SlideShare a Scribd company logo
Dynamic Monitoring of
 Composed Services

               Muhammad Asim

 School of Computing and Mathematical Sciences
         Liverpool John Moores University
Agenda

   Composed Services with Dynamic behavior?
   Aniketos Project
   BPMN with Activiti engine
   Proposed Framework
   Future Work
   Questions
Composed Services with Dynamic
behavior?
   A composite service is an aggregation of
    multiple sub-services or service components
    (Atomic or compositions themselves).

   A fundamental concepts in Service Oriented
    Architectures (SOA).

   SOAs allow software components from different
    providers to be exported as services for external
    use.
Composed Services with Dynamic
behavior?
Service   descriptions (including both functional and non-


A   service composer is responsible for constructing service


Service   discovery is based on matching user requirements
Composed Services with Dynamic
behavior?
   Typically, service composers will have different needs
    and different requirements.

   It important to ensure that a service should deliver what
    it promises and should match the user’s expectations

   However, SOA-based applications are highly dynamic
    and liable to change heavily at runtime.
Aniketos1 Project
   Aniketos project is an EU research project that
    addresses trustworthy and secure service compositions
    with run-time monitoring and adaptation of services.

   Among the challenges is the monitoring of services at
    runtime to ensure that services behave as promised.

   The proposed monitoring framework that is based on the
    runtime monitoring of a service to ensure that the service
    behaves in compliance with a pre-defined security policy.




          1
              Aniketos is a collaborative project funded under the EU 7th Research
               Framework Programme (FP7/2007-2013) under grant no 257930
BPMN & Activiti engine
   BPMN used as a modelling notation for business
    process

   BPMN transformation into BPEL (Business Process
    Execution Language)
       Result in ambiguities and unexpected result


   BPMN 2.0 standard with Activiti engine
       Provide a standard for both business process modelling and
        implementing a process execution model
       Both business oriented people and developer speak with the
        same vocabulary
       Avoid ambiguities
Proposed Monitoring Framework

                                             Interface    Monitoring Rules
                                                          Repository


                                    Events

  BPMN              Execution                    Event
  Process           Listener                                        Analyzer
                                                Manager


  Activiti Engine

                                                          Monitoring
                                                           Policy
                                 Service
                                Composer



                                                                       Notification
Proposed Monitoring Framework
   The Activiti engine with the help of Execution Listeners
    throws events for the deployed BPMN process.
         BPMN construct   Event type             Description




         Process          Start and end          A start and end event of a process instance



         Activity         Start and end          A start and end execution listener of an activity



         Transition       Take                   A transition execution listener can catch a take transition
                                                 event



         User task        Create, assignment &   A user task throws events when the task assignment has
                          complete               been performed
Proposed Monitoring Framework
   Event Manager: This module gathers the events coming
    from the Activiti engine and passes them to the Analyzer.

   Monitoring policy: A set of requirements that specify
    what to monitor for a particular BPMN process.
       ConSpec to specify the monitoring policy.
       A policy written in ConSpec is easily understandable by humans
        and the simplicity of the language allows a comparatively simple
        semantics.
       This will enable the service composer to easily specify the
        monitoring requirements for their processes and monitor them
        using this framework.
Proposed Monitoring Framework
   Monitoring Pattern Repository: Holds definitions for
    monitoring patterns, which are predefined.

   Analyzer: Upon receiving events from the Event
    Manager, it analyses them by accessing patterns from
    the repository. It uses the monitoring policy to select the
    appropriate monitoring patterns for a particular process.

   Interface: This is used to specify definitions for
    monitoring patterns using monitoring IDs.
   Notification Module: This is mainly used by the
    Analyzer to report any violations.
FUTURE WORK
   Implementation of our proposed framework for some real
    life scenarios.

   To integrate and implement the language ConSpec in
    our framework for specifying the monitoring policy.
Thank you
   Any Question / Suggestions / Comments ?

