Research Article | Open Access

# Enhanced Stochastic Methodology for Combined Architecture of E-Commerce and Security Networks

**Academic Editor:**Oleg Gendelman

#### Abstract

This paper deals with network architecture which is a combination of electronic commerce and security systems in the typical Internet ecosystems. The e-commerce model that is typically known as online shopping can be considered as a multichannel queueing system. In the other hand, stochastic security system is designed for improving the reliability and availability of the e-commerce system. The security system in this paper deals with a complex system that consists of main unreliable servers, backups, and repair facilities to repair the broken servers. The results are applied for analyzing the current Internet ecosystem, and the mathematical methods can be also applied to the various areas such as human resources, manufacturing processes, and military operations. The solution presents the analytical solutions of the combined architecture of two queueing systems, and these tractable results are used for demonstration in the framework of optimization problems.

#### 1. Introduction

Presently, electronic commerce (e-commerce) has been fastly growing and became extremely popular. Because of heavy traffic on Internet services and Internet shopping, the servers for e-commerce must be available all the time to meet the customer satisfactions. In the case of computer security, there are three distinct concepts which are secrecy (confidentiality), accuracy (integrity), and availability [1]. A secure computer system must not allow information to be disclosed to anyone who is not authorized to access. Accuracy means the system must not corrupt information in the system. Availability means the (computer) system keeps working efficiently and the system is able to recover if a disaster occurs [2]. The availability of network servers is one of the most important issues in the business. The stochastic integrated model is the combination of e-commerce [3] and network security [4] systems under one umbrella (see, Figure 1). Typical electronic commerce service is online shopping via Internet [3]. The security system that is also called stochastic backup model [4] is designed for improving the availability and reliability of the network.

As mentioned above, the system that is proposed in the paper consists of two systems. One is a network systems which actually serve customers via Internet and the other is a stochastic security system which supports to maintain main servers using the reserve (spare or backup) servers [2–5].

The e-commerce system has unreliable web-based network servers and each server contains several channels to serve customers. Each customer connects to one of many channels for Internet shopping and a customer leaves when shopping is done. It is assumed that service time of each channel is exponentially distributed with the parameter and identically and independently distributed (iid). The interarrival times of input streams are generally distributed and iid in accordance with the PDF with the mean that is the average interarrival time between customer arrivals. Let be the number of occupied channels at time on the th server that offers up to channels. These channels are occupied by customers randomly and iid. The solution of the system can described by a queueing system with embedded chain process and continuous time process. The embedded chain process was developed by Takács [6] and recent researches from Kim [3] deal with the continuous time process of a multichannel open queueing system.

The stochastic security system with reserve backups is designed for improving availability and the reliability by using reserve (or spare backup) servers. *A main server* is the current server working properly (i.e., open channels, serve customers, etc.). *Reserve server* (or spares, backups) is a standby server which replaces a main server instantly when it is broken. This system has a repair facility (or called a repairman) to repair the broken server. Independent of any other system, this kind of backup system has been developed with different aspects such as a stochastic reliability system [5], and stochastic disaster recovery system [2].

The paper is organized as follows. Section 2 formalizes the stochastic security system under consideration. Section 3 deals with e-commerce application and shows how to combine the e-commerce and security system. During these two sections, advanced mathematical techniques are applied such as Duality Principle [7], Embedded Markov Process, semiregenerative and supplementary variable techniques to get the solutions of both systems (e-commerce and SSS). Explicit formulas obtained demonstrate a relatively effortless use of functionals. These formulas give main stochastic characteristics of the combination system (such as rewards due to customers in e-service system and expenses due to repair, maintenance, waiting, and reward for higher reliability is security system) and optimization of their objective function. Sections 4 and 5 deal with these topics.

