Skip to main content
Log in

Reliability and Incentive of Performance Assessment for Decentralized Clouds

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Liu H. A measurement study of server utilization in public clouds. In Proc. the 9th International Conference on Dependable, Autonomic and Secure Computing, December 2011, pp.435-442. https://doi.org/10.1109/DASC.2011.87.

  2. Zheng Z, Xie S, Dai H N, Chen X, Wang H. Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 2018, 14(4): 352-375. https://doi.org/10.1504/IJWGS.2018.10016848.

    Article  Google Scholar 

  3. Dejun J, Pierre G, Chi C H. EC2 performance analysis for resource provisioning of service-oriented applications. In Proc. the 7th International Conference on Service Oriented Computing Workshop, November 2009, pp.197-207. https://doi.org/10.1007/978-3-642-16132-2_19.

  4. Iosup A, Yigitbasi N, Epema D. On the performance variability of production cloud services. In Proc. the 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2011, pp.104-113. https://doi.org/10.1109/CCGrid.2011.22.

  5. Garfinkel S. An evaluation of Amazon’s grid computing services: EC2, S3, and SQS. Technical Report, Harvard University, 2007. https://dash.harvard.edu/bitstream/handle/1/24829568/tr-08-07.pdf?sequence=1&isAllowed=y, May 2022.

  6. Leitner P, Cito J. Patterns in the chaos—A study of performance variation and predictability in public IaaS clouds. ACM Transactions on Internet Technology, 2016, 16(3): Article No. 15. https://doi.org/10.1145/2885497.

  7. Cai X, Shi J, Yuan R, Liu C, Zhen W, Chen Q, Li C, Leng J, Guo M. OVERSEE: Outsourcing verification to enable resource sharing in edge environment. In Proc. the 49th International Conference on Parallel Processing, August 2020, Article No. 71. https://doi.org/10.1145/3404397.3404409.

  8. Uriarte R B, DeNicola R. Blockchain-based decentralized cloud/fog solutions: Challenges, opportunities, and standards. IEEE Communications Standards Magazine, 2018, 2(3): 22-28. https://doi.org/10.1109/MCOMSTD.2018.1800020.

    Article  Google Scholar 

  9. Aslani R, Hakami V, Dehghan M. A token-based incentive mechanism for video streaming applications in peer-to-peer networks. Multimedia Tools and Applications, 2018, 77(12): 14625-14653. https://doi.org/10.1007/s11042-017-5051-9.

    Article  Google Scholar 

  10. Samuel MD, Balakrishnan R. A grade-based incentive mechanism with starvation prevention for maintaining fairness in peer-to-peer networks. International Journal of Systems Assurance Engineering and Management, 2012, 3(2): 84-99. https://doi.org/10.1007/s13198-012-0098-5.

    Article  Google Scholar 

  11. Zeng F, Chen Y, Yao L, Wu J. A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing. Peer-to-Peer Networking and Applications, 2021, 14(2): 467-481. https://doi.org/10.1007/s12083-020-00985-4.

    Article  Google Scholar 

  12. Kang J, Xiong Z, Niyato D, Xie S, Zhang J. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet of Things Journal, 2019, 6(6): 10700-10714. https://doi.org/10.1109/JIOT.2019.2940820.

    Article  Google Scholar 

  13. Nwebonyi F N, Martins R, Correia M E. Reputation based approach for improved fairness and robustness in P2P protocols. Peer-to-Peer Networking and Applications, 2019, 12(4): 951-968. https://doi.org/10.1007/s12083-018-0701-x.

    Article  Google Scholar 

  14. Paudel A, Chaudhari K, Long C, Gooi H B. Peer-to-peer energy trading in a prosumer-based community microgrid: A game-theoretic model. IEEE Transactions on Industrial Electronics, 2018, 66(8): 6087-6097. https://doi.org/10.1109/TIE.2018.2874578.

    Article  Google Scholar 

  15. Tushar W, Yuen C, Mohsenian-Rad H, Saha T, Poor H V, Wood K L. Transforming energy networks via peer-to-peer energy trading: The potential of game-theoretic approaches. IEEE Signal Processing Magazine, 2018, 35(4): 90-111. https://doi.org/10.1109/MSP.2018.2818327.

    Article  Google Scholar 

  16. Chen K, Lin J, Song Y. Trading strategy optimization for a prosumer in continuous double auction-based peer-to-peer market: A prediction-integration model. Applied Energy, 2019, 242: 1121-1133. https://doi.org/10.1016/j.apenergy.2019.03.094.

    Article  Google Scholar 

  17. Costan V, Devadas S. Intel SGX explained. https://eprint.iacr.org/2016/086.pdf, May 2022.

  18. Hoekstra M, Lal R, Pappachan P, Phegade V, Del Cuvillo J. Using innovative instructions to create trustworthy software solutions. In Proc. the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, June 2013, Article No. 11. https://doi.org/10.1145/2487726.2488370.

  19. Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: What it is, and what it is not. In Proc. the 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, pp.57-64. https://doi.org/10.1109/Trustcom.2015.357.

  20. Sahita R, Caspi D, Huntley B, Scarlata V, Chaikin B, Chhabra S, Aharon A, Ouziel I. Security analysis of confidential-compute instruction set architecture for virtualized workloads. In Proc. the 2021 International Symposium on Secure and Private Execution Environment Design, September 2021, pp.121-131. https://doi.org/10.1109/SEED51797.2021.00024.

  21. AMD. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. White Paper, 2020, https://www.amd.com/system/_les/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf, May 2022.

  22. Mulligan D P, Petri G, Spinale N, Stockwell G, Vincent H J. Confidential computing—A brave new world. In Proc. the 2021 International Symposium on Secure and Private Execution Environment Design, September 2021, pp.132-138. https://doi.org/10.1109/SEED51797.2021.00025.

  23. Naseri A, Navimipour N J. A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(5): 1851-1864. https://doi.org/10.1007/s12652-018-0773-8.

    Article  Google Scholar 

  24. Jatoth C, Gangadharan G R, Fiore U, Buyya R. SEL-CLOUD: A hybrid multi-criteria decision-making model for selection of cloud services. Soft Computing, 2019, 23(13): 4701-4715. https://doi.org/10.1007/s00500-018-3120-2.

    Article  Google Scholar 

  25. Temglit N, Chibani A, Djouani K, Nacer M A. A distributed agent-based approach for optimal QoS selection in web of object choreography. IEEE Systems Journal, 2017, 12(2): 1655-1666. https://doi.org/10.1109/JSYST.2016.2647281.

    Article  Google Scholar 

  26. Ding S, Wang Z, Wu D S, Olson D L. Utilizing customer satisfaction in ranking prediction for personalized cloud service selection. Decision Support Systems, 2017, 93: 1-10. https://doi.org/10.1016/j.dss.2016.09.001.

    Article  Google Scholar 

  27. Al-Faifi A M, Song B, Hassan M M, Alamri A, Gumaei A. Performance prediction model for cloud service selection from smart data. Future Generation Computer Systems, 2018, 85: 97-106. https://doi.org/10.1016/j.future.2018.03.015.

    Article  Google Scholar 

  28. Xia Y, Zhou M C, Luo X, Zhu Q, Li J, Huang Y. Stochastic modeling and quality evaluation of infrastructure-as-a-service clouds. IEEE Transactions on Automation Science and Engineering, 2013, 12(1): 162-170. https://doi.org/10.1109/TASE.2013.2276477.

    Article  Google Scholar 

  29. Li L, Liu M, Shen W, Cheng G. Recommending mobile services with trustworthy QoS and dynamic user preferences via FAHP and ordinal utility function. IEEE Transactions on Mobile Computing, 2020, 19(2): 419-431. https://doi.org/10.1109/TMC.2019.2896239.

    Article  Google Scholar 

  30. Ardagna D, Barbierato E, Evangelinou A, Gianniti E, Gribaudo M, Pinto T, Guimaraes A, Silva A, Almeida J. Performance prediction of cloud-based big data applications. In Proc. the 2018 ACM/SPEC International Conference on Performance Engineering, April 2018, pp.192-199. https://doi.org/10.1145/3184407.3184420.

  31. Zou W, Lo D, Kochhar P S, Le X D, Xia X, Feng Y, Chen Z, Xu B. Smart contract development: Challenges and opportunities. IEEE Transactions on Software Engineering, 2019, 47(10): 2084-2106. https://doi.org/10.1109/TSE.2019.2942301.

    Article  Google Scholar 

  32. Wang P, Meng J, Chen J, Liu T, Zhan Y, Tsai W, Jin Z. Smart contract-based negotiation for adaptive QoS-aware service composition. IEEE Transactions on Parallel and Distributed Systems, 2018, 30(6): 1403-1420. https://doi.org/10.1109/TPDS.2018.2885746.

    Article  Google Scholar 

  33. Viriyasitavat W, Da Xu L, Bi Z, Hoonsopon D, Charoenruk N. Managing QoS of internet-of-things services using blockchain. IEEE Transactions on Computational Social Systems, 2019, 6(6): 1357-1368. https://doi.org/10.1109/TCSS.2019.2919667.

    Article  Google Scholar 

  34. Mauthe N, Kargen U, Shahmehri N. A Large-Scale empirical study of Android app decompilation. In Proc. the 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, March 2021, pp.400-410. https://doi.org/10.1109/SANER50967.2021.00044.

  35. Pawlowski A, Contag M, Van Der Veen V, Ouwehand C, Holz T, Bos H, Athanasopoulos E, Giuffrida C. MARX: Uncovering class hierarchies in C++ programs. In Proc. the 24th Annual Network and Distributed System Security Symposium, Feb. 26-Mar. 1, 2017. https://doi.org/10.14722/ndss.2017.23096.

  36. Katz D S, Ruchti J, Schulte E. Using recurrent neural networks for decompilation. In Proc. the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, March 2018, pp.346-356. https://doi.org/10.1109/SANER.2018.8330222.

  37. Arnautov S, Trach B, Gregor F et al. SCONE: Secure Linux containers with Intel SGX. In Proc. the 12th USENIX Symposium on Operating Systems Design and Implementation, Nov. 2016, pp.689-703.

  38. Tsai C C, Porter D E, Vij M. Graphene-SGX: A practical library OS for unmodified applications on SGX. In Proc. the 2017 USENIX Annual Technical Conference, July 2017, pp.645-658.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min-Yi Guo.

Supplementary Information

ESM 1

(PDF 106 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, JC., Cai, XQ., Zheng, WL. et al. Reliability and Incentive of Performance Assessment for Decentralized Clouds. J. Comput. Sci. Technol. 37, 1176–1199 (2022). https://doi.org/10.1007/s11390-022-2120-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-022-2120-y

Keywords

Navigation