Journal on Communications ›› 2016, Vol. 37 ›› Issue (3): 7-19.doi: 10.11959/j.issn.1000-436x.2016048

• Academic paper • Previous Articles     Next Articles

Distributed software monitoring and trustworthiness evaluation based on checkpoints

Zhen LI1,Jun-feng TIAN1,Zhuo CHANG1,Xiao-xue MA2   

  1. 1 School of Computer Science and Technology,Hebei University,Baoding 071000,China
    2 Computer Department,Hebei University,Baoding 071000,China
  • Online:2016-03-25 Published:2017-08-04
  • Supported by:
    The National Natural Science Foundation of China;The Natural Science Foundation of Hebei Province;The Natural Science Foundation of Hebei Province;The Youth Foundation of Hebei Educational Committee;The Science Foundation of Hebei University

Abstract:

Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions.According to this problem,an accompanying distributed software monitoring mechanism was used,and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene.The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules,and then the trustworthiness of distributed soft-ware was evaluated based on nodes.The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost,and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software.

Key words: distributed software, trustworthiness, checkpoint, interaction, behavior monitoring

No Suggested Reading articles found!