More Related Content

Viewers also liked

What Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industryWhat Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industry
blackhaj
 
Christmas In July
Christmas In JulyChristmas In July
Christmas In July
reesmorgan
 
Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85
Sopha Mustafa
 
Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012
reesmorgan
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
Aniketos EU FP7 Project
 
Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
Aniketos EU FP7 Project
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Aniketos EU FP7 Project
 
Panduan penyediaan rp
Panduan penyediaan rpPanduan penyediaan rp
Panduan penyediaan rpSopha Mustafa
 
Smm 2015 exercise 2
Smm 2015   exercise 2Smm 2015   exercise 2
Smm 2015 exercise 2
Lester Lasrado
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
Aniketos EU FP7 Project
 
globalisasi
globalisasiglobalisasi
globalisasi
Sopha Mustafa
 

Viewers also liked (12)

Animation
AnimationAnimation
Animation
 
What Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industryWhat Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industry
 
Christmas In July
Christmas In JulyChristmas In July
Christmas In July
 
Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85
 
Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
 
Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
 
Panduan penyediaan rp
Panduan penyediaan rpPanduan penyediaan rp
Panduan penyediaan rp
 
Smm 2015 exercise 2
Smm 2015   exercise 2Smm 2015   exercise 2
Smm 2015 exercise 2
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
 
globalisasi
globalisasiglobalisasi
globalisasi
 

Similar to Dynamic monitoring of composed services

Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
wwwally
 
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
scalaconfjp
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
guest76d50b
 
Event-Driven Service-oriented Architecture (EDSOA)
Event-Driven Service-oriented Architecture (EDSOA)Event-Driven Service-oriented Architecture (EDSOA)
Event-Driven Service-oriented Architecture (EDSOA)
Attune Infocom Pvt Ltd
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
SpagoWorld
 
Correlation Architecture
Correlation ArchitectureCorrelation Architecture
Correlation Architecture
sboray
 
Enabling predictive analysis in service oriented BPM solutions.
Enabling predictive analysis in service oriented BPM solutions.Enabling predictive analysis in service oriented BPM solutions.
Enabling predictive analysis in service oriented BPM solutions.
Mindtree Ltd.
 
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
wwwally
 
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what...
Techdays 2013   managing your hybrid cloud datacenter with scom 2012 and what...Techdays 2013   managing your hybrid cloud datacenter with scom 2012 and what...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what...
CompuTrain. De IT opleider.
 
Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012
Microsoft TechNet - Belgium and Luxembourg
 
Service Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with IstioService Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with Istio
Michelle Holley
 
Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud
Microsoft TechNet - Belgium and Luxembourg
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
wwwally
 
Using Service Discovery and Service Proxy
Using Service Discovery and Service ProxyUsing Service Discovery and Service Proxy
Using Service Discovery and Service Proxy
IBM
 
SV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptxSV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptx
CAIKYPALLETAMOURALIM
 
SAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA EventSAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA Event
Sebastian Scholze
 
The New Frontier For Business Agility Intelligent Bpm
The New Frontier For Business Agility   Intelligent BpmThe New Frontier For Business Agility   Intelligent Bpm
The New Frontier For Business Agility Intelligent Bpm
Nat Evans
 
Event Driven Microservices Presentation.
Event Driven Microservices Presentation.Event Driven Microservices Presentation.
Event Driven Microservices Presentation.
Knoldus Inc.
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
Dubravko Marak
 
Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services: Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services:
Dr. Fahad Aijaz
 

Similar to Dynamic monitoring of composed services (20)

Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
Monitoring Reactive Architecture Like Never Before / 今までになかったリアクティブアーキテクチャの監視...
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
 
Event-Driven Service-oriented Architecture (EDSOA)
Event-Driven Service-oriented Architecture (EDSOA)Event-Driven Service-oriented Architecture (EDSOA)
Event-Driven Service-oriented Architecture (EDSOA)
 
Spagic3 Presentation En
Spagic3 Presentation EnSpagic3 Presentation En
Spagic3 Presentation En
 
Correlation Architecture
Correlation ArchitectureCorrelation Architecture
Correlation Architecture
 
Enabling predictive analysis in service oriented BPM solutions.
Enabling predictive analysis in service oriented BPM solutions.Enabling predictive analysis in service oriented BPM solutions.
Enabling predictive analysis in service oriented BPM solutions.
 
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...
 
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what...
Techdays 2013   managing your hybrid cloud datacenter with scom 2012 and what...Techdays 2013   managing your hybrid cloud datacenter with scom 2012 and what...
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what...
 
Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012
 
Service Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with IstioService Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with Istio
 
Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
 
Using Service Discovery and Service Proxy
Using Service Discovery and Service ProxyUsing Service Discovery and Service Proxy
Using Service Discovery and Service Proxy
 
SV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptxSV Training Intro - 20181129 4.pptx
SV Training Intro - 20181129 4.pptx
 
SAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA EventSAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA Event
 
The New Frontier For Business Agility Intelligent Bpm
The New Frontier For Business Agility   Intelligent BpmThe New Frontier For Business Agility   Intelligent Bpm
The New Frontier For Business Agility Intelligent Bpm
 
Event Driven Microservices Presentation.
Event Driven Microservices Presentation.Event Driven Microservices Presentation.
Event Driven Microservices Presentation.
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
 
Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services: Asynchronous Mobile Web Services:
Asynchronous Mobile Web Services:
 

Recently uploaded

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Dynamic monitoring of composed services

  • 1. Dynamic Monitoring of Composed Services Muhammad Asim School of Computing and Mathematical Sciences Liverpool John Moores University
  • 2. Agenda  Composed Services with Dynamic behavior?  Aniketos Project  BPMN with Activiti engine  Proposed Framework  Future Work  Questions
  • 3. Composed Services with Dynamic behavior?  A composite service is an aggregation of multiple sub-services or service components (Atomic or compositions themselves).  A fundamental concepts in Service Oriented Architectures (SOA).  SOAs allow software components from different providers to be exported as services for external use.
  • 4. Composed Services with Dynamic behavior? Service descriptions (including both functional and non- A service composer is responsible for constructing service Service discovery is based on matching user requirements
  • 5. Composed Services with Dynamic behavior?  Typically, service composers will have different needs and different requirements.  It important to ensure that a service should deliver what it promises and should match the user’s expectations  However, SOA-based applications are highly dynamic and liable to change heavily at runtime.
  • 6. Aniketos1 Project  Aniketos project is an EU research project that addresses trustworthy and secure service compositions with run-time monitoring and adaptation of services.  Among the challenges is the monitoring of services at runtime to ensure that services behave as promised.  The proposed monitoring framework that is based on the runtime monitoring of a service to ensure that the service behaves in compliance with a pre-defined security policy.  1 Aniketos is a collaborative project funded under the EU 7th Research Framework Programme (FP7/2007-2013) under grant no 257930
  • 7. BPMN & Activiti engine  BPMN used as a modelling notation for business process  BPMN transformation into BPEL (Business Process Execution Language)  Result in ambiguities and unexpected result  BPMN 2.0 standard with Activiti engine  Provide a standard for both business process modelling and implementing a process execution model  Both business oriented people and developer speak with the same vocabulary  Avoid ambiguities
  • 8. Proposed Monitoring Framework Interface Monitoring Rules Repository Events BPMN Execution Event Process Listener Analyzer Manager Activiti Engine Monitoring Policy Service Composer Notification
  • 9. Proposed Monitoring Framework  The Activiti engine with the help of Execution Listeners throws events for the deployed BPMN process. BPMN construct Event type Description Process Start and end A start and end event of a process instance Activity Start and end A start and end execution listener of an activity Transition Take A transition execution listener can catch a take transition event User task Create, assignment & A user task throws events when the task assignment has complete been performed
  • 10. Proposed Monitoring Framework  Event Manager: This module gathers the events coming from the Activiti engine and passes them to the Analyzer.  Monitoring policy: A set of requirements that specify what to monitor for a particular BPMN process.  ConSpec to specify the monitoring policy.  A policy written in ConSpec is easily understandable by humans and the simplicity of the language allows a comparatively simple semantics.  This will enable the service composer to easily specify the monitoring requirements for their processes and monitor them using this framework.
  • 11. Proposed Monitoring Framework  Monitoring Pattern Repository: Holds definitions for monitoring patterns, which are predefined.  Analyzer: Upon receiving events from the Event Manager, it analyses them by accessing patterns from the repository. It uses the monitoring policy to select the appropriate monitoring patterns for a particular process.  Interface: This is used to specify definitions for monitoring patterns using monitoring IDs.  Notification Module: This is mainly used by the Analyzer to report any violations.
  • 12. FUTURE WORK  Implementation of our proposed framework for some real life scenarios.  To integrate and implement the language ConSpec in our framework for specifying the monitoring policy.
  • 13. Thank you  Any Question / Suggestions / Comments ?