SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Models and Techniques for Ensuring Reliability, Safety, Availability and Security
of Large Scale Distributed Systems
Valentin Cristea*, Ciprian Dobre*, Florin Pop*, Corina Stratan*, Alexandru Costan*,
Catalin Leordeanu*, Eliana Tirsa*
*Faculty of Automatic Control and Computers, University Politehnica of Bucharest
( e-mail: valentin.cristea, ciprian.dobre, florin.pop, corina.stratan, alexandru.costan,
catalin.leordeanu, eliana.tirsa @ cs.pub.ro).
Abstract: This paper presents an original approach to the development of models, methods and techniques
for increasing reliability, availability, safety and security of large scale distributed systems, particularly
Grids and Web-based distributed systems. The characteristics of these systems pose problems to ensuring
dependability, especially because of the geographical distribution of resources and users, volatility of
resources that are available only for limited amounts of time, and constraints imposed by the applications
and resource owners. The problems of ensuring dependability represents a hot research subject today and,
despite the fact that many projects obtained valuable results in this domain, no acceptable solution was yet
found that could integrate all the requirements for designing a dependable system and that could exploit all
the capabilities of modern systems. The paper proposes the design of an architectural model that allows the
unitary and aggregate approach to reliability, availability, safety and security.
1. INTRODUCTION
Both in the academic and industrial environments there is an
increasing interest in large scale distributed systems, which
currently represent the preferred instruments for developing a
wide range of new applications. The Grid computing domain
has especially progressed during the last years due to the
technological opportunities that it offers. While until recently
the research in the distributed systems domain has mainly
targeted the development of functional infrastructures, today
researchers understand that many applications, especially the
commercial ones, have some complementary necessities that
the „traditional” distributed systems do not satisfy.
Together with the extension of the application domains, new
requirements have emerged for large scale distributed
systems; among these requirements, reliability, safety,
availability, security and maintainability (synthesized in the
literature in the concept of „dependability” (Avizenis et
al.,2001)) are needed by more and more modern distributed
applications, not only by the critical ones.
Although the importance of dependable systems is widely
recognized and many research projects have been initiated
recently in this domain, there are no mature implementations
of these concepts available yet; the existing systems offer
only partial solutions, and often the approaches separate the
issues of reliability, availability, security etc.
In this paper we present innovative solutions to researching
and developing original models, methods and techniques that
satisfy dependability requirements in large scale distributed
systems, which are essential for the new types of
applications. We present an architectural model which allows
the unified approach to reliability, availability, safety and
security. The model is based on the use of tools for
communication, monitoring, scheduling, management and
accessibility (retrieval, efficient transfer) of data, and
security, in order to provide increased levels of dependability.
We also present a minimal set of functionalities, absolutely
necessary to ensure the reliability, availability, safety and
security. The presented architecture is adaptable,
reconfigurable and regenerative and can help distributed
system designers to increase dependability while preserving
scalability.
The rest of this paper is organized as follows. Section 2
describes the requirements of implementing a complete
dependable solution. In Section 3 we present related work.
Section 4 presents the architectural design being proposed in
the current paper. In Section 5 we conclude and present
future work.
2. REQUIREMENTS
The characteristics of large scale distributed systems make
dependability a difficult problem from several points of view.
A first aspect is the geographical distribution of resources and
users that implies frequent remote operations and data
transfers; these lead to a decrease in the system's safety and
reliability and make it more vulnerable from the security
point of view. Another problem relates to the volatility of the
resources, which are usually available only for limited
periods of time; the system must ensure the correct and
complete execution of the applications even when resources
are introduced and removed dynamically, or when they are
damaged. The management of distributed systems is also
complicated by the constraints that the applications and the
owners of the resources impose; in many cases there are
conflicts between these constraints – for example, an
application needs a long execution time and performs
database operations, while the owner of the machine on
which the application could be run only makes it available in
a restricted time interval and does not allow database
operations.
Solving these issues still represents a research domain and,
although numerous projects have obtained significant results,
no complete solution has been fond yet to integrate all
requirements involved in obtaining a dependable system.
In order to facilitate implementation, as well as evaluation,
the architectural model being proposed provides trust
mechanisms for service and resource provisioning, and
guarantees for the delegation and context services, together
with various mechanisms to orchestrate services such that to
achieve high levels of reliability and fault tolerance.
Unlike similar research solutions previously presented, we
propose a unified approach to all the aspects concerning
dependable systems, by analyzing and designing methods and
techniques for improving the reliability, availability, safety
and security of large scale distributed systems. We also
explore issues that appear in reference publications, but today
are insufficiently addressed. For example, the fault detection
and correction mechanisms are extended with fault prediction
and avoidance mechanisms. The architectural model
proposed in this paper also includes a prediction component,
and its design is based on the use of monitoring tools.
We are focusing on Grid systems, but the proposed solutions
can be easily applied to other types of distributed systems, for
example Web based ones.
Contemporary distributed environments are composed of
multiple autonomous services, possible running on different
machines, under the control of different organizations. Since
our focus is on Grid systems we also need to take into
account the concept of Virtual Organizations. From a security
point of view this poses a number of interesting challenges. If
we view the Virtual Organizations as groups of users who
share a certain level of trust we need to create security
policies which are active within a VO and others between
members of a VO and non-members. For example, a member
of a VO might allow other members to read data he has
submitted but there must be mechanisms in place to ensure
that this is not possible for a user which is not a part of the
VO. At the same time the level of trust between members of a
VO is not absolute so in this case we must also make sure
that users cannot modify each other’s data.
The scalability and availability requirements of such services
have led to system architectures that diverge significantly
from those of traditional distributed systems. Given the need
for thousands of nodes, cost often necessitates the use of
inexpensive personal computers wherever possible, and
efficiency often requires customized service software.
Likewise, addressing the goal of zero downtime requires
human operator involvement and pervasive redundancy
within clusters and between globally distributed computing
centers. The new requirements for unrestricted availability
demands coming from next-generation critical applications
pose interesting challenges because the large scale distributed
systems:
• typically comprise many inexpensive PCs that lack
expensive reliability features;
• undergo frequent scaling, reconfiguration, and
functionality changes;
• often run custom software that has undergone limited
testing;
• rely on networks within service clusters, between
geographically distributed collocation facilities, and
between collocation facilities and end-user clients;
• aim to be available 24/7 for users worldwide, making
planned downtime undesirable or impossible.
The proposed architectural model must, therefore, be
instrumented with the support for fault-tolerance and security
techniques to assure the resiliency of applications and the
high-availability of crucial Grid services. Among the
requirements that must be satisfied by the architecture we
recall tamper resistance in the face of intruders, the system
must always be invoked and must be designed small enough
such that to be subject to analysis and tests to ensure its
correctness using formal methods.
3. RELATED WORK
Most of the approaches to the dependability problem are
mainly focused on fault detection and fault tolerance. The
authors of (Jin et al.,2006) introduce an adaptive system for
fault detection in Grids and a policy-based recovery
mechanism. Fault detection is achieved by monitoring the
system, and for recovery several mechanisms are available,
among which task replication and checkpointing. In
(Sommerville et al.,2003) the authors present a solution for
web services, based on the implementation of a fault-tolerant
container; the fault-tolerant containers manage a set of
replicated services, which can be offered by external
providers as well. The containers can be configured for
various fault tolerance strategies (either an equivalent service
is invoked when a service fails, or multiple equivalent
services are invoked from the beginning and a voting
mechanism is applied etc.).
Another approach less related to large scale distributed
systems is presented in (Cox et al., 2005), which addresses
the tolerance to hardware faults through virtualization; the
proposed solution is named Loosely Synchronized Redundant
Virtual Machines (LSRVM).
In (Grimshaw et al., 2005) the authors emphasize on the idea
of survivability, which consists in providing, in case of a
error, an alternative service, even if the latter doesn't fully
satisfy the initial user requirements. For requirements
specification, the authors propose DESL (Dependability
Exchange and Specification Language), an XML based
language; DESL isn't fully specified yet.
Other two papers in this field are (Sonnek et al, 2005), which
proposes a reputation based classification of Grid services,
similar to the one in peer-to-peer systems, and (Rilling et al,
2006), which presents a Grid operating system architecture,
with self-healing properties. In (Neocleous et al., 2006) the
authors carry out a detailed study on errors in Grid systems,
providing case-studies from the EGEE (Enabling Grids for E-
Science) European project.
Another aspect of dependability is security. Currently there
are several solutions for providing security for Grid
environments and for distributed systems in general. In case
of Grid systems, in (Foster et al, 1998) the authors identified
a set of base requirements (single authentication, credentials
protection, interoperability with local security solutions, etc)
and proposed both an architectural model for security and a
public key cryptography infrastructure based on a reference
implementation (Grid Security Infrastructure – GSI).
The existing solutions for security in large scale distributed
systems have various unresolved issues (Arenas et al, 2006).
The majority of Grid systems were initially designed for
scientific collaboration between participants that knew each
others. This implies an implicit trusting relationship, all
partners sharing a common goal – for example to carry out a
scientific experiment – and it is implicitly assumed that the
resources are provided and shared according to some well
defined and respected rules. But when used in industrial
environments such systems must satisfy the need to share
resources with unknown groups, which could generate certain
risks. A possible solution is to impose certain mechanisms to
preserve the identity even in this situation.
4. ARCHITECTURAL MODEL
In our proposal we aim to exploit some features of the
services provided by the large-scale distributed systems to
enhance availability:
• Plentiful hardware allows for redundancy.
• Geographic distribution of collocation facilities allows
control of environmental conditions and resilience to
large-scale disasters.
The model considers that the problem of developing highly
dependable large scale distributed systems is technological
prohibited by the various technical problems arising in
distributed systems, such as the weak resilience of the
operating systems, known for offering various security
vulnerabilities. The solution to this problem consists in the
inclusion of a complete set of mechanisms necessary to
guarantee the various security needs: the trust in service and
resource provisioning, guarantees to the delegation and
context mechanisms. The architectural model includes for
this purpose two specialized components.
A first set of components act inside the middleware layer of
the distributed system, intermediating dependability between
different hosts composing the distributed systems. At this
level the components of the proposed architectural model are
presented in Figure 1.
Fig. 1. The architectural model of the service layer
At the bottom of the architecture is the core of the system
designed to orchestrate the functionalities provided by the
other components. Its role is to integrate and provide a
dependable execution environment for several other
components. It also orchestrates the survivable and
redundancy mechanisms described below.
The model is based on a minimal set of functionalities,
absolutely necessary to ensure the reliability, availability,
safety and security. We argue that such functionalities are a
reference for implementing a functional core for a
dependable distributed system and that the set of
functionalities are sufficient to cover the basic needs of the
majority of distributed systems, without operating major
changes.
The architecture includes the mechanisms necessary to ensure
a strong resilience in the presence of faults and various
security threats coming from the incoming connection. At
this level we included a first component based with detecting
when various processes of the distributed system fail. We
propose an approach based on adaptive, decentralized failure
detectors, capable of working asynchronous and independent
on the application flow. The proposed solution considers
architecture for the failure detectors, based on clustering, the
use of a gossip-based algorithm for detection at local level
and the use of a hierarchical structure among clusters of
detectors along which traffic is channelled. The solution can
scale to a large number of nodes, considers the QoS
requirements of both applications and resources, and includes
fault tolerance and system orchestration mechanisms, added
in order to assess the reliability and availability of distributed
systems.
At this level we extend the solution of the inclusion of a
complete set of mechanisms necessary to guarantee the
various security needs previously described with the
mechanisms of taking security related decisions, possible
based on monitored data. A component also integrated into
the architecture is responsible with ensuring that these
decisions are enforced by its integration with the various
existing services and security infrastructures (such as GSI or
Kerberos).
Beside the traditional alternatives to constructing dependable
services as were integrated here, the fault avoidance, fault
elimination and fault tolerance (Nguyen-Tuong et al, 2004),
we also considered mechanisms for the dynamic adaptation
to environment conditions. For this reason the model includes
a minimal set of components: a monitoring subsystem, a
component used to compare various architectural patterns, an
architectural core for analyzing data, a component
responsible with starting adequate repairs and a module
responsible with the broadcast of information regarding the
changes occurring in various part of the distributed system.
The architectural model thus offers various intelligent
mechanisms designed to dynamically solve the various
occurring problems and that also represents a link between
the distributed system and the various running functionalities
of the applications, using automatic reconfiguration of both
services and resources.
The proposed architectural model integrates several
technologies that are necessary to ensure a high level of
reliability, providing fault prevention, fault removal, fault
tolerance, and fault forecasting, as well as security
mechanisms.
The core allows modularity, an aspect which influences the
adoption of the architecture in various existing Grid
infrastructures. The modularity allows dealing with the
service-oriented architecture on which existing grid systems
are built and facilitates the implementation of the
survivability concept presented below. The model also allows
the generic integration with various technologies specific to
large scale distributed systems, and the development and
evaluation of various new models and technologies. For this,
the proposed components ensure the interoperability with
services specific to such systems and each one ensures the
reliability specifications coming from higher-level
applications.
Another problem with existing distributed system relates to
the prohibitive costs imposed by the replication of all basic
components of the system, as well as those responsible for
the communication, storage and computation. Replication of
these services is currently seen as a necessity because it
offers the highest availability to the system. In fact, several of
the previously analyzed solutions are based on the idea of
replicating as many services and resources as possible such
that, when one fails, the other immediately takes its place and
functionality. The use of replication mechanisms is appealing
because it increases the reliability of the system, but our
model considers a combination of both replication
mechanisms together with mechanisms to ensure
survivability of the system in the presence of major faults.
The adopted solution to developing an architectural model in
which the system survive by adapting in the presence of fault
arise naturally by explicitly acknowledge the impossibility to
include a complete solution to ensure reliability considering
the resulting resources and technologies. The impossibility is
mainly derived from the human nature of the system
developers and operators, as well as prohibitive costs
necessary to implement a completely replicated Grid system.
For such reasons we adopt the strategy of using replication
only for the most basic core functionality of the system. We
use replication in the form of fault-tolerant containers; the
fault-tolerant containers could easily manage a set of
replicated services. We also adopt a survivability approach in
which we provide several services such that when one can
not tolerate faults or security attacks another one takes its
place. The system survives by learning the conditions which
eventually led to the fault of a service or resource, using
patterns.
The architectural model also includes mechanisms necessary
for the system to adapt and survive in the context of dynamic
nature of existing resources, faults occurring in the system
and various changes in the exploitation requirements of the
system. In order to offer technologies capable to
automatically correct various occurring problems and that are
capable of taking intelligent decisions we propose the
adoption of a solution based on the use of architectural
patterns for correcting faults. Such patterns have a special
role in the context of monitoring, being used in a process of
automatically detect faulty behavior of resources or various
other problems and take higher-level decisions to start
adequate repairing steps (Garlan et al, 2003).
For that, the Analyze and Respond services (Figure 2) would
continuously analyze real-time data collected from an
external monitoring system. The data are processed and
compared against a set of patterns (existing and learned as the
system adapts to changing environment). One of the biggest
challenges at this level is represented by the capability to not
only recognize faults, but also predict faulty behavior in
various parts of the distributed system. This service is in fact
capable to do that by using various mathematical
distributions and AI constructs (neural networks, moving
average distributions, etc.).
The component responsible with the real-time analysis of
monitored data is the Architectural Analysis Engine (see
Figure 1). The analyzer uses the services provided by the
Architectural Model Comparator. When faults or security
breaches are detected the system would further initiate
(possible automatically, if not possible would alert a human
operator of the problem) an operation to correct the situation.
Such a correction is initiated by the Operation Repair Center
component (Figure 1). The correction could be, for instance,
the raise of an alternative service that could supplement the
activity offered by the faulty service or could represent an
instruction sent to a Scheduling Service to reschedule faulty
jobs. Also, by integrating various existing services, if the
underlying distributed environment is capable of executing
checkpointing operations (such as Condor) then the
Operation Repair Center could also initiate an action to
recover the last state using the checkpointing data.
Of course, once the repair action was determined it must be
correctly propagated inside the entire distributed system. The
role of this action is assumed by the Change Propagation
Center (Figure 1). In this way, the architecture involved
communication with services providing functionalities in
various parts of a Grid system. The data is collected from a
monitoring service and we intend to integrate the architecture
closely with such a system. The checkpointing capability
involves dealing with a storage service. The state of the
system must be received from a central indexing service of
the underlying middleware. The fault of a job would initiate a
dialog between the services provided by the presented
architecture and a scheduling service. The detection of faults,
as well as propagation of recovery actions means using a data
transfer service.
An approach based on offering survivable architectural
characteristics naturally maps on a developing environment
in which applications are built by incorporating existing
elements in various administrative domains, an inherent
characteristic of Grid systems. The specification of
alternative services provides an environment in which
existing elements, having different characteristics such as
private politics to ensure resource availability, special
requirements to system loading, private security politics, can
be analyzed and easily incorporated without deforming the
survivable character of the systems.
In such collaborative environments the reliability
requirements of any application are handled by a process
specialized in discovering the resources and that uses a
composite set of services, having the role to provide the
necessary levels of reliability.
A major challenge in the design of the presented approach
consists in the investigation of the techniques and
transformations necessary to enhance the reliability of the
composite set of services, mostly by offering an architectural
solution based on workflows.
The second architectural component set responsible with
ensuring dependability at the operating system level is
represented in Figure 2.
Fig. 2. The components acting at the kernel level
At the heart of the operating system lies the kernel,
responsible with providing various services: signal and
message passing services, memory and process management,
etc. A first component is the Reference Monitor, which
resides within the kernel space. This cannot be circumvented
and/or modified and must be simple and compact enough to
be readily understood. All requests coming from various
processes or device drivers must go through this component,
which basically acts as intermediary between the kernel and
user-space applications. This is achieved by masking the
fundamental system calls (for address-space management,
inter-process communications and thread management) as
being served by the kernel itself, but in reality all these calls
are transferred to the Reference Monitor, are checked for
eventual safety problems and, if everything is correct, further
transferred to the kernel itself. In this way the Reference
Monitor acts as a proxy for system calls being made between
user-space applications and the kernel itself.
This component validates all attempts to access the system
resources based on the input provided by the second
component, the Security Policy. This component provides
complete mediation of verification of the validity of requests,
based on sets of permissions. All possible problems are
reported and stored for further inspection and even for
automatically pattern recognition of errors in future cases.
5. CONCLUSION
In this paper we presented an architectural approach to the
development of models, methods and techniques for
satisfying dependability requirements in large scale
distributed systems. Dependability remains a key element in
the context of application development and is by far one of
the most important issues still not solved by recent research
efforts.
Our work is concerned by increasing reliability, availability,
safety and security, particularly in Grids and Web-based
distributed systems. The characteristics of these systems pose
problems to ensuring dependability, especially because of the
heterogeneity and geographical distribution of resources and
users, volatility of resources that are available only for
limited amounts of time, and constraints imposed by the
applications and resource owners. Therefore, we proposed the
design of a hierarchical architectural model that allows a
unitary and aggregate approach to dependability requirements
while preserving scalability of large scale distributed
systems.
Our original contribution addresses the architectural model,
the core of the architecture, and the combination of existing
monitoring, scheduling, data management, security and fault
tolerance solutions to increase dependability of large scale
distributed systems.
REFERENCES
Arenas A., “State of the art survey on trust and security in
Grid computing systems”, Council for the Central
Laboratory of the Research Councils, UK, March 2006.
Avizienis A., J.-C. Laprie, and B. Randell, “Fundamental
Concepts of Dependability”, Research Report No 1145,
LAAS-CNRS, April 2001.
Cox A., K. Mohanram, and S. Rixner, “Dependable ≠
Unaffordable”, 1st workshop on Architectural and
system support for improving software dependability,
San Jose, California, 2006.
Foster I., C. Kesselman, G. Tsudik, and S. Tuecke, “A
Security Architecture for Computational Grids”, Proc.
Fifth Conf. Computer and Communications Security,
ACM, 1998.
Garlan D., et al, “Increasing System Dependability through
Architecture-based Self-repair”, from Architecting
Dependable Systems, Springer-Verlag, 2003.
Grimshaw A., M. Humphrey, J.C. Knight, A. Nguyen-Tuong,
J. Rowanhill, G. Wasson, and J. Basney, “The
Development of Dependable and Survivable Grids”,
2005 Workshop on Dynamic Data Driven Applications,
Emory University, Atlanta, GA. May 22-25, 2005.
Jin H., X. Shi, W. Qinag, and D. Zou, “DRIC: Dependable
Grid Computing Framework”, IEICE - Transactions on
Information and Systems, Volume E89-D, Issue 2
(February 2006).
Neocleous K., M.D. Dikaiakos, P. Fragopoulou, and E.
Markatos, “Grid Reliability: A study of Failures on the
EGEE Infrastructure”, CoreGRID Integration Workshop,
2006.
Nguyen-Tuong A., et al, ”Towards Dependable Grids”,
University of Virginia, 2004.
Rilling L., “Vigne: Towards a Self-Healing Grid Operating
System”, Proceedings of Euro-Par 2006, Dresden,
Germany, Lecture Notes in Computer Science, Springer,
August 2006, vol. 4128, p. 437-447.
Sommerville I., S. Hall, and G. Dobson, “Dependable Service
Engineering: A Fault-tolerance based Approach”,
Lancaster Univ. 2005.
Sonnek J.D., and J.B., Weissman, “A Quantitative
Comparison of Reputation Systems in the Grid”,
Proceedings of the 6th IEEE/ACM International
Workshop on Grid Computing, 2005, pp. 242-249.

Contenu connexe

Tendances

A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Darshan Vithani
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
On managing risk in service-oriented information systems
On managing risk in service-oriented information systemsOn managing risk in service-oriented information systems
On managing risk in service-oriented information systemsTorsten Eymann
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Ranjeet Bhalshankar
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...IOSR Journals
 
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
 
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...Maurice Dawson
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...IEEEMEMTECHSTUDENTPROJECTS
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
Renovo Ce It White Paper Ism
Renovo Ce It White Paper IsmRenovo Ce It White Paper Ism
Renovo Ce It White Paper IsmAnne Granum
 

Tendances (14)

A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
On managing risk in service-oriented information systems
On managing risk in service-oriented information systemsOn managing risk in service-oriented information systems
On managing risk in service-oriented information systems
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2
 
InSTEDD Mesh4x Platform
InSTEDD Mesh4x PlatformInSTEDD Mesh4x Platform
InSTEDD Mesh4x Platform
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...
 
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
 
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
The Case for Ubuntu: Linux Operating System Performance and Usability for Use...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Tracon interference aware schedu...
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Renovo Ce It White Paper Ism
Renovo Ce It White Paper IsmRenovo Ce It White Paper Ism
Renovo Ce It White Paper Ism
 

En vedette

9.guess who he is kudrna o.
9.guess who he is   kudrna o.9.guess who he is   kudrna o.
9.guess who he is kudrna o.Miroslava Filipi
 
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....MECConference
 
9 f = 3 julianto arif setiadi bahrul ulum
9 f = 3 julianto arif setiadi   bahrul ulum9 f = 3 julianto arif setiadi   bahrul ulum
9 f = 3 julianto arif setiadi bahrul ulumEka Dhani
 
9 inteligencias multiples
9 inteligencias multiples9 inteligencias multiples
9 inteligencias multiplesFelix Luque
 
9 - Is longevity an insurable risk? (2015) (ENG)
9 - Is longevity an insurable risk? (2015) (ENG)9 - Is longevity an insurable risk? (2015) (ENG)
9 - Is longevity an insurable risk? (2015) (ENG)InstitutoBBVAdePensiones
 
9DavidGilford_NICHI_BusinessSummit
9DavidGilford_NICHI_BusinessSummit9DavidGilford_NICHI_BusinessSummit
9DavidGilford_NICHI_BusinessSummitNICHI_USA
 

En vedette (8)

9.guess who he is kudrna o.
9.guess who he is   kudrna o.9.guess who he is   kudrna o.
9.guess who he is kudrna o.
 
9. integral lipat dua
9. integral lipat dua9. integral lipat dua
9. integral lipat dua
 
9 Month FY2013 Analyst Presentation
9 Month FY2013 Analyst Presentation9 Month FY2013 Analyst Presentation
9 Month FY2013 Analyst Presentation
 
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....
Communicating Environmental Issues Up the Ladder; Jones, Lou; Ingredion, Inc....
 
9 f = 3 julianto arif setiadi bahrul ulum
9 f = 3 julianto arif setiadi   bahrul ulum9 f = 3 julianto arif setiadi   bahrul ulum
9 f = 3 julianto arif setiadi bahrul ulum
 
9 inteligencias multiples
9 inteligencias multiples9 inteligencias multiples
9 inteligencias multiples
 
9 - Is longevity an insurable risk? (2015) (ENG)
9 - Is longevity an insurable risk? (2015) (ENG)9 - Is longevity an insurable risk? (2015) (ENG)
9 - Is longevity an insurable risk? (2015) (ENG)
 
9DavidGilford_NICHI_BusinessSummit
9DavidGilford_NICHI_BusinessSummit9DavidGilford_NICHI_BusinessSummit
9DavidGilford_NICHI_BusinessSummit
 

Similaire à 9fcfd50a69d9647585

Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2Abi Reddy
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architectureJernej Vrčko
 
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...ijcseit
 
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGPLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGCSEIJJournal
 
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertA Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertWansoo Im
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsnooriasukmaningtyas
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGEditor IJMTER
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Editor IJCATR
 
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...ijiert bestjournal
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREijccsa
 

Similaire à 9fcfd50a69d9647585 (20)

Access control data security
Access control data securityAccess control data security
Access control data security
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
TREA - transparent enterprise architecture
TREA - transparent enterprise architectureTREA - transparent enterprise architecture
TREA - transparent enterprise architecture
 
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
 
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNINGPLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
 
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertA Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
A Framework for Geospatial Web Services for Public Health by Dr. Leslie Lenert
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTINGANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
ANALYSIS OF SOFTWARE SECURITY TESTING TECHNIQUES IN CLOUD COMPUTING
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
 
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...
A SURVEY ON ACCURACY OF REQUIREMENT TRACEABILITY LINKS DURING SOFTWARE DEVELO...
 
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTUREA HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE
 

Plus de Mowaten Masry

143673805 1-burner-management-system
143673805 1-burner-management-system143673805 1-burner-management-system
143673805 1-burner-management-systemMowaten Masry
 
55419663 burner-management-system
55419663 burner-management-system55419663 burner-management-system
55419663 burner-management-systemMowaten Masry
 
114632948 jeres-j-607-burner-management-systems-for-sru-trains
114632948 jeres-j-607-burner-management-systems-for-sru-trains114632948 jeres-j-607-burner-management-systems-for-sru-trains
114632948 jeres-j-607-burner-management-systems-for-sru-trainsMowaten Masry
 
117697637 burner-mgmt-system
117697637 burner-mgmt-system117697637 burner-mgmt-system
117697637 burner-mgmt-systemMowaten Masry
 
49574055 burner-management-system-safety-integrity-level-selection
49574055 burner-management-system-safety-integrity-level-selection49574055 burner-management-system-safety-integrity-level-selection
49574055 burner-management-system-safety-integrity-level-selectionMowaten Masry
 
89912310 boiler-purge-burner-management-system
89912310 boiler-purge-burner-management-system89912310 boiler-purge-burner-management-system
89912310 boiler-purge-burner-management-systemMowaten Masry
 
Manual reset 8327 direct mount push button (m)
Manual reset 8327 direct mount push button (m)Manual reset 8327 direct mount push button (m)
Manual reset 8327 direct mount push button (m)Mowaten Masry
 
Methods of determining_safety_integrity_level
Methods of determining_safety_integrity_levelMethods of determining_safety_integrity_level
Methods of determining_safety_integrity_levelMowaten Masry
 
71364263 voting-logic-sil-calculation
71364263 voting-logic-sil-calculation71364263 voting-logic-sil-calculation
71364263 voting-logic-sil-calculationMowaten Masry
 
96000707 gas-turbine-control
96000707 gas-turbine-control96000707 gas-turbine-control
96000707 gas-turbine-controlMowaten Masry
 
49539990 burner-management-system
49539990 burner-management-system49539990 burner-management-system
49539990 burner-management-systemMowaten Masry
 
78679939 dvc6000manualinstrucciones
78679939 dvc6000manualinstrucciones78679939 dvc6000manualinstrucciones
78679939 dvc6000manualinstruccionesMowaten Masry
 
Item06 reliability-availability-maintainability-and-safety-programme
Item06 reliability-availability-maintainability-and-safety-programmeItem06 reliability-availability-maintainability-and-safety-programme
Item06 reliability-availability-maintainability-and-safety-programmeMowaten Masry
 
75340982 standards-issued
75340982 standards-issued75340982 standards-issued
75340982 standards-issuedMowaten Masry
 
Safety instrumented systems
Safety instrumented systemsSafety instrumented systems
Safety instrumented systemsMowaten Masry
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systemsMowaten Masry
 
94716008 burner-management-system-et-2008
94716008 burner-management-system-et-200894716008 burner-management-system-et-2008
94716008 burner-management-system-et-2008Mowaten Masry
 

Plus de Mowaten Masry (20)

143673805 1-burner-management-system
143673805 1-burner-management-system143673805 1-burner-management-system
143673805 1-burner-management-system
 
55419663 burner-management-system
55419663 burner-management-system55419663 burner-management-system
55419663 burner-management-system
 
An9030
An9030An9030
An9030
 
114632948 jeres-j-607-burner-management-systems-for-sru-trains
114632948 jeres-j-607-burner-management-systems-for-sru-trains114632948 jeres-j-607-burner-management-systems-for-sru-trains
114632948 jeres-j-607-burner-management-systems-for-sru-trains
 
117697637 burner-mgmt-system
117697637 burner-mgmt-system117697637 burner-mgmt-system
117697637 burner-mgmt-system
 
49574055 burner-management-system-safety-integrity-level-selection
49574055 burner-management-system-safety-integrity-level-selection49574055 burner-management-system-safety-integrity-level-selection
49574055 burner-management-system-safety-integrity-level-selection
 
89912310 boiler-purge-burner-management-system
89912310 boiler-purge-burner-management-system89912310 boiler-purge-burner-management-system
89912310 boiler-purge-burner-management-system
 
Manual reset 8327 direct mount push button (m)
Manual reset 8327 direct mount push button (m)Manual reset 8327 direct mount push button (m)
Manual reset 8327 direct mount push button (m)
 
Methods of determining_safety_integrity_level
Methods of determining_safety_integrity_levelMethods of determining_safety_integrity_level
Methods of determining_safety_integrity_level
 
44636808 bms
44636808 bms44636808 bms
44636808 bms
 
71364263 voting-logic-sil-calculation
71364263 voting-logic-sil-calculation71364263 voting-logic-sil-calculation
71364263 voting-logic-sil-calculation
 
96000707 gas-turbine-control
96000707 gas-turbine-control96000707 gas-turbine-control
96000707 gas-turbine-control
 
49539990 burner-management-system
49539990 burner-management-system49539990 burner-management-system
49539990 burner-management-system
 
78679939 dvc6000manualinstrucciones
78679939 dvc6000manualinstrucciones78679939 dvc6000manualinstrucciones
78679939 dvc6000manualinstrucciones
 
Item06 reliability-availability-maintainability-and-safety-programme
Item06 reliability-availability-maintainability-and-safety-programmeItem06 reliability-availability-maintainability-and-safety-programme
Item06 reliability-availability-maintainability-and-safety-programme
 
75340982 standards-issued
75340982 standards-issued75340982 standards-issued
75340982 standards-issued
 
Safety instrumented systems
Safety instrumented systemsSafety instrumented systems
Safety instrumented systems
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
E04
E04E04
E04
 
94716008 burner-management-system-et-2008
94716008 burner-management-system-et-200894716008 burner-management-system-et-2008
94716008 burner-management-system-et-2008
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 

Dernier (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 

9fcfd50a69d9647585

  • 1. Models and Techniques for Ensuring Reliability, Safety, Availability and Security of Large Scale Distributed Systems Valentin Cristea*, Ciprian Dobre*, Florin Pop*, Corina Stratan*, Alexandru Costan*, Catalin Leordeanu*, Eliana Tirsa* *Faculty of Automatic Control and Computers, University Politehnica of Bucharest ( e-mail: valentin.cristea, ciprian.dobre, florin.pop, corina.stratan, alexandru.costan, catalin.leordeanu, eliana.tirsa @ cs.pub.ro). Abstract: This paper presents an original approach to the development of models, methods and techniques for increasing reliability, availability, safety and security of large scale distributed systems, particularly Grids and Web-based distributed systems. The characteristics of these systems pose problems to ensuring dependability, especially because of the geographical distribution of resources and users, volatility of resources that are available only for limited amounts of time, and constraints imposed by the applications and resource owners. The problems of ensuring dependability represents a hot research subject today and, despite the fact that many projects obtained valuable results in this domain, no acceptable solution was yet found that could integrate all the requirements for designing a dependable system and that could exploit all the capabilities of modern systems. The paper proposes the design of an architectural model that allows the unitary and aggregate approach to reliability, availability, safety and security. 1. INTRODUCTION Both in the academic and industrial environments there is an increasing interest in large scale distributed systems, which currently represent the preferred instruments for developing a wide range of new applications. The Grid computing domain has especially progressed during the last years due to the technological opportunities that it offers. While until recently the research in the distributed systems domain has mainly targeted the development of functional infrastructures, today researchers understand that many applications, especially the commercial ones, have some complementary necessities that the „traditional” distributed systems do not satisfy. Together with the extension of the application domains, new requirements have emerged for large scale distributed systems; among these requirements, reliability, safety, availability, security and maintainability (synthesized in the literature in the concept of „dependability” (Avizenis et al.,2001)) are needed by more and more modern distributed applications, not only by the critical ones. Although the importance of dependable systems is widely recognized and many research projects have been initiated recently in this domain, there are no mature implementations of these concepts available yet; the existing systems offer only partial solutions, and often the approaches separate the issues of reliability, availability, security etc. In this paper we present innovative solutions to researching and developing original models, methods and techniques that satisfy dependability requirements in large scale distributed systems, which are essential for the new types of applications. We present an architectural model which allows the unified approach to reliability, availability, safety and security. The model is based on the use of tools for communication, monitoring, scheduling, management and accessibility (retrieval, efficient transfer) of data, and security, in order to provide increased levels of dependability. We also present a minimal set of functionalities, absolutely necessary to ensure the reliability, availability, safety and security. The presented architecture is adaptable, reconfigurable and regenerative and can help distributed system designers to increase dependability while preserving scalability. The rest of this paper is organized as follows. Section 2 describes the requirements of implementing a complete dependable solution. In Section 3 we present related work. Section 4 presents the architectural design being proposed in the current paper. In Section 5 we conclude and present future work. 2. REQUIREMENTS The characteristics of large scale distributed systems make dependability a difficult problem from several points of view. A first aspect is the geographical distribution of resources and users that implies frequent remote operations and data transfers; these lead to a decrease in the system's safety and reliability and make it more vulnerable from the security point of view. Another problem relates to the volatility of the resources, which are usually available only for limited periods of time; the system must ensure the correct and complete execution of the applications even when resources are introduced and removed dynamically, or when they are damaged. The management of distributed systems is also complicated by the constraints that the applications and the
  • 2. owners of the resources impose; in many cases there are conflicts between these constraints – for example, an application needs a long execution time and performs database operations, while the owner of the machine on which the application could be run only makes it available in a restricted time interval and does not allow database operations. Solving these issues still represents a research domain and, although numerous projects have obtained significant results, no complete solution has been fond yet to integrate all requirements involved in obtaining a dependable system. In order to facilitate implementation, as well as evaluation, the architectural model being proposed provides trust mechanisms for service and resource provisioning, and guarantees for the delegation and context services, together with various mechanisms to orchestrate services such that to achieve high levels of reliability and fault tolerance. Unlike similar research solutions previously presented, we propose a unified approach to all the aspects concerning dependable systems, by analyzing and designing methods and techniques for improving the reliability, availability, safety and security of large scale distributed systems. We also explore issues that appear in reference publications, but today are insufficiently addressed. For example, the fault detection and correction mechanisms are extended with fault prediction and avoidance mechanisms. The architectural model proposed in this paper also includes a prediction component, and its design is based on the use of monitoring tools. We are focusing on Grid systems, but the proposed solutions can be easily applied to other types of distributed systems, for example Web based ones. Contemporary distributed environments are composed of multiple autonomous services, possible running on different machines, under the control of different organizations. Since our focus is on Grid systems we also need to take into account the concept of Virtual Organizations. From a security point of view this poses a number of interesting challenges. If we view the Virtual Organizations as groups of users who share a certain level of trust we need to create security policies which are active within a VO and others between members of a VO and non-members. For example, a member of a VO might allow other members to read data he has submitted but there must be mechanisms in place to ensure that this is not possible for a user which is not a part of the VO. At the same time the level of trust between members of a VO is not absolute so in this case we must also make sure that users cannot modify each other’s data. The scalability and availability requirements of such services have led to system architectures that diverge significantly from those of traditional distributed systems. Given the need for thousands of nodes, cost often necessitates the use of inexpensive personal computers wherever possible, and efficiency often requires customized service software. Likewise, addressing the goal of zero downtime requires human operator involvement and pervasive redundancy within clusters and between globally distributed computing centers. The new requirements for unrestricted availability demands coming from next-generation critical applications pose interesting challenges because the large scale distributed systems: • typically comprise many inexpensive PCs that lack expensive reliability features; • undergo frequent scaling, reconfiguration, and functionality changes; • often run custom software that has undergone limited testing; • rely on networks within service clusters, between geographically distributed collocation facilities, and between collocation facilities and end-user clients; • aim to be available 24/7 for users worldwide, making planned downtime undesirable or impossible. The proposed architectural model must, therefore, be instrumented with the support for fault-tolerance and security techniques to assure the resiliency of applications and the high-availability of crucial Grid services. Among the requirements that must be satisfied by the architecture we recall tamper resistance in the face of intruders, the system must always be invoked and must be designed small enough such that to be subject to analysis and tests to ensure its correctness using formal methods. 3. RELATED WORK Most of the approaches to the dependability problem are mainly focused on fault detection and fault tolerance. The authors of (Jin et al.,2006) introduce an adaptive system for fault detection in Grids and a policy-based recovery mechanism. Fault detection is achieved by monitoring the system, and for recovery several mechanisms are available, among which task replication and checkpointing. In (Sommerville et al.,2003) the authors present a solution for web services, based on the implementation of a fault-tolerant container; the fault-tolerant containers manage a set of replicated services, which can be offered by external providers as well. The containers can be configured for various fault tolerance strategies (either an equivalent service is invoked when a service fails, or multiple equivalent services are invoked from the beginning and a voting mechanism is applied etc.). Another approach less related to large scale distributed systems is presented in (Cox et al., 2005), which addresses the tolerance to hardware faults through virtualization; the proposed solution is named Loosely Synchronized Redundant Virtual Machines (LSRVM). In (Grimshaw et al., 2005) the authors emphasize on the idea of survivability, which consists in providing, in case of a error, an alternative service, even if the latter doesn't fully satisfy the initial user requirements. For requirements specification, the authors propose DESL (Dependability Exchange and Specification Language), an XML based language; DESL isn't fully specified yet.
