Security-Aware Orchestration of Linear Workflows on Distributed Resources

Georgios L. Stavrinides, H. Karatza
{"title":"Security-Aware Orchestration of Linear Workflows on Distributed Resources","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/cits55221.2022.9832986","DOIUrl":null,"url":null,"abstract":"In hybrid and multi-tier distributed architectures, where data may have different security requirements and typically require processing in a pipeline fashion, resource allocation has become particularly challenging. In such environments, it is crucial to use security-aware and effective resource allocation techniques, in order to ensure the secure processing of the workload and achieve a satisfactory Quality of Service (QoS). Towards this direction, in this paper we examine the performance of security-aware resource allocation strategies for linear workflow (LW) jobs in an environment of distributed resources. Only a subset of the resources is considered secure and thus suitable for processing high risk LW jobs. Low risk LW jobs may be executed on either secure or non-secure resources. Two commonly used routing techniques are adapted in order to incorporate security awareness. Their performance is evaluated through simulation. Several scenarios are investigated, with different subset sizes of the secure resources, as well as different probabilities for a LW job to be considered high risk. The simulation results provide useful insights into how the percentage of high risk LW jobs affects the performance in each of the examined cases of secure resources.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits55221.2022.9832986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In hybrid and multi-tier distributed architectures, where data may have different security requirements and typically require processing in a pipeline fashion, resource allocation has become particularly challenging. In such environments, it is crucial to use security-aware and effective resource allocation techniques, in order to ensure the secure processing of the workload and achieve a satisfactory Quality of Service (QoS). Towards this direction, in this paper we examine the performance of security-aware resource allocation strategies for linear workflow (LW) jobs in an environment of distributed resources. Only a subset of the resources is considered secure and thus suitable for processing high risk LW jobs. Low risk LW jobs may be executed on either secure or non-secure resources. Two commonly used routing techniques are adapted in order to incorporate security awareness. Their performance is evaluated through simulation. Several scenarios are investigated, with different subset sizes of the secure resources, as well as different probabilities for a LW job to be considered high risk. The simulation results provide useful insights into how the percentage of high risk LW jobs affects the performance in each of the examined cases of secure resources.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
分布式资源上线性工作流的安全感知编排
在混合和多层分布式体系结构中,数据可能具有不同的安全需求,并且通常需要以管道方式进行处理,因此资源分配变得特别具有挑战性。在这种环境中,为了确保工作负载的安全处理并实现令人满意的服务质量(QoS),使用安全感知和有效的资源分配技术至关重要。在这个方向上,本文研究了分布式资源环境下线性工作流(LW)作业的安全感知资源分配策略的性能。只有一部分资源被认为是安全的,因此适合处理高风险的LW作业。低风险的LW作业可以在安全或非安全资源上执行。本文采用了两种常用的路由技术来整合安全意识。通过仿真对其性能进行了评价。本文研究了几种场景,其中安全资源的子集大小不同,LW作业被视为高风险的概率也不同。模拟结果提供了有用的见解,可以了解高风险LW作业的百分比如何影响所检查的每个安全资源案例中的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tracking container network connections in a Digital Data Marketplace with P4 Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing A CNN based localization and activity recognition algorithm using multi-receiver CSI measurements and decision fusion Learning-Automata-Based Energy Efficient Model for Device Lifetime Enhancement in LoRaWAN Networks A Deep Learning Based Bluetooth Indoor Localization Algorithm by RSSI and AOA Feature Fusion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1