skip to main content
10.1145/1413140.1413154acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Design for survivability: a tradeoff space

Published:12 May 2008Publication History

ABSTRACT

When designing a system that has strong reliability, security, or survivability requirements one moves in a trade-off space with a delicate balance between causes and effects that have implications on various objective functions such as cost, performance, availability, analyzability, predictability, or feasibility. The key issues are: 1) given an existing system or application, what are the impacts of adjustments in the fault assumptions, 2) given an existing system or application, what are the impacts of adding or subtracting security features, and 3) given performance, availability, security, or survivability requirements, how can one determine feasibility based on the infrastructure- or application-induced limitations.

This research promotes design for survivability and analyzability to allow for effective assessment of the trade-off space from the view of dynamically changing fault models and the analyzability of a system. It gives pointers to new research directions and presents solutions that aid in making operational decisions or assessing impacts of design decisions.

Skip Supplemental Material Section

Supplemental Material

References

  1. A. Avizienis, et. al., Fundamental Concepts of Dependability, Information Survivability Workshop (ISW-2000), Boston, Massachusetts, Oct. 24--26, 2000.Google ScholarGoogle Scholar
  2. M. H. Azadmanesh, and R. M. Kieckhafer, Exploiting Omissive Faults in Synchronous Approximate Agreement, IEEE Trans. Computers, 49(10), pp. 1031--1042, Oct. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. Longstaff and N. R. Mead, Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, November 1997, Revised: May 1999.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Jafar, A. Krings and T. Gautier, Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE Transactions on Dependable and Secure Computing, (TDSC), in print. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Krings, J-L. Roch, and S. Jafar, Certification of Large Distributed Computations with Task Dependencies in Hostile Environments, IEEE Electro/Information Technology Conference, (EIT 2005), May 22--25, Lincoln, Nebraska, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Krings, J.-L. Roch, S. Jafar and S. Varrette, A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments, Proc. European Grid Conference (EGC2005), in LNCS 3470, Springer Verlag, February 14--16, Amsterdam, Netherlands, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Krings, Survivable Systems, Chapter 5 in: Information Assurance: Dependability and Security in Networked Systems. Morgan Kaufmann Publishers, Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy Editors), in press, 2008.Google ScholarGoogle Scholar
  8. L. Lamport, et. al., The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, pp. 382--401, July 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. C. Laprie, editor, Dependability: Basic Concepts and Terminology, Springer-Verlag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Liu, and K. S. Trivedi, Survivability Quantification: The Analytical Modeling Approach, International Journal of Performability Engineering, Vol. 2, No 1, Jan. 2006, pp. 29--44.Google ScholarGoogle Scholar
  11. Z. S. Ma, A. W. Krings, and R. E. Hiromoto, Insect Sensory Systems Inspired Communication and Computing (II): An Engineering Perspective, IEEE-ACM International Conference on Bio-inspired Systems and Signal Processing, (BioSignals 2008), Funchal, Madeira, Portugal, 28--31 January, 2008.Google ScholarGoogle Scholar
  12. Z. S. Ma, and A. W. Krings, Survival Analysis Approach to Reliability Analysis and Prognostics and Health Management (PHM), Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.Google ScholarGoogle Scholar
  13. Z. S. Ma, and A. W. Krings, Competing Risks Analysis of Reliability, Survivability, and Prognostics and Health Management (PHM), Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. Z. S. Ma, and A. W. Krings, Multivariate Survival Analysis (I): Shared Frailty Approaches to Reliability and Dependence Modeling, Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  15. Z. S. Ma, A. W. Krings, and R. E. Hiromoto, Multivariate Survival Analysis (II): An Overview of Multi-State Models in Biomedicine and Engineering Reliability, IEEE International Conference of Biomedical Engineering and Informatics, (BMEI 2008), 27--30 May, Sanya, Hainan, China, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Z. S. Ma, and A. W. Krings, Bio-Robustness and Fault Tolerance: A New Perspective on Reliable, Survivable and Evolvable Network Systems, Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  17. Z. A. Ma, and A. W. Krings, Spatial Distribution Patterns, Power Law, and the Agent-based Directed Diffusion Sensor Networks, Sixth Annual IEEE International Conference on Pervasive Computing and Communications, (PerCom 2008), March 17--21, Hong Kong, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Z. S. Ma, and A. W. Krings, Insect Population Inspired Wireless Sensor Networks: A Unified Architecture with Survival Analysis, Evolutionary Game Theory, and Hybrid Fault Models, IEEE International Conference of Biomedical Engineering and Informatics, (BMEI 2008), 27--30 May, Sanya, Hainan, China, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. R. Mead, R. J. Ellison, R. C. Linger, T. Longstaff, and J. McHugh, Survivable Network Analysis Method, Technical Report CMU/SEI-2000-TR-013, Software Engineering Institute, Carnegie Mellon, 2000.Google ScholarGoogle Scholar
  20. The PASIS project, Engineering Survivable Storage, Carnegie Mellon University, http://www.pdl.cmu.edu/Pasis/Google ScholarGoogle Scholar
  21. L. F. G. Sarmenta, Sabotage-Tolerance Mechanisms for Volunteer Computing Systems, Future Generation Computer Systems, Elsevier Publishing, No. 4, Vol. 18, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Thambidurai, and Y.-K. Park, Interactive Consistency with Multiple Failure Modes, Proc. 7th Symp. on Reliable Distributed Systems, Columbus, OH, pp. 93--100, Oct. 1988.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Design for survivability: a tradeoff space

          Recommendations

          Reviews

          Edgar R. Weippl

          In this paper, Krings argues that mechanisms that aid survivability should be integrated in system design, instead of being treated as add-on features later on. He defines a system as a composition of functionalities, where functionalities are mapped to fault models. Regarding fault model analysis, exponential failure distributions are not adequate to describe malicious failures. Research in biological systems, where systems are analyzed in unpredictable environments, can serve as an example to overcome limitations of the reliability model. Furthermore, Krings suggests extending design for survivability "to include the mechanisms necessary to allow for result certification," such as simulation, and for adaptation?"the ability to react to changes in the operational environment." In summary, the author defines a system in terms of a fault model analysis, result certification, and adaptation. The idea of applying research from biology is innovative, but the overall contribution is somewhat limited. Krings suggests relatively obvious design principles, in order to tackle survivability at the design stage. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
            May 2008
            470 pages
            ISBN:9781605580982
            DOI:10.1145/1413140

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 May 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader