An Automatic Recovery Mechanism for Cloud Service Composition

被引:2
作者
Li, Wenrui [1 ,2 ]
Cheng, Yan [3 ]
Zhang, Pengcheng [3 ]
Leung, Hareton [4 ]
机构
[1] Nanjing Xiaozhuang Univ, Sch Math & Informat Technol, Nanjing, Jiangsu, Peoples R China
[2] Wuhan Univ, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[3] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Cloud Service; Failure Recovery; Fault Taxonomy; Service Composition; Service Granularity;
D O I
10.4018/IJWSR.2016010102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, with characteristics of large scale computation, data storage, visualization, high expansibility and elasticity, provides a powerful computing paradigm. Cloud services can be rapidly composed to form on-demand composite service for accomplishing the users' requirements. However, the uncertainty of cloud services has impacted on the correctness and reliability of the composite services. Especially, for unanticipated hardware and software failures, it is very difficult to assure the quality of the composite services. In the complex cloud computing environments, recovery of the composite services from these failures is a challenging issue. The paper first presents a unified fault taxonomy in the three layers of cloud computing and analyze the causes of the faults. The authors then propose a hierarchical recovery mechanism including five different recovery algorithms for various kinds of failures. Finally, through the simulation experiments they validate the proposed approach to be effective and practical.
引用
收藏
页码:23 / 39
页数:17
相关论文
共 18 条
  • [1] [Anonymous], 2009, P C HIGH PERF COMP N
  • [2] [Anonymous], P 2 INT WORKSH CLOUD
  • [3] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [4] Chalermarrewong T., 2012, P 2012 9 INT C EL EN, P1
  • [5] Chan K. M., 2009, P ICSOC 2007 WORKSH, P363, DOI [10.1007/978-3-540-93851-4_36, DOI 10.1007/978-3-540-93851-4_36]
  • [6] Ganga K., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P387, DOI 10.1109/ICPRIME.2013.6496507
  • [7] Monitoring Probabilistic Properties
    Grunske, Lars
    Zhang, Pengcheng
    [J]. 7TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2009, : 183 - 192
  • [8] The Hydra: A layered, redundant configuration management approach for cloud-agnostic disaster recovery
    Huang, Ke
    Begnum, Kyrre
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 333 - 336
  • [9] Jhawar R., 2012, P 2012 IEEE INT SYST, P1, DOI [10.1109/SysCon.2012.6189503, DOI 10.1109/SYSCON.2012.6189503]
  • [10] Fault-Tolerant BPEL Workflow Execution via Cloud-Aware Recovery Policies
    Juhnke, Ernst
    Doernemann, Tim
    Freisleben, Bernd
    [J]. 2009 35TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, PROCEEDINGS, 2009, : 31 - 38