Transactional Behavior Verification in Business Process As A Service Configuration
Transactional Behavior Verification in Business Process As A Service Configuration
Configuration
Abstract:
Existing system:
Firstly, we recognize that the interface exposed to the client might have significant
complexities, which are not easy to tackle by non system experts. An interface to
hide the details and complexity of the service aside from the transactional
requirement specification and feature selection would ensure that this work is
widely used. As BPaaS is still an emerging technology, this framework especially
one that enables clients to ensure complex transactional requirements, would be a
significant contribution to the field. Existing approaches that manage cloud service
evolution focus on requirements such as process structure fairness, and preserving
elasticity and multi-tenancy. To the best of our knowledge, complex properties
such as transactional requirements are yet to receive attention in this area. The
work presented in this article will hopefully provide avenues for addressing a host
of opportunities present in the early stages of BPaaS research.
Proposed system:
However, BPaaS has their own unique concerns such as configurable use of third-
party services, and the inherent transactional concerns. Our approach manages
BPaaS configuration in a way that addresses the issues identified above. Firstly,
our BPaaS model enables configuration from numerous perspectives important to
BPaaS clients, namely, activities, resources, and data objects, as shown in the
scenario examples. Our configuration method aims to elicit and ensure complex
transactional requirements from clients, by adapting the temporal logic template set
as shown in Section 4. This is in contrast to the approaches proposed in but it has
the advantage of a reduced runtime when configuring services with many
configuration options and values.
Advantages:
However, BPaaS has their own unique concerns such as configurable use of third-
party services, and the inherent transactional concerns.
Cloud computing has become a popular paradigm for delivering a wide range of
services, such as software applications, computing capacity, storage, and virtual
platforms. Cloud service providers can offer these utilities to clients over the
Internet in a pay-by-use manner.
Disadvantages:
BDD analysis is able to efficiently solve satisfiability problems, but the size of the
BDD dependent on variable ordering in the underlying propositional logic
property. While finding the most efficient ordering is in NP-complete problem ,
ordering variables from a depth-first traversal of the feature model has been
approved as an effective strategy.
This constructs BDDs from the input model to apply several verification
techniques, including fair CTL model checking and LTL model checking (by an
algorithm that reduces the problem to CTL model checking). We use NuSMV as it
provides support for properties formulated in both LTL and CTL.
Modules:
Model Checking:
Model checking is a formal method that exhaustively verifies that the behavior of a
given model conforms to a set of properties. We use the NuSMV model checker to
verify BPaaS configurations against the temporal logic forms of conversation rules
and transactional requirements. Our verification uses the symbolic BDD-based
model checking feature of NuSMV. This constructs BDDs from the input model to
apply several verification techniques, including fair CTL model checking and LTL
model checking (by an algorithm that reduces the problem to CTL model
checking). We use NuSMV as it provides support for properties formulated in both
LTL and CTL. As model checking is an exhaustive technique, it is subject to the
state space explosion problem, in which the state space of the system under
verification increases exponentially in relation to the number of processes and
variables. This greatly impacts verification time and feasibility for complex
models. Therefore, prior to verifying BPaaS configurations, we aim to reduce their
state space as much as possible.
The first step in our performance analysis is to verify the impact each individual
temporal logic template has on model checking performance. Table 5 shows the
verification time for minimal Kripke structures, as generated by our Kripke
structure reduction algorithm, against one requirement specified using each
template. The Scope variable required by every template is set to Global in each
test in order to obtain an even comparison. These results indicate that the templates
with the greatest model checking performance demand are Compensate Success,
Alternative, NonRetriablePivot, and Compensation. Our evaluation utilizes these
templates in an even ratio.
In recent years, cloud services have had dramatic impacts in both the research and
industry landscapes of service-oriented computing. Cloud computing has become a
popular paradigm for delivering a wide range of services, such as software
applications, computing capacity, storage, and virtual platforms. Cloud service
providers can offer these utilities to clients over the Internet in a pay-by-use
manner. The distinctive properties of cloud services include: On-demand
availability through public or private network access, most commonly the Internet.
Utilization of pooled resources such as servers, applications, CPU time, or storage.
Dynamic response to workload by elastically provisioning and releasing resources.
Configurability of service behavior of properties to meet individual client
requirements. The traditional hierarchy of cloud service types is comprised of three
layers, where each layer can provide the base (infrastructure or platform) for
running services within the layer above. Infrastructure as a Service (IaaS) is the
bottom service layer, providing access to virtualized physical resources.