Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment

被引:0
|
作者
Mahfooz Alam
Mohammad Shahid
Suhel Mustajab
机构
[1] Aligarh Muslim University,Department of Computer Science
[2] Aligarh Muslim University,Department of Commerce
来源
Cluster Computing | 2024年 / 27卷
关键词
Cloud computing; Multiple workflow allocation; Security; Precedence constraints; Number of task failure; Failure probability;
D O I
暂无
中图分类号
学科分类号
摘要
In the last decade, cloud computing has become an effective and efficient service delivery platform to offer resources, innovation, and economies of scale on telecommunication networks. An allocation scheme without security constraints consideration may assign the high security-sensitive tasks onto the lower trustworthy machines. This would lead the performance deterioration. To address this issue, in this paper, a security-prioritized multiple workflow allocation (SPMWA) model is proposed by integrating the security-prioritized mapping scheme for Infrastructure-as-a-Service cloud computing environment. It is expected that incorporating a security-prioritized allocation scheme under precedence constraints will enhance the performance of workflow processing in risk-prone environments. In this model, more priority is given to tasks with high-security demand to get allocated onto the more trustworthy virtual machines during allocation to minimize the failure probability of the cloud system. The failure probability can be minimized by assigning the tasks on to the trustable virtual machines exhibiting sufficient trust level to minimize the number of task failures. The number of task failure, failure probability, and makespan have been computed for the comparative evaluation of the SPMWA. For performance comparison, the SPMWA model has been compared with state-of-the-art models from the literature having the same environment and objective. The experimental evaluation confirms the superior performance of the proposed model on account of the considered objective among its peers.
引用
收藏
页码:341 / 376
页数:35
相关论文
共 50 条
  • [41] Elements of Application Security In the Cloud Computing Environment
    Mathew, George
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 174 - 179
  • [42] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [43] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [44] Security in Cloud Computing: An Analysis of Key Drivers and Constraints
    Mohammed, Derek
    INFORMATION SECURITY JOURNAL, 2011, 20 (03): : 123 - 127
  • [45] Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing
    Xu, Rongbin
    Wu, Jianguo
    Cheng, Yongliang
    Liu, Zhiqiang
    Lin, Yuanmo
    Xie, Ying
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [46] Fine-grained AR-UCON Model Based on Time Constraints under Cloud Computing Environment
    Sun Yuejiang
    Qi Chunxia
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 769 - 772
  • [47] Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing
    Mangalampalli, Sudheer
    Hashmi, Syed Shakeel
    Gupta, Amit
    Karri, Ganesh Reddy
    Rajkumar, K. Varada
    Chakrabarti, Tulika
    Chakrabarti, Prasun
    Margala, Martin
    IEEE ACCESS, 2024, 12 : 5373 - 5392
  • [48] Adaptive workflow scheduling for dynamic grid and cloud computing environment
    Rahman, Mustafizur
    Hassan, Rafiul
    Ranjan, Rajiv
    Buyya, Rajkumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (13): : 1816 - 1842
  • [49] Fault tolerance for a scientific workflow system in a Cloud computing environment
    Khaldi M.
    Rebbah M.
    Meftah B.
    Smail O.
    International Journal of Computers and Applications, 2020, 42 (07) : 705 - 714
  • [50] Workflow Scheduling in Cloud Computing Environment using Firefly Algorithm
    SundarRajan, R.
    Vasudevan, V.
    Mithya, S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 955 - 960