IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
ARRL: A Criterion for Composable Safety and Systems EngineeringVincenzo De Florio
While safety engineering standards define rigorous and controllable
processes for system development, safety standards’ differences in distinct
domains are non-negligible. This paper focuses in particular on the aviation,
automotive, and railway standards, all related to the transportation market.
Many are the reasons for the said differences, ranging from historical reasons,
heuristic and established practices, and legal frameworks, but also from the
psychological perception of the safety risks. In particular we argue that the
Safety Integrity Levels are not sufficient to be used as a top level requirement
for developing a safety-critical system. We argue that Quality of Service is a
more generic criterion that takes the trustworthiness as perceived by users better
into account. In addition, safety engineering standards provide very little
guidance on how to compose safe systems from components, while this is the
established engineering practice. In this paper we develop a novel concept
called Assured Reliability and Resilience Level as a criterion that takes the
industrial practice into account and show how it complements the Safety
Integrity Level concept.
Evolution of protective systems in petro chemGlen Alleman
Electrical protective or emergency shutdown systems are utilized
throughout the petrochemical industry for safety and to avoid severe environmental and/or economic events. Requirements
fur these critical systems are that they work every time, on demand, and do not initiate nuisance events. These requirements were difficult to achieve in most early systems but the systems have improved over the years. Emergency shutdown system design has been unregulated in the U.S., but new standards will require strict guidelines for design, application, docllmentation, and software testing and control.
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach
presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
ARRL: A Criterion for Composable Safety and Systems EngineeringVincenzo De Florio
While safety engineering standards define rigorous and controllable
processes for system development, safety standards’ differences in distinct
domains are non-negligible. This paper focuses in particular on the aviation,
automotive, and railway standards, all related to the transportation market.
Many are the reasons for the said differences, ranging from historical reasons,
heuristic and established practices, and legal frameworks, but also from the
psychological perception of the safety risks. In particular we argue that the
Safety Integrity Levels are not sufficient to be used as a top level requirement
for developing a safety-critical system. We argue that Quality of Service is a
more generic criterion that takes the trustworthiness as perceived by users better
into account. In addition, safety engineering standards provide very little
guidance on how to compose safe systems from components, while this is the
established engineering practice. In this paper we develop a novel concept
called Assured Reliability and Resilience Level as a criterion that takes the
industrial practice into account and show how it complements the Safety
Integrity Level concept.
Evolution of protective systems in petro chemGlen Alleman
Electrical protective or emergency shutdown systems are utilized
throughout the petrochemical industry for safety and to avoid severe environmental and/or economic events. Requirements
fur these critical systems are that they work every time, on demand, and do not initiate nuisance events. These requirements were difficult to achieve in most early systems but the systems have improved over the years. Emergency shutdown system design has been unregulated in the U.S., but new standards will require strict guidelines for design, application, docllmentation, and software testing and control.
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach
presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
A model of a system of managing information security of automated data
processing systems of critical application is offered in the article. The model allows to
evaluate the level of risk for the information security and provides support of
decision-making on the counteraction to the unauthorized access to the information
circulating in the information systems
Program Robustness is now more important than before, because of the role software programs play in our
life. Many papers defined it, measured it, and put it into context. In this paper, we explore the different
definitions of program robustness and different types of techniques used to achieve or measure it. There
are many papers about robustness. We chose the papers that clearly discuss program or software
robustness. These papers stated that program (or software) robustness indicates the absence of ungraceful
failures. There are different types of techniques used to create or measure a robust program. However,
there is still a wide space for research in this area.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
A model of a system of managing information security of automated data
processing systems of critical application is offered in the article. The model allows to
evaluate the level of risk for the information security and provides support of
decision-making on the counteraction to the unauthorized access to the information
circulating in the information systems
Program Robustness is now more important than before, because of the role software programs play in our
life. Many papers defined it, measured it, and put it into context. In this paper, we explore the different
definitions of program robustness and different types of techniques used to achieve or measure it. There
are many papers about robustness. We chose the papers that clearly discuss program or software
robustness. These papers stated that program (or software) robustness indicates the absence of ungraceful
failures. There are different types of techniques used to create or measure a robust program. However,
there is still a wide space for research in this area.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Petrobras pode ter contas bloqueadas se não pagar terceirizados da Refinaria ...Paulo Veras
As contas bancárias da Petrobras podem ser bloqueadas, através do sistema BancenJud, do Banco Central, caso a estatal não cumpra a decisão judicial de pagar, em até 48 horas, o valor correspondente às dívidas trabalhistas da empresa Alumini Engenharia, que atua na Refinaria Abreu e Lima (Rnest), em Ipojuca, na Região Metropolitana do Recife (RMR). Os trabalhadores da Alumini que atuam na Rnest reclamam de atraso no pagamento de salários e benefícios trabalhistas. Se descumprir a medida, a Petrobras teria que pagar, também, multa diária de R$ 100 mil.
