Method of Fault Detection in Cloud Computing Systems



Similar documents
Research on Operation Management under the Environment of Cloud Computing Data Center

UPS battery remote monitoring system in cloud computing

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

On Cloud Computing Technology in the Construction of Digital Campus

Fault Analysis in Software with the Data Interaction of Classes

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Design of Electronic Medical Record System Based on Cloud Computing Technology

Automated Scaling of Cluster Using Deployment Diagrams in Platform-As-A- Service

Operation and Maintenance Management Strategy of Cloud Computing Data Center

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

The Power Marketing Information System Model Based on Cloud Computing

A Network Simulation Experiment of WAN Based on OPNET

Function and Structure Design for Regional Logistics Information Platform

Study of Lightning Damage Risk Assessment Method for Power Grid

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

The Application and Development of Software Testing in Cloud Computing Environment

Design of Remote data acquisition system based on Internet of Things

A Survey on Load Balancing Techniques Using ACO Algorithm

CDBMS Physical Layer issue: Load Balancing

Cloud Computing with Azure PaaS for Educational Institutions

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

Cloud Computing Simulation Using CloudSim

Security Considerations for Public Mobile Cloud Computing

Study on Cloud Service Mode of Agricultural Information Institutions

Grid Computing Vs. Cloud Computing

CHAPTER 8 CLOUD COMPUTING

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

Exploring Resource Provisioning Cost Models in Cloud Computing

A Proxy-Based Data Security Solution in Mobile Cloud

A Survey Paper: Cloud Computing and Virtual Machine Migration

Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

Dynamic resource management for energy saving in the cloud computing environment

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Random forest algorithm in big data environment

5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ ISSN

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Multi-level Metadata Management Scheme for Cloud Storage System

Load Balancing Algorithms in Cloud Environment

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

Capability Service Management System for Manufacturing Equipments in

Discussion on the Application of Cloud Computing in Agricultural Information Management

Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop

Survey of Web Testing Techniques

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing

[Rokadiya,5(4): October-December 2015] ISSN Impact Factor

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP

Blog Post Extraction Using Title Finding

LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT

How To Solve The Kd Cup 2010 Challenge

Private Cloud in Educational Institutions: An Implementation using UEC

Evaluation Model for Internet Cloud Data Structure Audit System

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Technologies based on Cloud Computing Technology

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

Saving Mobile Battery Over Cloud Using Image Processing

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

A Survey on Load Balancing and Scheduling in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Datacenters and Cloud Computing. Jia Rao Assistant Professor in CS

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

International Journal of Advanced Research in Computer Science and Software Engineering

Construction and Implementation of Innovation Computer Network Practical Teaching System

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article. E-commerce recommendation system on cloud computing

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Cloud Based E-Government: Benefits and Challenges

Going beyond Conventional Software Testing: Cloud Testing

EXIN Cloud Computing Foundation

Performance Gathering and Implementing Portability on Cloud Storage Data

Multilevel Communication Aware Approach for Load Balancing

Cloud Computing Services and its Application

Service allocation in Cloud Environment: A Migration Approach

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

Transcription:

, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application, Kunming University of Science and Technology Faculty of Information Engineering and Automation, Kunming University of Science and Technology jy_910@163.com, hj_0118@163.com, tjom2008@163.com, lyl2002@126.com Abstract Cloud computing integrates a large number of virtual resources and provides flexible service to users by pay-as-you-need. Compared with the traditional software systems, the detection is more complex and difficult in cloud computing systems. The model is helpful for people to find and distinguish the software. However, the current researches mostly focus on software model under the traditional environment. Based on the research of software model, this paper proposed the models in cloud computing systems combining with the characteristics of cloud computing. Then an improved C4.5 decision algorithm is used to distinguish the cloud. The experiment results showed that the model and improved algorithm is effective. Keywords: cloud computing systems, model, detection 1. Introduction Software testing is one of the most important technologies to assure software quality. The goal of software testing is to find s as much as possible. Cai Kai-Yuan gave the definitions for software error, software defect and software [1]. Software error refers to the human error that is undesired or unacceptable in software life cycle. Software defect means the deviation exists in software, which is undesired or unacceptable. Software refers to a kind of undesired or unacceptable internal state that occurs in the running process. In IEEE Standard Glossary, the is defined as the incorrect step, processing or data definition in a computer program [2]. In ISO/IEC 15504 standards, software means that the software did not show the expected results [3]. It is worth noting that the difference is very small among software error, software defect and software. A clear distinction can not be given in many papers. Therefore, the in this paper means all the errors mentioned above. That is to say, all the errors that might appear in the software life cycle can be regarded as software. There are many types of software, at the same time they are changing according to the software development. Actually, the research on classification and model attracted more and more attention. The model is a combination of some basic s, and should be an abstraction of software physical errors. It is the first step to establish the model while detecting the s of systems. The remainders of this paper are organized as follows. Related works are summarized in Section 2. In Section 3, models in cloud computing systems are presented. In Section 4, improved C4.5 decision algorithm is described to detect the s. The experiments are described in Section 5. In Section 6, the conclusion and future work are proposed. ISSN: 2005-4262 IJGDC Copyright c 2014 SERSC

