Fault Diagnosis and Application to Modern SystemsView this Special Issue
Research Article | Open Access
Hang Wei, Pei-Li Qiao, "Reliability Assessment of Cloud Computing Platform Based on Semiquantitative Information and Evidential Reasoning", Journal of Control Science and Engineering, vol. 2016, Article ID 2670210, 10 pages, 2016. https://doi.org/10.1155/2016/2670210
Reliability Assessment of Cloud Computing Platform Based on Semiquantitative Information and Evidential Reasoning
A reliability assessment method based on evidential reasoning (ER) rule and semiquantitative information is proposed in this paper, where a new reliability assessment architecture including four aspects with both quantitative data and qualitative knowledge is established. The assessment architecture is more objective in describing complex dynamic cloud computing environment than that in traditional method. In addition, the ER rule which has good performance for multiple attribute decision making problem is employed to integrate different types of the attributes in assessment architecture, which can obtain more accurate assessment results. The assessment results of the case study in an actual cloud computing platform verify the effectiveness and the advantage of the proposed method.
Cloud computing, as the Pay-Per-Use computing service model which has the capacity for large-scale resource scheduling, is attracting more and more attention. Currently, scheduling strategy of cloud computing can be divided into 3 types: performance-driven scheduling strategy [1, 2], profit-driven scheduling strategy [3, 4], and reliability-driven scheduling strategy [5, 6]. With the upsurge of commercial operation, the requirements for the cloud computing systems reliability are more stringent than ever. The cloud systems are more dangerous because the data, services, and computing resource are highly clustered, which is more easily to be broken by the outside hackers or internal users with unstable operation. Recently, the failure events of cloud service frequently occurred. For instance, Azure cloud services of Microsoft had two times interrupt service due to the system failure in March 2015, which affected most parts of the central and eastern United States service areas. In Apple Cloud Services, about 11 iCloud-related features had experienced serious technical issues on May 20, 2015, including iCloud Account and iCloud mail, by which 2 million iCloud users were affected. Therefore, the first 2 strategies are not practicable because the reliability is not considered. Thus, as one of the significant factors of the task scheduling, the reliability assessment should be deeply considered in the cloud computing platforms .
Current assessment methods for cloud computing reliability mainly focus on the security assessment method , the risk assessment method , and the service assessment method . But these approaches make the reliability assessment only in a narrow aspect point of view. The cloud computing system with huge computing process and complex structure is hard to establish the comprehensive assessment model because of the high heterogeneity in the infrastructure nodes. In cloud computing platform, a large number of reliability factors need to be considered, and the information between these factors is closely linked and mutually restricted. More intractably, most reliability factors include uncertainty information, which increase the difficulty for reliability assessment .
The essence of reliability assessment is to obtain a reasonable security state through the rational integration of multiattributes . But in actual cloud computing operation, the available knowledge is incomplete and uncertain due to the limitation of information acquisition and resolution. Thus, the corresponding assessment models must have capability to deal with this uncertain information in assessment process. The current methods of reliability assessment include factor analysis , utility theory analysis , analytic hierarchy process [15, 16], Bayesian inference [17, 18], fuzzy logic reasoning [9, 19], hybrid method , and artificial intelligence reasoning [21–23]. The factor analysis can express the relationship between multiple attributes by a few weighted factors, which aims to reflect the comprehensive information of the system. But this method has a strict standard on the testing data. The utility theory analysis establishes the utility maximum function by analysis various factors. But the capability of information analysis is not good, and the solution of the utility function is too complicated to deal with a large amount of attributes. The analytic hierarchy process can effectively use the combination knowledge which includes both qualitative and quantitative information. After the quantification of the qualitative attributes, the weight vectors are determined to make corresponding assessment. But this method could not give the appropriate results when dealing with the incomplete information. Bayesian inference is a classical method of probabilistic reasoning, which can deal with uncertain problems. A statistical conclusion is obtained by using prior knowledge and sample information, but a large number of repeated trials are needed to obtain the probabilities; thus the training difficulty is increased. Fuzzy logic reasoning has a significant effect on the processing of a large number of inaccurate data, and it is suitable for the complex fuzzy systems. However, the precise membership function is hard to establish, which would produce large deviation of the results. Hybrid method is the combination of two or more computational approaches which can provide better advantages than single approaches. But it is hard to solve the conflict of the attributes in cloud computing systems, because of its parameter adjustment mode. D-S theory [24, 25] not only can deal with both qualitative knowledge and quantitative data very well, but also can deal with various types of uncertain information. Compared with Bayesian inference, the D-S theory can deal with the uncertainty due to the limitation of expert abilities or prior knowledge. After that, Wang et al. [26, 27] proposed evidential reasoning (ER) rule in late 1990s. ER rule is developed as a multicriteria decision analysis (MCDA) approach on the basis of belief decision and D-S theory [28, 29]. It has been widely employed in different fields [30, 31]. Compared to the D-S theory of evidence, the calculation process of the ER rule is linear, which reduces the computational complexity . Moreover, the most important thing is that it can deal with the conflict of evidence attributes which cannot be solved by using D-S theory . The conflict of evidence refers to the basic probability assignment of the two empty focal elements when the evidence is synthesized. The reliability assessment of cloud computing has different types of information needed to be integrated, which is the advantage of ER rule.
