SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
DOI:10.5121/ijfcst.2013.3402 13
A New Mechanism for Service Recovery
Technology by using Recovering Service’s Data
Monire Norouzi
Department of Computer Engineering, Shabestar Branch, Islamic Azad University,
Shabestar, Iran
Monire_norouzi@yahoo.com
ABSTRACT
Service recovery technology is an important constituent part of the emergency response technologies. The
service recovery goal is to build a technology system of service recovery focusing on the survival of
information system services. By analyzing the relationship between service and data, we present a service
recovery mechanism by recovering service’s data. We introduce a third party service monitor to monitor
the state changes of the service, design the data recovery model, and give an example of quick data
recovery. At Last we present a prototype system of service recovery; the experimental results toward the
prototype system show that the mechanism which designed by us can greatly improve the service recovery
efficiency and it can meet the timeliness requirements of the information service.
KEYWORDS
service recovery, third party service monitor, data recovery model, Prototype system
1. INTRODUCTION
Service recovery technology is an important constituent part of the emergency response
technologies. Since 1988, the U.S. Computer Incident Response Coordination Center
(CERTTCC) and Computer Incident Advisory Group set up many emergency response groups
had been set up, and they had played an important role in the procedure of handling the network
security events. These researches institutions regard the emergency response as an important part
of the PDR security model. The emergency response technologies mainly include intrusion
tracing, traps, collaboration processing, trusted recovery, disaster control, adaptive response, etc.
And the CERT ICC also does much research on the technology of network survivability, which
mainly includes attack identification, attack tolerance, attack response and system recovery from
failure.
The service recovery goal is to build a technology system of service recovery focusing on the
survival of information system services. Based on Service Oriented Architecture (SOA) [1], the
technology system considers the commonness and characteristics of the service recovery
processing, and modularizes the processing procedure. Then, it selects optimized recovery
strategies in accordance with the properties of security incidents and the composition of the
service. Through effective service coordination mechanism, it can achieve the objective that the
minimum resource cost and the shortest response time during service recovery.
Data recovery is the basis and prerequisite for service recovery, and the traditional data backup
and recovery technology has been used to solve some problems in the service recovery. In this
paper, we intend to design a service recovery mechanism by recovering service’s data.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
14
The rest of this paper is organized as follows. Section 2 discusses research background and
related work. Section3 discusses the relationship between service and data. Section 4 discusses
architecture and details. Section 5 discusses our implementation and experimental results.
2. RESEARCH BACKGROUND AND RELATED WORKS
As the organization of the different services in the service-oriented architecture is loose, while
the deployment of them is flexibility, the service recovery mechanism built on the Service
Oriented Architecture (SOA) will be beneficial to the integration and use of various technologies.
Figure 1 shows the basic composition and calling relationship for the information system
recovery
Figure 1. The basic structure of system recovery
The existing service recovery technologies generally concern the traditional service concepts, for
example, the specific network service or application service. As in the context of network
environment, many technologies have been proposed to enhance the survivability and
dependability of the service, such as the load balancing and connection switching, IP redirection
technology [2], dynamic DNS technology [3], TCP transfer technology [4] and backup system
switchover technology. And the researchers have proposed the system service switch protection
method based on threshold cryptogram/secret sharing, and the method can be used on the CA,
certification services, key exchange services, file services, DNS services, data services and
routing services. Meanwhile, the researchers also built some forms of service recovery
application systems by means of monitoring, acceptance testing and redundancy [5, 6], such as
the web server systems and database systems.
About the reactively service recover systems; some researchers have studied many technologies
to recover the systems fast and efficiently. These works do not consider by zonetime faults or
security-compromised components and also do not rely on redundancy to ensure that the system
