Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment

被引:0
|
作者
Mahfooz Alam
Mohammad Shahid
Suhel Mustajab
机构
[1] Aligarh Muslim University,Department of Computer Science
[2] Aligarh Muslim University,Department of Commerce
来源
Cluster Computing | 2024年 / 27卷
关键词
Cloud computing; Multiple workflow allocation; Security; Precedence constraints; Number of task failure; Failure probability;
D O I
暂无
中图分类号
学科分类号
摘要
In the last decade, cloud computing has become an effective and efficient service delivery platform to offer resources, innovation, and economies of scale on telecommunication networks. An allocation scheme without security constraints consideration may assign the high security-sensitive tasks onto the lower trustworthy machines. This would lead the performance deterioration. To address this issue, in this paper, a security-prioritized multiple workflow allocation (SPMWA) model is proposed by integrating the security-prioritized mapping scheme for Infrastructure-as-a-Service cloud computing environment. It is expected that incorporating a security-prioritized allocation scheme under precedence constraints will enhance the performance of workflow processing in risk-prone environments. In this model, more priority is given to tasks with high-security demand to get allocated onto the more trustworthy virtual machines during allocation to minimize the failure probability of the cloud system. The failure probability can be minimized by assigning the tasks on to the trustable virtual machines exhibiting sufficient trust level to minimize the number of task failures. The number of task failure, failure probability, and makespan have been computed for the comparative evaluation of the SPMWA. For performance comparison, the SPMWA model has been compared with state-of-the-art models from the literature having the same environment and objective. The experimental evaluation confirms the superior performance of the proposed model on account of the considered objective among its peers.
引用
收藏
页码:341 / 376
页数:35
相关论文
共 50 条
  • [1] Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
    Alam, Mahfooz
    Shahid, Mohammad
    Mustajab, Suhel
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 341 - 376
  • [2] Levelized Multiple Workflow Allocation Strategy Under Precedence Constraints With Task Merging in IaaS Cloud Environment
    Ahmad, Faisal
    Shahid, Mohammad
    Alam, Mahfooz
    Ashraf, Zubair
    Sajid, Mohammad
    Kotecha, Ketan
    Dhiman, Gaurav
    IEEE ACCESS, 2022, 10 : 92809 - 92827
  • [3] Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
    Mahfooz Alam
    Mohammad Shahid
    Suhel Mustajab
    The Journal of Supercomputing, 2024, 80 : 11491 - 11555
  • [4] Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
    Alam, Mahfooz
    Shahid, Mohammad
    Mustajab, Suhel
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (08): : 11491 - 11555
  • [5] Study on dynamic resource allocation optimization model under cloud computing environment
    You, Xiao-Ming
    Liu, Kai
    Liu, Sheng
    Wang, Yu-Ming
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2014, 34 : 234 - 238
  • [6] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [7] A Heuristic for Security Prioritized Resource Provisioning in Cloud Computing
    Jha, Devki Nandan
    Vidyarthi, Deo Prakash
    2015 IEEE UP SECTION CONFERENCE ON ELECTRICAL COMPUTER AND ELECTRONICS (UPCON), 2015,
  • [8] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [9] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [10] Adaptive Security Management Model in the Cloud Computing Environment
    Jung, Youngmin
    Chung, Mokdong
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1664 - 1669