Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment

被引:0
|
作者
Mahfooz Alam
Mohammad Shahid
Suhel Mustajab
机构
[1] Aligarh Muslim University,Department of Computer Science
[2] Aligarh Muslim University,Department of Commerce
来源
Cluster Computing | 2024年 / 27卷
关键词
Cloud computing; Multiple workflow allocation; Security; Precedence constraints; Number of task failure; Failure probability;
D O I
暂无
中图分类号
学科分类号
摘要
In the last decade, cloud computing has become an effective and efficient service delivery platform to offer resources, innovation, and economies of scale on telecommunication networks. An allocation scheme without security constraints consideration may assign the high security-sensitive tasks onto the lower trustworthy machines. This would lead the performance deterioration. To address this issue, in this paper, a security-prioritized multiple workflow allocation (SPMWA) model is proposed by integrating the security-prioritized mapping scheme for Infrastructure-as-a-Service cloud computing environment. It is expected that incorporating a security-prioritized allocation scheme under precedence constraints will enhance the performance of workflow processing in risk-prone environments. In this model, more priority is given to tasks with high-security demand to get allocated onto the more trustworthy virtual machines during allocation to minimize the failure probability of the cloud system. The failure probability can be minimized by assigning the tasks on to the trustable virtual machines exhibiting sufficient trust level to minimize the number of task failures. The number of task failure, failure probability, and makespan have been computed for the comparative evaluation of the SPMWA. For performance comparison, the SPMWA model has been compared with state-of-the-art models from the literature having the same environment and objective. The experimental evaluation confirms the superior performance of the proposed model on account of the considered objective among its peers.
引用
收藏
页码:341 / 376
页数:35
相关论文
共 50 条
  • [31] Virtual Machine Allocation in Cloud Computing Environment
    Ezugwu, Absalom E.
    Buhari, Seyed M.
    Junaidu, Sahalu B.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (02) : 47 - 60
  • [32] Resource Allocation Strategy for Cloud Computing Environment
    Awasthi, Chetan
    Kanungo, Priyesh
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [33] Online Multiple Workflow Scheduling under Privacy and Deadline in Hybrid Cloud Environment
    Sharif, Shaghayegh
    Taheri, Javid
    Zomaya, Albert Y.
    Nepal, Surya
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 455 - 462
  • [34] An architecture for workflow scheduling under resource allocation constraints
    Senkul, P
    Toroslu, IH
    INFORMATION SYSTEMS, 2005, 30 (05) : 399 - 422
  • [35] Research on Applied Technology for Computer Network Security Under Cloud Computing Environment
    Xu, Haili
    4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015), 2015, : 529 - 532
  • [36] CRITICAL REVIEW OF SECURITY ISSUES OF INTERNET OF THINGS UNDER CLOUD COMPUTING ENVIRONMENT
    Kaur, Mandeep
    Kakkar, Sanchi
    Singh, V. P.
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2019, 18 (08): : 627 - 636
  • [37] Research on the resource monitoring model under cloud computing environment
    College of Software, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    不详
    Lect. Notes Comput. Sci., M4D (111-118):
  • [38] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [39] Research on the Resource Monitoring Model Under Cloud Computing Environment
    Ge, Junwei
    Zhang, Bo
    Fang, Yiqiu
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 111 - +
  • [40] Enhancement for Data Security in Cloud Computing Environment
    Gawali, M. B.
    Wagh, R. B.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,