A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery

Modeling IT architecture is a complex, time consuming, and error prone task. However, many systems produce information that can be used for automating modeling. Early studies show that this is a feasible approach if we can overcome certain obstacles. Often more than one source is needed in order to cover the data requirements of an IT architecture model; and the use of multiple sources means that heterogeneous data needs to be merged. Moreover, the same collection of data might be useful for creating more than one kind of models for decision support. IT architecture is constantly changing and data sources provide information that can deviate from reality to some degree. There can be problems with varying accuracy (e.g. actuality and coverage), representation (e.g. data syntax and file format), or inconsistent semantics. Thus, integration of heterogeneous data from different sources needs to handle data quality problems of the sources. This can be done by using probabilistic models. In the field of truth discovery, these models have been developed to track data source trustworthiness in order to help solving conflicts while making quality issues manageable for automatic modeling. We build upon previous research in modeling automation and propose a framework for merging data from multiple sources with a truth discovery algorithm to create multiple IT architecture models. The usefulness of the proposed framework is demonstrated in a study where models using three tools are created, namely; Archi, securiCAD, and EMFTA.

[1]  Ruth Breu,et al.  Enterprise Architecture Planning: Analyses of Requirements from Practice and Research , 2017, HICSS.

[2]  André Vasconcelos,et al.  IT Architecture automatic verification: A network evidence-based approach , 2010, 2010 Fourth International Conference on Research Challenges in Information Science (RCIS).

[3]  Laure Berti-Équille,et al.  Truth Discovery Algorithms: An Experimental Evaluation , 2014, ArXiv.

[4]  Divesh Srivastava,et al.  Characterizing and selecting fresh data sources , 2014, SIGMOD Conference.

[5]  Dan Roth,et al.  Latent credibility analysis , 2013, WWW.

[6]  Joann J. Ordille,et al.  Data integration: the teenage years , 2006, VLDB.

[7]  Kevin Wilkinson,et al.  Data integration flows for business intelligence , 2009, EDBT '09.

[8]  Khurram Shahzad,et al.  A Tool for Automatic Enterprise Architecture Modeling , 2011, CAiSE Forum.

[9]  James Cheney,et al.  Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.

[10]  Mathias Ekstedt,et al.  pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[11]  Christian M. Schweda,et al.  Interactive Functions of a Cockpit for Enterprise Architecture Planning , 2014, 2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations.

[12]  J. A. Harding *,et al.  An enterprise modeling and integration framework based on knowledge discovery and data mining , 2005 .

[13]  Ruth Breu,et al.  A situational method for semi-automated Enterprise Architecture Documentation , 2014, Software & Systems Modeling.

[14]  Mathias Ekstedt,et al.  Data Collection Prioritization for System Quality Analysis , 2009, Electron. Notes Theor. Comput. Sci..

[15]  Alan MacCormack,et al.  Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case , 2013, PoEM.

[16]  S. Borlase Smart Grids : Infrastructure, Technology, and Solutions , 2016 .

[17]  Sabine Buckl,et al.  A Survival Analysis of Application Life Spans based on Enterprise Architecture Models , 2009, EMISA.

[18]  Robert Winter,et al.  Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions , 2011, 2011 44th Hawaii International Conference on System Sciences.

[19]  PlaleBeth,et al.  A survey of data provenance in e-science , 2005 .

[20]  Laura M. Haas,et al.  Transforming Heterogeneous Data with Database Middleware: Beyond Integration , 1999, IEEE Data Eng. Bull..

[21]  Mathias Ekstedt,et al.  A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources , 2015, 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop.

[22]  Richard P. Martin,et al.  Improving cluster availability using workstation validation , 2002, SIGMETRICS '02.

[23]  Dimitris Karagiannis,et al.  Enterprise Model Integration , 2003, EC-Web.

[24]  Nick Bassiliades,et al.  E-Commerce and Web Technologies , 2013, Lecture Notes in Business Information Processing.

[25]  Ruth Breu,et al.  Living Modeling of IT Architectures: Challenges and Solutions , 2015, Software, Services, and Systems.

[26]  Bo Zhao,et al.  On the Discovery of Evolving Truth , 2015, KDD.

[27]  Klaus R. Dittrich,et al.  Data Provenance: A Categorization of Existing Approaches , 2007, BTW.

[28]  Margus Välja,et al.  Enterprise Architecture Evaluation Using Utility Theory , 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops.

[29]  Mathias Ekstedt,et al.  Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation , 2010, Software Quality Journal.

[30]  Mathias Ekstedt,et al.  Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach , 2016, 2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW).

[31]  Jorg Desel,et al.  Enterprise Modelling and Information Systems Architectures , 2005 .

[32]  Markus Buschle,et al.  Enterprise architecture availability analysis using fault trees and stakeholder interviews , 2014, Enterp. Inf. Syst..

[33]  Robert Lagerström,et al.  Extended Influence Diagrams for System Quality Analysis , 2007, J. Softw..

[34]  Abdeltawab M. Hendawi,et al.  A proposed model for data warehouse ETL processes , 2011, J. King Saud Univ. Comput. Inf. Sci..

[35]  Ruth Breu,et al.  Enterprise Architecture Documentation: Empirical Analysis of Information Sources for Automation , 2013, 2013 46th Hawaii International Conference on System Sciences.

[36]  M. Fox,et al.  Enterprise Modeling , 1998, AI Mag..

[37]  Erhard Rahm,et al.  A survey of approaches to automatic schema matching , 2001, The VLDB Journal.

[38]  Vladimir Vlassov,et al.  Towards Automatic Veracity Assessment of Open Source Information , 2015, 2015 IEEE International Congress on Big Data.

[39]  Bianca Schroeder,et al.  A Large-Scale Study of Failures in High-Performance Computing Systems , 2006, IEEE Transactions on Dependable and Secure Computing.

[40]  Ulrik Franke,et al.  The Distribution of Time to Recovery of Enterprise IT Services , 2014, IEEE Transactions on Reliability.

[41]  Robert Woitsch,et al.  A new paradigm for the continuous alignment of business and IT: Combining enterprise architecture modelling and enterprise ontology , 2016, Comput. Ind..

[42]  Markus Buschle,et al.  Automatic data collection for enterprise architecture models , 2012, Software & Systems Modeling.

[43]  Bo Zhao,et al.  A Survey on Truth Discovery , 2015, SKDD.

[44]  Elke A. Rundensteiner,et al.  Maintaining data warehouses over changing information sources , 2000, CACM.

[45]  Lars Nordström,et al.  Availability of a SCADA/OMS/DMS system — A case study , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[46]  Matthias Brückmann,et al.  Some Process Patterns for Enterprise Architecture Management , 2009, Software Engineering.

[47]  Frédérick Bénaben,et al.  An automatic model-to-model mapping and transformation methodology to serve model-based systems engineering , 2017, Inf. Syst. E Bus. Manag..

[48]  Marten van Sinderen,et al.  Enterprise Architecture Intelligence: Combining Enterprise Architecture and Operational Data , 2014, 2014 IEEE 18th International Enterprise Distributed Object Computing Conference.

[49]  Robert Winter,et al.  Trends in Enterprise Architecture Practice - A Survey , 2010, TEAR.

[50]  Erhard Rahm,et al.  Data Cleaning: Problems and Current Approaches , 2000, IEEE Data Eng. Bull..

[51]  Samuli Pekkola,et al.  Using enterprise architecture artefacts in an organisation , 2017, Enterp. Inf. Syst..

[52]  Ruth Breu,et al.  Requirements for Automated Enterprise Architecture Model Maintenance - A Requirements Analysis based on a Literature Review and an Exploratory Survey , 2011, ICEIS.

[53]  Ulrich Frank Enterprise Modelling: The Next Steps , 2014, Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model..

[54]  Mathias Ekstedt,et al.  Time between vulnerability disclosures: A measure of software product vulnerability , 2016, Comput. Secur..