Skip to main content

A Security-Critical Task Management Method for Distributed Real-Time Systems

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

  • 1743 Accesses

Abstract

Security has become an important constraint in distributed real-time task system. For this paper, we give a security-critical distributed real-time task management model, then present a scheme for security-critical task management in the distributed real-time system, finally we propose an algorithm to solve the management problem in the distributed real-time system. We propose a security-critical distributed real-time task management model, and formulate the security-critical distributed real-time system task management issue into a shortest path problem. We solve the shortest path problem by using the improved Dijkstra algorithm. In addition, we validate the efficiency of the algorithm by simulation experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Loyall, J., Schantz, R.: A distributed real-time embedded application for surveillance, detection, and tracking of time critical targets. In: Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 88–97 (2005)

    Google Scholar 

  2. Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19, 682–697 (2008)

    Article  Google Scholar 

  3. Xie, T., Qin, X.: Performance evaluation of a new management algorithm for distributed systems with security heterogeneity. J. Parallel Distrib. Comput. 67(10), 1067–1081 (2007)

    Article  MATH  Google Scholar 

  4. Xie, T., Qin, X., Sung, A.: SAREC: a security-aware management strategy for real-time applications on clusters. In: Proceeding of ICPP 2005 Conference, Norway, pp. 5–12 (2005)

    Google Scholar 

  5. Huang, J., Wang, Y., Cao, F.: On developing distributed middleware services for QoS and criticality-based resource negotiation and adaptation. Real-Time Syst. 16(2), 187–221 (2007)

    Google Scholar 

  6. Jinyu, Z., Guangze, X.: Optimal hardware/software co-synthesis for core-based SoC designs. J. Syst. Eng. Electron. 17(2), 402–409 (2006)

    Article  MATH  Google Scholar 

  7. Apvrille, A., Pourzandi, M.: XML distributed security policy for clusters. Comput. Secur. J. 23(8), 649–658 (2007)

    Article  Google Scholar 

  8. Azzedin, F., Maheswaran, M.: Towards trust-aware resource management in grid computing systems. In: Proceedings of the Second IEEE/ACM International Symposium on Cluster Computing and the Grid (2002)

    Google Scholar 

  9. Hou, C.-J., Shin, K.G.: Allocation of periodic task modules with precedence and deadline constraints in distributed real-time systems. IEEE Trans. Comput. 46(12), 1338–1355 (2008)

    MathSciNet  Google Scholar 

  10. Garey, M.R., Johnson, D.S.: Strong NP-completeness results: motivation, examples, and implications. J. Assoc. Comput. Mach. 25(3), 499–508 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Houstis, C.E.: Module allocation of real-time applications for distributed systems. IEEE Trans. Softw. Eng. 16(7), 699–709 (2007)

    Article  Google Scholar 

  12. Tindell, K., Clark, J.: Holistic schedulability analysis for distributed hard real-time systems. Micro-processing Microprogramming 40(20), 117–134 (2008)

    Google Scholar 

  13. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the Fifth Conference on Computer and Communications Security San Francisco, CA, pp. 80–94 (2008)

    Google Scholar 

  14. Hong, K.S., Leung, J.Y.-T.: On-line management of real-time tasks. IEEE Trans. Comput. 41(10), 1326–1331 (2008)

    Article  Google Scholar 

  15. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading (1989)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yu, Y., Dong, Q., Luo, Z., Chen, H., Deng, J., Guan, W. (2015). A Security-Critical Task Management Method for Distributed Real-Time Systems. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics