Skip to main content

Secure Real Time Scheduling on Cluster with Energy Minimization

  • Conference paper
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2013)

Abstract

Security critical real time applications running over clusters are increasing day by day. These applications some times are battery operated thus they should consume minimum energy while providing both timeliness and security. Conventional real time scheduling algorithm performs poorly when used for scheduling real time application with above said constraints. So it is required to develop a scheduling approach which satisfies the above said constraints i.e. Security, Energy in such applications. We present an approach based on Dynamic Voltage Scaling (DVS) which guarantees at least minimum security (one of the QoS parameter) for the tasks with energy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Liu, J.W.S.: Real Time Systems

    Google Scholar 

  2. Stewart, D.B.: Courtesy of Embedded System Design

    Google Scholar 

  3. Pourzandi, M., Haddad, I., Levert, C., Zakrzewski, M.: A New Architecture for Secure Carrier-Class Clusters. IEEE International Conference on Cluster Computing, 494–497, 23-26 (September 2002)

    Google Scholar 

  4. Dessouly, A.A., Ammar, R., Ayman, E.: Scheduling Real Time Parallel Structures on Cluster Computing with Possible Processor Failure. In: IEEE 9th International Symposium on Computers and Communications, 28 June-1 July, vol. 1, pp. 62–67 (2004)

    Google Scholar 

  5. Xie, T., Qin, X.: Sheduling Security Aware Real Time Applications on Clusters. IEEE transactions on computers 55(7), 864–879 (2006)

    Article  Google Scholar 

  6. Yadav, R.S., Songra, A., Tripathi, S.: Modified approach for securing Real time applications on clusters. International Journal of Security 1(1) (July 2007)

    Google Scholar 

  7. Stalling, W.: Cryptography and Network Securities (2003)

    Google Scholar 

  8. Parnas, D.L., Xu, J.: Scheduling Processes with Release Times, Deadlines, Precedence and Exclusion Relations. IEEE Transactions on Software Engineering 16(3), 360–369 (1990)

    Article  Google Scholar 

  9. Gagne, T., Shepard, M.: A Pre-Run-Time Scheduling Algorithm for Hard Real Time Systems. IEEE Transactions on Software Engineering 17(7), 669–677 (1991)

    Article  Google Scholar 

  10. Kavi, Li, W., Krishna: A Non Premptive Scheduling Algorithm for Soft Real Time Systems. Computers & Electrical Engineering 33(1), 12–29 (2007)

    Article  MATH  Google Scholar 

  11. Dertouzos, M.L., Mok, A.K.: Multi-Processor Online Scheduling of Hard Real- Time Tasks. IEEE Transactions on Software Engineering 15(12), 1497–1506 (1989)

    Article  Google Scholar 

  12. Hong, A.J., Tan, X., Towsley, D.: Performance analysis of minimum laxity and earliest deadline scheduling in a real time system. IEEE Transactions on Computers 38(12), 1736–1744 (1989)

    Article  MathSciNet  Google Scholar 

  13. Martel, C.U., Jeffay, K.: On Non-Preemptive Scheduling of periodic and Sporadic Tasks. In: Proceedings of the 12th IEEE Real-Time Systems Symposium, pp. 129–139. IEEE Computer Society Press, San Antonio (1991)

    Google Scholar 

  14. Sterling, T., Savarese, D.: A parallel workstation for scientific computation. In: Proceedings of the 24th International Conference on Parallel Processing, August 14-18. Architecture, vol. I, Urbana-Champain, Illinois (1995)

    Google Scholar 

  15. Shiloh, O.T., Barak, A.: Scalable cluster computing with MOSIX for LINUX. In: Proceedings of 5th Annual Linux Expo., pp. 95–100 (May 1999)

    Google Scholar 

  16. Genesis, M.H., Goscinski, A.M., Silock, J.: The operating system managing parallelism and providing single system image on cluster. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, Springer, Heidelberg (2003)

    Google Scholar 

  17. Lee, M., Kim, E.J., Yum, K.H.: An overview of security issues in cluster interconnects. In: Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops, May 16-19, vol. 2, p. 9 (2006)

    Google Scholar 

  18. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security CCS 1998 (1998)

    Google Scholar 

  19. Foster, I., Karonis, N.: Managing Security in High Performance Distributed Computations. Journal of Cluster Computing 1(1), 95–107 (1998)

    Article  Google Scholar 

  20. Ferrari, A., et al.: A flexible security system for Metacomputing Environments (1999), http://www.cs.virginia.edu/papers/hpcn99.pdf

  21. David, R., Son, S., Mukkamala, R.: Supporting Security Requirements in Multilevel Real Time Database. In: IEEE Symposium on Security and Privacy, May 8-10, pp. 199–210 (1995)

    Google Scholar 

  22. Mukkamala, R., Son, S.: A Secure Concurrency Control Protocol for Real-Time Database. In: IFIP Workshop on Database Security (1995)

    Google Scholar 

  23. Son, S.H., Chaney, C., Thomlinson, N.: Partial Security policy to Support Timeliness in Secure Real Time Databases. In: IEEE Symposium on Security and Privacy, May 3-6, pp. 136–147 (1998)

    Google Scholar 

  24. Bosselaers, A., Govaerts, R., Vandewalle, J.: Fast Hashing on the Pentium. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 298–312. Springer, Heidelberg (1996)

    Google Scholar 

  25. Elkeelany, O., Matalgah, M., Sheikh, K.: Performance Analysis of IPSEC Protocol: Encryption & Authentication. In: IEEE International Conference on Communication, vol. 2, pp. 1164–1168 (2002)

    Google Scholar 

  26. Zhang, X., Qu, Y., Xiao, L.: Improving Distributed Workload Performance by Sharing both CPU and Memory Resources. In: International Conference on Distributed Computing Systems (2000)

    Google Scholar 

  27. Deepkumara, J., Heys, H.M., Venkatesan, R.: Performance Comparison of Message Authentication Code for Internet protocol Security (2003), http://www.engr.mun.ca/~howard/PAPERS/necec_2003b.pdf

  28. Mossé, D., Aydin, H., Childers, B., Melhem, R.: Compiler-Assisted Dynamic Power-Aware Scheduling for Real-Time Applications. In: Workshop on Compiler and OS for Low Power (2000)

    Google Scholar 

  29. Qiu, Q., Wu, Q., Pedram, M.: Dynamic Power Management in a Mobile Multimedia System with Guaranteed Quality-of-Service. In: ACM/IEEE Design Automation Conference, pp. 834–839 (2001)

    Google Scholar 

  30. Hua, S., Qu, G.: Energy-Efficient Dual-Voltage Soft Real-Time System with (m, k)-Firm Deadline Guarantee. In: CASES 2004, Washington, DC, USA, September 22–25, pp. 116–123 (2004)

    Google Scholar 

  31. Niu, L., Quan, G.: Energy-Aware Scheduling for Real-Time Systems With (m; k)-Guarantee., Dept. Comput. Sci. Eng., Univ. South Carolina. Tech. Rep. (2005)

    Google Scholar 

  32. Qu, G., Potkonjak, M.: Power Minimization Using System-Level partitioning of Applications with Quality of Service Requirements. In: IEEE/ACM International Conference on Computer-Aided Design, pp. 343–346 (1999)

    Google Scholar 

  33. Quan, G., Hu, X.: Energy Efficient Fixed-Priority Scheduling for Real-Time Systems on Variable Voltage Processors. In: 38th IEEE/ACM Design Automation Conference (2001)

    Google Scholar 

  34. Niu, L., Quan, G.: System-wide dynamic power management for multimedia portable devices. Accepted by IEEE International Symposium on Multimedia, ISM 2006 (2006)

    Google Scholar 

  35. Niu, L., Quan, G.: Energy Minimization for Real-Time Systems With (m; k)-Guarantee. IEEE Transaction on Very Large Scale Integration (VLSI) System 14(7) (July 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ojha, R.P., Yadav, R.S., Tripathi, S. (2013). Secure Real Time Scheduling on Cluster with Energy Minimization. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics