2022
DOI: 10.1002/spe.3076
|View full text |Cite
|
Sign up to set email alerts
|

Chaos as a Software Product Line—A platform for improving open hybrid‐cloud systems resiliency

Abstract: Nowadays, cloud-native software architectures have a significant relevance due to the speed and agility they provide. These properties lead relevant organizations in different industries, like video streaming (Netflix), car-sharing (Uber, Cabify), banking (BBVA, HSBC), and governmental agencies (NASA, FBI, CERN, ESA) to heavily rely on cloud-native software to run their business-critical applications. Additionally, including fault injection actions in the production infrastructure allows companies to have cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…Figure 5 shows the execution of ChaosXploit for branch 2, which includes (i) the setup of ChaosXploit (lines 1-5), (ii) the steady state validation which assumes a correct configuration of the policies assigned to the user account under analysis (lines 6-10), (iii) execution of the actions that allow validating the hypothesis through an attempt to restore a previous policy (lines [11][12][13][14][15][16][17][18][19][20]. This last set of lines includes listing the user policies (line 13-14), validating the current version (line 15), identifying the version that allows the privilege escalation (line 16), restoring the desired policy (line 17-18) and validation of the restore (line 20).…”
Section: Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 5 shows the execution of ChaosXploit for branch 2, which includes (i) the setup of ChaosXploit (lines 1-5), (ii) the steady state validation which assumes a correct configuration of the policies assigned to the user account under analysis (lines 6-10), (iii) execution of the actions that allow validating the hypothesis through an attempt to restore a previous policy (lines [11][12][13][14][15][16][17][18][19][20]. This last set of lines includes listing the user policies (line 13-14), validating the current version (line 15), identifying the version that allows the privilege escalation (line 16), restoring the desired policy (line 17-18) and validation of the restore (line 20).…”
Section: Results Analysismentioning
confidence: 99%
“…To this extent, the work in Ref. [16] described Pystol, a fault injection framework to argue on the resiliency of hybrid-cloud systems in adverse events. Specifically, Pystol is presented as a Software Product Line (SPL) that can be mounted on top of cloud infrastructures, being able to exploit CE's capacities.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the current study certainly can contribute to augmenting knowledge on this issue, which is of paramount importance for avoiding the interruption or malfunctioning of the services that the company offers to its customers. Actually, as noted by Camacho et al [60], the inaccessibility of these services due to platform malfunctioning may lead both to severe penalty costs due to the infringement of availability clauses as well as to the loss of market reputation.…”
Section: Discussionmentioning
confidence: 99%