Higher SLA satisfaction in datacenters with continuous VM placement constraints

In a virtualized datacenter, the Service Level Agreement for an application restricts the Virtual Machines (VMs) placement. An algorithm is in charge of maintaining a placement compatible with the stated constraints. Conventionally, when a placement algorithm computes a schedule of actions to re-arrange the VMs, the constraints ignore the intermediate states of the datacenter to only restrict the resulting placement. This situation may lead to temporary violations of the constraints. In this paper, we discuss the causes of these violations. We then advocate for continuous placement constraints to restrict also the actions schedule. We discuss why their development requires more attention and how the extensible placement algorithm BtrPlace can address this issue.

[1]  Satish Narayanasamy,et al.  DoublePlay: parallelizing sequential logging and replay , 2011, ASPLOS XVI.

[2]  Mendel Rosenblum,et al.  The design and implementation of a log-structured file system , 1991, SOSP '91.

[3]  James Lau,et al.  File System Design for an NFS File Server Appliance , 1994, USENIX Winter.

[4]  Paramvir Bahl,et al.  Towards highly reliable enterprise network services via inference of multi-level dependencies , 2007, SIGCOMM.

[5]  Sanjeev Khanna,et al.  On provenance and privacy , 2010, ICDT '11.

[6]  Yitao Duan,et al.  Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining , 2008, SDM.

[7]  Robert Tappan Morris,et al.  Eyo: Device-Transparent Personal Storage , 2011, USENIX Annual Technical Conference.

[8]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Robbert van Renesse,et al.  Byzantine Chain Replication , 2012, OPODIS.

[10]  Sanjeev Arora,et al.  Probabilistic checking of proofs: a new characterization of NP , 1998, JACM.

[11]  Angela Demke Brown,et al.  Comprehensive kernel instrumentation via dynamic binary translation , 2012, ASPLOS XVII.

[12]  Andrea C. Arpaci-Dusseau,et al.  *-Box: Towards Reliability and Consistency in Dropbox-like File Synchronization Services , 2013, HotStorage.

[13]  Renato J. O. Figueiredo,et al.  A case for grid computing on virtual machines , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[14]  Yitao Duan,et al.  P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users , 2010, USENIX Security Symposium.

[15]  Fabien Hermenier,et al.  BtrPlace: A Flexible Consolidation Manager for Highly Available Applications , 2013, IEEE Transactions on Dependable and Secure Computing.

[16]  Srinath T. V. Setty,et al.  A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.

[17]  Wei Xu,et al.  Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.

[18]  Scott Shenker,et al.  Mostly parallel garbage collection , 1991, PLDI '91.

[19]  Elisabetta Di Nitto,et al.  Reconfiguration Primitives for Self-Adapting Overlays in Distributed Publish-Subscribe Systems , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems.

[20]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.

[21]  David Hardisty,et al.  On the Internet , 2000, Biological Psychiatry.

[22]  Jens Groth,et al.  Short Pairing-Based Non-interactive Zero-Knowledge Arguments , 2010, ASIACRYPT.

[23]  Jeff Huang,et al.  LEAP: lightweight deterministic multi-processor replay of concurrent java programs , 2010, FSE '10.

[24]  Nicholas Nethercote,et al.  How to shadow every byte of memory used by a program , 2007, VEE '07.

[25]  Vijayaraghavan Soundararajan,et al.  The impact of management operations on the virtualized datacenter , 2010, ISCA '10.

[26]  Xavier Lorca,et al.  Bin Repacking Scheduling in Virtualized Datacenters , 2011, CP.

[27]  Jean-Philippe Martin,et al.  Fast Byzantine Consensus , 2006, IEEE Trans. Dependable Secur. Comput..

[28]  Eli Ben-Sasson,et al.  SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.

[29]  Luís E. T. Rodrigues,et al.  Lightweight cooperative logging for fault replication in concurrent programs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[30]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[31]  Calton Pu,et al.  Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[32]  Paul Francis,et al.  SplitX: high-performance private analytics , 2013, SIGCOMM.

