Security-aware optimization for ubiquitous computing systems with SEAT graph approach

被引:72
|
作者
Qiu, Meikang [1 ]
Zhang, Lei [2 ]
Ming, Zhong [3 ]
Chen, Zhi [1 ]
Qin, Xiao [4 ]
Yang, Laurence T. [5 ]
机构
[1] Univ Kentucky, Dept Elec & Comp Engr, Lexington, KY 40506 USA
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[3] Shenzhen Univ, Coll Comp Sci & Software Engr, Shenzhen 518060, GD, Peoples R China
[4] Auburn Univ, Dept Comp Sci & Software Engr, Auburn, AL 36849 USA
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会;
关键词
Security; Real-time; Ubiquitous system; Cryptographic algorithm; Schedule; REAL-TIME SYSTEMS; EMBEDDED SYSTEMS;
D O I
10.1016/j.jcss.2012.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of selected cryptographic algorithms for required security services forms a security strategy for the application. In this paper, we propose methods to generate security strategies to achieve the maximal overall security strength while meeting the real-time constraint. In order to express security requirements of an application, we propose a novel graph model called Security-Aware Task (SEAT) graph model to represent real-time constraints and precedence relationships among tasks. Based on the SEAT graph approach, we propose an optimal algorithm, Integer Linear Programming Security Optimization (ILP-SOP). For the special structures such as simple path graph and tree, we, propose two dynamic programming based algorithms (DPSOP-path/tree) to generate the optimal security strategy. Experiment results demonstrate the correctness and efficiency of our proposed method. The experimental results show that, by using our proposed techniques, the security strength can be improved by 44.3% on average. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:518 / 529
页数:12
相关论文
共 50 条
  • [1] Security-Aware Design Methodology and Optimization for Automotive Systems
    Lin, Chung-Wei
    Zheng, Bowen
    Zhu, Qi
    Sangiovanni-Vincentelli, Alberto
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2015, 21 (01)
  • [2] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [3] An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC
    Tan, Benjamin
    Biglari-Abhari, Morteza
    Salcic, Zoran
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [4] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [5] Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT
    Casola, Valentina
    De Benedictis, Alessandra
    Di Martino, Sergio
    Mazzocca, Nicola
    Starace, Luigi Libero Lucio
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12724 - 12733
  • [6] Security-aware multi-objective optimization of distributed reconfigurable embedded systems
    Nam, Hyunsuk
    Lysecky, Roman
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 133 : 377 - 390
  • [7] SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems
    Wolschke, Christian
    Sangchoolie, Behrooz
    Simon, Jacob
    Marksteiner, Stefan
    Braun, Tobias
    Hamazaryan, Hayk
    51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN-W 2021), 2021, : 27 - 34
  • [8] Security-Aware Task Offloading Using Deep Reinforcement Learning in Mobile Edge Computing Systems
    Lu, Haodong
    He, Xiaoming
    Zhang, Dengyin
    ELECTRONICS, 2024, 13 (15)
  • [9] A Security-aware Approach to JXTA-Overlay Primitives
    Amedo-Moreno, Joan
    Matsuo, Keita
    Barolli, Leonard
    Xhafa, Fatos
    2009 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS (ICPPW 2009), 2009, : 431 - +
  • [10] On the Modeling and Verification of Security-Aware and Process-Aware Information Systems
    Crampton, Jason
    Huth, Michael
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 423 - +