Title :
A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems
Author :
Tang Xiaoyong ; Li, Kenli ; Zeng, Zeng ; Veeravalli, Bharadwaj
Author_Institution :
Sch. of Comput. & Commun., Hunan Univ., Changsha, China
fDate :
7/1/2011 12:00:00 AM
Abstract :
In the recent past, security-sensitive applications, such as electronic transaction processing systems, stock quote update systems, which require high quality of security to guarantee authentication, integrity, and confidentiality of information, have adopted heterogeneous distributed system (HDS) as their platforms. This is primarily due to the fact that single parallel-architecture-based systems may not be sufficient to exploit the available parallelism with the running applications. Most security-aware applications end up in handling dependence tasks, also referred to as Directed Acyclic Graph (DAG), on these HDSs. Unfortunately, most existing algorithms for scheduling such DAGs in HDS fail to fully consider security requirements. In this paper, we systematically design a security-driven scheduling architecture that can dynamically measure the trust level of each node in the system by using differential equations. To do so, we introduce task priority rank to estimate security overhead of such security-critical tasks. Furthermore, we propose a security-driven scheduling algorithm for DAGs which can achieve high quality of security for applications. Our rigorous performance evaluation study results clearly demonstrate that our proposed algorithm outperforms the existing scheduling algorithms in terms of minimizing the makespan, risk probability, and speedup. We also observe that the improvement obtained by our algorithm increases as the security-sensitive data of applications increases.
Keywords :
differential equations; directed graphs; parallel processing; scheduling; security of data; differential equations; directed acyclic graph; heterogeneous distributed systems; precedence-constrained tasks; security-aware applications; security-critical task; security-driven scheduling algorithm; security-driven scheduling architecture; single parallel-architecture-based systems; task priority rank; Computational modeling; Heuristic algorithms; Peer to peer computing; Scheduling; Scheduling algorithm; Security; Directed acyclic graphs; heterogeneous distributed systems; precedence-constrained tasks.; scheduling algorithm; security overheads; security-driven;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2010.117