[33]  Srinivasan Seshan,et al.  Mercury: a scalable publish-subscribe system for internet games , 2002, NetGames '02.

[34]  Sudarshan Rao Operational Fault Detection in cellular wireless base-stations , 2006, IEEE Transactions on Network and Service Management.

[35]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[36]  J. Gregory Steffan,et al.  Compiler Support for Fine-Grain Software-Only Checkpointing , 2012, CC.

[37]  Benjamin Braun,et al.  Verifying computations with state , 2013, IACR Cryptol. ePrint Arch..

[38]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[39]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[40]  Andreas Haeberlen,et al.  Having your cake and eating it too: routing security with privacy protections , 2011, HotNets-X.

[41]  Gerald J. Popek,et al.  Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.

[42]  Kenneth van Surksum Book: VMware vSphere 4.1 HA and DRS Technical deepdive , 2010 .

[43]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[44]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[45]  Sangmin Lee,et al.  Upright cluster services , 2009, SOSP '09.

[46]  Edward Walker,et al.  Benchmarking Amazon EC2 for High-Performance Scientific Computing , 2008, login Usenix Mag..

[47]  Reza Sherafat Kazemzadeh,et al.  Reliable and Highly Available Distributed Publish/Subscribe Service , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[48]  Xavier Lorca,et al.  Choco: an Open Source Java Constraint Programming Library , 2008 .

[49]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[50]  Mahadev Satyanarayanan,et al.  Scale and performance in a distributed file system , 1988, TOCS.

[51]  Ion Stoica,et al.  ODR: output-deterministic replay for multicore debugging , 2009, SOSP '09.

[52]  Luiz André Barroso,et al.  The Case for Energy-Proportional Computing , 2007, Computer.

[53]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[54]  Carsten Lund,et al.  Proof verification and the hardness of approximation problems , 1998, JACM.

[55]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[56]  Asim Kadav,et al.  Fine-grained fault tolerance using device checkpoints , 2013, ASPLOS '13.

[57]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[58]  Jing Zhang,et al.  A model-based approach to adding autonomic capabilities to network fault management system , 2008, NOMS.

[59]  Brian J. Watson,et al.  Autonomic Virtual Machine Placement in the Data Center , 2008 .

[60]  T. S. Eugene Ng,et al.  The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.

[61]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[62]  Srinath T. V. Setty,et al.  Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.

[63]  Andrea C. Arpaci-Dusseau,et al.  A file is not a file: understanding the I/O behavior of Apple desktop applications , 2011, SOSP 2011.

[64]  Alex Delis,et al.  Hint-Based Execution of Workloads in Clouds with Nefeli , 2013, IEEE Transactions on Parallel and Distributed Systems.

[65]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[66]  Peter Winkler,et al.  Comparing information without leaking it , 1996, CACM.

[67]  Benjamin Braun,et al.  Resolving the conflict between generality and plausibility in verified computation , 2013, EuroSys '13.

[68]  Derek Bruening,et al.  AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.

[69]  Ion Stoica,et al.  Declarative networking , 2009, Commun. ACM.

[70]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[71]  Akshay Kumar,et al.  Granary: Comprehensive Kernel Module Instrumentation , 2012 .

[72]  Peter Desnoyers,et al.  Memory buddies: exploiting page sharing for smart colocation in virtualized data centers , 2009, VEE '09.

[73]  Anees Shaikh,et al.  A Cost-Aware Elasticity Provisioning System for the Cloud , 2011, 2011 31st International Conference on Distributed Computing Systems.

[74]  Michael Dahlin,et al.  Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults , 2009, NSDI.

[75]  Adi Shamir,et al.  IP = PSPACE , 1992, JACM.

[76]  Malgorzata Steinder,et al.  A scalable application placement controller for enterprise data centers , 2007, WWW '07.

[77]  Jeffrey M. Squyres,et al.  Checkpoint/Restart-Enabled Parallel Debugging , 2010, EuroMPI.

[78]  László Babai,et al.  Trading group theory for randomness , 1985, STOC '85.

[79]  Charles Zhang,et al.  Stride: Search-based deterministic replay in polynomial time via bounded linkage , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[80]  Andrzej Kochut,et al.  Dynamic Placement of Virtual Machines for Managing SLA Violations , 2007, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management.

[81]  Nir Shavit,et al.  Software transactional memory , 1995, PODC '95.

[82]  Akshat Verma,et al.  pMapper: Power and Migration Cost Aware Application Placement in Virtualized Systems , 2008, Middleware.

[83]  Aameek Singh,et al.  Server-storage virtualization: integration and load balancing in data centers , 2008, HiPC 2008.

[84]  Marko Vukolic,et al.  The next 700 BFT protocols , 2010, EuroSys '10.

[85]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[86]  Yuanyuan Zhou,et al.  Learning from mistakes: a comprehensive study on real world concurrency bug characteristics , 2008, ASPLOS.

[87]  Andrew J. Blumberg Toward Practical and Unconditional Verification of Remote Computations , 2011, HotOS.

[88]  Ludger Fiege,et al.  Self-stabilizing Publish/Subscribe Systems: Algorithms and Evaluation , 2005, Euro-Par.

[89]  Andrea C. Arpaci-Dusseau,et al.  Optimistic crash consistency , 2013, SOSP.

[90]  Arati Baliga,et al.  Detecting Kernel-Level Rootkits Using Data Structure Invariants , 2011, IEEE Transactions on Dependable and Secure Computing.

[91]  Eitan Farchi,et al.  Concurrent bug patterns and how to test them , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[92]  Bryan Ford Icebergs in the Clouds: The Other Risks of Cloud Computing , 2012, HotCloud.

[93]  Xin Li,et al.  A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility , 2010, USENIX Annual Technical Conference.

[94]  Jia Wang,et al.  Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[95]  Priya Narasimhan,et al.  Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).

[96]  Cristiano Giuffrida,et al.  We Crashed, Now What? , 2010, HotDep.

[97]  Miguel Castro,et al.  Fast byte-granularity software fault isolation , 2009, SOSP '09.

[98]  Fred B. Schneider,et al.  Hypervisor-based fault tolerance , 1996, TOCS.

[99]  Jeffrey Dean,et al.  Designs, Lessons and Advice from Building Large Distributed Systems , 2009 .

[100]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[101]  Madan Musuvathi,et al.  Iterative context bounding for systematic testing of multithreaded programs , 2007, PLDI '07.

[102]  Vikram S. Adve,et al.  LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..

[103]  Alysson Neves Bessani,et al.  DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.

[104]  Samuel T. King,et al.  Recovery domains: an organizing principle for recoverable operating systems , 2009, ASPLOS.

[105]  Yale N. Patt,et al.  Metadata update performance in file systems , 1994, OSDI '94.

[106]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[107]  Xu Chen,et al.  Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions , 2008, OSDI.

[108]  Christof Fetzer,et al.  Automatically Tolerating Arbitrary Faults in Non-malicious Settings , 2013, 2013 Sixth Latin-American Symposium on Dependable Computing.

[109]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[110]  Angelos D. Keromytis,et al.  ASSURE: automatic software self-healing using rescue points , 2009, ASPLOS.

[111]  Toby Velte,et al.  Microsoft Virtualization with Hyper-V , 2009 .

[112]  Craig Gentry,et al.  Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..

[113]  Michael E. Kounavis,et al.  A systematic approach to building high performance software-based CRC generators , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[114]  Gregory Cooper,et al.  Thialfi: a client notification service for internet-scale applications , 2011, SOSP '11.

[115]  Elliot K. Kolodner,et al.  Guaranteeing High Availability Goals for Virtual Machine Placement , 2011, 2011 31st International Conference on Distributed Computing Systems.

[116]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[117]  Kaiwen Zhang,et al.  Total Order in Content-Based Publish/Subscribe Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[118]  Thomas F. Wenisch,et al.  PowerNap: eliminating server idle power , 2009, ASPLOS.

[119]  Hein Meling,et al.  BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration , 2014, OPODIS.

[120]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[121]  Andreas Haeberlen,et al.  NetReview: Detecting When Interdomain Routing Goes Wrong , 2009, NSDI.

[122]  Paramvir Bahl,et al.  Detailed diagnosis in enterprise networks , 2009, SIGCOMM '09.

[123]  Emmett Witchel,et al.  Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.

[124]  Benjamin Braun,et al.  Taking Proof-Based Verified Computation a Few Steps Closer to Practicality , 2012, USENIX Security Symposium.

[125]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[126]  Samuel T. King,et al.  Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.

[127]  Van-Anh Truong,et al.  Availability in Globally Distributed Storage Systems , 2010, OSDI.

[128]  Kaiwen Zhang,et al.  Distributed Ranked Data Dissemination in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[129]  Koen De Bosschere,et al.  JaRec: a portable record/replay environment for multi‐threaded Java applications , 2004, Softw. Pract. Exp..

[130]  Leslie Lamport,et al.  Paxos Made Simple , 2001 .

[131]  Anirudha Sahoo,et al.  On Theory of VM Placement: Anomalies in Existing Methodologies and Their Mitigation Using a Novel Vector Based Approach , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[132]  Gabriel Bracha,et al.  Asynchronous Byzantine Agreement Protocols , 1987, Inf. Comput..

[133]  Haibo Chen,et al.  ORDER: Object centRic DEterministic Replay for Java , 2011, USENIX Annual Technical Conference.

[134]  Todd M. Austin,et al.  A case for unlimited watchpoints , 2012, ASPLOS XVII.

[135]  Yang Wang,et al.  All about Eve: Execute-Verify Replication for Multi-Core Servers , 2012, OSDI.

[136]  Arun Venkataramani,et al.  Black-box and Gray-box Strategies for Virtual Machine Migration , 2007, NSDI.

[137]  工藤 真臣,et al.  VMware vSphere 4 , 2009 .

[138]  Pramod Bhatotia,et al.  Orchestrating the Deployment of Computations in the Cloud with Conductor , 2012, NSDI.

[139]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[140]  Patrick Stuedi,et al.  WhereStore: location-based data storage for mobile devices interacting with the cloud , 2010, MCS '10.

[141]  Yuanyuan Zhou,et al.  PRES: probabilistic replay with execution sketching on multiprocessors , 2009, SOSP '09.

[142]  Johan Tordsson,et al.  Policy-Driven Service Placement Optimization in Federated Clouds , 2011 .

[143]  Geoffrey H. Kuenning,et al.  Automated hoarding for mobile computers , 1997, SOSP.

[144]  Joan Feigenbaum,et al.  Structural cloud audits that protect private information , 2013, CCSW.

[145]  Justin Thaler,et al.  Time-Optimal Interactive Proofs for Circuit Evaluation , 2013, CRYPTO.

[146]  Abhishek Chandra,et al.  Starling: Minimizing Communication Overhead in Virtualized Computing Platforms Using Decentralized Affinity-Aware Migration , 2010, 2010 39th International Conference on Parallel Processing.

[147]  Krishna P. Gummadi,et al.  Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.

[148]  Dhabaleswar K. Panda,et al.  IMCa: A High Performance Caching Front-End for GlusterFS on InfiniBand , 2008, 2008 37th International Conference on Parallel Processing.

[149]  John Paul Walters,et al.  A Comparison of Virtualization Technologies for HPC , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).

[150]  Xin Wu,et al.  NetPilot: automating datacenter network failure mitigation , 2012, SIGCOMM '12.

[151]  Allen Grogan Clement,et al.  UpRight fault tolerance , 2010 .

[152]  François Laburthe,et al.  Cumulative Scheduling with Task Intervals , 1996, JICSLP.

