Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems

Abstract Fault Detection is considered as one of the main challenges in large-scale dynamic environments and thus, for maintaining the reliability requirements of Cloud and Mobile Cloud systems. Most of the popular existing techniques for fault detection applied on the Cloud Computing environment in general, are based on system-monitoring despite the extreme difficulty of keeping track of all machines with their huge number in Cloud systems. In this paper, we propose a Fault Detection framework for the Component-based Cloud Computing by using Recovery Blocks’ Acceptance Test. This framework aims to construct Fail-Silent Cloud modules which have the ability of Self-Fault detection. In this, the detection process of transient hardware faults, software faults, and response-time failures is performed locally on each computing machine in the Cloud system. Background of the research issue, our mechanism, thorough analysis, and appropriate case study are presented. The efficiency and practicality of the proposed framework are proved by Safety verification using the model-checker.

[1]  Marcos K. Aguilera,et al.  On the quality of service of failure detectors based on control theory , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[2]  Mathai Joseph,et al.  Transformation of programs for fault-tolerance , 2005, Formal Aspects of Computing.

[3]  Ejaz Ahmed,et al.  A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..

[4]  Jun Wei,et al.  Detecting performance anomaly with correlation analysis for Internetware , 2013, Science China Information Sciences.

[5]  Rachid Guerraoui,et al.  Fault-Tolerance by Replication in Distributed Systems , 1996, Ada-Europe.

[6]  Muthu Ramachandran Component-Based Development for Cloud Computing Architectures , 2011 .

[7]  Xavier Defago,et al.  Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms , 2013, 2013 International Conference on Availability, Reliability and Security.

[8]  Dana Petcu,et al.  Towards component-based software engineering of cloud applications , 2012, WICSA/ECSA Companion Volume.

[9]  Joseph Sifakis,et al.  Modeling Heterogeneous Real-time Components in BIP , 2006, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM'06).

[10]  Joseph Sifakis,et al.  D-Finder: A Tool for Compositional Deadlock Detection and Verification , 2009, CAV.

[11]  Marco Bozzano,et al.  Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic , 2014, TACAS.

[12]  Al-Sakib Khan Pathan,et al.  The State of the Art in Intrusion Prevention and Detection , 2014 .

[13]  Anish Arora,et al.  Detectors and correctors: a theory of fault-tolerance components , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[14]  Mubashir Husain Rehmani,et al.  Emerging Communication Technologies Based on Wireless Sensor Networks : Current Research and Future Applications , 2016 .

[15]  Anja Feldmann,et al.  Enriching network security analysis with time travel , 2008, SIGCOMM '08.

[16]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[17]  Tao Tang,et al.  Component Based Design of Fault Tolerant Devices in Cyber Physical System , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.

[18]  Rachid Alami,et al.  A Verifiable and Correct-by-Construction Controller for Robots in Human Environments , 2015, HRI.

[19]  Tom Kirkham,et al.  Risk-Driven Proactive Fault-Tolerant Operation of IaaS Providers , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[20]  Huwaida Tagelsir Elshoush,et al.  Alert correlation in collaborative intelligent intrusion detection systems - A survey , 2011, Appl. Soft Comput..

[21]  Thanh-Hung Nguyen,et al.  Designing autonomous robots , 2009, IEEE Robotics & Automation Magazine.

[22]  Brian Randell System structure for software fault tolerance , 1975 .

[23]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[24]  Sandeep S. Kulkarni,et al.  Stabilization and fault-tolerance in presence of unchangeable environment actions , 2015, ICDCN.

[25]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[26]  Dinesh Singh,et al.  Collaborative IDS Framework for Cloud , 2016, Int. J. Netw. Secur..

[27]  Manoj Kumar,et al.  Outlier detection based fault-detection algorithm for cloud computing , 2014, International Conference for Convergence for Technology-2014.

[28]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[29]  Rajkumar Buyya,et al.  Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges , 2015, J. Netw. Comput. Appl..

[30]  Dewan Md. Farid,et al.  Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .

[31]  Anish Arora,et al.  Disassembling real-time fault-tolerant programs , 2008, EMSOFT '08.

[32]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[33]  Ejaz Ahmed,et al.  A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[34]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[35]  Ali Mili,et al.  Measuring Reliability as a Mean Failure Cost , 2007 .

[36]  P. M. Melliar-Smith,et al.  A program structure for error detection and recovery , 1974, Symposium on Operating Systems.

[37]  Makhlouf Aliouat,et al.  A New Efficient Checkpointing Algorithm for Distributed Mobile Computing , 2015 .

[38]  Deepak Poola Chandrashekar,et al.  Robust and fault-tolerant scheduling for scientific workflows in cloud computing environments , 2015 .

[39]  Eui-Nam Huh,et al.  Emerging Sensor-Cloud Technology for Pervasive Services and Applications , 2014, Int. J. Distributed Sens. Networks.

[40]  Uday Chourasia,et al.  ANOMALY DETECTION IN THE SERVICES PROVIDED BY MULTI CLOUD ARCHITECTURES: A SURVEY , 2014 .

