SlideShare a Scribd company logo
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters   Xiao Qin
Clusters
The PrairieFire Cluster at the University of Nebraska-Lincoln
Parallel Applications on Clusters
Security-Sensitive Real-Time Applications Online Transaction Stock Trading
Common Threats and Security Services Snooping Alteration Spoofing Confidentiality Authentication Integrity
Scheduling Plays a Key Role Conventional scheduling algorithms are  inadequate  for security-sensitive real-time applications on clusters A process of assigning tasks to a set of resources  Head  Nodes Tasks  Users
Motivation Improve  Utilization Keep Load-Balancing Support Scalability Promote  Throughput Enable Security Awareness Reduce Response Time
Security-Aware System Architecture        OS Hardware Platform interface Platform interface OS Hardware Middleware Services (including security services) Low-Level Security Service APIs User interface Framework Mapping to  Middleware Services Framework Private Service  Application Tool High-Level Security Service APIs Application Application               Quality of Security Control Manager (QSCM)
Quality of Security Control Manager -  QSCM Module Low Level Security Service APIs Application Task Application Task Application Task        Global Security Optimization  Local Security Optimization   Security Optimization Resource Monitoring Security Service 1 Security Service n        Local Schedulability Analyzer Quality of Security Control Manager
Task Submission Structure DEFINE Task : flight_control { Input = (altitude: 1230, heading: 35, …); Output = (takeoff_distance, climb_rate); Type = “Real Time”; Deadline = 80; Completion_Time = 0; Owner = “Gary Xie”; Cmd = “flight_con”; Processor_num= 5; Data_secured=250; Constraint      Arch == “INTEL”;      OS == “UNIX”;      Disk >= 480;    Memory >=128;      Deadline = 80;    0.3 <= Authentication <=0.6;    0.4 <= Integrity <= 0.8;    0.5 <= Confidentiality <= 0.9; }
Security Overhead Model Security is achieved at the cost of performance degradation P S Security Overheads S P
Cryptographic Algorithms for Confidentiality Service 21.09 1.00 Rijndael 29.35 0.72 RC5 33.75 0.63 Knufu/Khafre 37.5 0.56 Blowfish 96.43 0.22 RC4 Performance  (KB/ms) Security Level  Cryptographic Algorithms
Hash Functions for Integrity Service 4.36 1.00 Tiger 5.69 0.77 RIPEMD-160 6.88 0.63 SHA-1 9.73 0.45 RIPEMD-128 12.00 0.36 RIPEMD 17.09 0.26 MD5 23.90 0.18 MD4 Performance  (KB/ms) Security Level  Hash Functions
Authentication Methods 163 0.9 CBC-MAC-AES 148 0.6 HMAC-SHA-1 90 0.3 HMAC-MD5 Computation Time (ms) Security Level Authentication Methods
System Model   Rejected  Queue Dispatch Queue TAPADS Local Queue N 1 N 2 N m User  p User 2 User 1 Schedule Queue Admission Controller Security  Level Optimizer
Parallel Application A single application (job) that has multiple processes that run concurrently  t1 t11 e2 t4 t9 t8 t3 t2 t5 t6 t10 t7 e1 e3 e4 e5 e7 e6 e10 e8 e9
Task Model Deadline Constraints Security Constraints Precedence Constraints
Directed Acyclic Graphs  (DAG) a parallel application is defined as a vector  (T, E, d) T :  {t 1 , t 2 ,...,t n } E  : a set of weighted and directed edges used to represent communication among tasks, e.g., ( t i , t j )    E  is a message transmitted from task  t i  to  t j d  : Deadline
A Task A task  t i  = (e i , l i , S i ) e i  :execution time l i  : amount of data to be protected S i : a vector of security requirements
A DAG 10Sec., 500KB,  { [0.3,0.6],  [0.4,0.8],  [0.5,0.9] }  10KB,  { [0.4,0.8],  [0.5,0.9] }  e2 t1 t4 t9 t8 t3 t2 t11 t5 t6 t10 t7 e1 e3 e4 e5 e7 e6 e10 e8 e9
Befpre Security Optimization PE3 Link PE1 Link PE2 deadline Slack Time t 6 t 8 t 9 e 5 e 7 e 9 t 1 t 10 t 7 t 4 t 3 t 2 e 4 e 10 t 5 t 11 0  2  4  6  8  10  12  14  16  18  20  22  24  26  28  30  32  34  36  38  40  42  44  46  48  50  52  54  56  58  60
After Security Optimization t 10 t 4 t 3 t 2 t 1 e 4 e 10 t 11 t 5 e 5 t 6 e 7 t 8 t 9 t 7 deadline 0  2  4  6  8  10  12  14  16  18  20  22  24  26  28  30  32  34  36  38  40  42  44  46  48  50  52  54  56  58  60 e 9 PE3 Link PE1 Link PE2
Security Requirements for A Task T i S i  = (  ,…,  ,…,  ) Security level range of the  j  th security service  for task Ti [0.3,0.6] [0.4,0.8] [0.5,0.9]
Security Benefits Gained by Task T i Weight of the  j  th security service for task T i Security level of the  j  th security service for task T i and
Weights of Security Services > >
Security Benefits Gained by A Task Set    n i i SL 1 SL ) ( T The task set s ) (
Optimize Security Benefit of An Application   maximize subject to: i k SL 1 1 k s i The task set        n q k i k i s w T k k ), max( ) min( i i i S S   SL s ) (
Security Requirements of Message ( t i , t j )  The required  security level range of the  p  th security service   i j ( t i , t j )
Security Benefits Gained by One Message  ( t i , t j )  Security level of the  k  th security service   and
Security Benefits Gained by A Message Set .
Optimize Security Benefit of Message Set maximize subject to  The message set
Security Benefit of A Parallel Application The message set The task set Security Value
The TAPADS Task Allocation Algorithm Compute the critical path Slack time= d – f Allocate all  ti   subject to  minimal security requirements   Identify the best candidate in V and E  that has the highest benefit-cost ratio Increase security levels of more  important services at the minimal cost Update the schedule in accordance  with the increased security level yes Slack time > 0 ? no Update slack time End
Time Complexity of TAPADS The time complexity of TAPADS is  O(k(q|V|+p|E|)) where  k  : the number of times  Step 7  is repeated q  : the number of security services for computation p  : the number of security services for communication
Performance Evaluation  LISTMIN :  Selects the  lowest  security level of each security service required by each task and message of a parallel job  LISTMAX :  Chooses the  highest  security level for each security requirement posed by each task and message within a parallel job  LISTRND :   Randomly  picks a value within the  security level range of each service required by a task and a message
Experimental Parameters 0.2 (authentication), 0.5 (encryption), 0.3 (integrity) Weight of security services (min, top, max)=(0.02, 0.1, 0.5), (0.2, 1, 5), (1, 5, 10), (10, 20, 30) MB Size of data to be secured (25, 50, 75, 100) Out degrees ([100, 200], [200, 300], [300, 400], [400, 500]) second Deadline ranges (100, 200, 300, 400, 500, 600) second Deadlines (32, 64,128, 256), (8, 12, 16, 20) Number of nodes (min, top, max)=(1, 5, 10), (10,20,40), (40,80,160), (160,320,640) second Task execution time 1Gbps Network bandwidth 1000 million instructions/second or MIPS CPU Speed Value (Fixed) - (Varied) Parameter
Performance Metrics Security Value   Schedulability : a fraction of total submitted jobs that are schedulable Quality of security (QSA) :   quality of security for applications Guarantee factor :   it is zero if a job’s deadline cannot be met. Otherwise, it is one. Job completion time : earliest time that a job can finish its execution
Experiment One: Overall Performance One job with  433 tasks 32 nodes in a cluster Deadline varies from 0 to 600 seconds
Overall Performance Comparisons(1)
Overall Performance Comparisons(2) Improvement 97.7%   Improvement25 %
Overall Performance Comparisons(3) Improvement54 .5%   Improvement25.7 %
Experiment Two:  Adaptability 1000 diverse task graphs (54 tasks ~ 543 tasks) 4 deadline ranges [100, 200], [200, 300], [300, 400] and [400, 500]  32 nodes clusters
Adaptability(1) TAPADS ties  with LISTMIN LISTMAX is the worst
Adaptability(2) TAPADS is  always the best TAPADS outperforms  LISTMAX significantly TAPADS outperforms  LISTMAX significantly
Adaptability(3) TAPADS noticeably  outperforms all others
Experiment Three:  Scalability  32 ~ 256 nodes in a cluster A task graph with 520 tasks (nodes) Deadline is set to 400 Seconds
Scalability
Experiment Four: Degree of Task Parallelism A parallel application with 1074 tasks   Deadline is set to 400 Seconds Number of nodes is 128 Maximal number of out degree varies from 25 to 100
Sensitivity to Degree of Task Parallelism
Experiment Five: Security Sensitive Data Size Size of security sensitive data is in a triangle distribution (min, top, max)=(0.02, 0.1, 0.5), (0.2, 1, 5), (1, 5, 10), (10, 20, 30) MB
Impact of Size of Security Sensitive Data
Evaluation in Digital Signal Processing (1) (a) Guarantee factor   (b)  Security value   (c) QSA   Performance impact of deadline for DSP
Evaluation in Digital Signal Processing (2) ( a )  Security value   ( b ) QSA   (c) Job completion time Performance impact of number of nodes for DSP
Conclusions TAPADS can generate optimal allocations that maximize quality of security for parallel applications running on clusters.   A security overhead model is proposed.  Experimental results  show that  TAPADS significantly improves  the performance in terms of quality of security and schedulability  over  three existing allocation   schemes.
