AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
Article Link
Collect
Submit Manuscript
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Regular Paper

Reliability and Incentive of Performance Assessment for Decentralized Clouds

Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
School of Computer Science, China University of Geosciences, Wuhan 430074, China
Graduate School of Information Science and Technology, Osaka University, Osaka 565-0871, Japan
Show Author Information

Abstract

Decentralized cloud platforms have emerged as a promising paradigm to exploit the idle computing resources across the Internet to catch up with the ever-increasing cloud computing demands. As any user or enterprise can be the cloud provider in the decentralized cloud, the performance assessment of the heterogeneous computing resources is of vital significance. However, with the consideration of the untrustworthiness of the participants and the lack of unified performance assessment metric, the performance monitoring reliability and the incentive for cloud providers to offer real and stable performance together constitute the computational performance assessment problem in the decentralized cloud. In this paper, we present a robust performance assessment solution RODE to solve this problem. RODE mainly consists of a performance monitoring mechanism and an assessment of the claimed performance (AoCP) mechanism. The performance monitoring mechanism first generates reliable and verifiable performance monitoring results for the workloads executed by untrusted cloud providers. Based on the performance monitoring results, the AoCP mechanism forms a unified performance assessment metric to incentivize cloud providers to offer performance as claimed. Via extensive experiments, we show RODE can accurately monitor the performance of cloud providers on the premise of reliability, and incentivize cloud providers to honestly present the performance information and maintain the performance stability.

Electronic Supplementary Material

Download File(s)
jcst-37-5-1176-Highlights.pdf (106.5 KB)

References

[1]
Liu H. A measurement study of server utilization in public clouds. In Proc. the 9th International Conference on Dependable, Autonomic and Secure Computing, December 2011, pp. 435-442. DOI: 10.1109/DASC.2011.87.
[2]

Zheng Z, Xie S, Dai H N, Chen X, Wang H. Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 2018, 14(4): 352-375. DOI: 10.1504/IJWGS.2018.10016848.

[3]
Dejun J, Pierre G, Chi C H. EC2 performance analysis for resource provisioning of service-oriented applications. In Proc. the 7th International Conference on Service Oriented Computing Workshop, November 2009, pp. 197-207. DOI: 10.1007/978-3-642-16132-2_19.
[4]
Iosup A, Yigitbasi N, Epema D. On the performance variability of production cloud services. In Proc. the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2011, pp. 104-113. DOI: 10.1109/CCGrid.2011.22.
[5]
Garfinkel S. An evaluation of Amazon's grid computing services: EC2, S3, and SQS. Technical Report, Harvard University, 2007. https://dash.harvard.edu/bitstream/handle/1/24829568/tr-08-07.pdf?sequence=1&isAllowed=y, May 2022.
[6]

Leitner P, Cito J. Patterns in the chaos—A study of performance variation and predictability in public IaaS clouds. ACM Transactions on Internet Technology, 2016, 16(3): Article No. 15. DOI: 10.1145/2885497.

[7]
Cai X, Shi J, Yuan R, Liu C, Zhen W, Chen Q, Li C, Leng J, Guo M. OVERSEE: Outsourcing verification to enable resource sharing in edge environment. In Proc. the 49th International Conference on Parallel Processing, August 2020, Article No. 71. DOI: 10.1145/3404397.3404409.
[8]

Uriarte R B, DeNicola R. Blockchain-based decentralized cloud/fog solutions: Challenges, opportunities, and standards. IEEE Communications Standards Magazine, 2018, 2(3): 22-28. DOI: 10.1109/MCOMSTD.2018.1800020.

[9]

Aslani R, Hakami V, Dehghan M. A token-based incentive mechanism for video streaming applications in peer-to-peer networks. Multimedia Tools and Applications, 2018, 77(12): 14625-14653. DOI: 10.1007/s11042-017-5051-9.

[10]

Samuel MD, Balakrishnan R. A grade-based incentive mechanism with starvation prevention for maintaining fairness in peer-to-peer networks. International Journal of Systems Assurance Engineering and Management, 2012, 3(2): 84-99. DOI: 10.1007/s13198-012-0098-5.

[11]

Zeng F, Chen Y, Yao L, Wu J. A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing. Peer-to-Peer Networking and Applications, 2021, 14(2): 467-481. DOI: 10.1007/s12083-020-00985-4.

[12]

Kang J, Xiong Z, Niyato D, Xie S, Zhang J. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet of Things Journal, 2019, 6(6): 10700-10714. DOI: 10.1109/JIOT.2019.2940820.

[13]

Nwebonyi F N, Martins R, Correia M E. Reputation based approach for improved fairness and robustness in P2P protocols. Peer-to-Peer Networking and Applications, 2019, 12(4): 951-968. DOI: 10.1007/s12083-018-0701-x.

[14]

Paudel A, Chaudhari K, Long C, Gooi H B. Peer-to-peer energy trading in a prosumer-based community microgrid: A game-theoretic model. IEEE Transactions on Industrial Electronics, 2018, 66(8): 6087-6097. DOI: 10.1109/TIE.2018.2874578.

[15]

Tushar W, Yuen C, Mohsenian-Rad H, Saha T, Poor H V, Wood K L. Transforming energy networks via peer-to-peer energy trading: The potential of game-theoretic approaches. IEEE Signal Processing Magazine, 2018, 35(4): 90-111. DOI: 10.1109/MSP.2018.2818327.

[16]

Chen K, Lin J, Song Y. Trading strategy optimization for a prosumer in continuous double auction-based peer-to-peer market: A prediction-integration model. Applied Energy, 2019, 242: 1121-1133. DOI: 10.1016/j.apenergy.2019.03.094.

[17]
Costan V, Devadas S. Intel SGX explained. https://eprint.iacr.org/2016/086.pdf, May 2022.
[18]
Hoekstra M, Lal R, Pappachan P, Phegade V, Del Cuvillo J. Using innovative instructions to create trustworthy software solutions. In Proc. the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, June 2013, Article No. 11. DOI: 10.1145/2487726.2488370.
[19]
Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not. In Proc. the 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, pp. 57-64. DOI: 10.1109/Trustcom.2015.357.
[20]
Sahita R, Caspi D, Huntley B, Scarlata V, Chaikin B, Chhabra S, Aharon A, Ouziel I. Security analysis of confidential-compute instruction set architecture for virtualized workloads. In Proc. the 2021 International Symposium on Secure and Private Execution Environment Design, September 2021, pp. 121-131. DOI: 10.1109/SEED51797.2021.00024.
[21]
AMD. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. White Paper, 2020, https://www.amd.com/system/_les/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf, May 2022.
[22]
Mulligan D P, Petri G, Spinale N, Stockwell G, Vincent H J. Confidential computing—A brave new world. In Proc. the 2021 International Symposium on Secure and Private Execution Environment Design, September 2021, pp. 132-138. DOI: 10.1109/SEED51797.2021.00025.
[23]

Naseri A, Navimipour N J. A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(5): 1851-1864. DOI: 10.1007/s12652-018-0773-8.

[24]

Jatoth C, Gangadharan G R, Fiore U, Buyya R. SEL-CLOUD: A hybrid multi-criteria decision-making model for selection of cloud services. Soft Computing, 2019, 23(13): 4701-4715. DOI: 10.1007/s00500-018-3120-2.

[25]

Temglit N, Chibani A, Djouani K, Nacer M A. A distributed agent-based approach for optimal QoS selection in web of object choreography. IEEE Systems Journal, 2017, 12(2): 1655-1666. DOI: 10.1109/JSYST.2016.2647281.

[26]

Ding S, Wang Z, Wu D S, Olson D L. Utilizing customer satisfaction in ranking prediction for personalized cloud service selection. Decision Support Systems, 2017, 93: 1-10. DOI: 10.1016/j.dss.2016.09.001.

