期刊文献+

Security-Aware Periodic-Write Scheduling for Mission-Critical Embedded Storage System

Security-Aware Periodic-Write Scheduling for Mission-Critical Embedded Storage System
下载PDF
导出
摘要 High quality of security and guaranteed real-time requirements are two key goals of mission- critical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security performance of disk requests. A security-aware periodic-write (SAPW) scheduling algorithm is proposed to judiciously select appropriate security level for each disk request to maximize security value of N periodic disk users, while without sacrificing timing constraint of each user. Simulation results show the significant effectiveness of SAPW algorithm, and the average security improvement is up to 223.6% over other three algorithms. High quality of security and guaranteed real-time requirements are two key goals of mission- critical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security performance of disk requests. A security-aware periodic-write (SAPW) scheduling algorithm is proposed to judiciously select appropriate security level for each disk request to maximize security value of N periodic disk users, while without sacrificing timing constraint of each user. Simulation results show the significant effectiveness of SAPW algorithm, and the average security improvement is up to 223.6% over other three algorithms.
出处 《Journal of Electronic Science and Technology of China》 2009年第2期119-124,共6页 中国电子科技(英文版)
基金 supported by the National 863 Program under Grant No.2006AA01Z173 and 2007AA01Z131
关键词 Index Terms-Disk scheduling embedded storagesystem real-time security-aware. Index Terms-Disk scheduling, embedded storagesystem, real-time, security-aware.
  • 相关文献

参考文献23

  • 1R. West and G Parmer, "Revisiting the design of systems for high-confidence embedded and cyber-physical computing environment," presented at the NSF High Confidence Cyber-Physical Systems Workshop, Arlington, VA, July 2007. 被引量:1
  • 2S. Ravi, A. Raghunathan, E Kocher, and S. Hattangady, “Security in embedded systems: design challenges”, ACM Transactions on Embedded Computing Systems (Special Issue on Security), vol. 3, no. 4, pp. 461-491, Aug. 2004. 被引量:1
  • 3D. Avitzour, "Novel scene calibration procedure for video surveillance systems," IEEE Trans. Aerospace and Electronic Systems, vol. 40, no. 3, pp. 1105-1110, 2004. 被引量:1
  • 4L. Luo, Q. Cao, c. Huang, T. Abdelzaher, J. A. Stankovic, and M. Ward, “EnviroMic: towards cooperative storage and retrieval in audio sensor networks,” in Proe. ICDCS'07, Toronto, Canada, Jun. 2007, p. 34. 被引量:1
  • 5G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy,“Capsule: an energy-optimized object storage system for memory-constrained sensor devices,” in Proc. ACM SenSys'06, Boulder, Colorado, USA, Nov. 2006, pp. 195-208. 被引量:1
  • 6T. Sumner and M. Marlino, “Digital libraries and educational practice: a case for new models,” in Proc. ACM/IEEE Conf. Digital Libraries, Tucson, Arizona, USA, June 2004, pp. 170-178. 被引量:1
  • 7M. Nijim, X. Qin, and T. Xie, "Modeling and improving security of a local disk system for write-intensive workloads," ACM Trans. on Storage, vol. 2, no. 4, pp. 400-423, Nov. 2006. 被引量:1
  • 8B. Worthington, G Ganger, and Y. Part, "Scheduling algorithms for modem disk drives," in Proc. of the ACM Sigmetrics Conference, Santa Clara, California, USA, May 1994, pp. 241-251. 被引量:1
  • 9R. Reist and S. Daniel, "A continuum of disk scheduling algorithms", ACM Trans. on Computer System, vol. 5, no. 1, pp. 77-92, Feb. 1987. 被引量:1
  • 10M. Seltzer, E Chen, and J. Ousterhout, "Disk scheduling revisited," in Proc. USENIX Technical Conf., Washington D.C., USA, 1990, pp. 313-323. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部