Grid Dependent Tasks Security Scheduling Model and DPSO Algorithm

Due to the security threat to task scheduling problems in the grid environment, by considering both the inherent security and behavior safety of grid resource nodes, security benefit functions and credibility assessment strategies of grid resource nodes are constructed respectively. At the same time, the corresponding membership function is established in order to establish the membership between task security requirements and resource security attributes. Based on these, a new grid dependent tasks security scheduling model is set up. In order to solve this model, the particle evolution equation is re-designed by combining the specific characteristics of the dependent task scheduling problem. Meanwhile, in order to prevent the algorithm falling into local optimum, a uniform speed of disturbance is adopted and a new discrete Particle Swarm Optimization algorithm is proposed. Simulation results show that this algorithm has better scheduling length and higher safety performance than the genetic algorithm.

[1]  Ladislau Bölöni,et al.  A Comparison of Eleven Static Heuristics for Mapping a Class of Independent Tasks onto Heterogeneous Distributed Computing Systems , 2001, J. Parallel Distributed Comput..

[2]  Benno C. Schmidt Access to the Broadcast Media: The Legislative Precedents. , 1978 .

[3]  Qianping Wang,et al.  A Fuzzy Logic-Based Trust Model in Grid , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[4]  Yuping Wang,et al.  Tasks Security Scheduling Based on DPSO in Heterogeneous Grid Environment , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[5]  Kuo-Chi Lin,et al.  An incremental genetic algorithm approach to multiprocessor scheduling , 2004, IEEE Transactions on Parallel and Distributed Systems.

[6]  Wang Ru-chuan Study on PSO algorithm in solving grid task scheduling , 2007 .

[7]  R. Srikant,et al.  Scheduling Efficiency of Distributed Greedy Scheduling Algorithms in Wireless Networks , 2007, IEEE Trans. Mob. Comput..

[8]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[9]  Jeng-Shyang Pan,et al.  An improved vector particle swarm optimization for constrained optimization problems , 2011, Inf. Sci..

[10]  Joon S. Park,et al.  Trusted P2P computing environments with role-based access control , 2007, IET Inf. Secur..

[11]  Nirwan Ansari,et al.  A Genetic Algorithm for Multiprocessor Scheduling , 1994, IEEE Trans. Parallel Distributed Syst..

[12]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[13]  Jing-xuan Wei,et al.  Fuzzy Particle Swarm Optimization for Constrained Optimization Problems: Fuzzy Particle Swarm Optimization for Constrained Optimization Problems , 2011 .

[14]  Shanshan Song,et al.  Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling , 2006, IEEE Transactions on Computers.