Distributed Computing and Internet Technology

The School of Computer Science at Tel Aviv University, Israel, has initiated and carried out a project titled “Teaching Computer Science in the Community”. The project aims to introduce scientific thinking and basic computer science concepts in an informal setting to school children from low socio-economic background. The project is implemented as a single semester undergraduate elective course, in which third year computer science students teach in schools and community centers. Here, we describe the spirit, content, and structure of the course and discuss insight we have gained over the last four years of teaching it. Attacks in the Resource-as-a-Service (RaaS) Cloud Context Danielle Movsowitz, Orna Agmon Ben-Yehuda, and Assaf Schuster Technion—Haifa Institute of Technology, Haifa, Israel dani.movso@campus.technion.ac.il, {ladypine, assaf}@cs.technion.ac.il, http://www.cs.technion.ac.il Abstract. The Infrastructure-as-a-Service (IaaS) cloud is evolving towards the Resource-as-a-Service (RaaS) cloud: a cloud which requires economic decisions to be taken in real time by automatic agents. Does the economic angle introduce new vulnerabilities? Can old vulnerabilities be exploited on RaaS clouds from different angles? How should RaaS clouds be designed to protect them from attacks? In this survey we analyze relevant literature in view of RaaS cloud mechanisms and propose directions for the design of RaaS clouds. The Infrastructure-as-a-Service (IaaS) cloud is evolving towards the Resource-as-a-Service (RaaS) cloud: a cloud which requires economic decisions to be taken in real time by automatic agents. Does the economic angle introduce new vulnerabilities? Can old vulnerabilities be exploited on RaaS clouds from different angles? How should RaaS clouds be designed to protect them from attacks? In this survey we analyze relevant literature in view of RaaS cloud mechanisms and propose directions for the design of RaaS clouds. Static and Dynamic Reasoning for SDNs Tim Nelson and Shriram Krishnamurthi

[1]  E. Bretagne Multi-Bid Auctions for Bandwidth Allocation in Communication Networks , 2005 .

[2]  Renato Paes Leme,et al.  On revenue in the generalized second price auction , 2012, WWW.

[3]  Johan Tordsson,et al.  A combined frequency scaling and application elasticity approach for energy-efficient cloud computing , 2014, Sustain. Comput. Informatics Syst..

[4]  Benjamin Farley,et al.  Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) , 2012, CCS.

[5]  Ching-Hsien Hsu,et al.  Optimizing Energy Consumption with Task Consolidation in Clouds , 2014, Inf. Sci..

[6]  Prasanta K. Jana,et al.  An efficient energy saving task consolidation algorithm for cloud computing systems , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[7]  Haibo Chen,et al.  Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[8]  Suman Nath,et al.  Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services , 2008, NSDI.

[9]  Prasanta K. Jana,et al.  Efficient task scheduling algorithms for heterogeneous multi-cloud environment , 2015, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[10]  Michael M. Swift,et al.  Scheduler-based Defenses against Cross-VM Side-channels , 2014, USENIX Security Symposium.

[11]  Meikang Qiu,et al.  Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..

[12]  Madjid Merabti,et al.  Cache Side-Channel Attacks in Cloud Computing , 2015 .

[13]  Ion Stoica,et al.  The Power of Choice in Data-Aware Cluster Scheduling , 2014, OSDI.

[14]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[15]  Binyu Zang,et al.  ADDI: an agent-based extension to UDDI for supply chain management , 2005, Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005..

[16]  Saurabh Kumar,et al.  Energy Efficient Utilization of Resources in Cloud Computing Systems , 2016 .

[17]  Ran Wolff,et al.  Privacy-preserving association rule mining in large-scale distributed systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[18]  Feng Zhao,et al.  Energy aware consolidation for cloud computing , 2008, CLUSTER 2008.

[19]  Michael K. Reiter,et al.  HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.

[20]  Carl A. Waldspurger,et al.  Memory resource management in VMware ESX server , 2002, OSDI '02.

[21]  Huimin He,et al.  Research on the Models to Customize Private UDDI Registry Query Results , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[22]  Matjaz B. Juric,et al.  WSDL and UDDI extensions for version support in web services , 2009, J. Syst. Softw..

[23]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[24]  Liang Hu,et al.  Implementing Data Aware Scheduling In Gfarm(R) Using LSF(TM) Scheduler plugin Mechanism , 2005, GCA.

[25]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[26]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[27]  Gregory A. Koenig,et al.  An Analysis Framework for Investigating the Trade-Offs between System Performance and Energy Consumption in a Heterogeneous Computing Environment , 2013, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum.

[28]  Shonali Krishnaswamy,et al.  Extending UDDI with recommendations: an association analysis approach , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[29]  Wolf-Dietrich Weber,et al.  Power provisioning for a warehouse-sized computer , 2007, ISCA '07.

[30]  Gregory A. Koenig,et al.  Utility Driven Dynamic Resource Management in an Oversubscribed Energy-Constrained Heterogeneous System , 2014, 2014 IEEE International Parallel & Distributed Processing Symposium Workshops.

[31]  Lester Lipsky,et al.  Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.