Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions

被引:8
|
作者
Alam, Mahfooz [1 ]
Shahid, Mohammad [2 ]
Mustajab, Suhel [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh, India
[2] Aligarh Muslim Univ, Dept Commerce, Aligarh, India
关键词
Cloud computing; Secured workflow allocation; Service level agreement; Security overhead model; Quality of service; Security; Privacy; SCHEDULING ALGORITHM; SCIENTIFIC WORKFLOW; INTERMEDIATE DATA; AWARE; OPTIMIZATION; STRATEGY; TASKS; PRIVACY;
D O I
10.1007/s11227-023-05873-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends.
引用
收藏
页码:11491 / 11555
页数:65
相关论文
共 47 条
  • [31] A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
    Zafar, Faheem
    Khan, Abid
    Malik, Saif Ur Rehman
    Ahmed, Mansoor
    Anjum, Adeel
    Khan, Majid Iqbal
    Javed, Nadeem
    Alam, Masoom
    Jamil, Fuzel
    COMPUTERS & SECURITY, 2017, 65 : 29 - 49
  • [32] Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions
    Gill, Sukhpal Singh
    Shaghaghi, Arash
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2020, 32 (03) : 15 - 22
  • [33] A comprehensive survey on container resource allocation approaches in cloud computing: State-of-the-art and research challenges
    Netaji, Vhatkar Kapil
    Bhole, G. P.
    WEB INTELLIGENCE, 2021, 19 (04) : 295 - 316
  • [34] IDPS based Framework for Security in Green Cloud Computing and Comprehensive Review on Existing Frameworks and Security Issues
    Gill, Komal Singh
    Sharma, Anju
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [35] Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions
    Abd Ali, Shams Mhmood
    Yusoff, Mohd Najwadi
    Hasan, Hasan Falah
    FUTURE INTERNET, 2023, 15 (01):
  • [36] A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges
    Shirvani, Mirsaeid Hosseini
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (07) : 9384 - 9437
  • [37] A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges
    Mirsaeid Hosseini Shirvani
    The Journal of Supercomputing, 2024, 80 : 9384 - 9437
  • [38] Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions
    Mohammad Masdari
    Sasan Gharehpasha
    Mostafa Ghobaei-Arani
    Vafa Ghasemi
    Cluster Computing, 2020, 23 : 2533 - 2563
  • [39] Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions
    Latif, Shahid
    Idrees, Zeba
    Huma, Zil E.
    Ahmad, Jawad
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (11):
  • [40] A comprehensive survey on nature-inspired algorithms and their applications in edge computing: Challenges and future directions
    Adhikari, Mainak
    Srirama, Satish Narayana
    Amgoth, Tarachand
    SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (04) : 1004 - 1034