2018 17th International Symposium on Parallel and Distributed Computing (ISPDC) 2018
DOI: 10.1109/ispdc2018.2018.00027
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing the Performance of a Microservice-Based Application Deployed on User-Provided Devices

Abstract: It is now feasible for consumers to buy inexpensive devices that can be installed at home and accessed remotely thanks to an Internet connection. Such a simple "self-hosting" can be an alternative to traditional cloud providers, especially for privacy-conscious users. We discuss how a community of users can pool their devices in order to host microservices-based applications, where each microservice is deployed on a different device. The performance of such an application depends heavily on the computing and n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The experiments using an Adult database verify the efficiency of the privacy-preserved model against information loss risks [157]. Moreover, the work in [158] presents a data privacy-preserved PSO algorithm for cloud computing. Especially, the traditional cloud is replaced by a cloud microservice that is deployed at the mobile device instead of remote cloud servers.…”
Section: B Data Privacymentioning
confidence: 74%
See 1 more Smart Citation
“…The experiments using an Adult database verify the efficiency of the privacy-preserved model against information loss risks [157]. Moreover, the work in [158] presents a data privacy-preserved PSO algorithm for cloud computing. Especially, the traditional cloud is replaced by a cloud microservice that is deployed at the mobile device instead of remote cloud servers.…”
Section: B Data Privacymentioning
confidence: 74%
“…Enabled by the high optimization ability by simulating bird predation behavior, SI-based methods such as PSO can build security-preserved network models for 5G IoT networks to promote universal data exchange without compromising data privacy requirements [154]. Recently, some data privacy-preserved SI algorithms are also considered for SDN and cloud computing-based 5G networks [158] by forming service migration functions with privacy awareness. Other SI techniques such as ACO [160] also facilitate the 5G network authentication with bio-inspired algorithms embedded at the network controllers, e.g., SDN controllers, for securing communications and authenticating users with QoS preservation.…”
Section: E Summarymentioning
confidence: 99%
“…We characterized the impact of these variations of the network QoS on the response-time of the photosharing application by deploying its microservices on the same devices used for the above measurements according to the solution presented in (Stevant et al, 2018). The devices are dedicated to this experiment, therefore computing resources are always available for the application.…”
Section: Problem Statementmentioning
confidence: 99%
“…The algorithm used in the Plan function is based on the PSO meta-heuristic presented in (Stevant et al, 2018). A first input parameter for this algorithm is the call-graph of the microservices composing the application, as shown in Figure 1 for the case of the photosharing application.…”
Section: Qos-aware Placement Algorithmmentioning
confidence: 99%
See 1 more Smart Citation