Ph.D. Dissertation Projects Mais Nijim [Summer 2007] Adaptive quality of security control in storage systems.   Ziliang Zong [Ph.D. Candidate, Spring 2008 Expected] Conserving energy in clusters through resource allocation  Mohammed Alghamdi [Ph.D. Student, Spring 2008 Expected]  Energy-efficient packet transmissions in real-time wireless  networks  Kiranmai Bellam [Ph.D. Student, Spring 2009 Expected] Power, fault tolerance, and security issues in real-time systems
Questions?
Real-Time Stock Quote System
Some Typical Security Levels  Routing + message security Routing + SSL Routing + SSL + message security Routing + SSL + client authentication Routing + SSL + message security + client authentication
Related Work [Hou&Shin] A task allocation scheme to schedule periodic tasks with  precedence constraints  in distributed real-time systems. [He  et al. ] Dynamic scheduling of parallel real-time jobs executing on  heterogeneous  clusters.   [Yurcik  et al. ] Tools for managing  cluster security  via process monitoring.   [Azzedin&Maheswaran] The  notion of “trust”  into resource management of a large-scale wide-area system.
Future Work   Extend our security overhead models to multi-dimensional computing resources   Accommodate more security services into our security overhead model   Apply  TAPADS  scheme to heterogeneous clusters
Selected Journal Publications  X. Qin  and T. Xie, “Allocation of Tasks with Availability Constraints in Heterogeneous Systems,”  IEEE Transactions on Computers .  Accepted April 2007. M. Nijim,  X. Qin , and T. Xie, “Modeling and Improving Security of a Local Disk System for Write-Intensive Workloads,”  ACM Transactions on Storage ,  vol. 2, no. 4, pp. 400-423, Nov. 2006.  T. Xie and  X. Qin , “Improving Security for Periodic Tasks in Embedded Systems through Scheduling,”  ACM Transactions on Embedded Computing Systems ,  vol. 6, no. 1, 2007.  T. Xie and  X. Qin , “Scheduling Security-Critical Real-Time Applications on Clusters,”  IEEE  Transactions on Computers , vol. 55, no. 7, pp. 864-879, July 2006.  X. Qin , “Performance Comparisons of Load Balancing Algorithms for I/O-Intensive Workloads on Clusters,”  Journal of Network and Computer Applications,  2007. Accepted X. Qin , “Design and Analysis of a Load Balancing Strategy in Data Grids,”  Future Generation Computer Systems: The Int'l Journal of Grid Computing , vol. 23, no. 1, pp. 132-137, Jan. 2007.  Z.-L. Zong, M. Nijim, and  X. Qin , “Energy-Efficient Scheduling for Parallel Applications on Mobile Clusters,”  Cluster Computing: The Journal of Networks, Software Tools and Applications,  2007. [In press]  M. Nijim,  X. Qin , and Z.-L. Zong, “StReD: A Quality of Security Framework for Storage Resources in Data Grids,”  Future Generation Computer Systems: The Int'l Journal of Grid Computing , 2007. [In press] X. Qin  and H. Jiang, “A Dynamic and Reliability-driven Scheduling Algorithm for Parallel Real-time Jobs on Heterogeneous Clusters,”  Journal of Parallel and Distributed Computing , vol. 65, no. 8, pp.885-900, Aug. 2005.
Selected Conferences Publications X. Qin , M. Alghamdi, M. Nijim, and Z.-L. Zong, “Scheduling of Periodic Packets in Energy-Aware Wireless Networks,”  Proc. the 26th IEEE Int'l Performance Computing and Communications Conf.  (IPCCC'07), New Orleans, Louisiana, April 2007.  T. Xie and  X. Qin , “A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems,”  Proc. 13th Annual IEEE Inter’l Conf. on High Performance Computing  (HiPC), Bangalore, India, Dec. 18-21, 2006. ( Acceptance Rate:   15.5%,  52/335) M. Nijim,  X. Qin , and T. Xie, “Adaptive Quality of Security Control in Networked Parallel Disk Systems,”  Proc. 15th Int’l Conf. Computer Communications and Networks  (ICCCN'06), Arlington, Virginia, Oct. 2006. ( Acceptance Rate:   32%,  71/221) Z.-L. Zong, A. Manzanares, B. Stinar, and  X. Qin , “Energy-Efficient Duplication Strategies for Scheduling Precedence Constrained Parallel Tasks on Clusters,”  Proc. IEEE 8th Int’l Conf. Cluster Computing  (Cluster'06), Sept. 2006. ( Acceptance Rate:   33%,  42/127) T. Xie and  X. Qin , “Stochastic Scheduling with Availability Constraints in Heterogeneous Systems,”  Proc. IEEE 8th Int’l Conf. Cluster Computing  (Cluster'06), 2006. ( Acceptance Rate:   33%,  42/127) T. Xie, X. Qin, and M. Nijim, “Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems,”  Proc. 35th Int’l Conf. Parallel Processing  (ICPP), Columbus, Ohio, Aug. 2006. ( Acceptance Rate:   32%,  64/200) T. Xie and  X. Qin, “ SAHA: A Scheduling Algorithm for security-Sensitive Jobs on Data Grids,”  Proc.  IEEE/ACM 6th Int'l Symp. Cluster Computing and the Grid  (CCGrid), 2nd Int'l Workshop on Cluster Security, May 2006. ( Acceptance Rate:   25% ) T. Xie and  X. Qin , “SHARP: A New Real-Time Scheduling Algorithm to Improve Security of Parallel Applications on Heterogeneous Clusters,”  Proc. the 25th IEEE Int’l Performance Computing and Communications Conf.  (IPCCC'06) ,  Phoenix, AZ, April 2006. ( Acceptance Rate:   35% )
Selected Conferences Publications (cont.) M. Nijim,  X. Qin , T. Xie, and M. Alghamdi, “Awards: An Adaptive Write Scheme for Secure Local Disk Systems,”  Proc. the 25th IEEE Int’l Performance Computing and Communications Conf.  (IPCCC'06) ,  April 2006. ( Acceptance Rate:   35% ) T. Xie and  X. Qin , “A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Clusters,”  Proc. the 7th IEEE Int’l Conf. Cluster Computing  (Cluster 2005), 2005.  ( Acceptance Rate:   32%,  48/150)  T. Xie,  X. Qin , and A. Sung, &quot;SAREC: A Security-Aware Scheduling Strategy for  Real-Time Applications on Clusters ,&quot;  Proc. the 34th Int’l Conf. Parallel Processing  (ICPP 2005), pp.5-12, Norway, June 14-17, 2005. ( Acceptance Rate:   28%,  69/241) X. Qin  and Hong Jiang, “Improving Effective Bandwidth of Networks on Clusters using Load Balancing for Communication-Intensive Applications,”  Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC 2005),  pp.27-34,   Phoenix, Arizona, April 7-9, 2005. ( Acceptance Rate:   35%,  36/103) X. Qin , “Improving Network Performance through Task Duplication for Parallel Applications on Clusters,”  Proc. the 24th IEEE Int’l Performance, Computing, and Communications Conference (IPCCC 2005),  2005. ( Acceptance Rate:   35%,  36/103) X. Qin , H. Jiang, Y. Zhu, and D. Swanson, &quot;Dynamic Load Balancing for I/O-Intensive Tasks on Heterogeneous Clusters,&quot;  Proceedings of the 10th International Conference on High Performance Computing  (HiPC 2003), pp.300-309, 2003 ( Acceptance Rate:   29% ) X. Qin , H. Jiang, Y. Zhu, and D. Swanson, &quot;Towards Load Balancing Support for I/O-Intensive Parallel Jobs in a Cluster of Workstations,&quot;  Proc. of the 5th IEEE International Conference on Cluster Computing (Cluster 2003), 2003.  ( Acceptance Rate:   29% )
Adaptive Quality of Security Control  in Storage Systems   Xiao Qin
Outline Introduction to Storage Systems Local Disk Systems Parallel Disk Systems Security-Aware Cache Partitioning Conclusion  Publications
Data-Intensive Applications Video Surveillance Digital Libraries Radio Astronomy Observatory
Data-Intensive Applications (Cont.) long running simulations  remote-sensing database systems  biological sequence analysis
Motivation Existing storage systems fail to meet the security requirements of modern data- intensive applications There is no way to dynamically choose security services to meet disk requests flexible security requirements Existing storage systems are not suitable to guarantee desired response times of disk requests
Common Threats and Security Services Snooping Alteration Spoofing Confidentiality Authentication Integrity
Cache Partitioning Scheme Topics Security-Aware Local Disk Systems Adaptive Quality of Security Control in  Parallel Disk Systems
System model of a Data Grid
Quality of Security Framework for Disk Systems
Security-Aware Local Disk Systems
Contributions A Security-Aware Adaptive Write Strategy (AWARDS) for Local Disk Systems  AWARDS can achieve high security for local disk systems while making the best effort to guarantee desired response times AWARDS Security Performance
The Architecture of AWARDS Security Service 1 Security Service m Adaptive Security Service Controller Disk Request Scheduler Disk Request Security Mechanism Disk Driver Untrusted Local Disk
Modeling Disk Requests Each disk request specifies  quality of service  requirement A  security requirement  can be defined as a lower bound security level The range is between 0.1 and 1.0 A  performance requirement  is specified as a desired response time Disk Requests
Quality of security for each security service is measured by a  security level For example:  An encryption service with high security level means the high quality of security provided by the service A disk request specifies a lower bound security level as 0.4 Encryption services with security levels higher than or equal to 0.4 can successfully meet the disk request’s security requirements Modeling Disk Requests (Cont.)
r = (o, a, d, s, t) o:  type of the request a:  disk address d:  data size (KB) s:  lower security level bound t:  desired response time Modeling Disk Requests (Cont.)
