Netinfo Security ›› 2023, Vol. 23 ›› Issue (3): 45-55.doi: 10.3969/j.issn.1671-1122.2023.03.005

Previous Articles     Next Articles

Secure Scheduling Algorithm for Heterogeneous Executors for Mimic Clouds

WANG Ruimin1, XING Yongxu1, SONG Wei2, ZHANG Jianhui3,4()   

  1. 1. School of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou 450001, China
    2. Henan Academy of Big Data of Zhengzhou University, Zhengzhou 450052, China
    3. School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou 450002, China
    4. Songshan Laboratory, Zhengzhou 450001, China
  • Received:2022-11-27 Online:2023-03-10 Published:2023-03-14
  • Contact: ZHANG Jianhui E-mail:ndsczjh@163.com

Abstract:

As cloud services become more widely used, attacks based on unknown vulnerabilities or backdoors become their most significant security threat. Mimic cloud services based on mimic defense are established to secure them by reducing the probability of continuous exposure to vulnerabilities. However, the mimic scheduling algorithm proposed by current research lacks the consideration of executors’ own security and cannot take into account dynamicity and heterogeneity. This paper proposed a priority scheduling algorithm based on heterogeneity and security degree by introducing the definition of heterogeneity and security degree of execution pool, and introduced a dynamic scheduling strategy combining time slices to solve the above problems. The experimental results show that the proposed algorithm has better dynamicity and can obtain better scheduling effect, achieving the balance between dynamicity, heterogeneity and security, and also has the advantages of low time complexity.

Key words: mimic defense, mimic cloud, heterogeneity, security, priority scheduling

CLC Number: