|Table of Contents|

[1] Zhao Guosheng, Wang Huiqiang, Wang Jian, et al. Emergency algorithm for enhanced survivability of key service [J]. Journal of Southeast University (English Edition), 2007, 23 (3): 443-446. [doi:10.3969/j.issn.1003-7985.2007.03.029]
Copy

Emergency algorithm for enhanced survivability of key service()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
23
Issue:
2007 3
Page:
443-446
Research Field:
Computer Science and Engineering
Publishing date:
2007-09-30

Info

Title:
Emergency algorithm for enhanced survivability of key service
Author(s):
Zhao Guosheng1 2 Wang Huiqiang1 Wang Jian1
1College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
2Center of Network and Information, Harbin Normal University, Harbin 150001, China
Keywords:
emergency response survivability key service confidence interval
PACS:
TP393.08
DOI:
10.3969/j.issn.1003-7985.2007.03.029
Abstract:
To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented.First, based on the central limit theorem and the hypothesis testing theory, the confidence interval of each key service’s history average service response time in the host server and the spare server can be figured out, respectively. This can also be updated dynamically by a proposed method using the method of time slide window.Then, according to the five kinds of distributed situations of the current service response time’s confidence interval in the host server and the spare server, the proposed algorithm can dynamically choose the appropriate emergency policies such as resource reconfiguration, service degradation or service drifting, etc.in right time. Thus, the key service request can be finished within its expected deadline by users as far as possible.Furthermore, the whole process of dynamic configuration is transparent to users.Finally, simulation tests are performed to prove the feasibility.

References:

[1] Westmark V R.A definition for information system survivability [C]//Proc of the 37th International Conference on System Sciences.Washington, DC:IEEE Computer Society Press, 2004:2086-2096.
[2] Ellison R J, Fisher D A, Linger R C, et al.Survivable network systems:an emerging discipline[R].Software Engineering Institute of Carnegie Mellon University, 1997.
[3] Linger R C, Mead N R, Lipson H F.Requirements definition for survivable network systems [C]//Proc of the Third International Conference on Requirements Engineering.Los Alamitos, CA, USA, 1998:14-23.
[4] Richard C L, Howard F L, John M, et al.Life-cycle models for survivable systems, CMU/SEI-2002-ESC-TR-026[R].Boston:Carnegie Mellon University, 2002.
[5] Zinky J A, Bakken D E, Schantz R.Architectural support for quality of service for CORBA objects [J].Theory and Practice of Object Systems, 1997, 3(1):55-73.
[6] Liu Peng.Architectures for intrusion tolerant database systems [C]//Proc of the Foundations of Intrusion Tolerant Systems (OASIS’03).Las Vegas, Nevada, 2003:3-13.
[7] Wang F, Gong F, Jou F, et al.SITAR:a scalable intrusion tolerance architecture for distributed services[C]//Proc of the 2001 IEEE Workshop on Information Assurance and Security.New York:IEEE Press, 2001:38-45.
[8] Knight J C, Heimbigner D, Wolf A, et al.The willow architecture:comprehensive survivability for large-scale distributed applications [C]//Proc of the International Conference on Dependable Systems and Networks.New York:IEEE Press, 2002:54-74.
[9] Tally G, Whitmore B, Sames D.Intrusion tolerant distributed object systems:project summary[C]//Proc of the DARPA Information Survivability Conference and Exposition.Washington, DC:IEEE Computer Society Press, 2003:149-151.

Memo

Memo:
Biographies: Zhao Guosheng(1977—), male, graduate;Wang Huiqiang(corresponding author), male, doctor, professor, wanghuiqiang@hrbeu.edu.cn.
Last Update: 2007-09-20