Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions

被引:8
作者
Alam, Mahfooz [1 ]
Shahid, Mohammad [2 ]
Mustajab, Suhel [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh, India
[2] Aligarh Muslim Univ, Dept Commerce, Aligarh, India
关键词
Cloud computing; Secured workflow allocation; Service level agreement; Security overhead model; Quality of service; Security; Privacy; SCHEDULING ALGORITHM; SCIENTIFIC WORKFLOW; INTERMEDIATE DATA; AWARE; OPTIMIZATION; STRATEGY; TASKS; PRIVACY;
D O I
10.1007/s11227-023-05873-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends.
引用
收藏
页码:11491 / 11555
页数:65
相关论文
共 47 条
  • [41] A Comprehensive Survey of Aerial Mesh Networks (AMN): Characteristics, Application, Open Issues, Challenges, and Research Directions
    Gupta, Manali
    Jain, Khushboo
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (01) : 333 - 368
  • [42] A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions
    Ahad, Abdul
    Ali, Zahra
    Mateen, Abdul
    Tahir, Mohammad
    Hannan, Abdul
    Garcia, Nuno M.
    Pires, Ivan Miguel
    ARRAY, 2023, 18
  • [43] User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions
    Wazid, Mohammad
    Das, Ashok Kumar
    Lee, Jong-Hyouk
    PERVASIVE AND MOBILE COMPUTING, 2019, 54 : 71 - 85
  • [44] Security and Privacy of Cloud Data Auditing Protocols: A Review, State-of-the-art, Open Issues, and Future Research Directions
    Farooq, Muhammad
    Idrus, Mohd Rushdi
    Ahmad, Adi Affandi
    Shabli, Ahmad Hanis Mohd
    Ghazali, Osman
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) : 416 - 431
  • [45] A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions
    Adil, Muhammad
    Jan, Mian Ahmad
    Liu, Yongxin
    Abulkasim, Hussein
    Farouk, Ahmed
    Song, Houbing
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 1437 - 1455
  • [46] A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
    Khan, Adnan Shahid
    Sattar, Muhammad Ali
    Nisar, Kashif
    Ibrahim, Ag Asri Ag
    Annuar, Noralifah Binti
    bin Abdullah, Johari
    Memon, Shuaib Karim
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [47] A comprehensive examination of load balancing algorithms in cloud environments: a systematic literature review, comparative analysis, taxonomy, open challenges, and future trends
    Farida Siddiqi Prity
    Md. Maruf Hossain
    Iran Journal of Computer Science, 2024, 7 (3) : 663 - 698