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
15
stays available during recoveries, the main problems addressed in the present work. Huang et al
[7] advocates the execution of some kind of recovery action after a fault is detected. And the
recovery oriented computing project [8] proposed a set of methods to improve the recovery and
reduce the time cost and other related techniques to detect the service failures, restart the
minimum set of system components, undo some operator configuration errors and put the entire
system state back to the modification operation. Joshi et al [9] do some works to diagnose system
faults through several monitors and evaluate which is the best set of recovery actions that must be
taken in order to recover the system as fast as possible.
3. THE RELATIONSHIP BETWEEN SERVICE AND DATA
The service is mainly made up of the service body and the business information supporting
service running; and the service body mainly consists of the service application and the function
modules, also, the business information mainly consists of the static information and dynamic
information. Moreover, in the sight of the data organization, the service body and the business
information can all be regarded as data.
Figure 2. The hierarchical relationship between service and data
As is shown in Figure l, d service is made up of a series of sub-service. The hierarchical levels
include top service level, sub-service level and meta-service level. And the Sl,S2,...,Sn denotes a
series of meta services. The so-called meta-service is the smallest unit of service that cannot be
divided, and it can independently perform the functions.
4. ARCHITECTURE AND DETAILS
4.1 Architecture Design
The main idea of architecture design is that once the service is complete failure, the system can
achieve the object of efficient and quickly reconstructing the entire service. Based on recovering
the service’s data, we can recover the service bodies and the corresponding data. So we propose a
service recovery mechanism that recovering the service’s data and restarting the service. In other
words, we divide the service recovery process into two phases; firstly, we recovery the service’s
data through quick data recovery technology; secondly, we restart the service to achieve the
purpose of rerunning the service.
In this architecture, we introduce a third party service monitor to monitor the state changes of the
service, delivery service recovery orders and control the service rerunning process. The monitor is
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
16
completely independent from the application service. The communication and information
transferring between the monitor and service is handled by specific interface. The architecture is
shown in Figure 3.
Figure 3. The Architecture of Service Recovery by Data Recovery
4.2 Data Recovery Design
We can divide the recovery operations into two types, that is, the accurate data recovery and
selective data recovery, according to the user’s participation. The so-called accurate data recovery
means that recovering all data modification operations in a certain period. Usually after a certain
data backup version; and the selective data recovery means that the users query and browse the
data modification operation sets, and they choose some specific modification operations to
recovery the data.
In order to record the data modification operations, the system must save the data modification
logs and backup the logs to handling the accurate data recovery. The data recovery design model
is shown in Figure 4. Once you need do accurate data recovery and selective data recovery, there
are some steps needed to do.
1) the users determine the data operations sets by the data inquiry and browsing tools;
2) according to the corresponding record logs, the system generates data recovery request;
3) send the recovery request to the agent application of the data server;
4) the kernel recovery module receive the recovery request;
5) the kernel recovery module processes the corresponding data backup blocks;
6) Upon the supporting by the file system, the kernel recovery module completes the
"replay" operation to recovery, the data state to the time of the specific modification
operations.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
17
Figure 4. The Data recovery Design Model
4.3 The Example of Data Recovery Procedure
Specifically, we describe the failure recovery mechanism designed in this paper by way of the
example of recovery procedure for a certain file. The basic idea of failure recovery is that the
mechanism transfers direct data copying process into the operation on the File Allocation Table
(abbreviated as FAT, mainly in FAT file system) or Master File Table (abbreviated as MFT,
mainly in NTFS file system) and other similar data structures in other file system, while by
modifying the link relationship of the selected file backup blocks in FAT, to regenerate the target
