• Article
  • | |
  • Metrics
  • |
  • Reference [66]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    With the advance of computer hardware and software techniques and the continuous growth of application requirements, the computing systems, which have computers as their centers, have increasingly broadened the scope of application, while the complexity is also growing quickly. The demand for evaluating and improving the dependability of computing systems is more and more urgent. This paper gives the definition of computing systems’ dependability, and a series of quantitative indicators are presented to evaluate the dependability.At the same time, the threats to system dependability are classified and analyzed in details. Since the traditional methods are incapable of dealing with the diverse dependability problem faced by the increasingly complex systems,people are constantly searching for new techniques. In this context, the virtualization technique comes to its renaissance, and is rapidly becoming a major research focus in recent years. In this paper, the existing research results on applying virtualization to enhance the dependability of computing systems are summed up, and the main characteristics and mechanisms of virtualization on enhancing dependability are introduced. But due to the restrictions of the existing computing systems architecture, the superiority of virtualization can not work fully.Service Oriented Architecture (SOA) meets the requirements of virtualization well for the loosely coupled, platform independence characteristics. Therefore, at the last part of this paper, a framework which integrates SOA and virtualization is proposed to enhance the dependability of computing systems, which is called Service Oriented Virtualization (SOV). This paper analyzes how this system framework can enhance the system dependability by mechanisms of virtualization and architecture superiority, when faced with many kinds of dependability threats.

    Reference
    [1] Goldberg RP. Survey of virtual machine research. IEEE Computer Magazine, 1974,7(6):34?45.
    [2] Creasy RJ. The origin of the VM/370 time-sharing system. IBM Journal of Research and Development, 1981,25(5):483?490.
    [3] Figueiredo R, Dinda PA, Fortes J. Resource virtualization renaissance. IEEE Computer Society, 2005,38(5):28?31.
    [4] Gartner Identifies the Top 10 Strategic Technologies for 2008. 2007. http://www.gartner.com/it/page.jsp?id=530109
    [5] OGSA glossary of terms. 2005. http://www.ggf.org/documents/GWD-I-E/GFD-I.044.pdf
    [6] Algirdas A, Jean-Claude L, Brian R, Carl L. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. on Dependable and Secure Computing, 2004,1(1):11?33.
    [7] Nicol DM, Sanders WH, Trivedi KS. Model-Based evaluation: From dependability to security. IEEE Trans. on Dependable and Secure Computing, 2004,1(1):48?65.
    [8] Nahman JM. Dependability of Engineering Systems, Modeling and Evaluation. Berlin, Heidelberg: Springer-Verlag, 2002. 63?74.
    [9] Birolini A. Reliability Engineering, Theory and Practice. 5th ed., Berlin, Heidelberg: Springer-Verlag, 2007. 2?24.
    [10] Lin C, Wang YZ, Yang Y, Qu Y. Research on network dependability analysis methods based on stochastic Petri net. Chinese Journal of Electronics, 2006,34(2):322?332 (in Chinese with English abstract).
    [11] Lin C, Wang Y, Li QL. Stochastic modeling and evaluation for network security. Chinese Journal of Computers, 2005,28(12):1943?1956 (in Chinese with English abstract).
    [12] Cao JH, Cheng K. Introduction to the Reliability of Mathematics. Revised ed., Beijing: Higher Education Press, 2006 (in Chinese).
    [13] Madan B, Go?eva-Popstojanova K, Vaidyanathan K, Trivedi KS. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004,56(1-4):167?186.
    [14] Functional safety of electrical/electronic/programmable electronic safety-related systems. IEC Standard 61508, 2000. http://www.iec.ch/zone/fsafety/
    [15] Functional safety and IEC 61508. IEC/TR 61508-0, 2005. http://www.iec.ch/zone/fsafety/
    [16] Laprie JC. Dependability: Basic concepts and terminology, in English, French, German, Italian and Japanese. In: Proc. of the IFIP WG 10.4 Dependable Computing and Fault Tolerance. Berlin, Heidelberg: Springer-Verlag, 1992. 34?36.
    [17] Rose R. Survey of system virtualization techniques. In: Proc. of the 3rd Int’l Conf. on Parallel Processing and Applied Mathematics.2004. http://www.robertwrose.com/vita/rose-virtualization.pdf
    [18] Jones MT. Virtual Linux: An overview of virtualization methods, architectures, and implementations. 2006. http://www-128.ibm.com/developerworks/library/l-linuxvirt/index.html
    [19] LeVasseur J, Uhlig V, Chapman M, Chubb P, Leslie B, Heiser G. Pre-Virtualization: Slashing the cost of virtualization. Technical Report, 2005-30, 2005. http://l4ka.org/publications/2005/previrtualization-techreport.pdf
    [20] Lawton KP. Bochs: A portable pc emulator for unix/x. Linux Journal, 1996,29(7). http://www.linuxjournal.com/article/1310
    [21] Bellard F. QEMU, a fast and portable dynamic translator. In: Proc. of the USENIX Annual Technical Conf. 2000. http://www.usenix.org/event/usenix05/tech/freenix/full_papers/bellard/bellard_html/
    [22] Venkitachalam G, Lim BH. Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In: Proc. of the General Track: 2002 USENIX Annual Technical Conf. Berkeley: USENIX Association, 2001. 1?14.
