171 research outputs found
Self-adaptive trade-off decision making for autoscaling cloud-based services
Elasticity in the cloud is often achieved by on-demand autoscaling. In such context, the goal is to optimize the Quality of
Service (QoS) and cost objectives for the cloud-based services. However, the difficulty lies in the facts that these objectives, e.g.,
throughput and cost, can be naturally conflicted; and the QoS of cloud-based services often interfere due to the shared infrastructure in
cloud. Consequently, dynamic and effective trade-off decision making of autoscaling in the cloud is necessary, yet challenging. In
particular, it is even harder to achieve well-compromised trade-offs, where the decision largely improves the majority of the objectives;
while causing relatively small degradations to others. In this paper, we present a self-adaptive decision making approach for
autoscaling in the cloud. It is capable to adaptively produce autoscaling decisions that lead to well-compromised trade-offs without
heavy human intervention. We leverage on ant colony inspired multi-objective optimization for searching and optimizing the trade-offs
decisions, the result is then filtered by compromise-dominance, a mechanism that extracts the decisions with balanced improvements
in the trade-offs. We experimentally compare our approach to four state-of-the-arts autoscaling approaches: rule, heuristic, randomized
and multi-objective genetic algorithm based solutions. The results reveal the effectiveness of our approach over the others, including
better quality of trade-offs and significantly smaller violation of the requirements
Minimizing nasty surprises with better informed decision-making in self-adaptive systems
Designers of self-adaptive systems often formulate adaptive design decisions, making unrealistic or myopic assumptions about the system's requirements and environment. The decisions taken during this formulation are crucial for satisfying requirements. In environments which are characterized by uncertainty and dynamism, deviation from these assumptions is the norm and may trigger 'surprises'. Our method allows designers to make explicit links between the possible emergence of surprises, risks and design trade-offs. The method can be used to explore the design decisions for self-adaptive systems and choose among decisions that better fulfil (or rather partially fulfil) non-functional requirements and address their trade-offs. The analysis can also provide designers with valuable input for refining the adaptation decisions to balance, for example, resilience (i.e. Satisfiability of non-functional requirements and their trade-offs) and stability (i.e. Minimizing the frequency of adaptation). The objective is to provide designers of self adaptive systems with a basis for multi-dimensional what-if analysis to revise and improve the understanding of the environment and its effect on non-functional requirements and thereafter decision-making. We have applied the method to a wireless sensor network for flood prediction. The application shows that the method gives rise to questions that were not explicitly asked before at design-time and assists designers in the process of risk-aware, what-if and trade-off analysis
Assessing Smart Contracts Security Technical Debts
Smart contracts are self-enforcing agreements that are employed to exchange
assets without the approval of trusted third parties. This feature has
encouraged various sectors to make use of smart contracts when transacting.
Experience shows that many deployed contracts are vulnerable to exploitation
due to their poor design, which allows attackers to steal valuable assets from
the involved parties. Therefore, an assessment approach that allows developers
to recognise the consequences of deploying vulnerable contracts is needed. In
this paper, we propose a debt-aware approach for assessing security design
vulnerabilities in smart contracts. Our assessment approach involves two main
steps: (i) identification of design vulnerabilities using security analysis
techniques and (ii) an estimation of the ramifications of the identified
vulnerabilities leveraging the technical debt metaphor, its principal and
interest. We use examples of vulnerable contracts to demonstrate the
applicability of our approach. The results show that our assessment approach
increases the visibility of security design issues. It also allows developers
to concentrate on resolving smart contract vulnerabilities through technical
debt impact analysis and prioritisation. Developers can use our approach to
inform the design of more secure contracts and for reducing unintentional debts
caused by a lack of awareness of security issues
- …