On the Dependability of Highly Heterogeneous and Open Distributed Systems

This paper introduces an architecture of distributed systems that facilitates the implementation of a substantial range of dependable system properties, i.e., properties that span an entire system, or a set of components dispersed throughout it. This architecture, called GDS, for governed distributed system, governs the system by controlling the flow of messages between its actors, independently of the internals of the interacting actors. This governance is done via an enforced collection of interaction laws organized into a modular and conflict free hierarchical ensemble. This ensemble of laws is sensitive to the history of interaction; and it is enforced in a decentralized manner, and is thus scalable. The dependable system properties that can be implemented under GDS can have the following beneficial consequences, among others: a) the ability to establish regularities over the system, rendering it more coherent, and easier to reason about; b) the ability to provide a degree of trust among the disparate actor of the system; and c) the ability to ensure compliance with interaction protocols that are essential for distributed computing. Consequently, the GDS architecture can have a significant impact on the following important system qualities: security, fault tolerance, auditability, and manageability.

[1]  Zhe Wang,et al.  Fault tolerance in heterogeneous distributed systems , 2014, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[2]  Brian Randell,et al.  Dependability and its threats - A taxonomy , 2004, IFIP Congress Topical Sessions.

[3]  Thu D. Nguyen,et al.  Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions , 2006, J. Comput..

[4]  Naftaly H. Minsky,et al.  Establishing Global Properties of Multi-Agent Systems Via Local Laws , 2006, E4MAS.

[5]  Victoria Ungureanu,et al.  Building reconfiguration primitives into the law of a system , 1996, Proceedings of International Conference on Configurable Distributed Systems.

[6]  Fabio Casati,et al.  Business-oriented management of Web services , 2003, CACM.

[7]  Naftaly H. Minsky,et al.  In Vivo Evolution of Policies that Govern a Distributed System , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.

[8]  Barbara Liskov,et al.  Distributed programming in Argus , 1988, CACM.

[9]  Naftaly H. Minsky,et al.  Decentralized Governance of Distributed Systems via Interaction Control , 2012, Logic Programs, Norms and Action.

[10]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[11]  Judith Bishop,et al.  Aspect-Oriented Programming for a distributed framework : reviewed article , 2006 .

[12]  Bruno Crispo,et al.  xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement , 2010, IFIPTM.

[13]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[14]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[15]  Wade Trappe,et al.  Coordination and Control in Mobile Ubiquitous Computing Applications Using Law Governed Interaction , 2010 .

[16]  Vincenzo De Florio,et al.  A survey of linguistic structures for application-level fault tolerance , 2008, CSUR.

[17]  Naftaly H. Minsky,et al.  Flexible Regulation of Distributed Coalitions , 2003, ESORICS.

[18]  Richard D. Schlichting,et al.  Fail-stop processors: an approach to designing fault-tolerant computing systems , 1983, TOCS.

[19]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[20]  Angelos D. Keromytis,et al.  Implementing a distributed firewall , 2000, CCS.

[21]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[22]  Thierry Turletti,et al.  The case for software-defined networking in heterogeneous networked environments , 2012, CoNEXT Student '12.

[23]  Richard P. Martin,et al.  Human-Aware Computer System Design , 2005, HotOS.

[24]  John C. Knight,et al.  Efficient hierarchic management for reconfiguration of networked information systems , 2004, International Conference on Dependable Systems and Networks, 2004.

[25]  Zhe Wang,et al.  Towards Secure Distributed Hash Table , 2015, CollaborateCom.

[26]  Alexander Artikis,et al.  Specifying norm-governed computational societies , 2009, TOCL.

[27]  Andrea Omicini,et al.  Environment as a first class abstraction in multiagent systems , 2007, Autonomous Agents and Multi-Agent Systems.

[28]  Ji Zhang,et al.  Enabling Safe Dynamic Component-Based Software Adaptation , 2004, WADS.