According to above description, the innovations of this paper are shown: ER rule is first employed to establish the reliability assessment model of the cloud computing platform in this paper; a new reliability assessment architecture including four aspects is proposed. A case study is given in the last section, and it demonstrates the good performance on assessing the reliability of a real cloud computing platform by using the proposed method.
The paper is organized as follows. In Section 2, the principle of ER rule is described. In Section 3, the reliability assessment of cloud computing platform is described, and the new reliability assessment architecture is proposed. In Section 4, a case study for assessing the reliability of an actual cloud computing platform is given, and the simulation results are analyzed. Finally, this paper is concluded in Section 5.
2. The Evidential Reasoning Rule: Basics
As mentioned above, ER rule can integrate different types of information, which include qualitative knowledge and quantitative data. It can also express various types of uncertainties such as fuzzy uncertainty, probabilistic uncertainty, and ignorance uncertainty . The basic principle of the ER rule is introduced in this section.
Assume that there are basic attributes of a general attribute in a two-level hierarchy, and denotes the weights of the basic attributes, where . There are assessment grades; then the basic step of the ER rule can be concluded as follows.
The belief degree should be converted into the basic probability mass. The process is shown as follows:where denotes the basic probability mass which refers to the degree of the th basic attribute supporting the hypothesis that the attribute is assessed to the th grade. denotes the rest of probability mass which has not been assigned to any consequent according to the th basic attribute. denotes the unassigned basic probability mass which refers to the unimportant degree of the th basic attribute. denotes the unassigned basic probability mass which refers to the incomplete degree of the th basic attribute.
ER rule is used to combine the first basic attributes; the detailed process is described as follows:where denotes the probability mass which refers to the degree of the first basic attributes supporting the hypothesis that the attribute is assessed to the th grade. can be calculated as
Thus, the final belief degree to the th consequent and the remaining belief degree can be calculated as
3. Reliability Assessment of Cloud Computing Platform with ER Rule
3.1. Problem Formulation
In this section, the assessment attributes can be divided into 2 categories: quantitative data and qualitative knowledge. The quantitative data represents the data that can be expressed as certain quantity, amount, or range, such as Mean Time to Failures (MTTF) of central units, frequency of network attack, fault tolerant rate of cloud computing platform, and Mean Time to Repair (MTTR) of service. These attributes can be collected by the data monitoring systems. However, the qualitative knowledge is associated with the subjective quality of a situation or phenomenon, such as scalability of cloud system, controllability of access terminal, completeness of service, and stability of service. Qualitative knowledge is abstract and it either does not require measurement or cannot be measured because the reality they represent can only be approximated. Thus the decision making may be associated with uncertainty. Because the knowledge of these aspects is gained through observation combined with interpretative understanding, the uncertainty usually occurs because information is not clearly described or only described by partial and imprecise evidence, such as ability of personalized service and capability of disaster recovery . ER rules can make full use of qualitative knowledge and quantitative data and can also express various types of uncertainties. In this section, a new reliability assessment architecture including four aspects is established, and then the ER rule is used to assess the reliability of the cloud computing platform.
3.2. The Basic Attributes of Cloud Computing Platform Reliability
A four-level reliability attributes structure of cloud computing platform is established, including both quantitative data and qualitative knowledge. Reliability of cloud computing platform is categorized in 4 distinct aspects: network reliability, hardware reliability, software reliability, and service reliability. For each attribute, the symbol “” is numerically labeled according to the hierarchy, while the symbol “” is valued as the weight which is one of the important parameters in the process of ER rule. In the aspect of the network reliability, all the attributes are measured as the quantitative data. In particular, considering the significance of network attack frequency in assessing the network reliability, the 4th level attributes are added. In the aspect of hardware reliability, most attributes are scalability of the cloud system and fault tolerance rate of the cloud platform. Scalability is the ability of cloud system to continue to run well when it is changed in volume in order to meet a requirement. The controllability of access terminal is the only qualitative attributes which is defined as an ability of access terminal in aspect of software reliability. Service reliability is an assessment for the Quality of Service (QoS); thus most of attributes are defined as qualitative knowledge. In this paper, we introduce 4-grade assessment levels as the frame of discernment of the reliability assessment model. The basic attributes of cloud computing platform reliability are shown in Table 1.
3.3. The Assessment Grades of the Attributes
In this paper, the assessment grades of the attributes of cloud computing platform are established. For the quantitative attributes, the data range is divided into 4 grades, determined as “excellent, good, common, and bad.” The setting up of the interval of quantitative attributes is obtained by the expert experience and practical investigation, which ensure the data precision and traceability. For the qualitative attributes, the grade of assessment can be determined by experts according to the experience or investigation. The assessment rules can be established through the assessment grades, as shown in Table 2.
3.4. The Belief Degree of the Attributes
When the value of an attribute of the assessment is determined, the corresponding belief degree should be calculated in order to obtain the basic probability mass in ((2)-(1)), as shown in the following:where denotes the value of the attribute and denotes the reference value of the th grade for attribute .
4. Case Study
In order to illustrate the detailed process of the reliability assessment, a case which uses the proposed reliability assessment architecture and ER rule to assess the reliability of an actual cloud computing platform is studied in this section.
4.1. The Actual Cloud Computing Platform
In this case, a cloud computing platform of Innovation Lab in HUST is investigated. The architecture of the platform can be divided into 4 layers and 2 centers. The layers consist of cloud infrastructure layer, cloud platform layer, cloud bus layer, and cloud application layer. The centers include cloud management center and cloud data center. The cloud infrastructure layer consists of hardware level and virtual level, including computers, servers, storage units, and network units. Employing technology of virtualization, the virtual level is a solution of IaaS service, which forms a virtual cluster from underlying hardware resources. The cloud platform layer includes service level and computing level. The purpose of the service layer is to provide the basic data or information to the upper layer through the processing of the form of service. The computing level includes distributed computing engine, concurrent computing engine, and utility computing engine. The cloud bus design includes service adapter level, bus level, and application adapter level. The service adapter provides an adapter for the service and bus communication in the cloud platform. The cloud bus is a kind of basic structure that interacts with the service through the service adapter. The application adapter provides an adapter for application software and bus communication in the cloud platform. The cloud application layer can be categorized into three types, such as inner application, external application, and platform of secondary development interface.
The cloud management center includes supercomputing center and security center. The supercomputing center can achieve rapid deployment, automation installation, and upgrade. The security center is responsible for user registration, user authentication, access control, and so forth. The cloud data center is in charge of processing and storage of data in the cloud platform. The architecture of the platform is shown in Figure 1.
4.2. The Process of the Reliability Assessment
The corresponding attributes described in Table 1 are collected from the cloud computing platform described above. Taking the frequency of network attack () as an example, assume that Dos attack times/h, Probe attack times/h, U2R attack times/h, and R2L attack times/h. Thus, the belief degrees of these attributes which are assessed to a grade can be calculated by (8):
Then, in order to integrate the above probability masses and get the upper attribute, should be calculated at first:
Thus, the integration masses can be obtained by (5):
Next, in order to integrate the third probability mass, should be calculated:
Then, the new integration masses can be obtained:
Then, should be calculated:
Thus, the new integration masses can be obtained:
Finally, the belief degrees of frequency of network attack () can be calculated by (7):
Through the above conclusions, when times/h, times/h, times/h, and times/h, the final belief degrees of can be expressed by , which means that the frequency of network attack () can be considered as “good.”
The other attributes in Table 1 can be integrated by the method described in above process, and the final conclusion of reliability assessment of cloud computing platform can be obtained.
Considering the complex attributes, this paper first employed ER rule to make a comprehensive assessment for the reliability of cloud computing platform. ER rule has a good performance in multiple attribute decision making. It can process the evidence with high conflict and complete conflict and then make a more accurate assessment result. Moreover, a new reliability assessment structure of cloud computing for multiple attribute decision making is proposed in this paper. The 4-level reliability attributes mainly include four aspects, where the views of cloud computing servers and users are both taken into account, and the actual situation of reliability in cloud computing platform can be completely expressed. In conclusion, the innovation points of this paper can be concluded: ER rule is first employed to establish the reliability assessment model of the cloud computing platform in this paper; a new reliability assessment architecture including four aspects is proposed. Thus, the above two innovative researches cause a good result for reliability assessment in the complex dynamic cloud computing platform.