#### 2. Stochastic Security System with Backups

The stochastic security system can be characterized by the Markovian input with parameter ; general-independent service times (i.e., a renewal process) are distributed in accordance with the PDF and mean ().The latter is a classical system investigated by Dshalalow [9] and the related tools such as duality principle, Markov chain process, supplementary variable, and semiregenerative techniques are used for analyzing the proposed security system. Let be the total number of intact main and reserve servers at time . Denote by the total number of main and reserve machines at time with a special condition. There are no idle periods even when all main and backup servers become intact.

The system consists of main server and backup server for security purposes. Denote by then the limiting distribution can be solved as follows: where , . For the process , the corresponding formulas yield For the explicit solution, , can be found as follows: where of (2.4) is the generating function, convergent in the open disc centered at zero.

#### 3. Combined Network Architecture of Two Systems

As the above session mentioned, the e-commerce system is considered as multichannel queueing system but the number of available channels is random. So, a conventional queueing system is proposed rather than system. This system is characterized by general-independent input; th server has parallel channels without buffer within unreliable servers. The channel of each server can be occupied by customers , at time . Since all servers are unreliable, the number of working servers may be less than and the main servers can be supported by reserve (or backup) servers. Since is the number of intact servers included with backups, gives the number of main intact servers at time . Let be total number of channels occupied by customers. It yields where Limiting probabilities (i.e., , ) which are number of occupied channels will be the solution of our system. As we mentioned, service time for each channel is the exponential distribution with parameter .

To find the solution, a single-server queueing system which has available channels is considered. Let be interarrival time sequences of interarrival moments of customers and these sequences are iid (identically independently distributed) and the random variable is distributed in accordance with the PDF The solution of a multichannel queue in a single-server has been developed by Takács [6] and has been applied in the various researches [2, 4, 5]. Limiting probabilities of the multichannel queue (i.e., , , and is the number of channels for each server) are known to satisfy the following formulas (since we assume that the number of channels for servers is iid and all servers are stochastically equivalent, we drop the server index ): where Now, we can find the limiting probabilities of this model. The generating function of a single-server system with multichannels is and the generating function of number of servers is From (3.2) and (3.6)-(3.7), we have To get the solution for a multiserver system with multichannels, we use the generating function as follows: By the conditional expectation, (3.9) yields and the limiting probabilities are which is the limiting distribution of the system.

#### 4. Optimality of the Stochastic Combined System

In this section we deal with a class of optimization problems that arise in stochastic management. Stochastic optimization method is commonly applied for management problem (see, [2–6]). Let a strategy be a set of action we impose on the system (e.g., choice of customer distribution, number of channels in the network server, etc.). For instance, and can the parts of the function of . On the other hand, a system can be subject to a set, say , of cost functions. Denote by the expected costs within , due to the strategy costs and define the expected cumulative cost rate over an infinite horizon: We treat this problem as a special case. Since is the number of channels in the th server and is a total number of servers in the system, is the number of occupied channels in the systems (from (3.1) at time Let be reward rate from customers in channels of the servers, which is the same as number of occupied channels. Then the expected reward for all occupied channels in network severs during is which by Fubini's theorem is Recall that is the number of intact servers included in the reserve servers, gives the number of the intact working servers at time . Let be cost rate for intact main servers. Then the expected cost for all main machines working in the interval is The number of reserve servers is . If is the cost rate for maintaining reserve servers, then expected cost for all reserve machines maintained in the interval is which, after similar calculation, yields The cumulative cost of all procedures involved in the multichannel system of the network server on the interval is Now we turn to convergence theorems for regenerative and semiregenerative processes [9],

(i)(ii)to arrive at the objective function , which gives the total expected rate of all processes over an infinite horizon. In light of equations (i)-(ii) we have Assuming that all functions are linear, we have where and are relevant (cost and reward) constant coefficients.

#### 5. Optimization Examples

In this section we intend to demonstrate the tractability of our results in the previous Sections 2–4 on a practical stochastic integrated model of e-commerce and security system. The exponential distribution is allowed for customer input and broken rate of servers.

