SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
DOI:10.5121/ijfcst.2013.3402 13
A New Mechanism for Service Recovery
Technology by using Recovering Service’s Data
Monire Norouzi
Department of Computer Engineering, Shabestar Branch, Islamic Azad University,
Shabestar, Iran
Monire_norouzi@yahoo.com
ABSTRACT
Service recovery technology is an important constituent part of the emergency response technologies. The
service recovery goal is to build a technology system of service recovery focusing on the survival of
information system services. By analyzing the relationship between service and data, we present a service
recovery mechanism by recovering service’s data. We introduce a third party service monitor to monitor
the state changes of the service, design the data recovery model, and give an example of quick data
recovery. At Last we present a prototype system of service recovery; the experimental results toward the
prototype system show that the mechanism which designed by us can greatly improve the service recovery
efficiency and it can meet the timeliness requirements of the information service.
KEYWORDS
service recovery, third party service monitor, data recovery model, Prototype system
1. INTRODUCTION
Service recovery technology is an important constituent part of the emergency response
technologies. Since 1988, the U.S. Computer Incident Response Coordination Center
(CERTTCC) and Computer Incident Advisory Group set up many emergency response groups
had been set up, and they had played an important role in the procedure of handling the network
security events. These researches institutions regard the emergency response as an important part
of the PDR security model. The emergency response technologies mainly include intrusion
tracing, traps, collaboration processing, trusted recovery, disaster control, adaptive response, etc.
And the CERT ICC also does much research on the technology of network survivability, which
mainly includes attack identification, attack tolerance, attack response and system recovery from
failure.
The service recovery goal is to build a technology system of service recovery focusing on the
survival of information system services. Based on Service Oriented Architecture (SOA) [1], the
technology system considers the commonness and characteristics of the service recovery
processing, and modularizes the processing procedure. Then, it selects optimized recovery
strategies in accordance with the properties of security incidents and the composition of the
service. Through effective service coordination mechanism, it can achieve the objective that the
minimum resource cost and the shortest response time during service recovery.
Data recovery is the basis and prerequisite for service recovery, and the traditional data backup
and recovery technology has been used to solve some problems in the service recovery. In this
paper, we intend to design a service recovery mechanism by recovering service’s data.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
14
The rest of this paper is organized as follows. Section 2 discusses research background and
related work. Section3 discusses the relationship between service and data. Section 4 discusses
architecture and details. Section 5 discusses our implementation and experimental results.
2. RESEARCH BACKGROUND AND RELATED WORKS
As the organization of the different services in the service-oriented architecture is loose, while
the deployment of them is flexibility, the service recovery mechanism built on the Service
Oriented Architecture (SOA) will be beneficial to the integration and use of various technologies.
Figure 1 shows the basic composition and calling relationship for the information system
recovery
Figure 1. The basic structure of system recovery
The existing service recovery technologies generally concern the traditional service concepts, for
example, the specific network service or application service. As in the context of network
environment, many technologies have been proposed to enhance the survivability and
dependability of the service, such as the load balancing and connection switching, IP redirection
technology [2], dynamic DNS technology [3], TCP transfer technology [4] and backup system
switchover technology. And the researchers have proposed the system service switch protection
method based on threshold cryptogram/secret sharing, and the method can be used on the CA,
certification services, key exchange services, file services, DNS services, data services and
routing services. Meanwhile, the researchers also built some forms of service recovery
application systems by means of monitoring, acceptance testing and redundancy [5, 6], such as
the web server systems and database systems.
About the reactively service recover systems; some researchers have studied many technologies
to recover the systems fast and efficiently. These works do not consider by zonetime faults or
security-compromised components and also do not rely on redundancy to ensure that the system
