A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems

In the recent past, security-sensitive applications, such as electronic transaction processing systems, stock quote update systems, which require high quality of security to guarantee authentication, integrity, and confidentiality of information, have adopted heterogeneous distributed system (HDS) as their platforms. This is primarily due to the fact that single parallel-architecture-based systems may not be sufficient to exploit the available parallelism with the running applications. Most security-aware applications end up in handling dependence tasks, also referred to as Directed Acyclic Graph (DAG), on these HDSs. Unfortunately, most existing algorithms for scheduling such DAGs in HDS fail to fully consider security requirements. In this paper, we systematically design a security-driven scheduling architecture that can dynamically measure the trust level of each node in the system by using differential equations. To do so, we introduce task priority rank to estimate security overhead of such security-critical tasks. Furthermore, we propose a security-driven scheduling algorithm for DAGs which can achieve high quality of security for applications. Our rigorous performance evaluation study results clearly demonstrate that our proposed algorithm outperforms the existing scheduling algorithms in terms of minimizing the makespan, risk probability, and speedup. We also observe that the improvement obtained by our algorithm increases as the security-sensitive data of applications increases.

[1]  Xiao Qin,et al.  Real-time scheduling with quality of security constraints , 2006, Int. J. High Perform. Comput. Netw..

[2]  Hesham El-Rewini,et al.  Scheduling Parallel Program Tasks onto Arbitrary Target Machines , 1990, J. Parallel Distributed Comput..

[3]  Dongseung Kim,et al.  A Two-Pass Scheduling Algorithm for Parallel Programs , 1994, Parallel Comput..

[4]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[5]  Kenli Li,et al.  Integrating Trust into Grid Economic Model Scheduling Algorithm , 2006, OTM Conferences.

[6]  Kuldip Singh,et al.  An Improved Duplication Strategy for Scheduling Precedence Constrained Graphs in Multiprocessor Systems , 2003, IEEE Trans. Parallel Distributed Syst..

[7]  Min Xie,et al.  Iterative list scheduling for heterogeneous computing , 2005, J. Parallel Distributed Comput..

[8]  Salim Hariri,et al.  Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..

[9]  Xiao Qin,et al.  Scheduling security-critical real-time applications on clusters , 2006, IEEE Transactions on Computers.

[10]  Ishfaq Ahmad,et al.  Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors , 1996, IEEE Trans. Parallel Distributed Syst..

[11]  Atakan Dogan,et al.  On QoS-based scheduling of a meta-task with multiple QoS demands in heterogeneous computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[12]  Xiao Qin,et al.  Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters , 2008, IEEE Transactions on Parallel and Distributed Systems.

[13]  Edward A. Lee,et al.  A Compile-Time Scheduling Heuristic for Interconnection-Constrained Heterogeneous Processor Architectures , 1993, IEEE Trans. Parallel Distributed Syst..

[14]  Vladimiro Sassone,et al.  A Bayesian Model for Event-based Trust , 2022 .

[15]  Salim Hariri,et al.  Task scheduling algorithms for heterogeneous processors , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).

[16]  Imtiaz Ahmad,et al.  An Integrated Technique for Task Matching and Scheduling onto Distributed Heterogeneous Computing Systems , 2002, J. Parallel Distributed Comput..

[17]  Shanshan Song,et al.  Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling , 2006, IEEE Transactions on Computers.

[18]  Georges Zaccour,et al.  Production, Manufacturing and Logistics Retail promotions with negative brand image effects: Is cooperation possible? , 2003 .

[19]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[20]  Atakan Dogan,et al.  LDBS: a duplication based scheduling algorithm for heterogeneous computing systems , 2002, Proceedings International Conference on Parallel Processing.

[21]  Andrew A. Chien,et al.  Breaking the barriers: high performance security for high performance computing , 2002, NSPW '02.

[22]  Shanshan Song,et al.  Security-driven heuristics and a fast genetic algorithm for trusted grid job scheduling , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[23]  Arjan J. C. van Gemund,et al.  Low-Cost Task Scheduling for Distributed-Memory Machines , 2002, IEEE Trans. Parallel Distributed Syst..

[24]  Gregory A. Koenig,et al.  Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques , 2004 .

[25]  Jianwei Niu,et al.  CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing , 2005, ISPA.

[26]  Xiao Qin,et al.  SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).

[27]  Gregory A. Koenig,et al.  Clusters and security: distributed security for distributed systems , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[28]  Mihalis Yannakakis,et al.  Towards an Architecture-Independent Analysis of Parallel Algorithms , 1990, SIAM J. Comput..

[29]  Jagannathan Sarangapani Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control , 2017 .

[30]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[31]  Muthucumaru Maheswaran,et al.  Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.

[32]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[33]  R. Brodie,et al.  The influence of brand image and company reputation where manufacturers market to small firms: A customer value perspective , 2007 .

[34]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[35]  David A. Padua,et al.  Communication contention in APN list scheduling algorithm , 2009, Science in China Series F: Information Sciences.

[36]  Dharma P. Agrawal,et al.  Optimal Scheduling Algorithm for Distributed-Memory Machines , 1998, IEEE Trans. Parallel Distributed Syst..

[37]  Füsun Özgüner,et al.  Parallelizing Existing Applications in a Distributed Heterogeneous Environment , 1995 .

[38]  Muthucumaru Maheswaran,et al.  A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[39]  Xiao Qin,et al.  Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity , 2007, J. Parallel Distributed Comput..

[40]  Nawwaf N. Kharma,et al.  A high performance algorithm for static task scheduling in heterogeneous distributed computing systems , 2008, J. Parallel Distributed Comput..

[41]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[42]  S. Ranka,et al.  Applications and performance analysis of a compile-time optimization approach for list scheduling algorithms on distributed memory multiprocessors , 1992, Proceedings Supercomputing '92.

[43]  Byung Kook Kim,et al.  An optimal scheduling algorithm for minimizing the computing period of cyclic synchronous tasks on multiprocessors , 2001, J. Syst. Softw..

[44]  Reda A. Ammar,et al.  Scheduling methods for efficient utilization of cluster computing environments , 2003 .

[45]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[46]  Serguei A. Mokhov Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems , 2008, 2008 International Symposium on Parallel and Distributed Computing.

[47]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[48]  Ishfaq Ahmad,et al.  On Exploiting Task Duplication in Parallel Program Scheduling , 1998, IEEE Trans. Parallel Distributed Syst..