Proceedings of the 15th International Middleware Conference on - Middleware '14 2014
DOI: 10.1145/2663165.2663327
|View full text |Cite
|
Sign up to set email alerts
|

Stay-Away, protecting sensitive applications from performance interference

Abstract: While co-locating virtual machines improves utilization in\ud resource shared environments, the resulting performance interference\ud between VMs is difficult to model or predict. QoS\ud sensitive applications can suffer from resource co-location\ud with other less short-term resource sensitive or batch applications.\ud The common practice of overprovisioning resources\ud helps to avoid performance interference and guarantee QoS\ud but leads to low machine utilization. Recent work that relies\ud on static appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 33 publications
(11 citation statements)
references
References 28 publications
(23 reference statements)
0
8
0
Order By: Relevance
“…We found limitations in performance isolation required to avoid resource interference across containers, to be able to ensure the quality of the services provided. We developed solutions [28,29] but these are not yet integrated.…”
Section: Related Work In Community Clouds As Open Commonsmentioning
confidence: 99%
See 2 more Smart Citations
“…We found limitations in performance isolation required to avoid resource interference across containers, to be able to ensure the quality of the services provided. We developed solutions [28,29] but these are not yet integrated.…”
Section: Related Work In Community Clouds As Open Commonsmentioning
confidence: 99%
“…Although we found this isolation acceptable in terms of security and privacy, we identified resource isolation and admission control as an area of improvement to ensure the quality of the services provided (see Section 2). We did research and proposed solutions [28,29,53] for performance isolation, including resource prioritisation and pinning, elastic resource provisioning, reactive tuning, and admission control, but any of these are included yet in our software. Given the wide range of essential and optional software and services (IaaS, PaaS, and SaaS) for a decentralised CC, Cloudy can have a similar role in terms of standardisation and unification at the cloud infrastructure and service level as the guifi.net website has had at the network infrastructure level.…”
Section: Cloudy Software For User Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…Such an approach might not be feasible for customers, such as financial companies, who wish to protect their workloads. Stay-Away [46] regulates the performance of a time-sensitive application by proactively throttling other co-located batch applications. However, the authors assume that the class of the application running on a user VM is known, and that the VM performance can be throttled.…”
Section: Related Workmentioning
confidence: 99%
“…However, studies like Ongaro et al, 2 Somani and Chaudhary, 3 and Padala et al 4 have reported that the current implementation of virtual machine monitors could not provide effective performance isolation mechanisms among VMs, and thus, the performance interference cannot be eliminated completely. It has been pointed out in previous studies [5][6][7][8][9] that the VM performance is influenced quite a lot by co-located VMs running simultaneously. Performance interference due to physical resource competition may lead to VM performance degradation, whose extent is closely dependent of the characteristics of VM runtime environments, such as the type of the applications running on other VMs and the number of VMs running at the same time.…”
Section: Introductionmentioning
confidence: 99%