[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity

Published: 01 October 2007 Publication History

Abstract

High quality of security service is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distributed systems disregard security requirements of applications. To address this issue, in this paper, we introduce security heterogeneity concept for our scheduling model in the context of distributed systems. Based on the concept, we propose a novel heuristic scheduling algorithm, or SATS, which strives to maximize the probability that all tasks are executed without any risk of being attacked. Extensive experimental studies using real-world traces indicate that the scheduling performance is affected by heterogeneities of security and computational power. Additionally, empirical results demonstrate that with respect to security and performance, the proposed scheduling algorithm outperforms existing approaches under a wide spectrum of workload conditions.

References

[1]
T.D. Braun, et al., A comparison study of static mapping heuristics for a class of meta-tasks on heterogeneous computing systems, in: Proceedings of the Workshop on Heterogeneous Computing, April 1999, pp. 15--29.
[2]
A. Campbell, G. Coulson, F. Garcia, D. Hutchinson, H. Leopold, Integrated quality of service for multimedia communications, in: Proceedings of the 12th Annual Joint Conference IEEE Computer and Communications Societies (INFOCOM'93), 1993, pp. 732--739.
[3]
Y.J. Choi, S. Bahk, QoS scheduling for multimedia traffic in packet data cellular networks, in: IEEE International Conference on Communications, 2003, pp. 358--362.
[4]
B. Choi, D. Seo, On the study of service security model for privacy using global user management framework, in: Proceedings of the 8th International Conference on Advanced Communication Technology, 2006, pp. 113--116.
[5]
J. Combaz, J.C. Fernandez, T. Lepley, J. Sifakis, QoS control for optimality and safety, in: Proceedings of the 5th ACM International Conference on Embedded Software, 2005, pp. 90--99.
[6]
K. Connelly, A.A. Chien, Breaking the barriers: high performance security for high performance computing, in: Proceedings of the Workshop on New security paradigms, Virginia, September 2002.
[7]
A. Dogan, F. Ozguner, On QoS-based scheduling of a meta-task with multiple QoS demands in heterogeneous computing, in: Proceedings of the International Symposium on Parallel and Distributed Processing (IPDPS), 2002, pp. 50--55.
[8]
A. Dogan, F. Özgüner, LDBS: a duplication based scheduling algorithm for heterogeneous computing systems, in: Proceedings of the International Conference on Parallel Processing, B.C., Canada, 2002, pp. 352--359.
[9]
G. Donoho, Building a Web Service to Provide Real-Time Stock Quotes, MCAD.Net, February, 2004.
[10]
Ghosh, S., Rajkumar, R., Hansen, J.P. and Lehoczky, J.P., Integrated QoS-aware resource management and scheduling with multi-resource constraints. Real-Time Systems. v33. 7-46.
[11]
A. Gulati, P. Varman, Lexicographic QoS scheduling for parallel I/O, in: 17th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA'05), 2005, pp. 29--38.
[12]
M. Harchol-Balter, N. Bansal, B. Schroder, M. Agrawal, SRPT scheduling for web servers, in: Proceedings of the 7th International Workshop Job Scheduling Strategies for Parallel Processing, MA, June 2001, pp. 11--20.
[13]
He, X., Sun, X. and Laszewski, G., QoS guided min-min heuristic for grid task scheduling. J. Comput. Sci. Technol. v18 i4. 442-451.
[14]
C. Irvine, T. Levin, Toward a Taxonomy and Costing Method for Security Services, in: Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC), 1999.
[15]
C. Irvine, T. Levin, Toward quality of security service in a resource management system benefit function, in: Proceedings of the 9th Heterogeneous Computing Workshop (HCW), 2000, pp. 133--139.
[16]
C. Irvine, T. Levin, The effects of security choices and limits in a metacomputing environment, Naval Postgraduate School Technical Report, NPS-CS-00-004, Naval Postgraduate School, Monterey, CA, April 2000.
[17]
C. Irvine, T. Levin, E. Spyropoulou, B. Allen, Security as a dimension of quality of service in active service environments, in: Proceedings of the 3rd Annual International Workshop on Middleware Services, 2001, pp. 87--93.
[18]
Lampson, B., Abadi, M., Burrows, M. and Wobber, E., Authentication in distributed systems: theory and practice. ACM Trans. Computer Systems. v10 i4. 265-310.
[19]
X. Li, J. Wu, A hybrid searching scheme in unstructured P2P networks, in: Proceedings of the 34th International Conference on Parallel Processing, Norway, June 2005.
[20]
M. Lin, L.T. Yang, Schedulability driven security optimization in real-time systems, in: The 1st International Conference on Availability, Reliability and Security, 2006, pp. 314--320.
[21]
A. Marchand, M. Silly-Chetto, QoS scheduling components based on firm real-time requirements, in: The 3rd ACS/IEEE International Conference on Computer Systems and Applications, 2005, pp. 141--148.
[22]
D. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, Z. Xu, Peer-to-peer computing, Technical Report, HPL-2002-57, HP, 2002.
[23]
W.F. Pelgrin, Cyber security and critical infrastructure coordination (CSCIC). <http://www.cscic.state.ny.us/lib/glossary>.
[24]
B. Sabata, S. Chatterjee, M. Davis, J.J. Sydir, T.F. Lawrence, Taxonomy for QoS specifications, in: Proceedings of the 3rd International Workshop on Object-Oriented Real-Time Dependable Systems, 1997, pp. 100--107.
[25]
Sandhu, R.S., Role-based access control models. IEEE Computer. v29 i2. 38-47.
[26]
M.D. Santo, N. Ranaldo, E. Zimeo, Kernel implementations of locality-aware dispatching techniques for web server clusters, in: Proceedings of the IEEE International Conference on Cluster Computing, December 2003.
[27]
Son, S.H., Mukkamala, R. and David, R., Integrating security and real-time requirements using covert channel capacity. IEEE Trans. Knowledge and Data Engineering. v12 i6. 865-879.
[28]
S. Song, Y.-K. Kwok, K. Hwang, Trusted Job Scheduling in Open Computational Grids: Security-Driven Heuristics and A Fast Genetic Algorithms, in: Proceedings of the International Symposium on Parallel and Distributed Processing, 2005.
[29]
VeriSign Corp., Simplifying application and web services security---VeriSign trust gateway, 2003.
[30]
H.H. Wan, X. Lin, Multiple priorities QoS scheduling for simultaneous videos transmissions, in: Proceedings of the International Symposium on Multimedia Software Engineering, 2000, pp. 135--141.
[31]
Wigard, J., Madsen, N., Ameigeiras, P., López, I. and Mogensen, P., Packet scheduling with QoS differentiation. Wireless Personal Communications: An International Journal. v23 i1. 147-160.
[32]
Xia, Z. and Hu, Y., Extending RSVP for quality of security service. IEEE Internet Comput. v10 i2. 51-57.
[33]
Xia, Z., Wang, J. and Qin, X., Dynamically negotiated security service for multicast application in the active network. IEE Proc. Comm. v153 i1. 31-38.
[34]
T. Xie, X. Qin, A Security Middleware Model for Real-time Applications on Grids, IEICE Transactions on Information and Systems, Special Issue on Parallel/Distributed Computing and Networking E89-D(2) (2006) pp. 631--638.
[35]
Xie, T. and Qin, X., Scheduling security-critical real-time applications on clusters. IEEE Trans. Comput. v55 i7. 864-879.
[36]
T. Xie, X. Qin, A. Sung, M. Lin, L.T. Yang, Real-time scheduling with quality of security constraints, Internat. J. High Performance Comput. and Networking (IJHPCN) 4(2) (2006).

Cited By

View all
  • (2022)Cloud and Big Data Security System’s Review Principles: A Decisive InvestigationWireless Personal Communications: An International Journal10.1007/s11277-022-09781-0126:2(1013-1050)Online publication date: 1-Sep-2022
  • (2019)Security and Cost-Aware Computation Offloading via Deep Reinforcement Learning in Mobile Edge ComputingWireless Communications & Mobile Computing10.1155/2019/38162372019Online publication date: 23-Dec-2019
  • (2017)Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in CloudsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2017.267850728:9(2674-2688)Online publication date: 7-Aug-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Parallel and Distributed Computing
Journal of Parallel and Distributed Computing  Volume 67, Issue 10
October, 2007
89 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 October 2007

Author Tags

  1. Computational heterogeneity
  2. Degree of security deficiency
  3. Heterogeneous distributed system
  4. Risk-free probability
  5. Scheduling algorithm
  6. Security heterogeneity
  7. Security overhead

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Cloud and Big Data Security System’s Review Principles: A Decisive InvestigationWireless Personal Communications: An International Journal10.1007/s11277-022-09781-0126:2(1013-1050)Online publication date: 1-Sep-2022
  • (2019)Security and Cost-Aware Computation Offloading via Deep Reinforcement Learning in Mobile Edge ComputingWireless Communications & Mobile Computing10.1155/2019/38162372019Online publication date: 23-Dec-2019
  • (2017)Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in CloudsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2017.267850728:9(2674-2688)Online publication date: 7-Aug-2017
  • (2017)Energy cost minimization with job security guarantee in Internet data centerFuture Generation Computer Systems10.1016/j.future.2016.12.01773:C(63-78)Online publication date: 1-Aug-2017
  • (2016)A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in cloudsFuture Generation Computer Systems10.1016/j.future.2015.12.01465:C(140-152)Online publication date: 1-Dec-2016
  • (2015)Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environmentsInternational Journal of Web and Grid Services10.1504/IJWGS.2015.06715911:1(4-20)Online publication date: 1-Jan-2015
  • (2015)SABAJournal of Parallel and Distributed Computing10.1016/j.jpdc.2014.09.00275:C(141-151)Online publication date: 1-Jan-2015
  • (2015)A Security-Critical Task Management Method for Distributed Real-Time SystemsProceedings of the ICA3PP International Workshops and Symposiums on Algorithms and Architectures for Parallel Processing - Volume 953210.1007/978-3-319-27161-3_41(454-464)Online publication date: 18-Nov-2015
  • (2014)Security-aware intermediate data placement strategy in scientific cloud workflowsKnowledge and Information Systems10.1007/s10115-014-0755-x41:2(423-447)Online publication date: 1-Nov-2014
  • (2013)Security Driven Scheduling Model for Computational Grid Using NSGA-IIJournal of Grid Computing10.1007/s10723-013-9251-x11:4(721-734)Online publication date: 1-Dec-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media