Abstract
Security critical real time applications running over clusters are increasing day by day. These applications some times are battery operated thus they should consume minimum energy while providing both timeliness and security. Conventional real time scheduling algorithm performs poorly when used for scheduling real time application with above said constraints. So it is required to develop a scheduling approach which satisfies the above said constraints i.e. Security, Energy in such applications. We present an approach based on Dynamic Voltage Scaling (DVS) which guarantees at least minimum security (one of the QoS parameter) for the tasks with energy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Liu, J.W.S.: Real Time Systems
Stewart, D.B.: Courtesy of Embedded System Design
Pourzandi, M., Haddad, I., Levert, C., Zakrzewski, M.: A New Architecture for Secure Carrier-Class Clusters. IEEE International Conference on Cluster Computing, 494–497, 23-26 (September 2002)
Dessouly, A.A., Ammar, R., Ayman, E.: Scheduling Real Time Parallel Structures on Cluster Computing with Possible Processor Failure. In: IEEE 9th International Symposium on Computers and Communications, 28 June-1 July, vol. 1, pp. 62–67 (2004)
Xie, T., Qin, X.: Sheduling Security Aware Real Time Applications on Clusters. IEEE transactions on computers 55(7), 864–879 (2006)
Yadav, R.S., Songra, A., Tripathi, S.: Modified approach for securing Real time applications on clusters. International Journal of Security 1(1) (July 2007)
Stalling, W.: Cryptography and Network Securities (2003)
Parnas, D.L., Xu, J.: Scheduling Processes with Release Times, Deadlines, Precedence and Exclusion Relations. IEEE Transactions on Software Engineering 16(3), 360–369 (1990)
Gagne, T., Shepard, M.: A Pre-Run-Time Scheduling Algorithm for Hard Real Time Systems. IEEE Transactions on Software Engineering 17(7), 669–677 (1991)
Kavi, Li, W., Krishna: A Non Premptive Scheduling Algorithm for Soft Real Time Systems. Computers & Electrical Engineering 33(1), 12–29 (2007)
Dertouzos, M.L., Mok, A.K.: Multi-Processor Online Scheduling of Hard Real- Time Tasks. IEEE Transactions on Software Engineering 15(12), 1497–1506 (1989)
Hong, A.J., Tan, X., Towsley, D.: Performance analysis of minimum laxity and earliest deadline scheduling in a real time system. IEEE Transactions on Computers 38(12), 1736–1744 (1989)
Martel, C.U., Jeffay, K.: On Non-Preemptive Scheduling of periodic and Sporadic Tasks. In: Proceedings of the 12th IEEE Real-Time Systems Symposium, pp. 129–139. IEEE Computer Society Press, San Antonio (1991)
Sterling, T., Savarese, D.: A parallel workstation for scientific computation. In: Proceedings of the 24th International Conference on Parallel Processing, August 14-18. Architecture, vol. I, Urbana-Champain, Illinois (1995)
Shiloh, O.T., Barak, A.: Scalable cluster computing with MOSIX for LINUX. In: Proceedings of 5th Annual Linux Expo., pp. 95–100 (May 1999)
Genesis, M.H., Goscinski, A.M., Silock, J.: The operating system managing parallelism and providing single system image on cluster. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, Springer, Heidelberg (2003)
Lee, M., Kim, E.J., Yum, K.H.: An overview of security issues in cluster interconnects. In: Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops, May 16-19, vol. 2, p. 9 (2006)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security CCS 1998 (1998)
Foster, I., Karonis, N.: Managing Security in High Performance Distributed Computations. Journal of Cluster Computing 1(1), 95–107 (1998)
Ferrari, A., et al.: A flexible security system for Metacomputing Environments (1999), http://www.cs.virginia.edu/papers/hpcn99.pdf
David, R., Son, S., Mukkamala, R.: Supporting Security Requirements in Multilevel Real Time Database. In: IEEE Symposium on Security and Privacy, May 8-10, pp. 199–210 (1995)
Mukkamala, R., Son, S.: A Secure Concurrency Control Protocol for Real-Time Database. In: IFIP Workshop on Database Security (1995)
Son, S.H., Chaney, C., Thomlinson, N.: Partial Security policy to Support Timeliness in Secure Real Time Databases. In: IEEE Symposium on Security and Privacy, May 3-6, pp. 136–147 (1998)
Bosselaers, A., Govaerts, R., Vandewalle, J.: Fast Hashing on the Pentium. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 298–312. Springer, Heidelberg (1996)
Elkeelany, O., Matalgah, M., Sheikh, K.: Performance Analysis of IPSEC Protocol: Encryption & Authentication. In: IEEE International Conference on Communication, vol. 2, pp. 1164–1168 (2002)
Zhang, X., Qu, Y., Xiao, L.: Improving Distributed Workload Performance by Sharing both CPU and Memory Resources. In: International Conference on Distributed Computing Systems (2000)
Deepkumara, J., Heys, H.M., Venkatesan, R.: Performance Comparison of Message Authentication Code for Internet protocol Security (2003), http://www.engr.mun.ca/~howard/PAPERS/necec_2003b.pdf
Mossé, D., Aydin, H., Childers, B., Melhem, R.: Compiler-Assisted Dynamic Power-Aware Scheduling for Real-Time Applications. In: Workshop on Compiler and OS for Low Power (2000)
Qiu, Q., Wu, Q., Pedram, M.: Dynamic Power Management in a Mobile Multimedia System with Guaranteed Quality-of-Service. In: ACM/IEEE Design Automation Conference, pp. 834–839 (2001)
Hua, S., Qu, G.: Energy-Efficient Dual-Voltage Soft Real-Time System with (m, k)-Firm Deadline Guarantee. In: CASES 2004, Washington, DC, USA, September 22–25, pp. 116–123 (2004)
Niu, L., Quan, G.: Energy-Aware Scheduling for Real-Time Systems With (m; k)-Guarantee., Dept. Comput. Sci. Eng., Univ. South Carolina. Tech. Rep. (2005)
Qu, G., Potkonjak, M.: Power Minimization Using System-Level partitioning of Applications with Quality of Service Requirements. In: IEEE/ACM International Conference on Computer-Aided Design, pp. 343–346 (1999)
Quan, G., Hu, X.: Energy Efficient Fixed-Priority Scheduling for Real-Time Systems on Variable Voltage Processors. In: 38th IEEE/ACM Design Automation Conference (2001)
Niu, L., Quan, G.: System-wide dynamic power management for multimedia portable devices. Accepted by IEEE International Symposium on Multimedia, ISM 2006 (2006)
Niu, L., Quan, G.: Energy Minimization for Real-Time Systems With (m; k)-Guarantee. IEEE Transaction on Very Large Scale Integration (VLSI) System 14(7) (July 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ojha, R.P., Yadav, R.S., Tripathi, S. (2013). Secure Real Time Scheduling on Cluster with Energy Minimization. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_78
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_78
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)