publication . Conference object . 2016

Towards Resilient Java Computational Programs

Nguyen , Queen ,; Sood , Arun;
Open Access English
  • Published: 01 Jun 2016
  • Publisher: HAL CCSD
Abstract
International audience; With the proliferation of sensors and web logs, big data are generated in large volume and high rate. The analytical processing of these data usually requires long duration computational transaction. To ensure resiliency of such computational services, both in terms of data integrity and security, we propose to apply the SCIT (Self Cleansing Intrution Tolerance) approach, that consists of frequently restoring systems to their pristine state. This paper describes JSCIT, a combination of SCIT and Java Coroutine. JSCIT can be deployed on compute nodes running Java-based computational programs to migrate the in-progress computation between vi...
Subjects
free text keywords: Coroutine, Resilient, [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC], SCIT, [ INFO.INFO-DC ] Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]

[1] Coroutines Project. https://github.com/offbynull/coroutines.

[2] Y. Huang, D. Arsenault and A. Sood, "Incorruptible system selfcleansing for intrusion tolerance," 2006 IEEE International Performance Computing and Communications Conference, Phoenix, AZ, 2006.

[3] Y. Huang, C. Kintala, N. Kolettis and N. D. Fulton, "Software rejuvenation: analysis, module and applications," Fault-Tolerant Computing, 1995. FTCS-25. Digest of Papers., Twenty-Fifth International Symposium on, Pasadena, CA, USA, 1995, pp. 381-390.

[4] D.E.Knuth. “The Art of Computer Programming, Volume 1: Fundamental Algorithms”.Addison-Wesley Pub. Co., MA, 1973.

[5] Q. Nguyen. "Quantitative Framework to Design Services with Intrusion Tolerant QoS". Ph. D. Thesis, 2014. http://digilib.gmu.edu/xmlui/bitstream/handle/1920/8925/Nguyen_gmu_ 0883E_10622.pdf?sequence=1&isAllowed=y

[6] Popcorn Linux. http://www.popcornlinux.org/.

Related research
Abstract
International audience; With the proliferation of sensors and web logs, big data are generated in large volume and high rate. The analytical processing of these data usually requires long duration computational transaction. To ensure resiliency of such computational services, both in terms of data integrity and security, we propose to apply the SCIT (Self Cleansing Intrution Tolerance) approach, that consists of frequently restoring systems to their pristine state. This paper describes JSCIT, a combination of SCIT and Java Coroutine. JSCIT can be deployed on compute nodes running Java-based computational programs to migrate the in-progress computation between vi...
Subjects
free text keywords: Coroutine, Resilient, [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC], SCIT, [ INFO.INFO-DC ] Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]

[1] Coroutines Project. https://github.com/offbynull/coroutines.

[2] Y. Huang, D. Arsenault and A. Sood, "Incorruptible system selfcleansing for intrusion tolerance," 2006 IEEE International Performance Computing and Communications Conference, Phoenix, AZ, 2006.

[3] Y. Huang, C. Kintala, N. Kolettis and N. D. Fulton, "Software rejuvenation: analysis, module and applications," Fault-Tolerant Computing, 1995. FTCS-25. Digest of Papers., Twenty-Fifth International Symposium on, Pasadena, CA, USA, 1995, pp. 381-390.

[4] D.E.Knuth. “The Art of Computer Programming, Volume 1: Fundamental Algorithms”.Addison-Wesley Pub. Co., MA, 1973.

[5] Q. Nguyen. "Quantitative Framework to Design Services with Intrusion Tolerant QoS". Ph. D. Thesis, 2014. http://digilib.gmu.edu/xmlui/bitstream/handle/1920/8925/Nguyen_gmu_ 0883E_10622.pdf?sequence=1&isAllowed=y

[6] Popcorn Linux. http://www.popcornlinux.org/.

Related research
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . 2016

Towards Resilient Java Computational Programs

Nguyen , Queen ,; Sood , Arun;