TY - JOUR
T1 - Incorporating security constraints into mixed-criticality real-Time scheduling
AU - Baek, Hyeongboo
AU - Lee, Jinkyu
N1 - Publisher Copyright:
Copyright © 2017 The Institute of Electronics, Information and Communication Engineers.
PY - 2017/9
Y1 - 2017/9
N2 - SUMMARY While conventional studies on real-Time systems have mostly considered the real-Time constraint of real-Time systems only, recent research initiatives are trying to incorporate a security constraint into realtime scheduling due to the recognition that the violation of either of two constrains can cause catastrophic losses for humans, the system, and even environment. The focus of most studies, however, is the single-criticality systems, while the security of mixed-criticality systems has received scant attention, even though security is also a critical issue for the design of mixed-criticality systems. In this paper, we address the problem of the information leakage that arises from the shared resources that are used by tasks with different security-levels of mixed-criticality systems. We define a new concept of the security constraint employing a pre-flushing mechanism to cleanse the state of shared resources whenever there is a possibility of the information leakage regarding it. Then, we propose a new non-preemptive real-Time scheduling algorithm and a schedulability analysis, which incorporate the security constraint for mixed-criticality systems. Our evaluation demonstrated that a large number of real-Time tasks can be scheduled without a significant performance loss under a new security constraint.
AB - SUMMARY While conventional studies on real-Time systems have mostly considered the real-Time constraint of real-Time systems only, recent research initiatives are trying to incorporate a security constraint into realtime scheduling due to the recognition that the violation of either of two constrains can cause catastrophic losses for humans, the system, and even environment. The focus of most studies, however, is the single-criticality systems, while the security of mixed-criticality systems has received scant attention, even though security is also a critical issue for the design of mixed-criticality systems. In this paper, we address the problem of the information leakage that arises from the shared resources that are used by tasks with different security-levels of mixed-criticality systems. We define a new concept of the security constraint employing a pre-flushing mechanism to cleanse the state of shared resources whenever there is a possibility of the information leakage regarding it. Then, we propose a new non-preemptive real-Time scheduling algorithm and a schedulability analysis, which incorporate the security constraint for mixed-criticality systems. Our evaluation demonstrated that a large number of real-Time tasks can be scheduled without a significant performance loss under a new security constraint.
KW - Mixed-criticality system
KW - Real-Time scheduling
KW - Schedulability analysis
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85029451892&partnerID=8YFLogxK
U2 - 10.1587/transinf.2016EDP7447
DO - 10.1587/transinf.2016EDP7447
M3 - Article
AN - SCOPUS:85029451892
SN - 0916-8532
VL - E100D
SP - 2068
EP - 2080
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 9
ER -