Abstract
Security has become an important constraint in distributed real-time task system. For this paper, we give a security-critical distributed real-time task management model, then present a scheme for security-critical task management in the distributed real-time system, finally we propose an algorithm to solve the management problem in the distributed real-time system. We propose a security-critical distributed real-time task management model, and formulate the security-critical distributed real-time system task management issue into a shortest path problem. We solve the shortest path problem by using the improved Dijkstra algorithm. In addition, we validate the efficiency of the algorithm by simulation experiments.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Loyall, J., Schantz, R.: A distributed real-time embedded application for surveillance, detection, and tracking of time critical targets. In: Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 88–97 (2005)
Xie, T., Qin, X.: Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19, 682–697 (2008)
Xie, T., Qin, X.: Performance evaluation of a new management algorithm for distributed systems with security heterogeneity. J. Parallel Distrib. Comput. 67(10), 1067–1081 (2007)
Xie, T., Qin, X., Sung, A.: SAREC: a security-aware management strategy for real-time applications on clusters. In: Proceeding of ICPP 2005 Conference, Norway, pp. 5–12 (2005)
Huang, J., Wang, Y., Cao, F.: On developing distributed middleware services for QoS and criticality-based resource negotiation and adaptation. Real-Time Syst. 16(2), 187–221 (2007)
Jinyu, Z., Guangze, X.: Optimal hardware/software co-synthesis for core-based SoC designs. J. Syst. Eng. Electron. 17(2), 402–409 (2006)
Apvrille, A., Pourzandi, M.: XML distributed security policy for clusters. Comput. Secur. J. 23(8), 649–658 (2007)
Azzedin, F., Maheswaran, M.: Towards trust-aware resource management in grid computing systems. In: Proceedings of the Second IEEE/ACM International Symposium on Cluster Computing and the Grid (2002)
Hou, C.-J., Shin, K.G.: Allocation of periodic task modules with precedence and deadline constraints in distributed real-time systems. IEEE Trans. Comput. 46(12), 1338–1355 (2008)
Garey, M.R., Johnson, D.S.: Strong NP-completeness results: motivation, examples, and implications. J. Assoc. Comput. Mach. 25(3), 499–508 (2008)
Houstis, C.E.: Module allocation of real-time applications for distributed systems. IEEE Trans. Softw. Eng. 16(7), 699–709 (2007)
Tindell, K., Clark, J.: Holistic schedulability analysis for distributed hard real-time systems. Micro-processing Microprogramming 40(20), 117–134 (2008)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the Fifth Conference on Computer and Communications Security San Francisco, CA, pp. 80–94 (2008)
Hong, K.S., Leung, J.Y.-T.: On-line management of real-time tasks. IEEE Trans. Comput. 41(10), 1326–1331 (2008)
Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading (1989)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yu, Y., Dong, Q., Luo, Z., Chen, H., Deng, J., Guan, W. (2015). A Security-Critical Task Management Method for Distributed Real-Time Systems. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-27161-3_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27160-6
Online ISBN: 978-3-319-27161-3
eBook Packages: Computer ScienceComputer Science (R0)