{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:05:35Z","timestamp":1740103535245,"version":"3.37.3"},"reference-count":45,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Network Mgmt"],"published-print":{"date-parts":[[2018,11]]},"abstract":"Summary<\/jats:title>Because of the dependence on Internet\u2010based services, many efforts have been conceived to mitigate the impact of disasters on service provision. In this context, cloud computing has become an interesting alternative for implementing disaster tolerant services due to its resource on\u2010demand and pay\u2010as\u2010you\u2010go models. This paper proposes a sensitivity analysis approach to assess the parameters that most impact the availability of cloud data centers, taking into account disaster occurrence, hardware and software failures, and disaster recovery mechanisms for cloud systems. The analysis adopts continuous\u2010time Markov chains, and the results indicate that disaster issues should not be neglected. Hardware failure rate and time for migration of virtual machines (VMs) are the critical factors pointed out for the system modeled in our analysis. Moreover, the location where data centers are placed has a significant impact on system availability, due to time for migrating VMs from a backup server.<\/jats:p>","DOI":"10.1002\/nem.2040","type":"journal-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T08:22:50Z","timestamp":1531988570000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sensitivity analysis of an availability model for disaster tolerant cloud computing system"],"prefix":"10.1002","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0551-8445","authenticated-orcid":false,"given":"Bruno","family":"Silva","sequence":"first","affiliation":[{"name":"Center for Informatics Federal University of Pernambuco Recife Pernambuco Brazil"}]},{"given":"Rubens","family":"Matos","sequence":"additional","affiliation":[{"name":"Center for Informatics Federal University of Pernambuco Recife Pernambuco Brazil"}]},{"given":"Eduardo","family":"Tavares","sequence":"additional","affiliation":[{"name":"Center for Informatics Federal University of Pernambuco Recife Pernambuco Brazil"}]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[{"name":"Center for Informatics Federal University of Pernambuco Recife Pernambuco Brazil"}]},{"given":"Armin","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"System and Software Engineering Technical University of Ilmenau Ilmenau Thuringer Germany"}]}],"member":"311","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"issue":"2","key":"e_1_2_7_2_1","first-page":"705","article-title":"Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation","volume":"52","author":"Sterbenz J","year":"2013","journal-title":"Telecommun Syst"},{"key":"e_1_2_7_3_1","unstructured":"MillerR.Car crash triggers amazon power outage:Data Center Knowledge.2010.http:\/\/www.datacenterknowledge.com\/archives\/2010\/05\/13\/car-crash-triggers-amazon-power-outage\/. Accessed July 6 2018."},{"key":"e_1_2_7_4_1","unstructured":"WoodT CecchetE RamakrishnanKK ShenoyP MerweJ VenkataramaniA.Disaster recovery as a cloud service: economic benefits & deployment challenges. In: Proceedings of the 2nd usenix conference on hot topics in cloud computing HotCloud'10.Berkeley CA USA:USENIX Association;2010:8\u20108."},{"key":"e_1_2_7_5_1","unstructured":"Hyper\u2010v live migration over distance."},{"volume-title":"Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions","year":"2011","author":"Maciel P","key":"e_1_2_7_6_1"},{"key":"e_1_2_7_7_1","first-page":"338","volume-title":"Introduction to System Sensitivity Theory","author":"Frank PM","year":"1978"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00547132"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2012.2220711"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2014.04.003"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2310737"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","unstructured":"GhoshR TrivediKS NaikVK KimDS.End\u2010to\u2010end performability analysis for infrastructure\u2010as\u2010a\u2010service cloud: an interacting stochastic models approach. In: Proceedings of the 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing PRDC'10.Washington DC USA:IEEE Computer Society;2010:125\u2010132.","DOI":"10.1109\/PRDC.2010.30"},{"key":"e_1_2_7_13_1","unstructured":"J Araujo R Matos P Maciel R Matias I Beicker 2011 4:1 4:7"},{"key":"e_1_2_7_14_1","unstructured":"Open source private and hybrid clouds from Eucalyptus;2017."},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.67"},{"key":"e_1_2_7_16_1","series-title":"VEE '07","first-page":"169","author":"Bradford R","year":"2007"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"VoorsluysW BrobergJ VenugopalS BuyyaR.Cost of virtual machine live migration in clouds: a performance evaluation. In: Proceedings of the 1st International Conference on Cloud Computing CloudCom '09.Berlin Heidelberg:Springer\u2010Verlag;2009:254\u2010265.","DOI":"10.1007\/978-3-642-10665-1_23"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"DantasJ MatosR AraujoJ MacielP.An availability model for Eucalyptus platform: an analysis of warm\u2010standy replication mechanism. In: 2012 IEEE International conference on Systems Man and Cybernetics (SMC);2012;Seoul South Korea.1664\u20101669.","DOI":"10.1109\/ICSMC.2012.6377976"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","unstructured":"MatosR AndradeEC MacielPRM.Evaluation of a disaster recovery solution through fault injection experiments. In: 2014 IEEE International Conference on Systems Man and Cybernetics;2014;San Diego CA USA.2675\u20102680.","DOI":"10.1109\/SMC.2014.6974331"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"KaushikRT BhandarkarM NahrstedtK.Evaluation and analysis of greenhdfs: a self\u2010adaptive energy\u2010conserving variant of the hadoop distributed file system. In: 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (cloudcom).Washington DC USA:IEEE;2010:274\u2010287.","DOI":"10.1109\/CloudCom.2010.109"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"KimDs MachidaF TrivediKS.Availability modeling and analysis of a virtualized system. In: Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing PRDC '09.Washington DC USA:IEEE Computer Society;2009:365\u2010371.","DOI":"10.1109\/PRDC.2009.64"},{"key":"e_1_2_7_22_1","first-page":"151","article-title":"Sensitivity analysis of a hierarchical model of mobile cloud computing","author":"Matos R","year":"2014","journal-title":"Simul Modell Pract Theory"},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"SunD ChangG GuoQ WangC WangX.A dependability model to enhance security of cloud environment using system\u2010level virtualization techniques. In: 2010 1st International Conference on Pervasive Computing Signal Processing and Applications (PCSPA).Harbin China:IEEE;2010:305\u2010310.","DOI":"10.1109\/PCSPA.2010.81"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"SatoN. TrivediKS.Stochastic modeling of composite web services for closed\u2010form analysis of their performance and reliability bottlenecks. In: ICSOC 2007: Service\u2010Oriented Computing\u2010ICSOC 2007;2007;Berlin Heidelberg.107\u2010118.","DOI":"10.1007\/978-3-540-74974-5_9"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/55595.55616"},{"key":"e_1_2_7_26_1","unstructured":"BirnbaumZW.On the Importance of Different Components in a Multicomponent System. Washington Univ Seattle Lab of Statistical Research;1969."},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/02656710710757826"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2003.809657"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00063-3"},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","unstructured":"MuppalaJK TrivediKS.GSPN models: sensitivity analysis and applications. In: ACM\u2010SE 28: Proceedings of the 28th Annual Southeast Regional Conference.New York NY USA:ACM;1990:25\u20103.","DOI":"10.1145\/98949.98962"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2006.06.004"},{"key":"e_1_2_7_32_1","unstructured":"2009 O'Reilly Media Inc. G Reese Cloud Application Architectures: Building Applications and Infrastructure in the Cloud."},{"key":"e_1_2_7_33_1","doi-asserted-by":"crossref","unstructured":"SwansonM BowenP PhillipsAW GallupD LynesD.Contingency planning guide for federal information systems.2010.\u00a0http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=905266","DOI":"10.6028\/NIST.SP.800-34r1"},{"key":"e_1_2_7_34_1","unstructured":"ClarkC FraserK HandS et al.Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation NSDI'05 \u2010 vol. 2.Berkeley CA USA:USENIX Association;2005:273\u2010286."},{"key":"e_1_2_7_35_1","doi-asserted-by":"crossref","unstructured":"SilvaB MacielPRM ZimmermannA.Geoclouds modcs: A performability evaluation tool for disaster tolerant IaaS clouds. In: 2014 8th Annual IEEE Systems Conference (SysCon).IEEE;2013:116\u2010122.","DOI":"10.1109\/SysCon.2014.6819245"},{"key":"e_1_2_7_36_1","unstructured":"MatthewsLCW LoggC.Tutorial on internet monitoring and pinger at SLAC;1996."},{"issue":"1","key":"e_1_2_7_37_1","first-page":"1","article-title":"Astro: an integrated environment for dependability and sustainability evaluation","volume":"3","author":"Silva B","year":"2012","journal-title":"Sustainable Comput: Inf Syst"},{"key":"e_1_2_7_38_1","doi-asserted-by":"crossref","unstructured":"SilvaB MacielPRM ZimmermannA.Dependability models for designing disaster tolerant cloud computing systems. 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN).IEEE;2013:1\u20106.","DOI":"10.1109\/DSN.2013.6575323"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627554"},{"key":"e_1_2_7_40_1","doi-asserted-by":"crossref","unstructured":"KsentiniA TalebT ChenM.A markov decision process\u2010based service migration procedure for follow me cloud. In: 2014 IEEE International Conference on Communications (ICC);2014;Shanghai China.1350\u20101354.","DOI":"10.1109\/ICC.2014.6883509"},{"key":"e_1_2_7_41_1","unstructured":"Cisco systems: switch dependability parameters;2012."},{"key":"e_1_2_7_42_1","unstructured":"Cisco systems: router dependability parameters;2012."},{"key":"e_1_2_7_43_1","unstructured":"Service level agreement \u2010 megapath business access and value added services;2012."},{"key":"e_1_2_7_44_1","doi-asserted-by":"crossref","unstructured":"MeloR BezerraMC DantasJ MatosR MeloI MacielP.Video on demand hosted in private cloud: availability modeling and sensitivity analysis. In: 2015 IEEE International Conference on Dependable Systems and Networks Workshops (DSNW);2015; Rio de Janeiro Brasil.12\u201018.","DOI":"10.1109\/DSN-W.2015.11"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-009-9228-1"},{"key":"e_1_2_7_46_1","doi-asserted-by":"crossref","unstructured":"MachidaF XiangJ TadanoK MaenoY.Combined server rejuvenation in a virtualized data center. In: 2012 9th International Conference on Ubiquitous Intelligence Computing and 9th International Conference on Autonomic Trusted Computing (UIC\/ATC);2012:486\u2010493.","DOI":"10.1109\/UIC-ATC.2012.52"}],"container-title":["International Journal of Network Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnem.2040","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/nem.2040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T15:31:01Z","timestamp":1693668661000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/nem.2040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1002\/nem.2040"],"URL":"https:\/\/doi.org\/10.1002\/nem.2040","archive":["Portico"],"relation":{},"ISSN":["1055-7148","1099-1190"],"issn-type":[{"type":"print","value":"1055-7148"},{"type":"electronic","value":"1099-1190"}],"subject":[],"published":{"date-parts":[[2018,7,18]]},"assertion":[{"value":"2017-07-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}