heuristic approach called PASS (Pre-processing based on Small Sample) has been proposed for finding a small sample composed of the most frequent transactions in big data pre-processing. Taking advantage of the cloud computing which can solve the bottleneck of data mining in distributed environment, PASS directly operates on the transaction database and groups all transactions according to different dimensions. By using the Bitmap-Sort, the most frequent transactions can be screened from each transaction set. Finally, the best-transaction-set is obtained through aggregating all the transaction-elects of each transaction set. the experimental results have shown that PASS significantly avoids producing plenty of candidate sets resulting from join operation, accelerates the maximal frequent itemsets mining, economizes the storage space, and improves the utilization rate of resources simultaneously.
Disaster area map generation and sharing are critical to disaster response operations. In post-disaster contexts however, cloud-based mapping services and data may be unavailable because of network challenges. Disrupt...
详细信息
ISBN:
(纸本)9784907626129
Disaster area map generation and sharing are critical to disaster response operations. In post-disaster contexts however, cloud-based mapping services and data may be unavailable because of network challenges. Disruption Tolerant Network (DTN) architectures have been proposed for data sharing in challenged networks. However, map generation may be too complex for individual DTN nodes given their limited computing resources. To generate and share maps of disaster areas, we present DTN MapEx, a distributedcomputing system for mapping that operates over a DTN. DTN MapEx distributes disaster map data and map generation tasks to multiple nodes to minimize individual computational loads. In the system, responders and volunteers act as mobile sensing nodes. they log the GPS traces of their traversed paths and collect disaster area map data such as the coordinates, images, and assessments of points-of-interest. the mobile nodes then route their collected data and a task request through the DTN to pre-deployed, fixed computing Nodes. the computing Nodes aggregate the data to generate a map and opportunistically route it back to the network. To reduce complexity, mapping tasks and data are divided amongst computing Nodes based on their current computational load. computing Nodes periodically update the DTN about their current loads. Mobile nodes use these updates in deciding where to allocate their task requests and data. In this paper, we present the design of DTN MapEx and perform initial evaluations on its feasibility in disaster scenarios.
Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because tr...
详细信息
ISBN:
(纸本)9780769556970
Outsourcing to the Cloud is becoming an attractive option for many organisations dealing with large amounts of data. However, there is still a reluctance amongst companies dealing with highly regulated data because traditional Cloud storage does not support the level of privacy required to prevent access pattern leakage. Oblivious Random Access Machines (ORAM) have been a hot topic of research over the past number of years, proposing various cryptographic techniques to obtain the privacy levels required. We propose a new model, Dog ORAM - a distributed and shared oblivious RAM model with server side computation, that merges several models existing in the literature and includes a new method of access right management for multi-party data access. To achieve this, we use an additive homomorphic encryption scheme and a chameleon signature.
暂无评论