Title :
Scheduling security-critical real-time applications on clusters
Author :
Xie, Tao ; Qin, Xiao
Author_Institution :
Dept. of Comput. Sci., San Diego State Univ., CA, USA
fDate :
7/1/2006 12:00:00 AM
Abstract :
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications´ security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, least laxity first, and first come first serve) by up to 266.7 percent while achieving high schedulability.
Keywords :
real-time systems; scheduling; security of data; workstation clusters; cluster computing systems; earliest deadline first scheduling policy; security overhead model; security-aware real-time heuristic strategy; security-aware real-time scheduling algorithm; security-critical real-time applications; Aerospace control; Authentication; Computer networks; Data security; Information security; Processor scheduling; Protection; Radar tracking; Real time systems; Scheduling algorithm; Clusters; real-time systems; scheduling; security overhead model.; security-critical applications;
Journal_Title :
Computers, IEEE Transactions on
DOI :
10.1109/TC.2006.110