Skip to main content
Top
Published in: Cluster Computing 2/2020

07-08-2019

Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid

Authors: Surendra Singh, Suvadip Batabyal, Sachin Tripathi

Published in: Cluster Computing | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is a major concern of modern real-time applications, besides requiring stringent latency bound. However, encryption algorithms are computation intensive task which impacts the timeliness of the real-time applications. Therefore, there exists a trade-off between the desired level of security and the service guarantee. In this paper, we propose a security-aware dynamic scheduling algorithm (SADSA) using a grid of computational elements (CEs) which performs this trade-off and tries to maximize the instantaneous average security level of the packets besides providing a guaranteed service. As packets arrive, we first assign them to the CEs based on the utilization value of a CE, which is the ratio of completion time and a deadline of the last packet in a CE. The security level of all the packets is then dynamically adjusted to meet the minimum required security level while maximizing the average security level of all the packets in that CE. We first show that the proposed assignment algorithm is NP-hard, is 2-competitive to the optimal solution, and that the proposed algorithm provides a sub-optimal solution. Further, using extensive simulation, we show that the proposed SADSA algorithm performs better in terms of guarantee ratio, average security level and overall performance compared to the existing algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
High-security level requires greater computation resources like CPU cycle, memory requirement, etc. Hence, the more complex algorithm requires more time to encrypt a given message. However, the time required may also depend on other factors like a number of bits to be encrypted (block length) and key length [1].
 
2
We have assumed that under optimal allocation, the system under steady-state condition will be non-blocking. That is, there is no packet drop due to insufficient buffer space.
 
3
It must be noted that the security level of a packet is \(0.1\le Sl^i\le 1.0\)
 
Literature
1.
go back to reference Atdelzater, T.F., Atkins, E.M., Shin, K.G.: QoS negotiation in real-time systems and its application to automated flight control. IEEE Trans. Comput. 49(11), 1170–1183 (2000)CrossRef Atdelzater, T.F., Atkins, E.M., Shin, K.G.: QoS negotiation in real-time systems and its application to automated flight control. IEEE Trans. Comput. 49(11), 1170–1183 (2000)CrossRef
2.
go back to reference Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19(5), 682–697 (2008)CrossRef Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19(5), 682–697 (2008)CrossRef
3.
go back to reference Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: Proceedings of the International Conference on Parallel Processing (ICPP’05), pp. 5–12 (2005) Xie, T., Qin, X., Sung, A.: SAREC: a security-aware scheduling strategy for real-time applications on clusters. In: Proceedings of the International Conference on Parallel Processing (ICPP’05), pp. 5–12 (2005)
4.
go back to reference Xie, T., Qin, X.: Scheduling security-critical real-time applications on clusters. IEEE Trans. Comput. 55(7), 864–879 (2006)CrossRef Xie, T., Qin, X.: Scheduling security-critical real-time applications on clusters. IEEE Trans. Comput. 55(7), 864–879 (2006)CrossRef
5.
go back to reference Saleh, M., Dong, L.: Real-time scheduling with security awareness for packet switched networks. In: IEEE Radio and Wireless Symposium (RWS’12), pp. 391–394 (2012) Saleh, M., Dong, L.: Real-time scheduling with security awareness for packet switched networks. In: IEEE Radio and Wireless Symposium (RWS’12), pp. 391–394 (2012)
6.
go back to reference Saleh, M., Dong, L.: Real-time scheduling with security enhancement for packet switched networks. IEEE Trans. Netw. Serv. Manag. 10(3), 271–285 (2013)CrossRef Saleh, M., Dong, L.: Real-time scheduling with security enhancement for packet switched networks. IEEE Trans. Netw. Serv. Manag. 10(3), 271–285 (2013)CrossRef
7.
go back to reference Singh, S., Tripathi, S., Batabyal, S.: Utilization based secured dynamic scheduling algorithm for real-time applications on grid (u-SDSA). In: 31st International IEEE Conference on Advanced Information Networking and Applications (AINA’17), pp. 606-613 (2017) Singh, S., Tripathi, S., Batabyal, S.: Utilization based secured dynamic scheduling algorithm for real-time applications on grid (u-SDSA). In: 31st International IEEE Conference on Advanced Information Networking and Applications (AINA’17), pp. 606-613 (2017)
8.
go back to reference Xie, T., Qin, X.: Enhancing security of real-time applications on grids through dynamic scheduling (SAREG). In: 11th International Workshop Job Scheduling Strategies for Parallel Processing (JSSPP’05), vol. 3834, pp. 219–237 (2005) Xie, T., Qin, X.: Enhancing security of real-time applications on grids through dynamic scheduling (SAREG). In: 11th International Workshop Job Scheduling Strategies for Parallel Processing (JSSPP’05), vol. 3834, pp. 219–237 (2005)
9.
go back to reference Xie, T., Qin, X.: A security middleware model for real-time applications on grids. IEICE Trans. Inf. Syst. Spec. Issue Parallel Distrib. Comput. Netw. E89–D(2), 631–638 (2006) Xie, T., Qin, X.: A security middleware model for real-time applications on grids. IEICE Trans. Inf. Syst. Spec. Issue Parallel Distrib. Comput. Netw. E89–D(2), 631–638 (2006)
10.
go back to reference Jiang, W., Guo, W., Sang, N.: Periodic real-time message scheduling for confidentiality-aware cyber-physical System in wireless networks. In: 5th IEEE International Conference on Frontier of Computer Science and Technology, pp. 355–360 (2010) Jiang, W., Guo, W., Sang, N.: Periodic real-time message scheduling for confidentiality-aware cyber-physical System in wireless networks. In: 5th IEEE International Conference on Frontier of Computer Science and Technology, pp. 355–360 (2010)
11.
go back to reference Jung, Y., Festijo, E.: Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, pp. 659–666, VIC (2013) Jung, Y., Festijo, E.: Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, pp. 659–666, VIC (2013)
12.
go back to reference Singh, S., Tripathi, S., Batabyal, S.: Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. Information Systems Security, pp. 283–300. Springer, Berlin (2016) Singh, S., Tripathi, S., Batabyal, S.: Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. Information Systems Security, pp. 283–300. Springer, Berlin (2016)
13.
go back to reference Karnik, A., Passerini, K.: Wireless network security—a discussion from a business perspective. In: Wireless Telecommunications Symposium (WTS’05), pp. 261–267 (2005) Karnik, A., Passerini, K.: Wireless network security—a discussion from a business perspective. In: Wireless Telecommunications Symposium (WTS’05), pp. 261–267 (2005)
14.
go back to reference Lu, S., Bharghavan, V., Srikant, R.: Fair scheduling in wireless packet networks. IEEE/ACM Trans. Netw. 7(4), 473–489 (1999)CrossRef Lu, S., Bharghavan, V., Srikant, R.: Fair scheduling in wireless packet networks. IEEE/ACM Trans. Netw. 7(4), 473–489 (1999)CrossRef
15.
go back to reference Qin, X., Alghamdi, M., Nijim, M., Zong, Z., Bellam, K., Ruan, X., Manzanares, A.: Improving security of real-time wireless networks through packet scheduling. IEEE Trans. Wirel. Commun. 7(9), 3273–3279 (2008)CrossRef Qin, X., Alghamdi, M., Nijim, M., Zong, Z., Bellam, K., Ruan, X., Manzanares, A.: Improving security of real-time wireless networks through packet scheduling. IEEE Trans. Wirel. Commun. 7(9), 3273–3279 (2008)CrossRef
16.
go back to reference Zhu, X., Guo, H., Liang, S., Yang, X.: An improved security-aware packet scheduling algorithm in real-time wireless networks. Inf. Process. Lett. 7(112), 282–288 (2012)MathSciNetCrossRef Zhu, X., Guo, H., Liang, S., Yang, X.: An improved security-aware packet scheduling algorithm in real-time wireless networks. Inf. Process. Lett. 7(112), 282–288 (2012)MathSciNetCrossRef
17.
go back to reference Xie, T., Qin, X.: Security-driven scheduling for data-intensive applications on grids. Clust. Comput. 10(2), 145–153 (2007)CrossRef Xie, T., Qin, X.: Security-driven scheduling for data-intensive applications on grids. Clust. Comput. 10(2), 145–153 (2007)CrossRef
18.
go back to reference Mohan, S., Yoon, M., Pellizzoni, R., Bobba, R.: Integrating security constraints into fixed priority real-time schedulers. Real Time Syst. 52(5), 644–674 (2016)CrossRef Mohan, S., Yoon, M., Pellizzoni, R., Bobba, R.: Integrating security constraints into fixed priority real-time schedulers. Real Time Syst. 52(5), 644–674 (2016)CrossRef
19.
go back to reference Kashyap, R., Vidyarthi, D.P.: Security driven scheduling model for computational grid using NSGA-II. J. Grid Comput. 11(4), 721–734 (2013)CrossRef Kashyap, R., Vidyarthi, D.P.: Security driven scheduling model for computational grid using NSGA-II. J. Grid Comput. 11(4), 721–734 (2013)CrossRef
20.
go back to reference Xie, T., Sung, A., Qin, X.: Dynamic task scheduling with security awareness in real-time systems. In: 19th IEEE International Parallel and Distributed Processing Symposium, p. 8 (2005) Xie, T., Sung, A., Qin, X.: Dynamic task scheduling with security awareness in real-time systems. In: 19th IEEE International Parallel and Distributed Processing Symposium, p. 8 (2005)
21.
go back to reference D’Amico, M., Diaz, J.C.D., Iori, M.: Bin packing problem with precedence constraints. Oper. Res. 60(6), 1491–1504 (2012)MathSciNetCrossRef D’Amico, M., Diaz, J.C.D., Iori, M.: Bin packing problem with precedence constraints. Oper. Res. 60(6), 1491–1504 (2012)MathSciNetCrossRef
22.
go back to reference Kang, J., Park, S.: Algorithms for the variable sized bin packing problem. Eur. J. Oper. Res. 147(2003), 365–372 (2003)MathSciNetCrossRef Kang, J., Park, S.: Algorithms for the variable sized bin packing problem. Eur. J. Oper. Res. 147(2003), 365–372 (2003)MathSciNetCrossRef
Metadata
Title
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid
Authors
Surendra Singh
Suvadip Batabyal
Sachin Tripathi
Publication date
07-08-2019
Publisher
Springer US
Published in
Cluster Computing / Issue 2/2020
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-019-02970-w

Other articles of this Issue 2/2020

Cluster Computing 2/2020 Go to the issue

Premium Partner