[29]  Mira Mezini,et al.  Aspect-oriented programming and modular reasoning , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[30]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[31]  Jesper Andersson,et al.  On decentralized self-adaptation: lessons from the trenches and challenges for the future , 2010, SEAMS '10.

[32]  Donald D. Cowan,et al.  An event-driven high level model for the specification of laws in open multi-agent systems , 2009, J. Syst. Softw..

[33]  Ana Cristina Vieira de Melo,et al.  Formalization of an architectural model for exception handling coordination based on CA action concepts , 2010, Sci. Comput. Program..

[34]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.

[35]  Sean W. Smith,et al.  Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors , 1998, USENIX Workshop on Electronic Commerce.

[36]  Atul Prakash,et al.  Methods and limitations of security policy reconciliation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[37]  Jian Hu,et al.  Application of Single sign-on (SSO) in Digital Campus , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).

[38]  Naftaly H. Minsky,et al.  On conditions for self-healing in distributed software systems , 2003, 2003 Autonomic Computing Workshop.

[39]  Natalia Criado,et al.  Norm Enforceability in Electronic Institutions? , 2010, MALLOW.

[40]  Yingying Chen,et al.  The concept of decentralized and secure electronic marketplace , 2008, Electron. Commer. Res..

[41]  Martin K. Purvis,et al.  Institutional Environments: A Framework for the Development of Open Multiagent Systems , 2014, IBERAMIA.

[42]  Paolo Traverso,et al.  Service-Oriented Computing: a Research Roadmap , 2008, Int. J. Cooperative Inf. Syst..

[43]  Victoria Ungureanu,et al.  Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.

[44]  Xuezheng Liu,et al.  D3S: Debugging Deployed Distributed Systems , 2008, NSDI.

[45]  Robbert van Renesse,et al.  Experiences with the Amoeba distributed operating system , 1990, CACM.

[46]  Paola Inverardi,et al.  A Distributed Intrusion Detection Approach for Secure Software Architecture , 2005, EWSA.

[47]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[48]  R. Chadha,et al.  A Cautionary Note About Policy Conflict Resolution , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[49]  Santosh K. Shrivastava Lessons Learned from Building and Using the Arjuna Distributed Programming System , 1994, Dagstuhl Seminar on Distributed Systems.

[50]  Cecília M. F. Rubira,et al.  Fault tolerance in concurrent object-oriented software through coordinated error recovery , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[51]  Valérie Issarny,et al.  Dealing with Multi-policy Security in Large Open Distributed Systems , 1998, ESORICS.

[52]  Valérie Issarny,et al.  Engineering Reconfigurable Distributed Software Systems: Issues Arising for Pervasive Computing , 2006, RODIN Book.

[53]  A. Lazouski,et al.  A Survey of Usage Control in Computer Security , 2008 .

[54]  Jie Xu,et al.  Coordinated exception handling in distributed object systems: from model to system implementation , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[55]  Javier Vázquez-Salceda,et al.  Organizing Multiagent Systems , 2005, Autonomous Agents and Multi-Agent Systems.

[56]  Ken Moody,et al.  Meta-policies for distributed role-based access control systems , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[57]  William G. Griswold,et al.  Getting started with ASPECTJ , 2001, CACM.

[58]  Minsoo Kim,et al.  Hierarchical Policy Model for Managing Heterogeneous Security Systems , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.

[59]  Fred B. Schneider,et al.  Byzantine generals in action: implementing fail-stop processors , 1984, TOCS.

[60]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[61]  Carla Marceau,et al.  Intrusion detection for distributed applications , 1999, CACM.

[62]  Carlos Ribeiro,et al.  A Policy-Oriented Language for Expressing Security Specifications , 2007, Int. J. Netw. Secur..

[63]  Farhad Arbab,et al.  Configuration and dynamic reconfiguration of components using the coordination paradigm , 2001, Future Gener. Comput. Syst..

[64]  Marc Esteva,et al.  AMELI: an agent-based middleware for electronic institutions , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..