Middleware for Next Generation Internet Computing7th MW4NG Workshop of the
13th International Middleware Conference 2012
6th MW4SOC 2011
5th MW4SOC 2010
4th MW4SOC 2009
3rd MW4SOC 2008
2nd MW4SOC 2007
1st MW4SOC 2006
December 3 – 7, 2012
While dependability and security become cornerstones of the information society, they are impaired by change, imprecision, and emerging behavior due to scale, dynamism, and heterogeneity. To address these challenges for next generation Internet computing, key extra-functional properties should not be an "add on" or an "end to end task" anymore, but rather built in by means of Middleware.
Service oriented computing, cloud computing, socio-technical systems, and Web 2.0-style applications are important steps for next generation Internet computing, but still fall short when non functional (a.k.a. extra-functional) quality properties (e.g., dependability, security, performance, and scalability) need to be addressed. The emerging Internet communication architecture (e.g., from projects on the Internet of Things, the Future Internet, etc.) also requires middleware support for delivering computing applications and services. We can see many Internet Computing systems following proprietary end-to-end solutions and being weaved with application-specific approaches. This clearly hinders re-use, which can only be successfully leveraged by Middleware-based solutions. This in turn requires new flexibility for Middleware (adaptivity, elasticity, resilience) and new ways of collaboration between Middleware and applications/services.
Therefore, extra-functional quality properties need to be addressed not only by interfacing and communication standards, but also in terms of actual mechanisms, protocols, and algorithms. Some of the challenges are the administrative heterogeneity, the loose coupling between coarse-grained operations and long-running interactions, high dynamicity, and the required flexibility during run-time. Recently, massive-scale (e.g., big data, millions of participating parties in different roles) and mobility were added to the crucial challenges for Internet computing middleware. The workshop consequently presents contributions on how specifically middleware can address the above challenges of next generation Internet computing.
Mon, Dec 3, 2012
09:00–10:30: Session 1
Workshop introduction by workshop chair JosÚ Pereira
The geomorphic view of networking: A network model and its uses
Pamela Zave and Jennifer Rexford
The Internet is evolving away from its original architecture and toward the use of multiple, customized protocol stacks. A pluralistic architecture is best explained by the ``geomorphic view'' of networks, in which each layer is a microcosm of networking, and layers can be instantiated at many different levels, scopes, and purposes. Exploiting the commonalities identified by the geomorphic view, an abstract layer model can lead to architectural insights that help extend communication services, derive design principles, and generate network software.
CLiSuite: Simplifying the Development of Cross-Layer Adaptive Applications
Morten Lindeberg, Vera Goebel and Thomas Plagemann
Mobile multimedia applications often need to adapt in real-time to changes in the network. Such cross-layer adaptation mechanisms retrieve and analyse data from the underlying protocols, e.g., at the link layer. This destroys the independence of applications from network technology that is provided by IP, i.e., applications are ``hard-wired'' to the lower-level protocols they adapt to. We developed CLiSuite to re-create this transparency and at the same time simplify development of cross-layer adaptive applications. CLiSuite enables applications to perform protocol independent cross-layer adaptations through the concept of protocol independent network states and their mapping to protocol specific data. Adaptive application development is simplified by relieving the developer from understanding the details of the lower layer protocols. Efficiency is achieved using core techniques from complex event processing and source filtering. Our ns-3 implementation and extensive simulation studies with two adaptive applications and several network protocols demonstrate the advantages and efficiency of CLiSuite.
The power of software-defined networking: Line-rate content-based routing using OpenFlow
Boris Koldehofe, Frank Duerr, Muhammad Adnan Tariq and Kurt Rothermel
Although a lot of research effort has been invested to support efficient content-based routing, practitioners often fall back to far less expressive communication paradigms like multicast groups. The benefits of content-based routing in minimizing bandwidth consumption are often rendered useless since simpler communication paradigms can in many cases rely on line-rate processing of data packets at the switches of the network providers. Contrary content-based routing protocols face the inherent overhead in matching the content of events against subscriptions leading to far lower throughput rates and higher end-to-end delays. However, recent trends in networking such as software defined networking in combination with network virtualization have a potential to dramatically change the picture. In our opinion this will lead to a much higher acceptance of more sophisticated middleware like content-based routing in applications of the Future Internet. To support our claims we outline in this paper a reference architecture that may be used to built middleware for Future Internet applications. Furthermore, we provide a solution for realizing content-based routing at line-rate relying on this reference architecture and illustrate research problems that may be addressed in the future.
10:30–11:00: Morning Tea/Coffee Break
11:00–13:00: Session 2
Toward efficient and confidentiality-aware federation of access control policies
Maarten Decat, Bert Lagaisse and Wouter Joosen
This paper presents our work in progress on efficient and confidentiality-aware access control for Software-as-a-Service applications. In SaaS, a tenant organization rents access to a shared, typically web-based application. Access control for these applications requires large amounts of fine-grained data, also from the remaining on-premise applications, of which often sensitive application data. With current SaaS applications the provider evaluates both provider and tenant policies. This forces the tenant to disclose its sensitive access control data and limits policy evaluation performance by having to fetch this data. To address these challenges, we propose to decompose the tenant policies and deploy them across tenant and provider in order to evaluate parts of the policies near the data they require as much as possible, while taking into account the tenant confidentiality constraints. We present a policy decomposition algorithm based on a general attribute-based policy model and describe a supporting middleware system. In the future, we plan to refine this work and evaluate the impact on performance using real-life policies from research projects.
Managing service performance in NoSQL distributed storage systems
Maria Chalkiadaki and Kostas Magoutis
In this paper we describe the architecture of a quality-of-service (QoS) infrastructure for achieving controlled application performance over NoSQL distributed storage systems. We present an implementation of our architecture as an extension to the Apache Cassandra storage system and provide results from a preliminary evaluation using the Yahoo Cloud Serving Benchmark (YCSB). Along the way we also present details of an ongoing alternative implementation of our QoS infrastructure in the context of the Apache HBase storage system. Our evaluation provides evidence that our QoS infrastructure can achieve the type of controlled performance required by data intensive performance-critical applications.
Towards Performance Isolation in Multi-tenant SaaS Applications
Stefan Walraven, Tanguy Monheim, Eddy Truyen and Wouter Joosen
Multi-tenancy has shown promising results in achieving high operational cost efficiency by sharing hardware and software resources among multiple customer organisations, called tenants. In the context of cloud computing, this paradigm enables cloud providers to reduce operational costs by dividing resources and to simplify application management and maintenance. Maximum cost efficiency is achieved with application-level multi-tenancy. However, this high level of resource sharing complicates performance isolation between the different tenants, i.e. ensuring compliance with the SLAs of the different tenants and ensuring that the behaviour of one tenant cannot adversely affect the performance of the other tenants.
This paper explores the challenges of performance isolation in the context of multi-tenant SaaS applications. In addition, we propose a middleware architecture to enforce performance isolation based on the tenant-specific SLAs, using a tenant-aware profiler and a scheduler. Our prototype shows promising initial results.
PAPaS: Peer Assisted Publish and Subscribe
Norman Ahmed, Mark Linderman and Jason Bryant
The scalability of a content-based publish subscribe system typically depends on efficient subscription matching (brokering) and dissemination. As the number of subscribers increases, the matching and dissemination processes can increase bandwidth usage and overwhelm the server. Peer Assisted Publish and Subscribe (PAPaS) is a hybrid broker/P2P content-based publish and subscribe (pub/sub) system with varying event sizes. Publishers and subscribers share the burden through self-brokering and dissemination in P2P fashion. The practical implications inherent in combining pub/sub and P2P protocols are explored. Scalability analysis of the overall broker workloads and event distribution are demonstrated to show the benefits of PAPaS. Experimental results show that our approach is simple and highly effective at minimizing the brokering and event forwarding overhead as well as supporting the dynamicity of mobile clients in pub/sub middleware systems.
Moderation by workshop chair
Karl M. Göschka (main contact)
Vienna University of Technology
Phone: +43 664 180 6946
NICTA, Software Systems Research Group, Australia
High Assurance Software Lab, INESC TEC and U. Minho, Portugal
Patrick C. K. Hung
Faculty of Business and IT, University of Ontario Institute of Technology, Canada
This workshop has its own ISBN and will be included in the ACM digital library. Extended versions of the best workshop papers will be invited to be published in a special issue of the Journal of Internet Services and Applications, edited by Fabio Kon and Gordon Blair.