[41]  Ejaz Ahmed,et al.  Multi-objective optimization model for seamless application execution in mobile cloud computing , 2013, 2013 5th International Conference on Information and Communication Technologies.

[42]  Aniruddha S. Gokhale,et al.  Fault-Tolerance for Component-Based Systems - An Automated Middleware Specialization Approach , 2009, 2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing.

[43]  Mathai Joseph,et al.  Specification and verification of fault-tolerance, timing, and scheduling , 1999, TOPL.

[44]  Betty H. C. Cheng,et al.  Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML , 2007 .

[45]  Xavier Défago,et al.  Reliability prediction for component-based software systems: Dealing with concurrent and propagating errors , 2015, Sci. Comput. Program..

[46]  Yasir Saleem,et al.  Integration of Cognitive Radio Sensor Networks and Cloud Computing: A Recent Trend , 2014 .

[47]  Peter Kilpatrick,et al.  A Lightweight Tool for Anomaly Detection in Cloud Data Centres , 2015, CLOSER.

[48]  L. Arockiam,et al.  FTM- A Middle Layer Architecture for Fault Tolerance in Cloud Computing , 2012 .

[49]  Ruth Breu,et al.  Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.

[50]  Joseph Sifakis,et al.  Modeling synchronous systems in BIP , 2009, EMSOFT '09.

[51]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[52]  Ying Zhang,et al.  Model driven configuration of fault tolerance solutions for component-based software system , 2012, MODELS'12.

[53]  Y. A. Siva Prasad,et al.  Statistical Anomaly Detection Technique for Real Time Datasets , 2013 .

[54]  Yue-Shan Chang,et al.  Mobile cloud-based depression diagnosis using an ontology and a Bayesian network , 2015, Future Gener. Comput. Syst..

[55]  Arif Sari,et al.  A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .

[56]  Feng Xia,et al.  Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..

[57]  Thanh-Hung Nguyen,et al.  Toward a More Dependable Software Architecture for Autonomous Robots , 2008 .

[58]  Xavier Défago,et al.  Reliability Prediction for Component-Based Systems: Incorporating Error Propagation Analysis and Different Execution Models , 2012, 2012 12th International Conference on Quality Software.

[59]  Mubashir Husain Rehmani,et al.  An efficient trajectory design for mobile sink in a wireless sensor network , 2014, Comput. Electr. Eng..

[60]  Vanish Talwar,et al.  Statistical techniques for online anomaly detection in data centers , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[61]  Feng Xia,et al.  Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges , 2016, J. Netw. Comput. Appl..

[62]  Indranil Gupta,et al.  On scalable and efficient distributed failure detectors , 2001, PODC '01.

[63]  Guisheng Fan,et al.  Model Based Byzantine Fault Detection Technique for Cloud Computing , 2012, 2012 IEEE Asia-Pacific Services Computing Conference.

[64]  Algirdas A. Avi The Methodology of N-Version Programming , 1995 .

[65]  Min Chen,et al.  Statistical Learning for Anomaly Detection in Cloud Server Systems: A Multi-Order Markov Chain Framework , 2018, IEEE Transactions on Cloud Computing.

[66]  Yi Xie,et al.  An energy-efficient task scheduling for mobile devices based on cloud assistant , 2016, Future Gener. Comput. Syst..

[67]  Wail S. Elkilani,et al.  A hybrid approach for efficient anomaly detection using metaheuristic methods , 2014, Journal of advanced research.

[68]  Marco Aurélio Spohn,et al.  Improving Network Traffic Anomaly Detection for Cloud Computing Services , 2014, ICSNC 2014.

[69]  Pekka Alho,et al.  Software fault detection and recovery in critical real-time systems: An approach based on loose coupling , 2014 .

[70]  Rajkumar Buyya,et al.  Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.

[71]  Jacques Pulou,et al.  Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[72]  Ciprian Dobre,et al.  A Failure Detection System for Large Scale Distributed Systems , 2010, CISIS.

[73]  Joseph Sifakis,et al.  Composition for component-based modeling , 2005, Sci. Comput. Program..

[74]  Ming Chen,et al.  Adaptive BER-constraint-based power allocation for downlink MC-CDMA systems with linear MMSE receiver , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[75]  Anish Arora,et al.  Closure and Convergence: A Foundation of Fault-Tolerant Computing , 1993, IEEE Trans. Software Eng..

[76]  Ravi Ranjan,et al.  A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.

[77]  Gregor Gößler,et al.  A Theory of Fault Recovery for Component-Based Models , 2012, SSS.

[78]  Amal Ganesh,et al.  A study on fault tolerance methods in Cloud Computing , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[79]  Seng Wai Loke,et al.  Supporting ubiquitous sensor-cloudlets and context-cloudlets: Programming compositions of context-aware systems for mobile users , 2012, Future Gener. Comput. Syst..

[80]  Jun Wei,et al.  Fault detection for cloud computing systems with correlation analysis , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[81]  Lavindra de Silva,et al.  A Verifiable and Correct-by-Construction Controller for Robot Functional Levels , 2011, ArXiv.

[82]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.