{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:51:29Z","timestamp":1743108689997,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030386504"},{"type":"electronic","value":"9783030386511"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38651-1_15","type":"book-chapter","created":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T12:02:43Z","timestamp":1579348963000},"page":"158-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Logging Service with Distributed Hash Table for Cloud"],"prefix":"10.1007","author":[{"given":"Takayuki","family":"Kushida","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,19]]},"reference":[{"key":"15_CR1","first-page":"012016","volume":"608","author":"S Bagnasco","year":"2015","unstructured":"Bagnasco, S., Berzano, D., Guarise, A., Lusso, S., Masera, M., Vallero, S.: Monitoring of IaaS and scientific applications on the cloud using the elasticsearch ecosystem. J. Phys: Conf. Ser. 608, 012016 (2015)","journal-title":"J. Phys: Conf. Ser."},{"key":"15_CR2","first-page":"022040","volume":"664","author":"S Bagnasco","year":"2015","unstructured":"Bagnasco, S., Berzano, D., Guarise, A., Lusso, S., Masera, M., Vallero, S.: Towards monitoring-as-a-service for scientific computing cloud applications using the elasticsearch ecosystem. J. Phys: Conf. Ser. 664, 022040 (2015)","journal-title":"J. Phys: Conf. Ser."},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2016.64","volume":"33","author":"A Balalaie","year":"2016","unstructured":"Balalaie, A., Heydarnoori, A., Jamshidi, P.: Microservices architecture enables devops: migration to a cloud-native architecture. IEEE Softw. 33(3), 42\u201352 (2016). \nhttps:\/\/doi.org\/10.1109\/MS.2016.64","journal-title":"IEEE Softw."},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1365815.1365816","volume":"26","author":"F Chang","year":"2008","unstructured":"Chang, F., et al.: Bigtable: a distributed storage system for structured data. ACM Trans. Comput. Syst. (TOCS) 26(2), 4 (2008)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"12","key":"15_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2011.6094017","volume":"49","author":"SAD Chaves","year":"2011","unstructured":"Chaves, S.A.D., Uriarte, R.B., Westphall, C.B.: Toward an architecture for monitoring private clouds. IEEE Commun. Mag. 49(12), 130\u2013137 (2011). \nhttps:\/\/doi.org\/10.1109\/MCOM.2011.6094017","journal-title":"IEEE Commun. Mag."},{"key":"15_CR6","unstructured":"Kubernetes Community: Logging architecture in kubernetes (2018). \nhttps:\/\/kubernetes.io\/docs\/concepts\/cluster-administration\/logging\/"},{"key":"15_CR7","unstructured":"LogDNA Company: Logdna web site (2019). \nhttp:\/\/logdna.com"},{"key":"15_CR8","unstructured":"Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M.F., Morris, R.: Designing a DHT for low latency and high throughput. In: NSDI, vol. 4, pp. 85\u201398 (2004)"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"DeCandia, G., et al.: Dynamo: Amazon\u2019s highly available key-value store. In: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 205\u2013220. ACM, New York (2007). \nhttps:\/\/doi.org\/10.1145\/1294261.1294281","DOI":"10.1145\/1294261.1294281"},{"key":"15_CR10","volume-title":"Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine","author":"C Gormley","year":"2015","unstructured":"Gormley, C., Tong, Z.: Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine. O\u2019Reilly Media Inc., Newton (2015)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/3-540-45748-8_23","volume-title":"Peer-to-Peer Systems","author":"M Harren","year":"2002","unstructured":"Harren, M., Hellerstein, J.M., Huebsch, R., Loo, B.T., Shenker, S., Stoica, I.: Complex queries in DHT-based peer-to-peer networks. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 242\u2013250. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45748-8_23"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Ikebe, M., Yoshida, K.: An integrated distributed log management system with metadata for network operation. In: 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 747\u2013750, July 2013. \nhttps:\/\/doi.org\/10.1109\/CISIS.2013.134","DOI":"10.1109\/CISIS.2013.134"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Jiang, C.B., Liu, I.H., Liu, C.G., Chen, Y.C., Li, J.S.: Distributed log system in cloud digital forensics. In: 2016 International Computer Symposium (ICS), pp. 258\u2013263, December 2016. \nhttps:\/\/doi.org\/10.1109\/ICS.2016.0059","DOI":"10.1109\/ICS.2016.0059"},{"key":"15_CR14","unstructured":"Jonas, E., et al.: Cloud programming simplified: a Berkeley view on serverless computing. Technical report UCB\/EECS-2019-3, EECS Department, University of California, Berkeley, February 2019"},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, STOC 1997, pp. 654\u2013663. ACM, New York (1997). \nhttps:\/\/doi.org\/10.1145\/258533.258660","DOI":"10.1145\/258533.258660"},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Oper. Syst. Rev. 44(2), 35\u201340 (2010)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Lin, X., Wang, P., Wu, B.: Log analysis in cloud computing environment with hadoop and spark. In: 2013 5th IEEE International Conference on Broadband Network Multimedia Technology, pp. 273\u2013276, November 2013. \nhttps:\/\/doi.org\/10.1109\/ICBNMT.2013.6823956","DOI":"10.1109\/ICBNMT.2013.6823956"},{"key":"15_CR18","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. NIST special publication 800(145), 7 (2011). \nhttp:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"15_CR19","unstructured":"Rhea, S., Geels, D., Roscoe, T., Kubiatowicz, J., et al.: Handling churn in a DHT. In: Proceedings of the USENIX Annual Technical Conference, Boston, MA, USA, vol. 6, pp. 127\u2013140 (2004)"},{"key":"15_CR20","unstructured":"Shudo, K.: Overlay weaver (2006). \nhttp:\/\/overlayweaver.sourceforge.net"},{"key":"15_CR21","unstructured":"Shudo, K., Tanaka, Y., Sekiguchi, S.: Overlay weaver: an overlay construction toolkit. In: Proceedings of Symposium on Advanced Computing Systems and Infrastructures, pp. 183\u2013191 (2006)"},{"issue":"2","key":"15_CR22","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.comcom.2007.08.002","volume":"31","author":"K Shudo","year":"2008","unstructured":"Shudo, K., Tanaka, Y., Sekiguchi, S.: Overlay weaver: an overlay construction toolkit. Comput. Commun. 31(2), 402\u2013412 (2008)","journal-title":"Comput. Commun."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R., et al.: The hadoop distributed file system. In: MSST, vol. 10, pp. 1\u201310 (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"key":"15_CR24","unstructured":"Sit, E., Morris, R., Kaashoek, M.F.: UsenetDHT: a low-overhead design for Usenet. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008, pp. 133\u2013146. USENIX Association, Berkeley (2008). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1387589.1387599"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica, I., et al.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans. Netw. 11(1), 17\u201332 (2003). \nhttps:\/\/doi.org\/10.1109\/TNET.2002.808407","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Takeda, A., Hashimoto, K., Kitagata, G., Zabir, S.M.S., Kinoshita, T., Shiratori, N.: A new authentication method with distributed hash table for P2P network. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops (AINA Workshops 2008), pp. 483\u2013488, March 2008. \nhttps:\/\/doi.org\/10.1109\/WAINA.2008.203","DOI":"10.1109\/WAINA.2008.203"},{"key":"15_CR27","volume-title":"Distributed Systems: Principles and Paradigms","author":"AS Tanenbaum","year":"2007","unstructured":"Tanenbaum, A.S., Van Steen, M.: Distributed Systems: Principles and Paradigms. Prentice-Hall, Upper Saddle River (2007)"},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/762483.762485","volume":"21","author":"R Van Renesse","year":"2003","unstructured":"Van Renesse, R., Birman, K.P., Vogels, W.: Astrolabe: a robust and scalable technology for distributed system monitoring, management, and data mining. ACM Trans. Comput. Syst. 21(2), 164\u2013206 (2003). \nhttps:\/\/doi.org\/10.1145\/762483.762485","journal-title":"ACM Trans. Comput. Syst."},{"issue":"10\u201310","key":"15_CR29","first-page":"95","volume":"10","author":"M Zaharia","year":"2010","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: cluster computing with working sets. HotCloud 10(10\u201310), 95 (2010)","journal-title":"HotCloud"}],"container-title":["Lecture Notes in Computer Science","Internet of Vehicles. Technologies and Services Toward Smart Cities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38651-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T18:20:40Z","timestamp":1591640440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38651-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030386504","9783030386511"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38651-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IOV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Vehicles","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaohsiung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iov2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cs.ccu.edu.tw\/~conference\/iov2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}