University of Chester

Displaying 1-12 of 12 results

  • White Papers // Feb 2014

    Bursting the Cloud Data Bubble: Towards Transparent Storage Elasticity in IaaS Clouds

    Storage elasticity on IaaS clouds is an important feature for data-intensive workloads: storage requirements can vary greatly during application runtime, making worst-case over provisioning a poor choice that leads to unnecessarily tied-up storage and extra costs for the user. While the ability to adapt dynamically to storage requirements is thus...

    Provided By University of Chester

  • White Papers // Mar 2013

    Towards a Provenance-Aware Distributed Filesystem

    It has become increasingly important to capture and understand the origins and derivation of data (its provenance). A key issue in evaluating the feasibility of data provenance is its performance, overheads, and scalability. This paper presents a provenance-aware distributed filesystem that offers excellent scalability while retaining the provenance overhead negligible...

    Provided By University of Chester

  • White Papers // Nov 2012

    Deploying Bioinformatics Workflows on Clouds With Galaxy and Globus Provision

    Cloud computing is attracting increasing attention as a means of providing users with fast provisioning of computational and storage resources, elastic scaling, and pay-as-you-go pricing. The integration of scientific workflows and Cloud computing has the potential to significantly improve resource utilization, processing speed, and user experience. This paper proposes a...

    Provided By University of Chester

  • White Papers // Aug 2012

    Infrastructure Outsourcing in Multi-Cloud Environment

    Infrastructure clouds created ideal conditions for users to outsource their infrastructure needs by offering on-demand, short-term access, pay-as-you-go business model, the use of virtualization technologies which provide a safe and cost-effective way for users to manage and customize their environments, and sheer convenience, as users and institutions no longer have...

    Provided By University of Chester

  • White Papers // May 2012

    Sketching Distributed Data Provenance

    Users can determine the precise origins of their data by collecting detailed provenance records. However, auditing at a finer grain produces large amounts of metadata. To efficiently manage the collected provenance, several provenance management systems, including SPADE, record provenance on the hosts where it is generated. Distributed provenance raises the...

    Provided By University of Chester

  • White Papers // Apr 2012

    ExM: High-Level Dataflow Programming for Extreme-Scale Systems

    The authors present here the ExM (Extreme-scale Many-task) programming and execution model as a practical solution to the challenges of programming the higher-level logic of complex parallel applications on current petascale and future exascale computing systems. ExM provides an expressive, high-level functional programming model that yields massive concurrency through implicit,...

    Provided By University of Chester

  • White Papers // Feb 2012

    Cloud Computing and Confidential Data: An Analysis of Security Implications and Mitigation Strategies

    The use of an independent ethical hacker to assess the security efforts was critical to the success of this project. In general, the users' were not surprised by the observations made by the ethical hacker. Even the rather basic errors he discovered in configuration which impacted security, although admittedly a...

    Provided By University of Chester

  • White Papers // Oct 2011

    TBA: A Hybrid of Logic and Extensional Access Control Systems

    Logical policy-based access control models are greatly expressive and thus provide the flexibility for administrators to represent a wide variety of authorization policies. Extensional access control models, on the other hand, utilize simple data structures to better enable a less trained and non-administrative workforce to participate in the day-to-day operations...

    Provided By University of Chester

  • White Papers // Oct 2011

    Coasters: Uniform Resource Provisioning and Access for Clouds and Grids

    In this paper, the authors present the Coaster System. It is an automatically-deployed node provisioning (Pilot Job) system for grids, clouds, and ad-hoc desktop-computer networks supporting file staging, on-demand opportunistic multi-node allocation, remote logging, and remote monitoring. The Coaster System has been previously shown to work at scales of thousands...

    Provided By University of Chester

  • White Papers // Jul 2011

    Improving I/O Forwarding Throughput with Data Compression

    While network bandwidth is steadily increasing, it is doing so at a much slower rate than the corresponding increase in CPU performance. This trend has widened the gap between CPU and network speed. In this paper, the authors investigate improvements to I/O performance by exploiting this gap. They harness idle...

    Provided By University of Chester

  • White Papers // Apr 2011

    Flexible Cloud Computing Through Swift Coasters

    Rapid prototyping plays a crucial role for computationally intensive scientific applications. Furthermore, porting such applications on diverse computing infrastructures is not trivial. In today's collaborative scientific endeavors, diverse infrastructures are available to a typical scientific application user. Leveraging from such infrastructure is a significant challenge, however, since each has a...

    Provided By University of Chester

  • White Papers // Nov 2008

    Design and Evaluation of a Collective IO Model for Loosely Coupled Petascale Programming

    Loosely coupled programming is a powerful paradigm for rapidly creating higher-level applications from scientific programs on petascale systems, typically using scripting languages. This paradigm is a form of Many-Task Computing (MTC) which focuses on the passing of data between programs as ordinary files rather than messages. While it has the...

