Scientific workloads often require scalable computing resources. the traditional HPC paradigm provides large scale computing resources but requires IT specialists to buy and maintain large computer infrastructure in t...
详细信息
ISBN:
(纸本)9781467372879
Scientific workloads often require scalable computing resources. the traditional HPC paradigm provides large scale computing resources but requires IT specialists to buy and maintain large computer infrastructure in their organization. Withthe emergence of cloud computing, more and more scientists and engineers are moving their computing workloads from local clusters to public cloud. However, such a migration often requires experience both in understanding cloud architecture and cloud development skills, which can impede the efficiency and success of migration. this paper presents a cloud-based parallel and distributedcomputing platform to support scientific computing. Withthe Simulation Runner, scientists only need to submit their embarrassingly parallel scientific applications with appropriate arguments or parameters. there is no need to rebuild migrate cloud applications or purchase large computer infrastructures by themselves. the system also uses a file caching mechanism to improve performance and reduce the costs of data-intensive computing tasks. A 44X speedup was resulted from using 128computing instances compared with premise high performance desktop computers. A comparison study on the performance of file cache is given at the end of the paper.
An interesting phenomenon of virtual communication in modern society is that people feel incongruity between virtuality and reality while using SNS. People lose interest in direct communication withtheir local commun...
详细信息
ISBN:
(纸本)9784907626129
An interesting phenomenon of virtual communication in modern society is that people feel incongruity between virtuality and reality while using SNS. People lose interest in direct communication withtheir local community at shared places. To solve this social issue, we used visual ethnography to observe how people respond to certain factors and form empathy withtheir communities on both offline and online. Using it as a base study, we developed a research for detailed empathy-forming mechanism. We then designed SNS that forms empathy on location-based communication in Smart City.
Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the...
详细信息
ISBN:
(纸本)9780769556970
Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments.
We present a rational approach to the construction of the information security systems (ISS) in the field of distributed systems (DS). We analyze the existing DS from the point of security and construct a two-level hi...
详细信息
ISBN:
(纸本)9781467383615
We present a rational approach to the construction of the information security systems (ISS) in the field of distributed systems (DS). We analyze the existing DS from the point of security and construct a two-level hierarchy of models. Such approach allows us to separate the abstraction (architecture) level and the concrete (component) level of ISS. the core set of methods, i.e. authentication and key exchange protocols, corresponds to the abstraction level and is defined as security infrastructure (SI). the final security parameters optimization and additional mechanisms such as authorization, routing and data auditing of the protection mechanisms are configured on the component level of the DS. In addition, we introduce the general model of security mechanism and outline the systematic step-by-step ISS configuration method.
distributed Denial of Service (DDoS) attack has been identified as the biggest security threat to service availability in Cloud computing. It prevents legitimate Cloud Users from accessing pool of resources provided b...
详细信息
ISBN:
(纸本)9781479918669
distributed Denial of Service (DDoS) attack has been identified as the biggest security threat to service availability in Cloud computing. It prevents legitimate Cloud Users from accessing pool of resources provided by Cloud Providers by flooding and consuming network bandwidth to exhaust servers and computing resources. A major attribute of a DDoS attack is spoofing of IP address that hides the identity of the attacker. this paper discusses different methods for detecting spoofed IP packet in Cloud computing and proposes Host-Based Operating System (OS) fingerprinting that uses both passive and active method to match the Operating System of incoming packet from its database. Additionally, how the proposed technique can be implemented was demonstrated in Cloud computing environment
In recent years, large field sensing has been widely studied whereby an application for representative agricultural and disaster reduction utilizes a wireless sensor network (WSN). However, outdoor field sensing invol...
详细信息
ISBN:
(纸本)9781467394697
In recent years, large field sensing has been widely studied whereby an application for representative agricultural and disaster reduction utilizes a wireless sensor network (WSN). However, outdoor field sensing involves problems related to communication quality and distance. Particularly, the communication reliability in portable wireless sensor networks is greatly influenced by the surrounding environmental factors which affects the communication nodes' movement. Unlike fixed wireless sensor networks, radio wave conditions are dynamic, which yields many differences such as the effects of plants. Boththe performance and communication quality are addressed by proposing a full-mesh network capable of high speed re-connecting at the time of the failure. We evaluated the problems by deploying outdoor sensor nodes based on our proposed system.
distributed DRAM stores have become an attractive option for providing fast data accesses to analytics applications. To accelerate the performance of these stores, researchers have proposed using RDMA technology. RDMA...
详细信息
ISBN:
(纸本)9781467372145
distributed DRAM stores have become an attractive option for providing fast data accesses to analytics applications. To accelerate the performance of these stores, researchers have proposed using RDMA technology. RDMA offers high bandwidth and low latency data access by carefully separating resource setup from IO operations, and making IO operations fast by using rich network semantics and offloading. Despite recent interest, leveraging the full potential of RDMA in a distributed environment remains a challenging task. In this paper, we present RDMA Store or RStore, a DRAM-based data store that delivers high performance by extending RDMA's separation philosophy to a distributed setting. RStore achieves high aggregate bandwidth (705 Gb/s) and close-to-hardware latency on our 12-machine testbed. We developed a distributed graph processing framework and a Key-Value sorter using RStore's unique memory-like API. the graph processing framework, which relies on RStore for low-latency graph access, outperforms state-of-the-art systems by margins of 2.6-4.2x when calculating PageRank. the Key-Value sorter can sort 256 GB of data in 31.7 sec, which is 8x better than Hadoop TeraSort in a similar setting.
the ever-increasing demand for cloud services results in large electricity costs to cloud providers and causes significant impact on the environment. this has pushed cloud providers to power their data centers with re...
详细信息
ISBN:
(纸本)9780769556970
the ever-increasing demand for cloud services results in large electricity costs to cloud providers and causes significant impact on the environment. this has pushed cloud providers to power their data centers with renewable energy sources more than ever. Among the different ways of adopting renewable energy sources, on-site power generation using wind and solar energy has gained considerable attention by large companies and proved its potential to reduce data centers' carbon footprint and energy costs. Efficient utilization of renewable energy sources is challenging due to their intermittency and unpredictability. Cloud providers with multiple Geo-distributed data centers in a region can exploit the temporal variations in on-site power and grid power price by routing the load to a suitable data center in order to reduce cost and increase renewable energy utilization. To achieve this goal, we propose a fuzzy logic-based load balancing algorithm that acts with no knowledge of future. We conduct extensive experiments using a case study based on real world traces obtained from National Renewable Energy Laboratory (NREL) and Energy Information Administration (EIA) in the US, and Google cluster-usage. Compared to other benchmark algorithms, our method is able to significantly reduce the cost without a priori knowledge of the future electricity price, renewable energy availability, and workloads.
In the last decades, along withthe continuously evolving of the Internet Protocol-based network, numerous Internet programs that have played critical roles in the current technological era are being developed inclusi...
详细信息
ISBN:
(纸本)9781467382700
In the last decades, along withthe continuously evolving of the Internet Protocol-based network, numerous Internet programs that have played critical roles in the current technological era are being developed inclusive of interactive applications. Nevertheless, the transmission performance and user experience of these instant services that require high bandwidth or low latency may suffer when serious traffic congestion occurs. In this paper, a QoS management system with a dynamic routing algorithm, based on a software-defined networking architecture, is implemented. the purpose of the system is to generate an optimal route with minimum cost based on real-time monitored statistics and the cost model. the system is also integrated with a flow classification engine based on machine learning algorithms to enable the application identification thus providing a bandwidth management mechanism that can enforce rate-limit policies for each application with different priorities under traffic congestion. Experimental results show that the proposed algorithm can provide excellent QoS with little overhead, where the rate-limit policies can be implemented in one to several seconds for different applications through the bandwidth management mechanism.
the article describes the principle of construction of geographic information-analytical system of geodynamic monitoring: generalized information structure, the list of layers and attributes. Also substantiates the us...
详细信息
ISBN:
(纸本)9781467383615
the article describes the principle of construction of geographic information-analytical system of geodynamic monitoring: generalized information structure, the list of layers and attributes. Also substantiates the use of service-oriented approach, the generalized mathematical description of information processing heterogeneous data when geodynamic forecasting.
暂无评论