The computational grid offers services for efficiently scheduling jobs on the grid, but for grid-enabled applications where data handling is a most relevant part in performance, the data grid kicks in. It typically bu...
详细信息
ISBN:
(纸本)9781424442331
The computational grid offers services for efficiently scheduling jobs on the grid, but for grid-enabled applications where data handling is a most relevant part in performance, the data grid kicks in. It typically builds on the concept of files, sites and file transfers between sites using services such as GRID-ftp, plus a Replica Manager to keep track of where replicas are located. Usually, careful original data layout is not considered because the data can be moved based on some replica optimization models to computing sites. We consider cooperative shared computations for huge data that is distributed over a variable number of sites. In this context, data layout is a relevant problem because moving very large amounts of data is too expensive. Consequently, it is a balance between data layout and load-balancing capabilities on top of the basic infra-structure that is the most crucial issue. In this paper we propose a mixed replication layout and load-balancing approach to yield very good performance results in such environments.
One of the major threats to cyber security is distributed Denial of Service (DDoS) attacks. In this paper, we propose a new algorithm based on the persistent increment tendency of DDoS traffic. Our scheme can detect a...
详细信息
ISBN:
(纸本)9781424442331
One of the major threats to cyber security is distributed Denial of Service (DDoS) attacks. In this paper, we propose a new algorithm based on the persistent increment tendency of DDoS traffic. Our scheme can detect a DDoS attack in its early stages when the attacking packet's attribute value has no distinct features. It can differentiate DDoS from flash crowd traffic. This scheme detects DDoS attacks with on-line anddistributed characteristics. Simulation shows the algorithm's validity and accuracy.
Paxos, the de facto standard approach to solving distributed consensus, operates in two phases, each of which requires an intersecting quorum of nodes. Multi-Paxos reduces this to one phase by electing a leader but th...
详细信息
ISBN:
(纸本)9781450389334
Paxos, the de facto standard approach to solving distributed consensus, operates in two phases, each of which requires an intersecting quorum of nodes. Multi-Paxos reduces this to one phase by electing a leader but this leader is also a performance bottleneck. Fast Paxos bypasses the leader but has stronger quorum intersection requirements. In this paper we observe that Fast Paxos' intersection requirements can be safely relaxed, reducing to just one additional intersection requirement between phase-1 quorums and any pair of fast round phase-2 quorums. We thus find that the quorums used with Fast Paxos are larger than necessary, allowing alternative quorum systems to obtain new tradeoffs between performance and fault-tolerance.
This paper presents a survey of existing event systems structured as a taxonomy of distributed event-based programming systems. Our taxonomy identifies a set of fundamental properties of event-based programming system...
详细信息
ISBN:
(纸本)0769515886
This paper presents a survey of existing event systems structured as a taxonomy of distributed event-based programming systems. Our taxonomy identifies a set of fundamental properties of event-based programming systems and categorizes them according to the event model and event service criteria. The event service is further classified according to its organization and interaction model, as well as other functional and non-functional features.(1).
Hadoop is a popular application to analyze and process big data problems in a networked distributed system of computers. Investigations of performance for application-aware networking have been of interest with the so...
详细信息
ISBN:
(纸本)9781479962044
Hadoop is a popular application to analyze and process big data problems in a networked distributed system of computers. Investigations of performance for application-aware networking have been of interest with the software-defined networking paradigm through on-demand and dynamic policy enforcements. Network usage characterization of Hadoop jobs can further help understand what policy enforcements may be needed during application use cases. At scale experimentation of Hadoop jobs will help facilitate such characterizations. We report how Hadoop networking usage can be characterized in an experimentation environment using the GENI (Global Environment for Network Innovation). Furthermore, we report a distributed switch framework that may help alleviate the fault tolerance schemes in Hadoop application in the forwarding plane. Delay in recovery from failures has been reduced by almost 99% through such a distributed switch architecture deployed on the GENI experimentation environment.
The next generation of computing systems will be embedded, in a virtually unbounded number, and dynamically connected. The current software, network architectures, and their associated programming models are not suita...
详细信息
ISBN:
(纸本)0769515851
The next generation of computing systems will be embedded, in a virtually unbounded number, and dynamically connected. The current software, network architectures, and their associated programming models are not suitable for this scenario. This paper presents a distributedcomputing model, Cooperative computing, and the Smart Messages architecture for programming large networks of embedded systems. In Cooperative computing, distributed applications are dynamic collections of migratory execution units, called Smart Messages, working to achieve a common goal. Virtually any user-defined distributed application can be implemented using our model. We present preliminary results for our prototype implementation as well as simulation results for two previously proposed applications for sensor networks, Directed Diffusion and SPIN, implemented using Smart Messages.
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activ...
详细信息
ISBN:
(纸本)0769515851
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification model supports nested collaboration activities, and uses role-based security policies and event count based coordination specification. From the specifications of a collaboration environment, appropriate policy modules are derived for enforcing security and coordination requirements. A policy-driven distributed middleware provides services to the users to join roles in an activity, perforin role specific operations, or create new, activities. We describe here the design challenges for the middleware and present the runtime structures and protocols supported by it for creating activities, roles, and objects.
distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. dRBAC utilizes PKI identities to define t...
详细信息
ISBN:
(纸本)0769515851
distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. dRBAC utilizes PKI identities to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. The mapping of controlled actions to roles enables their namespaces to serve as policy roots. dRBAC distinguishes itself from previous approaches by providing three features: (1) third-party delegation of roles from outside a domain's namespace, relying upon an explicit delegation of assignment;(2) modulation of transferred permissions using scalar valued attributes associated with roles;and (3) continuous monitoring of trust relationships over long-lived interactions. This paper describes the dRBAC model and its scalable implementation using a graph approach to credential discovery and validation.
A spatio-textual similarity join searches a spatio-textual data collection and reports the object pairs that satisfy the specified spatial distance threshold and textual similarity threshold. However, when the data ow...
详细信息
ISBN:
(纸本)9781509044573
A spatio-textual similarity join searches a spatio-textual data collection and reports the object pairs that satisfy the specified spatial distance threshold and textual similarity threshold. However, when the data owner outsources the join computations to a third-party cloud service provider, the service provider may send incomplete or incorrect join results to the data owner. In this paper, we propose a pairwise authentication scheme, a cluster based scheme and an order and bound based scheme to authenticate the results of spatio-textual similarity joins. Extensive experiments on a real-world dataset verify the effectiveness and efficiency of our proposed schemes in terms of various performance metrics.
Location-aware services are a promising way of exploiting the special possibilities created by, ubiquitous mobile devices and wireless communication. Advanced location-aware applications will require highly accurate i...
详细信息
ISBN:
(纸本)0769515851
Location-aware services are a promising way of exploiting the special possibilities created by, ubiquitous mobile devices and wireless communication. Advanced location-aware applications will require highly accurate information about the geographic location of mobile objects and functionality that goes beyond simply querying the user's position, for example determining all mobile objects inside a certain geographic area. In this paper, we propose a generic large-scale location service, which has been designed with the goal of managing the highly dynamic location information for a large number of mobile objects, thus providing a common infrastructure that can be employed by, location-aware applications. We propose a hierarchical distributed architecture, which can efficiently process these queries in a scalable way. To be able to deal with the frequent updates and queries resulting from highly, dynamic location information, we propose a data storage component, which makes use of a main memory database.
暂无评论