SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Smart Computing and Information Technology
2021, Vol. 2, No. 1, pp. 24–28
Copyright © 2021 BOHR Publishers
www.bohrpub.com
A Practical Fault Tolerance Approach in Cloud Computing Using
Support Vector Machine
Gajendra Sharma
Department of Computer Science and Engineering, Kathmandu University, Dhulikhel-8, Kavre, Nepal
E-mail: gajendra.sharma@ku.edu.np
Abstract. Fault tolerance is an important issue in the field of cloud computing which is concerned with the tech-
niques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning.
Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a sys-
tematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The
purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm
to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine
learning algorithm with cloud computing.
Keywords: Cloud computing, fault tolerance, proactive, support vector machine.
1 Introduction
Cloud computing is a widely adopted technology by the
industry. It is a style of computing where it’s end used are
provided with a services through the internet using differ-
ent models and layers of abstraction as pay-per-use basis.
The services provided by the cloud computing has been
divided as:
(a) Software-as-a-Service (SaaS)
(b) Platform-as-a-service (PaaS)
(c) Infrastructure-as-a-Service (IaaS)
With the increasing maturity of cloud computing there
is also increase in the research regarding the issues like
fault tolerance, workflow scheduling, workflow manage-
ment, security. Fault tolerance is one of the key factors that
may encounter in several communication and computer
networks [4, 5]. It is related to entire techniques required
to enable a system to tolerate software faults. A fault is a
defect or flaw that occurs in some hardware or software
component. In the traditional software fault classification
is dividing fault into hardware fault and software fault. In
cloud computing system the hardware fault and software
fault are further classified. General hierarchy of the fault
classification is shown in the Figure 1.
The main concern of the fault tolerance is to assure relia-
bility and availability of sensitive services and application
Figure 1. Classification of Fault Sources. Source: [1].
execution by reducing the failure influence on the system
as well as application execution [6, 7]. The fault should
be anticipated and carefully handled. As such fault toler-
ance technique is to predict failures and take suitable action
before failures occur.
Fault tolerance techniques
Depending upon when to apply the fault tolerance tech-
niques Fault tolerance has been classified as [8]:
(a) Proactive fault tolerance:
This is an important technique which predicts the fault
and eliminate recovery from faults and failure by substitut-
ing the alleged component. It is able to detect the problem
before it arises. This is a perception preventing compute
24
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 25
node failures from running parallel application by pre-
emptively migration parts of an application.
(b) Reactive fault tolerance:
This mechanism enable to reduce the effort of failures,
when the failure takes place. Reactive fault tolerance tech-
nique facilitates system more robust or on-demand fault
tolerance.
(c) Adaptive fault tolerance:
The fault-tolerance of an application depending on its
existing position and the range of control inputs can be
applied efficiently. Therefore in adaptive fault tolerance
entire procedures are performed automatically as per the
condition. It can guarantee reliability of critical modules,
under resources constraints and temporal by allocating
redundancy to less critical modules. It can be affordable
minimizing resource requirement.
Objectives
This paper aims to develop a systematic solution to
improve the predictability of the fault tolerant system in
cloud computing environment using the machine learn-
ing approach which has been proved to be a well-adapted
model on different domains.
Statement of the problem
Using the reactive Fault tolerant technique increases the
clock execution time of the system. While rule based fault
detection may underfit the problem and the model based
system are generally complex and computationally inten-
sive which requires a large amount of skilled work to
develop a model for particular system.
A systematic solution is required to improve the observ-
ability of the system, machine learning algorithm like
Support vector Machine may be well efficient solution to
solve this particular issue.
The paper is organized as follows: Section 2 presents
the related works where the various existing techniques
have been pointed as well as a comparison chart is pro-
vided to provide an analytical view; Section 3 presents the
proposed Proactive Fault tolerance Framework; Section 4
shows a detailed illustration of how proposed technique
works; Section 5 concludes the paper along with the future
works.
2 Related Works
Various fault tolerance are currently prevalent in clouds
[2, 8, 9].
Check pointing: In check pointing after doing a change in
system a checkpoint is created. Whenever a task fails the
job is restarted from the recently added checkpoint.
Job Migration: If the job cannot be executed on a particular
machine then it is migrated to another machine where it
can be continued.
Replication: It permits several copies of tasks to run dif-
ferent resources for the effective implementation and for
receiving the expected result.
Self-Healing: Different instances of an application are
allowed to run virtual machines and failure of instances
which are handled repeatedly.
Safety-bag checks: The command does not meet the safety
properties and likely to vulnerable are blocked.
S-Guard: This is less turbulent to normal stream process-
ing and is based on rollback recovery.
Retry: This retires the failed task on the identical resource
to be implemented repeatedly.
Task Resubmission: The task is resubmitted either to the
similar or different resource for execution whenever a
failed task is detected
Timing Check: This technique with critical function can be
performed by watch dog.
Rescue workflow: It facilitates the workflow to continue
until it becomes unimaginable to move forward without
catering the failed task.
Software Rejuvenation: It allows the frequent reboots of
the system. It assists the system to clean start and fresh
start.
Preemptive Migration: This is regularly monitored and
analyzed using feedback-loop control appliance.
Masking: A new state is recognized as transformed state
after employment of error recovery. If this process applied
thoroughly in the absence of effective error provide the
user error masking.
Reconfiguration: Faulty element form the system is
removed.
Resource Co-allocation: Resource is allocated for execu-
tion of task.
User specific exception handling: User defines the treat-
ment for a task on its failure.
Based upon these techniques a number of models are
implemented. Table 1 summarizes different models based
on protection against fault and procedure.
3 Framework
A general framework for a fault tolerant system is given
below that consist of different modules with different
special tasks:
26 Gajendra Sharma
Table 1. Comparison among various models based on protection against the type of fault, and procedure [3].
Model no Model name Protection against type of fault Applied procedure for tolerate the fault
M1 AFTRC Reliability 1. Delete node depending on their
reliability
2. Back word recovery with the help of
check pointing
M2 LLFT Crash-cost, trimming fault Replication
M3 FTWS Dead line of work flow Replication and resubmission of jobs
M4 FTM Reliability, availability, on demand service Replication users application and in the
case of replica failure use algorithm like
gossip based protocol.
M5 CANDY Availability 1. It assembles the model components
generated from IBD and STM according
to allocation notation.
2. Then activity SNR is synchronized to
system SRN by identifying the
relationship between action in activity
SNR and state transition in system SRN.
M6 VEGA-WARDEN Usability, security, scaling 1. Two layer authentication and standard
technical solution for the application.
M7 FT-CLOUD Reliability, crash and value fault 1. Significant component is determined
based on the ranking.
2. Optimal ft technique is determined.
M8 MAGI-CUBE Performance, reliability, low storage cost 1. Source file is encoded in then splits to
save as a cluster.
2. File recovery procedure is triggered is
the original file is lost.
Figure 2. Framework for proactive fault tolerance system.
Node monitoring module
It is equipped with the lm-sensors which is used to evalu-
ate the system affecting parameters that is used for forecast
as an attributes along with the prediction model that have
been purposed in this study.
Node monitoring module monitors:
(a) CPU temperature,
(b) Fan speed
(c) Memory consumption
(d) MIPS usage
(e) Response time
(f) Average rate of node load.
Failure predictor
Failure predictor module is run in each node. It uses the
model trained using support vector machine algorithm to
predict to failure. Model is trained by using the log cap-
tured in the past and with some seed values. The parame-
ters captured by the node monitoring modules are used as
input by the model which are used for predictions [10, 11].
Proactive fault tolerance policy
The objectives of this module is to decrease the influence
of failure of the execution. The policies that will be imple-
mented by proposed architecture are:
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 27
