Scheduling security-critical real-time applications on clusters

被引:105
作者
Xie, Tao [1 ]
Qin, Xiao
机构
[1] San Diego State Univ, Dept Comp Sci, San Diego, CA 92182 USA
[2] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
关键词
clusters; scheduling; real-time systems; security-critical applications; security overhead model;
D O I
10.1109/TC.2006.110
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications' security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, Least Laxity First, and First Come First Serve) by up to 266.7 percent while achieving high schedulability.
引用
收藏
页码:864 / 879
页数:16
相关论文
共 48 条
[1]  
Abdelzaher T. F., 1999, IEEE T PARALLEL DIST, V10
[2]   QoS negotiation in real-time systems and its application to automated flight control [J].
Abdelzaher, TF ;
Atkins, EM ;
Shin, KG .
IEEE TRANSACTIONS ON COMPUTERS, 2000, 49 (11) :1170-1183
[3]  
AHMED Q, 1998, P 14 ANN COMP SEC AP
[4]  
AMIN A, 2004, P INT S COMP COMM JU
[5]  
[Anonymous], COMPUTER SECURITY
[6]  
[Anonymous], P NEWF EL COMP ENG C
[7]   XML distributed security policy for clusters [J].
Apvrille, A ;
Pourzandi, M .
COMPUTERS & SECURITY, 2004, 23 (08) :649-658
[8]  
AZZEDIN F, 2002, P 2 IEEE ACM INT S C
[9]  
BOSSELAERS A, 1996, P ADV CRYPTOLOGY
[10]  
BRAUN TD, 1999, P WORKSH HET COMP AP