• DocumentCode
    950885
  • Title

    Scheduling security-critical real-time applications on clusters

  • Author

    Xie, Tao ; Qin, Xiao

  • Author_Institution
    Dept. of Comput. Sci., San Diego State Univ., CA, USA
  • Volume
    55
  • Issue
    7
  • fYear
    2006
  • fDate
    7/1/2006 12:00:00 AM
  • Firstpage
    864
  • Lastpage
    879
  • Abstract
    Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications´ security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, least laxity first, and first come first serve) by up to 266.7 percent while achieving high schedulability.
  • Keywords
    real-time systems; scheduling; security of data; workstation clusters; cluster computing systems; earliest deadline first scheduling policy; security overhead model; security-aware real-time heuristic strategy; security-aware real-time scheduling algorithm; security-critical real-time applications; Aerospace control; Authentication; Computer networks; Data security; Information security; Processor scheduling; Protection; Radar tracking; Real time systems; Scheduling algorithm; Clusters; real-time systems; scheduling; security overhead model.; security-critical applications;
  • fLanguage
    English
  • Journal_Title
    Computers, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9340
  • Type

    jour

  • DOI
    10.1109/TC.2006.110
  • Filename
    1637402