Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications

被引:45
|
作者
Meng, Shunmei [1 ]
Huang, Weijia [1 ]
Yin, Xiaochun [2 ]
Khosravi, Mohammad R. [3 ,4 ]
Li, Qianmu [1 ]
Wan, Shaohua [5 ]
Qi, Lianyong [6 ]
机构
[1] Nanjing Univ Sci & Technol, Dept Comp Sci & Engn, Nanjing 210094, Peoples R China
[2] WeiFang Univ Sci & Technol, Facil Hort Lab Univ Shandong, Shouguang 262700, Peoples R China
[3] Persian Gulf Univ, Dept Comp Engn, Bushehr 7516913817, Iran
[4] Shiraz Univ Technol, Dept Elect & Elect Engn, Shiraz 7155713876, Iran
[5] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China
[6] Qufu Normal Univ, Sch Informat Sci & Engineer Ing, Qufu 273165, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Task analysis; Dynamic scheduling; Job shop scheduling; Security; Real-time systems; Cloud-based industrial applications; dynamic scheduling; particle swarm optimization (PSO); real-time optimization; security; INCENTIVE MECHANISM; MOBILE; ALGORITHMS;
D O I
10.1109/TII.2020.2995348
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, large number of cloud-based techniques have been used in industrial control systems (ICS), which also brings many security threats. The emergence of security-aware industrial control has paved the way of security-aware scheduling in cloud-based industrial applications. Actually, most cloud-based industrial applications are time sensitive, which need real-time processing. Edge cloud computing paradigm extends the computing ability of traditional cloud model with low-latency local resources. Thus, heterogeneous clouds that consist of both centralized resources and edge resources may be a promising resource model to provide both scalable and low-latency resources for cloud-based industrial applications. In view of these challenges, in this article, we propose a security-aware dynamic scheduling method for real-time resource allocation in ICS. First, a three-level security model is designed for both tasks and cloud resources in ICS, and a two-tier heterogeneous cloud architecture is introduced. Accordingly, a security-aware scheduling method based on distributed particle swarm optimization is presented for resource allocation with security concerns. To deal with the dynamics of edge resources and the mobility of mobile industrial applications, a dynamic scheduling mechanism based on dynamic workflow model is proposed for real-time optimization. Experimental results validate that the scheduling control policy proposed in this article can achieve a good balance between scheduling performance and security performance.
引用
收藏
页码:4219 / 4228
页数:10
相关论文
共 50 条
  • [1] Security-aware Real-time Scheduling for Hypervisors
    Kashyap, Rekha
    Vidyarthi, D. P.
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1520 - 1527
  • [2] SAREC: A security-aware scheduling strategy for real-time applications on clusters
    Xie, T
    Qin, X
    Sung, A
    [J]. 2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSSING, PROCEEDINGS, 2005, : 5 - 12
  • [3] Multimode Security-Aware Real-Time Scheduling on Multiprocessors
    Ren, Jiankang
    Liu, Chunxiao
    Lin, Chi
    Jiang, Wei
    Wang, Pengfei
    Qi, Xiangwei
    Li, Simeng
    Li, Shengyu
    [J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024, 43 (11) : 3407 - 3418
  • [4] Security-Aware Scheduling for FlexRay-Based Real-Time Automotive Systems
    Zhao, R.
    Qin, G. H.
    Chen, H. P.
    Qin, J.
    Yan, J.
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [5] Security-Aware Scheduling for TTEthernet-Based Real-Time Automotive Systems
    Zhao, Rui
    Qin, Guihe
    Lyu, Ying
    Yan, Jie
    [J]. IEEE ACCESS, 2019, 7 : 85971 - 85984
  • [6] An improved security-aware packet scheduling algorithm in real-time wireless networks
    Zhu, Xiaomin
    Guo, Hao
    Liang, Shaoshuai
    Yang, Xiaoling
    [J]. INFORMATION PROCESSING LETTERS, 2012, 112 (07) : 282 - 288
  • [7] Weight-balanced security-aware scheduling for real-time computational grid
    Kashyap, Rekha
    Vidyarthi, Deo Prakash
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2011, 2 (04) : 313 - 325
  • [8] Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid
    Singh, Surendra
    Batabyal, Suvadip
    Tripathi, Sachin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 989 - 1005
  • [9] Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid
    Surendra Singh
    Suvadip Batabyal
    Sachin Tripathi
    [J]. Cluster Computing, 2020, 23 : 989 - 1005
  • [10] HaaS: Cloud-based Real-time Data Analytics with Heterogeneity-aware Scheduling
    He, Jiong
    Chen, Yao
    Fu, Tom Z. J.
    Long, Xin
    Winslett, Marianne
    You, Liang
    Zhang, Zhenjie
    [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1017 - 1028