A sufficient and necessary temporal violation handling point selection strategy in cloud workflow

Abstract To deliver high QoS (quality of service) for business process participants, workflow temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal violation handling is the last task in a typical workflow temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding temporal violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based temporal consistency model for business workflows and temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising temporal violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.

[1]  Xiao Liu,et al.  Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems , 2015, Science China Information Sciences.

[2]  Rizos Sakellariou,et al.  A characterization of workflow management systems for extreme-scale applications , 2016, Future Gener. Comput. Syst..

[3]  Xiao Liu,et al.  Predicting temporal violations for parallel business cloud workflows , 2018, Softw. Pract. Exp..

[4]  Xiao Liu,et al.  A Novel Deadline Assignment Strategy for a Large Batch of Parallel Tasks with Soft Deadlines in the Cloud , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[5]  Yushun Fan,et al.  Dynamic Checking and Solution to Temporal Violations in Concurrent Workflow Processes , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  Xuyun Zhang,et al.  Efficient QoS-Aware Service Recommendation for Multi-Tenant Service-Based Systems in Cloud , 2020, IEEE Transactions on Services Computing.

[7]  Yi-Ping Hung,et al.  Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Tao Jin,et al.  Refactor Business Process Models with Maximized Parallelism , 2016, IEEE Transactions on Services Computing.

[9]  Liehuang Zhu,et al.  Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows , 2016, Future Gener. Comput. Syst..

[10]  Flora Amato,et al.  Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services , 2017, Future Gener. Comput. Syst..

[11]  Yun Yang,et al.  Near‐optimal dynamic priority scheduling strategy for instance‐intensive business workflows in cloud computing , 2017, Concurr. Comput. Pract. Exp..

[12]  MengChu Zhou,et al.  Stochastic Modeling and Quality Evaluation of Infrastructure-as-a-Service Clouds , 2015, IEEE Transactions on Automation Science and Engineering.

[13]  Xiao Liu,et al.  Selecting checkpoints along the time line: A novel temporal checkpoint selection strategy for monitoring a batch of parallel business processes , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[14]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[15]  Xiao Liu,et al.  Logistics scheduling based on cloud business workflows , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[16]  Li Li,et al.  A novel dynamic checkpoint selection strategy for time-constrained massive cloud business workflows , 2017, 2017 IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[17]  Xiao Liu,et al.  Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows , 2016, 2016 IEEE International Conference on Services Computing (SCC).

[18]  Abhishek Ranjan,et al.  An Empirical Study of Error Patterns in Industrial Business Process Models , 2014, IEEE Transactions on Services Computing.

[19]  MengChu Zhou,et al.  Stochastic Modeling and Performance Analysis of Migration-Enabled and Error-Prone Clouds , 2015, IEEE Transactions on Industrial Informatics.

[20]  Xiao Liu,et al.  A market-oriented hierarchical scheduling strategy in cloud workflow systems , 2011, The Journal of Supercomputing.

[21]  Jinjun Chen,et al.  Temporal dependency-based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems , 2011, TSEM.

[22]  Jan Vanthienen,et al.  Enabling flexible location-aware business process modeling and execution , 2016, Decis. Support Syst..

[23]  Xiao Liu,et al.  Do we need to handle every temporal violation in scientific workflow systems? , 2014, TSEM.

[24]  Xiao Liu,et al.  Propagation-Aware Temporal Verification for Parallel Business Cloud Workflows , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[25]  Srikumar Venugopal,et al.  Elastic Business Process Management: State of the art and open challenges for BPM in the cloud , 2014, Future Gener. Comput. Syst..

[26]  Xindong Wu,et al.  Data mining with big data , 2014, IEEE Transactions on Knowledge and Data Engineering.

[27]  Xiao Liu,et al.  Workflow temporal verification for monitoring parallel business processes , 2016, J. Softw. Evol. Process..

[28]  Xiao Liu,et al.  An Epidemic Model Based Temporal Violation Prediction Strategy for Large Batch of Parallel Business Cloud Workflows , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[29]  Jun Shen,et al.  Incremental service level agreements violation handling with time impact analysis , 2013, J. Syst. Softw..

[30]  Yuan-Chun Jiang,et al.  Preventing Temporal Violations in Scientific Workflows: Where and How , 2011, IEEE Transactions on Software Engineering.