By Topic

2013 IEEE International Conference on Cloud Engineering (IC2E)

25-27 March 2013

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (607 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • IC2E 2013: Message from the General Chairs

    Publication Year: 2013, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2013, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2013, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Keynote 1: Key trends in enterprise uptake of cloud computing

    Publication Year: 2013, Page(s): xiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Summary form only given, as follows. The IT industry has seen a significant shift in spending towards cloud-based services, with concepts such as IaaS and PaaS becoming nearly ubiquitous. In the process, the software management stacks for running clouds have become increasingly automated and virtualized. The next step in this evolution is what we are referring to as Software Defined Environment (S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Power- and Failure-Aware Cloud Resources Allocation for Sets of Independent Tasks

    Publication Year: 2013, Page(s):1 - 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Cloud computing is increasingly being adopted in different scenarios, like social networking, business applications, scientific experiments, etc. Relying in virtualization technology, the construction of these computing environments targets improvements in the infrastructure, such as power-efficiency and fulfillment of users' SLA specifications. The methodology usually applied is packing all the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HPC-Aware VM Placement in Infrastructure Clouds

    Publication Year: 2013, Page(s):11 - 20
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Cloud offerings are increasingly serving workloads with a large variability in terms of compute, storage and networking resources. Computing requirements (all the way to High Performance Computing or HPC), criticality, communication intensity, memory requirements, and scale can vary widely. Virtual Machine (VM) placement and consolidation for effective utilization of a common pool of resources for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Isolation vs. Consolidation: Implications for IaaS Cloud Application Deployment

    Publication Year: 2013, Page(s):21 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Service isolation, achieved by deploying components of multi-tier applications using separate virtual machines (VMs), is a common "best" practice. Various advantages cited include simpler deployment architectures, easier resource scalability for supporting dynamic application throughput requirements, and support for component-level fault tolerance. This paper presents results from an empirical stu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Federation: Effects of Federated Compute Resources on Quality of Service and Cost*

    Publication Year: 2013, Page(s):31 - 37
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Cloud Federation is one concept to confront challenges that still persist in Cloud Computing, such as vendor lock-in or compliance requirements. The lack of a standardized meaning for the term Cloud Federation has led to multiple conflicting definitions and an unclear prospect of its possible benefits. Taking a client-side perspective on federated compute services, we analyse how choosing a certai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PDS Cloud: Long Term Digital Preservation in the Cloud

    Publication Year: 2013, Page(s):38 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    The emergence of the cloud and advanced object-based storage services provides opportunities to support novel models for long term preservation of digital assets. Among the benefits of this approach is leveraging the cloud's inherent scalability and redundancy to dynamically adapt to evolving needs of digital preservation. PDS Cloud is an OAIS-based preservation-aware storage service employing mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tool for Practical Garbage Collection Analysis in the Cloud

    Publication Year: 2013, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2944 KB) | HTML iconHTML

    Increasingly more and more web applications are migrating to the cloud owing to higher scalability, low cost, and reduced time-to-market. For example, Amazon Web Services (AWS) hosts PBS, Reddit, Netflix, Zynga. Although the elasticity of cloud enables scaling, both up and down, a cluster in response to the incoming traffic, it makes performance modeling and analysis non-trivial. In the context of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Self-Adaptive Cloud Collaborations

    Publication Year: 2013, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    In multi-tenant collaborative cloud systems, the choice of cloud providers is based on pre-negotiated terms and conditions to help meet Service Level Agreements (SLAs) and streamline resource provisioning. However, these collaborations are not self-adaptive to accommodate changes in tenancy requirements, quality of resources and provider capabilities as provider collaborations remain static over t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing Service Orientation to Enable Training as a Service in the U.S. Army

    Publication Year: 2013, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Currently many training systems acquired, fielded and sustained by the U.S. Army are unable to seamlessly comply with a continuously evolving and often complex computational environment. The current state of such training systems must advance to a Training as a Service (TaaS) future state in order to adapt to a volatile defense budget, conform to policy updates, and enhance the training capabiliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Cloud for Enterprise Mobile Services Delivery

    Publication Year: 2013, Page(s):70 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    In this paper, we discuss the advantages of leveraging the cloud to provide a cost-effective and secure platform for the delivery of enterprise mobile services. We describe the various components and functions required for the delivery of those services, along with the components and functions that comprise cost-effective and secure cloud-based mobile services solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers

    Publication Year: 2013, Page(s):78 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of parties are involved in cloud services, it is becoming harder to define a security perimeter that divi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defense-in-Depth Against Malicious Insiders in the Cloud

    Publication Year: 2013, Page(s):88 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a consumer's virtual machine. The problem arises from having multiple virtual machines sharing hardware resources in the same physical host. A security critical resource is random access memory, which in the current version of the Xen hyper visor is vulnerable to attacks. Li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-Level Access Control Management for the Cloud

    Publication Year: 2013, Page(s):98 - 107
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1262 KB) | HTML iconHTML

    One of the major security threats that public cloud computing platforms face today is that the active cloud virtual machine instances are visible and accessible via the public internet, which allows hackers to carry out several types of attacks such as Denial of Service (DoS) and intrusion over along durations which increases the probabilities of successful penetration. Security logs of the failed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware-Layer for Authenticating Mobile Consumers of Amazon S3 Data*

    Publication Year: 2013, Page(s):108 - 113
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Today, most enterprises are embracing the cloud computing paradigm to provide reliable access to business data for mobile consumers. The Amazon Simple Storage Service (Amazon S3) is one platform that is fault tolerant and highly scalable within the cloud provisioning landscape. However, the Amazon S3 facility relies on the submission of multiple identification credentials from the data consumer fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Middleware Guaranteeing Client-Centric Consistency on Top of Eventually Consistent Datastores

    Publication Year: 2013, Page(s):114 - 123
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Applications often have consistency requirements beyond those guaranteed by the underlying eventually consistent storage system. In this work, we present an approach that guarantees monotonic read consistency and read your writes consistency by running a special middleware component on the same server as the application. We evaluate our approach using both simulation and real world experiments on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.