Dependable and Adaptive Distributed Systems7th DADS Track of the27th ACM Symposium on Applied Computing Previous years: | 6th DADS 2011 5th DADS 2010 4th DADS 2009 3rd DADS 2008 2nd DADS 2007 1st DADS 2006 |
http://www.acm.org/conferences/sac/sac2012/ March 25 - 29, 2012 Riva del Garda (Trento), Italy |
The Symposium on Applied Computing has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the world. SAC 2012 is sponsored by the ACM Special Interest Group on Applied Computing and is hosted by The Microsoft Research - University of Trento Center for Computational and Systems Biology.
The track provides a forum for scientists and engineers in academia and industry to present and discuss their latest research findings on selected topics in dependable and adaptive distributed systems. The track is structured in two sessions:
DRAP: A Robust Authentication Protocol to Ensure Survivability of Computational RFID Networks
Farzana Rahman and Sheikh Iqbal Ahamed
The Wireless Identification and Sensing Platform (WISP) from Intel Research Seattle is an instance of Computational RFID (CRFID). CRFID Tag authentication is an evident technique employed by the readers of the WISP networks to prevent various attacks. However, as WISP tags have sensor data along with its ID, the authentication technique of these tags should be different than the ones found in typical RFID networks. Moreover, there can be situation where an adversary may create more collisions at the link layer to initiate the de-synchronization attack. This in turn will result in DoS attack and will increase the system response time. In this paper, we propose a De-synchronization attack resistant Robust Authentication Protocol (DRAP) for WISP networks. Our proposal offers a lightweight solution to defend against the major security attacks including de-synchronization and DoS attacks. This protocol can get back the desynchronized tags and readers to their normal state, and thus provides robustness and ensures survivability. In order to defend these attacks even at the link layer, we also propose EDFSA based communication technique. Finally, to evaluate our protocol, we performed simulation of a WISP network using our proposed experimental model.
Non-Intrusive Policy Optimization for Dependable and Adaptive Service-Oriented Systems
Christian Inzinger, Benjamin Satzger, Waldemar Hummer, Philipp Leitner and Schahram Dustdar
The Service-Oriented Architecture paradigm facilitates the creation of distributed, composite applications. Services are usually simple to integrate, but often encapsulate complex and dynamic business logic with multiple variations and configurations. The fact that these services typically execute in a dynamic, unpredictable environment additionally complicates manageability and calls for adaptable management strategies. Current system control strategies mostly rely on static approaches, such as predefined policies. In this paper we propose a novel technique to improve management policies for complex service-based systems during runtime. This allows systems to adapt to changing environments, to circumvent unforeseen events and errors, and to resolve incompatibilities of composed services. Our approach requires no knowledge about the internals of services or service platforms, but analyzes log output to realize adaptive policies in a non-intrusive and generic way. Experiments in our testbed show that the approach is highly effective in avoiding incompatibilities and reducing the impact of defects in service implementations.
FTRMI: Fault-tolerant Transparent RMI
Diogo Reis and Hugo Miranda
A limitation of Remote Procedure Call systems (RPCs) is their single point of failure at the server side. To address this issue, a number of approaches extend RPCs syntax and semantic to encompass fault tolerance. However, this solution is neither transparent for the application programmer nor for the client. This paper describes a middleware platform that enhances JRMI with strong replica consistency. The middleware is completely transparent for the client and does not require recoding on the server side
Timeout-based Adaptive Consensus: Improving Performance through Adaptation
Mônica Dixit, Henrique Moniz and António Casimiro
Algorithms for solving distributed systems problems often use timeouts as a means to achieve progress, even if these timeouts are encapsulated in failure detection services. They are designed in a way that safety is always preserved despite timeouts being too small or too large. A conservatively large static timeout value is usually selected, such that the overall system performance is acceptable in the normal case. This approach is good enough for applications that execute in stable environments, but it may compromise the system's performance in more dynamic settings, such as in wireless networks. In those cases, it is expected that adaptive solutions that automatically adjust timeouts according to the observed network conditions will perform better. This paper clearly illustrates the kind of improvements that may be achieved and thus justifies the importance of using adaptive protocols in dynamic environments. We describe our pragmatic approach to transform a static timeout-based consensus protocol for ad hoc wireless networks into an adaptive solution, using the services provided by the Adaptare framework. In particular, we explain how we are able to tune our adaptive solution for achieving the best performance, making it fully autonomic. Several experiments were performed in a wireless environment, which show that the adaptive solution is able to deal with varying end-to-end delays caused by uncertain network conditions, namely due to the changing number of nodes. In particular, with the adaptive solution the bandwidth utilization from each process is kept almost constant despite increasing the number of consensus participants, and the overall consensus execution time increases linearly instead of exponentially.
