Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy
Abstract
:1. Introduction
2. Related Work
3. Measurement Algorithm for the Workflow Management System Trustworthiness
3.1. Formal Representation of the Workflow Management System Trustworthiness
- (1)
- Interface no.0 is linked to the core work engine(s) component of the WfMS and the additional self-configuration-parameter system for the WfMS (SCP4WMS) RE tool in the process execution service module; that is, we consider the SCP4WMS tools an extension of and supplementary to the process execution service module.
- (2)
- Interfaces no.6 and no.7 are linked to the self-optimization framework system for the WfMS (SOF4WMS) and self-healing model system for WfMS (SHM4WMS) RE tools, respectively, with the management and monitoring tool, which constructs the TWfMS mechanism with the SCP4WMS tool; that is, we consider the SOF4WMS and SHM4WMS tools extensions of and supplementary to the management and monitoring tool.
- (3)
- Interface no.8 is linked to the tools for communication on called application of typical web services with an additional tool, the auto construction method for the WfMS (ACM4WMS), based on services combination; that is, we consider the ACM4WMS tool an extension of and supplementary to the standard tools linked to the process execution service module via interface no.3.
- (4)
- Interface no.9 is linked to the requirement auto-analysis tool with the process definition tool, where the former consists of four components known as acquisition, decomposition, combination, and verification based on a Petri net (ADCV-PN); that is, we consider the ADCV-PN tools extensions of and supplementary to the process definition tool.
- (5)
- Interface no.10 is connected to the management and monitoring tool with the ACM4WMS tool when the WfMS encounters “local break points”, whereby the WfMS trustworthiness can no longer be maintained by the management and monitoring tool, even with the assistance of the tool sets of SCP4WMS, SOF4WMS, and SHM4WMS. In the context of the scenario described above, via interface no.10, the management and monitoring tool transfers the exceptional event unsolved by the SCP4WMS, SOF4WMS, and SHM4WMS tool sets sequentially to the ACM4WMS tool, in order to reconstruct the WfMS by searching for resources in the cloud. At such a time, we consider the WfMS as beginning local resilience engineering (LRE).
- (6)
- Interface no.11 is connected to the management and monitoring tool with the ADCV-PN tools when the WfMS encounters “global break points”, whereby the WfMS trustworthiness can no longer be sufficiently accurate by means of the ACM4WMS tool, even if all of the resources in the cloud are traversed by means of the ACM4WMS tool. In the context of the scenario described above, via interface no.11, the management and monitoring tool finally transfers the exceptional event unsolved by the ACM4WMS tool to the ADCV-PN tools, in order to remodel the WfMS under user validation. At such a time, we consider the WfMS as beginning global resilience engineering (GRE).
- SCP4WMS means self-configuration-parameter system for the WfMS. It has the function of analysing the parameters transferred from the trustworthiness data collection (TDC) component, which gathers real-time data from the WfMS at the multilevel of components, component combinations, and application software. According to the analysis, SCP4WMS carries out the following procedures.
- 1.1.
- If the parameters of the operating environment variables of workflow engines have changed and will cause WfMS failure and improper operation, SCP4WMS will modify the parameters of the WfMS itself according to predefined rules and return the new parameters of the WfMS itself to the TDC in order to be adaptable to the new environment variables of the workflow engines.
- 1.2.
- SCP4WMS should transmit the remaining parameters to SOF4WMS to deal with other WfMS mechanisms.
- 1.3.
- SCP4WMS should compute the WfMS behaviour trustworthiness according to the algorithm illustrated in Section 3.2 and transform it into the subsequent mechanism SOF4WMS.
- 1.4.
- When SCP4WMS receives the new parameters of the WfMS itself, modified by SOF4WMS, it should return these to the TDC in order to be optimised with the new operating condition variables of the workflow engines.
- 1.5.
- When SCP4WMS receives the new parameters of the WfMS itself, modified by SHM4WMS, it should return these to the TDC in order to be recovered with the new transaction consistence variables of the workflow engines.
- SOF4WMS means self-optimisation framework system for the WfMS, and one of its functions is analysing the parameters transferred from the SCP4WMS component. According to the analysis, SOF4WMS carries out the following procedures.
- 2.1.
- If the parameters of the operating condition variables of the workflow engines have changed and will lead to worse or better WfMS performance, SOF4WMS will modify the parameters of the WfMS itself, according to predefined ECA rules, and return the new parameters of the WfMS itself to SCP4WMS to be optimised with the new operating condition variables of the workflow engines.
- 2.2.
- SOF4WMS should transmit the remaining parameters to SHM4WMS in order to deal with other WfMS mechanisms.
- 2.3.
- SOF4WMS should verify the WfMS behaviour trustworthiness according to the algorithm for software/service behaviour trustworthiness validation and transform it into the subsequent mechanism SHM4WMS.
- 2.4.
- When SOF4WMS receives the new parameters of the WfMS itself, modified by SHM4WMS, it should return these to SCP4WMS to be recovered with the new transaction consistence variables of the workflow engines.
- SHM4WMS means self-healing-model system for the WfMS, and one of its functions is analysing the parameters transferred from the SOF4WMS component. According to the analysis, SHM4WMS carries out the following procedures.
- 3.1.
- If the parameters of the transaction consistence variables of the workflow engines have changed and will cause an inconsistent transaction record in the WfMS, SHM4WMS will modify the parameters of the WfMS itself, according to predefined ECA rules, and return the new parameters to SOF4WMS to be recovered with the new transaction consistence variables of the workflow engines.
- 3.2.
- SHM4WMS should compute the WfMS behaviour trustworthiness according to the NF algorithm (NF paradigms):
- 3.2.1.
- If the WfMS NF is higher than or equal to the requirement NF of users when the ACM4WMS constructs the WfMS at the initial time, jump to step (3.3) directly.
- 3.2.2.
- Otherwise, SHM4WMS will transfer it to the TWfMS method, which means that SHM4WMS will suggest the management and monitoring tool to transfer it to ACM4WMS through the local RE path (3.2.3). The management and monitoring tool transfers the NF that is lower than that of the initial WfMS to ACM4WMS through the local RE path.
- 3.3.
- If ACM4WMS can reconstruct a WfMS with a new NF that is higher than or equal to the requirement NF of users from the source service in the cloud successfully, then jump to step (3.3) directly.
- 3.4.
- Otherwise, the management and monitoring tool sends the NF that is lower than that of the initial WfMS to the ADCV-PN tools through the global RE path (that is, the ADCV-PN tools set will begin to remodel the WfMS under user validation of users).
- 3.5.
- Register the new WfMS NF into the SHM4WMS database and return to step (1).
3.2. Measurement Algorithm for the Trustworthy Workflow Management System Based on Calculus
Algorithm 1: General_Recursive_Measure () |
Input: ; ; Output: ; 1: If ; 2: Return; End if; 3: For every do //Traverse the tree in proper order of calculus priority from high to low: 4: Compute behaviour trustworthiness () for , replace with in ; 5: While exist do 6: GRM = General_Recursive_Measure (); 7: Replace with in 8: Set ; 9: End do; 10: While exist do 11: = General_Recursive_Measure (); 12: Replace with in 13: Set ; 14: End do; 15: While exist do 16: = General_Recursive_Measure (); 17: Replace with in 18: Set ; 19: End do; 20: End for; 21: Set ; 22: Replace with ; 23: Return . |
3.3. Basic Software Behaviour Trustworthiness Metric for Components
4. Conclusions
Acknowledgments
Conflicts of Interest
References
- Qu, R. Case-Based Reasoning for Couse Timetabling Problems. Ph.D. Thesis, University of Nottingham, Nottingham, UK, 2002. [Google Scholar]
- Liu, K.; Shan, Z.; Wang, J.; He, J.; Zhang, Z.; Qin, Y. Overview on Major Research Plan of Trustworthy Software. Bull. Natl. Sci. Found. China 2008, 22, 145–151. [Google Scholar]
- Zha, H.; Wang, J.; Wen, L.; Wang, C.; Sun, J. A workflow net similarity measure based on transition adjacency relations. Comput. Ind. 2010, 61, 463–471. [Google Scholar] [CrossRef]
- Zha, H.; Wang, J.; Wen, L.; Wang, C. A label-free similarity measure between workflow nets. In Proceedings of the IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2009), Singapore, 7–11 December 2009; pp. 463–469. [Google Scholar]
- Mühlen, M. Workflow-based process controlling-or: What you can measure you can control. In Workflow Handbook 2001, Workflow Management Coalition; Future Strategies: Lighthouse Point, FL, USA, 2001; pp. 61–77. [Google Scholar]
- Ma, Y.; Shi, M.; Wei, J. Cost and accuracy aware scientific workflow retrieval based on distance measure. Inf. Sci. 2015, 314, 1–13. [Google Scholar] [CrossRef]
- Chin, D.-M. A Definition and Measure of Workflow Modularity. Master’s Thesis, Florida International University, Miami, FL, USA, 2005. [Google Scholar]
- Wilson, D.; Hamptonbagshaw, K.; Jorwic, T.M.; Bishop, J.; Giustina, E. A new focus on process and measure: Raising data quality with a standard coding workflow and benchmarks. J. AHIMA 2008, 79, 54–58. [Google Scholar] [PubMed]
- Wang, Y.; Li, M.; Cao, J.; Lin, X.; Tang, F. Workflow similarity measure for process clustering in grid. In Proceedings of the International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China, 24–27 August 2007; pp. 629–635. [Google Scholar]
- Wei, L.; Handley, J.; Martin, N.; Sun, T.; Keogh, E. Clustering workflow requirements using compression dissimilarity measure. In Proceedings of the Sixth IEEE International Conference Data Mining Workshops (ICDM Workshops), Hong Kong, China, 18–22 December 2006; pp. 50–54. [Google Scholar]
- Bo, T.K.; Gundersen, M.; Berge, T.O. To measure workflow and waste: A concept for continuous improvement. In Proceedings of the 22th Annual Conference of the International Group for Lean Construction (IGLC 2014), Oslo, Norway, 25–27 June 2014; pp. 835–846. [Google Scholar]
- Dai, Y.S.; Min, X.; Quan, L.; Szu-Hui, N. Uncertainty Analysis in Software Reliability Modeling by Bayesian Analysis with Maximum-Entropy Principle. IEEE Trans. Softw. Eng. 2007, 33, 781–795. [Google Scholar] [CrossRef]
- Lollai, S.A. Quality Systems. A Thermodynamics-Related Interpretive Model. Entropy 2017, 19, 418. [Google Scholar] [CrossRef]
- Jaynes, E.T. Information Theory and Statistics Mechanics. Stat. Phys. 1963, 106, 181–218. [Google Scholar]
- Kapur, J. Maximum-Entropy Models in Science and Engineering; John Wiley & Sons: Hoboken, NJ, USA, 1989. [Google Scholar]
- Madni, A.M.; Jackson, S. Towards a Conceptual Framework for Resilience Engineering. IEEE Syst. J. 2009, 3, 181–191. [Google Scholar] [CrossRef]
- Han, Q.; Yuan, Y. Research on trustworthiness measurement approaches of component based BPRAS. J. Commun. 2014, 35, 47–57. (In Chinese) [Google Scholar]
- Han, Q. TWfMS: A framework of trustworthy workflow management system. In Proceedings of the International Conference on Subject-Oriented Business Process Management (S-BPM) ONE 2017, Darmstadt, Germany, 30–31 March 2017; pp. 78–85. [Google Scholar]
- Han, Q. Resilience engineering for trustworthy workflow management system. In Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic, 25–29 July 2017; pp. 289–296. [Google Scholar]
- Yuan, Y.; Han, Q. A Software Behavior Trustworthiness Measurement Method based on Data Mining. Int. J. Comput. Intell. Syst. 2011, 4, 817–825. [Google Scholar] [CrossRef]
- Yuan, Y.; Han, Q. A Data Mining Based Measurement Method for Software Trustworthiness. Chin. J. Electron. 2012, 21, 293–296. [Google Scholar] [CrossRef]
- Rong, J. A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (POME) and the Grey Decision-Making Method (GDMM). Entropy 2014, 16, 4818–4838. [Google Scholar]
- Hong, M.; Jian, L. A Software Architecture Centric Engineering Approach for Internetware; Springer: Singapore, 2016; pp. 702–730. [Google Scholar]
© 2018 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Han, Q. Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy. Entropy 2018, 20, 195. https://doi.org/10.3390/e20030195
Han Q. Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy. Entropy. 2018; 20(3):195. https://doi.org/10.3390/e20030195
Chicago/Turabian StyleHan, Qiang. 2018. "Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy" Entropy 20, no. 3: 195. https://doi.org/10.3390/e20030195