期刊文献+

容错云计算网络中自适应故障检测方案研究 被引量:2

Research on adaptive fault detection scheme in fault-tolerant cloud computing networks
下载PDF
导出
摘要 当前大多数故障检测(FD)技术无法针对动态网络条件自动调整它们的检测服务参数,导致无法应用于实际环境中。针对容错云计算网络中的故障检测特性进行研究,提出了一种通用的容错云计算网络自适应故障检测(SFD)算法;基于上述通用算法,对当前故障检测器进行优化,提出了一种自适应累积型故障检测器,并对SFD算法的部署进行了研究。基于七种典型的广域网案例,比较评估了该故障检测算法与当前其他算法的性能。实验结果表明,该算法可以实现故障的自适应检测,满足用户需求,拥有较高的系统性能。 Most existed fault detector (FD) schemes didn't automatically adjust their detection service parameters for the dy- namic network conditions, thus they couldn' t he used for actual application. This paper explored FD properties with relation to the fault-tolerant cloud computing networks, and proposed a general self-tuning failure detection method in the fault-tolerant cloud computing networks. Based on the above general method, this paper proposed an automatic self-tuning failure detector (SFD) to optimize the existed FDs and explored the implementation of SFD. Finally, it comparatively evaluated the proposed failure detection scheme and existed schemes by extensive experiments in seven representative wide area network (WAN) ca- ses. The experimental results show the properties of the different FDs, and demonstrate that the proposed scheme can adaptive- ly detecte the fault to obtain corresponding services and satisfy user requirements, while maintaining good performance.
作者 刘淑英
出处 《计算机应用研究》 CSCD 北大核心 2015年第1期161-166,共6页 Application Research of Computers
基金 咸阳师范学院基金资助项目(13XSYK054)
关键词 云计算 故障检测 参数 容错 部署 cloud computing fault detector parameter fault-tolerant implementation
  • 相关文献

参考文献14

  • 1邓维,刘方明,金海,李丹.云计算数据中心的新能源应用:研究现状与趋势[J].计算机学报,2013,36(3):582-598. 被引量:133
  • 2王意洁,孙伟东,周松,裴晓强,李小勇.云计算环境下的分布存储关键技术[J].软件学报,2012,23(4):962-986. 被引量:279
  • 3林果园,贺珊,黄皓,吴吉义,陈伟.基于行为的云计算访问控制安全模型[J].通信学报,2012,33(3):59-66. 被引量:69
  • 4SILVEIRA F, DIeT C, TAFT N, et al. ASTUTE: detecting a diffe- rent class of 'traffic anomalies [ J]. ACM SIGCOMM Computer Communication Review, 2010, 40(4): 267-278.
  • 5STEFANAKOS S. Reliable routings in networks with generalized link failure events [J]. IEEE/ACM Trans on Networking, 2008, 16 (6) : 1331-1339.
  • 6TAKEUCH1 K, TANAKA T, YANO T. Asymptotic analysis of gene- ral multiuser detectors in MIMe DS-CDMA channels [ J ]. IEEE Journal on Selected Areas in Communications, 2008, 26 (3) : 486 - 496.
  • 7PARK S H, LEE J Y, YU S C. Non-blocking atomic commitment al- gorithm in asynchronous distributed systems with unreliable failure de- tectors[ C ]//Proc of the 10th International Conference on Information Technology: New Generations. [ S. 1. ] :IEEE Press, 2013: 33-38.
  • 8LEONARD D, YAO Z, RAI V, et al. On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks [ J ]. IEEE/ACM Trans on Networking, 2007, 15(3) : 644-656.
  • 9CHEN W, TOUEG S, AGUILERA M K. On the quality of service of failure detectors [ J]. IEEE Trans on Computers, 2002, 51 (5) : 561-580.
  • 10BERTIER M, MARIN O, SENS P. Implementation and performance evaluation of an adaptable failure detector[ C ]//Proc of International Conference on Dependable Systems and Networks [ S. 1. ] : IEEE Press, 2002 : 354-363.

二级参考文献17

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
  • 4SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
  • 5LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
  • 6XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
  • 7Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
  • 8BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
  • 9LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.
  • 10BIBA K J.Integrity Considerations for Secure Computer Systems[R].Bedford:ESD-TR-76-732,1977.

共引文献472

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部