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees; rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksSchneider Electric
While best practice has leaned toward keeping control and
safety isolated from each other, recent enterprise data integration
and cost control initiatives are providing incentive to
achieve some level of integration. This paper describes three
basic integration models, including an “interfaced” approach,
in which separate control and safety communicate via a
custom built software bridge; an “integrated but separate”
approach, in which the disparate systems sit on the same
network, but share information only across isolated network
channels; and a “common” approach, in which both control
and safety systems share a common operating system. The
authors then compare the three approaches according to
compliance with safety standards and cost efficiencies.
Privacy Protection in Distributed Industrial Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs.
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
1. Ganesh Panatula, Nagabhushan S.V, Dr. T. V. Suresh Kumar / International Journal of Engi-
neering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.1371-1375
Integration Analysis Of Safety Critical Systems In Information
Technology
1
Ganesh Panatula, 2 Nagabhushan S.V, 3Dr. T. V. Suresh Kumar
1( Associate Professor , Dept. of MCA,BMSIT)
2(Assistant Professor, Dept. of MCA,BMSIT)
3(Professor&HOD , Dept. of MCA, MSRITT,)
Abstract
Safety-critical systems are those systems computer hardware, other electronic and electrical
whose failure could result in loss of life, significant hardware, mechanical hardware, and operators or us-
property damage, or damage to the environment. ers, not just the software element.
There are many well known examples in applica- Safety critical software has been traditional-
tion areas such as medical devices, aircraft flight ly associated with embedded control systems. As
control, weapons, and nuclear systems. The em- awareness of how systems can impact safety has de-
phasis of this paper is on the software element of veloped, the scope of safety critical software has ex-
safety critical systems, which for convenience is panded into many other types of systems.
often referred to as safety critical software. Many An obvious example of a safety critical sys-
modern information systems are becoming safety- tem is an aircraft fly by wire control system, where
critical in the sense that their failure results in fi- the pilot inputs commands to the control computer
nancial loss and even loss of life. Future safety- using a joystick, and the computer manipulates the
critical systems will be more common and more actual aircraft controls. The lives of hundreds of pas-
powerful. From a software perspective, developing sengers are totally dependent upon the continued cor-
safety critical systems in adequate numbers and rect operation of such a system.
with adequate dependability is going to require Moving down to earth, railway signaling
significant advances in areas such as specification, systems must enable controllers to direct trains, while
architecture, verification, and process. The cur- preventing trains from colliding. Like an aircraft fly
rent project work is regarding fault tolerance by wire, lives are dependent upon the correct opera-
client-server system that addresses safety-critical tion of the system. However, there is always the op-
issue in the web application by suing smart server tion of stopping all trains if the integrity of the sys-
approach. tem becomes suspect. It is not possible to just stop an
aircraft while the fly by wire system is in use. [1].
Keywords: Fault Tolerance System, Safety Critical Software in medical systems may be directly
System responsible for human life, such as metering safe
amounts of X-rays. Software may also be involved in
NOMENCLATURE: providing humans with information, such as informa-
ADS- Autonomous Distributed System tion which a doctor uses to decide on medication.
ASCM-Adaptive Safety Critical Middleware Both types of system can impact the safety of the pa-
DESCS-Distributed and Embedded Safety- tient.
Critical Systems Big civil engineering structures are designed
FCS - Flight Control System on computers and tested using mathematical models.
FTS - Fault Tolerant System An error in the software could conceivably result in a
FMEA- Failure Mode and Effect Analysis bridge collapsing. Aircraft, trains, ships and cars are
PHL - Preliminary Hazard List also designed and modeled using computers. Even
PHA- Preliminary Hazard Analysis something as simple as traffic lights can be viewed as
QOS -Quality of Service safety critical. An error giving green lights to both di-
SCP -Self-Checking-Pair rections at a traffic junction could result in an acci-
SCS -Safety Critical System dent. Within cars, software involved in functions
such as engine management, anti-lock brakes, trac-
I. INTRODUCTION tion control, and a host of other functions, could po-
A safety critical system is a system where tentially fail in a way which increases the likelihood
human safety is dependent upon the correct operation of a road accident.
