Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud

Optimized resource utilization and low cost of service has enabled the cloud to become a popular service in today's world. However, rapid scaling, continuous attacks from hackers, dynamic resource provisioning and distributed nature has made it a complex system to manually monitor and manage by system administrators. This paper proposes an effective time-waved framework for monitoring the cloud and reporting undesirable activities with minimum time delay. Next, it presents a mechanism to self-adapt the attacked modules through allocation of healthy ancillary resources. Performance analysis of the proposed framework yields desirable time complexities of 17.0, 26.6, 27.3 and 18.6 seconds for 4 types of attacks tested here. Also, replacing paralyzed cloud virtual machines (vm) with healthy ones requires 8.4 seconds on average, resulting in desirable performance. The experimentation on open source platform show that the proposed schemes enable better monitoring of cloud services.

[1]  David Garlan,et al.  Stitch: A language for architecture-based self-adaptation , 2012, J. Syst. Softw..

[2]  Carlo Ghezzi,et al.  A journey to highly dynamic, self-adaptive service-based applications , 2008, Automated Software Engineering.

[3]  Matteo Pradella,et al.  Context-oriented programming: A software engineering perspective , 2012, J. Syst. Softw..

[4]  Samuel Kounev,et al.  Modeling run-time adaptation at the system architecture level in dynamic service-oriented environments , 2013, Service Oriented Computing and Applications.

[5]  Ladan Tahvildari,et al.  Self-adaptive software: Landscape and research challenges , 2009, TAAS.

[6]  Hui Song,et al.  Supporting runtime software architecture: A bidirectional-transformation-based approach , 2011, J. Syst. Softw..

[7]  Asif Imran,et al.  An empirical investigation of cost-resource optimization for running real-life applications in open source cloud , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).

[8]  Asif Imran,et al.  ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud , 2013, Int. J. Inf. Priv. Secur. Integr..

[9]  Laurence Duchien,et al.  Unifying design and runtime software adaptation using aspect models , 2011, Sci. Comput. Program..

[10]  Shadi Aljawarneh,et al.  Security policy framework and algorithms for web server content protection , 2007 .

[11]  Debzani Deb,et al.  Adding Self-Healing Capabilities into Legacy Object Oriented Application , 2006, International Conference on Autonomic and Autonomous Systems (ICAS'06).

[12]  Bradley R. Schmerl,et al.  Software Engineering for Self-Adaptive Systems: A Second Research Roadmap , 2010, Software Engineering for Self-Adaptive Systems.