Modeling Disk Requests (Cont.) Security Level Disk Request Desired response time Real response time Subject to Maximize
Security Overhead Model Eight encryption algorithms In accordance with the cryptographic algorithms’ performance Each cryptographic algorithm is assigned a security level from 0 to 1 e.g., Assign security level 1 to the strongest yet slowest encryption algorithm (IDEA)
The AWARDS Strategy To aim  at improving the quality of security for local disks (i.e.,  to  increase the security levels ) To guarantee timing constraints. (i.e.,  response time    desired response time )
Example Sl = 0.1 Sl = 0.3 Sl = 0.2 Security level of  r 1  = 0.8 Response time  =17.7 ms Security level of  r 1  = 0.7 Response time  =40.7 ms Security level of  r 1  = 0.9 Response time  =54.5 ms Requests  Data Size ( d i )  Minimal Security  Level ( s i ) Desired Response  Time ( t i ) Response Time (T) under AWARDS Security Level (  i ) under AWARDS r 1 90 KB 0.2 18 ms 17.7 ms 0.8 r 2 150 KB 0.1 41 ms 40.7 ms 0.7 r 3 30 KB 0.3 55 ms 54.5 ms 0.9 r 1 r 2 r 3 r 1 r 2 r 3 Time Time SO= 0.93ms SO= 0.89ms SO= 0.8ms
The AWARDS Algorithm
Start Insert  r i   into Q For each  r i  in  Q Initialize Security Level Sl < 1.0 For each r i  in the Q Sl = Sl + 0.1 For each r k r k  can’t finsihed Sl = Sl - 0.1 END No END Yes Yes No
Property of AWARDS If the security level r i  is increased by 0.1, the following conditions must hold. 1. The current security level of r i  is less than 1.0, i.e.,   i  < 0.1 2. Start time processing time
Estimated Start Time (es)
Experimental Result Disk Parameters IBM Ultrastar 36Z15  Size 18.4 GB RPM 15000 Seek Time, T seek 7.18 ms Rotational Time, T rot 4.02 ms Disk Bandwidth, B disk 30 MB/Sec.
Experimental Result Workload Configurations Parameter Value (Fixed) - (Varied) Disk Bandwidth 30MB/Sec. Request Arrival Rate (0.1, 0.2, 0.3, 0.4, 0.5) No./Sec. Desired Response Time 10 Sec. Security Level (0.5) - (0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9) Write Ratio (100%) - (0%, 10%, 20%, 30%, … 100%) Data Size (500 KB) – (300, 400, 500, 600, 700) KB
Performance Metrics Satisfied ratio : a fraction of total arrived disk requests that are found to be finished before their desired response times Average security level : measured by the average value of security levels of all disk requests issued Average security overhead  : measured in sec. Overall performance : product of satisfied ratio and the average security level
Impact of Arrival Rate Improvement138.2 %   Improvement125.6 %
Impact of Data Size
Impact of Disk Bandwidth
Sparse Cholesky Desired response time
Lu Decomposition Desired response time
Sparse Cholesky Bandwidth
Lu Decomposition Bandwidth
Adaptive Quality of Security Control  in Parallel Disk Systems
Parallel Disk Systems
Motivation Existing parallel disk systems lack the means to adaptively control quality of security for  dynamically changing workloads To develop  an adaptive quality of security control scheme for parallel disk systems ( ASPAD )
Contributions ASPAD  aims to adapt  to changing security requirements and workload conditions ASPAD endeavors to determine security services for disk requests while guaranteeing the desired response time for the requests ASPAD Security Performance
Disk 1 Disk 2 Disk m Adaptive Security  Quality Controller Data Partitioning mechanism Security Service Middleware Security Service q   Security Service 1  Clients Disk Requests Parallel Disk System Network Response Time Estimator Security Service 2  The ASPAD Framework
Quality of Security The quality of security for each security service is measured by security level. 0.1 to 1.0 The quality of security can be quantitatively measured using seven levels Extremely high, very high, high, medium, low, very low, and no security protection Translation mechanism is implemented to make the conversions
Modeling Quality of Security Security level of the jth stripe unit of r i Parallelism degree No. of disks
Modeling Quality of Security (Cont.)
Optimize Quality of Security To maximize  security benefit  of the parallel disk system Maximize Where  θ ij  : the response time of jth strip unit of request  r i  Subject to a) b)
Optimize Quality of Security (Cont.) The response time of all stripe unit in request  r i  must be smaller than the desired response time The parallelism degree of  r i  ≤ number of disks in the system
The ASPAD Framework Data Partitioning Response time estimator Adaptive Quality of Security Controller Adaptive control
Data Partitioning Determine the optimal parallelism degree for disk request Reduces the response time of the disk request to increase the security level Dynamically calculate the optimal parallelism degree of the request
Data Partitioning (cont.) Expected disk service time Where  Expected values of seek time, rotational time, and transfer time
Data Partitioning (cont.)  Scheuermann et al., VLDB98 Where C: number of cylinders on disk a, b : two disk type independent constants e, f : disk type dependent constants
Data Partitioning (cont.) The expected value of rotation time The expected transfer time
Data Partitioning (cont.)   Scheuermann et al., VLDB98 Expected disk service time Parallelism degree The optimal parallelism degree is given by  min(p i ,m)
Estimate Response Time Estimate the maximum response time of a disk request Response time is the interval between the time a request sent by a client and the time the parallel disk system complete disk I/O operation
Estimate Response Time (cont.) The response time of a disk request is: p : is the parallelism degree : request vector of security level for p stripes unit T queue  : queuing delay at the client side T partition   : time spent in data partition : system processing delay
The ASPAD Algorithm
Start Insert r into Q For each r in Q Calculate  p i  of  r i Partition ri into pi stripe unit For each stripe unit Initialize SL Estimate response time SL < 1.0 While est. < desired Y SL = SL + 0.1 Estimate response time END N EST >des. dec. SL Y N Apply the security service with level   ij  to the  j th stripe unit Phase1. Data Partitioning Phase2 response time
Property of  ASPAD With respect to the  i th request, the following two conditions must hold if the  j th stripe unit’s security level is increased by 0.1: The current security level   ij  is less than 1.0;  , where  T j  is the response time of the  j th stipe unit,  t i  is the desired response time of the request, and .
Experimental Results a) data size is 100KB and P = 3
Impact of Arrival Rate ASPAD is  always the best a) data size is 100KB and P = 3
Impact of Parallelism Degree ASPAD noticeably  outperforms the other   Add more slides for results!!! The impact of the parallelism degree when arrival rate = 0.5 No./sec.
A Caching Strategy to Improve Security of Cluster Storage Systems
Security Service 1 Security Service m Cache  (Volatile/Non-volatile memory) Adaptive Security Service Controller Security-aware cache management mechanism A Cluster Storage System Network Clients Disk Request Disk1 Disk 2 Disk n
Cache Partitioning The entire cache of the cluster storage system is divided into separate partitions, one for each disk, by a security-aware cache partitioning mechanism.   Each cache partition for a disk is managed separately using the conventional LRU replacement algorithm.
Total cache size is the partition size of the  d th disk
 
Conclusion AWARDS and ASPAD maximize the quality of security for local and parallel disk system Experimental result shows that AWARDS and ASPAD significantly increase the security level as well as the overall performance over an existing algorithm A security-aware cache management mechanism (CaPaS) for cluster storage systems. CaPaS can achieve high security and desired performance for clusters.
Future Work Security-Aware Load Balancing   Energy-Efficient Mobile Storage Systems
StReD : A Quality of Security Framework for Storage Resources in Data Grids.  M. Nijim , Z.-L. Zong, and X. Qin,  Future Generation Computer Systems: The Int'l Journal of Grid Computing,  2007.   (Forthcoming) Modeling and Improving Security of a Local Disk System for Write-Intensive Workloads . M. Nijim , X. Qin, and T. Xie,  ACM Transactions on Storage ,  vol. 2, no. 4, pp. 400-423, Nov. 2006 Performance Analysis of an Admission Controller for CPU- and I/O-Intensive Applications in Self-Managing Computer Systems . M. Nijim , T. Xie, and X. Qin,  ACM Operating Systems Review , vol. 39, no. 4, pp.37-45, October, 2005 Energy-Efficient Scheduling for Parallel Applications on Mobile Clusters .  Z.-L. Zong,  M. Nijim , and X. Qin,  Cluster Computing: The Journal of Networks, Software Tools and Applications,  2007. (In press) Journal Publications
Awards: An Adaptive Write Scheme for Secure Local Disk Systems . M. Nijim , X. Qin, T. Xie, and M. Alghamdi,  Proc. 25th IEEE Int'l Performance Computing and Communications Conference  (IPCCC) ,  April 2006  (Acceptance rate 30%) Integrating a Performance Model in Self-Managing Computer Systems under Mixed Workload Conditions . M. Nijim , T. Xie, and X. Qin,  Proc. IEEE Int’l Conf. Information Reuse and Integration , Aug. 2005 An Adaptive Strategy for Secure Distributed Disk Systems.  M. Nijim , T. Xie, Z.-L. Zong, and X. Qin,  NASA/IEEE Conference on Mass Storage Systems and Technologies , WIP Session, May 2006 Sharp: A New Real-Time Scheduling Algorithm to Improve Security of Parallel Applications on Heterogeneous Clusters .  T. Xie, X. Qin, and  M. Nijim ,  Proc. 25th IEEE Int'l Performance Computing and Communications Conference  (IPCCC) ,  April 2006.  (Acceptance rate 30%) Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems.   T. Xie, X. Qin, and  M. Nijim ,  Proc. 35th International Conference on Parallel Processing  (ICPP), Columbus, Ohio, Aug. 2006.  (Acceptance rate 28%) Adaptive Quality of Security Control in Networked Parallel Disk Systems . M. Nijim , X. Qin, and T. Xie,  Proc. 15th Int'l Conference on Computer Communications and Networks  (ICCCN), Oct. 2006  (Acceptance rate 29%) Selected Conference Publications
Questions?
AWARDS Complexity The complexity of AWARDS is  O(n 2 )  Proof  : To increase the security level of the request, it takes  O(n). There is O(n) number of write requests
Download the presentation slides http://www.slideshare.net/xqin74 Google:  slideshare Xiao Qin
Complexity of ASPAD The time complexity is  O(n 2 p) P: the maximum parallelism degree n: is the number of disk requests

More Related Content

PPTX
Cloud Computing and PSo
PDF
Genetic Algorithm for Process Scheduling
PDF
Configuration Optimization for Big Data Software
PDF
Diefficiency Metrics: Measuring the Continuous Efficiency of Query Processing...
PDF
Real time intrusion detection in network traffic using adaptive and auto-scal...
PPTX
Rc6 algorithm
PDF
Quality of Service based Task Scheduling Algorithms in Cloud Computing
PPTX
Siguccs20101026
Cloud Computing and PSo
Genetic Algorithm for Process Scheduling
Configuration Optimization for Big Data Software
Diefficiency Metrics: Measuring the Continuous Efficiency of Query Processing...
Real time intrusion detection in network traffic using adaptive and auto-scal...
Rc6 algorithm
Quality of Service based Task Scheduling Algorithms in Cloud Computing
Siguccs20101026

What's hot (12)

PDF
Managing Uncertainties in Hardware-Software Codesign Projects
PDF
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
PDF
Transfer Learning for Improving Model Predictions in Robotic Systems
PDF
NeuralProcessingofGeneralPurposeApproximatePrograms
PDF
Super Resolution with OCR Optimization
PDF
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
PPTX
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
PDF
Analyzing Changes in Software Systems From ChangeDistiller to FMDiff
PDF
Master's Thesis - climateprediction.net: A Cloudy Approach
PDF
A Tale of Experiments on Bug Prediction
PDF
A survey of various scheduling algorithm in cloud computing environment
PPTX
Ashfaq Munshi, ML7 Fellow, Pepperdata
Managing Uncertainties in Hardware-Software Codesign Projects
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Transfer Learning for Improving Model Predictions in Robotic Systems
NeuralProcessingofGeneralPurposeApproximatePrograms
Super Resolution with OCR Optimization
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing S...
Task Scheduling using Tabu Search algorithm in Cloud Computing Environment us...
Analyzing Changes in Software Systems From ChangeDistiller to FMDiff
Master's Thesis - climateprediction.net: A Cloudy Approach
A Tale of Experiments on Bug Prediction
A survey of various scheduling algorithm in cloud computing environment
Ashfaq Munshi, ML7 Fellow, Pepperdata
Ad

Similar to Security-Aware Scheduling for Real-Time Parallel Applications on Clusters (20)

PDF
IRJET- Data Security in Cloud Computing through AES under Drivehq
PDF
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
PDF
An implementation of RSA policy
PDF
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
PDF
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
PDF
Modified Approach For Securing Real Time Application On Clusters.
PDF
High Speed Optimized AES using Parallel Processing Implementation
PDF
D03601023026
PDF
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
PDF
Self-adaptive container monitoring with performance-aware Load-Shedding policies
PDF
Module 2 network and computer security
PDF
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
PPT
Stephan berg track f
PDF
Drops division and replication of data in cloud for optimal performance and s...
PDF
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
PDF
secureTF: A Secure TensorFlow Framework
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
PDF
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
PPTX
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
PDF
Seminar pasqualina potena
IRJET- Data Security in Cloud Computing through AES under Drivehq
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
An implementation of RSA policy
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Modified Approach For Securing Real Time Application On Clusters.
High Speed Optimized AES using Parallel Processing Implementation
D03601023026
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Module 2 network and computer security
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
Stephan berg track f
Drops division and replication of data in cloud for optimal performance and s...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
secureTF: A Secure TensorFlow Framework
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
Seminar pasqualina potena
Ad

More from Xiao Qin (20)

PPTX
How to apply for internship positions?
PPTX
How to write research papers? Version 5.0
PDF
Making a competitive nsf career proposal: Part 2 Worksheet
PDF
Making a competitive nsf career proposal: Part 1 Tips
PPTX
Auburn csse faculty orientation
PPTX
Auburn CSSE graduate student orientation
PPTX
CSSE Graduate Programs Committee: Progress Report
PDF
Project 2 How to modify os161: A Manual
PPTX
Project 2 how to modify OS/161
PDF
Project 2 how to install and compile os161
PPTX
Project 2 - how to compile os161?
PPTX
Understanding what our customer wants-slideshare
PPTX
OS/161 Overview
PPTX
Surviving a group project
PDF
P#1 stream of praise
PPTX
Data center specific thermal and energy saving techniques
PPTX
How to do research?
PPT
COMP2710 Software Construction: header files
PPT
COMP2710: Software Construction - Linked list exercises
PPTX
HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...
How to apply for internship positions?
How to write research papers? Version 5.0
Making a competitive nsf career proposal: Part 2 Worksheet
Making a competitive nsf career proposal: Part 1 Tips
Auburn csse faculty orientation
Auburn CSSE graduate student orientation
CSSE Graduate Programs Committee: Progress Report
Project 2 How to modify os161: A Manual
Project 2 how to modify OS/161
Project 2 how to install and compile os161
Project 2 - how to compile os161?
Understanding what our customer wants-slideshare
OS/161 Overview
Surviving a group project
P#1 stream of praise
Data center specific thermal and energy saving techniques
How to do research?
COMP2710 Software Construction: header files
COMP2710: Software Construction - Linked list exercises
HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Transforming Manufacturing operations through Intelligent Integrations
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced IT Governance
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
KodekX | Application Modernization Development
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
20250228 LYD VKU AI Blended-Learning.pptx
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Transforming Manufacturing operations through Intelligent Integrations
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced IT Governance
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
KodekX | Application Modernization Development
madgavkar20181017ppt McKinsey Presentation.pdf

Security-Aware Scheduling for Real-Time Parallel Applications on Clusters

  • 1. Security-Aware Scheduling for Real-Time Parallel Applications on Clusters Xiao Qin
  • 3. The PrairieFire Cluster at the University of Nebraska-Lincoln
  • 5. Security-Sensitive Real-Time Applications Online Transaction Stock Trading
  • 6. Common Threats and Security Services Snooping Alteration Spoofing Confidentiality Authentication Integrity
  • 7. Scheduling Plays a Key Role Conventional scheduling algorithms are inadequate for security-sensitive real-time applications on clusters A process of assigning tasks to a set of resources Head Nodes Tasks Users
  • 8. Motivation Improve Utilization Keep Load-Balancing Support Scalability Promote Throughput Enable Security Awareness Reduce Response Time
  • 9. Security-Aware System Architecture    OS Hardware Platform interface Platform interface OS Hardware Middleware Services (including security services) Low-Level Security Service APIs User interface Framework Mapping to Middleware Services Framework Private Service Application Tool High-Level Security Service APIs Application Application       Quality of Security Control Manager (QSCM)
  • 10. Quality of Security Control Manager - QSCM Module Low Level Security Service APIs Application Task Application Task Application Task    Global Security Optimization Local Security Optimization Security Optimization Resource Monitoring Security Service 1 Security Service n    Local Schedulability Analyzer Quality of Security Control Manager
  • 11. Task Submission Structure DEFINE Task : flight_control { Input = (altitude: 1230, heading: 35, …); Output = (takeoff_distance, climb_rate); Type = “Real Time”; Deadline = 80; Completion_Time = 0; Owner = “Gary Xie”; Cmd = “flight_con”; Processor_num= 5; Data_secured=250; Constraint  Arch == “INTEL”;  OS == “UNIX”;  Disk >= 480;  Memory >=128;  Deadline = 80;  0.3 <= Authentication <=0.6;  0.4 <= Integrity <= 0.8;  0.5 <= Confidentiality <= 0.9; }
  • 12. Security Overhead Model Security is achieved at the cost of performance degradation P S Security Overheads S P
  • 13. Cryptographic Algorithms for Confidentiality Service 21.09 1.00 Rijndael 29.35 0.72 RC5 33.75 0.63 Knufu/Khafre 37.5 0.56 Blowfish 96.43 0.22 RC4 Performance (KB/ms) Security Level Cryptographic Algorithms
  • 14. Hash Functions for Integrity Service 4.36 1.00 Tiger 5.69 0.77 RIPEMD-160 6.88 0.63 SHA-1 9.73 0.45 RIPEMD-128 12.00 0.36 RIPEMD 17.09 0.26 MD5 23.90 0.18 MD4 Performance (KB/ms) Security Level Hash Functions
  • 15. Authentication Methods 163 0.9 CBC-MAC-AES 148 0.6 HMAC-SHA-1 90 0.3 HMAC-MD5 Computation Time (ms) Security Level Authentication Methods
  • 16. System Model Rejected Queue Dispatch Queue TAPADS Local Queue N 1 N 2 N m User p User 2 User 1 Schedule Queue Admission Controller Security Level Optimizer
  • 17. Parallel Application A single application (job) that has multiple processes that run concurrently t1 t11 e2 t4 t9 t8 t3 t2 t5 t6 t10 t7 e1 e3 e4 e5 e7 e6 e10 e8 e9
  • 18. Task Model Deadline Constraints Security Constraints Precedence Constraints
  • 19. Directed Acyclic Graphs (DAG) a parallel application is defined as a vector (T, E, d) T : {t 1 , t 2 ,...,t n } E : a set of weighted and directed edges used to represent communication among tasks, e.g., ( t i , t j )  E is a message transmitted from task t i to t j d : Deadline
  • 20. A Task A task t i = (e i , l i , S i ) e i :execution time l i : amount of data to be protected S i : a vector of security requirements
  • 21. A DAG 10Sec., 500KB, { [0.3,0.6], [0.4,0.8], [0.5,0.9] } 10KB, { [0.4,0.8], [0.5,0.9] } e2 t1 t4 t9 t8 t3 t2 t11 t5 t6 t10 t7 e1 e3 e4 e5 e7 e6 e10 e8 e9
  • 22. Befpre Security Optimization PE3 Link PE1 Link PE2 deadline Slack Time t 6 t 8 t 9 e 5 e 7 e 9 t 1 t 10 t 7 t 4 t 3 t 2 e 4 e 10 t 5 t 11 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60
  • 23. After Security Optimization t 10 t 4 t 3 t 2 t 1 e 4 e 10 t 11 t 5 e 5 t 6 e 7 t 8 t 9 t 7 deadline 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 e 9 PE3 Link PE1 Link PE2
  • 24. Security Requirements for A Task T i S i = ( ,…, ,…, ) Security level range of the j th security service for task Ti [0.3,0.6] [0.4,0.8] [0.5,0.9]
  • 25. Security Benefits Gained by Task T i Weight of the j th security service for task T i Security level of the j th security service for task T i and
  • 26. Weights of Security Services > >
  • 27. Security Benefits Gained by A Task Set    n i i SL 1 SL ) ( T The task set s ) (
  • 28. Optimize Security Benefit of An Application maximize subject to: i k SL 1 1 k s i The task set        n q k i k i s w T k k ), max( ) min( i i i S S   SL s ) (
  • 29. Security Requirements of Message ( t i , t j ) The required security level range of the p th security service i j ( t i , t j )
  • 30. Security Benefits Gained by One Message ( t i , t j ) Security level of the k th security service and
  • 31. Security Benefits Gained by A Message Set .
  • 32. Optimize Security Benefit of Message Set maximize subject to The message set
  • 33. Security Benefit of A Parallel Application The message set The task set Security Value
  • 34. The TAPADS Task Allocation Algorithm Compute the critical path Slack time= d – f Allocate all ti subject to minimal security requirements Identify the best candidate in V and E that has the highest benefit-cost ratio Increase security levels of more important services at the minimal cost Update the schedule in accordance with the increased security level yes Slack time > 0 ? no Update slack time End
  • 35. Time Complexity of TAPADS The time complexity of TAPADS is O(k(q|V|+p|E|)) where k : the number of times Step 7 is repeated q : the number of security services for computation p : the number of security services for communication
  • 36. Performance Evaluation LISTMIN : Selects the lowest security level of each security service required by each task and message of a parallel job LISTMAX : Chooses the highest security level for each security requirement posed by each task and message within a parallel job LISTRND : Randomly picks a value within the security level range of each service required by a task and a message
  • 37. Experimental Parameters 0.2 (authentication), 0.5 (encryption), 0.3 (integrity) Weight of security services (min, top, max)=(0.02, 0.1, 0.5), (0.2, 1, 5), (1, 5, 10), (10, 20, 30) MB Size of data to be secured (25, 50, 75, 100) Out degrees ([100, 200], [200, 300], [300, 400], [400, 500]) second Deadline ranges (100, 200, 300, 400, 500, 600) second Deadlines (32, 64,128, 256), (8, 12, 16, 20) Number of nodes (min, top, max)=(1, 5, 10), (10,20,40), (40,80,160), (160,320,640) second Task execution time 1Gbps Network bandwidth 1000 million instructions/second or MIPS CPU Speed Value (Fixed) - (Varied) Parameter
  • 38. Performance Metrics Security Value Schedulability : a fraction of total submitted jobs that are schedulable Quality of security (QSA) : quality of security for applications Guarantee factor : it is zero if a job’s deadline cannot be met. Otherwise, it is one. Job completion time : earliest time that a job can finish its execution
  • 39. Experiment One: Overall Performance One job with 433 tasks 32 nodes in a cluster Deadline varies from 0 to 600 seconds
  • 41. Overall Performance Comparisons(2) Improvement 97.7% Improvement25 %
  • 42. Overall Performance Comparisons(3) Improvement54 .5% Improvement25.7 %
  • 43. Experiment Two: Adaptability 1000 diverse task graphs (54 tasks ~ 543 tasks) 4 deadline ranges [100, 200], [200, 300], [300, 400] and [400, 500] 32 nodes clusters
  • 44. Adaptability(1) TAPADS ties with LISTMIN LISTMAX is the worst
  • 45. Adaptability(2) TAPADS is always the best TAPADS outperforms LISTMAX significantly TAPADS outperforms LISTMAX significantly
  • 46. Adaptability(3) TAPADS noticeably outperforms all others
  • 47. Experiment Three: Scalability 32 ~ 256 nodes in a cluster A task graph with 520 tasks (nodes) Deadline is set to 400 Seconds
  • 49. Experiment Four: Degree of Task Parallelism A parallel application with 1074 tasks Deadline is set to 400 Seconds Number of nodes is 128 Maximal number of out degree varies from 25 to 100
  • 50. Sensitivity to Degree of Task Parallelism
  • 51. Experiment Five: Security Sensitive Data Size Size of security sensitive data is in a triangle distribution (min, top, max)=(0.02, 0.1, 0.5), (0.2, 1, 5), (1, 5, 10), (10, 20, 30) MB
  • 52. Impact of Size of Security Sensitive Data
  • 53. Evaluation in Digital Signal Processing (1) (a) Guarantee factor (b) Security value (c) QSA Performance impact of deadline for DSP
  • 54. Evaluation in Digital Signal Processing (2) ( a ) Security value ( b ) QSA (c) Job completion time Performance impact of number of nodes for DSP
  • 55. Conclusions TAPADS can generate optimal allocations that maximize quality of security for parallel applications running on clusters. A security overhead model is proposed. Experimental results show that TAPADS significantly improves the performance in terms of quality of security and schedulability over three existing allocation schemes.
  • 56. Ph.D. Dissertation Projects Mais Nijim [Summer 2007] Adaptive quality of security control in storage systems.  Ziliang Zong [Ph.D. Candidate, Spring 2008 Expected] Conserving energy in clusters through resource allocation Mohammed Alghamdi [Ph.D. Student, Spring 2008 Expected] Energy-efficient packet transmissions in real-time wireless networks Kiranmai Bellam [Ph.D. Student, Spring 2009 Expected] Power, fault tolerance, and security issues in real-time systems
  • 59. Some Typical Security Levels Routing + message security Routing + SSL Routing + SSL + message security Routing + SSL + client authentication Routing + SSL + message security + client authentication
  • 60. Related Work [Hou&Shin] A task allocation scheme to schedule periodic tasks with precedence constraints in distributed real-time systems. [He et al. ] Dynamic scheduling of parallel real-time jobs executing on heterogeneous clusters. [Yurcik et al. ] Tools for managing cluster security via process monitoring. [Azzedin&Maheswaran] The notion of “trust” into resource management of a large-scale wide-area system.
  • 61. Future Work Extend our security overhead models to multi-dimensional computing resources Accommodate more security services into our security overhead model Apply TAPADS scheme to heterogeneous clusters
  • 62. Selected Journal Publications X. Qin and T. Xie, “Allocation of Tasks with Availability Constraints in Heterogeneous Systems,” IEEE Transactions on Computers . Accepted April 2007. M. Nijim, X. Qin , and T. Xie, “Modeling and Improving Security of a Local Disk System for Write-Intensive Workloads,” ACM Transactions on Storage , vol. 2, no. 4, pp. 400-423, Nov. 2006. T. Xie and X. Qin , “Improving Security for Periodic Tasks in Embedded Systems through Scheduling,” ACM Transactions on Embedded Computing Systems , vol. 6, no. 1, 2007. T. Xie and X. Qin , “Scheduling Security-Critical Real-Time Applications on Clusters,” IEEE Transactions on Computers , vol. 55, no. 7, pp. 864-879, July 2006. X. Qin , “Performance Comparisons of Load Balancing Algorithms for I/O-Intensive Workloads on Clusters,” Journal of Network and Computer Applications, 2007. Accepted X. Qin , “Design and Analysis of a Load Balancing Strategy in Data Grids,” Future Generation Computer Systems: The Int'l Journal of Grid Computing , vol. 23, no. 1, pp. 132-137, Jan. 2007. Z.-L. Zong, M. Nijim, and X. Qin , “Energy-Efficient Scheduling for Parallel Applications on Mobile Clusters,” Cluster Computing: The Journal of Networks, Software Tools and Applications, 2007. [In press] M. Nijim, X. Qin , and Z.-L. Zong, “StReD: A Quality of Security Framework for Storage Resources in Data Grids,” Future Generation Computer Systems: The Int'l Journal of Grid Computing , 2007. [In press] X. Qin and H. Jiang, “A Dynamic and Reliability-driven Scheduling Algorithm for Parallel Real-time Jobs on Heterogeneous Clusters,” Journal of Parallel and Distributed Computing , vol. 65, no. 8, pp.885-900, Aug. 2005.
  • 63. Selected Conferences Publications X. Qin , M. Alghamdi, M. Nijim, and Z.-L. Zong, “Scheduling of Periodic Packets in Energy-Aware Wireless Networks,” Proc. the 26th IEEE Int'l Performance Computing and Communications Conf. (IPCCC'07), New Orleans, Louisiana, April 2007. T. Xie and X. Qin , “A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems,” Proc. 13th Annual IEEE Inter’l Conf. on High Performance Computing (HiPC), Bangalore, India, Dec. 18-21, 2006. ( Acceptance Rate: 15.5%, 52/335) M. Nijim, X. Qin , and T. Xie, “Adaptive Quality of Security Control in Networked Parallel Disk Systems,” Proc. 15th Int’l Conf. Computer Communications and Networks (ICCCN'06), Arlington, Virginia, Oct. 2006. ( Acceptance Rate: 32%, 71/221) Z.-L. Zong, A. Manzanares, B. Stinar, and X. Qin , “Energy-Efficient Duplication Strategies for Scheduling Precedence Constrained Parallel Tasks on Clusters,” Proc. IEEE 8th Int’l Conf. Cluster Computing (Cluster'06), Sept. 2006. ( Acceptance Rate: 33%, 42/127) T. Xie and X. Qin , “Stochastic Scheduling with Availability Constraints in Heterogeneous Systems,” Proc. IEEE 8th Int’l Conf. Cluster Computing (Cluster'06), 2006. ( Acceptance Rate: 33%, 42/127) T. Xie, X. Qin, and M. Nijim, “Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems,” Proc. 35th Int’l Conf. Parallel Processing (ICPP), Columbus, Ohio, Aug. 2006. ( Acceptance Rate: 32%, 64/200) T. Xie and X. Qin, “ SAHA: A Scheduling Algorithm for security-Sensitive Jobs on Data Grids,” Proc.  IEEE/ACM 6th Int'l Symp. Cluster Computing and the Grid (CCGrid), 2nd Int'l Workshop on Cluster Security, May 2006. ( Acceptance Rate: 25% ) T. Xie and X. Qin , “SHARP: A New Real-Time Scheduling Algorithm to Improve Security of Parallel Applications on Heterogeneous Clusters,” Proc. the 25th IEEE Int’l Performance Computing and Communications Conf. (IPCCC'06) , Phoenix, AZ, April 2006. ( Acceptance Rate: 35% )
  • 64. Selected Conferences Publications (cont.) M. Nijim, X. Qin , T. Xie, and M. Alghamdi, “Awards: An Adaptive Write Scheme for Secure Local Disk Systems,” Proc. the 25th IEEE Int’l Performance Computing and Communications Conf. (IPCCC'06) , April 2006. ( Acceptance Rate: 35% ) T. Xie and X. Qin , “A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Clusters,” Proc. the 7th IEEE Int’l Conf. Cluster Computing (Cluster 2005), 2005.  ( Acceptance Rate: 32%, 48/150) T. Xie, X. Qin , and A. Sung, &quot;SAREC: A Security-Aware Scheduling Strategy for Real-Time Applications on Clusters ,&quot; Proc. the 34th Int’l Conf. Parallel Processing (ICPP 2005), pp.5-12, Norway, June 14-17, 2005. ( Acceptance Rate: 28%, 69/241) X. Qin and Hong Jiang, “Improving Effective Bandwidth of Networks on Clusters using Load Balancing for Communication-Intensive Applications,” Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC 2005), pp.27-34, Phoenix, Arizona, April 7-9, 2005. ( Acceptance Rate: 35%, 36/103) X. Qin , “Improving Network Performance through Task Duplication for Parallel Applications on Clusters,” Proc. the 24th IEEE Int’l Performance, Computing, and Communications Conference (IPCCC 2005), 2005. ( Acceptance Rate: 35%, 36/103) X. Qin , H. Jiang, Y. Zhu, and D. Swanson, &quot;Dynamic Load Balancing for I/O-Intensive Tasks on Heterogeneous Clusters,&quot; Proceedings of the 10th International Conference on High Performance Computing (HiPC 2003), pp.300-309, 2003 ( Acceptance Rate: 29% ) X. Qin , H. Jiang, Y. Zhu, and D. Swanson, &quot;Towards Load Balancing Support for I/O-Intensive Parallel Jobs in a Cluster of Workstations,&quot; Proc. of the 5th IEEE International Conference on Cluster Computing (Cluster 2003), 2003. ( Acceptance Rate: 29% )
  • 65. Adaptive Quality of Security Control in Storage Systems Xiao Qin
  • 66. Outline Introduction to Storage Systems Local Disk Systems Parallel Disk Systems Security-Aware Cache Partitioning Conclusion Publications
  • 67. Data-Intensive Applications Video Surveillance Digital Libraries Radio Astronomy Observatory
  • 68. Data-Intensive Applications (Cont.) long running simulations remote-sensing database systems biological sequence analysis
  • 69. Motivation Existing storage systems fail to meet the security requirements of modern data- intensive applications There is no way to dynamically choose security services to meet disk requests flexible security requirements Existing storage systems are not suitable to guarantee desired response times of disk requests
  • 70. Common Threats and Security Services Snooping Alteration Spoofing Confidentiality Authentication Integrity
  • 71. Cache Partitioning Scheme Topics Security-Aware Local Disk Systems Adaptive Quality of Security Control in Parallel Disk Systems
  • 72. System model of a Data Grid
  • 73. Quality of Security Framework for Disk Systems
  • 75. Contributions A Security-Aware Adaptive Write Strategy (AWARDS) for Local Disk Systems AWARDS can achieve high security for local disk systems while making the best effort to guarantee desired response times AWARDS Security Performance
  • 76. The Architecture of AWARDS Security Service 1 Security Service m Adaptive Security Service Controller Disk Request Scheduler Disk Request Security Mechanism Disk Driver Untrusted Local Disk
  • 77. Modeling Disk Requests Each disk request specifies quality of service requirement A security requirement can be defined as a lower bound security level The range is between 0.1 and 1.0 A performance requirement is specified as a desired response time Disk Requests
  • 78. Quality of security for each security service is measured by a security level For example: An encryption service with high security level means the high quality of security provided by the service A disk request specifies a lower bound security level as 0.4 Encryption services with security levels higher than or equal to 0.4 can successfully meet the disk request’s security requirements Modeling Disk Requests (Cont.)
  • 79. r = (o, a, d, s, t) o: type of the request a: disk address d: data size (KB) s: lower security level bound t: desired response time Modeling Disk Requests (Cont.)
  • 80. Modeling Disk Requests (Cont.) Security Level Disk Request Desired response time Real response time Subject to Maximize
  • 81. Security Overhead Model Eight encryption algorithms In accordance with the cryptographic algorithms’ performance Each cryptographic algorithm is assigned a security level from 0 to 1 e.g., Assign security level 1 to the strongest yet slowest encryption algorithm (IDEA)
  • 82. The AWARDS Strategy To aim at improving the quality of security for local disks (i.e., to increase the security levels ) To guarantee timing constraints. (i.e., response time  desired response time )
  • 83. Example Sl = 0.1 Sl = 0.3 Sl = 0.2 Security level of r 1 = 0.8 Response time =17.7 ms Security level of r 1 = 0.7 Response time =40.7 ms Security level of r 1 = 0.9 Response time =54.5 ms Requests Data Size ( d i ) Minimal Security Level ( s i ) Desired Response Time ( t i ) Response Time (T) under AWARDS Security Level (  i ) under AWARDS r 1 90 KB 0.2 18 ms 17.7 ms 0.8 r 2 150 KB 0.1 41 ms 40.7 ms 0.7 r 3 30 KB 0.3 55 ms 54.5 ms 0.9 r 1 r 2 r 3 r 1 r 2 r 3 Time Time SO= 0.93ms SO= 0.89ms SO= 0.8ms
  • 85. Start Insert r i into Q For each r i in Q Initialize Security Level Sl < 1.0 For each r i in the Q Sl = Sl + 0.1 For each r k r k can’t finsihed Sl = Sl - 0.1 END No END Yes Yes No
  • 86. Property of AWARDS If the security level r i is increased by 0.1, the following conditions must hold. 1. The current security level of r i is less than 1.0, i.e.,  i < 0.1 2. Start time processing time
  • 88. Experimental Result Disk Parameters IBM Ultrastar 36Z15 Size 18.4 GB RPM 15000 Seek Time, T seek 7.18 ms Rotational Time, T rot 4.02 ms Disk Bandwidth, B disk 30 MB/Sec.
  • 89. Experimental Result Workload Configurations Parameter Value (Fixed) - (Varied) Disk Bandwidth 30MB/Sec. Request Arrival Rate (0.1, 0.2, 0.3, 0.4, 0.5) No./Sec. Desired Response Time 10 Sec. Security Level (0.5) - (0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9) Write Ratio (100%) - (0%, 10%, 20%, 30%, … 100%) Data Size (500 KB) – (300, 400, 500, 600, 700) KB
  • 90. Performance Metrics Satisfied ratio : a fraction of total arrived disk requests that are found to be finished before their desired response times Average security level : measured by the average value of security levels of all disk requests issued Average security overhead : measured in sec. Overall performance : product of satisfied ratio and the average security level
  • 91. Impact of Arrival Rate Improvement138.2 % Improvement125.6 %
  • 93. Impact of Disk Bandwidth
  • 94. Sparse Cholesky Desired response time
  • 95. Lu Decomposition Desired response time
  • 98. Adaptive Quality of Security Control in Parallel Disk Systems
  • 100. Motivation Existing parallel disk systems lack the means to adaptively control quality of security for dynamically changing workloads To develop an adaptive quality of security control scheme for parallel disk systems ( ASPAD )
  • 101. Contributions ASPAD aims to adapt to changing security requirements and workload conditions ASPAD endeavors to determine security services for disk requests while guaranteeing the desired response time for the requests ASPAD Security Performance
  • 102. Disk 1 Disk 2 Disk m Adaptive Security Quality Controller Data Partitioning mechanism Security Service Middleware Security Service q Security Service 1 Clients Disk Requests Parallel Disk System Network Response Time Estimator Security Service 2 The ASPAD Framework
  • 103. Quality of Security The quality of security for each security service is measured by security level. 0.1 to 1.0 The quality of security can be quantitatively measured using seven levels Extremely high, very high, high, medium, low, very low, and no security protection Translation mechanism is implemented to make the conversions
  • 104. Modeling Quality of Security Security level of the jth stripe unit of r i Parallelism degree No. of disks
  • 105. Modeling Quality of Security (Cont.)
  • 106. Optimize Quality of Security To maximize security benefit of the parallel disk system Maximize Where θ ij : the response time of jth strip unit of request r i Subject to a) b)
  • 107. Optimize Quality of Security (Cont.) The response time of all stripe unit in request r i must be smaller than the desired response time The parallelism degree of r i ≤ number of disks in the system
  • 108. The ASPAD Framework Data Partitioning Response time estimator Adaptive Quality of Security Controller Adaptive control
  • 109. Data Partitioning Determine the optimal parallelism degree for disk request Reduces the response time of the disk request to increase the security level Dynamically calculate the optimal parallelism degree of the request
  • 110. Data Partitioning (cont.) Expected disk service time Where Expected values of seek time, rotational time, and transfer time
  • 111. Data Partitioning (cont.) Scheuermann et al., VLDB98 Where C: number of cylinders on disk a, b : two disk type independent constants e, f : disk type dependent constants
  • 112. Data Partitioning (cont.) The expected value of rotation time The expected transfer time
  • 113. Data Partitioning (cont.) Scheuermann et al., VLDB98 Expected disk service time Parallelism degree The optimal parallelism degree is given by min(p i ,m)
  • 114. Estimate Response Time Estimate the maximum response time of a disk request Response time is the interval between the time a request sent by a client and the time the parallel disk system complete disk I/O operation
  • 115. Estimate Response Time (cont.) The response time of a disk request is: p : is the parallelism degree : request vector of security level for p stripes unit T queue : queuing delay at the client side T partition : time spent in data partition : system processing delay
  • 117. Start Insert r into Q For each r in Q Calculate p i of r i Partition ri into pi stripe unit For each stripe unit Initialize SL Estimate response time SL < 1.0 While est. < desired Y SL = SL + 0.1 Estimate response time END N EST >des. dec. SL Y N Apply the security service with level  ij to the j th stripe unit Phase1. Data Partitioning Phase2 response time
  • 118. Property of ASPAD With respect to the i th request, the following two conditions must hold if the j th stripe unit’s security level is increased by 0.1: The current security level  ij is less than 1.0; , where T j is the response time of the j th stipe unit, t i is the desired response time of the request, and .
  • 119. Experimental Results a) data size is 100KB and P = 3
  • 120. Impact of Arrival Rate ASPAD is always the best a) data size is 100KB and P = 3
  • 121. Impact of Parallelism Degree ASPAD noticeably outperforms the other Add more slides for results!!! The impact of the parallelism degree when arrival rate = 0.5 No./sec.
  • 122. A Caching Strategy to Improve Security of Cluster Storage Systems
  • 123. Security Service 1 Security Service m Cache (Volatile/Non-volatile memory) Adaptive Security Service Controller Security-aware cache management mechanism A Cluster Storage System Network Clients Disk Request Disk1 Disk 2 Disk n
  • 124. Cache Partitioning The entire cache of the cluster storage system is divided into separate partitions, one for each disk, by a security-aware cache partitioning mechanism. Each cache partition for a disk is managed separately using the conventional LRU replacement algorithm.
  • 125. Total cache size is the partition size of the d th disk
  • 126.  
  • 127. Conclusion AWARDS and ASPAD maximize the quality of security for local and parallel disk system Experimental result shows that AWARDS and ASPAD significantly increase the security level as well as the overall performance over an existing algorithm A security-aware cache management mechanism (CaPaS) for cluster storage systems. CaPaS can achieve high security and desired performance for clusters.
  • 128. Future Work Security-Aware Load Balancing Energy-Efficient Mobile Storage Systems
  • 129. StReD : A Quality of Security Framework for Storage Resources in Data Grids. M. Nijim , Z.-L. Zong, and X. Qin, Future Generation Computer Systems: The Int'l Journal of Grid Computing, 2007. (Forthcoming) Modeling and Improving Security of a Local Disk System for Write-Intensive Workloads . M. Nijim , X. Qin, and T. Xie, ACM Transactions on Storage , vol. 2, no. 4, pp. 400-423, Nov. 2006 Performance Analysis of an Admission Controller for CPU- and I/O-Intensive Applications in Self-Managing Computer Systems . M. Nijim , T. Xie, and X. Qin, ACM Operating Systems Review , vol. 39, no. 4, pp.37-45, October, 2005 Energy-Efficient Scheduling for Parallel Applications on Mobile Clusters .  Z.-L. Zong, M. Nijim , and X. Qin, Cluster Computing: The Journal of Networks, Software Tools and Applications, 2007. (In press) Journal Publications
  • 130. Awards: An Adaptive Write Scheme for Secure Local Disk Systems . M. Nijim , X. Qin, T. Xie, and M. Alghamdi, Proc. 25th IEEE Int'l Performance Computing and Communications Conference (IPCCC) , April 2006 (Acceptance rate 30%) Integrating a Performance Model in Self-Managing Computer Systems under Mixed Workload Conditions . M. Nijim , T. Xie, and X. Qin, Proc. IEEE Int’l Conf. Information Reuse and Integration , Aug. 2005 An Adaptive Strategy for Secure Distributed Disk Systems. M. Nijim , T. Xie, Z.-L. Zong, and X. Qin, NASA/IEEE Conference on Mass Storage Systems and Technologies , WIP Session, May 2006 Sharp: A New Real-Time Scheduling Algorithm to Improve Security of Parallel Applications on Heterogeneous Clusters . T. Xie, X. Qin, and M. Nijim , Proc. 25th IEEE Int'l Performance Computing and Communications Conference (IPCCC) , April 2006. (Acceptance rate 30%) Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems. T. Xie, X. Qin, and M. Nijim , Proc. 35th International Conference on Parallel Processing (ICPP), Columbus, Ohio, Aug. 2006. (Acceptance rate 28%) Adaptive Quality of Security Control in Networked Parallel Disk Systems . M. Nijim , X. Qin, and T. Xie, Proc. 15th Int'l Conference on Computer Communications and Networks (ICCCN), Oct. 2006 (Acceptance rate 29%) Selected Conference Publications
  • 132. AWARDS Complexity The complexity of AWARDS is O(n 2 ) Proof : To increase the security level of the request, it takes O(n). There is O(n) number of write requests
  • 133. Download the presentation slides http://www.slideshare.net/xqin74 Google: slideshare Xiao Qin
  • 134. Complexity of ASPAD The time complexity is O(n 2 p) P: the maximum parallelism degree n: is the number of disk requests

Editor's Notes

  • #3: Lead in: Parallel applications are running on parallel computers or supercomputers. Structure commonly connected through fast local area networks Goal usually deployed to improve speed and/or reliability over that provided by a single computer Benefit cost-effective than single computer of comparable speed or reliability Myrinet and Infiniband
  • #5: biological sequence analysis Radio Astronomy Observatory
  • #6: A variety of real-time applications running on clusters require security protections Mention: real-time
  • #7: Lead in: Threat is a potential violation of security Three services counter threats to the security of a system. Snooping: the unauthorized interception of information Alternation: an unauthorized change of information Spoofing: an impersonation of one entity by another.
  • #8: The Goal of This Work: Developing and evaluating new scheduling mechanisms and algorithms for applications with timing and security constraints on clusters Drawbacks of current scheduling schemes Consider security without addressing timing constraints OR Consider real-time requirements without addressing security. To achieve high security for clusters while making the best effort to guarantee timing constraints.
  • #9: Existing cluster computing systems lack the means to adaptively control quality of security for dynamically changing workloads To develop an adaptive quality of security control scheme for real-time applications running on clusters
  • #10: One-two minutes!!! From bottom to up User Interface Framework Low-level Security Service APIs Quality of Security Control Manager ( QSCM ) Security Middleware Services
  • #11: Global Security Optimization can migrate tasks to a remote cluster if local cluster cannot satisfy the security and timing constraints of a local task. In this research, I only focused on local security optimization.
  • #14: SEAL&lt;RC4&lt;Blowfish&lt;Knufu/Khafre&lt;RC5&lt;Rijndael&lt;DES&lt;IDEA (?) AES(Rijndael)&gt;SEAL&gt;3DES&gt;RC5&gt;DES DES, 1 hour SEAL Explain security level and their speed (performance): In accordance to the cryptographic algorithms’ performance, each algorithm is assigned a corresponding security level in the range from 0.08 to 1. For example, we assign security level 1 to the strongest yet slowest encryption algorithm IDEA. Take SEAL and 3DES as examples to explain why we assign 0.9 for 3DES. DES (Data Encryption Standard): 1970s, 56-bit key, the strength is 2 55 (two to the 55 th power) TDES (Triple DES): 1974, the strength is 2 80 , It is three times slower than regular DES but more secure if used properly. IDEA (International Data Encryption Algorithm): 1992, the strength is 2 128
  • #15: MD4: 1990, 128-bit hash value MD5: 1991, 128-bit hash value SHA-1: 1994, 160-bit hash value MD4 &lt; MD5 &lt; SHA-1 RIPEMD: 1992, 128-bit hash value RIPEMD128: RIPEMD160: 1996, 160-bit hash value RIPEMD &lt; RIPEMD128 &lt; RIPEMD160 Tiger: 1996, 192-bit hash value
  • #18: Generally each process will run on a different processor Typically a parallel job would employ a message passing interface, such as MPI, to pass data between the processes
  • #23: Originally, admission controller only meets each accepted task’s minimal security requirements and deadline;
  • #25: This is a general security requirement expression, which includes q different security services; In this work, I only considered three Commonly used security services, namely, confidentiality, integrity, and authentication
  • #26: The weight of a security service reflects its priority in a particular application domain. For example, in military applications, usually confidentiality is more important than integrity, thus, users can assign weight 0.7 for confidentiality and 0.3 for integrity; In other hand, in commercial banking system, integrity is more important than confidentiality; In this case, users can assign 0.7 for integrity and 0.3 for confidentiality; Add one more slide to show the priorities of different services.
  • #34: Lead in: move forward; in order to improve security of applications, we need a way of measuring quality of security.
  • #35: Task Allocation for Parallel Applications with Deadline and Security Constraints The TAPADS algorithm is outlined in Figure 2. TAPADS aims at achieving high quality of security under two conditions: (1) increasing security levels will not result in missing deadlines; and (2) precedence constraints are satisfied. In an effort to meet both deadline and precedence constraints, TAPADS assigns the tasks to each node in a way to maximize security measured as . Thus, TAPADS is capable of maintaining a high schedulability measured as .
  • #37: Need to mention message as well. This three algorithms are variants of a well-known algorithm : List
  • #38: The parameters of nodes in the clusters are chosen to resemble real-world workstations like Sun SPARC-20 and Sun Ultra 10 All synthetic parallel jobs used from Section 6.2 to Section 6.7 were created by TGFF [9], a randomized task graph generator.
  • #39: To evaluate quality of security for parallel applications , we derive in this section the probability that all tasks and messages remain risk-free during the course of execution. Pc(x) is the probability that all tasks are free from being attacked ; PL(x) is the probability that all messages are free from being attacked; Psc(x) is the probability that all tasks and messages remain risk-free during the course of execution.
  • #41: We tested one DAG (job) with 433 tasks on a cluster with 32 nodes ; three circles ( 170 second, 260 second and 575 second )
  • #42: Circle the three points, one trend (an arrow) and three circles; The results clearly indicate that applications can gain more performance benefits from our TAPADS approach under the circumstance that real-time applications have relatively tight deadlines.
  • #43: The first observation deduced from Figure 3(c) is that the quality of security of TAPADS increases with the deadline. This is because quality of security is partially derived from SV (see Equations 25 and 29), which becomes higher when the deadlines are looser. A second observation is that the performance improvement of TAPADS in terms of quality of security is not as pronounced as the performance improvement in terms of security value compared with LISTMIN algorithm. This can be explained by the negative natural exponential function (see Equations 22 and 26), which smooths the security value differences between LISTMIN and TAPADS.
  • #44: We conducted four groups of experiments to test the performance of TAPADS using 1000 diverse task graphs. The smallest task graph has 54 tasks, and the largest task graph consists of 543 tasks. We assume that the number of nodes in the cluster is 32. For each group test, we set a deadline range from which a deadline is randomly selected for an incoming parallel job. The four deadline ranges for the four group experiments are [100, 200], [200, 300], [300, 400] and [400, 500], respectively.
  • #45: Multiple DAGs, (1) TAPADS and LISTMIN deliver the best performance in schedulability under all four cases
  • #46: Three observations among which the second one is interesting.
  • #49: t he improvement of TAPADS over LISTMIN becomes more prominent with the increasing value of the node number. This result can be explained by the conservative nature of LISTMIN, which simply meets the minimal security requirements for parallel applications on the cluster. (2) LISTMAX can achieve the same performance as TAPADS when there are 256 nodes in the cluster. This is because LISTMAX can guarantee the maximal security requirements of the parallel jobs when more nodes are available in the cluster. (3) all the four algorithms can finish the job in a shorter time period when there is large number of available nodes; (4) TAPADS has the same performance in complete time as that of LISTMIN.
  • #51: To verify the performance impact of degree of task parallelism, we evaluate the performance as functions of maximal number of out degree in task graphs. We define the degree of task parallelism of a task graph as the maximal possible out degree numbers in the graph TAPADS is the only algorithm that can continuously improve its performance in security value and quality of security with the increasing value of task parallelism The important conclusion drawn from this experiment is that TAPADS can gain greater performance improvement when a parallel application has a higher degree of parallelism
  • #53: Firstly, when the security sensitive data size varies from config1 to config4, the security value of TAPADS drops, while those of LISTMIN and LISTRND remain the same Secondly, the quality of security for LISTMIN and LISTRND decreases when the size of security sensitive data goes up, although their security values keep unchanged. This interesting phenomena can be explained by Equations 25 and 29, which indicate long execution and communication times lower QSA values. Lastly, Figure 7(c) illustrates that the increasing size of security sensitive data enlarges the job completion time.
  • #54: To validate the results from the synthetic simulations above, we evaluate the TAPADS algorithm in a real system – digital signal processing system (1) Performance patterns plotted in Figure 9 are similar to those reported in Section 6.2 (see Figure 3), thereby verifying that TAPADS can gain performance improvements for a real application.
  • #55: Figure 10 shows that at least 12 nodes are required to make feasible scheduling decisions for the DSP application In summary, the strength of TAPADS can be fully exhibited when the application has a relatively tight deadline. When the deadline is extremely loose, TAPADS degrades to LISTMAX. The implication is that TAPADS can significantly improve security for real-time applications without increasing hardware cost. The results discussed in this subsection can be envisioned as a strong validation of our previous simulations. The salient feature of TAPADS is that it can be successfully deployed to secure real-time parallel applications on clusters.
  • #59: Lead in: Let’s take a close look at a specific application. For example, in a real-time stock quote update and trading system, each incoming request from business partners and each outgoing response from an enterprise’s back-end application have deadlines and security quality requirements, which have to be met by a cluster located between the business partners and enterprise back-end applications.
  • #60: Lead in: Flexible security requirements
  • #62: TAPADS means …?
  • #71: Lead in:
  • #93: 1. Compared with Original, Aswards is more sensitive to data size
  • #97: The same sensitivity
  • #101: Fig. workload monitored from a real-world storage server.
  • #112: Scheuermann, Northwestern University.