[27]

Al-Faifi A M, Song B, Hassan M M, Alamri A, Gumaei A. Performance prediction model for cloud service selection from smart data. Future Generation Computer Systems, 2018, 85: 97-106. DOI: 10.1016/j.future.2018.03.015.

[28]

Xia Y, Zhou M C, Luo X, Zhu Q, Li J, Huang Y. Stochastic modeling and quality evaluation of infrastructure-as-a-service clouds. IEEE Transactions on Automation Science and Engineering, 2013, 12(1): 162-170. DOI: 10.1109/TASE.2013.2276477.

[29]

Li L, Liu M, Shen W, Cheng G. Recommending mobile services with trustworthy QoS and dynamic user preferences via FAHP and ordinal utility function. IEEE Transactions on Mobile Computing, 2020, 19(2): 419-431. DOI: 10.1109/TMC.2019.2896239.

[30]
Ardagna D, Barbierato E, Evangelinou A, Gianniti E, Gribaudo M, Pinto T, Guimaraes A, Silva A, Almeida J. Performance prediction of cloud-based big data applications. In Proc. the 2018 ACM/SPEC International Conference on Performance Engineering, April 2018, pp. 192-199. DOI: 10.1145/3184407.3184420.
[31]

Zou W, Lo D, Kochhar P S, Le X D, Xia X, Feng Y, Chen Z, Xu B. Smart contract development: Challenges and opportunities. IEEE Transactions on Software Engineering, 2019, 47(10): 2084-2106. DOI: 10.1109/TSE.2019.2942301.

[32]

Wang P, Meng J, Chen J, Liu T, Zhan Y, Tsai W, Jin Z. Smart contract-based negotiation for adaptive QoS-aware service composition. IEEE Transactions on Parallel and Distributed Systems, 2018, 30(6): 1403-1420. DOI: 10.1109/TPDS.2018.2885746.

[33]

Viriyasitavat W, Da Xu L, Bi Z, Hoonsopon D, Charoenruk N. Managing QoS of internet-of-things services using blockchain. IEEE Transactions on Computational Social Systems, 2019, 6(6): 1357-1368. DOI: 10.1109/TCSS.2019.2919667.

[34]
Mauthe N, Kargen U, Shahmehri N. A Large-Scale empirical study of Android app decompilation. In Proc. the 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, March 2021, pp. 400-410. DOI: 10.1109/SANER50967.2021.00044.
[35]
Pawlowski A, Contag M, Van Der Veen V, Ouwehand C, Holz T, Bos H, Athanasopoulos E, Giuffrida C. MARX: Uncovering class hierarchies in C++ programs. In Proc. the 24th Annual Network and Distributed System Security Symposium, Feb. 26-Mar. 1, 2017. DOI: 10.14722/ndss.2017.23096.
[36]
Katz D S, Ruchti J, Schulte E. Using recurrent neural networks for decompilation. In Proc. the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, March 2018, pp. 346-356. DOI: 10.1109/SANER.2018.8330222.
[37]
Arnautov S, Trach B, Gregor F et al. SCONE: Secure Linux containers with Intel SGX. In Proc. the 12th USENIX Symposium on Operating Systems Design and Implementation, Nov. 2016, pp. 689-703.
[38]
Tsai C C, Porter D E, Vij M. Graphene-SGX: A practical library OS for unmodified applications on SGX. In Proc. the 2017 USENIX Annual Technical Conference, July 2017, pp. 645-658.
Journal of Computer Science and Technology
Pages 1176-1199
Cite this article:
Shi J-C, Cai X-Q, Zheng W-L, et al. Reliability and Incentive of Performance Assessment for Decentralized Clouds. Journal of Computer Science and Technology, 2022, 37(5): 1176-1199. https://doi.org/10.1007/s11390-022-2120-y

456

Views

0

Crossref

1

Web of Science

1

Scopus

0

CSCD

Altmetrics

Received: 28 December 2021
Accepted: 21 July 2022
Published: 30 September 2022
©Institute of Computing Technology, Chinese Academy of Sciences 2022
Return