Skip to main content

Advertisement

Log in

A software defined caching framework based on user access behavior analysis for transparent computing server

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

A large number of resource access requests from heterogeneous terminals bring severe challenges to ensuring the performance and efficiency of Tranparent Computing server. Caching mechanism plays a significant role in performance improvement of transparent computing systems. Nevertheless, the existing caching mechanisms do not take into account the complex and volatile runtime context in the server-side, such as the change in users’ access requirements for the resources and server performance status, so that their cache scheduling strategies are lack of flexibility and diversity.Thus, in this paper, we proposed a software defined cache scheduling framework that can dynamically and flexibly schedule appropriate caching policies according to the monitored information to achieve optimal caching performance for transparent computing server. First, we constructed a multi-layer and linked virtual disk storage model and its resource access mechanism. Then, based on this storage model, in order to perceive changes in the users’ demand for server resources, we adopted information entropy to model and analyze the user access behavior, and predict it with exponential smoothing algorithm. Finally, the cache scheduling is defined as an optimization problem from two aspects of prefetching and replacement, and some heuristic algorithms are used to obtain the approximate optimal solutions based on the conclusions of user access behavior analysis and prediction. We made experiments on the real data and tested the effectiveness of our approach, and the results show that our approach can achieve better caching performance than traditional methods, thus improving the service quality and user experience of transparent computing effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Botta A, de Donato W, Persico V, Pescapė A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56(C):684–700

    Article  Google Scholar 

  2. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  3. Zhang Y, Ren J, Liu J, Xu C, Guo H, Liu Y (2017) A survey on emerging computing paradigms for big data. Chin J Electron 26(1):1–12

    Article  Google Scholar 

  4. Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105

    Article  Google Scholar 

  5. Zhang Y, Zhou Y (2006) Transparent computing: a new paradigm for pervasive computing. In: 2006 Proceedings ubiquitous intelligence and computing, 3rd International conference, UIC 2006. Springer, Wuhan, pp 1–11

    Google Scholar 

  6. Zhang Y, Guo K, Ren J, Zhou Y, Wang J, Chen J (2016) Transparent computing: a promising network computing paradigm. Comput Sci Eng 19(1):7–20

    Article  Google Scholar 

  7. Gao Y, Zhang Y, Zhou Y (2012) Performance analysis of virtual disk system for transparent computing In: 9th International conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012, Institute of Electrical and Electronics Engineers (IEEE), pp 470–477

  8. Zhang Y, Zhou Y (2011) Separating computation and storage with storage virtualization. Comput Commun 34(13):1539–1548

    Article  Google Scholar 

  9. Zhang Y, Zhou Y (2012) TransOS: a transparent computing-based operating system for the cloud. Int J Cloud Comput 1(4):287– 301

    Article  Google Scholar 

  10. Wang J, Liu A, Yan T, Zeng Z (2017) A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Networking and Applications 10:1–18

    Article  Google Scholar 

  11. Liu J, Zhou Y, Zhang D (2016) Transim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183

    Article  MathSciNet  Google Scholar 

  12. Wei L, Zhang Y, Zhou Y (2009) Simulation analysis and validation of cache performance in transcom systems. J Tsinghua University Science and Technology 49(10):1700–1703

    Google Scholar 

  13. Gao Y, Zhang Y, Zhou Y (2012) A cache management strategy for transparent computing storage system International conference on trustworthy computing and services. Springer, Berlin, pp 651–658

    Chapter  Google Scholar 

  14. Tang Y, Guo K, Tian B (2017) A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Networking and Applications 11(4):711–722

    Article  Google Scholar 

  15. Guo K, Tang Y, Ma J, Zhang Y (2017) Optimized dependent file fetch middleware in transparent computing platform. Futur Gener Comput Syst 74:199–207

    Article  Google Scholar 

  16. Zhou Y, Philbin J, Li K (2001) The multi-queue replacement algorithm for second level buffer caches. In: Proceedings of the General track: 2001 USENIX annual technical conference, June 25-30, 2001. USENIX Association Berkeley, Boston, pp 91–104

  17. Kantere V, Dash D, François G, Kyriakopoulou S, Ailamaki A (2011) Optimal service pricing for a cloud cache. IEEE Trans Knowl Data Eng 23(9):1345–1358

    Article  Google Scholar 

  18. Banditwattanawong T (2012) From web cache to cloud cache In: International conference on grid and pervasive computing, Springer, pp 1–15

  19. Gardner ES (2006) Exponential smoothing: the state of the art—part ii. Int J Forecast 22(4):637–666

    Article  Google Scholar 

  20. Zhang Y, Zhou Y (2007) 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In: 21st International conference on advanced information networking and applications (AINA 2007), May 21-23, 2007, Niagara Falls. IEEE, Canada, pp 394–403

