Skip to main content

Advertisement

Log in

Security Driven Scheduling Model for Computational Grid Using NSGA-II

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in offering the desired security. Scheduling performance in a Grid is affected by the heterogeneities of security and computational power of resources. Customized Genetic Algorithms have been effectively used for solving complex optimization problems (NP Hard) and various heuristics have been suggested for solving Multi-objective optimization problems. In this paper a security driven, elitist non-dominated sorting genetic algorithm, Optimal Security with Optimal Overhead Scheduling (OSO2S), based on NSGA-II, is proposed. The model considers dual objectives of minimizing the security overhead and maximizing the total security achieved. Simulation results exhibit that the proposed algorithm delivers improved makespan and lesser security overhead in comparison to other such algorithms viz. MinMin, MaxMin, SPMinMin, SPMaxMin and SDSG.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Foster, I., Kesselman, C.: The Grid 2: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2003)

    Google Scholar 

  2. Foster, I., Kesselman, C., Tuecke, S.: The anotomy of the Grid. Intl J. Supercomputer Applications (2001)

  3. Foster, I.: What is the Grid? A Three Point Checklist. http://www-fp.mcs.anl/gov/foster/Articles/WhatIsTheGrid.pdf (2002)

  4. Dail, H., Berman, F., Casanova, H.: A decoupled scheduling approach for Grid application development environments. J. Parallel Distrib. Comput. 63, 505–524 (2003)

    Article  MATH  Google Scholar 

  5. Naedele, M.: Standards for XML and web services security. Computer 36(4), 96–98 (2003)

    Article  Google Scholar 

  6. Prabhakar, S., Ribbens, C., Bora, P.: Multifaceted web services: an approach to secure and scalable Grid scheduling. In: Proceedings of EUROWEB (2002)

  7. Irvine, C.E., Levin, T.E.: Toward a taxonomy and costing method for security services. In: Proceedings of the 15th Computer Security Application Conference, Phoenix, AZ (1999)

  8. Sypropoulou, E., Agar, C., Levin, T., Irvine, C.E.: IPsec modulation for quality of security service. In: Proceedings of the International System Security Engineering Association Conference, Orlando, Florida (2002)

  9. Mello, R.F., Senger, L.J.: On simulated annealing for the scheduling of parallel applications. In: Proceedings of the 20th International Symposium on Computer Architecture and High Performance Computing, SBAC-PAD ’08, pp. 29–36. 29 Oct 2008–1 Nov 2008 (2008)

  10. Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor, MI (1975)

    Google Scholar 

  11. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison Wesley (1989)

  12. Xu, X., Hou, X., Sun, J.: Ant Algorithm based task scheduling in Grid Computing. In: Proceedings of the IEEE Canadian conference on Electrical and Computer Engineering, vol. 2. Montreal, pp. 1107–1110 (2003)

  13. Zhang, L., Chen, Y., Sun, R., Jing, S., Yang, B.: A task schedulingalgorithm based on PSO for Grid computing. Int. J. Comput. Intell. Res. 4 (2008)

  14. Deb, K.: Multi-Objective Optimization Using Evolutionary Algorithms. Wiley, UK (2005)

    Google Scholar 

  15. Srinivas, N., Deb, K.: Multiobjective optimization using non dominated sorting in genetic algorithms. Evol. Comput. 2(3), 221–48 (1994)

    Article  Google Scholar 

  16. Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 3(4), 257–71 (1999)

    Article  Google Scholar 

  17. Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGAII. Kanpur Genetic Algorithms Laboratory (KanGAL), Indian Institute of Technology, KanGAL Report No. 200001 (2001)

  18. Schopf, J.M.: Ten actions when Grid scheduling—the user as a Grid scheduler. In: Nabrzyski, J., Schopf, J., Weglarz, J. (eds.) Grid Resource Management—State of the Art and Future Trends, pp. 15–23. Kluwer Academic Publishers (2004)

