MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm

被引:61
作者
Abazari, Farzaneh [1 ]
Analoui, Morteza [1 ]
Takabi, Hassan [2 ]
Fu, Song [2 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
[2] Univ North Texas, Dept Comp Sci & Engn, Denton, TX USA
关键词
Cloud computing security; Secure task scheduling; Scientific workflows; Attack response; SECURITY-AWARE; INTERMEDIATE DATA; TASKS; CHALLENGES; STRATEGY; SYSTEMS; MODEL;
D O I
10.1016/j.simpat.2018.10.004
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task's completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats.
引用
收藏
页码:119 / 132
页数:14
相关论文
共 57 条
[21]   A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing [J].
Khorshed, Md. Tanzim ;
Ali, A. B. M. Shawkat ;
Wasimi, Saleh A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (06) :833-851
[22]   Fast response to infection spread and cyber attacks on large-scale networks [J].
Leyffer, Sven ;
Safro, Ilya .
JOURNAL OF COMPLEX NETWORKS, 2013, 1 (02) :183-199
[23]   On Scientific Workflow Scheduling in Clouds under Budget Constraint [J].
Lin, Xiangyu ;
Wu, Chase Qishi .
2013 42ND ANNUAL INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP), 2013, :90-99
[24]   Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments [J].
Liu, Hongbo ;
Abraham, Ajith ;
Snasel, Vaclav ;
McLoone, Sean .
INFORMATION SCIENCES, 2012, 192 :228-243
[25]   Security-aware intermediate data placement strategy in scientific cloud workflows [J].
Liu, Wei ;
Peng, Su ;
Du, Wei ;
Wang, Wei ;
Zeng, Guo Sun .
KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) :423-447
[26]   High-Throughput, Kingdom-Wide Prediction and Annotation of Bacterial Non-Coding RNAs [J].
Livny, Jonathan ;
Teonadi, Hidayat ;
Livny, Miron ;
Waldor, Matthew K. .
PLOS ONE, 2008, 3 (09)
[27]   Task scheduling optimization in cloud computing based on heuristic Algorithm [J].
Guo, Lizheng ;
Zhao, Shuguang ;
Shen, Shigen ;
Jiang, Changyuan .
Journal of Networks, 2012, 7 (03) :547-553
[28]   Secure virtualization for cloud computing [J].
Lombardi, Flavio ;
Di Pietro, Roberto .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1113-1122
[29]   The SCEC southern California reference three-dimensional seismic velocity model Version 2 [J].
Magistrale, H ;
Day, S ;
Clayton, RW ;
Graves, R .
BULLETIN OF THE SEISMOLOGICAL SOCIETY OF AMERICA, 2000, 90 (06) :S65-S76
[30]  
Marcon Daniel S., 2013, 2013 2nd IEEE Latin American Conference on Cloud Computing and Communications (LatinCloud), P29, DOI 10.1109/LatinCloud.2013.6842219