Towards a Framework for Safe and Secure Adaptive Collaborative Systems

Real-time adaptive systems are complex systems capable to adapt their behavior to changing conditions in the environment, and/or internal state changes. Highly dynamic and possibly unpredictable environments, and uncertain operating conditions call for new paradigms of software design, and run-time adaptation mechanisms, to overcome the lack of knowledge at design time. Main application areas include vehicles or robots that need to collaborate to achieve a common task, e.g., minimize fuel consumption, moving objects at a construction site, or performing a set of operations in a factory. Moreover, these vehicles or robots need to interact and possibly collaborate with humans in a safe way, e.g., avoiding accidents or collisions, and prevent hazardous situations that may harm humans and/or machines. % This paper proposes a framework for developing safe and secure adaptive collaborative systems, with run-time guarantees. To enable this, our focus is on requirement engineering and safety assurance techniques to capture the specific safety and security properties for the collaborative system, and to provide an assurance case guaranteeing that the system is sufficiently safe. Moreover, the paper proposes an architecture and behavioral models to analyze the requirements at run-time. Finally, we design a suitable deployment platform to perform the run-time analysis and planning while guaranteeing the real-time constraints.

[1]  Carolyn L. Talcott Composable Semantic Models for Actor Theories , 1997, TACS.

[2]  Ludovic Piètre-Cambacédès,et al.  A survey of approaches combining safety and security for industrial control systems , 2015, Reliab. Eng. Syst. Saf..

[3]  V PapadopoulosAlessandro,et al.  An Experimental Performance Evaluation of Autoscalers for Complex Workflows , 2018 .

[4]  Danny Weyns,et al.  Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases , 2017, IEEE Transactions on Software Engineering.

[5]  Aida Čaušević,et al.  Safety and Security Co-Analyses: A Systematic Literature Review , 2019, IEEE Systems Journal.

[6]  John A. McDermid,et al.  Safety Case Construction and Reuse Using Patterns , 1997, SAFECOMP.

[7]  Tommaso Cucinotta,et al.  Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..

[8]  Dimosthenis Kyriazis,et al.  Virtualised e-Learning on the IRMOS real-time Cloud , 2012, Service Oriented Computing and Applications.

[9]  Kristina Lundqvist,et al.  Incorporating Attacks Modeling into Safety Process , 2018, SAFECOMP Workshops.

[10]  Alberto Leva,et al.  Hard real-time guarantees in feedback-based resource reservations , 2015, Real-Time Systems.

[11]  Chenyang Lu,et al.  RT-Xen: Towards real-time hypervisor scheduling in Xen , 2011, 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT).

[12]  Danny Weyns,et al.  A survey of formal methods in self-adaptive systems , 2012, C3S2E '12.

[13]  Carl Hewitt,et al.  Description and Theoretical Analysis (Using Schemata) of Planner: A Language for Proving Theorems and Manipulating Models in a Robot , 1972 .

[14]  Ehsan Khamespanah,et al.  On Time Actors , 2016, Theory and Practice of Formal Methods.

[15]  Edward A. Lee,et al.  Coordinated actor model of self-adaptive track-based traffic control systems , 2018, J. Syst. Softw..

[16]  Mohammad Mahdi Jaghoori,et al.  Ten Years of Analyzing Actors: Rebeca Experience , 2011, Formal Modeling: Actors, Open Systems, Biological Systems.

[17]  Ben-Jye Chang,et al.  Platoon-Based Cooperative Adaptive Cruise Control for Achieving Active Safe Driving Through Mobile Vehicular Cloud Computing , 2017, Wirel. Pers. Commun..

[18]  Jesper Andersson,et al.  Modeling Dimensions of Self-Adaptive Software Systems , 2009, Software Engineering for Self-Adaptive Systems.

[19]  Gul A. Agha,et al.  ACTORS - a model of concurrent computation in distributed systems , 1985, MIT Press series in artificial intelligence.

[20]  Martin Gogolla,et al.  Using Models at Runtime to Address Assurance for Self-Adaptive Systems , 2015, Models@run.time@Dagstuhl.

[21]  Ivona Brandic,et al.  Efficient Edge Storage Management Based on Near Real-Time Forecasts , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).

[22]  Chong Li,et al.  Prioritizing local inter-domain communication in Xen , 2013, 2013 IEEE/ACM 21st International Symposium on Quality of Service (IWQoS).

[23]  Nancy G. Leveson,et al.  Systems thinking for safety and security , 2013, ACSAC.

[24]  Ewen Denney,et al.  Dynamic Safety Cases for Through-Life Safety Assurance , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[25]  Hans A. Hansson,et al.  A Systematic Way to Incorporate Security in Safety Analysis , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).

[26]  Johan Tordsson,et al.  Improving cloud infrastructure utilization through overbooking , 2013, CAC.

[27]  Frank S. de Boer,et al.  Compositional schedulability analysis of real-time actor-based systems , 2015, Acta Informatica.

[28]  Gabor Karsai,et al.  Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems , 2013, Software Engineering for Self-Adaptive Systems.

[29]  Johan Tordsson,et al.  Distributed Approach to the Holistic Resource Management of a Mobile Cloud Network , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).

[30]  Eric Armengaud,et al.  A Combined Safety-Hazards and Security-Threat Analysis Method for Automotive Systems , 2014, SAFECOMP Workshops.

[31]  Hans A. Hansson,et al.  Configuration-Aware Contracts , 2016, SAFECOMP Workshops.

[32]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[33]  Danny Weyns,et al.  ActivFORMS: active formal models for self-adaptation , 2014, SEAMS 2014.

[34]  Frank S. de Boer,et al.  Modeling and Verification of Reactive Systems using Rebeca , 2004, Fundam. Informaticae.

[35]  Tim Kelly,et al.  The Goal Structuring Notation – A Safety Argument Notation , 2004 .

[36]  Schahram Dustdar,et al.  Towards QoS-Aware Fog Service Placement , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).

[37]  Hans A. Hansson,et al.  A method to generate reusable safety case argument-fragments from compositional safety analysis , 2017, J. Syst. Softw..

[38]  Christoph Schmittner,et al.  A Case Study of FMVEA and CHASSIS as Safety and Security Co-Analysis Method for Automotive Cyber-physical Systems , 2015, CPSS@ASIACSS.

[39]  Luciano Baresi,et al.  A journey through SMScom: self-managing situational computing , 2012, Computer Science - Research and Development.

[40]  Erik Elmroth,et al.  KPI-Agnostic Control for Fine-Grained Vertical Elasticity , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).