[153]  SoundararajanVijayaraghavan,et al.  The impact of management operations on the virtualized datacenter , 2010 .

[154]  Jason Flinn,et al.  Rethink the sync , 2006, OSDI '06.

[155]  Jong-Deok Choi,et al.  Deterministic replay of Java multithreaded applications , 1998, SPDT '98.

[156]  Xi Wang,et al.  Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.

[157]  Jason Nieh,et al.  Record and transplay: partial checkpointing for replay debugging across heterogeneous systems , 2011, SIGMETRICS '11.

[158]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[159]  Angelos D. Keromytis,et al.  REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points , 2011, IWSEC.

[160]  Silvio Micali,et al.  Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[161]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[162]  Marko Vukolic,et al.  Robust data sharing with key-value stores , 2012, DSN.

[163]  Thomas E. Anderson,et al.  F10: A Fault-Tolerant Engineered Network , 2013, NSDI.

[164]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[165]  Catherine C. Marshall,et al.  Cimbiosys: a platform for content-based partial replication , 2009, NSDI 2009.

[166]  Miguel Castro,et al.  BASE: using abstraction to improve fault tolerance , 2001, SOSP.

[167]  Thomas Schulze,et al.  An energy aware framework for virtual machine placement in cloud federated data centres , 2012, 2012 Third International Conference on Future Systems: Where Energy, Computing and Communication Meet (e-Energy).

[168]  Franz Wotawa,et al.  Fault detection in multi-threaded c++ server applications , 2007, PPOPP.

[169]  David I. August,et al.  SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.

[170]  George Candea,et al.  Execution synthesis: a technique for automated software debugging , 2010, EuroSys '10.

[171]  Jeff Huang,et al.  CLAP: recording local executions to reproduce concurrency failures , 2013, PLDI.

[172]  Gaetano Borriello,et al.  Peer-To-Peer Backup for Personal Area Networks , 2003 .

[173]  Frédéric Cuppens,et al.  Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation , 2004, ICICS.

[174]  Carsten Lund,et al.  Algebraic methods for interactive proof systems , 1992, JACM.

[175]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[176]  Reza Sherafat Kazemzadeh,et al.  Opportunistic Multipath Forwarding in Content-Based Publish/Subscribe Overlays , 2012, Middleware.

[177]  Larry Rudolph,et al.  How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation , 2008, CC.

[178]  Mark Bickford,et al.  Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures , 2008, NSDI.

[179]  David S. Rosenblum,et al.  Design and evaluation of a wide-area event notification service , 2001, TOCS.

[180]  Karl Aberer,et al.  A self-organized, fault-tolerant and scalable replication scheme for cloud storage , 2010, SoCC '10.

[181]  Steven Hand,et al.  The Seven Deadly Sins of Cloud Computing Research , 2012, HotCloud.

[182]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[183]  Yael Tauman Kalai,et al.  Delegating computation: interactive proofs for muggles , 2008, STOC.

[184]  Matías Toril,et al.  Learning of model parameters for fault diagnosis in wireless networks , 2010, Wirel. Networks.

[185]  C. Lee Giles,et al.  CiteSeer x : a cloud perspective , 2010 .

[186]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[187]  Miguel Correia,et al.  Practical Hardening of Crash-Tolerant Systems , 2012, USENIX Annual Technical Conference.

[188]  Bianca Schroeder,et al.  Cosmic rays don't strike twice: understanding the nature of DRAM errors and the implications for system design , 2012, ASPLOS XVII.

[189]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[190]  Benjamin Cheung,et al.  Statistical algorithms in fault detection and prediction: Toward a healthier network , 2005, Bell Labs Technical Journal.

[191]  Harish Patil,et al.  PinADX: an interface for customizable debugging with dynamic instrumentation , 2012, CGO '12.

[192]  Krste Asanovic,et al.  Mondrix: memory isolation for linux using mondriaan memory protection , 2005, SOSP '05.

[193]  Xavier Lorca,et al.  Entropy: a consolidation manager for clusters , 2009, VEE '09.