(a) Detect the addition node.
(b) Leave the unhealthy node
(c) Set the alarm to inform the administrator to take an
action.
The log is maintained by noting the incident of happen-
ing of fault.
Controller module
Controller module is the one that implements the policies
listed above. In every node controller module is installed.
This node is responsible for the action to be performed by
the node that is about to fail [12]. Once the fault in the sys-
tem is predicted by the model the controller module takes
an action based upon the policies and record the incident
in the log table.
4 Method Development
The proposed system acts on following 3 steps:
(a) Capturing data
Data sensed through the lm-sensor are captured. These
data are further used as an input.
(b) Monitoring system
Monitoring task is performed by the failure predictor
module. This module is built by using Support Vector
Machine
Support vector machine
Support vector machine is the one of the well-known
supervised approaches. This is usually used for the classi-
fication purpose. Support Vector Machine divides the data
provided by the hyper plane. Using Support vector model
involves following two phases:
Training phase
As being the supervised learning Support Vector Machine
first need to be trained. Different instances are captured
form the log table and using seed value and are labelled
in to two classes:
(a) Normal
(b) Fault
These instances are further used for training the model.
Once the model is trained it is tested using different testing
methods like cross-validation test.
Optimal Hyper Plane separating Fault and Normal
Deployment phase
The trained and tested model is implemented and used for
the purpose of prediction. Model takes the data captured
in step a) and then predict the class for the data. If the pre-
dicted data class is found to be Fault the alarm is set.
Handling the predicted fault
Once the occurrence of fault is predicted the controller
module takes an appropriate action based upon the poli-
cies set and maintain the log.
5 Conclusion
Fault tolerance is popular research domain in security and
networking including cloud computing. Fault tolerance is
significant issue that required to maintain the stability of
the system. Early detection of the fault helps to minimize
the risk associated with the fault. Machine learning algo-
rithm has been found to be milestone for the purpose
of prediction. The power of machine learning algorithm
like Support Vector Machine can be implemented in the
cloud. Here in this paper a conceptual view to implement
support vector machine for the purpose of proacitve detec-
tion of fault has been discussed. This task can be further
improved by performing the experiment and comparing
with other machine learning algorithms like Naïve Bayes,
Logistic Regression. It can also be tweaked by using differ-
ent parameters.
References
[1] Y. Jiang, J. Huang, J. Ding and Y. Liu, “Method of Fault Detection in
Cloud Computing Systems,” International Journal of Grid Distribution
Computing, vol. 7, pp. 205–212, 2014.
[2] P. K. Patra, H. Singh and G. Singh, “Fault Tolerance Techniques and
Comparative Implementation in Cloud Computing (0975-8887),”
International Journal of Computer Application, vol. 64, no. February
2013.
[3] P. Egwutuoha, S. Chen, D. Levy, B. Selic and R. Calvo, “A Proactive
Fault Tolerance Approach to High Performance Computing (HPC)
in the Cloud,” in Second International Conference on Cloud and Green
Computing, 2012.
[4] Bala and C. Inderveer, “Fault Tolerance-Challenges, Techniques and
Implementation in Cloud Computing,” IJCSI International Journal of
Computer Science, vol. 9, 2012.
[5] J.-C. Laprie, “Dependable computing and fault tolerance: concepts
and terminology”.
28 Gajendra Sharma
[6] Y. Gao, S. K. Gupta, Y. Wang and M. Pedram, “An Energy-Aware
Fault Tolerant Scheduling Framework for Soft Error Resilient Cloud
Computing Systems,” 2014.
[7] D. Meshram, A. Sambare and S. Zade, “Fault Tolerance Model for
Reliable Cloud Computing,” International Journal on Recent and Inno-
vation Trends in Computing and Communication, vol. 1, no. 7, 2013.
[8] Y. Guo, J. Wall, J. Li and S. West, “A Machine Learning Approach for
Fault Detection in Multivariable Systems”.
[9] R. Kaur and M. Mahajan, “Fault Tolerance in Cloud Computing”.
[10] W. Zhao, P. Melliar-Smith and L. Moser, “Fault Tolerance Middle-
ware for Cloud Computing,” in 2010 IEEE 3rd International Conference
on Cloud Computing, 2010.
[11] D. Poola, K. Ramamohanarao and R. Buyya, “Fault-Tolerant Work-
flow Scheduling Using Spot Instances on Clouds,” in ICCS 2014, 14th
International Conference on Computational Science, 2014.
[12] Y. Jiang, J. Huang, J. Ding and L. Yingli, “Method of Fault Detection
in Cloud Computing Systems,” in International Journal of Grid Distri-
bution Computing, 2014.

Más contenido relacionado

La actualidad más candente

Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2sush-sushma
 
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMDETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMEditor IJMTER
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20koolkampus
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault toleranceJabez Winston
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridEditor IJCATR
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReportabhishekroushan
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013Ian Sommerville
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONIJNSA Journal
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMcscpconf
 
Real Time Software Design in Software Engineering SE13
Real Time Software Design in Software Engineering SE13Real Time Software Design in Software Engineering SE13
Real Time Software Design in Software Engineering SE13koolkampus
 

La actualidad más candente (17)

Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2Softwarearchitecture in practice unit1 2
Softwarearchitecture in practice unit1 2
 
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCMDETECTING NETWORK ANOMALIES USING CUSUM and FCM
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
 
Ecbs2000
Ecbs2000Ecbs2000
Ecbs2000
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20Defect Testing in Software Engineering SE20
Defect Testing in Software Engineering SE20
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault tolerance
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the Grid
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
 
Ch8.testing
Ch8.testingCh8.testing
Ch8.testing
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSIONMULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
MULTI-LAYER CLASSIFIER FOR MINIMIZING FALSE INTRUSION
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEM
 
Real Time Software Design in Software Engineering SE13
Real Time Software Design in Software Engineering SE13Real Time Software Design in Software Engineering SE13
Real Time Software Design in Software Engineering SE13
 

Similar a A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine

Simulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemSimulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemTELKOMNIKA JOURNAL
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESijcsit
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...ijccmsjournal
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveywww.pixelsolutionbd.com
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Riskssipij
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsEditor IJCATR
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...Neelamani Samal
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...vtunotesbysree
 
Ch 5- Achieving Qualities
Ch 5- Achieving QualitiesCh 5- Achieving Qualities
Ch 5- Achieving QualitiesAsmat Zahra
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computingKruthikka Palraj
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methodsunyil96
 
A Brief Review Of Approaches For Fault Tolerance In Distributed Systems
A Brief Review Of Approaches For Fault Tolerance In Distributed SystemsA Brief Review Of Approaches For Fault Tolerance In Distributed Systems
A Brief Review Of Approaches For Fault Tolerance In Distributed SystemsIRJET Journal
 

Similar a A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine (20)

Simulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemSimulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors system
 
Failure Free Cloud Computing Architectures
Failure Free Cloud Computing ArchitecturesFailure Free Cloud Computing Architectures
Failure Free Cloud Computing Architectures
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Risks
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
 
Ch13
Ch13Ch13
Ch13
 
92 494
92 49492 494
92 494
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Ch13.pptx
Ch13.pptxCh13.pptx
Ch13.pptx
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
Ch 5- Achieving Qualities
Ch 5- Achieving QualitiesCh 5- Achieving Qualities
Ch 5- Achieving Qualities
 
fault tolerance management in cloud computing
fault tolerance management in cloud computingfault tolerance management in cloud computing
fault tolerance management in cloud computing
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
 
A Brief Review Of Approaches For Fault Tolerance In Distributed Systems
A Brief Review Of Approaches For Fault Tolerance In Distributed SystemsA Brief Review Of Approaches For Fault Tolerance In Distributed Systems
A Brief Review Of Approaches For Fault Tolerance In Distributed Systems
 

Más de BOHR International Journal of Smart Computing and Information Technology

Más de BOHR International Journal of Smart Computing and Information Technology (10)

The Usage of E-Learning Challenges in the Namibia Educational Institutions: A...
The Usage of E-Learning Challenges in the Namibia Educational Institutions: A...The Usage of E-Learning Challenges in the Namibia Educational Institutions: A...
The Usage of E-Learning Challenges in the Namibia Educational Institutions: A...
 
An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...
An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...
An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...
 
The Importance of ICTs on Service Delivery at MTC, Namibia
The Importance of ICTs on Service Delivery at MTC, NamibiaThe Importance of ICTs on Service Delivery at MTC, Namibia
The Importance of ICTs on Service Delivery at MTC, Namibia
 
National COVID-19 Health Contact Tracing and Monitoring System: A Sustainable...
National COVID-19 Health Contact Tracing and Monitoring System: A Sustainable...National COVID-19 Health Contact Tracing and Monitoring System: A Sustainable...
National COVID-19 Health Contact Tracing and Monitoring System: A Sustainable...
 
Enabling Semantic Interoperability of Regional Trends of Disease Surveillance...
Enabling Semantic Interoperability of Regional Trends of Disease Surveillance...Enabling Semantic Interoperability of Regional Trends of Disease Surveillance...
Enabling Semantic Interoperability of Regional Trends of Disease Surveillance...
 
Mobility of ICT Services in Namibian Institutions: A Literature Review
Mobility of ICT Services in Namibian Institutions: A Literature ReviewMobility of ICT Services in Namibian Institutions: A Literature Review
Mobility of ICT Services in Namibian Institutions: A Literature Review
 
IOT Air Pollution Monitoring System (Live Location)
IOT Air Pollution Monitoring System (Live Location)IOT Air Pollution Monitoring System (Live Location)
IOT Air Pollution Monitoring System (Live Location)
 
Detecting Paraphrases in Marathi Language
Detecting Paraphrases in Marathi LanguageDetecting Paraphrases in Marathi Language
Detecting Paraphrases in Marathi Language
 
For Investment Geometric Problems
For Investment Geometric ProblemsFor Investment Geometric Problems
For Investment Geometric Problems
 
Different Ways of Solving a Geometric Task
Different Ways of Solving a Geometric TaskDifferent Ways of Solving a Geometric Task
Different Ways of Solving a Geometric Task
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine

  • 1. International Journal of Smart Computing and Information Technology 2021, Vol. 2, No. 1, pp. 24–28 Copyright © 2021 BOHR Publishers www.bohrpub.com A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine Gajendra Sharma Department of Computer Science and Engineering, Kathmandu University, Dhulikhel-8, Kavre, Nepal E-mail: gajendra.sharma@ku.edu.np Abstract. Fault tolerance is an important issue in the field of cloud computing which is concerned with the tech- niques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a sys- tematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing. Keywords: Cloud computing, fault tolerance, proactive, support vector machine. 1 Introduction Cloud computing is a widely adopted technology by the industry. It is a style of computing where it’s end used are provided with a services through the internet using differ- ent models and layers of abstraction as pay-per-use basis. The services provided by the cloud computing has been divided as: (a) Software-as-a-Service (SaaS) (b) Platform-as-a-service (PaaS) (c) Infrastructure-as-a-Service (IaaS) With the increasing maturity of cloud computing there is also increase in the research regarding the issues like fault tolerance, workflow scheduling, workflow manage- ment, security. Fault tolerance is one of the key factors that may encounter in several communication and computer networks [4, 5]. It is related to entire techniques required to enable a system to tolerate software faults. A fault is a defect or flaw that occurs in some hardware or software component. In the traditional software fault classification is dividing fault into hardware fault and software fault. In cloud computing system the hardware fault and software fault are further classified. General hierarchy of the fault classification is shown in the Figure 1. The main concern of the fault tolerance is to assure relia- bility and availability of sensitive services and application Figure 1. Classification of Fault Sources. Source: [1]. execution by reducing the failure influence on the system as well as application execution [6, 7]. The fault should be anticipated and carefully handled. As such fault toler- ance technique is to predict failures and take suitable action before failures occur. Fault tolerance techniques Depending upon when to apply the fault tolerance tech- niques Fault tolerance has been classified as [8]: (a) Proactive fault tolerance: This is an important technique which predicts the fault and eliminate recovery from faults and failure by substitut- ing the alleged component. It is able to detect the problem before it arises. This is a perception preventing compute 24
  • 2. A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 25 node failures from running parallel application by pre- emptively migration parts of an application. (b) Reactive fault tolerance: This mechanism enable to reduce the effort of failures, when the failure takes place. Reactive fault tolerance tech- nique facilitates system more robust or on-demand fault tolerance. (c) Adaptive fault tolerance: The fault-tolerance of an application depending on its existing position and the range of control inputs can be applied efficiently. Therefore in adaptive fault tolerance entire procedures are performed automatically as per the condition. It can guarantee reliability of critical modules, under resources constraints and temporal by allocating redundancy to less critical modules. It can be affordable minimizing resource requirement. Objectives This paper aims to develop a systematic solution to improve the predictability of the fault tolerant system in cloud computing environment using the machine learn- ing approach which has been proved to be a well-adapted model on different domains. Statement of the problem Using the reactive Fault tolerant technique increases the clock execution time of the system. While rule based fault detection may underfit the problem and the model based system are generally complex and computationally inten- sive which requires a large amount of skilled work to develop a model for particular system. A systematic solution is required to improve the observ- ability of the system, machine learning algorithm like Support vector Machine may be well efficient solution to solve this particular issue. The paper is organized as follows: Section 2 presents the related works where the various existing techniques have been pointed as well as a comparison chart is pro- vided to provide an analytical view; Section 3 presents the proposed Proactive Fault tolerance Framework; Section 4 shows a detailed illustration of how proposed technique works; Section 5 concludes the paper along with the future works. 