Dependability Modeling and Certification of Cloud-Based Distributed Systems

A system that is highly dependable under hostile conditions but whose dependability cannot be easily evaluated prior to the deployment of applications is less desirable than a system with lower but predictable dependability. This is because a decision-making on the deployment of high assurance systems is often based on a risk analysis of application failures. For system services implemented on a cloud, the problem of system certification assumes added importance because of third-party control of cloud resources and the attendant problems of faults, QoS degradations, and security violations. Our paper treats system dependability as an application-level QoS for management purposes, and advocates a probabilistic evaluation of dependability. Our approach is corroborated by measurements on system-level prototypes and simulation analysis of system models in the face of hostile environment conditions. A case study of content-distribution networks anchored on cloud infrastructures is also described.

[1]  Arnd Poetzsch-Heffter,et al.  Slicing for model reduction in adaptive embedded systems development , 2008, SEAMS '08.

[2]  Joseph P. Macker,et al.  Group communication for event dissemination in dynamic distributed networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[3]  Marcus Brunner,et al.  Probabilistic decentralized network management , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[4]  Klara Nahrstedt,et al.  A control-based middleware framework for quality-of-service adaptations , 1999, IEEE J. Sel. Areas Commun..

[5]  Matti A. Hiltunen,et al.  Cholla: A Framework for Composing and Coordinating Adaptations in Networked Systems , 2009, IEEE Transactions on Computers.

[6]  Randy H. Katz,et al.  Dynamic Replica Placement for Scalable Content Delivery , 2002, IPTPS.

[7]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Ameen Chilwan,et al.  Dependability Differentiation in Cloud Services , 2011 .

[9]  Aad P. A. van Moorsel,et al.  Dependability in the cloud: Challenges and opportunities , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[10]  Chan-Gun Lee,et al.  Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.

[11]  Kaliappa Nadar Ravindran Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance Perspective , 2011, CSIIRW '10.

[12]  Chaouki T. Abdallah,et al.  Managed control of composite cloud systems , 2011, 2011 6th International Conference on System of Systems Engineering.

[13]  Sang Hyuk Son,et al.  Feedback Control Architecture and Design Methodology for Service Delay Guarantees in Web Servers , 2006, IEEE Transactions on Parallel and Distributed Systems.

[14]  Marcel Staroswiecki,et al.  A Comparative Analysis of AI and Control Theory Approaches to Model-based Diagnosis , 2000, ECAI.

[15]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[16]  John Keeney,et al.  Chisel: a policy-driven, context-aware, dynamic adaptation framework , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[17]  Jun Wu,et al.  Optimization algorithms for proxy server placement in content distribution networks , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops.