2018
DOI: 10.1186/s13677-018-0104-9
|View full text |Cite
|
Sign up to set email alerts
|

Fault tolerant software systems using software configurations for cloud computing

Abstract: Customizable software systems consist of a large number of different, critical, non-critical and interdependent configurations. Reliability and performance of configurable system depend on successful completion of communication or interactions among its configurations. Most of the time users of configurable systems very often use critical configurations than non-critical configurations. Failure of critical configurations will have severe impact on system reliability and performance. We can overcome this proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…In [3], first critical configurations were first identified next a fault tolerant candidate was identified, therefore, resulting in the improvement of successful interactions. A Dynamic Fault Tolerant VM Migration (DFTM) method was designed in [4] for providing infrastructure reliability via advanced recovery mechanism.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In [3], first critical configurations were first identified next a fault tolerant candidate was identified, therefore, resulting in the improvement of successful interactions. A Dynamic Fault Tolerant VM Migration (DFTM) method was designed in [4] for providing infrastructure reliability via advanced recovery mechanism.…”
Section: Literature Surveymentioning
confidence: 99%
“…The novelty of Quadruple Fault Tolerance Level is introduced for assigning the fault tolerance level. 3. A novel Osmotic Hybrid Vector Classifier (OHVC) model is proposed where the classification of node and task is made.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand memory faults and other faults are discussed in [17,18]. The software faults are software state transition faults, early and late timing faults, timing overhead, protocol incompatibilities, data fault, logical fault, numerical exception, operating system faults, link timeout fault, user defined exception and unhandled exception faults [19,20]. The communication faults are sending and receiving omission faults, early or late timing faults, packet corruption and packet loss faults [21].…”
Section: Background Workmentioning
confidence: 99%
“…Chinnaiah and Niranjan [20] proposed algorithm that achieved reliability for depth critical configuration of a software system. They explained different critical configurations of system and observed the effects of fault tolerance.…”
Section: Related Workmentioning
confidence: 99%
“…It is considered to be the conversion of a long-lasting dream called "Computing for Use" and it is being gradually embraced by organizations as private, public or hybrid Clouds [2]- [4] . Its main objective is to let users use and pay for what they want, promising on-demand services for their software or infrastructure needs [5]- [7] Although Cloud computing is seen as a significant and positive IT infrastructure shift, much security work is still needed to minimize its deficiencies. Since a significant amount of personal and corporate information is placed in the Cloud data centers, those Cloud security issues and vulnerabilities need to be identified and prevented.…”
Section: Introductionmentioning
confidence: 99%