Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Developing security-aware resource management strategies for workflows

Tools
- Tools
+ Tools

He, Ligang, Chaudhary, Nadeem and Jarvis, Stephen A. (2014) Developing security-aware resource management strategies for workflows. Future Generation Computer Systems, 38 (9). pp. 61-68. doi:10.1016/j.future.2013.09.030

[img]
Preview
PDF
WRAP_He_0584410-cs-240116-fgcs-si-pervasivecomputing.pdf - Accepted Version - Requires a PDF viewer.

Download (486Kb) | Preview
Official URL: http://dx.doi.org/10.1016/j.future.2013.09.030

Request Changes to record.

Abstract

This paper investigates the resource allocation problem for a type of workflow in pervasive computing. These workflows are abstracted from the enterprise-level applications in the business or commerce area. The activities in these workflows require not only computing resources, but also human resources. Human involvement introduces additional security concerns. When we plan/allocate resource capacities, we often assume that when a task is allocated to a resource, the resource will accept the task and start the execution once the processor becomes available. However, the security policies impose further constraints on task executions, and therefore may affect both application- and system-oriented performance. Authorization is an important aspect in security. This paper investigates the issue of allocating resources for running workflows under the role-based authorization control, which is one of the most popular authorization mechanisms. By taking into account the authorization constraints, the resource allocation strategies are developed in this paper for both human resources and computing resources. In the allocation strategy for human resources, the optimization equation is constructed subject to the constraint of the budget available to hire human resources. Then the optimization equation is solved to obtain the number of human resources allocated to each authorization role. The allocation strategy for computing resources calculates not only the number of computing resources, but also the proportion of processing capacity in each resource allocated to serve the tasks assuming each role. The simulation experiments have been conducted to verify the effectiveness of the developed allocation strategies. The experimental results show that the allocation strategy developed in this paper outperforms the traditional allocation strategies, which do not consider authorization constraints, in terms of both average response time and resource utilization.

Item Type: Journal Article
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Divisions: Faculty of Science > Computer Science
Library of Congress Subject Headings (LCSH): Ubiquitous computing
Journal or Publication Title: Future Generation Computer Systems
Publisher: Elsevier
ISSN: 0167-739X
Official Date: September 2014
Dates:
DateEvent
September 2014Published
16 October 2013Available
14 September 2013Accepted
4 December 2012Submitted
Volume: 38
Number: 9
Number of Pages: 8
Page Range: pp. 61-68
DOI: 10.1016/j.future.2013.09.030
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
Funder: Leverhulme Trust (LT)
Grant number: RPG-101 (LT)
Embodied As: 1

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us