The Path to Virtual Machine Images as First Class Provenance
نویسنده
چکیده
The scientific community’s increased exposure to cloud computing has led to increased familiarity with the machine virtualization technology that underpins the cloud. Efforts to define and implement provenance for the cloud are under way. In the meantime, however, an orthogonal idea, aimed at quickly facilitating repeatability and curation, has taken shape. This is the idea of using virtual machine images (VMIs) as authoritative, encapsulated and executable records of computations, especially computations whose results are destined for publication and/or re-use. In this paper we trace the origins of this idea, discuss its strengths and limitations, and outline some of the future steps and potential pitfalls on the path to its realization. We also analyze how this approach differs from, yet composes with traditionally defined provenance.
منابع مشابه
Automatic Interpretation of UltraCam Imagery by Combination of Support Vector Machine and Knowledge-based Systems
With the development of digital sensors, an increasing number of high-resolution images are available. Interpretation of these images is not possible manually, which necessitates seeking for practical, fast and automatic solutions to solve the environmental and location-based management problems. The land cover classification using high-resolution imagery is a difficult process because of the c...
متن کاملMULTI CLASS BRAIN TUMOR CLASSIFICATION OF MRI IMAGES USING HYBRID STRUCTURE DESCRIPTOR AND FUZZY LOGIC BASED RBF KERNEL SVM
Medical Image segmentation is to partition the image into a set of regions that are visually obvious and consistent with respect to some properties such as gray level, texture or color. Brain tumor classification is an imperative and difficult task in cancer radiotherapy. The objective of this research is to examine the use of pattern classification methods for distinguishing different types of...
متن کاملFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment
In this paper we provide tamper proof mechanisms for auditing old log entries as a part of lineage provenance within the virtual machine (VM) environment. For each VM provenance log record we apply SHA1 hash checksums, all encapsulated as huffman compressed codes to enforce log preservation against tampering. Our contribution establishes new formal definitions for the VM log provenance. Additio...
متن کاملVirtual manufacturing cells scheduling considering lotstreaming and sequence dependent setup times
In this paper, a new mathematical model for the problem of job scheduling in virtual manufacturing cells (VMC) is presented to minimizing the completion time of all jobs. Sequence dependent setup times of machines is considered and lot-streaming is possible. In Virtual manufacturing cells, each job has a different processing path and there is a set of machines for processing each operation. The...
متن کاملVirtual Machine Images as Structured Data: The Mirage Image Library
The rise of infrastructure-as-a-service (IaaS) clouds, both private and public, has created new problems in managing large collections of virtual-machine (VM) images. VM images must be kept up-to-date with security patches and scanned for malicious or improperly licensed software. Because images are bulky, attention must be paid to the latencies of deployment and capture. Large collections of V...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012