Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing

被引:5
|
作者
Yang, Yuli [1 ,2 ]
Peng, Xinguang [1 ]
Wan, Xiaohong [2 ]
机构
[1] Taiyuan Univ Technol, Coll Comp Sci & Technol, Taiyuan 030024, Peoples R China
[2] Yuncheng Univ, Dept Publ Comp Teaching, Yuncheng 044000, Peoples R China
关键词
Cloud computing; Bag-of-Task application; cloud model; data replica selection; security utility value;
D O I
10.3233/JHS-150527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a typical distributed network computing environment, cloud computing has been growing tremendously recently. Although it could provide a convenient environment for the execution of data-intensive application, the primary challenge for it is how to choose the security date replica for data-intensive application from different storage resources. Considering that the security has the characteristic of fuzziness and randomness, it is quantified using the cloud model in this paper. On this basis, taking the constraints of time, cost, and security into account, a scheduling algorithm of data-intensive application based on weighted set covering problem (WSCP) is proposed. Simulation results demonstrate that the security-aware data replica selection strategy performs better than traditional selection strategy on time, cost, security utility value and load balancing deviation (LBD).
引用
收藏
页码:299 / 311
页数:13
相关论文
共 50 条
  • [1] A security-aware data replica placement strategy based on fuzzy evaluation in the cloud
    Wu Xiuguo
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (01) : 243 - 255
  • [2] Bag-of-Tasks Intelligent Scheduling Agent (BISA) in Cloud Computing
    Darius, Preethi S. H.
    Kanaga, E. Grace Mary
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 239 - 246
  • [3] QoS preference-aware replica selection strategy in cloud computing
    Xiong, Run-Qun
    Luo, Jun-Zhou
    Song, Ai-Bo
    Jin, Jia-Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2011, 32 (07): : 93 - 102
  • [4] A framework for cloud-aware development of bag-of-tasks scientific applications
    De Benedictis, Alessandra
    Rak, Massimiliano
    Turtur, Mauro
    Villano, Umberto
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (02) : 130 - 140
  • [5] Security-aware intermediate data placement strategy in scientific cloud workflows
    Liu, Wei
    Peng, Su
    Du, Wei
    Wang, Wei
    Zeng, Guo Sun
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) : 423 - 447
  • [6] Security-aware intermediate data placement strategy in scientific cloud workflows
    Wei Liu
    Su Peng
    Wei Du
    Wei Wang
    Guo Sun Zeng
    [J]. Knowledge and Information Systems, 2014, 41 : 423 - 447
  • [7] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    [J]. 21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [8] Enhanced security-aware technique and ontology data access control in cloud computing
    Kiran, Gangasandra Mahadevaiah
    Nalini, Narasimhaiah
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [9] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [10] Deadline-Constrained Algorithms for Scheduling of Bag-of-Tasks and Workflows in Cloud Computing Environments
    Maurya, Ashish Kumar
    Tripathi, Anil Kumar
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2018), 2018, : 6 - 10