file. By this means, the mechanism can reduce the direct read and write to the disk and improve
the efficiency of the recovery process.
For example, while the file state in Figure 5 is needed to recovery to the time T3, the selected file
blocks used for recovery and the new link relationship of these blocks is shown in Figure 5. These
blocks are linked end to end. And the operating system and file system can transparently access
these data blocks.
Figure 5. The Data Recovery Procedure
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
18
5. SYSTEM IMPLEMENTATION AND EXPRIMENT RESULTS
5.1 System Implementation
We have implemented a prototype service recovery system on the FAT32 file system under the
Windows XP platform. The basic architecture of prototype system is designed by the following
steps:
1) Real-time monitoring the file modification operation while the service is running and the
monitoring process is implemented by the file system filter driver;
2) backup the data according the current file modification operation;
3) record the last modified time of the data backup blocks;
4) record the disk storage space information of the data backup blocks, also the disk storage
space information is referred as the disk formatting partition information, which include
the start cluster number of the blocks, the end cluster number of the blocks and the block
size;
5) so, the system generates many data backup blocks according to the each file modification
operation made by the operating system processes and user processes:
6) the data backup blocks together form the sets of file backup pieces;
7) when the information system service is out of order, the users need recovery the file state
to a certain time, which is referred as the time Tt;
8) the users select some certain data backup blocks in the data sets according to the Tt;
9) recovering the file by reconstructing the selected data blocks;
The system implementation architecture is shown in Figure 6.
Figure 6. the System Implementation Architecture
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
19
5.2 Test Platform Configuration
The main hardware and software configurations of computer for testing are listed following:
 Platform: Personal computer
 CPU: Intel(R) Pentium(R) 4 CPU 2.8GHz
 RAM:2.0G
 Hard disk: 320G
 operating system: Microsoft windows XP(5. 1 .2600) Service Pack 2
 File System: FAT32
5.2 Data Recovery Performance Results
Compared to the traditional data recovery technology, the method designed by us can greatly
improve the data recovery efficiency. We select a 300MB data file, a500MB data file and a
directory with 600 files for the comparison test. The method is that we compare the recovery time
between the traditional way of directory disk copy and the way designed in this paper, and the test
results are shown in Table 1.
Table 1. Data Recovery Test Results
Test Objects Data Recovery Methods
Direct Disk Copy (s) Method Designed
in this paper(s)
400 MB Data File 7 0.5
500 MB Data File 10 0.6
A Directory 25 6
We can see that data recovery mechanism designed in this paper can greatly improve the data
recovery efficiency. Also, the service recovery efficiency has been improved greatly. Generally
speaking, the time of the data recovery can be limited on the second level, and the service
restarting time is merely several seconds. So, the entire service recovery process can be
complemented in several seconds, which can greatly enhance the dependability and survivability
of the information service.
REFFERNECES
[1] R. Michael, “Evaluation of service selection techniques in service oriented computing networks,"
Smart Grid Technologies & Market Models, vol. 1, no4, pp. 271 -285 ,2005 .
[2] J. Hu,C. Yang, "Enhancement of cellular IP routing by redirection at cross over base stations," IEEE
VEHICULAR TECHNOLOGYCONFERENCE, vol. 62, no. 4, 2005.
[3] Z. X. G. Yuping, "Principle and Realization of Dynamic DNS and Its Application in Mobile Packet
Switching Network" Telecom Engineering Technics and Standardization, vol. 2, 2010.
[4] G. Tan, S.A. Jarvis, “Prediction of short-lived TCP transfer latency on bandwidth asymmetric links,"
Journal of Computer and System Sciences, vol. 72, no. 7 , pp. 1201--1210, 2A06.
[5] Y. Hao, H. Luo, Y. Yang, et a1., "HOURS : Achieving DoS Resilience in an Open Service
Hierarchy," in 2004 International Conference on Dependable Systems and Networks (DSN'04),2004.
[6] W. He, 'Recovery in Web Service Applications," in 2004 IEEE International Conference on e-
Technology, e-Commerce and e-Service (EEE'04) , pp.25-28, 2004.
[7] Y. Huang,C. Kintala, "Software implemented fault tolerance: Technologies and experience," IEEE
International Symposium on Fault-Tolerant Computing, p. 2, 1993.
[8] D. Patterson, A. Brown, P. Broad well, et al., "Recovery-oriented computing (ROC): Motivation,
definition, techniques, and case studies," 2002.
[9] K. R. Joshi, M. A. Hiltunen, W. H. Sanders, et al., "Automatic model driven recovery in distributed
systems," in 24th IEEE Symposium on Reliable Distributed Systems, pp. 25-36,2005.

Contenu connexe

Tendances

Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisIRJET Journal
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with clustereSAT Publishing House
 
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONijwscjournal
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Publishing House
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous databaseeSAT Journals
 
Research of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large CapacityResearch of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large CapacityNooria Sukmaningtyas
 
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc NetworkReliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc NetworkIJECEIAES
 
Developing a secured image file management system using modified AES
Developing a secured image file management system using modified AESDeveloping a secured image file management system using modified AES
Developing a secured image file management system using modified AESjournalBEEI
 
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Eswar Publications
 
Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Editor IJARCET
 
SR Presentation 2.ppt
SR Presentation 2.pptSR Presentation 2.ppt
SR Presentation 2.ppttranlamson
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time IJECEIAES
 

Tendances (18)

Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data Analysis
 
2012an20
2012an202012an20
2012an20
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network CloudModeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
 
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
 
Project Report (Summer 2016)
Project Report (Summer 2016)Project Report (Summer 2016)
Project Report (Summer 2016)
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Research of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large CapacityResearch of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large Capacity
 
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc NetworkReliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
 
Developing a secured image file management system using modified AES
Developing a secured image file management system using modified AESDeveloping a secured image file management system using modified AES
Developing a secured image file management system using modified AES
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
 
O1803017981
O1803017981O1803017981
O1803017981
 
Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063
 
SR Presentation 2.ppt
SR Presentation 2.pptSR Presentation 2.ppt
SR Presentation 2.ppt
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time
 

Similaire à A New Mechanism for Service Recovery Technology by using Recovering Service’s Data

26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...csandit
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...cscpconf
 
A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...csandit
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Publishing House
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Journals
 
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONA HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES ijwscjournal
 
Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareIAEME Publication
 
Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison ijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemEditor IJCATR
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemEditor IJCATR
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
A compendium on load forecasting approaches and models
A compendium on load forecasting approaches and modelsA compendium on load forecasting approaches and models
A compendium on load forecasting approaches and modelseSAT Publishing House
 

Similaire à A New Mechanism for Service Recovery Technology by using Recovering Service’s Data (20)

26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
 
A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONA HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy software
 
Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
Ijcatr04071001
Ijcatr04071001Ijcatr04071001
Ijcatr04071001
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
A compendium on load forecasting approaches and models
A compendium on load forecasting approaches and modelsA compendium on load forecasting approaches and models
A compendium on load forecasting approaches and models
 

Plus de ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 

Plus de ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

A New Mechanism for Service Recovery Technology by using Recovering Service’s Data

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 DOI:10.5121/ijfcst.2013.3402 13 A New Mechanism for Service Recovery Technology by using Recovering Service’s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com ABSTRACT Service recovery technology is an important constituent part of the emergency response technologies. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. By analyzing the relationship between service and data, we present a service recovery mechanism by recovering service’s data. We introduce a third party service monitor to monitor the state changes of the service, design the data recovery model, and give an example of quick data recovery. At Last we present a prototype system of service recovery; the experimental results toward the prototype system show that the mechanism which designed by us can greatly improve the service recovery efficiency and it can meet the timeliness requirements of the information service. KEYWORDS service recovery, third party service monitor, data recovery model, Prototype system 1. INTRODUCTION Service recovery technology is an important constituent part of the emergency response technologies. Since 1988, the U.S. Computer Incident Response Coordination Center (CERTTCC) and Computer Incident Advisory Group set up many emergency response groups had been set up, and they had played an important role in the procedure of handling the network security events. These researches institutions regard the emergency response as an important part of the PDR security model. The emergency response technologies mainly include intrusion tracing, traps, collaboration processing, trusted recovery, disaster control, adaptive response, etc. And the CERT ICC also does much research on the technology of network survivability, which mainly includes attack identification, attack tolerance, attack response and system recovery from failure. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. Based on Service Oriented Architecture (SOA) [1], the technology system considers the commonness and characteristics of the service recovery processing, and modularizes the processing procedure. Then, it selects optimized recovery strategies in accordance with the properties of security incidents and the composition of the service. Through effective service coordination mechanism, it can achieve the objective that the minimum resource cost and the shortest response time during service recovery. Data recovery is the basis and prerequisite for service recovery, and the traditional data backup and recovery technology has been used to solve some problems in the service recovery. In this paper, we intend to design a service recovery mechanism by recovering service’s data.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 14 The rest of this paper is organized as follows. Section 2 discusses research background and related work. Section3 discusses the relationship between service and data. Section 4 discusses architecture and details. Section 5 discusses our implementation and experimental results. 2. RESEARCH BACKGROUND AND RELATED WORKS As the organization of the different services in the service-oriented architecture is loose, while the deployment of them is flexibility, the service recovery mechanism built on the Service Oriented Architecture (SOA) will be beneficial to the integration and use of various technologies. Figure 1 shows the basic composition and calling relationship for the information system recovery Figure 1. The basic structure of system recovery The existing service recovery technologies generally concern the traditional service concepts, for example, the specific network service or application service. As in the context of network environment, many technologies have been proposed to enhance the survivability and dependability of the service, such as the load balancing and connection switching, IP redirection technology [2], dynamic DNS technology [3], TCP transfer technology [4] and backup system switchover technology. And the researchers have proposed the system service switch protection method based on threshold cryptogram/secret sharing, and the method can be used on the CA, certification services, key exchange services, file services, DNS services, data services and routing services. Meanwhile, the researchers also built some forms of service recovery application systems by means of monitoring, acceptance testing and redundancy [5, 6], such as the web server systems and database systems. About the reactively service recover systems; some researchers have studied many technologies to recover the systems fast and efficiently. These works do not consider by zonetime faults or security-compromised components and also do not rely on redundancy to ensure that the system
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 15 stays available during recoveries, the main problems addressed in the present work. Huang et al [7] advocates the execution of some kind of recovery action after a fault is detected. And the recovery oriented computing project [8] proposed a set of methods to improve the recovery and reduce the time cost and other related techniques to detect the service failures, restart the minimum set of system components, undo some operator configuration errors and put the entire system state back to the modification operation. Joshi et al [9] do some works to diagnose system faults through several monitors and evaluate which is the best set of recovery actions that must be taken in order to recover the system as fast as possible. 3. THE RELATIONSHIP BETWEEN SERVICE AND DATA The service is mainly made up of the service body and the business information supporting service running; and the service body mainly consists of the service application and the function modules, also, the business information mainly consists of the static information and dynamic information. Moreover, in the sight of the data organization, the service body and the business information can all be regarded as data. Figure 2. The hierarchical relationship between service and data As is shown in Figure l, d service is made up of a series of sub-service. The hierarchical levels include top service level, sub-service level and meta-service level. And the Sl,S2,...,Sn denotes a series of meta services. The so-called meta-service is the smallest unit of service that cannot be divided, and it can independently perform the functions. 4. ARCHITECTURE AND DETAILS 4.1 Architecture Design The main idea of architecture design is that once the service is complete failure, the system can achieve the object of efficient and quickly reconstructing the entire service. Based on recovering the service’s data, we can recover the service bodies and the corresponding data. So we propose a service recovery mechanism that recovering the service’s data and restarting the service. In other words, we divide the service recovery process into two phases; firstly, we recovery the service’s data through quick data recovery technology; secondly, we restart the service to achieve the purpose of rerunning the service. In this architecture, we introduce a third party service monitor to monitor the state changes of the service, delivery service recovery orders and control the service rerunning process. The monitor is
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 16 completely independent from the application service. The communication and information transferring between the monitor and service is handled by specific interface. The architecture is shown in Figure 3. Figure 3. The Architecture of Service Recovery by Data Recovery 4.2 Data Recovery Design We can divide the recovery operations into two types, that is, the accurate data recovery and selective data recovery, according to the user’s participation. The so-called accurate data recovery means that recovering all data modification operations in a certain period. Usually after a certain data backup version; and the selective data recovery means that the users query and browse the data modification operation sets, and they choose some specific modification operations to recovery the data. In order to record the data modification operations, the system must save the data modification logs and backup the logs to handling the accurate data recovery. The data recovery design model is shown in Figure 4. Once you need do accurate data recovery and selective data recovery, there are some steps needed to do. 1) the users determine the data operations sets by the data inquiry and browsing tools; 2) according to the corresponding record logs, the system generates data recovery request; 3) send the recovery request to the agent application of the data server; 4) the kernel recovery module receive the recovery request; 5) the kernel recovery module processes the corresponding data backup blocks; 6) Upon the supporting by the file system, the kernel recovery module completes the "replay" operation to recovery, the data state to the time of the specific modification operations.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 17 Figure 4. The Data recovery Design Model 4.3 The Example of Data Recovery Procedure Specifically, we describe the failure recovery mechanism designed in this paper by way of the example of recovery procedure for a certain file. The basic idea of failure recovery is that the mechanism transfers direct data copying process into the operation on the File Allocation Table (abbreviated as FAT, mainly in FAT file system) or Master File Table (abbreviated as MFT, mainly in NTFS file system) and other similar data structures in other file system, while by modifying the link relationship of the selected file backup blocks in FAT, to regenerate the target file. By this means, the mechanism can reduce the direct read and write to the disk and improve the efficiency of the recovery process. For example, while the file state in Figure 5 is needed to recovery to the time T3, the selected file blocks used for recovery and the new link relationship of these blocks is shown in Figure 5. These blocks are linked end to end. And the operating system and file system can transparently access these data blocks. Figure 5. The Data Recovery Procedure
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 18 5. SYSTEM IMPLEMENTATION AND EXPRIMENT RESULTS 5.1 System Implementation We have implemented a prototype service recovery system on the FAT32 file system under the Windows XP platform. The basic architecture of prototype system is designed by the following steps: 1) Real-time monitoring the file modification operation while the service is running and the monitoring process is implemented by the file system filter driver; 2) backup the data according the current file modification operation; 3) record the last modified time of the data backup blocks; 4) record the disk storage space information of the data backup blocks, also the disk storage space information is referred as the disk formatting partition information, which include the start cluster number of the blocks, the end cluster number of the blocks and the block size; 5) so, the system generates many data backup blocks according to the each file modification operation made by the operating system processes and user processes: 6) the data backup blocks together form the sets of file backup pieces; 7) when the information system service is out of order, the users need recovery the file state to a certain time, which is referred as the time Tt; 8) the users select some certain data backup blocks in the data sets according to the Tt; 9) recovering the file by reconstructing the selected data blocks; The system implementation architecture is shown in Figure 6. Figure 6. the System Implementation Architecture
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 19 5.2 Test Platform Configuration The main hardware and software configurations of computer for testing are listed following:  Platform: Personal computer  CPU: Intel(R) Pentium(R) 4 CPU 2.8GHz  RAM:2.0G  Hard disk: 320G  operating system: Microsoft windows XP(5. 1 .2600) Service Pack 2  File System: FAT32 5.2 Data Recovery Performance Results Compared to the traditional data recovery technology, the method designed by us can greatly improve the data recovery efficiency. We select a 300MB data file, a500MB data file and a directory with 600 files for the comparison test. The method is that we compare the recovery time between the traditional way of directory disk copy and the way designed in this paper, and the test results are shown in Table 1. Table 1. Data Recovery Test Results Test Objects Data Recovery Methods Direct Disk Copy (s) Method Designed in this paper(s) 400 MB Data File 7 0.5 500 MB Data File 10 0.6 A Directory 25 6 We can see that data recovery mechanism designed in this paper can greatly improve the data recovery efficiency. Also, the service recovery efficiency has been improved greatly. Generally speaking, the time of the data recovery can be limited on the second level, and the service restarting time is merely several seconds. So, the entire service recovery process can be complemented in several seconds, which can greatly enhance the dependability and survivability of the information service. REFFERNECES [1] R. Michael, “Evaluation of service selection techniques in service oriented computing networks," Smart Grid Technologies & Market Models, vol. 1, no4, pp. 271 -285 ,2005 . [2] J. Hu,C. Yang, "Enhancement of cellular IP routing by redirection at cross over base stations," IEEE VEHICULAR TECHNOLOGYCONFERENCE, vol. 62, no. 4, 2005. [3] Z. X. G. Yuping, "Principle and Realization of Dynamic DNS and Its Application in Mobile Packet Switching Network" Telecom Engineering Technics and Standardization, vol. 2, 2010. [4] G. Tan, S.A. Jarvis, “Prediction of short-lived TCP transfer latency on bandwidth asymmetric links," Journal of Computer and System Sciences, vol. 72, no. 7 , pp. 1201--1210, 2A06. [5] Y. Hao, H. Luo, Y. Yang, et a1., "HOURS : Achieving DoS Resilience in an Open Service Hierarchy," in 2004 International Conference on Dependable Systems and Networks (DSN'04),2004. [6] W. He, 'Recovery in Web Service Applications," in 2004 IEEE International Conference on e- Technology, e-Commerce and e-Service (EEE'04) , pp.25-28, 2004. [7] Y. Huang,C. Kintala, "Software implemented fault tolerance: Technologies and experience," IEEE International Symposium on Fault-Tolerant Computing, p. 2, 1993. [8] D. Patterson, A. Brown, P. Broad well, et al., "Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies," 2002. [9] K. R. Joshi, M. A. Hiltunen, W. H. Sanders, et al., "Automatic model driven recovery in distributed systems," in 24th IEEE Symposium on Reliable Distributed Systems, pp. 25-36,2005.