41
Analyzing Conversations of Web Services Tevfik Bultan Department of Computer Science University of California, Santa Barbara [email protected] http://www.cs.ucsb.edu/~bultan Joint work with Xiang Fu, Georgia Southwestern State University Jianwen Su, University of California, Santa Barbara

Analyzing Conversations of Web Services

  • Upload
    conway

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

Analyzing Conversations of Web Services. Tevfik Bultan Department of Computer Science University of California, Santa Barbara [email protected] http://www.cs.ucsb.edu/~bultan Joint work with Xiang Fu , Georgia Southwestern State University - PowerPoint PPT Presentation

Citation preview

Page 1: Analyzing Conversations of Web Services

Analyzing Conversations of Web Services

Tevfik BultanDepartment of Computer Science

University of California, Santa [email protected]

http://www.cs.ucsb.edu/~bultan

Joint work withXiang Fu, Georgia Southwestern State University

Jianwen Su, University of California, Santa Barbara

Page 2: Analyzing Conversations of Web Services

Going to Lunch at UCSB

• Before Xiang graduated from UCSB, Xiang, Jianwen and I were using the following protocol for going to lunch:– Sometime around noon one of us would call another

one by phone and tell him where and when we would meet for lunch.

– The receiver of this first call would call the remaining peer and pass the information.

• Let’s call this protocol the First Caller Decides (FCD) protocol.

Page 3: Analyzing Conversations of Web Services

!tj1

?xt1

!tx1

?jt1

!tx2

Tevfik

!tj2

?jt2

?xt2

!xj1

?tx1

!xt1

?jx1

!xt2

Xiang

!xj2

?jx2

?tx2

!jt1

?xj1

!jx1

?tj1

!jx2

Jianwen

!jt2

?tj2

?xj2

Implementation of the FCD Protocol

t x 1

from Tevfik

toXiang

1st message

Message Labels: ! send

? receive

Page 4: Analyzing Conversations of Web Services

FCD Protocol does not Work with Voicemail

• When the university installed a voicemail system FCD protocol started causing problems– We were showing up at different restaurants at different

times!

• Example scenario: tx1, jx1, xj2

The messages jx1 and xj2 are not consumed

– Note that this scenario is not possible without voicemail!

Page 5: Analyzing Conversations of Web Services

A Different Lunch Protocol

• Jianwen suggested that we change our lunch protocol as follows:– As the most senior researcher among us Jianwen

would make the first call to either Xiang or Tevfik and tell when and where we would meet for lunch.

– Then, the receiver of this call would pass the information to the other peer.

– Let’s call this protocol the Jianwen Decides (JD) protocol

Page 6: Analyzing Conversations of Web Services

?xt?jt

!tx

Tevfik Xiang Jianwen

?tx?jx

!xt

!jt !jx

Implementation of the JD Protocol

• JD protocol works fine with voicemail!

Page 7: Analyzing Conversations of Web Services

Conversation Protocols

• The FCD and JD protocols specify a set of conversations

• The implementations I showed are supposed to generate the set of conversations specified by these protocols

• We can specify the set of conversations without showing how the peers implement them, we call such a specification a conversation protocol

Page 8: Analyzing Conversations of Web Services

tj1tx1

xj2

xt1 xj1 jt1 jx1

jx2 tj2 jt2 tx2 xt2

FCD Protocol

jt jx

tx xt

JD Protocol

FCD and JD Conversation Protocols

Conversation set:{(tx1, xj2), (tj1, jx2), (xt1, tj2), (xj1, jt2), (jt1, tx2), (jx1, xt2)}

Conversation set:{(jt, tx), (jx, xt)}

Page 9: Analyzing Conversations of Web Services

Observations & Questions

• The implementation of the FCD protocol behaves differently with synchronous and asynchronous communication whereas the implementation of the JD protocol behaves the same. – Can we find a way to identify such implementations?

• The implementation of the FCD protocol does not obey the FCD protocol if asynchronous communication is used whereas the implementation of the JD protocol obeys the JD protocol even if asynchronous communication used.– Given a conversation protocol can we figure out if there

is an implementation which generates the same conversation set?

Page 10: Analyzing Conversations of Web Services

Synchronizability and Realizability Analyses

• We formalized these observations and questions using synchronizability and realizability analyses

– The implementation of the JD protocol is synchronizable but the implementation of the FCD protocol is not synchronizable

– The JD protocol is realizable but the FCD protocol is not realizable

Page 11: Analyzing Conversations of Web Services

Outline

• Web Service Composition Model • Capturing Global Behaviors

– Conversations• Top-Down vs. Bottom-Up Specification and Verification

– Realizability vs. Synchronizability• XML messaging

– MSL, XPath– Translation to Promela

• Web Service Analysis Tool• Conclusions and Future Work

Page 12: Analyzing Conversations of Web Services

Characteristics of Web Services

• Loosely coupled, interaction through standardized interfaces

• Standardized data transmission via XML• Asynchronous messaging• Platform independent (.NET, J2EE)

Data

Type

Interface

Behavior

Message

BPEL4WS

Web Service Standards

Impl

emen

tatio

n P

latf

orm

s

Mic

roso

ft .

Net

, S

un J

2EE

WSDL

SOAP

XML Schema

XML

WS-CDLInteraction

Page 13: Analyzing Conversations of Web Services

Challenges in Verification of Web Services

• Distributed nature, no central control– How do we model the global behavior?– How do we specify the global properties?

• Asynchronous messaging introduces undecidability in analysis– How do we check the global behavior?– How do we enforce the global behavior?

• XML data manipulation– How do we specify the XML messages?– How do we verify properties related to data?

Page 14: Analyzing Conversations of Web Services

A Model for Composite Web Services

tx

xt

jxjt

Peer T

Peer J

Peer X

• A composite web service consists of– a finite set of peers

• Lunch example: T, X, J– and a finite set of message classes

• Lunch example (JD protocol): jt, tx, jx, xt

Page 15: Analyzing Conversations of Web Services

Communication Model

• We assume that the messages among the peers are exchanged using reliable and asynchronous messaging– FIFO and unbounded message queues

• This model is similar to industry efforts such as

– JMS (Java Message Service)

– MSMQ (Microsoft Message Queuing Service)

txPeer T Peer Xtx

Page 16: Analyzing Conversations of Web Services

Conversations

• A virtual watcher records the messages as they are sent

Watcher

• A conversation is a sequence of messages the watcher sees during an execution

[Bultan, Fu, Hull, Su WWW’03]

tx

jt

Peer T

Peer J

Peer X

txjt

Page 17: Analyzing Conversations of Web Services

Effects of Asynchronous Communication

• Question: Given a composite web service, is the set of conversations a regular set?

• Even when messages do not have any content and the peers are finite state machines the conversation set may not be regular

• Reason: asynchronous communication with unbounded queues

• Bounded queues or synchronous communication

Conversation set always regular

Page 18: Analyzing Conversations of Web Services

Properties of Conversations

• The notion of conversation enables us to reason about temporal properties of the composite web services

• LTL framework extends naturally to conversations– LTL temporal operators

X (neXt), U (Until), G (Globally), F (Future)– Atomic properties

Predicates on message classes (or contents)

Example: G ( payment F receipt )

• Model checking problem: Given an LTL property, does the conversation set satisfy the property?

Page 19: Analyzing Conversations of Web Services

Bottom-Up vs. Top-Down

Bottom-up approach• Specify the behavior of each peer• The global communication behavior (conversation set) is

implicitly defined based on the composed behavior of the peers

• Global communication behavior is hard to understand and analyze

Top-down approach• Specify the global communication behavior (conversation

set) explicitly as a protocol• Ensure that the conversations generated by the peers

obey the protocol

Page 20: Analyzing Conversations of Web Services

ConversationProtocol GF(tx xt))

? LTL property

Peer T

Peer J

Peer X

jt

txxt

jx

ConversationSchema

InputQueue

...Virtual Watcher GF(tx xt))?

