Skip to main content

Understanding Iterative Redundancy for Vulnerability-Driven Fault Tolerance Strategy

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8351))

  • 3034 Accesses

Abstract

In the application of component-based distributed computing systems, many software systems allow the existence of large numbers of potentially faulty components. Faults are inevitable in this large-scale, complex, distributed components setting, which may include a lot of untrustworthy parts. How to provide a highly reliable component-based distributed system is a challenging problem. Redundancy and replication are generally utilized to realize the goal of fault tolerance. In this paper, we propose a technique of Critical Fault Iterative (CFI) redundancy, by which the efficiency can be guaranteed to make use of resources (e.g., computation, storage), and to create fault-tolerance applications. The function invocation relationships and invocation frequencies are employed to rank the importance of functions and identify the most vulnerable functions. A formal theoretical analysis and an experimental analysis are presented. Compared with the existing methods, the reliability of a component-based distributed system can be greatly improved by tolerating a small part of significant functions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, D.P., Fedak, G.: The computational and storage potential of volunteer computing. In: Sixth IEEE International Symposium on CCGRID 2006, vol. 1, pp. 73–80. IEEE (2006)

    Google Scholar 

  2. Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: Proc. 8th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-8), pp. 3–9 (1978)

    Google Scholar 

  3. Batagelj, V., Mrvar, A.: Pajek: Program for analysis and visualization of large networks, Ljubljana, Slovenia (2006)

    Google Scholar 

  4. Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems 30(1), 107–117 (1998)

    Article  Google Scholar 

  5. Borthakur, D.: The hadoop distributed file system: Architecture and design (2007)

    Google Scholar 

  6. Boinc, A.D.P.: A system for public-resource computing and storage. In: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, pp. 4–10. IEEE (2004)

    Google Scholar 

  7. Christensen, C., Aina, T., Stainforth, D.: The challenge of volunteer computing with lengthy climate model simulations. In: First International Conference on e-Science and Grid Computing, vol. 8, p. 15. IEEE (2005)

    Google Scholar 

  8. Oliner, A.J., Aiken, A.: Online detection of multi-component interactions in production systems. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 49–60. IEEE (2011)

    Google Scholar 

  9. Banabic, R., Candea, G., Guerraoui, R.: Automated vulnerability discovery in distributed systems. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 188–193. IEEE (2011)

    Google Scholar 

  10. Brun, Y., Edwards, G., Bang, J.Y., et al.: Smart redundancy for distributed computation. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS), pp. 665–676. IEEE (2011)

    Google Scholar 

  11. Bondavalli, A., Chiaradonna, S., Di Giandomenico, F., et al.: An adaptive approach to achieving hardware and software fault tolerance in a distributed computing environment. Journal of Systems Architecture 47(9), 763–781 (2002)

    Article  Google Scholar 

  12. Zheng, Z., Zhou, T., Lyu, M., et al.: Component ranking for fault-tolerant cloud applications (2012)

    Google Scholar 

  13. Litvak, N., van der Hofstad, R.: Degree-degree correlations in random graphs with heavy-tailed degrees. arXiv preprint arXiv:1202.3071 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, H., Wang, Y., Zhou, L., Jiang, K. (2014). Understanding Iterative Redundancy for Vulnerability-Driven Fault Tolerance Strategy. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09265-2_68

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09264-5

  • Online ISBN: 978-3-319-09265-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics