Assured Cloud Computing 2018
DOI: 10.1002/9781119428497.ch2
|View full text |Cite
|
Sign up to set email alerts
|

Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

5
2

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 38 publications
0
22
0
Order By: Relevance
“…This work is part of a long-term research effort in which we have been using Maude to both meet the challenges and exploit the opportunities of modular design and analysis for cloud-based transaction systems (see [10,28] for surveys). As part of this effort, we have formally specified in Maude and analyzed both the consistency and the performance properties of the following systems: Apache Cassandra [17], Google's Megastore [9] and its Megastore-CGC extension [15], RAMP [8], P-Store [31] Walter [34], and (in this paper and [23]) ROLA and its comparison with both Walter [34] and Jessy [6].…”
Section: Discussionmentioning
confidence: 99%
“…This work is part of a long-term research effort in which we have been using Maude to both meet the challenges and exploit the opportunities of modular design and analysis for cloud-based transaction systems (see [10,28] for surveys). As part of this effort, we have formally specified in Maude and analyzed both the consistency and the performance properties of the following systems: Apache Cassandra [17], Google's Megastore [9] and its Megastore-CGC extension [15], RAMP [8], P-Store [31] Walter [34], and (in this paper and [23]) ROLA and its comparison with both Walter [34] and Jessy [6].…”
Section: Discussionmentioning
confidence: 99%
“…Only a short summary of work in this area is possible here. I refer to the survey [12], from which the summary of the work on systems (1)-(3) is drawn, for a detailed account. My summary of (4) is based on [36], and that of (5)-(6) on [31,30].…”
Section: Formal Specification and Analysis Of Cloud Storage Systemsmentioning
confidence: 99%
“…A common theme running through both of the studies that I summarize below is that cloud computing, while giving rise to new security vulnerabilities, does also offer the possibility of arriving at system designs that take advantage of cloud computing to increase system security. My summary of (1) is based on material in [16], and that of (2) on [40,12] 1. Achieving Stable Availability in the Face of DDoS Attacks.…”
Section: Some Security Aspects Of Cloud Computing Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, although cloud storage systems are not traditionally considered to be "safety-critical" systems, as more and more applications migrate to the cloud, it becomes increasingly crucial that storage systems do not lose potentially critical user data. However, as argued in, e.g., [15,4], standard system development and validation techniques are not well suited for designing data stores with high assurance that they satisfy their correctness and quality-of-service requirements: Executing and simulating new designs may require understanding and modifying large code bases; furthermore, although system executions and simulations can give an idea of the performance of a design, they cannot give any (quantified) assurance about the system performance, and they cannot be used to verify correctness properties.…”
Section: Introductionmentioning
confidence: 95%