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
15
stays available during recoveries, the main problems addressed in the present work. Huang et al
[7] advocates the execution of some kind of recovery action after a fault is detected. And the
recovery oriented computing project [8] proposed a set of methods to improve the recovery and
reduce the time cost and other related techniques to detect the service failures, restart the
minimum set of system components, undo some operator configuration errors and put the entire
system state back to the modification operation. Joshi et al [9] do some works to diagnose system
faults through several monitors and evaluate which is the best set of recovery actions that must be
taken in order to recover the system as fast as possible.
3. THE RELATIONSHIP BETWEEN SERVICE AND DATA
The service is mainly made up of the service body and the business information supporting
service running; and the service body mainly consists of the service application and the function
modules, also, the business information mainly consists of the static information and dynamic
information. Moreover, in the sight of the data organization, the service body and the business
information can all be regarded as data.
Figure 2. The hierarchical relationship between service and data
As is shown in Figure l, d service is made up of a series of sub-service. The hierarchical levels
include top service level, sub-service level and meta-service level. And the Sl,S2,...,Sn denotes a
series of meta services. The so-called meta-service is the smallest unit of service that cannot be
divided, and it can independently perform the functions.
4. ARCHITECTURE AND DETAILS
4.1 Architecture Design
The main idea of architecture design is that once the service is complete failure, the system can
achieve the object of efficient and quickly reconstructing the entire service. Based on recovering
the service’s data, we can recover the service bodies and the corresponding data. So we propose a
service recovery mechanism that recovering the service’s data and restarting the service. In other
words, we divide the service recovery process into two phases; firstly, we recovery the service’s
data through quick data recovery technology; secondly, we restart the service to achieve the
purpose of rerunning the service.
In this architecture, we introduce a third party service monitor to monitor the state changes of the
service, delivery service recovery orders and control the service rerunning process. The monitor is
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
16
completely independent from the application service. The communication and information
transferring between the monitor and service is handled by specific interface. The architecture is
shown in Figure 3.
Figure 3. The Architecture of Service Recovery by Data Recovery
4.2 Data Recovery Design
We can divide the recovery operations into two types, that is, the accurate data recovery and
selective data recovery, according to the user’s participation. The so-called accurate data recovery
means that recovering all data modification operations in a certain period. Usually after a certain
data backup version; and the selective data recovery means that the users query and browse the
data modification operation sets, and they choose some specific modification operations to
recovery the data.
In order to record the data modification operations, the system must save the data modification
logs and backup the logs to handling the accurate data recovery. The data recovery design model
is shown in Figure 4. Once you need do accurate data recovery and selective data recovery, there
are some steps needed to do.
1) the users determine the data operations sets by the data inquiry and browsing tools;
2) according to the corresponding record logs, the system generates data recovery request;
3) send the recovery request to the agent application of the data server;
4) the kernel recovery module receive the recovery request;
5) the kernel recovery module processes the corresponding data backup blocks;
6) Upon the supporting by the file system, the kernel recovery module completes the
"replay" operation to recovery, the data state to the time of the specific modification
operations.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
17
Figure 4. The Data recovery Design Model
4.3 The Example of Data Recovery Procedure
Specifically, we describe the failure recovery mechanism designed in this paper by way of the
example of recovery procedure for a certain file. The basic idea of failure recovery is that the
mechanism transfers direct data copying process into the operation on the File Allocation Table
(abbreviated as FAT, mainly in FAT file system) or Master File Table (abbreviated as MFT,
mainly in NTFS file system) and other similar data structures in other file system, while by
modifying the link relationship of the selected file backup blocks in FAT, to regenerate the target
file. By this means, the mechanism can reduce the direct read and write to the disk and improve
the efficiency of the recovery process.
For example, while the file state in Figure 5 is needed to recovery to the time T3, the selected file
blocks used for recovery and the new link relationship of these blocks is shown in Figure 5. These
blocks are linked end to end. And the operating system and file system can transparently access
these data blocks.
Figure 5. The Data Recovery Procedure
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
18
5. SYSTEM IMPLEMENTATION AND EXPRIMENT RESULTS
5.1 System Implementation
We have implemented a prototype service recovery system on the FAT32 file system under the
Windows XP platform. The basic architecture of prototype system is designed by the following
steps:
1) Real-time monitoring the file modification operation while the service is running and the
monitoring process is implemented by the file system filter driver;
2) backup the data according the current file modification operation;
3) record the last modified time of the data backup blocks;
4) record the disk storage space information of the data backup blocks, also the disk storage
space information is referred as the disk formatting partition information, which include
the start cluster number of the blocks, the end cluster number of the blocks and the block
size;
5) so, the system generates many data backup blocks according to the each file modification
operation made by the operating system processes and user processes:
6) the data backup blocks together form the sets of file backup pieces;
7) when the information system service is out of order, the users need recovery the file state
to a certain time, which is referred as the time Tt;
8) the users select some certain data backup blocks in the data sets according to the Tt;
9) recovering the file by reconstructing the selected data blocks;
The system implementation architecture is shown in Figure 6.
Figure 6. the System Implementation Architecture
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
19
5.2 Test Platform Configuration
The main hardware and software configurations of computer for testing are listed following:
 Platform: Personal computer
 CPU: Intel(R) Pentium(R) 4 CPU 2.8GHz
 RAM:2.0G
 Hard disk: 320G
 operating system: Microsoft windows XP(5. 1 .2600) Service Pack 2
 File System: FAT32
5.2 Data Recovery Performance Results
Compared to the traditional data recovery technology, the method designed by us can greatly
improve the data recovery efficiency. We select a 300MB data file, a500MB data file and a
directory with 600 files for the comparison test. The method is that we compare the recovery time
between the traditional way of directory disk copy and the way designed in this paper, and the test
results are shown in Table 1.
Table 1. Data Recovery Test Results
Test Objects Data Recovery Methods
Direct Disk Copy (s) Method Designed
in this paper(s)
400 MB Data File 7 0.5
500 MB Data File 10 0.6
A Directory 25 6
We can see that data recovery mechanism designed in this paper can greatly improve the data
recovery efficiency. Also, the service recovery efficiency has been improved greatly. Generally
speaking, the time of the data recovery can be limited on the second level, and the service
restarting time is merely several seconds. So, the entire service recovery process can be
complemented in several seconds, which can greatly enhance the dependability and survivability
of the information service.
REFFERNECES
[1] R. Michael, “Evaluation of service selection techniques in service oriented computing networks,"
Smart Grid Technologies & Market Models, vol. 1, no4, pp. 271 -285 ,2005 .
[2] J. Hu,C. Yang, "Enhancement of cellular IP routing by redirection at cross over base stations," IEEE
VEHICULAR TECHNOLOGYCONFERENCE, vol. 62, no. 4, 2005.
[3] Z. X. G. Yuping, "Principle and Realization of Dynamic DNS and Its Application in Mobile Packet
Switching Network" Telecom Engineering Technics and Standardization, vol. 2, 2010.
[4] G. Tan, S.A. Jarvis, “Prediction of short-lived TCP transfer latency on bandwidth asymmetric links,"
Journal of Computer and System Sciences, vol. 72, no. 7 , pp. 1201--1210, 2A06.
[5] Y. Hao, H. Luo, Y. Yang, et a1., "HOURS : Achieving DoS Resilience in an Open Service
Hierarchy," in 2004 International Conference on Dependable Systems and Networks (DSN'04),2004.
[6] W. He, 'Recovery in Web Service Applications," in 2004 IEEE International Conference on e-
Technology, e-Commerce and e-Service (EEE'04) , pp.25-28, 2004.
[7] Y. Huang,C. Kintala, "Software implemented fault tolerance: Technologies and experience," IEEE
International Symposium on Fault-Tolerant Computing, p. 2, 1993.
[8] D. Patterson, A. Brown, P. Broad well, et al., "Recovery-oriented computing (ROC): Motivation,
definition, techniques, and case studies," 2002.
[9] K. R. Joshi, M. A. Hiltunen, W. H. Sanders, et al., "Automatic model driven recovery in distributed
systems," in 24th IEEE Symposium on Reliable Distributed Systems, pp. 25-36,2005.

Mais conteúdo relacionado

Mais procurados

Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063
Editor IJARCET
 
SR Presentation 2.ppt
SR Presentation 2.pptSR Presentation 2.ppt
SR Presentation 2.ppt
tranlamson
 

Mais procurados (18)

Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data Analysis
 
2012an20
2012an202012an20
2012an20
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network CloudModeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
 
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATIONASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
 
Project Report (Summer 2016)
Project Report (Summer 2016)Project Report (Summer 2016)
Project Report (Summer 2016)
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Data migration system in heterogeneous database
Data migration system in heterogeneous databaseData migration system in heterogeneous database
Data migration system in heterogeneous database
 
Research of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large CapacityResearch of Embedded GIS Data Management Strategies for Large Capacity
Research of Embedded GIS Data Management Strategies for Large Capacity
 
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc NetworkReliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
Reliable Fault Tolerance System for Service Composition in Mobile Ad Hoc Network
 
Developing a secured image file management system using modified AES
Developing a secured image file management system using modified AESDeveloping a secured image file management system using modified AES
Developing a secured image file management system using modified AES
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristi...
 
O1803017981
O1803017981O1803017981
O1803017981
 
Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063Volume 2-issue-6-2061-2063
Volume 2-issue-6-2061-2063
 
SR Presentation 2.ppt
SR Presentation 2.pptSR Presentation 2.ppt
SR Presentation 2.ppt
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time
 

Semelhante a A New Mechanism for Service Recovery Technology by using Recovering Service’s Data

Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy software
IAEME Publication
 

Semelhante a A New Mechanism for Service Recovery Technology by using Recovering Service’s Data (20)

26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
 
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
 
A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...A cloud computing using rough set theory for cloud service parameters through...
A cloud computing using rough set theory for cloud service parameters through...
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONA HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTION
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
AVAILABILITY METRICS: UNDER CONTROLLED ENVIRONMENTS FOR WEB SERVICES
 
Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy software
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison
 
Ijcatr04071001
Ijcatr04071001Ijcatr04071001
Ijcatr04071001
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
A compendium on load forecasting approaches and models
A compendium on load forecasting approaches and modelsA compendium on load forecasting approaches and models
A compendium on load forecasting approaches and models
 

Mais de ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
ijfcstjournal
 

Mais de ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

A New Mechanism for Service Recovery Technology by using Recovering Service’s Data

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 DOI:10.5121/ijfcst.2013.3402 13 A New Mechanism for Service Recovery Technology by using Recovering Service’s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com ABSTRACT Service recovery technology is an important constituent part of the emergency response technologies. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. By analyzing the relationship between service and data, we present a service recovery mechanism by recovering service’s data. We introduce a third party service monitor to monitor the state changes of the service, design the data recovery model, and give an example of quick data recovery. At Last we present a prototype system of service recovery; the experimental results toward the prototype system show that the mechanism which designed by us can greatly improve the service recovery efficiency and it can meet the timeliness requirements of the information service. KEYWORDS service recovery, third party service monitor, data recovery model, Prototype system 1. INTRODUCTION Service recovery technology is an important constituent part of the emergency response technologies. Since 1988, the U.S. Computer Incident Response Coordination Center (CERTTCC) and Computer Incident Advisory Group set up many emergency response groups had been set up, and they had played an important role in the procedure of handling the network security events. These researches institutions regard the emergency response as an important part of the PDR security model. The emergency response technologies mainly include intrusion tracing, traps, collaboration processing, trusted recovery, disaster control, adaptive response, etc. And the CERT ICC also does much research on the technology of network survivability, which mainly includes attack identification, attack tolerance, attack response and system recovery from failure. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. Based on Service Oriented Architecture (SOA) [1], the technology system considers the commonness and characteristics of the service recovery processing, and modularizes the processing procedure. Then, it selects optimized recovery strategies in accordance with the properties of security incidents and the composition of the service. Through effective service coordination mechanism, it can achieve the objective that the minimum resource cost and the shortest response time during service recovery. Data recovery is the basis and prerequisite for service recovery, and the traditional data backup and recovery technology has been used to solve some problems in the service recovery. In this paper, we intend to design a service recovery mechanism by recovering service’s data.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 14 The rest of this paper is organized as follows. Section 2 discusses research background and related work. Section3 discusses the relationship between service and data. Section 4 discusses architecture and details. Section 5 discusses our implementation and experimental results. 2. RESEARCH BACKGROUND AND RELATED WORKS As the organization of the different services in the service-oriented architecture is loose, while the deployment of them is flexibility, the service recovery mechanism built on the Service Oriented Architecture (SOA) will be beneficial to the integration and use of various technologies. Figure 1 shows the basic composition and calling relationship for the information system recovery Figure 1. The basic structure of system recovery The existing service recovery technologies generally concern the traditional service concepts, for example, the specific network service or application service. As in the context of network environment, many technologies have been proposed to enhance the survivability and dependability of the service, such as the load balancing and connection switching, IP redirection technology [2], dynamic DNS technology [3], TCP transfer technology [4] and backup system switchover technology. And the researchers have proposed the system service switch protection method based on threshold cryptogram/secret sharing, and the method can be used on the CA, certification services, key exchange services, file services, DNS services, data services and routing services. Meanwhile, the researchers also built some forms of service recovery application systems by means of monitoring, acceptance testing and redundancy [5, 6], such as the web server systems and database systems. About the reactively service recover systems; some researchers have studied many technologies to recover the systems fast and efficiently. These works do not consider by zonetime faults or security-compromised components and also do not rely on redundancy to ensure that the system
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 15 stays available during recoveries, the main problems addressed in the present work. Huang et al [7] advocates the execution of some kind of recovery action after a fault is detected. And the recovery oriented computing project [8] proposed a set of methods to improve the recovery and reduce the time cost and other related techniques to detect the service failures, restart the minimum set of system components, undo some operator configuration errors and put the entire system state back to the modification operation. Joshi et al [9] do some works to diagnose system faults through several monitors and evaluate which is the best set of recovery actions that must be taken in order to recover the system as fast as possible. 3. THE RELATIONSHIP BETWEEN SERVICE AND DATA The service is mainly made up of the service body and the business information supporting service running; and the service body mainly consists of the service application and the function modules, also, the business information mainly consists of the static information and dynamic information. Moreover, in the sight of the data organization, the service body and the business information can all be regarded as data. Figure 2. The hierarchical relationship between service and data As is shown in Figure l, d service is made up of a series of sub-service. The hierarchical levels include top service level, sub-service level and meta-service level. And the Sl,S2,...,Sn denotes a series of meta services. The so-called meta-service is the smallest unit of service that cannot be divided, and it can independently perform the functions. 4. ARCHITECTURE AND DETAILS 4.1 Architecture Design The main idea of architecture design is that once the service is complete failure, the system can achieve the object of efficient and quickly reconstructing the entire service. Based on recovering the service’s data, we can recover the service bodies and the corresponding data. So we propose a service recovery mechanism that recovering the service’s data and restarting the service. In other words, we divide the service recovery process into two phases; firstly, we recovery the service’s data through quick data recovery technology; secondly, we restart the service to achieve the purpose of rerunning the service. In this architecture, we introduce a third party service monitor to monitor the state changes of the service, delivery service recovery orders and control the service rerunning process. The monitor is
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 16 completely independent from the application service. The communication and information transferring between the monitor and service is handled by specific interface. The architecture is shown in Figure 3. Figure 3. The Architecture of Service Recovery by Data Recovery 4.2 Data Recovery Design We can divide the recovery operations into two types, that is, the accurate data recovery and selective data recovery, according to the user’s participation. The so-called accurate data recovery means that recovering all data modification operations in a certain period. Usually after a certain data backup version; and the selective data recovery means that the users query and browse the data modification operation sets, and they choose some specific modification operations to recovery the data. In order to record the data modification operations, the system must save the data modification logs and backup the logs to handling the accurate data recovery. The data recovery design model is shown in Figure 4. Once you need do accurate data recovery and selective data recovery, there are some steps needed to do. 1) the users determine the data operations sets by the data inquiry and browsing tools; 2) according to the corresponding record logs, the system generates data recovery request; 3) send the recovery request to the agent application of the data server; 4) the kernel recovery module receive the recovery request; 5) the kernel recovery module processes the corresponding data backup blocks; 6) Upon the supporting by the file system, the kernel recovery module completes the "replay" operation to recovery, the data state to the time of the specific modification operations.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 17 Figure 4. The Data recovery Design Model 4.3 The Example of Data Recovery Procedure Specifically, we describe the failure recovery mechanism designed in this paper by way of the example of recovery procedure for a certain file. The basic idea of failure recovery is that the mechanism transfers direct data copying process into the operation on the File Allocation Table (abbreviated as FAT, mainly in FAT file system) or Master File Table (abbreviated as MFT, mainly in NTFS file system) and other similar data structures in other file system, while by modifying the link relationship of the selected file backup blocks in FAT, to regenerate the target file. By this means, the mechanism can reduce the direct read and write to the disk and improve the efficiency of the recovery process. For example, while the file state in Figure 5 is needed to recovery to the time T3, the selected file blocks used for recovery and the new link relationship of these blocks is shown in Figure 5. These blocks are linked end to end. And the operating system and file system can transparently access these data blocks. Figure 5. The Data Recovery Procedure
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 18 5. SYSTEM IMPLEMENTATION AND EXPRIMENT RESULTS 5.1 System Implementation We have implemented a prototype service recovery system on the FAT32 file system under the Windows XP platform. The basic architecture of prototype system is designed by the following steps: 1) Real-time monitoring the file modification operation while the service is running and the monitoring process is implemented by the file system filter driver; 2) backup the data according the current file modification operation; 3) record the last modified time of the data backup blocks; 4) record the disk storage space information of the data backup blocks, also the disk storage space information is referred as the disk formatting partition information, which include the start cluster number of the blocks, the end cluster number of the blocks and the block size; 5) so, the system generates many data backup blocks according to the each file modification operation made by the operating system processes and user processes: 6) the data backup blocks together form the sets of file backup pieces; 7) when the information system service is out of order, the users need recovery the file state to a certain time, which is referred as the time Tt; 8) the users select some certain data backup blocks in the data sets according to the Tt; 9) recovering the file by reconstructing the selected data blocks; The system implementation architecture is shown in Figure 6. Figure 6. the System Implementation Architecture
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 19 5.2 Test Platform Configuration The main hardware and software configurations of computer for testing are listed following:  Platform: Personal computer  CPU: Intel(R) Pentium(R) 4 CPU 2.8GHz  RAM:2.0G  Hard disk: 320G  operating system: Microsoft windows XP(5. 1 .2600) Service Pack 2  File System: FAT32 5.2 Data Recovery Performance Results Compared to the traditional data recovery technology, the method designed by us can greatly improve the data recovery efficiency. We select a 300MB data file, a500MB data file and a directory with 600 files for the comparison test. The method is that we compare the recovery time between the traditional way of directory disk copy and the way designed in this paper, and the test results are shown in Table 1. Table 1. Data Recovery Test Results Test Objects Data Recovery Methods Direct Disk Copy (s) Method Designed in this paper(s) 400 MB Data File 7 0.5 500 MB Data File 10 0.6 A Directory 25 6 We can see that data recovery mechanism designed in this paper can greatly improve the data recovery efficiency. Also, the service recovery efficiency has been improved greatly. Generally speaking, the time of the data recovery can be limited on the second level, and the service restarting time is merely several seconds. So, the entire service recovery process can be complemented in several seconds, which can greatly enhance the dependability and survivability of the information service. REFFERNECES [1] R. Michael, “Evaluation of service selection techniques in service oriented computing networks," Smart Grid Technologies & Market Models, vol. 1, no4, pp. 271 -285 ,2005 . [2] J. Hu,C. Yang, "Enhancement of cellular IP routing by redirection at cross over base stations," IEEE VEHICULAR TECHNOLOGYCONFERENCE, vol. 62, no. 4, 2005. [3] Z. X. G. Yuping, "Principle and Realization of Dynamic DNS and Its Application in Mobile Packet Switching Network" Telecom Engineering Technics and Standardization, vol. 2, 2010. [4] G. Tan, S.A. Jarvis, “Prediction of short-lived TCP transfer latency on bandwidth asymmetric links," Journal of Computer and System Sciences, vol. 72, no. 7 , pp. 1201--1210, 2A06. [5] Y. Hao, H. Luo, Y. Yang, et a1., "HOURS : Achieving DoS Resilience in an Open Service Hierarchy," in 2004 International Conference on Dependable Systems and Networks (DSN'04),2004. [6] W. He, 'Recovery in Web Service Applications," in 2004 IEEE International Conference on e- Technology, e-Commerce and e-Service (EEE'04) , pp.25-28, 2004. [7] Y. Huang,C. Kintala, "Software implemented fault tolerance: Technologies and experience," IEEE International Symposium on Fault-Tolerant Computing, p. 2, 1993. [8] D. Patterson, A. Brown, P. Broad well, et al., "Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies," 2002. [9] K. R. Joshi, M. A. Hiltunen, W. H. Sanders, et al., "Automatic model driven recovery in distributed systems," in 24th IEEE Symposium on Reliable Distributed Systems, pp. 25-36,2005.