دورية أكاديمية

A cost effective‐ secure algorithm for work‐flow scheduling in cloud computing.

التفاصيل البيبلوغرافية
العنوان: A cost effective‐ secure algorithm for work‐flow scheduling in cloud computing.
المؤلفون: Hammed, Shahul S, Arunkumar, Balachandran
المصدر: Internet Technology Letters; Jan2023, Vol. 6 Issue 1, p1-6, 6p
مستخلص: The work‐flow is emerging as the promising paradigm for the different computing infrastructures of distributed nature. It is applied widely in various scientific fields and simple job execution. To manage with the enormous flow of data in the work‐flow, the requirement of huge infrastructure and the execution in the reasonable time. The work ‐flow adapts to the cloud environment. Though cloud environment provides with the large‐scale infrastructure and consistency and efficiency on comparing to the system operated over non‐cloud, a proper scheduling is entailed for the execution of tasks satisfying the specified constraints with the necessary security measure that has to be provided as the cloud does not provide with the counter measures for the security threats. More over as the real world tasks are most probably heterogeneous requiring virtual machines of different instance of series. So the paper proffers a cost‐effective algorithm based on the multi‐populated genetic algorithm (Multi‐populated GA) implanted with particle swarm optimization (PSO) for the heterogeneous networks so as to minimize the cost of the execution and meet out the QOS constraints, the results serve as the guiding principle for the security level improvement for the (sensitive) critical tasks. The performance evaluation of the scheduling using the workflowsim is performed to evidence the maximum reduction in the cost of the execution and the QOS constraints met using the proposed system. [ABSTRACT FROM AUTHOR]
Copyright of Internet Technology Letters is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:24761508
DOI:10.1002/itl2.233