The authors declare that they have no competing interests.
- W. Tian, Y. Zhao, M. Xu, Y. Zhong, and X. Sun, “A toolkit for modeling and simulation of real-time virtual machine allocation in a cloud data center,” IEEE Transactions on Automation Science and Engineering, vol. 12, no. 1, pp. 153–161, 2015.
- M. Abdullahi, M. A. Ngadi, and S. M. Abdulhamid, “Symbiotic Organism Search optimization based task scheduling in cloud computing environment,” Future Generation Computer Systems, vol. 56, pp. 640–650, 2016.
- X. L. Xu, L. Cao, X. Wang, X. Xu, L. Cao, and X. Wang, “Resource pre-allocation algorithms for low-energy task scheduling of cloud computing,” Journal of Systems Engineering & Electronics, vol. 27, no. 2, pp. 457–469, 2016.
- Y. Sun, J. White, S. Eade, and D. C. Schmidt, “ROAR: a QoS-oriented modeling framework for automated cloud resource allocation and optimization,” Journal of Systems and Software, vol. 116, pp. 146–161, 2016.
- A. I. Awad, N. A. El-Hefnawy, and H. M. Abdel_Kader, “Enhanced particle swarm optimization for task scheduling in cloud computing environments,” Procedia Computer Science, vol. 65, pp. 920–929, 2015.
- J. Wang, B. Gong, H. Liu, and S. Li, “Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud scheduling,” Applied Intelligence, vol. 43, no. 3, pp. 662–675, 2015.
- P. Qi and L. Li, “A fault recovery‐based scheduling algorithm for cloud service reliability,” Security and Communication Networks, vol. 8, no. 5, pp. 703–714, 2015.
- S. H. Albakri, B. Shanmugam, G. N. Samy, N. B. Idris, and A. Ahmed, “Security risk assessment framework for cloud computing environments,” Security and Communication Networks, vol. 7, no. 11, pp. 2114–2124, 2014.
- N. Ahmed and A. Abraham, “Neuro-fuzzy model for assessing risk in cloud computing environment,” in Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015, vol. 427 of Advances in Intelligent Systems and Computing, pp. 137–145, Springer International Publishing, Basel, Switzerland, 2016.
- H. Khazaei, J. Mišić, V. B. Mišić, and S. Rashwand, “Analysis of a pool management scheme for cloud computing centers,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp. 849–861, 2013.
- X. Qiu, Y. Dai, Y. Xiang, and L. Xing, “A hierarchical correlation model for evaluating reliability, performance, and power consumption of a cloud service,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 3, pp. 401–412, 2016.
- B. Larsen, P. Ingwersen, and B. Lund, “Data fusion according to the principle of polyrepresentation,” Journal of the American Society for Information Science and Technology, vol. 60, no. 4, pp. 646–654, 2009.
- J. C. de Winter and D. Dodou, “Factor recovery by principal axis factoring and maximum likelihood factor analysis as a function of factor pattern and sample size,” Journal of Applied Statistics, vol. 39, no. 4, pp. 695–710, 2012.
- M. Sundaram, M. J. Smith, D. A. Revicki, L.-A. Miller, S. Madhavan, and G. Hobbs, “Estimation of a valuation function for a diabetes mellitus-specific preference-based measure of health: the diabetes utility index®,” PharmacoEconomics, vol. 28, no. 3, pp. 201–216, 2010.
- Z. Ruo-Xin, X.-J. Cui, S.-J. Gong, H.-K. Ren, and K. Chen, “Model for cloud computing security assessment based on AHP and FCE,” in Proceedings of the 9th International Conference on Computer Science and Education (ICCCSE '14), pp. 197–204, August 2014.
- N. Badie, A. R. C. Hussin, and A. H. Lashkari, “Cloud computing data center adoption factors validity by fuzzy AHP,” International Journal of Computational Intelligence Systems, vol. 8, no. 5, pp. 854–873, 2015.
- Y. Tamura, M. Kawakami, and S. Yamada, “Reliability modeling and analysis for open source cloud computing,” Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, vol. 227, no. 2, pp. 179–186, 2013.
- D. Marudhadevi, V. N. Dhatchayani, and V. S. S. Sriram, “A trust evaluation model for cloud computing using service level agreement,” The Computer Journal, vol. 58, no. 10, pp. 2225–2232, 2014.
- Z. Pei, “Intuitionistic fuzzy variables: concepts and applications in decision making,” Expert Systems with Applications, vol. 42, no. 22, pp. 9033–9045, 2015.
- Z. Xuejie, W. Zhijian, and X. Feng, “Reliability evaluation of cloud computing systems using hybrid methods,” Intelligent Automation & Soft Computing, vol. 19, no. 2, pp. 165–174, 2013.
- M. Khaki, I. Yusoff, and N. Islami, “Application of the artificial neural network and neuro-fuzzy system for assessment of groundwater quality,” Clean—Soil, Air, Water, vol. 43, no. 4, pp. 551–560, 2015.
- O. Hussain, H. Dong, and J. Singh, “Semantic similarity model for risk assessment in forming cloud computing SLAs,” in On the Move to Meaningful Internet Systems, OTM 2010: Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25–29, 2010, Proceedings, Part II, vol. 6427 of Lecture Notes in Computer Science, pp. 843–860, Springer, Berlin, Germany, 2010.
- J. M. Garibaldi and T. Ozen, “Uncertain fuzzy reasoning: a case study in modelling expert decision making,” IEEE Transactions on Fuzzy Systems, vol. 15, no. 1, pp. 16–30, 2007.
- X. Fan and M. J. Zuo, “Fault diagnosis of machines based on D–S evidence theory. Part 1: D–S evidence theory and its improvement,” Pattern Recognition Letters, vol. 27, no. 5, pp. 366–376, 2006.
- R. Sun, H.-Z. Huang, and Q. Miao, “Improved information fusion approach based on D-S evidence theory,” Journal of Mechanical Science and Technology, vol. 22, no. 12, pp. 2417–2425, 2008.
- Y.-M. Wang, J.-B. Yang, D.-L. Xu, and K.-S. Chin, “The evidential reasoning approach for multiple attribute decision analysis using interval belief degrees,” European Journal of Operational Research, vol. 175, no. 1, pp. 35–66, 2006.
- Z.-G. Zhou, F. Liu, L.-C. Jiao et al., “An evidential reasoning based model for diagnosis of lymph node metastasis in gastric cancer,” BMC Medical Informatics and Decision Making, vol. 13, no. 1, article 123, 2013.
- Z.-G. Liu, Q. Pan, and J. Dezert, “A new belief-based K-nearest neighbor classification method,” Pattern Recognition, vol. 46, no. 3, pp. 834–844, 2013.
- Z.-G. Liu, Q. Pan, J. Dezert, and A. Martin, “Adaptive imputation of missing values for incomplete pattern classification,” Pattern Recognition, vol. 52, pp. 85–95, 2016.
- Z. Zhou, M. Folkert, N. Cannon et al., “Predicting distant failure in early stage NSCLC treated with SBRT using clinical parameters,” Radiotherapy & Oncology, vol. 119, no. 3, pp. 501–504, 2016.
- Z.-G. Zhou, F. Liu, L.-L. Li et al., “A cooperative belief rule based decision support system for lymph node metastasis diagnosis in gastric cancer,” Knowledge-Based Systems, vol. 85, pp. 62–70, 2015.
- Z.-G. Liu, Q. Pan, J. Dezert, and G. Mercier, “Credal c-means clustering method based on belief functions,” Knowledge-Based Systems, vol. 74, pp. 119–132, 2015.
- J.-B. Yang and D.-L. Xu, “Evidential reasoning rule for evidence combination,” Artificial Intelligence, vol. 205, pp. 1–29, 2013.
- Z. J. Zhou, C. H. Hu, G. Y. Hu, X. X. Han, B. C. Zhang, and Y. W. Chen, “Hidden behavior prediction of complex systems under testing influence based on semiquantitative information and belief rule base,” IEEE Transactions on Fuzzy Systems, vol. 23, no. 6, pp. 2371–2386, 2015.
- Z. J. Zhou, L. L. Chang, C. H. Hu, X. X. Han, and Z. G. Zhou, “A new BRB-ER-based model for assessing the lives of products using both failure data and expert knowledge,” IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 46, no. 11, pp. 1529–1543, 2016.
Copyright © 2016 Hang Wei and Pei-Li Qiao. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.