  19. Yu, J., Buyya, R.: A taxonomy of workflow management systems for Grid computing. J. Grid Computing 3, 171–200 (2005)

    Article  Google Scholar 

  20. Doulamis, N., Doulamis, A., Varvarigos, E., Varvarigou, T.: Fair scheduling algorithms in Grids. IEEE Trans. Parallel Distrib. Syst. 18(11), 1630–1648 (2007)

    Article  Google Scholar 

  21. Hai, Z., Yuping, W.: Security-driven task scheduling based on evolutionary algorithm. In: Proceedings of the International Conference on Computational Intelligence and Security, Suzhou, China (2008)

  22. Braun, T., Hensgen, D., Freund, R., Siegel, H., Beck, N., Boloni, L., Maheswaran, M., Reuther, A., Robertson, J., Theys, M., Yao, B.: A comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems. J. Parallel Distrib. Comput. 61(6), 810–837 (2001)

    Article  Google Scholar 

  23. Abawajy, J.: An efficient adaptive scheduling policy for high performance computing. Future Gener. Comput. Syst. 25(3), 364–370 (2009)

    Article  Google Scholar 

  24. Kalantari, M., Akbari, M.K.: A parallel solution for scheduling of real time applications on Grid environments. Future Gener. Comput. Syst. 25(7), 704–716 (2009)

    Article  Google Scholar 

  25. Kun-Ming, Y., Cheng-Kwan, C.: An adaptive scheduling algorithm for scheduling tasks in computational Grid. In: Proceedings of the 7th International Conference on Grid and Cooperative Computing, Shenzhen, pp. 185–189 (2008)

  26. Casanova, H., Legrand, A., Zagorodnov, D., Berman, F.: Heuristics for scheduling parameter sweep applications in Grid environments. In: Proceedings of the 9th Heterogeneous Computing Workshop (HCW), pp. 349–363 (2000)

  27. Paranhos, D., Cirne, W., Brasileiro, F.: Trading cycles for information: using replication to schedule bag-of-tasks applications on computational Grids. In: Proceedings of the International Conference on Parallel and Distributed Computing (Euro-Par). Lecture Notes in Computer Science 2790, pp. 169–180 (2003)

  28. Fujimoto, N., Hagihara, K.: Near-optimal dynamic task scheduling of independent coarse-grained tasks onto a computational Grid. In: Proceedings of the 32nd Annual International Conference on Parallel Processing (ICPP-03), pp. 391–398 (2003)

  29. de Lucchese, O.F., Yero, E.J.H., Sambatti, F.S., Henriques, M.A.A.: An adaptive scheduler for Grids. J. Grid Computing 4, 1–17 (2006)

    Article  Google Scholar 

  30. Freund, R., Gherrity, R.M., Ambrosius, S., Campbell, M., Halderman, M., Hensgen, D., Keith, E., Kidd, T., Kussow, M., Lima, J.D., Mirabile, F.L., Moore, L., Rust, B., Siegel, H.J.: Scheduling resources in multi-user, heterogeneous, computing environments with SmartNet. In: Proceedings of the 7th IEEE Heterogeneous Computing Workshop (HCW’98), pp. 184–199

  31. Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman L., Tuecke, S.: Security for Grid services. In: Proceedings of the International Symposium on High Performance Distributed Computing (HPDC-12) (2003)

  32. Xie, T., Qin, X.: Enhancing security of real time applications on Grids through dynamic scheduling. In: Proceedings of the 11th Workshop Job Scheduling Strategies for Parallel Processing JSSPP, pp. 146–158 (2005)

  33. Xie, T., Qin, X.: Security-aware resource allocation for real time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans. Parallel Distrib. Syst. 19(5), 682–697 (2008)

    Article  Google Scholar 

  34. Saleh, A.I., Sarhan, A.M., Hamed, A.M.: A New Grid scheduler with failure recovery and rescheduling mechanisms: discussion and analysis. J. Grid Computing 10, 211–235 (2012)

    Article  Google Scholar 

  35. Song, S., Kwok, Y.K., Hwang, K.: Trusted job scheduling in open computational Grids: security-driven heuristics and a fast genetic algorithms. Proceedings of the International Symposium on Parallel and Distributed Processing (2005)

  36. Kashyap, R., Vidyarthi, D.P.: Security prioritized computational Grid scheduling model: an analysis. IJGHPC 1(3), 73–84 (2009)

    Google Scholar 

  37. Kashyap, R., Vidyarthi, D.P.: A security prioritized scheduling model for computational Grid. In: International Conference at HPC Asia, pp. 416–424 (2009)

  38. Xie, T., Qin, X.: Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity. J. Parallel Distrib. Comput. 67(10), 1067–1081 (2007)

    Article  MATH  Google Scholar 

  39. Xiaoyong, T., Kenli, L., Zeng, Z., Bharadwaj, V.: A novel security-driven scheduling algorithm for precedence constrained tasks in heterogeneous distributed systems. IEEE Trans. Comput. 60(7), 1017–1029 (2011)

    Article  MathSciNet  Google Scholar 

  40. Kashyap, R., Vidyarthi, D.P.: Security-driven scheduling model for computational Grid using genetic algorithm. In: World Congress on Engineering and Computer Science (WCECS 2011) at San Francisco, USA, 19–21 October (2011)

  41. Chao-Chin, W., Ren-Yi, S.: An integrated security aware scheduling strategy for large-scale computational Grids. Future Gener. Comput. Syst. 26(2), 198–206 (2010)

    Article  Google Scholar 

  42. Kyriaki, G., Helen, D., Karatza, J.: Multi-criteria job scheduling in Grid using an accelerated genetic algorithm. J. Grid Computing 10, 311–323 (2012)

    Article  Google Scholar 

  43. Fonseca, C.M., Fleming, P.J.: Genetic algorithms for multiobjective optimization: formulation, discussion and generalization. In: Proceedings of the Fifth Int Conf Genetic Algorithms, pp. 416–423. San Mateo, CA (1993)

  44. Zitzler, E., Laumanns, M., Thiele, L.: SPEA2: improving the strength Pareto evolutionary algorithm. Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems, pp. 95–100. Greece (2001)

  45. Horn, J., Nafpliotis, N., Goldberg, D.E.: A niched Pareto genetic algorithm for multiobjective optimization. In: Proc. 1st IEEE Conf. Evolutionary Computation, vol. 1. Piscataway, NJ, pp. 82–87 (1994)

  46. Salazar, D., Rocco, C.M., Galvan, B.J.: Optimization of constrained multiple-objective reliability problems using evolutionary algorithms. Reliab. Eng. Syst. Saf. 91, 1057–1070 (2006)

    Article  Google Scholar 

  47. Luo, Q., Lin, Y.: Analysis and comparison of several algorithms in SSL/TLS handshake protocol. In: Proceedings of the International Conference on Information Technology and Computer Science (2009)

  48. Stallings, W.: Cryptography and Network Security: Principles and Practices. 4/E. Prentice Hall (2008)

  49. Salter, M., Rescorla, E., Housley, R.: RFC 5430: Suit B Profile for Transport Layer Security. TLS Version 1.2. Available online at: http://tools.ietf.org/html/rfc5430 (accessed on March 2011) (2009)

  50. Dierks, T., Rescorla, E.: RFC 4346: The Transport layer Security (TLS) Protocol. Version 1.1. Available online at: http://tools.ietf.org/pdf/rfc4346.pdf (2006)

  51. Xie, T., Sung, A., Qin, X.: Dynamic task scheduling with security awareness in real time systems. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS’05)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rekha Kashyap.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kashyap, R., Vidyarthi, D.P. Security Driven Scheduling Model for Computational Grid Using NSGA-II. J Grid Computing 11, 721–734 (2013). https://doi.org/10.1007/s10723-013-9251-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-013-9251-x

Keywords

Navigation