Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2020

07-12-2018

A software defined caching framework based on user access behavior analysis for transparent computing server

Authors: Weimin Li, Bin Wang, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu

Published in: Peer-to-Peer Networking and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A large number of resource access requests from heterogeneous terminals bring severe challenges to ensuring the performance and efficiency of Tranparent Computing server. Caching mechanism plays a significant role in performance improvement of transparent computing systems. Nevertheless, the existing caching mechanisms do not take into account the complex and volatile runtime context in the server-side, such as the change in users’ access requirements for the resources and server performance status, so that their cache scheduling strategies are lack of flexibility and diversity.Thus, in this paper, we proposed a software defined cache scheduling framework that can dynamically and flexibly schedule appropriate caching policies according to the monitored information to achieve optimal caching performance for transparent computing server. First, we constructed a multi-layer and linked virtual disk storage model and its resource access mechanism. Then, based on this storage model, in order to perceive changes in the users’ demand for server resources, we adopted information entropy to model and analyze the user access behavior, and predict it with exponential smoothing algorithm. Finally, the cache scheduling is defined as an optimization problem from two aspects of prefetching and replacement, and some heuristic algorithms are used to obtain the approximate optimal solutions based on the conclusions of user access behavior analysis and prediction. We made experiments on the real data and tested the effectiveness of our approach, and the results show that our approach can achieve better caching performance than traditional methods, thus improving the service quality and user experience of transparent computing effectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Botta A, de Donato W, Persico V, Pescapė A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56(C):684–700CrossRef Botta A, de Donato W, Persico V, Pescapė A (2016) Integration of cloud computing and internet of things: a survey. Futur Gener Comput Syst 56(C):684–700CrossRef
2.
go back to reference Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646CrossRef Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646CrossRef
3.
go back to reference Zhang Y, Ren J, Liu J, Xu C, Guo H, Liu Y (2017) A survey on emerging computing paradigms for big data. Chin J Electron 26(1):1–12CrossRef Zhang Y, Ren J, Liu J, Xu C, Guo H, Liu Y (2017) A survey on emerging computing paradigms for big data. Chin J Electron 26(1):1–12CrossRef
4.
go back to reference Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105CrossRef Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105CrossRef
5.
go back to reference Zhang Y, Zhou Y (2006) Transparent computing: a new paradigm for pervasive computing. In: 2006 Proceedings ubiquitous intelligence and computing, 3rd International conference, UIC 2006. Springer, Wuhan, pp 1–11 Zhang Y, Zhou Y (2006) Transparent computing: a new paradigm for pervasive computing. In: 2006 Proceedings ubiquitous intelligence and computing, 3rd International conference, UIC 2006. Springer, Wuhan, pp 1–11
6.
go back to reference Zhang Y, Guo K, Ren J, Zhou Y, Wang J, Chen J (2016) Transparent computing: a promising network computing paradigm. Comput Sci Eng 19(1):7–20CrossRef Zhang Y, Guo K, Ren J, Zhou Y, Wang J, Chen J (2016) Transparent computing: a promising network computing paradigm. Comput Sci Eng 19(1):7–20CrossRef
7.
go back to reference Gao Y, Zhang Y, Zhou Y (2012) Performance analysis of virtual disk system for transparent computing In: 9th International conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012, Institute of Electrical and Electronics Engineers (IEEE), pp 470–477 Gao Y, Zhang Y, Zhou Y (2012) Performance analysis of virtual disk system for transparent computing In: 9th International conference on ubiquitous intelligence and computing and 9th international conference on autonomic and trusted computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012, Institute of Electrical and Electronics Engineers (IEEE), pp 470–477
