DocumentCode
950885
Title
Scheduling security-critical real-time applications on clusters
Author
Xie, Tao ; Qin, Xiao
Author_Institution
Dept. of Comput. Sci., San Diego State Univ., CA, USA
Volume
55
Issue
7
fYear
2006
fDate
7/1/2006 12:00:00 AM
Firstpage
864
Lastpage
879
Abstract
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications´ security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, least laxity first, and first come first serve) by up to 266.7 percent while achieving high schedulability.
Keywords
real-time systems; scheduling; security of data; workstation clusters; cluster computing systems; earliest deadline first scheduling policy; security overhead model; security-aware real-time heuristic strategy; security-aware real-time scheduling algorithm; security-critical real-time applications; Aerospace control; Authentication; Computer networks; Data security; Information security; Processor scheduling; Protection; Radar tracking; Real time systems; Scheduling algorithm; Clusters; real-time systems; scheduling; security overhead model.; security-critical applications;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2006.110
Filename
1637402
Link To Document