Empirical Validation of Cyber-Foraging Architectural Tactics for Surrogate Provisioning

F. Alizadeh Moghaddam, G. Procaccianti, G.A. Lewis, P. Lago

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Background
Cyber-foraging architectural tactics are used to build mobile applications that leverage proximate, intermediate cloud surrogates for computation offload and data staging. Compared to direct access to cloud resources, the use of intermediate surrogates improves system qualities such as response time, energy efficiency, and resilience. However, the state-of-the-art mostly focuses on introducing new architectural tactics rather than quantitatively comparing the existing tactics, which can help software architects and software engineers with new insights on each tactic.

Aim
Our work aims at empirically evaluating the architectural tactics for surrogate provisioning, specifically with respect to resilience and energy efficiency.

Method
We follow a systematic experimentation framework to collect relevant data on Static Surrogate Provisioning and Dynamic Surrogate Provisioning tactics. Our experimentation approach can be reused for validation of other cyber-foraging tactics. We perform statistical analysis to support our hypotheses, as compared to baseline measurements with no cyber-foraging tactics deployed.

Results
Our findings show that Static Surrogate Provisioning tactics provide higher resilience than Dynamic Surrogate Provisioning tactics for runtime environmental changes. Both surrogate provisioning tactics perform with no significant difference with respect to their energy efficiency. We observe that the overhead of the runtime optimization algorithm is similar for both tactic types.

Conclusions
The presented quantitative evidence on the impact of different tactics empowers software architects and software engineers with the ability to make more conscious design decisions. This contribution, as a starting point, emphasizes the use of quantifiable metrics to make better-informed trade-offs between desired quality attributes. Our next step is to focus on the impact of runtime programmable infrastructure on the quality of cyber-foraging systems.
Original languageEnglish
Pages (from-to)37-51
Number of pages15
JournalJournal of Systems and Software
Volume138
Issue number4
DOIs
Publication statusPublished - 1 Apr 2018

Fingerprint

Energy efficiency
Engineers
Statistical methods

Keywords

  • software architecture
  • Software Engineering
  • cyber-foraging
  • energy efficiency
  • resilience
  • software sustainability
  • Green IT
  • self-adaptive software

VU Research Profile

  • Connected World
  • Science for Sustainability

Cite this

@article{6faea2a1a4d548069b3c08d7cc1ea84e,
title = "Empirical Validation of Cyber-Foraging Architectural Tactics for Surrogate Provisioning",
abstract = "BackgroundCyber-foraging architectural tactics are used to build mobile applications that leverage proximate, intermediate cloud surrogates for computation offload and data staging. Compared to direct access to cloud resources, the use of intermediate surrogates improves system qualities such as response time, energy efficiency, and resilience. However, the state-of-the-art mostly focuses on introducing new architectural tactics rather than quantitatively comparing the existing tactics, which can help software architects and software engineers with new insights on each tactic.AimOur work aims at empirically evaluating the architectural tactics for surrogate provisioning, specifically with respect to resilience and energy efficiency.MethodWe follow a systematic experimentation framework to collect relevant data on Static Surrogate Provisioning and Dynamic Surrogate Provisioning tactics. Our experimentation approach can be reused for validation of other cyber-foraging tactics. We perform statistical analysis to support our hypotheses, as compared to baseline measurements with no cyber-foraging tactics deployed.ResultsOur findings show that Static Surrogate Provisioning tactics provide higher resilience than Dynamic Surrogate Provisioning tactics for runtime environmental changes. Both surrogate provisioning tactics perform with no significant difference with respect to their energy efficiency. We observe that the overhead of the runtime optimization algorithm is similar for both tactic types.ConclusionsThe presented quantitative evidence on the impact of different tactics empowers software architects and software engineers with the ability to make more conscious design decisions. This contribution, as a starting point, emphasizes the use of quantifiable metrics to make better-informed trade-offs between desired quality attributes. Our next step is to focus on the impact of runtime programmable infrastructure on the quality of cyber-foraging systems.",
keywords = "software architecture, Software Engineering, cyber-foraging, energy efficiency, resilience, software sustainability, Green IT, self-adaptive software",
author = "{Alizadeh Moghaddam}, F. and G. Procaccianti and G.A. Lewis and P. Lago",
year = "2018",
month = "4",
day = "1",
doi = "10.1016/j.jss.2017.11.047",
language = "English",
volume = "138",
pages = "37--51",
journal = "Journal of Systems and Software",
issn = "0164-1212",
publisher = "Elsevier",
number = "4",

}

Empirical Validation of Cyber-Foraging Architectural Tactics for Surrogate Provisioning. / Alizadeh Moghaddam, F.; Procaccianti, G.; Lewis, G.A.; Lago, P.

In: Journal of Systems and Software, Vol. 138, No. 4, 01.04.2018, p. 37-51.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - Empirical Validation of Cyber-Foraging Architectural Tactics for Surrogate Provisioning

AU - Alizadeh Moghaddam, F.

AU - Procaccianti, G.

AU - Lewis, G.A.

AU - Lago, P.

PY - 2018/4/1

Y1 - 2018/4/1

N2 - BackgroundCyber-foraging architectural tactics are used to build mobile applications that leverage proximate, intermediate cloud surrogates for computation offload and data staging. Compared to direct access to cloud resources, the use of intermediate surrogates improves system qualities such as response time, energy efficiency, and resilience. However, the state-of-the-art mostly focuses on introducing new architectural tactics rather than quantitatively comparing the existing tactics, which can help software architects and software engineers with new insights on each tactic.AimOur work aims at empirically evaluating the architectural tactics for surrogate provisioning, specifically with respect to resilience and energy efficiency.MethodWe follow a systematic experimentation framework to collect relevant data on Static Surrogate Provisioning and Dynamic Surrogate Provisioning tactics. Our experimentation approach can be reused for validation of other cyber-foraging tactics. We perform statistical analysis to support our hypotheses, as compared to baseline measurements with no cyber-foraging tactics deployed.ResultsOur findings show that Static Surrogate Provisioning tactics provide higher resilience than Dynamic Surrogate Provisioning tactics for runtime environmental changes. Both surrogate provisioning tactics perform with no significant difference with respect to their energy efficiency. We observe that the overhead of the runtime optimization algorithm is similar for both tactic types.ConclusionsThe presented quantitative evidence on the impact of different tactics empowers software architects and software engineers with the ability to make more conscious design decisions. This contribution, as a starting point, emphasizes the use of quantifiable metrics to make better-informed trade-offs between desired quality attributes. Our next step is to focus on the impact of runtime programmable infrastructure on the quality of cyber-foraging systems.

AB - BackgroundCyber-foraging architectural tactics are used to build mobile applications that leverage proximate, intermediate cloud surrogates for computation offload and data staging. Compared to direct access to cloud resources, the use of intermediate surrogates improves system qualities such as response time, energy efficiency, and resilience. However, the state-of-the-art mostly focuses on introducing new architectural tactics rather than quantitatively comparing the existing tactics, which can help software architects and software engineers with new insights on each tactic.AimOur work aims at empirically evaluating the architectural tactics for surrogate provisioning, specifically with respect to resilience and energy efficiency.MethodWe follow a systematic experimentation framework to collect relevant data on Static Surrogate Provisioning and Dynamic Surrogate Provisioning tactics. Our experimentation approach can be reused for validation of other cyber-foraging tactics. We perform statistical analysis to support our hypotheses, as compared to baseline measurements with no cyber-foraging tactics deployed.ResultsOur findings show that Static Surrogate Provisioning tactics provide higher resilience than Dynamic Surrogate Provisioning tactics for runtime environmental changes. Both surrogate provisioning tactics perform with no significant difference with respect to their energy efficiency. We observe that the overhead of the runtime optimization algorithm is similar for both tactic types.ConclusionsThe presented quantitative evidence on the impact of different tactics empowers software architects and software engineers with the ability to make more conscious design decisions. This contribution, as a starting point, emphasizes the use of quantifiable metrics to make better-informed trade-offs between desired quality attributes. Our next step is to focus on the impact of runtime programmable infrastructure on the quality of cyber-foraging systems.

KW - software architecture

KW - Software Engineering

KW - cyber-foraging

KW - energy efficiency

KW - resilience

KW - software sustainability

KW - Green IT

KW - self-adaptive software

UR - http://www.scopus.com/inward/record.url?scp=85039452421&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85039452421&partnerID=8YFLogxK

U2 - 10.1016/j.jss.2017.11.047

DO - 10.1016/j.jss.2017.11.047

M3 - Article

VL - 138

SP - 37

EP - 51

JO - Journal of Systems and Software

JF - Journal of Systems and Software

SN - 0164-1212

IS - 4

ER -