Junjun Zheng
Hiroshima University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Junjun Zheng.
autonomic and trusted computing | 2012
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
This paper presents component importance analysis of virtualized system design. The component importance analysis is significant to develop a trusted system in its design phase. This paper discusses the importance of components from the viewpoint of availability. Specifically, based on the fault tree and continuous-time Markov chain models for virtualized system in Kim et al. (2009), we present a new method to evaluate component importance. In numerical examples, we illustrate quantitative importance analysis and compare the availabilities of non-virtualized and virtualized system designs.
IEEE Transactions on Reliability | 2017
Junjun Zheng; Hiroyuki Okamura; Lin Li; Tadashi Dohi
Software rejuvenation is one of the proactive fault management techniques to prevent system performance degradation, which may lead to the system failure caused by software aging. In the design of software rejuvenation, it is important to determine the optimal timing of triggering the rejuvenation in terms of the system overhead. In this paper, we consider six software rejuvenation policies, which are categorized into time-based and workload-based policies, under the environment where the arrival stream of system follows a Markovian arrival process (MAP). After building the stochastic models with respective rejuvenation policies, we formulate the loss probability of transaction and the upper bound of mean response time as the system performance indices. In the numerical illustrations, we exhibit a comprehensive study to compare six software rejuvenation policies numerically and show that the proposed rejuvenation policies called wait-time policies are superior to the others under the MAP arrival stream.
symposium on reliable distributed systems | 2017
Hiroyuki Okamura; Junjun Zheng; Tadashi Dohi
This paper considers the statistical approach to model software degradation process from time series data of system attributes. We first develop the continuous-time Markov chain (CTMC) model to represent the degradation level of system. By combining the CTMC with system attributes distributions, a continuous-time hidden Markov model (CT-HMM) is proposed as the basic model to represent the degradation level of system. To estimate model parameters, we develop the EM algorithm for CT-HMM. The advantage of this modeling is that the estimated model is directly applied to existing CTMC-based software aging and rejuvenation models. In numerical experiments, we exhibit the performance of our method by simulated data and also demonstrate estimating the software degradation process with experimental data in MySQL database system.
international conference on distributed computing systems workshops | 2016
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
Computer systems face the threat of deliberate security intrusions due to malicious attacks that exploit security holes or vulnerabilities. In practice, these security holes or vulnerabilities still remain in the system and applications even if developers carefully execute system testing. Thus it is necessary and important to develop the mechanism to prevent and/or tolerate security intrusions. As a result, the computer systems are often evaluated with confidentiality, integrity and availability (CIA) criteria from the viewpoint of security, and security is treated as a QoS (Quality of Service) attribute at par with other QoS attributes such as capacity and performance. In this paper, we present the method for quantifying a security attribute called mean time to security failure (MTTSF) of a VM-based intrusion tolerant system based on queueing theory.
pacific rim international symposium on dependable computing | 2015
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
Component importance analysis is to measure the effect on system reliability of component reliabilities, and it can be used to the design of system from the reliability point of view. In this paper, we consider the component importance analysis of real-time computing systems in the presence of common-cause failures (CCFs) (i.e., failure dependencies). Although the CCFs are known as a risk factor of degradation of system reliability, it is difficult to evaluate the component importance measures in the presence of CCFs analytically. This paper introduces a continuous-time Markov chain (CTMC) model for real-time computing system, and applies the CTMC-based component-wise sensitivity analysis which can evaluate the component importance measures without any structure function of system. Also, in numerical experiments, we evaluate the effect of CCFs by the comparison of system performance measures and component importance in the case of system with CCFs with those in the case that there is no CCF in the system.
Reliability Engineering & System Safety | 2018
Tadashi Dohi; Junjun Zheng; Hiroyuki Okamura; Kishor S. Trivedi
Abstract Software aging often affects the performance of software systems and may eventually cause them to fail. A complementary approach to handle transient software failures due to the software aging is called software rejuvenation. It is a preventive and proactive solution that is particularly useful for counteracting the phenomenon of software aging. In this paper, we consider the optimal software rejuvenation policies maximizing the interval reliability using the Markov regenerative process formalism. We derive analytically the optimal software rejuvenation timing that maximizes the limiting interval reliability or the interval reliability with exponentially distributed operation time. Further, we examine numerically the transient behavior of the interval reliability at an arbitrary operation time. Our results under the interval reliability criteria are extensions of some earlier papers, since the interval reliability is a comprehensive measure that specializes to pointwise system availability and to system reliability.
international symposium on computing and networking | 2016
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
Computer security has become an increasingly important hot topic in computer and communication industry, since it is important to support critical business process and to protect personal and sensitive information. Computer security is to keep security attributes (confidentiality, integrity and availability) of computer systems, which face the threats such as deny-of-service (DoS), virus and intrusion. To ensure high computer security, the intrusion tolerance technique based on fault-tolerant scheme has been widely applied. This paper presents the quantitative performance evaluation of a virtual machine (VM) based intrusion tolerant system. Concretely, two security measures are derived; MTTSF (mean time to security failure) and the effective traffic intensity. The mathematical analysis is achieved by using Laplace-Stieltjes transforms according to the analysis of M/G/1 queueing system.
IEICE Transactions on Information and Systems | 2015
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
Applied Mathematics-a Journal of Chinese Universities Series B | 2015
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
computer software and applications conference | 2018
Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi
Collaboration
Dive into the Junjun Zheng's collaboration.
Rajendra Memorial Research Institute of Medical Sciences
View shared research outputs