Advertisement

A software defined caching framework based on user access behavior analysis for transparent computing server

  • Weimin Li
  • Bin Wang
  • Jinfang Sheng
  • Xiangyu Hou
  • Lin Chen
  • Jiaguang Liu
Article
  • 9 Downloads

Abstract

A large number of resource access requests from heterogeneous terminals bring severe challenges to ensuring the performance and efficiency of Tranparent Computing server. Caching mechanism plays a significant role in performance improvement of transparent computing systems. Nevertheless, the existing caching mechanisms do not take into account the complex and volatile runtime context in the server-side, such as the change in users’ access requirements for the resources and server performance status, so that their cache scheduling strategies are lack of flexibility and diversity.Thus, in this paper, we proposed a software defined cache scheduling framework that can dynamically and flexibly schedule appropriate caching policies according to the monitored information to achieve optimal caching performance for transparent computing server. First, we constructed a multi-layer and linked virtual disk storage model and its resource access mechanism. Then, based on this storage model, in order to perceive changes in the users’ demand for server resources, we adopted information entropy to model and analyze the user access behavior, and predict it with exponential smoothing algorithm. Finally, the cache scheduling is defined as an optimization problem from two aspects of prefetching and replacement, and some heuristic algorithms are used to obtain the approximate optimal solutions based on the conclusions of user access behavior analysis and prediction. We made experiments on the real data and tested the effectiveness of our approach, and the results show that our approach can achieve better caching performance than traditional methods, thus improving the service quality and user experience of transparent computing effectively.

Keywords

Transparent computing Cache scheduling Software defined User behavior analysis Prediction algorithm 

Notes

Acknowledgements

This work was supported by the International Science & Technology Cooperation Program of China under Grant No. 2013DFB10070, National Major Projects of China under Grant 2017ZX06002005, the Scientific research project of Hunan University of Humanities, Science and Technology under Grant No. 2016QN19.

References

  1. 1.
    Botta A, de Donato W, Persico V, Pescapė A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56(C):684–700Google Scholar
  2. 2.
    Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646Google Scholar
  3. 3.
    Zhang Y, Ren J, Liu J, Xu C, Guo H, Liu Y (2017) A survey on emerging computing paradigms for big data. Chin J Electron 26(1):1–12Google Scholar
  4. 4.
    Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105Google Scholar
  5. 5.
    Zhang Y, Zhou Y (2006) Transparent computing: a new paradigm for pervasive computing. In: 2006 Proceedings ubiquitous intelligence and computing, 3rd International conference, UIC 2006. Springer, Wuhan, pp 1–11Google Scholar
  6. 6.
    Zhang Y, Guo K, Ren J, Zhou Y, Wang J, Chen J (2016) Transparent computing: a promising network computing paradigm. Comput Sci Eng 19(1):7–20Google Scholar
  7. 7.
    Gao Y, Zhang Y, Zhou Y (2012) Performance analysis of virtual disk system for transparent computing In: 9th International conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012, Institute of Electrical and Electronics Engineers (IEEE), pp 470–477Google Scholar
  8. 8.
    Zhang Y, Zhou Y (2011) Separating computation and storage with storage virtualization. Comput Commun 34(13):1539–1548Google Scholar
  9. 9.
    Zhang Y, Zhou Y (2012) TransOS: a transparent computing-based operating system for the cloud. Int J Cloud Comput 1(4):287– 301Google Scholar
  10. 10.
    Wang J, Liu A, Yan T, Zeng Z (2017) A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Networking and Applications 10:1–18Google Scholar
  11. 11.
    Liu J, Zhou Y, Zhang D (2016) Transim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183MathSciNetzbMATHGoogle Scholar
  12. 12.
    Wei L, Zhang Y, Zhou Y (2009) Simulation analysis and validation of cache performance in transcom systems. J Tsinghua University Science and Technology 49(10):1700–1703Google Scholar
  13. 13.
    Gao Y, Zhang Y, Zhou Y (2012) A cache management strategy for transparent computing storage system International conference on trustworthy computing and services. Springer, Berlin, pp 651–658Google Scholar
  14. 14.
    Tang Y, Guo K, Tian B (2017) A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Networking and Applications 11(4):711–722Google Scholar
  15. 15.
    Guo K, Tang Y, Ma J, Zhang Y (2017) Optimized dependent file fetch middleware in transparent computing platform. Futur Gener Comput Syst 74:199–207Google Scholar
  16. 16.
    Zhou Y, Philbin J, Li K (2001) The multi-queue replacement algorithm for second level buffer caches. In: Proceedings of the General track: 2001 USENIX annual technical conference, June 25-30, 2001. USENIX Association Berkeley, Boston, pp 91–104Google Scholar
  17. 17.
    Kantere V, Dash D, François G, Kyriakopoulou S, Ailamaki A (2011) Optimal service pricing for a cloud cache. IEEE Trans Knowl Data Eng 23(9):1345–1358Google Scholar
  18. 18.
    Banditwattanawong T (2012) From web cache to cloud cache In: International conference on grid and pervasive computing, Springer, pp 1–15Google Scholar
  19. 19.
    Gardner ES (2006) Exponential smoothing: the state of the art—part ii. Int J Forecast 22(4):637–666MathSciNetGoogle Scholar
  20. 20.
    Zhang Y, Zhou Y (2007) 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In: 21st International conference on advanced information networking and applications (AINA 2007), May 21-23, 2007, Niagara Falls. IEEE, Canada, pp 394–403Google Scholar
  21. 21.
    Yang H, Zhang Y, Wang X, XU P (2006) MRBP2: a transparence computing based remote booting protocol. MINIMICRO SYSTEMS-SHENYANG- 27(9):1657Google Scholar
  22. 22.
    Li S, Zhou Y, Zhang Y (2017) NSAP+: supporting transparent computing applications with a service-oriented protocol. Comput Sci Eng 19(1):21–28Google Scholar
  23. 23.
    Peng X, Ren J, She L, Zhang D, Li J, Zhang Y (2018) Boat: a block-streaming app execution scheme for lightweight IoT devices. IEEE Internet Things J 5(3):1816–1829Google Scholar
  24. 24.
    Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) Dppro: differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093Google Scholar
  25. 25.
    Gao Y, Zhang Y, Zhou Y (2012) Building a virtual machine-based network storage system for transparent computing. In: 2012 international conference on computer science & service system (csss). IEEE, Institute of Electrical and Electronics Engineers (IEEE), pp 2341–2344Google Scholar
  26. 26.
    Meyer DT, Aggarwal G, Cully B, Lefebvre G, Feeley MJ, Hutchinson NC, Warfield A (2008) Parallax: virtual disks for virtual machines In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, Association for Computing Machinery (ACM), pp 41–54Google Scholar
  27. 27.
    Ayres J, Flannick J, Gehrke J, Yiu T (2002) Sequential pattern mining using a bitmap representation. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, July 23-26, 2002. Association for Computing Machinery (ACM), Edmonton, pp 429–435Google Scholar
  28. 28.
    Zhang J, Li Q, Zhou W (2016) Hdcache: a distributed cache system for real-time cloud services. J Grid Comput 14(3):407–428Google Scholar
  29. 29.
    Van Hensbergen E, Zhao M (2006) Dynamic policy disk caching for storage networking. Tech rep, IBM Research Division Austin Research LaboratoryGoogle Scholar
  30. 30.
    Wikipedia (2018) Flashcache [online] Available: https://enwikipediaorg/wiki/Flashcache
  31. 31.
    Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2015) Characterizing user behavior in mobile internet. IEEE Trans Emerging Topics Comput 3(1):95–106Google Scholar
  32. 32.
    Abdul-Rahman OA, Aida K (2014) Towards understanding the usage behavior of Google cloud users: the mice and elephants phenomenon In: IEEE 6th international conference on cloud computing technology and science, CloudCom 2014, Singapore, December 15-18, 2014, IEEE Computer Society, pp 272–277Google Scholar
  33. 33.
    Lq Tian, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling (ICCASM). IEEE, vol 7, pp V7-567Google Scholar
  34. 34.
    Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150Google Scholar
  35. 35.
    Taylor JW (2012) Short-term load forecasting with exponentially weighted methods. IEEE Trans Power Syst 27(1):458–464Google Scholar
  36. 36.
    de Assis MV, Carvalho LF, Rodrigues JJ, Proenca ML (2013) Holt-winters statistical forecasting and aco metaheuristic for traffic characterization. In: 2013 IEEE International Conference on Communications (ICC). IEEE, pp 2524–2528Google Scholar
  37. 37.
    Kalekar PS (2004) Time series forecasting using holt-winters exponential smoothing. Kanwal Rekhi School of Information Technology 4329008:1–13Google Scholar
  38. 38.
    Kim H, Feamster N (2013) Improving network management with software defined networking. IEEE Commun Mag 51(2):114–119Google Scholar
  39. 39.
    Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk MA, Rindos A (2015) SDDC: a software defined datacenter experimental framework In: 3rd International conference on future internet of things and cloud, FiCloud 2015, Rome, Italy, August 24-26, 2015, IEEE Computer Society, pp 189–194Google Scholar
  40. 40.
    Jararweh Y, Al-Ayyoub M, Benkhelifa E, Vouk M, Rindos A, et al. (2016) Software defined cloud: survey, system and evaluation. Futur Gener Comput Syst 58:56–74Google Scholar
  41. 41.
    Zhang J, Zhang X, Wang W (2016) Cache-enabled software defined heterogeneous networks for green and flexible 5g networks. IEEE Access 4:3591–3604Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina
  2. 2.School of InformationHunan University of Humanities, Science and TechnologyLoudiChina

Personalised recommendations