Security-aware optimization for ubiquitous computing systems with SEAT graph approach

被引:72
|
作者
Qiu, Meikang [1 ]
Zhang, Lei [2 ]
Ming, Zhong [3 ]
Chen, Zhi [1 ]
Qin, Xiao [4 ]
Yang, Laurence T. [5 ]
机构
[1] Univ Kentucky, Dept Elec & Comp Engr, Lexington, KY 40506 USA
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[3] Shenzhen Univ, Coll Comp Sci & Software Engr, Shenzhen 518060, GD, Peoples R China
[4] Auburn Univ, Dept Comp Sci & Software Engr, Auburn, AL 36849 USA
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
基金
美国国家科学基金会;
关键词
Security; Real-time; Ubiquitous system; Cryptographic algorithm; Schedule; REAL-TIME SYSTEMS; EMBEDDED SYSTEMS;
D O I
10.1016/j.jcss.2012.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For ubiquitous computing systems, security has become a new metric that designers should consider throughout the design process, along with other metrics such as performance and energy consumption. A combination of selected cryptographic algorithms for required security services forms a security strategy for the application. In this paper, we propose methods to generate security strategies to achieve the maximal overall security strength while meeting the real-time constraint. In order to express security requirements of an application, we propose a novel graph model called Security-Aware Task (SEAT) graph model to represent real-time constraints and precedence relationships among tasks. Based on the SEAT graph approach, we propose an optimal algorithm, Integer Linear Programming Security Optimization (ILP-SOP). For the special structures such as simple path graph and tree, we, propose two dynamic programming based algorithms (DPSOP-path/tree) to generate the optimal security strategy. Experiment results demonstrate the correctness and efficiency of our proposed method. The experimental results show that, by using our proposed techniques, the security strength can be improved by 44.3% on average. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:518 / 529
页数:12
相关论文
共 50 条
  • [41] SHIELD: Security-Aware Scheduling for Real-Time DAGs on Heterogeneous Systems
    Senapati, Debabrata
    Bhagat, Pooja
    Karfa, Chandan
    Sarkar, Arnab
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2025, 9 (01)
  • [42] Security-Aware Design of Cyber-Physical Systems for Control over the Cloud
    Peng, Zebo
    2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, : 786 - 786
  • [43] "Security-Aware and Data Intensive Low-Cost Mobile Systems" Editorial
    Kolodziej, Joanna
    Jaatun, Martin Gilje
    Khan, Samee Ullah
    Koeppen, Mario
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05): : 591 - 593
  • [44] Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing
    Li, Zengpeng
    Yu, Huiqun
    Fan, Guisheng
    Tang, Qifeng
    Zhang, Jiayin
    Chen, Liqiong
    COMPUTER COMMUNICATIONS, 2023, 211 : 119 - 133
  • [45] Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing
    Yang, Yuli
    Peng, Xinguang
    Wan, Xiaohong
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 299 - 311
  • [46] Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows
    Bertolissi, Clara
    Ranise, Silvio
    FRONTIERS OF COMBINING SYSTEMS (FROCOS 2013), 2013, 8152 : 40 - 55
  • [47] A literature review on security-aware design space exploration approaches for embedded systems
    Boutekkouk F.
    International Journal of Security and Networks, 2022, 17 (04) : 247 - 268
  • [48] A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 327 - 332
  • [49] “Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial
    Joanna Kołodziej
    Martin Gilje Jaatun
    Samee Ullah Khan
    Mario Koeppen
    Mobile Networks and Applications, 2013, 18 : 591 - 593
  • [50] A framework for ensuring security in ubiquitous computing environment based on security engineering approach
    Lee, JooYoung
    Kim, Howon
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 1250 - 1258