Security-aware optimization for ubiquitous computing systems with SEAT graph approach

被引:72
|
作者
Qiu, Meikang [1 ]
Zhang, Lei [2 ]
Ming, Zhong [3 ]
Chen, Zhi [1 ]
Qin, Xiao [4 ]
Yang, Laurence T. [5 ]
机构
[1] Univ Kentucky, Dept Elec & Comp Engr, Lexington, KY 40506 USA
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[3] Shenzhen Univ, Coll Comp Sci & Software Engr, Shenzhen 518060, GD, Peoples R China
[4] Auburn Univ, Dept Comp Sci & Software Engr, Auburn, AL 36849 USA
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会;
关键词
Security; Real-time; Ubiquitous system; Cryptographic algorithm; Schedule; REAL-TIME SYSTEMS; EMBEDDED SYSTEMS;
D O I
10.1016/j.jcss.2012.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of selected cryptographic algorithms for required security services forms a security strategy for the application. In this paper, we propose methods to generate security strategies to achieve the maximal overall security strength while meeting the real-time constraint. In order to express security requirements of an application, we propose a novel graph model called Security-Aware Task (SEAT) graph model to represent real-time constraints and precedence relationships among tasks. Based on the SEAT graph approach, we propose an optimal algorithm, Integer Linear Programming Security Optimization (ILP-SOP). For the special structures such as simple path graph and tree, we, propose two dynamic programming based algorithms (DPSOP-path/tree) to generate the optimal security strategy. Experiment results demonstrate the correctness and efficiency of our proposed method. The experimental results show that, by using our proposed techniques, the security strength can be improved by 44.3% on average. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:518 / 529
页数:12
相关论文
共 50 条
  • [31] A Case for Security-Aware Design-Space Exploration of Embedded Systems
    Pimentel, Andy D.
    JOURNAL OF LOW POWER ELECTRONICS AND APPLICATIONS, 2020, 10 (03) : 1 - 12
  • [32] Security-aware resource allocation in fog computing using a meta-heuristic algorithm
    Mohammadi, Mina
    Bahranipour, Fatemeh
    Mood, Sepehr Ebrahimi
    Farshi, Mohammad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (02):
  • [33] Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology
    Wilczynski, Andrzej
    Kolodziej, Joanna
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 99
  • [34] Security-Aware computation offloading for Mobile edge computing-Enabled smart city
    Kai Peng
    Peichen Liu
    Peng Tao
    Qingjia Huang
    Journal of Cloud Computing, 10
  • [35] Security-Aware computation offloading for Mobile edge computing-Enabled smart city
    Peng, Kai
    Liu, Peichen
    Tao, Peng
    Huang, Qingjia
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2021, 10 (01):
  • [37] Cost Efficient VNF Placement with Optimization Problem for Security-Aware Virtual Networks
    Dwiardhika, Dhanu
    Tachibana, Takuji
    2018 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2018,
  • [38] Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors
    Zheng, Danyang
    Liu, Xiaorong
    Tang, Wenyi
    Xu, Honghui
    Cao, Xiaojun
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2093 - 2098
  • [39] How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach
    Abid, Chaima
    Kessentini, Marouane
    Alizadeh, Vahid
    Dhouadi, Mouna
    Kazman, Rick
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (03) : 864 - 878
  • [40] A Short Review of Security-Aware Techniques in Real-Time Embedded Systems
    Chai, Hongxia
    Zhang, Gongxuan
    Zhou, Junlong
    Sun, Jin
    Huang, Longxia
    Wang, Tian
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (02)