Computer Science ›› 2020, Vol. 47 ›› Issue (12): 50-55.doi: 10.11896/jsjkx.200700145

Special Issue: Software Engineering & Requirements Engineering for Complex Systems

Previous Articles     Next Articles

System Usage Analysis and Failure Analysis for Cloud Computing

TIAN Yu-li, LI Ning   

  1. School of Computer Science Northwestern Polytechnical University Xi'an 710029,China
    MIIIT Key Laboratory of Big Data Storage and Management Northwestern Polytechnical University Xi'an 710029,China
  • Received:2020-07-22 Revised:2020-08-27 Online:2020-12-15 Published:2020-12-17
  • About author:TIAN Yu-li,born in 1990Ph.D studentis a student member of China Computer Federation.His main research interests include software quality engineeringsoftware reliability engineering and mining software repository.
    LI Ning,born in 1978Ph.Dassociate professoris a member of China Computer Federation.Her main research interests include software testingsoftware defect analysis and mining software repository.
  • Supported by:
    National Natural Science Foundation of China(61972317,61402370).

Abstract: From the perspective of software system usagethe system usage pattern and fault analysis can help the software provider to more accurately grasp user demandevaluate system qualityguide system operation and improve system maintenance.Cloud computing systems (CCS) provide configurable online accessed computational resolutions to end users from an integrated resource poolwhich have received great attention from both academia and industry.Understanding CCS usage workload and fai-lure patterns is important to improve system resource utilization efficiency as well as system service reliability.This paper performs a deep analysis on the Google cluster dataset to characterize system operation in terms of both usage workload and fa-ilure patterns.The results reveal potential vulnerability to the system and provide the basis for follow-up quality assurance activities.

Key words: Cloud computing, Failure analysis, Software failure, Usage analysis, Usage pattern

CLC Number: 

  • TP311
[1] CLOUD H.The NIST definition of cloud computing[R].National Institute of Science and Technology ,Technical Report,2011,145.
[2] LIU B,LIN Y,CHEN Y.Quantitative workload analysis andprediction using Google cluster traces[C]//IEEE Conference on Computer Communications.2016:935-940.
[3] MORENO I S,GARRAGHAN P,TOWNEND P,et al.Analysis,modeling and simulation of workload patterns in a large-scale utility cloud[J].IEEE Transactions on Cloud Computing,2014,2(2):208-221.
[4] ROSÁ A,CHEN L Y,BINDER W.Failure analysis and prediction for big-data systems[J].IEEE Transactions on Services Computing,2016,10(6):984-998.
[5] GARRAGHAN P,TOWNEND P,XU J.An empirical failure-analysis of a large-scale cloud computing environment[C]//International Symposium on High-Assurance Systems Engineering.2014:113-120.
[6] COTRONEO D,DE SIMONE L,LIGUORI P,et al.Enhancing failure propagation analysis in cloud computing systems[C]//International Symposium on Software Reliability Engineering.2019.
[7] LYU M R.Handbook of software reliability engineering[M].CA:IEEE computer society press,1996.
[8] TIAN J,RUDRARAJU S,LI Z.Evaluating web software reliability based on workload and failure data extracted from server logs[J].IEEE Transactions on Software Engineering,2004,30(11):754-769.
[9] GUPTA S,DILEEP A D.Long range dependence in cloud servers:a statistical analysis based on Google workload trace[J].Computing,2020:102(4):1-19.
[10] KAVULYA S,TAN J,GANDHI R,et al.An analysis of traces from a production mapreduce cluster[C]//IEEE International Conference on Cluster,Cloud and Grid Computing.2010:94-103.
[11] CHEN Z,HU J,MIN G,et al.Towards accurate prediction for high-dimensional and highly-variable cloud workloads with deep Learning[J].IEEE Transactions on Parallel and Distributed Systems,2020,31(4):923-934.
[12] TIAN J.Software quality engineering:testing,quality assur-ance,and quantifiable improvement[M].John Wiley &Sons,2005.
[13] GARG S K,GOPALAIYENGAR S K,BUYYA R.SLA-based resource provisioning for heterogeneous workloads in a virtualized cloud datacenter[C]//International Conference on Algorithms and Architectures for Parallel Processing.2011:371-384.
[14] SHARMA B,CHUDNOVSKY V,HELLERSTEIN J L,et al.Modeling and synthesizing task placement constraints in Google compute clusters[C]//ACM Symposium on Cloud Computing.2011:1-14.
[15] ZHU X,YANG L T,CHEN H,et al.Real-time tasks oriented energy-aware scheduling in virtualized clouds[J].IEEE Transactions on Cloud Computing,2014,2(2):168-180.
[16] SAHOO R K,SQUILLANTE M S,SIVASUBRAMANIAM A,et al.Failure data analysis of a large-scale heterogeneous server environment[C]//IEEE International Conference on Dependable Systems and Networks.2004:772-781.
[17] REISS C,WILKES J,HELLERSTEIN J L.Google cluster-usage traces:format+ schema[R].Google Inc.,Technical Report,2011:1-14.
[18] CHEN Z,HU J,MIN G,et al.Towards accurate prediction for high-dimensional and highly-variable cloud workloads with deep learning[J].IEEE Transactions on Parallel and Distributed Systems,2019,31(4):923-934.
[19] KHAN A A,ZAKARYA M,BUYYA R,et al.An energy and performance aware consolidation technique for containerized datacenters[J].IEEE Transactions on Cloud Computing,2019,PP(99).
[20] MUSA J D,IANNINO A,OKUMOTO K.Software Reliability:Measurement,prediction,application[M].McGrawHill,New York,1987.
[21] TIAN J.Integrating time domain and input domain analyses of software reliability using tree-based models[J].IEEE Transactions on Software Engineering,1995,21(12):945-958.
[22] REISS C,TUMANOV A,GANGER G R,et al.Towards understanding heterogeneous clouds at scale:Google trace analysis[R].Intel Science and Technology Center for Cloud Computing,Tech.Rep,2012.
[1] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[2] WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426.
[3] XU Jian-bo, SHU Hui, KANG Fei. Summary on Reverse Debugging Technology [J]. Computer Science, 2021, 48(5): 9-15.
[4] QI Hui, SHI Ying, LI Deng-ao, MU Xiao-fang, HOU Ming-xing. Software Reliability Prediction Based on Continuous Deep Confidence Neural Network [J]. Computer Science, 2021, 48(5): 86-90.
[5] PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319.
[6] CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268.
[7] WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323.
[8] JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22.
[9] JIANG Cong-feng, YIN Ji-liang, HU Hai-zhou, YAN Long-chuan, ZHANG Ji-lin, WAN Jian, QIU Ye-liang. Analysis of Workload Failure in Co-located Data Centers [J]. Computer Science, 2021, 48(11A): 225-231.
[10] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[11] WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307.
[12] ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33.
[13] LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300.
[14] XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325.
[15] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!