8.
go back to reference Zhang Y, Zhou Y (2011) Separating computation and storage with storage virtualization. Comput Commun 34(13):1539–1548CrossRef Zhang Y, Zhou Y (2011) Separating computation and storage with storage virtualization. Comput Commun 34(13):1539–1548CrossRef
9.
go back to reference Zhang Y, Zhou Y (2012) TransOS: a transparent computing-based operating system for the cloud. Int J Cloud Comput 1(4):287– 301CrossRef Zhang Y, Zhou Y (2012) TransOS: a transparent computing-based operating system for the cloud. Int J Cloud Comput 1(4):287– 301CrossRef
10.
go back to reference Wang J, Liu A, Yan T, Zeng Z (2017) A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Networking and Applications 10:1–18CrossRef Wang J, Liu A, Yan T, Zeng Z (2017) A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Networking and Applications 10:1–18CrossRef
11.
go back to reference Liu J, Zhou Y, Zhang D (2016) Transim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183MathSciNetCrossRef Liu J, Zhou Y, Zhang D (2016) Transim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171–3183MathSciNetCrossRef
12.
go back to reference Wei L, Zhang Y, Zhou Y (2009) Simulation analysis and validation of cache performance in transcom systems. J Tsinghua University Science and Technology 49(10):1700–1703 Wei L, Zhang Y, Zhou Y (2009) Simulation analysis and validation of cache performance in transcom systems. J Tsinghua University Science and Technology 49(10):1700–1703
13.
go back to reference Gao Y, Zhang Y, Zhou Y (2012) A cache management strategy for transparent computing storage system International conference on trustworthy computing and services. Springer, Berlin, pp 651–658CrossRef Gao Y, Zhang Y, Zhou Y (2012) A cache management strategy for transparent computing storage system International conference on trustworthy computing and services. Springer, Berlin, pp 651–658CrossRef
14.
go back to reference Tang Y, Guo K, Tian B (2017) A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Networking and Applications 11(4):711–722CrossRef Tang Y, Guo K, Tian B (2017) A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Networking and Applications 11(4):711–722CrossRef
15.
go back to reference Guo K, Tang Y, Ma J, Zhang Y (2017) Optimized dependent file fetch middleware in transparent computing platform. Futur Gener Comput Syst 74:199–207CrossRef Guo K, Tang Y, Ma J, Zhang Y (2017) Optimized dependent file fetch middleware in transparent computing platform. Futur Gener Comput Syst 74:199–207CrossRef
16.
go back to reference Zhou Y, Philbin J, Li K (2001) The multi-queue replacement algorithm for second level buffer caches. In: Proceedings of the General track: 2001 USENIX annual technical conference, June 25-30, 2001. USENIX Association Berkeley, Boston, pp 91–104 Zhou Y, Philbin J, Li K (2001) The multi-queue replacement algorithm for second level buffer caches. In: Proceedings of the General track: 2001 USENIX annual technical conference, June 25-30, 2001. USENIX Association Berkeley, Boston, pp 91–104
17.
go back to reference Kantere V, Dash D, François G, Kyriakopoulou S, Ailamaki A (2011) Optimal service pricing for a cloud cache. IEEE Trans Knowl Data Eng 23(9):1345–1358CrossRef Kantere V, Dash D, François G, Kyriakopoulou S, Ailamaki A (2011) Optimal service pricing for a cloud cache. IEEE Trans Knowl Data Eng 23(9):1345–1358CrossRef
18.
go back to reference Banditwattanawong T (2012) From web cache to cloud cache In: International conference on grid and pervasive computing, Springer, pp 1–15 Banditwattanawong T (2012) From web cache to cloud cache In: International conference on grid and pervasive computing, Springer, pp 1–15
19.
go back to reference Gardner ES (2006) Exponential smoothing: the state of the art—part ii. Int J Forecast 22(4):637–666CrossRef Gardner ES (2006) Exponential smoothing: the state of the art—part ii. Int J Forecast 22(4):637–666CrossRef
20.
