scispace - formally typeset
Journal ArticleDOI

Scheduling security-critical real-time applications on clusters

Tao Xie, +1 more
- 01 Jul 2006 - 
- Vol. 55, Iss: 7, pp 864-879
TLDR
A security overhead model is built that can be used to reasonably measure security overheads incurred by the security-critical tasks and incorporates the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF).
Abstract
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications' security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, least laxity first, and first come first serve) by up to 266.7 percent while achieving high schedulability.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A survey: Cyber-physical-social systems and their system-level design methodology

TL;DR: This paper surveys the advancement of CPSS through cyber-physical systems (CPS), cyber-social ​systems (CSS) and CPSS, as well as related techniques, and reviews the existing system-level design methodologies in multiple application domains.
Journal ArticleDOI

QoS-Aware Fault-Tolerant Scheduling for Real-Time Tasks on Heterogeneous Clusters

TL;DR: A fault-tolerant scheduling algorithm called QAFT that can tolerate one node's permanent failures at one time instant for real-time tasks with QoS needs on heterogeneous clusters is presented.
Journal ArticleDOI

A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems

TL;DR: This paper systematically design a security-driven scheduling architecture that can dynamically measure the trust level of each node in the system by using differential equations and introduces task priority rank to estimate security overhead of such security-critical tasks.
Journal ArticleDOI

Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks

TL;DR: This work develops a joint forensics-scheduling scheme, which allocates the available network resources based on the affordable forensics overhead and expected quality of service, adaptively adjusts the scalable media-aware forensics, and schedules the transmissions to meet the application's delay constraints.
Journal ArticleDOI

A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds

TL;DR: This paper proposes a security and cost aware scheduling (SCAS) algorithm based on the meta-heuristic optimization technique, particle swarm optimization (PSO), the coding strategy of which is devised to minimize the total workflow execution cost while meeting the deadline and risk rate constraints.
References
More filters
Book

Scheduling algorithms for multiprogramming in a hard real-time environment

TL;DR: In this paper, the problem of multiprogram scheduling on a single processor is studied from the viewpoint of the characteristics peculiar to the program functions that need guaranteed service, and it is shown that an optimum fixed priority scheduler possesses an upper bound to processor utilization which may be as low as 70 percent for large task sets.
Book

Computer Security

TL;DR: This new edition of this self-study guide includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection.
Dissertation

Fundamental design problems of distributed systems for the hard-real-time environment

TL;DR: This work shall provide a graph-based computation model which is more suitable for expressing the computation requirements of the real-time environment, and is an extension of CONSORT (Control Structure Optimized for Real-Time), an experimental software design system.
Book

Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms

TL;DR: In this paper, the authors present the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult, adding to the complexity is the fact that a variety of algorithms have been designed for different combinations of these considerations.
Journal ArticleDOI

Exploiting process lifetime distributions for dynamic load balancing

TL;DR: The measurements indicate that the distribution of lifetimes for a UNIX process is Pareto (heavy-tailed), with a consistent functional form over a variety of workloads, and it is shown how to apply this distribution to derive a preemptive migration policy that requires no hand-tuned parameters.
Related Papers (5)