Fault Tolerant Architecture to Cloud Computing Using Adaptive Checkpoint

Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. Failures of any type are common in current datacenters, partly due to the number of nodes. Fault tolerance has become a major task for computer engineers and software developers because the occurrence of faults increases the cost of using resources and to meet the user expectations, the most fundamental user expectation is, of course, that his or her application correctly finishes independent of faults in the node. This paper proposes a fault tolerant architecture to Cloud Computing that uses an adaptive Checkpoint mechanism to assure that a task running can correctly finish in spite of faults in the nodes in which it is running. The proposed fault tolerant architecture is simultaneously transparent and scalable.

[1]  Mario Piattini,et al.  Security Engineering for Cloud Computing: Approaches and Tools , 2012 .

[2]  Carina Ihlström Eriksson,et al.  A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper , 2009, Int. J. E Serv. Mob. Appl..

[3]  Yannis Charalabidis,et al.  Investigating the Landscape in National Interoperability Frameworks , 2010, Int. J. E Serv. Mob. Appl..

[4]  Andrew Warfield,et al.  Parallax: Managing Storage for a Million Machines , 2005, HotOS.

[5]  Ada Scupola Innovative Mobile Platform Developments for Electronic Services Design and Delivery , 2012 .

[6]  Suresh Sankaranarayanan,et al.  Applications of Intelligent Agents in Hospital Search and Appointment System , 2011, Int. J. E Serv. Mob. Appl..

[7]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[8]  Nicole B. Koppel,et al.  InformatIon SyStemS In the ServIce Sector , 2010 .

[9]  Ronggong Song,et al.  Trust in E-services: Technologies, Practices and Challenges , 2007 .

[10]  Jordi Torres,et al.  Checkpoint-based fault-tolerant infrastructure for virtualized service providers , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[11]  Marijn Janssen,et al.  Electronic Intermediaries Managing and Orchestrating Organizational Networks Using E-Services , 2009, Int. J. E Serv. Mob. Appl..

[12]  Zibin Zheng,et al.  FTCloud: A Component Ranking Framework for Fault-Tolerant Cloud Applications , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.

[13]  Karl Aberer,et al.  A self-organized, fault-tolerant and scalable replication scheme for cloud storage , 2010, SoCC '10.

[14]  Michitaka Kosaka,et al.  Progressive Trends in Knowledge and System-Based Science for Service Innovation , 2013 .

[15]  Geoffroy Vallée,et al.  Checkpoint/Restart of Virtual Machines Based on Xen , 2006 .

[16]  Hong Va Leong,et al.  Database Support for M-Commerce and L-Commerce , 2009 .

[17]  Ralf Reichwald,et al.  Creating Effective Customer Solutions: A Process-Oriented Perspective , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..

[18]  Borko Furht,et al.  Cloud Computing Fundamentals , 2010, Handbook of Cloud Computing.

[19]  Jing Deng,et al.  Fault-tolerant and reliable computation in cloud computing , 2010, 2010 IEEE Globecom Workshops.

[20]  Katinka Wolter Stochastic Models for Fault Tolerance - Restart, Rejuvenation and Checkpointing , 2010 .

[21]  Rajkumar Buyya,et al.  Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities , 2009, 2009 International Conference on High Performance Computing & Simulation.

[22]  Vijay Varadharajan,et al.  A Unified Taxonomy Framework of Trust , 2007 .

[23]  L. Alvisi,et al.  A Survey of Rollback-Recovery Protocols , 2002 .

[24]  Ed Simon Protecting Privacy Using XML, XACML, and SAML , 2008 .

[25]  George Yee Privacy Protection for E-Services , 2006 .

[26]  Bill Karakostas,et al.  Services Customization Using Web Technologies , 2012 .

[27]  Muli Ben-Yehuda,et al.  Virtual machine time travel using continuous data protection and checkpointing , 2008, OPSR.