Algorithms and Architectures for Parallel Processing

Optimizing energy efficiency in execution strategies has traditionally been heavily influenced by hardware mechanisms such as frequency scaling and core sleep states. With such facilities, the system can be scaled dynamically and on-demand to trade power dissipation for clock speed or parallelism. Determining the most efficient execution configuration has been described in much related work, but few efforts have been put on including the workload type into the calculation. The type of the workload affects both the performance and the power of the processor, and is especially important when considering heterogeneous systems like the big.LITTLE, since different cores handle the workload with different efficiency. In this paper, we demonstrate the influence of the workload type when choosing an optimal execution strategy on a big.LITTLE platform. We implement schedulers capable of including workload type, and we provide a runtime system capable of executing the schedules on a real-world platform. Results demonstrate that including workload types into the scheduler saves between 7.1% and 31.3% of energy in our best/worst corner case studies, a result that should be considered in future implementations of big.LITTLE schedulers.

[1]  Jingling Xue,et al.  Contention-Aware Scheduling for Asymmetric Multicore Processors , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).

[2]  Rami G. Melhem,et al.  On the Interplay of Parallelization, Program Performance, and Energy Consumption , 2010, IEEE Transactions on Parallel and Distributed Systems.

[3]  Tatsuaki Okamoto,et al.  Leakage resilient eCK-secure key exchange protocol without random oracles , 2011, ASIACCS '11.

[4]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[5]  Ruhul Amin,et al.  Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card , 2015 .

[6]  Zheng Yang,et al.  On security analysis of an after-the-fact leakage resilient key exchange protocol , 2016, Inf. Process. Lett..

[7]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[8]  Sandeep Kumar Sood Dynamic Resource Provisioning in Cloud based on Queuing Model , 2013, CloudCom 2013.

[9]  Debiao He,et al.  Efficient provably secure password-based explicit authenticated key agreement , 2015, Pervasive Mob. Comput..

[10]  Kristin E. Lauter,et al.  Stronger Security of Authenticated Key Exchange , 2006, ProvSec.

[11]  Linwei Niu,et al.  Reducing both dynamic and leakage energy consumption for hard real-time systems , 2004, CASES '04.

[12]  Liehuang Zhu,et al.  Scalable protocol for cross-domain group password-based authenticated key exchange , 2014, Frontiers of Computer Science.

[13]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Simon Holmbacka,et al.  Energy efficiency and performance management of parallel dataflow applications , 2014, Proceedings of the 2014 Conference on Design and Architectures for Signal and Image Processing.

[15]  Marco D. Santambrogio,et al.  Workload-aware power optimization strategy for asymmetric multiprocessors , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[16]  Ran Canetti,et al.  Efficient Password Authenticated Key Exchange via Oblivious Transfer , 2012, Public Key Cryptography.

[17]  Simon Holmbacka,et al.  Energy-Awareness and Performance Management with Parallel Dataflow Applications , 2017, J. Signal Process. Syst..

[18]  Yann-Hang Lee,et al.  Scheduling techniques for reducing leakage power in hard real-time systems , 2003, 15th Euromicro Conference on Real-Time Systems, 2003. Proceedings..

[19]  P Priyanka,et al.  ID2S Password-Authenticated Key Exchange Protocols , 2017 .

[20]  Jean-Marc Pierson,et al.  Towards a generic power estimator , 2014, Computer Science - Research and Development.

[21]  Sarvar Patel,et al.  Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.

[22]  Colin Boyd,et al.  Continuous After-the-Fact Leakage-Resilient Key Exchange , 2014, ACISP.

[23]  James W. Layland,et al.  Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.

[24]  Mingwu Zhang,et al.  After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.

[25]  Dong Hoon Lee,et al.  EC2C-PAKA: An efficient client-to-client password-authenticated key agreement , 2007, Inf. Sci..

[26]  Hao Shen,et al.  Learning based DVFS for simultaneous temperature, performance and energy management , 2012, Thirteenth International Symposium on Quality Electronic Design (ISQED).

[27]  Mahmoud Ahmadian-Attari,et al.  An efficient client–client password-based authentication scheme with provable security , 2014, The Journal of Supercomputing.