2. Related Works For the traditional software, the researches about the failure classification and the establishment of model have been relatively mature. There are several classifications from different aspects, including phase, consequences of, nature of the error and type of errors. Zhu Rong, et al., established six models to manage and standardize occurred in scientific computing program, which can cover an amount of s [4]. Nie Lin- Bo, et al., proposed a defect classification method based on processing [5]. Zeng Fu-Ping et al. introduced "hierarchy theory" in defect mode classification to partition the defect mode classification by anglicizing software defect data, then proposed the defect mode in software requirements analysis phase, design phase and coding phase [6]. The above software models are aimed at the traditional application environment, which are the abstraction of the traditional software. However, under the cloud computing environment, the classification and detection of would be changed. In addition, some s may just appear when software is running in cloud. According to the definition given by the USA National Institute of standards and Technology (NIST) [7], cloud computing is a computing model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Using cloud computing, the user can apply or release resources quickly according to the business load and pay for the used resources by pay-as-you-need, which can reduce operational cost while improving service quality. Leah Muthoni Riungu, et al., discussed the influence of cloud computing to software testing using grounded theory as research basis [8, 9]. Rao Xiang, et al., presented an extraction method for feature called Companion State Tracer to detect in cloud computing system [7]. Although people begin to study the software of online testing under cloud computing environment, they fail to exploit the characteristics of model. Cloud computing has its own features: (1) Flexible service. All the resources in cloud computing are used as a service provided to the user. The scale of the service can quickly adjustable to adapt to the dynamic change of load. (2) Resource pooling. Resources are managed in the form of a shared resource pool. (3) On-demand service. A consumer can unilaterally provision computing capabilities according to own requirements. (4) Measured Service. Cloud computing monitors user s resource usage and users pay for the resources they used. Compared with the existing work, the contributions of the paper are the following: (1) Based on the research of software model, software model in cloud computing systems is proposed combining with the characteristics of cloud. (2) In order to detect the s in cloud computing, an improved C4.5 decision algorithm is proposed. (3) Cloud computing data are simulated to verify the correctness of the algorithm and the effectiveness of the proposed model. 3. Fault Models in Cloud Computing Fault models can be viewed as the summary and abstraction of the software tester s experience. According to the characteristics of cloud computing environment, we summarize the essential condition of the model in cloud. (1) The s in the model are practical. That is to say, the s defined in the model are real and representative of cloud computing systems. (2) The s in the model can be detected. There is an algorithm which can be used to detect these s. 206 Copyright c 2014 SERSC

In the studies of traditional software model, there are many kinds of methods to classify the software s. Each method has different point of view and benchmark. Aimed to describe a from multiple aspects and match the characteristics of cloud computing, we propose models under cloud computing from the following four aspects. 3.1. Level Cloud computing system can be regarded as a collection of a set of services. These services are divided into three layers. Infrastructure layer. The infrastructure layer mainly includes computing resources, storage and network resources, etc., the entire infrastructure is provided to the user as a service, namely IaaS (infrastructure as a service). Platform layer. The platform layer is mainly designed for application developers. Application developers don't have to worry about resources needed when running applications. It can provide all the platform resources needed in application running and maintenance, which called PaaS (platform as a service). Application layer. It provides simple software application services and user interaction interface to users. This layer is called software as a service, namely SaaS (software as a service). The three levels of cloud computing have different content, resource and function. Therefore, we divided the s into IaaS layer, PaaS layer and SaaS layer. Any happened may only appear in one level, which cannot appear in multiple layers at the same time. 3.2. Service Stage One of the outstanding characteristic under cloud computing is on-demand service. Users send request to the cloud computing providers according to their own needs. Then providers provide appropriate resources to users according to their requirements. Moreover, users pay for the resources. According to service stage when s occur, we can divide the s into service lookup stage, service request stage and service provide stage. This classification method fully embodies the characteristic of providing uninterrupted service. As long as the software running under the cloud, we can find which service stage the belongs to if the software fails. 3.3. Influence Range Traditional software can be divided into negligible, general and serious according to its severity. For the super large-scale cluster resources and complicated scheduling policies in cloud, software under cloud computing environment is not a simple traditional. A small may cause big problem. According to the severity of a, the s in cloud computing systems can be divided into only own influence, other parts influence and service result influence. Among the above s, only own influence has the lowest severity. The more serious will affect the other components in cloud computing. Because cloud computing is providing service to the user, the most serious is service result influence. Copyright c 2014 SERSC 207

3.4. Source Resources in cloud are various and complex. Therefore, the may come from many sources. Using the hierarchical structure, the source of the classification is shown as Figure 1. Source Hardware Software SAN Host Network device Cloud computing system User application software Third-party software VM Snoopware Database software Security-related software Charging software Figure 1. Source of Fault Classification The traditional software classification is dividing s into hardware and software. In cloud computing systems, we still can divide hardware into SAN, Host and Network device. The software can be divided into Cloud computing system, User application software and Third-party software. In order to achieve high quality service, there is much assistant software in cloud computing system. If this software has problems, it will produce a direct or indirect effect on users. Therefore, these s include VM, Snoop ware, Database software, Security-related software and Charging software. 4. Improved C4.5 Decision Algorithm Decision tree is a simple, effective and widely accepted classification technique. It is usually used to solve multiple attribute data classification problem. C4.5 algorithm is an improved algorithm of ID3, which was proposed by J. R. Quinlan in 1993 [10]. C4.5 algorithm uses information gain rate to select attributes, which avoids the phenomenon of choosing more attribute values when select attributes. In addition, it can deal with continuous attributes. C4.5 decision tree algorithm is end up with a decision tree, whose leaf nodes represent different categories respectively. However, the format of instance used in C4.5 and that of used in our paper are different. For example, the instance format used in C4.5 algorithm is (Attrib1, Attrib2, Attrib3, Attrib4, 208 Copyright c 2014 SERSC

Attrib5, Attrib6, Class attrib). The instance format of our paper is (Attrib1, Attrib2, Attrib3, Attrib4, Attrib5, Attrib6, Class attrib1, Class attrib2, Class attrib3, and Class attrib4). From the above two instances, it can be seen that there is only one class attribute in C4.5 algorithm. The classification is carried out from one point of view, and then divided into different categories. According to the models proposed in Section 3, a can be classified from four aspects. Therefore, the instances used in this paper have four class attributes. As a result, using C4.5 algorithm cannot get complete classification results. So we improved C4.5 algorithm in this paper. The flow chart of the improved algorithm is shown in Figure 2. Begin Deal with special data in training set preprocess the data calculate inforgainratio of all the attribute for each class Choose the attribute that has the largest inforgainratio, create new node and mark it as the attribute For all possible values d i of D, assuming that S i representative the subset which attribute value is d i S i is null? Y N Add a subtree to new branch Add a leaf node to new branch, and mark it as d i N Traverse complete? Y Integrate nodes Return nodes End Figure 2. The Control Flow Chart of the Improved Algorithm 5. Experiment Analysis In order to verify the above method, the experiments are executed using the simulated data in cloud. There are six attributes in sample data, which represent six features of in cloud. The six attributes are MIPS usage, memory usage, RAM usage, bandwidth usage, response time, and the average rate of node load. The four class attributes respectively represent level class, source class, service stage class and influence range class. Part of the sample data in training set is shown in Table 1. Copyright c 2014 SERSC 209

Table 1. Part of the Sample Data in Training Set MIPS% Mem% RAM% BW% RTime(s) Node% Class 1 Class 2 Class 3 Class 4 0.7 0.7 0.3 0.2 35 0.6 IaaS Host service provide effect result 0.4 0.6 0.7 0.5 56 0.25 IaaS VM service provide effect other 0.3 0.62 0.9 0.4 24 0.2 PaaS Host service provide effect result 0.5 0.5 0.3 0.92 120 0.7 SaaS User application service request effect result 0.7 0.56 0.8 0.1 45 0.4 IaaS Host service provide effect other 0.3 0.9 0.6 0.78 80 0.7 SaaS Network device service provide effect result 0.45 0.8 0.7 0.6 14 0.17 IaaS VM service provide effect result 0.56 0.53 0.8 0.4 48 0.9 SaaS Host service request effect result 0.3 0.4 0.43 0.6 34 0.5 IaaS VM service provide effect result 0.2 0.85 0.9 0.9 95 0.45 IaaS User application service provide effect result 0.18 0.3 0.6 0.54 53 0.5 IaaS Host service provide effect other 0.5 0.44 0.5 0.79 86 0.84 SaaS User application service request effect result MIPS%: MIPS usage. Mem%: memory usage. RAM%: RAM usage. BW%: bandwidth usage. RTime(s): response time. Node%: the average rate of node load. Based on the experimental data in Table 1, the decision graph is gained using the improved C4.5 algorithm, which is shown in Figure 3. <=56 RTime(s) >56 effect result BW% RTime(s) >0.4 >81 >81 <=0.4 Mem% <=81 MIPS% User application <=0.3 >0.3 >0.45 Host Node% >0.5 Network device Node% >0.65 SaaS <=0.5 >0.5 >0.5 <=0.65 <=0.65 <=0.45 VM MIPS% IaaS >0.65 RAM% <=0.6 >0.6 <=0.35 >0.35 service request service provide Figure 3. Decision Graph As shown in Figure 3, improved C4.5 algorithm can realize the classification of s from four aspects and produce a decision graph. We can classify new data by traversing the graph. 210 Copyright c 2014 SERSC

In order to verify the correctness of the improved C4.5 algorithm, new data are simulated. The verification result is shown in Table 2: Table 2. Verification Result MIPS% Mem% RAM% BW% RTime(s) Node% Class 1 Class 2 Class 3 Class 4 0.55 0.57 0.3 0.5 90 0.4 IaaS User application service request effect result 0.6 0.4 0.42 0.6 85 0.9 SaaS User application service request effect result 0.3 0.4 0.7 0.9 54 0.65 IaaS Network device service request effect result 0.7 0.6 0.34 0.7 45 0.8 IaaS Network device service provide effect result 0.6 0.3 0.8 0.5 38 0.1 Host effect result As shown in Figure 3, all s belong to effect result. Therefore, the values of class 4 in Table 2 are filled in effect result. Then the RTime(s) is the first attribute should be considered. For example, the RTime(s) value of the first data in Table 2 is 90. The branch of >56 will be selected. After considering the attribute RTime(s), which value is 90, the branches of >81 are selected. Therefore, the class User application is filled in class 2. Then MIPS% should be considered. As the value of MIPS% is 0.57, the branch of >0.45 will be selected and the value of Node% will be considered. According the 0.4 of Node% in Table 2, the branches of <=0.65 are selected, so IaaS can be filled in class 1 and the value of RAM% should be considered. Finally, according to the 0.3 of RAM% value and the branch of <=0.35, the class service request is gained and filled in class 3. 6. Conclusion and Future Work In order to deal with the s in cloud computing systems, this paper proposes models about cloud from four aspects. Then an improved C4.5 algorithm is implemented to detect the. The experiments prove that our model and algorithm is effective. In the future, the new will be identified compliance with cloud computing systems. Acknowledgements This research is sponsored by the National Science Foundation of China No. 60703116 and 61063006, and the Application Basic Research Plan in Yunnan Province of China No. 2013FZ020. References [1] K. Y. Cai, The Foundations of Software Reliability Engineering, Tsinghua University Press, Beijing, (1995). [2] IEEE. IEEE Std. IEEE Standard Glossary of Software Engineering Termiology, (1990). [3] K. El-Emam and I. Garro, ISO/IEC 15504, International Organization for Standardization, (1999). [4] R. Zhu and S. Y. Xu, Establishing the model of software testing, Computer engineering and Applications, vol. 17, (2003), pp. 67-92. [5] L. B. Nie and M. R. Liu, Research on software defects classification, Application Research of Computers, vol. 7, (2004), pp. 84-86. [6] F. P. Zeng, H. L. Jin, M. Y. Lu. Research on software defect mode. Computer Science, vol. 38, no. 2, (2011), pp. 127-130. [7] X. Rao, H. M. Wang, Z. B. Chen, Y. F. Zhou, H. Cai, Q. Zhou and T. T. Sun, Detecting Faults by Tracing Companion States in Cloud Computing Systems, Chinese Journal of Computers, vol. 35, no. 5, (2012), pp. 856-870. Copyright c 2014 SERSC 211

[8] M. R. Leah, T. Ossi and S. Kari, Research Issues for Software Testing in the Cloud, 2nd IEEE International Conference on Cloud Computing Technology and Science, (2000) November 30 -December 3, pp. 557-564. [9] M. R. Leah, T. Ossi and S. Kari, Software Testing as an Online Service: Observations from Practice, Software Testing. 2010 Third International Conference on Verification, and Validation Workshops, (2000) April 6-10, pp. 418-423. [10] J. R. Quinlan, C4. 5: Programs for Machine Learning, San Mateo, CA: Morgan Kaufmann, (1993). Authors Ying Jiang, Ph. D. and professor. Her research interests include software engineering, software testing and service computing. Jie Huang, Master candidate. Her research interests include software testing technology and service computing. Jiaman Ding, Master and lecturer. His research interests include software engineering and cloud computing. Yingli Liu, Master and lecturer. Her research interests include software engineering and cloud computing. 212 Copyright c 2014 SERSC