go back to reference Zhang Y, Zhou Y (2007) 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In: 21st International conference on advanced information networking and applications (AINA 2007), May 21-23, 2007, Niagara Falls. IEEE, Canada, pp 394–403 Zhang Y, Zhou Y (2007) 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In: 21st International conference on advanced information networking and applications (AINA 2007), May 21-23, 2007, Niagara Falls. IEEE, Canada, pp 394–403
21.
go back to reference Yang H, Zhang Y, Wang X, XU P (2006) MRBP2: a transparence computing based remote booting protocol. MINIMICRO SYSTEMS-SHENYANG- 27(9):1657 Yang H, Zhang Y, Wang X, XU P (2006) MRBP2: a transparence computing based remote booting protocol. MINIMICRO SYSTEMS-SHENYANG- 27(9):1657
22.
go back to reference Li S, Zhou Y, Zhang Y (2017) NSAP+: supporting transparent computing applications with a service-oriented protocol. Comput Sci Eng 19(1):21–28CrossRef Li S, Zhou Y, Zhang Y (2017) NSAP+: supporting transparent computing applications with a service-oriented protocol. Comput Sci Eng 19(1):21–28CrossRef
23.
go back to reference Peng X, Ren J, She L, Zhang D, Li J, Zhang Y (2018) Boat: a block-streaming app execution scheme for lightweight IoT devices. IEEE Internet Things J 5(3):1816–1829CrossRef Peng X, Ren J, She L, Zhang D, Li J, Zhang Y (2018) Boat: a block-streaming app execution scheme for lightweight IoT devices. IEEE Internet Things J 5(3):1816–1829CrossRef
24.
go back to reference Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) Dppro: differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093CrossRef Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) Dppro: differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093CrossRef
25.
go back to reference Gao Y, Zhang Y, Zhou Y (2012) Building a virtual machine-based network storage system for transparent computing. In: 2012 international conference on computer science & service system (csss). IEEE, Institute of Electrical and Electronics Engineers (IEEE), pp 2341–2344 Gao Y, Zhang Y, Zhou Y (2012) Building a virtual machine-based network storage system for transparent computing. In: 2012 international conference on computer science & service system (csss). IEEE, Institute of Electrical and Electronics Engineers (IEEE), pp 2341–2344
26.
go back to reference Meyer DT, Aggarwal G, Cully B, Lefebvre G, Feeley MJ, Hutchinson NC, Warfield A (2008) Parallax: virtual disks for virtual machines In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, Association for Computing Machinery (ACM), pp 41–54 Meyer DT, Aggarwal G, Cully B, Lefebvre G, Feeley MJ, Hutchinson NC, Warfield A (2008) Parallax: virtual disks for virtual machines In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, Association for Computing Machinery (ACM), pp 41–54
27.
go back to reference Ayres J, Flannick J, Gehrke J, Yiu T (2002) Sequential pattern mining using a bitmap representation. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, July 23-26, 2002. Association for Computing Machinery (ACM), Edmonton, pp 429–435 Ayres J, Flannick J, Gehrke J, Yiu T (2002) Sequential pattern mining using a bitmap representation. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, July 23-26, 2002. Association for Computing Machinery (ACM), Edmonton, pp 429–435
28.
go back to reference Zhang J, Li Q, Zhou W (2016) Hdcache: a distributed cache system for real-time cloud services. J Grid Comput 14(3):407–428CrossRef Zhang J, Li Q, Zhou W (2016) Hdcache: a distributed cache system for real-time cloud services. J Grid Comput 14(3):407–428CrossRef
29.
go back to reference Van Hensbergen E, Zhao M (2006) Dynamic policy disk caching for storage networking. Tech rep, IBM Research Division Austin Research Laboratory Van Hensbergen E, Zhao M (2006) Dynamic policy disk caching for storage networking. Tech rep, IBM Research Division Austin Research Laboratory
31.
go back to reference Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2015) Characterizing user behavior in mobile internet. IEEE Trans Emerging Topics Comput 3(1):95–106CrossRef Yang J, Qiao Y, Zhang X, He H, Liu F, Cheng G (2015) Characterizing user behavior in mobile internet. IEEE Trans Emerging Topics Comput 3(1):95–106CrossRef
