Current IssuePrevious Issue   Next Issue

Volume 20 No. 1
15 February 2015

Zimu Zhou,Chenshu Wu,Zheng Yang,Yunhao Liu

2015, 20(1): 1-6.   doi:10.1109/TST.2015.7040509
Abstract ( 318 HTML ( 5   PDF(981KB) ( 702 )   Save

Can WiFi signals be used for sensing purpose? The growing PHY layer capabilities of WiFi has made it possible to reuse WiFi signals for both communication and sensing. Sensing via WiFi would enable remote sensing without wearable sensors, simultaneous perception and data transmission without extra communication infrastructure, and contactless sensing in privacy-preserving mode. Due to the popularity of WiFi devices and the ubiquitous deployment of WiFi networks, WiFi-based sensing networks, i...

Tianxiang Miao,Haibo Chen

2015, 20(1): 7-16.   doi:10.1109/TST.2015.7040515
Abstract ( 317 HTML ( 2   PDF(3957KB) ( 311 )   Save

As multi-core processors become the de-facto configuration in modern computers, the adoption of SMP Virtual Machines (VMs) has been increasing, allowing for more efficient use of computing resources. However, because of existence of schedulers in both the hypervisor and the guest VMs, this creates a new research problem, viz., double scheduling. Although double scheduling may cause many issues including lock-holder preemption, vCPU stacking, CPU fragmentation, and priority inversion, prior ap...

Jibin Wang,Zhigang Zhao,Zhaogang Xu,Hu Zhang,Liang Li,Ying Guo

2015, 20(1): 17-27.   doi:10.1109/TST.2015.7040510
Abstract ( 250 HTML ( 1   PDF(1204KB) ( 396 )   Save

Data deduplication is an emerging and widely employed method for current storage systems. As this technology is gradually applied in inline scenarios such as with virtual machines and cloud storage systems, this study proposes a novel deduplication architecture called I-sieve. The goal of I-sieve is to realize a high performance data sieve system based on iSCSI in the cloud storage system. We also design the corresponding index and mapping tables and present a multi-level cache using a solid ...

Chunling Cheng,Jun Li,Ying Wang

2015, 20(1): 28-39.   doi:10.1109/TST.2015.7040511
Abstract ( 237 HTML ( 2   PDF(1150KB) ( 818 )   Save

High energy consumption is one of the key issues of cloud computing systems. Incoming jobs in cloud computing environments have the nature of randomness, and compute nodes have to be powered on all the time to await incoming tasks. This results in a great waste of energy. An energy-saving task scheduling algorithm based on the vacation queuing model for cloud computing systems is proposed in this paper. First, we use the vacation queuing model with exhaustive service to model the task schedul...

Yan Gu,Han Han,Xujie Li,Jie Guo

2015, 20(1): 40-49.   doi:10.1109/TST.2015.7040512
Abstract ( 180 HTML ( 0   PDF(560KB) ( 275 )   Save

Network coding mechanisms, such as COPE, can improve network throughput effectively in Wireless Mesh Networks (WMN). While the Hybrid Wireless Mesh Protocol (HWMP) is suitable for WMN, its extension with COPE does not provide any added benefits; specifically, HWMP cannot establish paths with more coding opportunities. As a result, the advantages of network coding cannot be exploited sufficiently. This paper proposes improvements upon HWMP with a new, network Coding-Aware routing protocol (CAH...

Xiaowei Zhang,Bin Li,Junwu Zhu

2015, 20(1): 50-61.   doi:10.1109/TST.2015.7040513
Abstract ( 257 HTML ( 0   PDF(1503KB) ( 338 )   Save

In this paper, we present a novel, dynamic collaboration cloud platform in which a Combinatorial Auction (CA)-based market model enables the platform to run effectively. The platform can facilitate expense reduction and improve the scalability of the cloud, which is divided into three layers: The user-layer receives requests from end-users, the auction-layer matches the requests with the cloud services provided by the Cloud Service Provider (CSP), and the CSP-layer forms a coalition to improv...

Tao Xu,Dongsheng Wang,Guodong Liu

2015, 20(1): 62-71.   doi:10.1109/TST.2015.7040514
Abstract ( 238 HTML ( 1   PDF(747KB) ( 477 )   Save

The rapid growth of structured data has presented new technological challenges in the research fields of big data and relational database. In this paper, we present an efficient system for managing and analyzing PB level structured data called Banian. Banian overcomes the storage structure limitation of relational database and effectively integrates interactive query with large-scale storage management. It provides a uniform query interface for cross-platform datasets and thus shows favorable...

Xinhua Dong,Ruixuan Li,Heng He,Wanwan Zhou,Zhengyuan Xue,Hao Wu

2015, 20(1): 72-80.   doi:10.1109/TST.2015.7040516
Abstract ( 448 HTML ( 5   PDF(874KB) ( 478 )   Save

Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorit...

Jiaxin Li,Dongsheng Li,Yuming Ye,Xicheng Lu

2015, 20(1): 81-89.   doi:10.1109/TST.2015.7040517
Abstract ( 264 HTML ( 0   PDF(2655KB) ( 317 )   Save

Virtual Machine (VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and the network distance between a tenant's VMs may considerably impact the tenant's Quality of Service (QoS). In this study, we define and formulate the multi-tenant VM allocation problem in cloud data centers, considering the VM requirements of different tenants, and introdu...

Yiwen Zhang,Guangming Cui,Yan Wang,Xing Guo,Shu Zhao

2015, 20(1): 90-99.   doi:10.1109/TST.2015.7040518
Abstract ( 243 HTML ( 0   PDF(1082KB) ( 635 )   Save

Large-scale service composition has become an important research topic in Service-Oriented Computing (SOC). Quality of Service (QoS) has been mostly applied to represent nonfunctional properties of web services and to differentiate those with the same functionality. Many studies for measuring service composition in terms of QoS have been completed. Among current popular optimization methods for service composition, the exhaustion method has some disadvantages such as requiring a large number ...

Zhen Chen,Yuhao Wen,Junwei Cao,Wenxun Zheng,Jiahui Chang,Yinjun Wu,Ge Ma,Mourad Hakmaoui,Guodong Peng

2015, 20(1): 100-115.   doi:10.1109/TST.2015.7040519
Abstract ( 339 HTML ( 0   PDF(2156KB) ( 334 )   Save

With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems (ITAS) for packets or flow records have become more and more widely used in network monitoring, network troubleshooting, and user behavior and experience analysis. Among the three key technologies in ITAS, we focus on bitmap index compression algorithm and give a detailed survey in this paper. ...