66 research outputs found
Evaluation of wide-area distributed services by SDN-FIT system
A wide area distributed application is affected by network failure due to natural disasters because the servers on which the application operates are distributed geographically in a wide area. Failure Injection Testing (FIT) is a method for verifying fault tolerance of widely distributed applications. In this paper, by limiting network failures to the connection line, whole FIT scenarios are generated and exhaustive evaluation of fault tolerance is performed. Authors evaluate the visualization method of performance data obtained from this evaluation and the reduction of the fault tolerance evaluation cost by the proposed method
Proposal of a Logical Sensor Architecture using WoT-Based Edge Microservices
K. Miyagoshi, Y. Teranishi, T. Kawakami, T. Yoshihisa and S. Shimojo, "Proposal of a Logical Sensor Architecture using WoT-Based Edge Microservices," 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 2020, pp. 1223-1228, doi: 10.1109/COMPSAC48688.2020.00-89.2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) [13-17 July 2020, Madrid, Spain
Architecture of Job scheduling simulator for demand response based resource provisioning
We study a new service model based on the Demand Response (DR) resource provisioning at High Performance Computing (HPC) centers. This DR-based resource provisioning model allows administrators of HPC centers to provide computing services with incentives to users to compensate for the performance loss due to power saving operations. In a power conservation mode, a jobâs performance may decrease, both in terms of a job waiting time and a job execution time. With DR-based resource provisioning, the submitted jobs are divided into two categories, allowed jobs and disallowed jobs, depending on the userâs tolerance in the performance degradation. The allowed jobs, if indeed affected by the power saving operations, will receive compensation in accordance with an incentive system which determines the reward to the user. For designing an appropriate demand response model, we need to focus on the increase in the jobâs execution time and the jobâs waiting time, and the corresponding decrease in the power consumption. These are important factors in deriving an incentive system. Currently, no existing approaches can reliably quantify the effectiveness and the contribution of these factors in HPC job scheduling and resource provisioning. In this paper, we propose a newly developed job scheduling simulator that can evaluate DR-based resource provisioning approach under various operating conditions. We designed and implemented the job scheduling simulator for HPC demand-response resource provisioning using a general-purpose discrete-event simulator. Our experiments show that the job scheduling simulator can properly represent the demand response resource provisioning using different job scheduling scenarios
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
"In this paper, we propose a lightweight multi-receiver encryption scheme for the device to device communications on Internet of Things (IoT) applications. In order
for the individual user to control the disclosure range of
his/her own data directly and to prevent sensitive personal data
disclosure to the trusted third party, the proposed scheme uses
device-generated public keys. For mutual authentication, third
party generates Schnorr-like lightweight identity-based partial
private keys for users. The proposed scheme provides source
authentication, message integrity, replay-attack prevention and
implicit user authentication. In addition to more security properties, computation expensive pairing operations are eliminated
to achieve less time usage for both sender and receiver, which
is favourable property for IoT applications. In this paper, we
showed a proof of security of our scheme, computational cost
comparison and experimental performance evaluations. We
implemented our proposed scheme on real embedded Android
devices and confirmed that it achieves less time cost for both
encryption and decryption comparing with the existing most
efficient certificate-based multi-receiver encryption scheme and
certificateless multi-receiver encryption scheme.
- âŠ