Techniques for safe and highly available cloud applications

Carla Ferreira

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Building trustworthy and highly available cloud applications is inherently complex and error-prone. Current industrial solutions are either ad-hoc solutions, relying heavily on the developerâĂŹs expertise, or use protocols that blindly restrict concurrency reducing performance and availability. We discusses sound techniques that leverage recent theoretical advances that either reduce or avoid coordinating the execution of operations, while enforcing the correctness of the application. To minimise coordination based on application-specific invariants, an analysis technique was developed that identifies which operations would be unsafe under concurrent execution. Given the set of problematic operations, the developer can then devise and formally check an optimized coordination protocol that guarantees the application invariants. Alternatively, coordination can be eschew altogether by extending operations with repair actions that ensure application invariants are always maintained. The modified operations preserve the original semantics when no conflicting updates occur. If a concurrent conflict occurs, we leverage conflict resolution policies to ensure a deterministic result that preserves the application invariants.

Original languageEnglish
Title of host publicationProceedings of the 6th Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC 2019
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9781450362764
DOIs
Publication statusPublished - 25 Mar 2019
Event6th Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC 2019 - Dresden, Germany
Duration: 25 Mar 2019 → …

Conference

Conference6th Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC 2019
CountryGermany
CityDresden
Period25/03/19 → …

Keywords

  • Consistency models
  • Replication
  • Verification

Fingerprint Dive into the research topics of 'Techniques for safe and highly available cloud applications'. Together they form a unique fingerprint.

Cite this