Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems

Constraint consistency errors in distributed systems can lead to fatal consequences when left unobserved and undetected. The primary goal of quality engineers should be to avoid system inconsistencies in general. However, it is typically a much more straight forward process in monolith-like systems with one codebase than in distributed solutions where heterogeneity occurs across modules. In this paper, we raise the research question of what is the existing state-of-the-art and research literature practice when it comes to consistency checking in distributed systems. We conducted a systematic search for existing work and assess the evidence to categorize the approaches and to identify used techniques. Identified works offer interesting directions and achievements. Often the works share tool prototypes and instruments to build on the top of when performing further research in this direction and we share them in this paper. Finally, we discuss open challenges and gaps in this field to promote the interest of the research audience.

[1]  Liming Wang,et al.  DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[2]  B. J. Ferro Castro,et al.  Pattern-Oriented Software Architecture: A System of Patterns , 2009 .

[3]  Cristina V. Lopes,et al.  SourcererCC: Scaling Code Clone Detection to Big-Code , 2015, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[4]  Michael J. Donahoo,et al.  Contextual understanding of microservice architecture: current and future directions , 2018, SIAP.

[5]  Miroslav Bures,et al.  On Matching Log Analysis to Source Code: A Systematic Mapping Study , 2020, RACS.

[6]  Miroslav Bures,et al.  Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study , 2020, RACS.

[7]  Alexander Egyed,et al.  Efficient detection of inconsistencies in a multi-developer engineering environment , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).

[8]  Miroslav Bures,et al.  Aspects of Quality in Internet of Things (IoT) Solutions: A Systematic Mapping Study , 2019, IEEE Access.

[9]  Ying Zou,et al.  Enhancing Source-Based Clone Detection Using Intermediate Representation , 2010, 2010 17th Working Conference on Reverse Engineering.

[10]  Miroslav Bures,et al.  On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices , 2020, IEEE Access.

[11]  Nour Ali,et al.  Towards Micro Service Architecture Recovery: An Empirical Study , 2018, 2018 IEEE International Conference on Software Architecture (ICSA).

[12]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[13]  José Carlos Bregieiro Ribeiro,et al.  Using dynamic analysis of Java bytecode for evolutionary object-oriented unit testing , 2007 .

[14]  Ernesto Damiani,et al.  Test-Based Security Certification of Composite Services , 2018, ACM Trans. Web.

[15]  Albert Zündorf,et al.  A Modeling Method for Systematic Architecture Reconstruction of Microservice-Based Software Systems , 2020, BPMDS/EMMSAD@CAiSE.

[16]  Atif Mashkoor,et al.  Live and global consistency checking in a collaborative engineering environment , 2019, SAC.

[17]  Vitaly Shmatikov,et al.  Fix Me Up: Repairing Access-Control Bugs in Web Applications , 2013, NDSS.

[18]  Maurizio Talamo,et al.  Online and offline conformance checking of inter-organizational business processes with incomplete process logs , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).

[19]  Martin Fowler,et al.  Patterns of Enterprise Application Architecture , 2002 .

[20]  C. Martin 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.

[21]  Kai Petersen,et al.  Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..

[22]  Bin Liang,et al.  Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs , 2018, Communications in Computer and Information Science.

[23]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[24]  Miroslav Bures,et al.  On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends , 2020, RACS.

[25]  Yongwang Zhao,et al.  A Constraint Mechanism for Dynamic Evolution of Service Oriented Systems , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing.

[26]  Vitaly Shmatikov,et al.  A security policy oracle: detecting security holes using multiple API implementations , 2011, PLDI '11.

[27]  Jan Svacina,et al.  On Automated Role-Based Access Control Assessment in Enterprise Systems , 2019 .

[28]  Choirul Anam,et al.  Conventional Software Testing Using White Box Method , 2018 .

[29]  Chanchal Kumar Roy,et al.  Comparison and evaluation of code clone detection techniques and tools: A qualitative approach , 2009, Sci. Comput. Program..

[30]  Maninder Singh,et al.  Software clone detection: A systematic review , 2013, Inf. Softw. Technol..

[31]  Yueming Lu,et al.  A Method of Conflict Detection for Security Policy Based on B+ Tree , 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC).

[32]  Marko Vukolic,et al.  Towards property-based consistency verification , 2016, PaPoC@EuroSys.

[33]  Wolfgang Emmerich,et al.  Flexible consistency checking , 2003, TSEM.

[34]  Maurizio Talamo,et al.  Conformance checking of electronic business processes to secure distributed transactions , 2013, 2013 47th International Carnahan Conference on Security Technology (ICCST).

[35]  Rajshekhar Sunderraman,et al.  A mobile agent approach for global database constraint checking , 2004, SAC '04.

[36]  K. Senthil Kumar,et al.  A Novel Method to Find Time Complexity of an Algorithm by Using Control Flow Graph , 2017, 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC).

[37]  Hélène Kirchner,et al.  Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..