of the system. The emphasis of this paper is on the A well conceived and executed safety case is
software element of safety critical systems, which for a key element in bringing a safety critical system into
convenience is often referred to as safety critical use. In areas which have been traditionally concerned
software. However, safety must always be considered with safety critical systems, such as the aviation in-
with respect to the whole system, including software, dustry and the nuclear industry, a certification body
1371 | P a g e
2. Ganesh Panatula, Nagabhushan S.V, Dr. T. V. Suresh Kumar / International Journal of Engi-
neering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.
will have to be convinced that a system is safe before analyze their system even before hardware as well as
it is put into use. In some other areas, users have their software realization. Also, nowadays, the cost of de-
own safety monitoring groups. Nevertheless, the vast veloping a critical system increases exponentially
majority of software safety is entirely in the hands when system design errors are found after the imple-
and conscience of the software developers and sup- mentation or integration of the system. In this paper,
pliers. a model driven approach is described for design and
development of a safety critical system. The stated
II. LITERATURE REVIEW approach is described along with functional descrip-
By the analysis of the previous research tion of electrical system architecture and the concept
done on safety critical systems, we highlight some of of modeling. Self-Checking-Pair (SCP) based com-
the major research done by the research scholars on puter architecture with high speed communication
safety critical issues. bus interface is modeled and the performance is eva-
The work proposed by Qing Sun Lirong et luated before its hardware and software realization
al. [2] states that there are three states in safety criti- The work proposed by Kumagai S et al. [5]
cal manufacturing systems namely working, fail-safe explains that to secure modern complex system activ-
and fail-dangerous states. This paper studies two dif- ities, rigid and heavily centralized organization is ra-
ferent safety-critical parallel-series models by consi- ther obstacle. To facilitate quick decision, mutual col-
dering their components’ lifetime distribution pos- laboration, and to maintain performability in
sessing general forms. The indices of reliability and unexpected severe situation, autonomous decision
safety, including the probabilities that the system in unit should act at best in intelligent way by itself. Au-
these states and mean time for the system under two tonomous distributed system concept plays a central
different failure ways, are derived respectively. Vari- role for operating complex systems commonly exist-
ous corresponding indices comparisons between the ing in today’s networked society of 21st century. This
two different parallel-series system models, and paper explains the effectiveness of ADS system para-
among the series, parallel and parallel-series systems, digm to secure safety critical systems and clarifies
are conducted. Some illustrative numerical examples key issues to realize the objective as intended.
are employed to show the procedures. The derived The work proposed by Hovakimyan N et al
indices formulae are without component lifetime dis- [6] narrates about the development of L1 adaptive-
tribution assumptions, which have significant mean- control theory and its application to safety critical
ings for reliability analysis and safety design of the flight control system (FCS) development. Several ar-
system. chitectures of the theory and benchmark examples are
The work proposed by Zhang Yi et al. [3] analyzed. The key feature of L1 adaptive-control ar-
states that Distributed and embedded safety-critical chitectures is the decoupling of estimation and con-
systems (DESCS) are those systems whose failure trol, which enables the use of arbitrarily fast estima-
could result in loss of life, significant property dam- tion rates without sacrificing robustness. Rohrs's
age, or damage to the environment. Because of the example and the two-cart system are used as bench-
nature of DESCS, designing the applications for mark problems for illustration. NASA's flight tests on
DESCS is harder than those for distributed real-time subscale commercial jet verify the theoretical claims
embedded systems. In this paper, a multilevel em- in a set of safety-critical test flights.
bedded safety-critical middleware called adaptive
safety-critical middleware (ASCM) is described that III. MOTIVATION FOR THE PAPER
provides related services to ease the development of Today, most of the safety critical systems
embedded safety-critical applications. It also presents use a combination of the following architectures.
a multi-layer end-to-end adaptive QOS management
technology to satisfy the dynamic and unpredictable [a] Intrinsic Fail-Safe Design: This is generally used
mission requirements of DESCS. for discrete mechanical or electrical components
The work proposed by By Nisha, G.R. [4] where the credible failure modes of all components
describes that faults in safety critical systems are the can be directly analyzed to ensure no unsafe condi-
important elements to be avoided. To avoid these er- tions are created as a result of failure. Most systems
rors or faults, Fault Tolerant Systems (FTS) are use this technique as some portion of their system de-
evolved. But still, some more hidden design faults are sign, particularly for I/O or comparison mechanisms
not weeded out before realization by traditional and identifies a minimum set of credible failure modes to
life cycle tests and analysis. In this paper, an ap- be included in the analysis.
proach has been described to find out these types of
faults by simulating system architecture with model- [b] N-version programming: This technique requires
ing and simulation. By this model based methods, at least two software programs, executing together
one can enable early verification of the system and and performing identical functions. An independent
quickly find errors or faults and deal with it. This is a team using independent tools must write each soft-
very attractive approach, since the systems are criti- ware program. They may or may not run on indepen-
cal systems. Through this method, one can test and dent hardware platforms.
