Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment

被引:0
|
作者
Mahfooz Alam
Mohammad Shahid
Suhel Mustajab
机构
[1] Aligarh Muslim University,Department of Computer Science
[2] Aligarh Muslim University,Department of Commerce
来源
Cluster Computing | 2024年 / 27卷
关键词
Cloud computing; Multiple workflow allocation; Security; Precedence constraints; Number of task failure; Failure probability;
D O I
暂无
中图分类号
学科分类号
摘要
In the last decade, cloud computing has become an effective and efficient service delivery platform to offer resources, innovation, and economies of scale on telecommunication networks. An allocation scheme without security constraints consideration may assign the high security-sensitive tasks onto the lower trustworthy machines. This would lead the performance deterioration. To address this issue, in this paper, a security-prioritized multiple workflow allocation (SPMWA) model is proposed by integrating the security-prioritized mapping scheme for Infrastructure-as-a-Service cloud computing environment. It is expected that incorporating a security-prioritized allocation scheme under precedence constraints will enhance the performance of workflow processing in risk-prone environments. In this model, more priority is given to tasks with high-security demand to get allocated onto the more trustworthy virtual machines during allocation to minimize the failure probability of the cloud system. The failure probability can be minimized by assigning the tasks on to the trustable virtual machines exhibiting sufficient trust level to minimize the number of task failures. The number of task failure, failure probability, and makespan have been computed for the comparative evaluation of the SPMWA. For performance comparison, the SPMWA model has been compared with state-of-the-art models from the literature having the same environment and objective. The experimental evaluation confirms the superior performance of the proposed model on account of the considered objective among its peers.
引用
收藏
页码:341 / 376
页数:35
相关论文
共 50 条
  • [11] Recent Trends of Workflow Scheduling Algorithm in Cloud Computing Under Qos Constraints
    Niharika
    Kaushik, Baij Nath
    Gondhi, Naveen Kumar
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 396 - 401
  • [12] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [13] Optimizing Workflow Offloading and Migration under Timed Constraints in Fog and Cloud Computing
    Boubaker, Nour El Houda
    Zarour, Karim
    Guermouche, Nawal
    Benmerzoug, Djamel
    JOURNAL OF GRID COMPUTING, 2025, 23 (01)
  • [14] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [15] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [16] Unrelated parallel machines with precedence constraints: application to cloud computing
    Abdel-Jabbar, Mohammed-Albarra Hassan
    Kacem, Imed
    Martin, Sebastien
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 438 - 442
  • [17] Computer Network Security Research under Cloud Computing Environment
    Ren, Qiong
    Tao, Jun
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 890 - 893
  • [18] Prioritized organ allocation rules under compatibility constraints
    Li, Mengling
    Riyanto, Yohanes E.
    Xu, Menghan
    GAMES AND ECONOMIC BEHAVIOR, 2023, 141 : 403 - 427
  • [19] Model of assessment of risks of information security in the environment of cloud computing
    Djuraev, R. X.
    Umirzakov, B. M.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT), 2016,
  • [20] Versatile provisioning and workflow scheduling in WaaS under cost and deadline constraints for cloud computing
    Partheeban, Pon.
    Kavitha, V.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (01):