  21. Yang H, Zhang Y, Wang X, XU P (2006) MRBP2: a transparence computing based remote booting protocol. MINIMICRO SYSTEMS-SHENYANG- 27(9):1657

    Google Scholar 

  22. Li S, Zhou Y, Zhang Y (2017) NSAP+: supporting transparent computing applications with a service-oriented protocol. Comput Sci Eng 19(1):21–28

    Article  Google Scholar 

  23. Peng X, Ren J, She L, Zhang D, Li J, Zhang Y (2018) Boat: a block-streaming app execution scheme for lightweight IoT devices. IEEE Internet Things J 5(3):1816–1829

    Article  Google Scholar 

  24. Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) Dppro: differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093

    Article  Google Scholar 

  25. Gao Y, Zhang Y, Zhou Y (2012) Building a virtual machine-based network storage system for transparent computing. In: 2012 international conference on computer science & service system (csss). IEEE, Institute of Electrical and Electronics Engineers (IEEE), pp 2341–2344

  26. Meyer DT, Aggarwal G, Cully B, Lefebvre G, Feeley MJ, Hutchinson NC, Warfield A (2008) Parallax: virtual disks for virtual machines In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, Association for Computing Machinery (ACM), pp 41–54

  27. Ayres J, Flannick J, Gehrke J, Yiu T (2002) Sequential pattern mining using a bitmap representation. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, July 23-26, 2002. Association for Computing Machinery (ACM), Edmonton, pp 429–435

  28. Zhang J, Li Q, Zhou W (2016) Hdcache: a distributed cache system for real-time cloud services. J Grid Comput 14(3):407–428

    Article  Google Scholar 

  29. Van Hensbergen E, Zhao M (2006) Dynamic policy disk caching for storage networking. Tech rep, IBM Research Division Austin Research Laboratory

  30. Wikipedia (2018) Flashcache [online] Available: https://enwikipediaorg/wiki/Flashcache

  31. Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2015) Characterizing user behavior in mobile internet. IEEE Trans Emerging Topics Comput 3(1):95–106

    Article  Google Scholar 

  32. Abdul-Rahman OA, Aida K (2014) Towards understanding the usage behavior of Google cloud users: the mice and elephants phenomenon In: IEEE 6th international conference on cloud computing technology and science, CloudCom 2014, Singapore, December 15-18, 2014, IEEE Computer Society, pp 272–277

  33. Lq Tian, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling (ICCASM). IEEE, vol 7, pp V7-567

  34. Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150

    Article  Google Scholar 

  35. Taylor JW (2012) Short-term load forecasting with exponentially weighted methods. IEEE Trans Power Syst 27(1):458–464

    Article  MathSciNet  Google Scholar 

  36. de Assis MV, Carvalho LF, Rodrigues JJ, Proenca ML (2013) Holt-winters statistical forecasting and aco metaheuristic for traffic characterization. In: 2013 IEEE International Conference on Communications (ICC). IEEE, pp 2524–2528

  37. Kalekar PS (2004) Time series forecasting using holt-winters exponential smoothing. Kanwal Rekhi School of Information Technology 4329008:1–13

    Google Scholar 

  38. Kim H, Feamster N (2013) Improving network management with software defined networking. IEEE Commun Mag 51(2):114–119

    Article  Google Scholar 

  39. Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk MA, Rindos A (2015) SDDC: a software defined datacenter experimental framework In: 3rd International conference on future internet of things and cloud, FiCloud 2015, Rome, Italy, August 24-26, 2015, IEEE Computer Society, pp 189–194

  40. Jararweh Y, Al-Ayyoub M, Benkhelifa E, Vouk M, Rindos A, et al. (2016) Software defined cloud: survey, system and evaluation. Futur Gener Comput Syst 58:56–74

    Article  Google Scholar 

  41. Zhang J, Zhang X, Wang W (2016) Cache-enabled software defined heterogeneous networks for green and flexible 5g networks. IEEE Access 4:3591–3604

    Google Scholar 

Download references

Acknowledgements

This work was supported by the International Science & Technology Cooperation Program of China under Grant No. 2013DFB10070, National Major Projects of China under Grant 2017ZX06002005, the Scientific research project of Hunan University of Humanities, Science and Technology under Grant No. 2016QN19.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinfang Sheng.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, W., Wang, B., Sheng, J. et al. A software defined caching framework based on user access behavior analysis for transparent computing server. Peer-to-Peer Netw. Appl. 13, 64–81 (2020). https://doi.org/10.1007/s12083-018-0699-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0699-0

Keywords

Navigation