1372 | P a g e
3. Ganesh Panatula, Nagabhushan S.V, Dr. T. V. Suresh Kumar / International Journal of Engi-
neering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.
[c] Numerical Assurance: This technique requires on client data, maintaining their data for 24/7 is very
that the state of each safety-critical parameter be crucial for them, but there are internal and external
represented by a large encoded numerical value. Off- factor which creates negative impact on their busi-
line data structures are defined such that real-time ness, if they lose the data. Maintain the same data in
permissive results can only be calculated (by pseudo- multiple places lead to data redundancy and also it is
randomly combining these values) when all the prop- expensive. Since processing of data takes place at dif-
er conditions for a permissive result are present. ferent levels and in different versions, keeping track
With the above said architectures, we high- of data in the consistent manner, it is very difficult.
light the importance of safety verification & valida- So we investigate the above problem and solve it by
tion. It is necessary to provide verification to all the using smart server approach. We design a framework
identified unacceptable or undesirable hazards so that to architect safety critical system for web application
they have been properly mitigated. In order to do this, and it is implemented by taking case study as an ex-
all of the safety-critical functions necessary to im- ample and show case how our approach is suited for
plement the system (down to a very low level) must web application.
be identified. Functions that have to be implemented Our framework is viewed from two core perspec-
must be implemented fail-safely. The fail-safe im- tives.
plementation means that we look at all the credible a) Server Perspective: In the server, business criti-
failures that could occur and make sure that occur- cal data is stored and clients are accessing the
rence of any one of them (or combination of failures data for the live business transactions. Suddenly
in the event that the first failure is not self-evident) processing of the data stop’s by external factors
maintains the system in a safe state, either by forcing like server down, application crash, unexpected
the system to a stop (or other safe state such as a less execution of some unknown event, virus intru-
permissive signal) or by transferring control to a sec- sion etc and client has to wait until the applica-
ondary system (e.g. redundant computer). tion in the server is up. From the client perspec-
As part of verification & validation in SCS, tive, this unexpected event is very expensive and
Functional Fault Trees are a widely accepted tool for no patience to wait. If the server scalability and
identifying the safety-critical functions from the top performance issue is not handled during design
down. These trees start at the upper level hazards and development, there are every chances that
previously identified and branch down through the client may lose huge amount (scenario can be
system, subsystem and interfaces to identify all of the understood in online trading). To address the
functions that, if not performed correctly, could pre- above issue, we introduce a middleware compo-
cipitate the upper level hazards. The functional fault nent in terms of proxy server which can create
trees provide a top-down analysis of the system. A instances of running application in the dynamic
Failure Mode and Effect Analysis (FMEA) is also environment In our approach, when unexpected
used to provide a bottom-up analysis of the system. event arises which stops the client from dynamic
Starting at the component level, all credible failures access,, an event is triggered and notification will
are analyzed to verify that they do not create any un- go to the proxy server , In that server, from
safe condition. It provides guidance on credible com- where main server has stopped the execution,
ponent failure modes. As with all safety analyses de- proxy server takes the responsibility to process
scribed so far, secondary failures must be considered the remaining computation and put it in the off-
in combination with the initial failure if the initial line mode and store that part of information in a
failure is not self-revealing. file and from that file, information will be passed
Based on the above research findings, it is to client. Hence client will have continuous ac-
intended to design a safety critical system for web cess to data. At the time when main server noti-
application and its implementation is showcased fies about its failure to proxy server, there will be
through a case study. some lag time which is unnoticeable at the client
end.
IV. PROPOSED WORK
It is intended to design and implement safety b) Client Perspective: Since clients are accessing
critical system for web Application based on n-tier the data continuously in critical applications
client server system. We analyze the safety critical is- stopping the application for a minutes will incur
sues that are addressed in client -server system by huge loss as the data is tracked every minute for
providing fault tolerance using smart server ap- some analysis (scenarios can be understood re-
proach. garding the data coming from the satellite)[7],
hence continuous access for the data is very
Issues in client server system much required. Client should have authentication
In the corporate world, more prominence is to access the application and it can be any gen-
given to data and securing data is the major concern eral Client Server setup application. At any point
for them to maintain confidence and long term rela- of time, the client should be assured to have con-
tionship with the clients. Since they heavily depend
1373 | P a g e
4. Ganesh Panatula, Nagabhushan S.V, Dr. T. V. Suresh Kumar / International Journal of Engi-
neering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.
tinuous connectivity with the server without any the server is down abruptly, the client has to
disruptions. wait for the server to be up, in traditional approaches.
By considering the above two perspectives, we Now, our approach suggests that inspite of server
study and analyze and implement safety critical sys- breakdown the client still can continue with normal
tem though case study for web application and ex- operation. The methodology to facilitate the above is
periment in our lab. below.
At the time of server eventuality, the soft-
Case Study: ware component (COMP) detects the server failure
Assume an application is installed in the and the recent updated information in the server is
server machine and accessed by n clients (n=5, in- loaded to the Proxy server. At this juncture, the proxy
itially). Here clients access the application by know- server acts as a normal server and caters to the needs
ing server IP address which is run in their browser in of client. In this process, care will be taken to avoid
the following format http: // ipaddress/application. data redundancy. Once the main server is up, the
We assume all the systems are interconnected COMP notices the same and loads back the recent
through LAN. Each client is provided with an inter- updated information to the main server from the
face to login to the server. Each client accesses the proxy server. Now main server resumes its normal
server for different purpose, like downloading, up- work.
loading, reading documents etc. Now, if During the process of switching, as stated
above, the time gaps need to be measured and re-
SCS
duced to the optimal extent.
FRAMEWO
RK V. CONCLUSION
Safety critical software is a complex subject.
The approach discussed in this paper, is to make the
SMART SERVER system more reliable and to reduce the time gaps of
APPROACH context switching between main and proxy servers, in
the web application environment. The custom appli-
cation discussed in case study will provide a good
example for simple approach to address the safety
critical issue of fault tolerance in the client server ap-
C Proxy Clien plication by providing the user with simple interface
t -1 to interact with system and application availability in
BUSINE O Serv- both online and offline condition.
SS er
M ACKNOWLEDGEMENT:
CRITICA Clien We thank all the authors for the information support.
L DATA P t -2
VI. FUTURE WORK
The scope of the work can be extended to
reduce the time gap between main sever and proxy
server. Also, once the main server resumes normalcy,
Clien data stored in the proxy server can be deleted there-
by avoiding redundancy of data.
t -3
In- REFERENCES
[1] Briere, Dominique, and Traverse, Pascal,
stanc
"Airbus A320/A330/A340 Electrical Flight
es Controls A Family of Fault Tolerant Sys-
Clien tems", IEEE, Proceedings of 23rd Interna-
t -N tional Conference On Fault Tolerant Com-
puting, 1993.
[2] Qing Sun; Lirong Cui; Rong Pan; , "Model-
ing and analyzing safety-critical parallel-
SERVER series system safety," Industrial Engineering
ENABLED ON and Engineering Management, 2009. IEEM
FAILURE 2009. IEEE International Conference on ,
vol., no., pp.2463-2467, 8-11 Dec. 2009
[3] Zhang Yi; Wandong Cai; Wang Yue; ,
"Adaptive Safety Critical Middleware for
Distributed and Embedded Safety Critical
1374 | P a g e
5. Ganesh Panatula, Nagabhushan S.V, Dr. T. V. Suresh Kumar / International Journal of Engi-
neering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.
System," Networked Computing and Ad-
vanced Information Management, 2008.
NCM '08. Fourth International Conference
on , vol.1, no., pp.162-166, 2-4 Sept. 2008
[4] Nisha, G.R.; , "A model driven approach for
design and development of a safety critical
system," Electronics Computer Technology
(ICECT), 2011 3rd International Conference
on , vol.4, no., pp.15-18, 8-10 April 2011
[5] Kumagai, S.; Miyamoto, T.; Morihiro, Y.; ,
"Autonomous Distributed System Paradigm
to Secure Safety Critical," SICE-ICASE,
2006. International Joint Conference , vol.,
no., pp.47-50, 18-21 Oct. 2006
[6] Hovakimyan, N.; Chengyu Cao; Kharisov,
E.; Xargay, E.; Gregory, I.M.; ,
" Adaptive Control for Safe-
ty-Critical Systems," Control Systems,
IEEE , vol.31, no.5, pp.54-104, Oct. 2011
[7] Spitzer, Cary.R, "Avionics Handbook" New
York/CRC press/2001 4S Symposium,
Small Satellites Systems And Services Pro-
ceedings: (2004)
1375 | P a g e