32.
go back to reference Abdul-Rahman OA, Aida K (2014) Towards understanding the usage behavior of Google cloud users: the mice and elephants phenomenon In: IEEE 6th international conference on cloud computing technology and science, CloudCom 2014, Singapore, December 15-18, 2014, IEEE Computer Society, pp 272–277 Abdul-Rahman OA, Aida K (2014) Towards understanding the usage behavior of Google cloud users: the mice and elephants phenomenon In: IEEE 6th international conference on cloud computing technology and science, CloudCom 2014, Singapore, December 15-18, 2014, IEEE Computer Society, pp 272–277
33.
go back to reference Lq Tian, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling (ICCASM). IEEE, vol 7, pp V7-567 Lq Tian, Lin C, Ni Y (2010) Evaluation of user behavior trust in cloud computing. In: 2010 international conference on computer application and system modeling (ICCASM). IEEE, vol 7, pp V7-567
34.
go back to reference Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150CrossRef Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144–150CrossRef
35.
go back to reference Taylor JW (2012) Short-term load forecasting with exponentially weighted methods. IEEE Trans Power Syst 27(1):458–464MathSciNetCrossRef Taylor JW (2012) Short-term load forecasting with exponentially weighted methods. IEEE Trans Power Syst 27(1):458–464MathSciNetCrossRef
36.
go back to reference de Assis MV, Carvalho LF, Rodrigues JJ, Proenca ML (2013) Holt-winters statistical forecasting and aco metaheuristic for traffic characterization. In: 2013 IEEE International Conference on Communications (ICC). IEEE, pp 2524–2528 de Assis MV, Carvalho LF, Rodrigues JJ, Proenca ML (2013) Holt-winters statistical forecasting and aco metaheuristic for traffic characterization. In: 2013 IEEE International Conference on Communications (ICC). IEEE, pp 2524–2528
37.
go back to reference Kalekar PS (2004) Time series forecasting using holt-winters exponential smoothing. Kanwal Rekhi School of Information Technology 4329008:1–13 Kalekar PS (2004) Time series forecasting using holt-winters exponential smoothing. Kanwal Rekhi School of Information Technology 4329008:1–13
38.
go back to reference Kim H, Feamster N (2013) Improving network management with software defined networking. IEEE Commun Mag 51(2):114–119CrossRef Kim H, Feamster N (2013) Improving network management with software defined networking. IEEE Commun Mag 51(2):114–119CrossRef
39.
go back to reference Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk MA, Rindos A (2015) SDDC: a software defined datacenter experimental framework In: 3rd International conference on future internet of things and cloud, FiCloud 2015, Rome, Italy, August 24-26, 2015, IEEE Computer Society, pp 189–194 Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk MA, Rindos A (2015) SDDC: a software defined datacenter experimental framework In: 3rd International conference on future internet of things and cloud, FiCloud 2015, Rome, Italy, August 24-26, 2015, IEEE Computer Society, pp 189–194
40.
go back to reference Jararweh Y, Al-Ayyoub M, Benkhelifa E, Vouk M, Rindos A, et al. (2016) Software defined cloud: survey, system and evaluation. Futur Gener Comput Syst 58:56–74CrossRef Jararweh Y, Al-Ayyoub M, Benkhelifa E, Vouk M, Rindos A, et al. (2016) Software defined cloud: survey, system and evaluation. Futur Gener Comput Syst 58:56–74CrossRef
41.
go back to reference Zhang J, Zhang X, Wang W (2016) Cache-enabled software defined heterogeneous networks for green and flexible 5g networks. IEEE Access 4:3591–3604 Zhang J, Zhang X, Wang W (2016) Cache-enabled software defined heterogeneous networks for green and flexible 5g networks. IEEE Access 4:3591–3604
Metadata
Title
A software defined caching framework based on user access behavior analysis for transparent computing server
Authors
Weimin Li
Bin Wang
Jinfang Sheng
Xiangyu Hou
Lin Chen
Jiaguang Liu
Publication date
07-12-2018
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-018-0699-0

Other articles of this Issue 1/2020

Peer-to-Peer Networking and Applications 1/2020 Go to the issue

Premium Partner