{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:13Z","timestamp":1773375133374,"version":"3.50.1"},"reference-count":50,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Research Funds for Education Committee of Beijing","award":["KM201711232013"],"award-info":[{"award-number":["KM201711232013"]}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4174091"],"award-info":[{"award-number":["4174091"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["Z16002"],"award-info":[{"award-number":["Z16002"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,3]]},"abstract":"<jats:p> As semiconductor technology scales into the nano regime, hardware faults have been threats against computational devices. Cloud systems are incorporating more and more computing density and energy into themselves; thus, fundamental research on topics such as dependability validation is needed, in order to verify the robustness of clouds for sensor networks. However, dependability evaluation studies have often been carried out beyond isolated physical systems, such as processors, sensors, and single boards with or without operating system hosts. These studies have been performed using inaccurate simulations instead of validating complete cloud software stacks (firmware, hypervisor, operating system hosts and workloads) as a whole. In this article, we describe the implementation of a fault injection tool, which validates the dependability of a commercial cloud software stack. Hardware faults induced by high energy density environments can be injected; the fault propagation through the cloud software stack is traced, and quantitatively evaluated. Experimental results show that the integrated fault detection mechanism of the cloud system, such as fatal trap detectors, has left a detection margin of 20% silent data corruption to narrow down. We additionally propose two detection mechanisms, which proved good performance in fault detection of cloud systems. <\/jats:p>","DOI":"10.1177\/1550147720903613","type":"journal-article","created":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T06:49:10Z","timestamp":1583390950000},"page":"155014772090361","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantitative evaluation of fault propagation in a commercial cloud system"],"prefix":"10.1177","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-0255","authenticated-orcid":false,"given":"Chao","family":"Wang","sequence":"first","affiliation":[{"name":"Computer School, Beijing Information Science and Technology University, Beijing, China"}]},{"given":"Zhongchuan","family":"Fu","sequence":"additional","affiliation":[{"name":"Computer Department, Harbin Institute of Technology, Harbin, China"}]}],"member":"179","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"bibr1-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.81"},{"key":"bibr2-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.017"},{"key":"bibr3-1550147720903613","first-page":"503","volume-title":"Guide to wireless Ad Hoc networks","author":"Yu W","year":"2009"},{"key":"bibr4-1550147720903613","first-page":"504","volume-title":"16th international conference on advanced communication technology (ICACT)","author":"Ghobadi A"},{"key":"bibr6-1550147720903613","first-page":"25","volume-title":"The international technology roadmap for semiconductors","author":"Kwok N","year":"2012"},{"key":"bibr7-1550147720903613","volume-title":"Proceedings of international conference on dependable systems and networks (DSN 2005)","author":"Saggese GP"},{"key":"bibr8-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.104"},{"key":"bibr9-1550147720903613","volume-title":"2012 ninth international conference on quantitative evaluation of systems (QEST)","author":"Rashid L"},{"key":"bibr10-1550147720903613","volume-title":"International symposium on fault-tolerant computing","author":"Dawson S"},{"key":"bibr11-1550147720903613","volume-title":"2015 IEEE international conference on software quality, reliability and security (QRS)","author":"Lu Q"},{"key":"bibr12-1550147720903613","first-page":"97","volume-title":"2017 47th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Sangchoolie B"},{"key":"bibr13-1550147720903613","volume-title":"Proceedings of the annual international symposium on fault tolerant computing","author":"Lee PA"},{"key":"bibr14-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"bibr15-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"bibr16-1550147720903613","volume-title":"2010 10th IEEE\/ACM international conference on cluster, cloud and grid computing","author":"Kondo D"},{"key":"bibr17-1550147720903613","author":"Christopher KW","year":"1994","journal-title":"Method and system for utilizing benign fault occurrence to measure interrupt-blocking times"},{"key":"bibr18-1550147720903613","volume-title":"2006 43rd ACM\/IEEE design automation conference","author":"McPherson JW"},{"key":"bibr20-1550147720903613","volume-title":"Workshop on defect & fault-tolerance in VLSI systems","author":"Samson JRJ"},{"key":"bibr21-1550147720903613","volume-title":"20th IEEE international symposium on defect and fault tolerance in VLSI systems (DFT 2005)","author":"Ahmed N"},{"key":"bibr22-1550147720903613","author":"Burger D","year":"1996","journal-title":"Technical report"},{"key":"bibr23-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/2.982916"},{"key":"bibr24-1550147720903613","first-page":"92","volume":"33","author":"Martin MM","year":"2005","journal-title":"ACM Comp Ar"},{"issue":"2","key":"bibr25-1550147720903613","first-page":"1","volume":"39","author":"Binkert N","year":"2011","journal-title":"ACM Comp Ar"},{"key":"bibr26-1550147720903613","volume-title":"International ICST conference on simulation tools & techniques","author":"Bartolozzi L"},{"key":"bibr27-1550147720903613","volume-title":"IEEE international high level design validation & test workshop","author":"Gil D"},{"key":"bibr28-1550147720903613","volume-title":"Proceedings of the IEEE workshop on workload characterization","author":"Guthaus MR"},{"key":"bibr29-1550147720903613","volume-title":"Proceedings of the international conference on dependable systems and networks (DSN\u201902)","author":"Shivakumar P"},{"key":"bibr30-1550147720903613","volume-title":"ASPLOS\u201913","author":"Arulraj J"},{"key":"bibr31-1550147720903613","volume-title":"5th European dependable computing conference on dependable computing (EDCC-5)","author":"Nakka N"},{"key":"bibr32-1550147720903613","volume-title":"The twelfth international symposium on high-performance computer architecture","author":"Nakano J"},{"key":"bibr33-1550147720903613","volume-title":"Proceedings of the 1st ACM symposium on cloud computing (SoCC 2010)","author":"Vishwanath KV"},{"key":"bibr34-1550147720903613","volume-title":"Proceedings of the eleventh international joint conference on measurement and modeling of computer systems, SIGMETRICS\/performance 2009","author":"Schroeder B"},{"key":"bibr35-1550147720903613","first-page":"1","volume":"2014","author":"Wang C","year":"2014","journal-title":"Sci World J"},{"key":"bibr36-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2363152"},{"key":"bibr37-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126617501249"},{"key":"bibr38-1550147720903613","volume-title":"ICCAD 2018","author":"Mueller-Gritschneder D"},{"key":"bibr39-1550147720903613","volume-title":"Proceedings of the 2003 international conference on dependable systems and networks (DSN 2003)","author":"Gu W"},{"key":"bibr40-1550147720903613","volume-title":"IEEE Pacific rim international symposium on dependable computing (PRDC 2008)","author":"Chen D"},{"key":"bibr41-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2916204"},{"key":"bibr42-1550147720903613","first-page":"3345","volume-title":"Proceedings of the IEEE international symposium on industrial electronics","author":"Sterpone L"},{"key":"bibr43-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334300"},{"key":"bibr44-1550147720903613","volume-title":"IEEE\/IFIP international conference on dependable systems & networks","author":"Pham C"},{"key":"bibr45-1550147720903613","volume-title":"2017 IEEE international conference on software quality, reliability and security companion (QRS-C)","author":"Feinbube L"},{"key":"bibr46-1550147720903613","volume-title":"2017 18th international conference on parallel and distributed computing, applications and technologies (PDCAT)","author":"Feinbube L"},{"key":"bibr47-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2481392"},{"key":"bibr48-1550147720903613","volume-title":"IEEE international conference on cloud computing technology & science","author":"Yuan Y"},{"key":"bibr49-1550147720903613","volume-title":"6th doctoral conference on computing, electrical and industrial systems (DoCEIS)","author":"Herscheid L"},{"key":"bibr50-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.045"},{"key":"bibr51-1550147720903613","doi-asserted-by":"publisher","DOI":"10.1177\/1687814018819236"},{"key":"bibr52-1550147720903613","volume-title":"Proceedings of the 56th annual design automation conference (DAC 2019)","author":"Cheng E"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720903613","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147720903613","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720903613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T06:49:23Z","timestamp":1583390963000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147720903613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["10.1177\/1550147720903613"],"URL":"https:\/\/doi.org\/10.1177\/1550147720903613","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}