[Back] [PDF]

Interplay of Security and Reliability using Non-uniform Checkpoints

Kiranmai Bellam, Xiao Qin†*, Ziliang Zong, Xiaojun Ruan, and Mais Nijim

Department of Computer Science and Software Engineering

Auburn University, Auburn, AL 36849

{kbellam, xqin, zzong, xruan}@eng.auburn.edu

Department of Computer Science

University of Southern Mississippi, Hattiesburg, MS 39406

mnijim@usm.edu

 Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way to integrate both by considering confidentiality and integrity services for security and non-uniform checkpoint strategy for reliability. The slack exploitation interacts in subtle ways for security in regards to the placement of checkpoint. The checkpoints are placed in to the task at low frequency in the beginning because the slack available can accommodate a large amount of work at risk and the frequency is increased there after considering the slack available. The security is applied to the data in two ways. First method introduces the security for the entire data at once whereas in the second method the data is divided into n uneven sections and each section is separately secured .That is at the start of the task basic security services are considered depending on the slack available. The security is increased gradually for the rest of the task but if there exist a fault, then at that point the security is maintained at the steady rate because of the limited slack. Compared to the first method the second method can provide up to a 32.3 percent higher security. While compared to the traditional checkpoint strategy, the non-uniform checkpointing makes more efficient use of slack while increasing the overall security levels by 34.4 percent for the second method.   

 

This paper appeared in the Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN), Honolulu, Hawaii, Aug. 2007.

 

* Corresponding author. http://www.eng.auburn.edu/~xqin

 

Acknowledgment: The work reported in this paper was supported by the US National Science Foundation under Grant No. CCF-0702781, Auburn University under a startup grant, New Mexico Institute of Mining and Technology under Grant No. 103295, the Intel Corporation under Grant No. 2005-04-070, and the Altera Corporation under an equipment grant.