Systems and Means of Informatics
2016, Volume 26, Issue 3, pp 83-92
SECURE AUTOMATIC RECONFIGURATION OF CLOUDY COMPUTING
- A. A. Grusho
- M. I. Zabezhailo
- A. A. Zatsarinnyy
- V. O. Piskovski
Abstract
The paper is devoted to adaptation of the concept of consistency and management of transactions of data base management systems (DBMS) in application to a dynamic reconfiguration of cloudy computing environments. Definitions of operations and procedures of a reconfiguration of cloudy computing environments are given. Their distinctive feature is to transfer of network from one correct state to another correct state. The anomalies which are found during the work of DBMS and an interpretation of their analogs at procedures of a reconfiguration of cloudy computing environments are presented. The theorem of consistency for processes of a dynamic reconfiguration of cloudy computing environments is also provided.
[+] References (11)
- Revilak, S., P. O'Neil, and E. O'Neil. 2011. Precisely serializable snapshot isolation. 27th Conference (International) on Data Engineering Proceedings. 482-493.
- Reitblatt, M., N. Foster, J. Rexford, and D. Walker. 2011. Consistent updates for software-defined networks: Change you can believe in! HotNets-X: 10th ACM Workshop on Hot Topics in Networks Proceedings. -New York, NY: ACM. 7:1-6.
- Reitblatt, M., N. Foster, J. Rexford, C. Schlesinger, and D. Walker. 2012. Abstractions for network update. ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication Proceedings.
323-334.
- McGeer, R. 2013. A correct, zero-overhead protocol for network updates. 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking Proceedings. 161-162. Available at: http://conferences.sigcomm. org/sigcomm/2013/papers/hotsdn/p161.pdf (accessed September 19, 2016).
- McGeer, R. 2016. Declarative verifiable SDI specifications. IEEE Security and Privacy Workshops. 198-203. Available at: http://spw16.langsec.org/papers/mcgeer- verifiable-sdi-specs.pdf (accessed September 19, 2016).
- Eswaran, P., J. Gray, R. Lorie, and I. Traiger. 1976. The notions of consistency and predicate locks in a database system. Commun. ACM 19(11):624-633.
- Bernstein, P. A., V. Hadzilacos, and N. Goodman. 1987. Concurrency control and recovery in database systems. Reading, MA: Addison-Wesley Publ. 264 p.
- O'Neil, P. 1994. Database: Principles, programming, performance. San-Francisco, CA: Morgan Kaufmann Publ. 860 p.
- Conolly, T. M., and C. E. Begg. 1999. Database systems. A practical approach to design, implementation, and management. 2nd ed. Reading, MA: Addison-Wesley. 1093 p.
- Berenson, H. Ph. Bernstein, J. Gray, J. Melton, E. O'Neil, and P. O'Neil. 1995. A critique of ANSI SQL isolation levels. ACM SIGMOD Conference (International) on Management of Data Proceedings. New York, NY: ACM. 1-10. Available at: http://www.cs.umb.edu/~poneil/iso.pdf (accessed September 19, 2016).
- Majumdar, R., S.D. Tetali, and Z. Wang. 2014. Kuai: A model checker for software-defined networks. 14th Conference on Formal Methods in Computer-Aided Design Proceedings. Lausanne, Switzerland: IEEE. 163-170. Available at: http:// www.cs.utexas.edu/users/hunt/FMCAD/FMCAD14/proceedings/27_majumdar.pdf (accessed September 19, 2016).
[+] About this article
Title
SECURE AUTOMATIC RECONFIGURATION OF CLOUDY COMPUTING
Journal
Systems and Means of Informatics
Volume 26, Issue 3, pp 83-92
Cover Date
2016-08-30
DOI
10.14357/08696527160306
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
cloudy computing environments, automatic consistent reconfiguration of network, software-defined network, DBMS, anomaly
Authors
A. A. Grusho , M. I. Zabezhailo , A. A. Zatsarinnyy , and V. O. Piskovski
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|