Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Modified Approach For Securing Real Time Application On Clusters.
Abhishek Songra, Rama Shankar Yadav, Sarsij Tripathi
Pages - 32 - 44     |    Revised - 15-06-2007     |    Published - 30-06-2007
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
Real time System, Scheduling, Security Services, Clusters
In today arena security critical real time applications running over clusters are growing very rapidly. As an application running on clusters demand both timeliness and security thus, an efficient scheduling algorithm is needed that have better performance in terms of both number of task accepted and security value received. This paper modifies the security aware scheduling approach [5] by utilizing the concept of task criticality and adaptive threshold value. Also, this paper discus the system architecture used, mathematical model, lemmas and modified scheduling approach. Further, simulation studies have been carried out in MATLAB (module for Real-time) to measure the performance of modified approach. The modified approach is applicable over wide range of application differing in there requirement and have better performance.
CITED BY (1)  
1 Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 ScientificCommons
4 Academic Index
5 CiteSeerX
6 refSeek
8 Socol@r
9 ResearchGATE
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 slideshare
15 PdfSR
1 Makan Pourzandi, Ibrahim Haddad, Charles Levert, MiroslawZakrzewski: A New Architecture for Secure Carrier- Class Clusters. IEEE International Conference on Cluster Computing, 23-26 Sept. 2002, Page(s):494 – 497.
2 Dessouly, Alaa Amin and Reda Ammar and Ayman El: Scheduling Real Time Parallel Structures on Cluster Computing with Possible Processor Failure. IEEE 9th International Symposium on Computers and Communications, Volume 1, 28 June-1 July 2004, Page(s):62 – 67.
3 Parnas, J.Xu and D.L.: Scheduling Processes with Release Times, Deadlines, Precedence and Exclusion Relations. Transactions on Software Engineering, IEEE Volume 16, Issue 3, March 1990, Page(s):360 - 369
4 SHILOH, O. t. Amnon BARAK: Scalable cluster computing with MOSIX for LINUX. In Proceedings of 5th Annual Linux Expo, pages 95--100, May 1999.
5 Qin, Tao Xie and Xiao: Scheduling Security Critical Real Time Applications on Clusters. IEEE transactions on computers, Vol. 55, no 7, pp. 864-879 July 2006.
6 Gagne, T.Shepard and M: A Pre-Run-Time Scheduling Algorithm for Hard Real Time Systems. Transactions on Software Engineering, IEEE Volume 17, Issue 7, July 1991, Page(s):669 - 677.
7 X. Zhang, Y. Qu, and L. Xiao.: Improving Distributed Workload Performance by Sharing both CPU and Memory Resources. 20th International Conference on Distributed Computing Systems, IEEE. 10-13 April 2000, Page(s):233 – 241.
8 Kavi, Wenming Li and Krishna: A Non Preemptive Scheduling Algorithm for Soft Real Time Systems. Computers & Electrical Engineering, Volume 33, Issue 1, January 2007, Pages 12-29.
9 O.Elkeelany, M.matalgah, K.Sheikh: Performance Analysis of IPSEC Protocol: Encryption & Authentication. International conference on Communication IEEE 2002. Volume 2, page(s):1164-1168.
10 Martel, K. Jeffay and C. U: On Non-Preemptive Scheduling of periodic and Sporadic Tasks: Proceedings of the 12th IEEE Real-Time Systems Symposium, San Antonio, Texas, December 1991, IEEE Computer Society Press, pp. 129- 139.
11 M. L. Dertouzos and A. K Mok : Multi-Processor Online Scheduling of Hard Real- Time Tasks: IEEE Transactions on Software Engineering, Vol. 15, No. 12, December 1989 , pp. 1497-1506.
12 J.Deepkumara, H.M. Heys and R.venkatesan: Performance Comparison of Message Authentication Code for Internet protocol Security. www.engr.mun.ca/~howard/PAPERS/necec_2003b.pdf 2003.
13 Genesis, M. H. A.M. Goscinski and J. Silock: The operating system managing parallelism and providing single system image on cluster. LNCS volume 2790/2004, publisher Springer Berlin / Heidelberg.
14 Savarese, T. Sterling and D : A parallel workstation for scientific computation. Proceedings of the 24th International Conference on Parallel Processing, August 14-18, 1995, Urbana-Champain, Illinois, USA. Volume I: Architecture.
15 A J.Hong, X. Tan and D. Towsley: performance analysis of minimum laxity and earliest deadline scheduling in a real time system. IEEE Transactions on Computers, Volume 38, Issue 12, Dec. 1989, Page(s):1736 - 1744.
16 Foster, Ian, Nicholas Karonis: Managing Security in High Performance Distributed Computations. Journal of Cluster Computing Volume 1, Issue 1 pages 95-107, publisher Springer Netherlands 1998.
17 Manhee Lee, Eun Jung Kim, Ki Hwan Yum: An overview of security issues in cluster interconnects. Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops, 2006. Volume 2, 16-19 May, Page(s):9 pp.
18 Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke : A security architecture for computational grids: Proceedings of the 5th ACM conference on Computer and communications security CCS 1998.
19 Ferrari, Adam et al. A flexible security system for Metacomputing Environments www.cs.virginia.edu/papers/hpcn99.pdf 1999.
20 R. David, S. Son and R. Mukkamala: Supporting Security Requirements in Multilevel Real Time Database. IEEE Symposium on Security and Privacy, 8-10 May1995, Page(s):199 – 210,.
21 R. Mukkamala and S. Son: A Secure Concurrency Control Protocol for Real-Time Database: IFIP Workshop on Database Security. 1995.
22 S.H. Son, C. Chaney, C. and N. Thomlinson: Partial Security policy to Support Timeliness in Secure Real Time Databases. IEEE Symposium on Security and Privacy, 3-6 May 1998, Page(s):136 – 147.
23 Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag.
Mr. Abhishek Songra
- India
Mr. Rama Shankar Yadav
- India
Mr. Sarsij Tripathi
- India