Security-aware optimization for ubiquitous computing systems with SEAT graph approach

被引:72
|
作者
Qiu, Meikang [1 ]
Zhang, Lei [2 ]
Ming, Zhong [3 ]
Chen, Zhi [1 ]
Qin, Xiao [4 ]
Yang, Laurence T. [5 ]
机构
[1] Univ Kentucky, Dept Elec & Comp Engr, Lexington, KY 40506 USA
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[3] Shenzhen Univ, Coll Comp Sci & Software Engr, Shenzhen 518060, GD, Peoples R China
[4] Auburn Univ, Dept Comp Sci & Software Engr, Auburn, AL 36849 USA
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会;
关键词
Security; Real-time; Ubiquitous system; Cryptographic algorithm; Schedule; REAL-TIME SYSTEMS; EMBEDDED SYSTEMS;
D O I
10.1016/j.jcss.2012.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of selected cryptographic algorithms for required security services forms a security strategy for the application. In this paper, we propose methods to generate security strategies to achieve the maximal overall security strength while meeting the real-time constraint. In order to express security requirements of an application, we propose a novel graph model called Security-Aware Task (SEAT) graph model to represent real-time constraints and precedence relationships among tasks. Based on the SEAT graph approach, we propose an optimal algorithm, Integer Linear Programming Security Optimization (ILP-SOP). For the special structures such as simple path graph and tree, we, propose two dynamic programming based algorithms (DPSOP-path/tree) to generate the optimal security strategy. Experiment results demonstrate the correctness and efficiency of our proposed method. The experimental results show that, by using our proposed techniques, the security strength can be improved by 44.3% on average. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:518 / 529
页数:12
相关论文
共 50 条
  • [21] UBIQUITOUS COMPUTING TECHNOLOGIES AND CONTEXT AWARE RECOMMENDER SYSTEMS FOR UBIQUITOUS LEARNING
    Thiprak, Sukanya
    Kurutach, Werasak
    2015 12TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2015,
  • [22] Enhanced security-aware technique and ontology data access control in cloud computing
    Kiran, Gangasandra Mahadevaiah
    Nalini, Narasimhaiah
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [23] Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing
    Huang, Binbin
    Xiang, Yuanyuan
    Yu, Dongjin
    Wang, Jiaojiao
    Li, Zhongjin
    Wang, Shangguang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [24] Leveraging Fog Computing for Security-Aware Resource Allocation in Narrowband Internet of Things
    Mohan, Vamshi Sunku
    Sankaran, Sriram
    Buyya, Rajkumar
    Achuthan, Krishnashree
    SOFTWARE-PRACTICE & EXPERIENCE, 2025, 55 (04): : 683 - 713
  • [25] Security-Aware QoS Forecasting in Mobile Edge Computing based on Federated Learning
    Jin, Huiying
    Zhang, Pengcheng
    Dong, Hai
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2020), 2020, : 302 - 309
  • [26] Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
    Di LU
    Jianfeng MA
    Cong SUN
    Xindi MA
    Ning XI
    Science China(Information Sciences), 2017, 60 (05) : 96 - 112
  • [27] Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
    Lu, Di
    Ma, Jianfeng
    Sun, Cong
    Ma, Xindi
    Xi, Ning
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [28] Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
    Kwiat, Luke
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Tang, Jian
    Martin, Andrew
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 556 - 563
  • [29] A deep reinforcement learning approach for security-aware service acquisition in IoT
    Arazzi, Marco
    Nicolazzo, Serena
    Nocera, Antonino
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 85
  • [30] Security-aware Ad hoc Networking Protocol for Vehicular Safety Systems
    Chasaki, Danai
    Randazzo, David
    Kulkarni, Sarvesh
    2023 26TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, WPMC, 2023, : 299 - 304