To demonstrate a practical optimization method, we specify the remaining of the three primary cost and reward functions as follows: From (5.1) and (4.9), we have where . Finally, we arrive at the following expression for the objective function: Comparing (4.8) with (5.3), we identify , , and . We restrict the initial strategy of this model to a combination of the number of channels and main and backup servers. In other words, we need to find the triad such that There is one more constraint under which we set the total number of main and reserve servers as a constant. This constraint is reasonable for limited internal resources for Internet services: As a reasonable performance measure, let us consider the reliability factor , which represents the probability that the number of intact servers at any moment of time in equilibrium is greater than or equal to the number of main servers . The reliability factor is defined as follows: This is not only a reliability measure of the system, but it can also serve as a constraint to an optimally functioning system.

Figure 2 shows another example of optimization in the system. For graphical illustration, we determine number of backup servers and channels . From (5.3), we calculate andthat gives a maximum for . Recall that the stands for number of main servers which maximizes the total reward of this system when 3 channels are available for each server and 8( backups are available. Below is a plot of for .

The calculation of the objective function yields in maximum reward that equals 141.8249. It means that there are servers, backups, and 3 available channels in each server, within the system to maximize the reward of maintenance servers.

#### 6. Conclusions

The paper provides a method to add a security system to improve availability and reliability issues. The combined architecture considers a combination of two systems. The solution deals with two systems under one integrated system. The objective function of the optimization also contains the properties of two systems.

The paper prepares the full analytic solutions of the integrated model of e-commerce application and security systems which include the embedded Markov process, semi-Markov process, and semiregenerative techniques. These analytic solutions are not only compact but also give all of performance measures of the combination system such as service time and queue length. The optimal number of servers is one example for a demonstration, and the analytic solution can also evaluate a simulation approach of more realistic and complicated system similar with the combined architecture. Applications include not only e-commerce model but also other combinations such as human resources, manufacturing system, and military operations.

#### References

- D. Russell and G. T. Ganemi Sr.,
*Computer Security Basics*, O'Reilly and Asso, Sebastopol, Calif, USA, 1991. - S.-K. Kim and J. H. Dshalalow, “Stochastic disaster recovery systems with external resources,”
*Mathematical and Computer Modelling*, vol. 36, no. 11–13, pp. 1235–1257, 2002. View at: Publisher Site | Google Scholar | Zentralblatt MATH | MathSciNet - S.-K. Kim, “Stochastic management for randomly broken multi-channel servers for e-commerce applications,” in
*IEEE International Conference on Industrial Engineering and Engineering Management (IEEM 2007 '07)*, pp. 214–218, Singapore, December 2007. View at: Publisher Site | Google Scholar - S.-K. Kim, “Enhanced networked server management with random remote backups,” in
*Performance and Control of Next-Generation Communications Networks*, vol. 5244 of*Proceedings of SPIE*, pp. 106–114, Orlando, Fla, USA, September 2003. View at: Publisher Site | Google Scholar - S.-K. Kim and J. H. Dshalalow, “A versatile stochastic maintenance model with reserve and super-reserve machines,”
*Methodology and Computing in Applied Probability*, vol. 5, no. 1, pp. 59–84, 2003. View at: Publisher Site | Google Scholar | Zentralblatt MATH | MathSciNet - L. Takács,
*Introduction to the Theory of Queues*, University Texts in the Mathematical Sciences, Oxford University Press, New York, NY, USA, 1962. View at: MathSciNet - J. Dshalalow, “On single-server closed queues with priorities and state dependent parameters,”
*Queueing Systems*, vol. 8, no. 3, pp. 237–253, 1991. View at: Publisher Site | Google Scholar | Zentralblatt MATH | MathSciNet - R. Kalakota,
*Electric Commerce: A Manager's guide*, Addison-Wesley, Reading, Mass, USA, 1997. - J. Dshalalow, “On the multiserver queue with finite waiting room and controlled input,”
*Advances in Applied Probability*, vol. 17, no. 2, pp. 408–423, 1985. View at: Publisher Site | Google Scholar | Zentralblatt MATH | MathSciNet

#### Copyright

Copyright © 2009 Song-Kyoo Kim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.