{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T10:15:16Z","timestamp":1772273716229,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper presents an investigation into the effect of faults on the scalability resilience of cloud-based software services. The study introduces an experimental framework using the Application-Level Fault Injection (ALFI) to investigate how the faults at the application level affect the scalability resilience and behaviour of cloud-based software services. Previous studies on scalability analysis of cloud-based software services provide a baseline of the scalability behaviour of such services, allowing to conduct in-depth scalability investigation of these services. Experimental analysis on the EC2 cloud using a real-world cloud-based software service is used to demonstrate the framework, considering delay latency of software faults with two varied settings and two demand scenarios. The experimental approach is explained in detail. Here we simulate delay latency injection with two different times, 800 and 1600\u2009ms, and compare the results with the baseline data. The results show that the proposed approach allows a fair assessment of the fault scenario\u2019s impact on the cloud software service\u2019s scalability resilience. We explain the use of the methodology to determine the impact of injected faults on the scalability behaviour and resilience of cloud-based software services.<\/jats:p>","DOI":"10.1186\/s13677-021-00277-z","type":"journal-article","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T10:04:48Z","timestamp":1641204288000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Scalability resilience framework using application-level fault injection for cloud-based software services"],"prefix":"10.1186","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1144-3053","authenticated-orcid":false,"given":"Amro","family":"Al-Said Ahmad","sequence":"first","affiliation":[]},{"given":"Peter","family":"Andras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"key":"277_CR1","first-page":"1","volume-title":"2018 fifth international symposium on innovation in information and communication technology (ISIICT)","author":"A Al-Said Ahmad","year":"2018","unstructured":"Al-Said Ahmad A, Andras P (2018) Measuring and testing the scalability of cloud-based software services. In: 2018 fifth international symposium on innovation in information and communication technology (ISIICT). IEEE, Amman, pp 1\u20138"},{"key":"277_CR2","doi-asserted-by":"publisher","unstructured":"Al-Said Ahmad A, Andras P (2019) Scalability analysis comparisons of cloud-based software services. J Cloud Comput 8. https:\/\/doi.org\/10.1186\/s13677-019-0134-y","DOI":"10.1186\/s13677-019-0134-y"},{"key":"277_CR3","unstructured":"Guo L, Liang J, Li D (2016) Understanding ineffectiveness of the application-level fault injection. In: Poster in ACM\/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis. SC"},{"key":"277_CR4","doi-asserted-by":"crossref","unstructured":"Feinbube L, Pirl L, Tr\u00f6ger P, Polze A (2017) Software fault injection campaign generation for cloud infrastructures. In: proceedings - 2017 IEEE international conference on software quality, reliability and security companion. QRS-C, pp 622\u2013623","DOI":"10.1109\/QRS-C.2017.119"},{"key":"277_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/2945408.2945415","volume-title":"Proceedings of the 2Nd International Workshop on Quality-Aware DevOps","author":"C Sheridan","year":"2016","unstructured":"Sheridan C, Whigham D, Arta\u010d M (2016) DICE fault injection tool. In: Proceedings of the 2Nd International Workshop on Quality-Aware DevOps. ACM, New York, pp 36\u201337"},{"key":"277_CR6","doi-asserted-by":"publisher","unstructured":"Banzai T, Koizumi H, Kanbayashi R et al (2010) D-cloud: design of a software testing environment for reliable distributed systems using cloud computing technology. CCGrid 2010 10th IEEE\/ACM Int Conf Clust Cloud Grid Comput:631\u2013636. https:\/\/doi.org\/10.1109\/CCGRID.2010.72","DOI":"10.1109\/CCGRID.2010.72"},{"key":"277_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie J-., Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1:11\u201333 .https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"277_CR8","doi-asserted-by":"publisher","unstructured":"Natella R, Cotroneo D, Madeira HS (2016) Assessing dependability with software fault injection: a survey. ACM Comput Surv 48:44:1--44:55. https:\/\/doi.org\/10.1145\/2841425","DOI":"10.1145\/2841425"},{"key":"277_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-44318-8_2","volume-title":"Hardware Security and Trust. Springer","author":"R Piscitelli","year":"2017","unstructured":"Piscitelli R, Bhasin S, Regazzoni F (2017) Fault attacks, injection techniques and tools for simulation. In: Hardware Security and Trust. Springer, pp 27\u201347"},{"key":"277_CR10","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-29032-9_19","volume-title":"Resilience Assessment and Evaluation of Computing Systems","author":"N Huber","year":"2012","unstructured":"Huber N, Brosig F, Dingle N et al (2012) Providing Dependability and Performance in the Cloud: Case Studies. In: Katinka W, Alberto A, Vieira M, van Aad M (eds) Resilience Assessment and Evaluation of Computing Systems, pp 391\u2013412"},{"key":"277_CR11","doi-asserted-by":"crossref","unstructured":"Herscheid L, Richter D, Polze A (2015) Experimental assessment of cloud software dependability using fault injection. In: Doctoral Conference on Computing, Electrical and Industrial Systems. Springer, pp 121\u2013128","DOI":"10.1007\/978-3-319-16766-4_13"},{"key":"277_CR12","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-94295-7_8","volume-title":"CLOUD computing \u2013 CLOUD 2018","author":"K Ye","year":"2018","unstructured":"Ye K, Liu Y, Xu G, Xu C-Z (2018) Fault injection and detection for artificial intelligence applications in container-based clouds. In: Luo M, Zhang L-J (eds) CLOUD computing \u2013 CLOUD 2018. Springer International Publishing, Cham, pp 112\u2013127"},{"key":"277_CR13","unstructured":"Chaos Monkey (2021) Chaos Monkeyhttps:\/\/github.com\/netflix\/chaosmonkey. Accessed 12 Dec 2020"},{"key":"277_CR14","unstructured":"Chaos Engineering (2019) Principles of chaos engineering. https:\/\/principlesofchaos.org\/. Accessed 1 Feb 2021"},{"key":"277_CR15","first-page":"23","volume-title":"Presented as part of the 10th international conference on autonomic computing","author":"NR Herbst","year":"2013","unstructured":"Herbst NR, Kounev S, Reussner R (2013) Elasticity in Cloud Computing: What It Is , and What It Is Not. In: Presented as part of the 10th international conference on autonomic computing. USENIX, San Jose, pp 23\u201327"},{"key":"277_CR16","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/NAS.2009.20","volume-title":"proceedings - 2009 IEEE international conference on networking, architecture, and storage","author":"M Hasan Jamal","year":"2009","unstructured":"Hasan Jamal M, Qadeer A, Mahmood W et al (2009) Virtual machine scalability on multi-core processors based servers for cloud computing workloads. In: proceedings - 2009 IEEE international conference on networking, architecture, and storage. NAS, pp 90\u201397"},{"key":"277_CR17","doi-asserted-by":"crossref","unstructured":"Gao J, Pattabhiraman P, Bai X, Tsai WT (2011) SaaS performance and scalability evaluation in clouds. In: proceedings - 6th IEEE international symposium on service-oriented system engineering, SOSE. IEEE, pp 61\u201371","DOI":"10.1109\/SOSE.2011.6139093"},{"key":"277_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TSC.2013.46","volume":"7","author":"D Jayasinghe","year":"2014","unstructured":"Jayasinghe D, Malkowski S, Li J et al (2014) Variations in performance and scalability: an experimental study in IaaS clouds using multi-tier workloads. IEEE Trans Serv Comput 7:293\u2013306. https:\/\/doi.org\/10.1109\/TSC.2013.46","journal-title":"IEEE Trans Serv Comput"},{"key":"277_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.future.2017.04.018","volume":"78","author":"S Lehrig","year":"2018","unstructured":"Lehrig S, Sanders R, Brataas G et al (2018) CloudStore \u2014 towards scalability, elasticity, and efficiency benchmarking and analysis in cloud computing. Futur Gener Comput Syst 78:115\u2013126. https:\/\/doi.org\/10.1016\/j.future.2017.04.018","journal-title":"Futur Gener Comput Syst"},{"key":"277_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/ICAC.2017.34","volume-title":"proceedings - 2017 IEEE international conference on autonomic computing, ICAC","author":"G Brataas","year":"2017","unstructured":"Brataas G, Herbst N, Ivansek S, Polutnik J (2017) Scalability analysis of cloud software services. In: proceedings - 2017 IEEE international conference on autonomic computing, ICAC, pp 285\u2013292"},{"key":"277_CR21","doi-asserted-by":"publisher","unstructured":"Kumari P, Kaur P (2018) A survey of fault tolerance in cloud computing. J King Saud Univ - Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2018.09.021","DOI":"10.1016\/j.jksuci.2018.09.021"},{"key":"277_CR22","doi-asserted-by":"crossref","unstructured":"Xiaoyong Y, Ying L, Zhonghai W, Tiancheng L (2014) Dependability analysis on open stack IaaS cloud: bug anaysis and fault injection. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 18\u201325","DOI":"10.1109\/CloudCom.2014.10"},{"key":"277_CR23","unstructured":"Deng Y, Mahindru R, Sailer A, et al (2017) Providing fault injection to cloud-provisioned machines"},{"key":"277_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/ICDCS.2016.11","volume-title":"2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)","author":"V Heorhiadi","year":"2016","unstructured":"Heorhiadi V, Rajagopalan S, Jamjoom H et al (2016) Gremlin: systematic resilience testing of microservices. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp 57\u201366"},{"key":"277_CR25","doi-asserted-by":"publisher","unstructured":"Zhang L, Morin B, Baudry B, Monperrus M (2021) Maximizing error injection realism for Chaos engineering with system calls. IEEE Trans Dependable Secur Comput 1. https:\/\/doi.org\/10.1109\/TDSC.2021.3069715","DOI":"10.1109\/TDSC.2021.3069715"},{"key":"277_CR26","doi-asserted-by":"crossref","unstructured":"Fehling C, Leymann F, Retter R et al (2014) Cloud computing patterns: fundamentals to design, build, and manage cloud applications. Springer","DOI":"10.1007\/978-3-7091-1568-8"},{"key":"277_CR27","unstructured":"Amazon EC2 (2021) Elastic Load Balancing. https:\/\/aws.amazon.com\/elasticloadbalancing\/. Accessed 17 Aug 2021"},{"key":"277_CR28","volume-title":"Fundamental concepts of dependability","author":"A Avizienis","year":"2001","unstructured":"Avizienis A, Laprie J-C, Randell B (2001) Fundamental concepts of dependability. University of Newcastle upon Tyne, Computing Science"},{"key":"277_CR29","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-47772-1_24","volume-title":"Infrastructure for agents, multi-agent systems, and scalable multi-agent systems","author":"M Woodside","year":"2001","unstructured":"Woodside M (2001) Scalability metrics and analysis of Mobile agent systems. In: Wagner T, Rana OF (eds) Infrastructure for agents, multi-agent systems, and scalable multi-agent systems. Springer, Berlin Heidelberg, pp 234\u2013245"},{"key":"277_CR30","unstructured":"OrangeHRM OrangeHRM REST APIS. https:\/\/api.orangehrm.com\/?url=\/apidoc\/index.html."},{"key":"277_CR31","unstructured":"Microsoft Azure (2017) Caching. https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/best-practices\/caching. Accessed 15 Aug 2021"},{"key":"277_CR32","unstructured":"JMeter (2021) JMeter HTTP Request. https:\/\/jmeter.apache.org\/usermanual\/component_reference.html#HTTP_Request. Accessed 1 Feb 2021"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-021-00277-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-021-00277-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-021-00277-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T10:10:14Z","timestamp":1641204614000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-021-00277-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["277"],"URL":"https:\/\/doi.org\/10.1186\/s13677-021-00277-z","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]},"assertion":[{"value":"27 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1"}}