    Provided By University of Chester

  • White Papers // May 2012

    Sketching Distributed Data Provenance

    Users can determine the precise origins of their data by collecting detailed provenance records. However, auditing at a finer grain produces large amounts of metadata. To efficiently manage the collected provenance, several provenance management systems, including SPADE, record provenance on the hosts where it is generated. Distributed provenance raises the...

    Provided By University of Chester

  • White Papers // Aug 2012

    Infrastructure Outsourcing in Multi-Cloud Environment

    Infrastructure clouds created ideal conditions for users to outsource their infrastructure needs by offering on-demand, short-term access, pay-as-you-go business model, the use of virtualization technologies which provide a safe and cost-effective way for users to manage and customize their environments, and sheer convenience, as users and institutions no longer have...

    Provided By University of Chester

  • White Papers // Apr 2012

    ExM: High-Level Dataflow Programming for Extreme-Scale Systems

    The authors present here the ExM (Extreme-scale Many-task) programming and execution model as a practical solution to the challenges of programming the higher-level logic of complex parallel applications on current petascale and future exascale computing systems. ExM provides an expressive, high-level functional programming model that yields massive concurrency through implicit,...

    Provided By University of Chester

  • White Papers // Nov 2012

    Deploying Bioinformatics Workflows on Clouds With Galaxy and Globus Provision

    Cloud computing is attracting increasing attention as a means of providing users with fast provisioning of computational and storage resources, elastic scaling, and pay-as-you-go pricing. The integration of scientific workflows and Cloud computing has the potential to significantly improve resource utilization, processing speed, and user experience. This paper proposes a...

    Provided By University of Chester

  • White Papers // Jul 2011

    Improving I/O Forwarding Throughput with Data Compression

    While network bandwidth is steadily increasing, it is doing so at a much slower rate than the corresponding increase in CPU performance. This trend has widened the gap between CPU and network speed. In this paper, the authors investigate improvements to I/O performance by exploiting this gap. They harness idle...

    Provided By University of Chester

  • White Papers // Oct 2011

    Coasters: Uniform Resource Provisioning and Access for Clouds and Grids

    In this paper, the authors present the Coaster System. It is an automatically-deployed node provisioning (Pilot Job) system for grids, clouds, and ad-hoc desktop-computer networks supporting file staging, on-demand opportunistic multi-node allocation, remote logging, and remote monitoring. The Coaster System has been previously shown to work at scales of thousands...

    Provided By University of Chester

  • White Papers // Apr 2011

    Flexible Cloud Computing Through Swift Coasters

    Rapid prototyping plays a crucial role for computationally intensive scientific applications. Furthermore, porting such applications on diverse computing infrastructures is not trivial. In today's collaborative scientific endeavors, diverse infrastructures are available to a typical scientific application user. Leveraging from such infrastructure is a significant challenge, however, since each has a...

    Provided By University of Chester

  • White Papers // Oct 2011

    TBA: A Hybrid of Logic and Extensional Access Control Systems

    Logical policy-based access control models are greatly expressive and thus provide the flexibility for administrators to represent a wide variety of authorization policies. Extensional access control models, on the other hand, utilize simple data structures to better enable a less trained and non-administrative workforce to participate in the day-to-day operations...

    Provided By University of Chester

  • White Papers // Feb 2012

    Cloud Computing and Confidential Data: An Analysis of Security Implications and Mitigation Strategies

    The use of an independent ethical hacker to assess the security efforts was critical to the success of this project. In general, the users' were not surprised by the observations made by the ethical hacker. Even the rather basic errors he discovered in configuration which impacted security, although admittedly a...

    Provided By University of Chester

  • White Papers // Feb 2014

    Bursting the Cloud Data Bubble: Towards Transparent Storage Elasticity in IaaS Clouds

    Storage elasticity on IaaS clouds is an important feature for data-intensive workloads: storage requirements can vary greatly during application runtime, making worst-case over provisioning a poor choice that leads to unnecessarily tied-up storage and extra costs for the user. While the ability to adapt dynamically to storage requirements is thus...

    Provided By University of Chester

  • White Papers // Nov 2008

    Design and Evaluation of a Collective IO Model for Loosely Coupled Petascale Programming

    Loosely coupled programming is a powerful paradigm for rapidly creating higher-level applications from scientific programs on petascale systems, typically using scripting languages. This paradigm is a form of Many-Task Computing (MTC) which focuses on the passing of data between programs as ordinary files rather than messages. While it has the...

    Provided By University of Chester

  • White Papers // Mar 2013

    Towards a Provenance-Aware Distributed Filesystem

    It has become increasingly important to capture and understand the origins and derivation of data (its provenance). A key issue in evaluating the feasibility of data provenance is its performance, overheads, and scalability. This paper presents a provenance-aware distributed filesystem that offers excellent scalability while retaining the provenance overhead negligible...

    Provided By University of Chester