4.6 Article

Scheduling algorithms for data- protection based on security-classification constraints to data-dissemination

Journal

PEERJ COMPUTER SCIENCE
Volume 9, Issue -, Pages -

Publisher

PEERJ INC
DOI: 10.7717/peerj-cs.1543

Keywords

Cybersecurity; Data-dissemination; Packet-transmission; Algorithms; Big data; Networks

Ask authors/readers for more resources

This research investigates the creation of a private network model that can decrease the number of data leakages. A two-router private network model is designed and various algorithmic techniques are proposed to solve the scheduling problem. Experimental results show the effectiveness of the proposed algorithms.
Communication networks have played a vital role in changing people's life. However, the rapid advancement in digital technologies has presented many drawbacks of the current inter-networking technology. Data leakages severely threaten information privacy and security and can jeopardize individual and public life. This research investigates the creation of a private network model that can decrease the number of data leakages. A two-router private network model is designed. This model uses two routers to manage the classification level of the transmitting network packets. In addition, various algorithmic techniques are proposed. These techniques solve a scheduling problem. This problem is to schedule packets through routers under a security classification level constraint. This constraint is the non-permission of the transmission of two packets that belongs to the same security classification level. These techniques are the dispatching rule and grouping method. The studied problem is an NP-hard. Eight algorithms are proposed to minimize the total transmission time. A comparison between the proposed algorithms and those in the literature is discussed to show the performance of the proposed scheme through experimentation. Four classes of instances are generated. For these classes, the experimental results show that the best-proposed algorithm is the best-classification groups' algorithm in 89.1% of cases and an average gap of 0.001. In addition, a benchmark of instances is used based on a real dataset. This real dataset shows that the best-proposed algorithm is the best -classification groups' algorithm in 88.6% of cases and an average gap of less than 0.001.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available