[28]  Hugo Krawczyk,et al.  On Extract-then-Expand Key Derivation Functions and an HMAC-based KDF ∗ , 2008 .

[29]  Sascha Uhrig,et al.  Dynamic Workload Prediction for Soft Real-Time Applications , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[30]  Bronis R. de Supinski,et al.  Adagio: making DVS practical for complex HPC applications , 2009, ICS.

[31]  Tao Wang,et al.  Improving timing attack on RSA-CRT via error detection and correction strategy , 2013, Inf. Sci..

[32]  Rizos Sakellariou,et al.  Performance-Based Pricing in Multi-Core Geo-Distributed Cloud Computing , 2020, IEEE Transactions on Cloud Computing.

[33]  SK Hafizul Islam,et al.  Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..

[34]  Fatima Oumellal,et al.  MMPP/G/m/m+r Queuing System Model to Analytically Evaluate Cloud Computing Center Performances , 2014 .

[35]  Chung-Fu Lu,et al.  Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment , 2015, KSII Trans. Internet Inf. Syst..

[36]  Fuchun Guo,et al.  Strongly Leakage-Resilient Authenticated Key Exchange , 2016, CT-RSA.

[37]  Yehuda Lindell,et al.  Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.

[38]  Douglas Stebila,et al.  Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange , 2015, IMACC.

[39]  Stefanos Kaxiras,et al.  Green governors: A framework for Continuously Adaptive DVFS , 2011, 2011 International Green Computing Conference and Workshops.

[40]  Jaehyuk Huh,et al.  Big or Little: A Study of Mobile Interactive Applications on an Asymmetric Multi-core Platform , 2015, 2015 IEEE International Symposium on Workload Characterization.

[41]  Stefan Dziembowski,et al.  Leakage-Resilient Storage , 2010, SCN.

[42]  Umesh Bellur,et al.  CPU Frequency Tuning to Improve Energy Efficiency of MapReduce Systems , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).

[43]  Colin Boyd,et al.  Modelling after-the-fact leakage for key exchange , 2014, IACR Cryptol. ePrint Arch..

[44]  Rajesh K. Gupta,et al.  Procrastination scheduling in fixed priority real-time systems , 2004, LCTES '04.

[45]  Kai Chen,et al.  Improving Energy Efficiency of Web Servers by Using a Load Distribution Algorithm and Shutting Down Idle Nodes , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[46]  Rafail Ostrovsky,et al.  Efficient and secure authenticated key exchange using weak passwords , 2009, JACM.

[47]  Jason M. Allred,et al.  Long term sustainability of differentially reliable systems in the dark silicon era , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).

[48]  Henry Hoffmann,et al.  Racing and Pacing to Idle: Theoretical and Empirical Analysis of Energy Optimization Heuristics , 2015, 2015 IEEE 3rd International Conference on Cyber-Physical Systems, Networks, and Applications.

[49]  Simon Holmbacka,et al.  Accurate energy modeling for many-core static schedules with streaming applications , 2016, Microprocess. Microsystems.

[50]  Jose Renau,et al.  Characterizing processor thermal behavior , 2010, ASPLOS XV.

[51]  Stefan M. Petters,et al.  Enhanced Race-To-Halt: A Leakage-Aware Energy Management Approach for Dynamic Priority Systems , 2011, 2011 23rd Euromicro Conference on Real-Time Systems.

[52]  Dongho Won,et al.  Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group , 2011, HCI.

[53]  Jonathan Katz,et al.  Two-server password-only authenticated key exchange , 2005, J. Comput. Syst. Sci..

[54]  Mahmut T. Kandemir,et al.  Leakage Current: Moore's Law Meets Static Power , 2003, Computer.

[55]  Vipul Goyal Positive Results for Concurrently Secure Computation in the Plain Model , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.

[56]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography From the Inner-Product Extractor , 2011, IACR Cryptol. ePrint Arch..

[57]  N.Ani Brown Mary,et al.  Performance Factors of Cloud Computing Data Centers Using [(M/G/1) : (∞/Gdmodel)] Queuing Systems , 2013 .

[58]  Yellow Zone Race to Idle or Not: Balancing the Memory Sleep Time with DVS for Energy Minimization , 2015 .