LTL property

?xt?jt

!tx

Peer T Peer X

?tx?jx

!xt

Peer J

!jt !jx

jt jx

tx xt

Page 21: Analyzing Conversations of Web Services

Conversation Protocols

• Conversation Protocol: – An automaton that accepts the desired conversation set

• A conversation protocol is a contract agreed by all peers– Each peer must act according to the protocol

• For reactive protocols with infinite message sequences we use:– Büchi automata which accept infinite strings

• For specifying message contents, we use:– Guarded automata– Guards are constraints on the message contents

Page 22: Analyzing Conversations of Web Services

Synthesize Peer Implementations

• Conversation protocol specifies the global communication behavior– How do we implement the peers?

• How do we obtain the contracts that peers have to obey from the global contract specified by the conversation protocol?

• Project the global protocol to each peer– By dropping unrelated messages for each peer

Page 23: Analyzing Conversations of Web Services

Interesting Question

If this equality holds the conversation protocol is realizable

Are there conditions which ensure the equivalence?

Conversations generated by the projected services

Conversations specified by the conversation protocol

?

Page 24: Analyzing Conversations of Web Services

Realizability Problem

• Not all conversation protocols are realizable!

AB: m1

CD: m2

Conversation protocol

Conversation “m2 m1m2 m1” will be generated by all peer implementations which follow the protocol

!m1 ?m1 !m2 ?m2

Peer A Peer B Peer C Peer D

Projection of the conversation protocol to the peers

Page 25: Analyzing Conversations of Web Services

Another Non-Realizable Protocol

m3

m1

m2

m2 m1 m3

m1

m2

m3AB: m1BA: m2

AC: m3

BA: m2

AB: m1

A

B

C

m1m2

m3

Watcher

A B

C

Generated conversation:

B A, C

Page 26: Analyzing Conversations of Web Services

Realizability Conditions

Three sufficient conditions for realizability (no message content) [Fu, Bultan, Su, CIAA’03, TCS’04]

• Lossless join– Conversation set should be equivalent to the join of its

projections to each peer• Synchronous compatible

– When the projections are composed synchronously, there should not be a state where a peer is ready to send a message while the corresponding receiver is not ready to receive

• Autonomous– At any state, each peer should be able to do only one of the

following: send, receive or terminate

(a peer can still choose among multiple messages)

Page 27: Analyzing Conversations of Web Services

Realizability Conditions

AB: m1

CD: m2

AB: m1BA: m2

AC: m3

BA: m2

AB: m1

• Following protocols fail one of the three conditions but satisfy the other two

Not lossless join

Not autonomous

AB: m1

CA: m2

Not synchronous compatible

Page 28: Analyzing Conversations of Web Services

Bottom-Up Approach

• We know that analyzing conversations of composite web services is difficult due to asynchronous communication– Model checking for conversation properties is

undecidable even for finite state peers

• The question is:– Can we identify the composite web services where

asynchronous communication does not create a problem?

Page 29: Analyzing Conversations of Web Services

Three Examples, Example 1

requester server

!r2

?a1 ?a2

!e

!r1

• Conversation set is regular: (Conversation set is regular: (rr11aa11 | | rr22aa22)* )* ee

• During all executions the message queues are bounded

r1, r2

a1, a2

e ?r1

!a1 !a2

?r2

?e

Page 30: Analyzing Conversations of Web Services

Example 2

• Conversation set is not regularConversation set is not regular• Queues are not bounded

requester server

!r2

?a1 ?a2

!e

!r1

r1, r2

a1, a2

e ?r1

!a1 !a2

?r2

?e

Page 31: Analyzing Conversations of Web Services

Example 3

• Conversation set is regular: (Conversation set is regular: (rr11 | | rr22 | | rara)* )* ee

• Queues are not bounded

requester server

!r2

?a !r

!e!r1

r1, r2

a1, a2

e

?r1 ?r2

?e

?r !a

Page 32: Analyzing Conversations of Web Services

State Spaces of the Three Examples

0

200

400

600

800

1000

1200

1400

1600

1 3 5 7 9 11 13

Example 1

Example 2

Example 3

queue length

# o

f st

ates

in

th

ou

san

ds

• Verification of Examples 2 and 3 are difficult even if we bound the queue length

• How can we distinguish Examples 1 and 3 (with regular conversation sets) from 2?

– Synchronizability Analysis

Page 33: Analyzing Conversations of Web Services

Synchronizability Analysis

• A composite web service is synchronizable, if its conversation set does not change – when asynchronous communication is replaced with

synchronous communication

• If a composite web service is synchronizable we can check the properties about its conversations using synchronous communication semantics – For finite state peers this is a finite state model

checking problem

Page 34: Analyzing Conversations of Web Services

Synchronizability Analysis

• A composite web service is synchronizable, if it satisfies the synchronous compatible and autonomous conditions

[Fu, Bultan, Su WWW’04, TSE]

• Connection between realizability and synchronizability:– A conversation protocol is realizable if its projections to

peers are synchronizable and the protocol itself satisfies the lossless join condition

Page 35: Analyzing Conversations of Web Services

Are These Conditions Too Restrictive?

Problem Set Size Pass?Source Name #msg #states #trans.

ISSTA’04 SAS 9 12 15 yes

IBM

Conv.

Support

Project

CvSetup 4 4 4 yesMetaConv 4 4 6 no

Chat 2 4 5 yesBuy 5 5 6 yes

Haggle 8 5 8 noAMAB 8 10 15 yes

BPEL

spec

shipping 2 3 3 yesLoan 6 6 6 yes

Auction 9 9 10 yesCollaxa.

com

StarLoan 6 7 7 yesCauction 5 7 6 yes

Page 36: Analyzing Conversations of Web Services

BPEL to

GFSAGuardedautomata

GFSA to Promela (bounded queue)

BPEL

WebServices

Promela

SynchronizabilityAnalysis

GFSA to Promela(synchronous

communication)

IntermediateRepresentation

ConversationProtocol

Front End

Realizability Analysis

Guardedautomaton

skip

GFSAparser

success

fail

GFSA to Promela(single process,

no communication)

success

fail

Analysis Back End

(bottom-up)

(top-down)

Verification Languages

Web Service Analysis Tool (WSAT)

[Fu, Bultan, Su CAV’04]

http://www.cs.ucsb.edu/~su/WSAT/

Page 37: Analyzing Conversations of Web Services

Guarded Automata Model

• Uses XML messages

• Uses MSL for declaring message types– MSL (Model Schema Language) is a compact formal

model language which captures core features of XML Schema

• Uses XPath expressions for guards– XPath is a language for writing expressions (queries)

that navigate through XML trees and return a set of answer nodes

Page 38: Analyzing Conversations of Web Services

Related Work

• Conversation specification– IBM Conversation support project

http://www.research.ibm.com/convsupport/– Conversation support for business process integration

[Hanson, Nandi, Kumaran EDOCC’02]– Orchestrating computations on the world-wide web

[Choi, Garg, Rai, Misram, Vin EuroPar’02]

• Realizability problem– Realizability of Message Sequence Charts (MSC) [Alur,

Etassami, Yannakakis ICSE’00, ICALP’01]

Page 39: Analyzing Conversations of Web Services

Related Work

• Verification of web services– Simulation, verification, composition of web services

using a Petri net model [Narayanan, McIlraith WWW’02]

– BPEL verification using a process algebra model and Concurrency Workbench [Koshkina, van Breugel TAV-WEB’03]

– Using MSC to model BPEL web services which are translated to labeled transition systems and verified using model checking [Foster, Uchitel, Magee, Kramer ASE’03]

– Model checking Web Service Flow Language specifications using SPIN [Nakajima ICWE’04]

Page 40: Analyzing Conversations of Web Services

Current and Future Work

• Extending the source and target languages

• Symbolic analysis

[Fu, Bultan, Su ICWS’04, JWSR]

• Abstraction

• Design for verification for web services

[Betin-Can, Bultan WWW’05, ICWS’05]

Page 41: Analyzing Conversations of Web Services

Translatorfor bottom-upspecifications Guarded

automata Translation withbounded queue

SynchronizabilityAnalysis

Translation withsynchronous

communication

IntermediateRepresentation

ConversationProtocols

Front End

Realizability Analysis

Guardedautomaton

skip

Translatorfor top-downspecifications

success

fail

Translation withsingle process,

no communication

success

fail

Analysis Back End

BPEL

Web ServiceSpecificationLanguages

DAML-S

WS-CDL

Promela

SMV

ActionLanguage

VerificationLanguages

. . .

. . .

Aut

omat

ed

Abs

trac

tion

Current and Future Work