Formal Verification of Unreliable Failure Detectors in Partially Synchronous Systems
Muhammad Atif, Mohamamd Reza Mousavi and Ammar Osaiweran
In this paper, we formally verify four algorithms proposed in [M. Larrea, S. Arevalo and A. Fernandez, Efficient Algorithms to Implement Unreliable Failure Detectors in Partially Synchronous Systems, 1999]. Each algorithm is specified formally as a network of timed automata and is verified with respect to completeness and accuracy properties. Using the model-checking tool UPPAAL, we detect and report the occurrences of deadlock (for all algorithms) between each pair of non-faulty nodes due to buffer overflow in communication channels with arbitrarily large buffers. We propose one solution for deadlock avoidance. Moreover, we use one of the algorithms studied in this paper as a measure to compare the effectiveness of three model-checking tools, namely, UPPAAL, mCRL2 and FDR2. We also show that all algorithms satisfy their completeness and accuracy properties if the required number of processes remain operational.
Using Constraint-based Optimization and Variability to Support Continuous Self-Adaptation
Carlos Parra, Daniel Romero, Sebastien Mosser, Romain Rouvoy, Laurence Duchien and Lionel Seinturier
Self-adaptation is one of the upcoming paradigms that accurately tackles nowadays systems complexity. In this context, Dynamic Software Product Lines model the intrinsic variability of a family of systems, and dynamically support their reconfiguration according to updated context. However, when several configurations are available for the same context, making a decision about the right one is a hard challenge: further dimensions such as quality of service or reconfiguration cost are needed to enrich the decision making process. In this paper, we propose to combine variability with Constraint-Satisfaction Problem techniques to face this challenge. The approach is illustrated and then validated with the MobiHome example, an ubiquitous and context-driven system used to support the control of a home through mobile devices.
TBD.
Karl M. Göschka (Chair)
Vienna University of Technology
Institute of Information Systems
Distributed Systems Group
Argentinierstrasse 8/184-1
A-1040 Vienna, Austria
phone: +43 664 180 6946
fax: +43 664 188 6275
dads@dedisys.org
Karl dot Goeschka (at) tuwien dot ac dot at
Svein O. Hallsteinsen
SINTEF ICT
Software Engineering Department
Andersens vei 15 b
NO-7465 Trondheim, Norway
phone: +47 7359 3010
fax: +47 7359 3350
Svein dot Hallsteinsen (at) sintef dot no
Rui Oliveira
Universidade do Minho
Computer Science Department
Campus de Gualtar
4710-057 Braga, Portugal
phone: +351 253 604 452 / Internal: 4452
fax: +351 253 604 471
rco (at) di dot uminho dot pt
Alexander Romanovsky
University of Newcastle upon Tyne
School of Computing Science
Office: Room 1008 , Claremont Tower
Newcastle upon Tyne, NE1 7RU, United Kingdom
phone: +44-191-222- 8135
fax: +44-191-222- 8788
Alexander dot Romanovsky (at) newcastle dot ac dot uk
September 7, 2011 (extended) | Paper submission |
October 12, 2011 | Author notification |
November 2, 2011 | Camera-ready papers |
For general information about SAC, please visit: http://www.acm.org/conferences/sac/sac2012/
If you have further questions, please do not hesitate to contact us: dads@dedisys.org