2 Related Works Various fault tolerance are currently prevalent in clouds [2, 8, 9]. Check pointing: In check pointing after doing a change in system a checkpoint is created. Whenever a task fails the job is restarted from the recently added checkpoint. Job Migration: If the job cannot be executed on a particular machine then it is migrated to another machine where it can be continued. Replication: It permits several copies of tasks to run dif- ferent resources for the effective implementation and for receiving the expected result. Self-Healing: Different instances of an application are allowed to run virtual machines and failure of instances which are handled repeatedly. Safety-bag checks: The command does not meet the safety properties and likely to vulnerable are blocked. S-Guard: This is less turbulent to normal stream process- ing and is based on rollback recovery. Retry: This retires the failed task on the identical resource to be implemented repeatedly. Task Resubmission: The task is resubmitted either to the similar or different resource for execution whenever a failed task is detected Timing Check: This technique with critical function can be performed by watch dog. Rescue workflow: It facilitates the workflow to continue until it becomes unimaginable to move forward without catering the failed task. Software Rejuvenation: It allows the frequent reboots of the system. It assists the system to clean start and fresh start. Preemptive Migration: This is regularly monitored and analyzed using feedback-loop control appliance. Masking: A new state is recognized as transformed state after employment of error recovery. If this process applied thoroughly in the absence of effective error provide the user error masking. Reconfiguration: Faulty element form the system is removed. Resource Co-allocation: Resource is allocated for execu- tion of task. User specific exception handling: User defines the treat- ment for a task on its failure. Based upon these techniques a number of models are implemented. Table 1 summarizes different models based on protection against fault and procedure. 3 Framework A general framework for a fault tolerant system is given below that consist of different modules with different special tasks:
  • 3. 26 Gajendra Sharma Table 1. Comparison among various models based on protection against the type of fault, and procedure [3]. Model no Model name Protection against type of fault Applied procedure for tolerate the fault M1 AFTRC Reliability 1. Delete node depending on their reliability 2. Back word recovery with the help of check pointing M2 LLFT Crash-cost, trimming fault Replication M3 FTWS Dead line of work flow Replication and resubmission of jobs M4 FTM Reliability, availability, on demand service Replication users application and in the case of replica failure use algorithm like gossip based protocol. M5 CANDY Availability 1. It assembles the model components generated from IBD and STM according to allocation notation. 2. Then activity SNR is synchronized to system SRN by identifying the relationship between action in activity SNR and state transition in system SRN. M6 VEGA-WARDEN Usability, security, scaling 1. Two layer authentication and standard technical solution for the application. M7 FT-CLOUD Reliability, crash and value fault 1. Significant component is determined based on the ranking. 2. Optimal ft technique is determined. M8 MAGI-CUBE Performance, reliability, low storage cost 1. Source file is encoded in then splits to save as a cluster. 2. File recovery procedure is triggered is the original file is lost. Figure 2. Framework for proactive fault tolerance system. Node monitoring module It is equipped with the lm-sensors which is used to evalu- ate the system affecting parameters that is used for forecast as an attributes along with the prediction model that have been purposed in this study. Node monitoring module monitors: (a) CPU temperature, (b) Fan speed (c) Memory consumption (d) MIPS usage (e) Response time (f) Average rate of node load. Failure predictor Failure predictor module is run in each node. It uses the model trained using support vector machine algorithm to predict to failure. Model is trained by using the log cap- tured in the past and with some seed values. The parame- ters captured by the node monitoring modules are used as input by the model which are used for predictions [10, 11]. Proactive fault tolerance policy The objectives of this module is to decrease the influence of failure of the execution. The policies that will be imple- mented by proposed architecture are:
  • 4. A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 27 (a) Detect the addition node. (b) Leave the unhealthy node (c) Set the alarm to inform the administrator to take an action. The log is maintained by noting the incident of happen- ing of fault. Controller module Controller module is the one that implements the policies listed above. In every node controller module is installed. This node is responsible for the action to be performed by the node that is about to fail [12]. Once the fault in the sys- tem is predicted by the model the controller module takes an action based upon the policies and record the incident in the log table. 4 Method Development The proposed system acts on following 3 steps: (a) Capturing data Data sensed through the lm-sensor are captured. These data are further used as an input. (b) Monitoring system Monitoring task is performed by the failure predictor module. This module is built by using Support Vector Machine Support vector machine Support vector machine is the one of the well-known supervised approaches. This is usually used for the classi- fication purpose. Support Vector Machine divides the data provided by the hyper plane. Using Support vector model involves following two phases: Training phase As being the supervised learning Support Vector Machine first need to be trained. Different instances are captured form the log table and using seed value and are labelled in to two classes: (a) Normal (b) Fault These instances are further used for training the model. Once the model is trained it is tested using different testing methods like cross-validation test. Optimal Hyper Plane separating Fault and Normal Deployment phase The trained and tested model is implemented and used for the purpose of prediction. Model takes the data captured in step a) and then predict the class for the data. If the pre- dicted data class is found to be Fault the alarm is set. Handling the predicted fault Once the occurrence of fault is predicted the controller module takes an appropriate action based upon the poli- cies set and maintain the log. 5 Conclusion Fault tolerance is popular research domain in security and networking including cloud computing. Fault tolerance is significant issue that required to maintain the stability of the system. Early detection of the fault helps to minimize the risk associated with the fault. Machine learning algo- rithm has been found to be milestone for the purpose of prediction. The power of machine learning algorithm like Support Vector Machine can be implemented in the cloud. Here in this paper a conceptual view to implement support vector machine for the purpose of proacitve detec- tion of fault has been discussed. This task can be further improved by performing the experiment and comparing with other machine learning algorithms like Naïve Bayes, Logistic Regression. It can also be tweaked by using differ- ent parameters. References [1] Y. Jiang, J. Huang, J. Ding and Y. Liu, “Method of Fault Detection in Cloud Computing Systems,” International Journal of Grid Distribution Computing, vol. 7, pp. 205–212, 2014. [2] P. K. Patra, H. Singh and G. Singh, “Fault Tolerance Techniques and Comparative Implementation in Cloud Computing (0975-8887),” International Journal of Computer Application, vol. 64, no. February 2013. [3] P. Egwutuoha, S. Chen, D. Levy, B. Selic and R. Calvo, “A Proactive Fault Tolerance Approach to High Performance Computing (HPC) in the Cloud,” in Second International Conference on Cloud and Green Computing, 2012. [4] Bala and C. Inderveer, “Fault Tolerance-Challenges, Techniques and Implementation in Cloud Computing,” IJCSI International Journal of Computer Science, vol. 9, 2012. [5] J.-C. Laprie, “Dependable computing and fault tolerance: concepts and terminology”.
  • 5. 28 Gajendra Sharma [6] Y. Gao, S. K. Gupta, Y. Wang and M. Pedram, “An Energy-Aware Fault Tolerant Scheduling Framework for Soft Error Resilient Cloud Computing Systems,” 2014. [7] D. Meshram, A. Sambare and S. Zade, “Fault Tolerance Model for Reliable Cloud Computing,” International Journal on Recent and Inno- vation Trends in Computing and Communication, vol. 1, no. 7, 2013. [8] Y. Guo, J. Wall, J. Li and S. West, “A Machine Learning Approach for Fault Detection in Multivariable Systems”. [9] R. Kaur and M. Mahajan, “Fault Tolerance in Cloud Computing”. [10] W. Zhao, P. Melliar-Smith and L. Moser, “Fault Tolerance Middle- ware for Cloud Computing,” in 2010 IEEE 3rd International Conference on Cloud Computing, 2010. [11] D. Poola, K. Ramamohanarao and R. Buyya, “Fault-Tolerant Work- flow Scheduling Using Spot Instances on Clouds,” in ICCS 2014, 14th International Conference on Computational Science, 2014. [12] Y. Jiang, J. Huang, J. Ding and L. Yingli, “Method of Fault Detection in Cloud Computing Systems,” in International Journal of Grid Distri- bution Computing, 2014.