  • 3. Other two papers in this field are (Sonnek et al, 2005), which proposes a reputation based classification of Grid services, similar to the one in peer-to-peer systems, and (Rilling et al, 2006), which presents a Grid operating system architecture, with self-healing properties. In (Neocleous et al., 2006) the authors carry out a detailed study on errors in Grid systems, providing case-studies from the EGEE (Enabling Grids for E- Science) European project. Another aspect of dependability is security. Currently there are several solutions for providing security for Grid environments and for distributed systems in general. In case of Grid systems, in (Foster et al, 1998) the authors identified a set of base requirements (single authentication, credentials protection, interoperability with local security solutions, etc) and proposed both an architectural model for security and a public key cryptography infrastructure based on a reference implementation (Grid Security Infrastructure – GSI). The existing solutions for security in large scale distributed systems have various unresolved issues (Arenas et al, 2006). The majority of Grid systems were initially designed for scientific collaboration between participants that knew each others. This implies an implicit trusting relationship, all partners sharing a common goal – for example to carry out a scientific experiment – and it is implicitly assumed that the resources are provided and shared according to some well defined and respected rules. But when used in industrial environments such systems must satisfy the need to share resources with unknown groups, which could generate certain risks. A possible solution is to impose certain mechanisms to preserve the identity even in this situation. 4. ARCHITECTURAL MODEL In our proposal we aim to exploit some features of the services provided by the large-scale distributed systems to enhance availability: • Plentiful hardware allows for redundancy. • Geographic distribution of collocation facilities allows control of environmental conditions and resilience to large-scale disasters. The model considers that the problem of developing highly dependable large scale distributed systems is technological prohibited by the various technical problems arising in distributed systems, such as the weak resilience of the operating systems, known for offering various security vulnerabilities. The solution to this problem consists in the inclusion of a complete set of mechanisms necessary to guarantee the various security needs: the trust in service and resource provisioning, guarantees to the delegation and context mechanisms. The architectural model includes for this purpose two specialized components. A first set of components act inside the middleware layer of the distributed system, intermediating dependability between different hosts composing the distributed systems. At this level the components of the proposed architectural model are presented in Figure 1. Fig. 1. The architectural model of the service layer At the bottom of the architecture is the core of the system designed to orchestrate the functionalities provided by the other components. Its role is to integrate and provide a dependable execution environment for several other components. It also orchestrates the survivable and redundancy mechanisms described below. The model is based on a minimal set of functionalities, absolutely necessary to ensure the reliability, availability, safety and security. We argue that such functionalities are a reference for implementing a functional core for a dependable distributed system and that the set of functionalities are sufficient to cover the basic needs of the majority of distributed systems, without operating major changes. The architecture includes the mechanisms necessary to ensure a strong resilience in the presence of faults and various security threats coming from the incoming connection. At this level we included a first component based with detecting when various processes of the distributed system fail. We propose an approach based on adaptive, decentralized failure detectors, capable of working asynchronous and independent on the application flow. The proposed solution considers architecture for the failure detectors, based on clustering, the use of a gossip-based algorithm for detection at local level and the use of a hierarchical structure among clusters of detectors along which traffic is channelled. The solution can scale to a large number of nodes, considers the QoS requirements of both applications and resources, and includes fault tolerance and system orchestration mechanisms, added in order to assess the reliability and availability of distributed systems. At this level we extend the solution of the inclusion of a complete set of mechanisms necessary to guarantee the various security needs previously described with the mechanisms of taking security related decisions, possible based on monitored data. A component also integrated into the architecture is responsible with ensuring that these decisions are enforced by its integration with the various existing services and security infrastructures (such as GSI or Kerberos).
  • 4. Beside the traditional alternatives to constructing dependable services as were integrated here, the fault avoidance, fault elimination and fault tolerance (Nguyen-Tuong et al, 2004), we also considered mechanisms for the dynamic adaptation to environment conditions. For this reason the model includes a minimal set of components: a monitoring subsystem, a component used to compare various architectural patterns, an architectural core for analyzing data, a component responsible with starting adequate repairs and a module responsible with the broadcast of information regarding the changes occurring in various part of the distributed system. The architectural model thus offers various intelligent mechanisms designed to dynamically solve the various occurring problems and that also represents a link between the distributed system and the various running functionalities of the applications, using automatic reconfiguration of both services and resources. The proposed architectural model integrates several technologies that are necessary to ensure a high level of reliability, providing fault prevention, fault removal, fault tolerance, and fault forecasting, as well as security mechanisms. The core allows modularity, an aspect which influences the adoption of the architecture in various existing Grid infrastructures. The modularity allows dealing with the service-oriented architecture on which existing grid systems are built and facilitates the implementation of the survivability concept presented below. The model also allows the generic integration with various technologies specific to large scale distributed systems, and the development and evaluation of various new models and technologies. For this, the proposed components ensure the interoperability with services specific to such systems and each one ensures the reliability specifications coming from higher-level applications. Another problem with existing distributed system relates to the prohibitive costs imposed by the replication of all basic components of the system, as well as those responsible for the communication, storage and computation. Replication of these services is currently seen as a necessity because it offers the highest availability to the system. In fact, several of the previously analyzed solutions are based on the idea of replicating as many services and resources as possible such that, when one fails, the other immediately takes its place and functionality. The use of replication mechanisms is appealing because it increases the reliability of the system, but our model considers a combination of both replication mechanisms together with mechanisms to ensure survivability of the system in the presence of major faults. The adopted solution to developing an architectural model in which the system survive by adapting in the presence of fault arise naturally by explicitly acknowledge the impossibility to include a complete solution to ensure reliability considering the resulting resources and technologies. The impossibility is mainly derived from the human nature of the system developers and operators, as well as prohibitive costs necessary to implement a completely replicated Grid system. For such reasons we adopt the strategy of using replication only for the most basic core functionality of the system. We use replication in the form of fault-tolerant containers; the fault-tolerant containers could easily manage a set of replicated services. We also adopt a survivability approach in which we provide several services such that when one can not tolerate faults or security attacks another one takes its place. The system survives by learning the conditions which eventually led to the fault of a service or resource, using patterns. The architectural model also includes mechanisms necessary for the system to adapt and survive in the context of dynamic nature of existing resources, faults occurring in the system and various changes in the exploitation requirements of the system. In order to offer technologies capable to automatically correct various occurring problems and that are capable of taking intelligent decisions we propose the adoption of a solution based on the use of architectural patterns for correcting faults. Such patterns have a special role in the context of monitoring, being used in a process of automatically detect faulty behavior of resources or various other problems and take higher-level decisions to start adequate repairing steps (Garlan et al, 2003). For that, the Analyze and Respond services (Figure 2) would continuously analyze real-time data collected from an external monitoring system. The data are processed and compared against a set of patterns (existing and learned as the system adapts to changing environment). One of the biggest challenges at this level is represented by the capability to not only recognize faults, but also predict faulty behavior in various parts of the distributed system. This service is in fact capable to do that by using various mathematical distributions and AI constructs (neural networks, moving average distributions, etc.). The component responsible with the real-time analysis of monitored data is the Architectural Analysis Engine (see Figure 1). The analyzer uses the services provided by the Architectural Model Comparator. When faults or security breaches are detected the system would further initiate (possible automatically, if not possible would alert a human operator of the problem) an operation to correct the situation. Such a correction is initiated by the Operation Repair Center component (Figure 1). The correction could be, for instance, the raise of an alternative service that could supplement the activity offered by the faulty service or could represent an instruction sent to a Scheduling Service to reschedule faulty jobs. Also, by integrating various existing services, if the underlying distributed environment is capable of executing checkpointing operations (such as Condor) then the Operation Repair Center could also initiate an action to recover the last state using the checkpointing data. Of course, once the repair action was determined it must be correctly propagated inside the entire distributed system. The role of this action is assumed by the Change Propagation Center (Figure 1). In this way, the architecture involved communication with services providing functionalities in various parts of a Grid system. The data is collected from a monitoring service and we intend to integrate the architecture closely with such a system. The checkpointing capability
  • 5. involves dealing with a storage service. The state of the system must be received from a central indexing service of the underlying middleware. The fault of a job would initiate a dialog between the services provided by the presented architecture and a scheduling service. The detection of faults, as well as propagation of recovery actions means using a data transfer service. An approach based on offering survivable architectural characteristics naturally maps on a developing environment in which applications are built by incorporating existing elements in various administrative domains, an inherent characteristic of Grid systems. The specification of alternative services provides an environment in which existing elements, having different characteristics such as private politics to ensure resource availability, special requirements to system loading, private security politics, can be analyzed and easily incorporated without deforming the survivable character of the systems. In such collaborative environments the reliability requirements of any application are handled by a process specialized in discovering the resources and that uses a composite set of services, having the role to provide the necessary levels of reliability. A major challenge in the design of the presented approach consists in the investigation of the techniques and transformations necessary to enhance the reliability of the composite set of services, mostly by offering an architectural solution based on workflows. The second architectural component set responsible with ensuring dependability at the operating system level is represented in Figure 2. Fig. 2. The components acting at the kernel level At the heart of the operating system lies the kernel, responsible with providing various services: signal and message passing services, memory and process management, etc. A first component is the Reference Monitor, which resides within the kernel space. This cannot be circumvented and/or modified and must be simple and compact enough to be readily understood. All requests coming from various processes or device drivers must go through this component, which basically acts as intermediary between the kernel and user-space applications. This is achieved by masking the fundamental system calls (for address-space management, inter-process communications and thread management) as being served by the kernel itself, but in reality all these calls are transferred to the Reference Monitor, are checked for eventual safety problems and, if everything is correct, further transferred to the kernel itself. In this way the Reference Monitor acts as a proxy for system calls being made between user-space applications and the kernel itself. This component validates all attempts to access the system resources based on the input provided by the second component, the Security Policy. This component provides complete mediation of verification of the validity of requests, based on sets of permissions. All possible problems are reported and stored for further inspection and even for automatically pattern recognition of errors in future cases. 5. CONCLUSION In this paper we presented an architectural approach to the development of models, methods and techniques for satisfying dependability requirements in large scale distributed systems. Dependability remains a key element in the context of application development and is by far one of the most important issues still not solved by recent research efforts. Our work is concerned by increasing reliability, availability, safety and security, particularly in Grids and Web-based distributed systems. The characteristics of these systems pose problems to ensuring dependability, especially because of the heterogeneity and geographical distribution of resources and users, volatility of resources that are available only for limited amounts of time, and constraints imposed by the applications and resource owners. Therefore, we proposed the design of a hierarchical architectural model that allows a unitary and aggregate approach to dependability requirements while preserving scalability of large scale distributed systems. Our original contribution addresses the architectural model, the core of the architecture, and the combination of existing monitoring, scheduling, data management, security and fault tolerance solutions to increase dependability of large scale distributed systems. REFERENCES Arenas A., “State of the art survey on trust and security in Grid computing systems”, Council for the Central Laboratory of the Research Councils, UK, March 2006. Avizienis A., J.-C. Laprie, and B. Randell, “Fundamental Concepts of Dependability”, Research Report No 1145, LAAS-CNRS, April 2001. Cox A., K. Mohanram, and S. Rixner, “Dependable ≠ Unaffordable”, 1st workshop on Architectural and system support for improving software dependability, San Jose, California, 2006. Foster I., C. Kesselman, G. Tsudik, and S. Tuecke, “A Security Architecture for Computational Grids”, Proc. Fifth Conf. Computer and Communications Security, ACM, 1998.
  • 6. Garlan D., et al, “Increasing System Dependability through Architecture-based Self-repair”, from Architecting Dependable Systems, Springer-Verlag, 2003. Grimshaw A., M. Humphrey, J.C. Knight, A. Nguyen-Tuong, J. Rowanhill, G. Wasson, and J. Basney, “The Development of Dependable and Survivable Grids”, 2005 Workshop on Dynamic Data Driven Applications, Emory University, Atlanta, GA. May 22-25, 2005. Jin H., X. Shi, W. Qinag, and D. Zou, “DRIC: Dependable Grid Computing Framework”, IEICE - Transactions on Information and Systems, Volume E89-D, Issue 2 (February 2006). Neocleous K., M.D. Dikaiakos, P. Fragopoulou, and E. Markatos, “Grid Reliability: A study of Failures on the EGEE Infrastructure”, CoreGRID Integration Workshop, 2006. Nguyen-Tuong A., et al, ”Towards Dependable Grids”, University of Virginia, 2004. Rilling L., “Vigne: Towards a Self-Healing Grid Operating System”, Proceedings of Euro-Par 2006, Dresden, Germany, Lecture Notes in Computer Science, Springer, August 2006, vol. 4128, p. 437-447. Sommerville I., S. Hall, and G. Dobson, “Dependable Service Engineering: A Fault-tolerance based Approach”, Lancaster Univ. 2005. Sonnek J.D., and J.B., Weissman, “A Quantitative Comparison of Reputation Systems in the Grid”, Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, 2005, pp. 242-249.