Towards RSA-based HA configuration in Cloud

نویسندگان

  • Yihan Wu
  • Ying Zhang
  • Yingfei Xiong
  • Xiaodong Zhang
  • Gang Huang
چکیده

High availability (HA) is a crucial concern in cloud systems. However, guaranteeing HA is challenging because of the complex runtime cloud environment, large number of HA mechanisms available, error-prone HA configuration, and ever-needed dynamic adjustment. In this study, we leverage runtime system architecture (RSA) for automatic configuration of HA in a cloud. With a causal connection between RSA and its corresponding cloud system, our approach has the following advantages. 1) The runtime changes of the system are abstracted, collected, and reflected on the RSA continuously, simplifying HA information collection. 2) With a model-based HA analyzer working on the collected HA-related information, an appropriate HA style (HAS) can be automati-ed, collected, and reflected on the RSA continuously, simplifying HA information collection. 2) With a model-based HA analyzer working on the collected HA-related information, an appropriate HA style (HAS) can be automatically selected for application to the current system. 3) Changing a HAS on RSA at runtime changes the system HA mechanism, which is suitable for the complex and ever-changing cloud environment. We implemented a prototype of our approach and evaluated it using our model-driven Yan-cloud platform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Shoulder Arthroplasty is Superior to Hemiarthroplasty for Cuff Tear Arthropathy with Preserved Motion

Background: It is unclear whether hemiarthroplasty (HA) or reverse shoulder arthroplasty (RS) are superior for patientswith cuff tear arthropathy (CTA) and preserved preoperative motion (elevation >90˚).Methods: This was a retrospective, single institution study. Patients who underwent RSA or HA for CTA were included ifthey had preserved preoperative motion with a minimum of 2...

متن کامل

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems

To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

A Method for Measuring Energy Consumption in IaaS Cloud

The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013