Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective

被引:4
|
作者
Khan, Md Muhidul I. [1 ]
Nencioni, Gianfranco [1 ]
机构
[1] Univ Stavanger, Dept Elect Engn & Comp Sci, N-4021 Stavanger, Norway
关键词
Resource allocation; dependability; security; computing; networking; CYBER-SECURITY; 5G; DELAY;
D O I
10.1109/ACCESS.2023.3306534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is affected by this increased complexity. Resource allocation strategies aim to effectively maximize performance, system utilization, and profit by considering virtualization technologies, heterogeneous resources, context awareness, and other features. In such complex scenario, security and dependability are vital concerns that need to be considered in future computing and networking systems in order to provide the future advanced services, such as mission-critical applications. This paper provides a comprehensive survey of existing literature that considers security and dependability for resource allocation in computing and networking systems. The current research works are categorized by considering the allocated type of resources for different technologies, scenarios, issues, attributes, and solutions. The paper presents the research works on resource allocation that includes security and dependability, both singularly and jointly. The future research directions on resource allocation are also discussed. The paper shows how there are only a few works that, even singularly, consider security and dependability in resource allocation in the future computing and networking systems and highlights the importance of jointly considering security and dependability and the need for intelligent, adaptive and robust solutions. This paper aims to help the researchers effectively consider security and dependability in future networking and computing systems.
引用
收藏
页码:89433 / 89454
页数:22
相关论文
共 50 条
  • [1] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [2] Security and Dependability of Embedded Systems: A Computer Architects' Perspective
    Henkel, Joerg
    Narayanan, Vijaykrishnan
    Parameswaran, Sri
    Ragel, Roshan
    22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 30 - 32
  • [3] Joint Resource Allocation for Software Defined Networking, Caching and Computing
    Chen, Qingxia
    Yu, F. Richard
    Huang, Tao
    Xie, Renchao
    Liu, Jiang
    Liu, Yunjie
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [4] On Dependability of Computing Systems
    徐拾义
    JournalofComputerScienceandTechnology, 1999, (02) : 116 - 128
  • [5] Computing systems dependability
    Knight, JC
    25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 742 - 743
  • [6] On Dependability of Computing Systems
    Xu S.
    Journal of Computer Science and Technology, 1999, 14 (2) : 116 - 128
  • [7] Joint Resource Allocation for Software-Defined Networking, Caching, and Computing
    Chen, Qingxia
    Yu, F. Richard
    Huang, Tao
    Xie, Renchao
    Liu, Jiang
    Liu, Yunjie
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (01) : 274 - 287
  • [8] Software Defined Networking, Caching and Computing Resource Allocation with Imperfect NSI
    Chen, Qingxia
    Xie, Renchao
    Huang, Tao
    Liu, Jiang
    Liu, Yunjie
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [9] Dependability and security will change embedded computing
    Serpanos, Dimitrios
    Henkel, Joerg
    COMPUTER, 2008, 41 (01) : 103 - 105
  • [10] Adaptable Resource Allocation in Cloud Computing Systems
    Zomaya, Albert Y.
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : XIII - XIII