    [23] IBM System z: z/VM. http://www-900.ibm.com/cn/products/servers/zseries/virtualization/zvm.shtml
    [24] Whitaker A, Shaw M, Gribble SD. Denali: Lightweight virtual machines for distributed and networked applications. In: Proc. of the Operating Systems Design and Implementation, 2002. http://www.cs.ucla.edu/~miodrag/cs259-security/whitaker02denali.pdf
    [25] Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Warfield A. Xen and the art of virtualization. In: Proc. of the ACM Symp. on Operating Systems. Bolton Landing, 2003. 164?177. http://www.cse.unsw.edu.au/~cs9242/current/papers/Barham_DFHHHNPW_03.pdf
    [26] Ligneris BD. Virtualization of Linux-based computers: The Linux-vserver project. In: Proc. of the 19th Int’l Symp. on High Performance Computing Systems and Applications (HPCS 2005). 2005. 340?346. http://downloads.revolutionlinux.com/Articles/2005-vserver-theory.pdf
    [27] Solaris Internals: Zones. 2007. http://www.solarisinternals.com/wiki/index.php/Zones
    [28] Uhlig R, Weiger G, Rodgers D, Santoni AL, Martins FCM, Anderson AV, Bennett SM, K?gi A, Leung FH, Smitb L. Intel virtualization technology. IEEE Internet Computing, 2005,38(5):48?56.
    [29] VMware VMotion. Live migration of virtual machines without service interruption. VMware Inc. White Paper. http://www.vmware.com/products/vi/vc/vmotion.html
    [30] Clark C, Fraser K, Hand S, Hansen JG, Jul E, Limpach C, Pratt I, Warfield A. Live migration of virtual machines. In: Proc. of the 2nd ACM/USENIX Symp. on Networked Systems Design and Implementation (NSDI). Boston, 2005. 273?286. https://www.usenix.org/publications/library/proceedings/nsdi05/tech/full_papers/clark/clark.pdf
    [31] Garfinkel T, Warfield A. What virtualization can do for security. The USENIX Magazine, 2007,32(6):28?34.
    [32] VMware Consolidated Backup. Best practices and deployment considerations. VMware Inc. White Paper. http://www.vmware. com/pdf/vi3_consolidated_backup.pdf
    [33] Vallée G, Naughton T, Ong H, Scott SL. Checkpoint/Restart of virtual machines based on Xen. In: Proc. of the High Availability and Performance Computing Workshop (HAPCW 2006). 2006. 30. http://xcr.cenit.latech.edu/hapcw2006/program/papers/cr-xenhapcw06-final.pdf
    [34] Badrinath R, Krishnakumar R, et al. Virtualization aware job schedulers for checkpoint-restart. In: Proc. of the 13th Int’l Conf. on Parallel and Distributed Systems (ICPADS 2007). 2007. 1?7. http://portal.acm.org/citation.cfm?id=1396951
    [35] Ta-Shma P, Laden G, Ben-Yehuda M, Factor M. Virtual machine time travel using continuous data protection and checkpointing.ACM SIGOPS Operating Systems Review, 2008,42(1):127?134.
    [36] Liu PC, Chen HB, Zang BY. Enhance the reliability of computer systems in virtual environment. Communications of CCF, 2008,4(4):24?32 (in Chinese with English abstract).
    [37] Bressoud TC, Schneider FB. Hypervisor-Based fault tolerance. ACM Trans. on Computer Systems (TOCS), 1996,14(1):80?107.
    [38] VMware double-take. VMware Inc. and Double-Take Software, Inc., 2006. http://www.vmware.com/pdf/vmware_doubletake.pdf
    [39] Joshi A, King ST, Dunlap GW, Chen PM. Detecting past and present intrusions through vulnerability-specific predicates. In: Proc.of the 20th ACM Symp. on Operating Systems Principles (SOSP 2005). 2005. 91?104. http://comguywoo.googlepages.com/ p91-joshi.pdf
    [40] King ST, Chen PM. Backtracking intrusions. In: Proc. of the 19th ACM Symp. on Operating Systems Principles (SOSP 2003). 2003. 223?236. http://reference.kfupm.edu.sa/content/b/a/backtracking_intrusions__63470.pdf
    [41] King ST, Mao ZM, Lucchetti DG, Chen PM. Enriching intrusion alerts through multi-host causality. In: Proc. of the Network and Distributed System Security Symp. (NDSS 2005). 2005. http://www.cs.umich.edu/~zmao/Papers/ndss05.pdf
    [42] Garfinkel T, Rosenblum M. A virtual machine introspection-based architecture for intrusion detection. In: Proc. of the Network and Distributed Systems Security Symp. The Internet Society, 2003. 191?206. https://eprints.kfupm.edu.sa/22103/1/22103.pdf
    [43] Dunlap GW, King ST, Cinar S, Basrai MA, Chen DM. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In: Proc. of the 5th Symp. Operating Systems Design and Implementation. Usnix, 2002. 211?224. http://www.cs.uiuc.edu/ homes/kingst/Research_files/dunlap02.pdf
    [44] Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D. Terra: A virtual machine-based platform for trusted computing. In: Proc. of the 19th ACM Symp. Operating Systems Principles. ACM Press, 2003. 193?206. http://www.cs.columbia.edu/~nieh/teaching/ e6118_s04/papers/2_17_garfinkel_terra.pdf
    [45] Paul R. DoD towards software services. In: Proc. of the 10th IEEE Int’l Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005). 2005. 3?6. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1544771
    [46] Paul R, Tsai WT, Bayne J. The impact of SOA policy based computing on C2 interoperation and computing. In: Proc. of the 10th Int’l Command and Control Research and Technology Symp. (ICCRTS). 2005. http://oai.dtic.mil/oai/oai?verb=getRecord& metadataPrefix=html&identifier=ADA464259
    [47] IBM alpha works: SOA and web services: New to SOA and Web services. http://www-128.ibm.com/developerworks/soa
    [48] Web Services Glossary. W3C Working Group Note. 2004. http://www.w3.org/TR/ws-gloss/
    [49] OASIS Reference model for service oriented architecture. Committee Draft 1.0, 2006. http://www.oasis-open.org/committees/download.php/16587/wd-soa-rm-cd1ED.pdf
    [50] Cisco Systems, Inc. Cisco application oriented networking. http://www.cisco.com/en/US/products/ps6692/Products_Sub_Category_Home.html
    [51] Waheed A, Ding JJ. Benchmarking XML based application oriented network infrastructure and services. In: Proc. of the 2007 Int’l Symp. on Applications and the Internet (SAINT 2007). 2007. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4090051
    [52] Arsanjani A, Zhang LJ, Ellis M, Allam A, Channabasavaiah K. S3: A service-oriented reference architecture. IT Professional, 2007,9(3):10?17.
    [53] Revisiting the definitive SOA definition. 2005. http://searchsoa.techtarget.com/news/article/0,289142,sid26_gci1044083,00.htm
    [54] Hao H. What is service-oriented architecture? 2003. http://webservices.xml.com/pub/a/ws/2003/09/30/soa.html
    [55] Erl T. Service-Oriented Architecture: Concepts, Technology, and Design. Prentice Hall PTR Pub., 2005.
    [56] Mao XS, et al. SOA Principles?Methods?Practics. Beijing: Publish House of Electronics Industry, 2007 (in Chinese).
    [57] Kanneganti R, Chodavarapu P. SOA Security. Manning Publications Co., 2008.
    [58] Lublinsky B. Achieving the ultimate EAI implementation: An overview of EAI implementation approaches with a focus on a process-driven EAI. 2001.
    [59] Defining SOA as an architectural style. 2007. http://www.ibm.com/developerworks/architecture/library/ar-soastyle/
    [60] Web services architecture. W3C Working Group Note. 2004. http://www.w3.org/TR/2004/NOTE-ws-arch-20040211/
    [61] Using infrastructure service orchestration to enable a service-oriented architecture. Cisco Inc. White Paper. http://www.cisco.com/en/US/prod/collateral/netmgtsw/ps6505/ps8463/prod_white_paper0900aecd8068ee04.html 附中文参考文献:
    [10] 林闯,王元卓,杨扬,曲扬.基于随机Petri 网的网络可信赖性分析方法研究.电子学报,2006,34(2):322?332.
    [11] 林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术.计算机学报,2005,28(12):1943?1956.
    [12] 曹晋华,程侃.可靠性数学引论.修订版.北京:高等教育出版社,2006.
    [36] 刘鹏程,陈海波,臧斌宇.虚拟环境下计算机系统的可靠性增强技术.中国计算机学会通讯,2008,4(4):24?32.
    [56] 毛新生,等,编.SOA 原理?方法?实践.北京:电子工业出版社,2007.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

林 闯,孔祥震,周 寰.增强计算系统可信赖性:融合虚拟化和SOA.软件学报,2009,20(7):1986-2004

Copy
Share
Article Metrics
  • Abstract:8036
  • PDF: 13101
  • HTML: 0
  • Cited by: 0
History
  • Received:June 09,2008
  • Revised:December 29,2008
You are the first2035312Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063