In this paper, we study the problem of decomposing the end-to-end delay into the per-hop delay for each packet, in multi-hop wireless ad hoc networks. Knowledge on the per-hop per-packet delay can greatly improve the network visibility and facilitate network measurement and management. We propose Domo, a passive, lightweight, and accurate delay tomography approach to […]
Archives for October 2017
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
As it has become the norm for cloud providers to host multiple datacenters around the globe, significant demands exist for inter-datacenter data transfers in large volumes, e.g., migration of big data. A challenge arises on how to schedule the bulk data transfers at different urgency levels, in order to fully utilize the available inter-datacenter bandwidth. […]
On the Latency and Energy Efficiency of Distributed Storage Systems
The increase in data storage and power consumption at data-centers has made it imperative to design energy efficient distributed storage systems (DSS). The energy efficiency of DSS is strongly influenced not only by the volume of data, frequency of data access and redundancy in data storage, but also by the heterogeneity exhibited by the DSS […]
Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management
Utility based cloud services can efficiently provide various supportive services to different service providers. Trust negotiations with federated identity management are vital for preserving privacy in open systems such as distributed collaborative systems. However, due to the large amounts of server based communications involved in trust negotiations scalability issues prove to be less cumbersome when […]
kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems
As one of the most popular cloud services, data storage has attracted great attention in recent research efforts. Key-value (k-v) stores have emerged as a popular option for storing and querying billions of key-value pairs. So far, existing methods have been deterministic. Providing such accuracy, however, comes at the cost of memory and CPU time. […]
Mathematical Programming Approach for Revenue Maximization in Cloud Federations
This paper assesses the benefits of cloud federation for cloud providers. Outsourcing and insourcing are explored as means to maximize the revenues of the providers involved in the federation. An exact method using a linear integer program is proposed to optimize the partitioning of the incoming workload across the federation members. A pricing model is […]
Joint Pricing and Capacity Planning in the IaaS Cloud Market
Cloud Computing In the cloud context, pricing and capacity planning are two important factors to the profit of the infrastructure-as-a-service (IaaS) providers. This paper investigates the problem of joint pricing and capacity planning in the IaaS provider market with a set of software-as-a-service (SaaS) providers, where each SaaS provider leases the virtual machines (VMs) from […]
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the files […]
Search Rank Fraud and Malware Detection in Google Play
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps […]
Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
Many of the words in a given document either deliver facts (objective) or express opinions (subjective), respectively, depending on the topics they are involved in. For example, given a bunch of documents, the word “bug” assigned to the topic “order Hemiptera” apparently remarks one object (i.e., one kind of insects), while the same word assigned […]