Advertisement

Science China Information Sciences

, Volume 58, Issue 5, pp 1–16 | Cite as

Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems

  • FuTian Wang
  • Xiao LiuEmail author
  • Yun Yang
Review Special Focus on High-Confidence Software Technologies

Abstract

On-time completion is an important temporal QoS (Quality of Service) dimension and one of the fundamental requirements for high-confidence workflow systems. In recent years, a workflow temporal verification framework, which generally consists of temporal constraint setting, temporal checkpoint selection, temporal verification, and temporal violation handling, has been the major approach for the high temporal QoS assurance of workflow systems. Among them, effective temporal checkpoint selection, which aims to timely detect intermediate temporal violations along workflow execution plays a critical role. Therefore, temporal checkpoint selection has been a major topic and has attracted significant efforts. In this paper, we will present an overview of work-flow temporal checkpoint selection for temporal verification. Specifically, we will first introduce the throughput based and response-time based temporal consistency models for business and scientific cloud workflow systems, respectively. Then the corresponding benchmarking checkpoint selection strategies that satisfy the property of “necessity and sufficiency” are presented. We also provide experimental results to demonstrate the effectiveness of our checkpoint selection strategies, and finally points out some possible future issues in this research area.

Keywords

workflow system workflow temporal verification temporal checkpoint selection business workflow scientific workflow quality of service 

高可信云工作流系统中的充分必要时序验证检测点选择策略

摘要

创新点

按照应用类型的不同, 工作流可以大致分为商务工作流和科学工作流两大类。 本文研究云环境下两类工作流的时序验证检测点选择问题。 针对于商务工作流, 我们提出一种基于吞吐量的时序一致模型和基于吞吐量的时序检测点选择策略。 同时作为对比, 本文回顾了我们在科学工作流中基于响应时间的时序一致模型和基于响应时间的时序检测点选择策略, 并证明了两种策略选择的检测点都满足充分性和必要性, 可以作为工作流时序检测点选择策略研究和测试的基准。

