Security-aware job allocation in mobile cloud computing

被引:3
作者
Nawrocki, Piotr [1 ]
Pajor, Jakub [1 ]
Sniezynski, Bartlomiej [1 ]
Kolodziej, Joanna [2 ]
机构
[1] AGH Univ Sci & Technol, Inst Comp Sci, Krakow, Poland
[2] Res & Acad Comp Network NASK, Res & Technol Transfer Unit, Warsaw, Poland
来源
21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021) | 2021年
关键词
security; mobile cloud computing; task allocation; machine learning; adaptation;
D O I
10.1109/CCGrid51090.2021.00086
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ultimate goal of Mobile Cloud Computing is to allow users of mobile devices to execute their applications and complex numerical tasks on a broad range of cloud services and resources. One of the most challenging problems in the flow of mobile tasks related to remote cloud services is the security of all aspects of communication, service security and the reliability of cloud resources. In this paper, we developed a new security-aware job flow model for mobile computational clouds. In our model, we defined dedicated algorithm models such as the Filtration Algorithm and Prediction Module to generate an optimal secure system architecture for task and data processing and to ensure optimal cloud resource and service utilization. The robust performance of our model has been demonstrated by experimental analysis. Results of the experiments performed show that our flow model significantly enhances the security level of computations compared to a configuration in which computation time is the major criterion for job processing optimization.
引用
收藏
页码:713 / 719
页数:7
相关论文
共 18 条
[1]  
[Anonymous], 2010, 2010 43 HAW INT C SY, DOI DOI 10.1109/HICSS.2010.170
[2]   Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues [J].
Bhatia, Tarunpreet ;
Verma, A. K. .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (06) :2558-2631
[3]  
Carolan J., 2009, CISC VIS NETW IND GL
[4]   An Efficient and Secured Framework for Mobile Cloud Computing [J].
Elgendy, Ibrahim A. ;
Zhang, Wei-Zhe ;
Liu, Chuan-Yi ;
Hsu, Ching-Hsien .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) :79-87
[5]   Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing [J].
Gupta, B. B. ;
Yamaguchi, Shingo ;
Agrawal, Dharma P. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) :9203-9208
[6]   A provable and secure mobile user authentication scheme for mobile cloud computing services [J].
Irshad, Azeem ;
Chaudhry, Shehzad Ashraf ;
Shafiq, Muhammad ;
Usman, Muhammad ;
Asif, Muhammad ;
Ghani, Anwar .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
[7]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299
[8]  
Kulkarni P, 2016, 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), P2507, DOI 10.1109/ICEEOT.2016.7755144
[9]   Security and privacy challenges in mobile cloud computing: Survey and way ahead [J].
Mollah, Muhammad Baqer ;
Azad, Md. Abul Kalam ;
Vasilakos, Athanasios .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 :38-54
[10]   Adaptable mobile cloud computing environment with code transfer based on machine learning [J].
Nawrocki, P. ;
Sniezynski, B. ;
Slojewski, H. .
PERVASIVE AND MOBILE COMPUTING, 2019, 57 :49-63