DocumentCode :
950885
Title :
Scheduling security-critical real-time applications on clusters
Author :
Xie, Tao ; Qin, Xiao
Author_Institution :
Dept. of Comput. Sci., San Diego State Univ., CA, USA
Volume :
55
Issue :
7
fYear :
2006
fDate :
7/1/2006 12:00:00 AM
Firstpage :
864
Lastpage :
879
Abstract :
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard applications´ security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition that many applications running on clusters demand both real-time performance and security, we investigate the problem of scheduling a set of independent real-time tasks with various security requirements. We build a security overhead model that can be used to reasonably measure security overheads incurred by the security-critical tasks. Next, we propose a security-aware real-time heuristic strategy for clusters (SAREC), which integrates security requirements into the scheduling for real-time applications on clusters. Further, to evaluate the performance of SAREC, we incorporate the earliest deadline first (EDF) scheduling policy into SAREC to implement a novel security-aware real-time scheduling algorithm (SAEDF). Experimental results from both real-world traces and a real application show that SAEDF significantly improves security over three existing scheduling algorithms (EDF, least laxity first, and first come first serve) by up to 266.7 percent while achieving high schedulability.
Keywords :
real-time systems; scheduling; security of data; workstation clusters; cluster computing systems; earliest deadline first scheduling policy; security overhead model; security-aware real-time heuristic strategy; security-aware real-time scheduling algorithm; security-critical real-time applications; Aerospace control; Authentication; Computer networks; Data security; Information security; Processor scheduling; Protection; Radar tracking; Real time systems; Scheduling algorithm; Clusters; real-time systems; scheduling; security overhead model.; security-critical applications;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/TC.2006.110
Filename :
1637402
Link To Document :
بازگشت