关键词

工作流系统 工作流时序验证 时序检测点选择 商务工作流 科学工作流 服务质量 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hwang K, Dongarra J, Fox G C. Distributed and Cloud Computing: from Parallel Processing to the Internet of Things. San Franciscon: Morgan Kaufmann Press, 2012Google Scholar
  2. 2.
    Liu X, Yuan D, Zhang G, et al. The Design of Cloud Workflow Systems. Berlin: Springer Press, 2012CrossRefGoogle Scholar
  3. 3.
    Zheng W. An introduction to Tsinghua Cloud. Sci China Inf Sci, 2010, 53: 1481–1486CrossRefGoogle Scholar
  4. 4.
    Deelman E, Gannon D, Shields M, et al. Workflows and e-science: an overview of workflow system features and capabilities. Future Gener Comput Syst, 2009, 25: 528–540CrossRefGoogle Scholar
  5. 5.
    Wang L, Jie W, Chen J. Grid Computing: Infrastructure, Service, and Applications. Boca Raton: CRC Press, Talyor & Francis Group, 2009CrossRefGoogle Scholar
  6. 6.
    Buyya R, Yeo C S, Venugopal S, et al. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst, 2009, 25: 599–616CrossRefGoogle Scholar
  7. 7.
    Liu X, Chen J, Yang Y. Temporal QoS Management in Scientific Cloud Workflow Systems. Amsterdam: Elsevier, 2012Google Scholar
  8. 8.
    Eder J, Panagos E, Rabinovich M. Time constraints in workflow systems. In: Proceedings of 11th International Conference on Advanced Information Systems Engineering (CAiSE99), Heidelberg, 1999. 286–300Google Scholar
  9. 9.
    Liu X, Ni Z, Yuan D, et al. A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems. J Syst Softw, 2011, 84: 354–376CrossRefGoogle Scholar
  10. 10.
    Liu X, Chen J, Yang Y. A probabilistic strategy for setting temporal constraints in scientific workflows. In: Proceedings of 6th International Conference on Business Process Management (BPM2008), Milan, 2008. 180–195Google Scholar
  11. 11.
    Chen J, Yang Y. Adaptive selection of necessary and sufficient checkpoints for dynamic verification of temporal constraints in grid workflow systems. ACM Trans Autonom Adap Syst, 2007, 2: 6CrossRefGoogle Scholar
  12. 12.
    Chen J, Yang Y. Multiple states based temporal consistency for dynamic verification of fixed-time constraints in Grid workflow systems. Concurr Comput-Pract Exp, 2007, 19: 965–982CrossRefGoogle Scholar
  13. 13.
    Zhang C, Sterck H D. A computational workflow system for clouds based on Hadoop. In: Proceedings of International Conference on Cloud Computing (CloudCom 2009), Beijing, 2009. 393–404Google Scholar
  14. 14.
    Hoffa C, Mehta G, Freeman T, et al. On the use of cloud computing for scientific workflows. In: Proceedings of 4th IEEE International Conference on e-Science, Indianapolis, 2008. 640–645Google Scholar
  15. 15.
    Liu X, Yuan D, Zhang G, et al. SwinDeW-C: a peer-to-peer based cloud workflow system. In: Furht B, Escalante A, eds. Handbook of Cloud Computing. Berlin: Springer, 2010Google Scholar
  16. 16.
    Cao D, Liu X, Yang Y. Novel client-cloud architecture for scalable instance-intensive workflow systems. In: Proceedings of 14th International Conference on Web Information System Engineering (WISE 2013), Nanjing, 2013. 270–284Google Scholar
  17. 17.
    Yu J, Buyya R. A taxonomy of workflow management systems for Grid computing. J Grid Comput, 2005, 3: 171–200CrossRefGoogle Scholar
  18. 18.
    Liu X, Yang Y, Yuan D, et al. A generic QoS framework for cloud workflow systems. In: Proceedings of International Conference on Cloud and Green Computing (CGC2011), Sydney, 2011. 713–720Google Scholar
  19. 19.
    Liu X. A novel probabilistic temporal framework and its strategies for cost effective delivery of high QoS in scientific cloud workflow systems. Dissertation for the Doctotal Degree. Melbourne: Swinburne University of Technology, 2011Google Scholar
  20. 20.
    Liu X, Ni Z, Chen J, et al. A probabilistic strategy for temporal constraint management in scientific workflow systems. Concurr Comput-Pract Exp, 2011, 23: 1893–1919CrossRefGoogle Scholar
  21. 21.
    Chen J, Yang Y. Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems. In: Proceedings of 30th International Conference on Software Engineering (ICSE 2008), Leipzig, 2008. 141–150Google Scholar
  22. 22.
    Chen J. Towards effective and efficient temporal verification in grid workflow systems. Dissertation for the Doctotal Degree. Melbourne: Swinburne University of Technology, 2007Google Scholar
  23. 23.
    Liu X, Chen J, Wu Z, et al. Handling recoverable temporal violations in scientific workflow systems: a workflow rescheduling based strategy. In: Proceedings of 10th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid10), Melbourne, 2010. 534–537CrossRefGoogle Scholar
  24. 24.
    Liu X, Ni Z, Wu Z, et al. An effective framework of light-weight handling for three-level fine-grained recoverable temporal violations in scientific workflows. In: Proceedings of 16th IEEE International Conference on Parallel and Distributed Systems (ICPADS2010), Shanghai, 2010. 43–50CrossRefGoogle Scholar
  25. 25.
    Marjanovic O, Orlowska M E. On modelling and verification of temporal constraints in production workflows. Knowl Inf Syst, 1999, 1: 157–192CrossRefGoogle Scholar
  26. 26.
    Chen J, Yang Y, Chen T Y. Dynamic verification of temporal constraints on-the-fly for workflow systems. In: Proceedings of 11th Asia-Pacific Software Engineering Conference, Busan, 2004. 30–37CrossRefGoogle Scholar
  27. 27.
    Chen J, Yang Y. Activity completion duration based checkpoint selection for dynamic verification of temporal constraints in Grid workflow systems. Int J High Perform Comput App, 2008, 22: 319–329CrossRefGoogle Scholar
  28. 28.
    Chen J, Yang Y. Temporal dependency based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems. ACM Trans Softw Eng Methodol, 2011, 20: 9Google Scholar
  29. 29.
    Liu X, Yang Y, Cao D, et al. Selecting checkpoints along the time line: a novel temporal checkpoint selection strategy for monitoring a batch of parallel business processes. In: Proceedings of 35th International Conference on Software Engineering (NIER Track), San Francisco, 2013. 1281–1284Google Scholar
  30. 30.
    Liu X, Wang D, Yuan D, et al. Throughput based temporal verification for monitoring large batch of parallel processes. In: Proceedings of International Conference on Software and Systems Process (ICSSP14), Nanjing, 2014. 124–133Google Scholar
  31. 31.
    Liu X, Yang Y, Jiang Y, et al. Preventing temporal violations in scientific workflows: where and how. IEEE Trans Softw Eng, 2011, 37: 805–825CrossRefGoogle Scholar
  32. 32.
    Barga R, Gannon D. In Workflows for e-Science. Berlin: Springer, 2007. 9–16CrossRefGoogle Scholar
  33. 33.
    van der Aalst W M P, Hee K M V. Workflow Management: Models, Methods, and Systems. Cambridge: MIT Press, 2002Google Scholar
  34. 34.
    Law A M, Kelton W D. Simulation Modelling and Analysis. 4th ed. New York: McGraw-Hill Press, 2007Google Scholar
  35. 35.
    Mi H B, Wang H M, Zhou Y F, et al. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Sci China Inf Sci, 2012, 55: 2757–2773CrossRefGoogle Scholar
  36. 36.
    Liu K, Chen J, Yang Y, et al. A throughput maximization strategy for scheduling transaction intensive workflows on SwinDeW-G. Concurr Comput-Pract Exp, 2008, 20: 1807–1820CrossRefGoogle Scholar
  37. 37.
    Stroud K A. Engineering Mathematics. 6th ed. New York: Palgrave Macmillan Press, 2007Google Scholar
  38. 38.
    Liu X, Ni Z, Wu Z, et al. A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems. J Syst Softw, 2011, 84: 492–509CrossRefGoogle Scholar
  39. 39.
    Liu X, Yang Y, Yuan D, et al. Do we need to handle every temporal violation in scientific workflow systems? ACM Trans Softw Eng Methodol, 2013, 23: 5Google Scholar

Copyright information

© Science China Press and Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyAnhui UniversityHefeiChina
  2. 2.Shanghai Key Laboratory of Trustworthy ComputingEast China Normal UniversityShanghaiChina
  3. 3.School of Software and Electrical EngineeringSwinburne University of TechnologyHawthornAustralia

Personalised recommendations