{"title":"Security-Aware Orchestration of Linear Workflows on Distributed Resources","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/cits55221.2022.9832986","DOIUrl":null,"url":null,"abstract":"In hybrid and multi-tier distributed architectures, where data may have different security requirements and typically require processing in a pipeline fashion, resource allocation has become particularly challenging. In such environments, it is crucial to use security-aware and effective resource allocation techniques, in order to ensure the secure processing of the workload and achieve a satisfactory Quality of Service (QoS). Towards this direction, in this paper we examine the performance of security-aware resource allocation strategies for linear workflow (LW) jobs in an environment of distributed resources. Only a subset of the resources is considered secure and thus suitable for processing high risk LW jobs. Low risk LW jobs may be executed on either secure or non-secure resources. Two commonly used routing techniques are adapted in order to incorporate security awareness. Their performance is evaluated through simulation. Several scenarios are investigated, with different subset sizes of the secure resources, as well as different probabilities for a LW job to be considered high risk. The simulation results provide useful insights into how the percentage of high risk LW jobs affects the performance in each of the examined cases of secure resources.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits55221.2022.9832986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In hybrid and multi-tier distributed architectures, where data may have different security requirements and typically require processing in a pipeline fashion, resource allocation has become particularly challenging. In such environments, it is crucial to use security-aware and effective resource allocation techniques, in order to ensure the secure processing of the workload and achieve a satisfactory Quality of Service (QoS). Towards this direction, in this paper we examine the performance of security-aware resource allocation strategies for linear workflow (LW) jobs in an environment of distributed resources. Only a subset of the resources is considered secure and thus suitable for processing high risk LW jobs. Low risk LW jobs may be executed on either secure or non-secure resources. Two commonly used routing techniques are adapted in order to incorporate security awareness. Their performance is evaluated through simulation. Several scenarios are investigated, with different subset sizes of the secure resources, as well as different probabilities for a LW job to be considered high risk. The simulation results provide useful insights into how the percentage of high risk LW jobs affects the performance in each of the examined cases of secure resources.