Skip to main content
Log in

Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

High performance in large-scale heterogeneous distributed infrastructure, like cloud computing depends on effective scheduling algorithms. List-based scheduling is one of the most effective heuristic technique for allocating task graphs of fully connected heterogeneous cloud systems. However, few list-based scheduling algorithms used today takes into account the security needs of the applications or the security services provided by the cloud providers. The mapping of high-priority tasks onto the virtual machine satisfying the security requirements is challenging in the cloud environment. In this work, a security-driven dynamic level scheduling (SDLS) algorithm is proposed for the IaaS cloud using a dynamic level, considering the security overheads into account during the task prioritization and the virtual machine selection phases. SDLS offers more reliable virtual machines to the higher security demand tasks to reduce the risk probability. The suggested SDLS outperforms the existing algorithm in terms of makespan and risk probability, as shown in the performance study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

https://pegasus.isi.edu/workflow_gallery/.

References

  1. Hwang K, Dongarra J, Fox GC (2013) Distributed and cloud computing: from parallel processing to the internet of things. Morgan kaufmann

  2. Alam M, Haidri RA, Yadav DK (2021) Efficient task scheduling on virtual machine in cloud computing environment. Int J Pervasive Comput Commun 17(13):271–287

    Article  Google Scholar 

  3. Brown DA, Brady PR, Dietz A, Cao J, Johnson B, McNabb J (2007) A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis. In: Workflows for e-Science. Springer, London, pp 39–59

  4. Juve G, Deelman E (2011) Scientific workflows in the cloud. In: Cafaro M, Aloisio G (eds) Grids, clouds and virtualization. CCN. Springer, London, pp 71–91

    Chapter  Google Scholar 

  5. Topcuoglu H, Hariri S, Wu MY (2002) Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Trans Parallel Distrib Syst 13(3):260–274

    Article  Google Scholar 

  6. Xiaoyong T, Li K, Zeng Z, Veeravalli B (2010) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60:1017–1029

    Article  MathSciNet  Google Scholar 

  7. Hu B, Cao Z, Zhou M (2019) Scheduling real-time parallel applications in cloud to minimize energy consumption. IEEE Trans Cloud Comput 10(1):662–674. https://doi.org/10.1109/tcc.2019.2956498

    Article  Google Scholar 

  8. Shakeel H, Alam M (2023) Load balancing approaches in cloud and fog computing environments: a framework, classification, and systematic review. Int J Cloud Appl Comput (IJCAC) 12(1):1–24

    Google Scholar 

  9. Kaur R, Kaur J (2015) Cloud computing security issues and its solution: a review. In: Proceeding of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom. pp 1198–1200. New Delhi, India.

  10. Dastjerdi AV, Buyya R (2012) An autonomous reliability-aware negotiation strategy for cloud computing environments. In: Proceeding of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). pp. 284–291, Ottawa, ON, Canada

  11. Anjana, Singh A (2019) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol 11:683–690

    Google Scholar 

  12. Sih GC, Lee EA (1993) A compile-time scheduling heuristic for interconnection-constrained heterogeneous processor architectures. IEEE Trans Parallel Distrib Syst 4(2):175–187

    Article  Google Scholar 

  13. Huang B, Xiang Y, Yu D, Wang J, Li Z, Wang S (2021) Reinforcement learning for security-aware workflow application scheduling in mobile edge computing. Secur Commun Netw. https://doi.org/10.1155/2021/5532410

    Article  Google Scholar 

  14. Lei J, Wu Q, Xu J (2022) Privacy and security-aware workflow scheduling in a hybrid cloud. Futur Gener Comput Syst 131:269–278

    Article  Google Scholar 

  15. Alam M, Shahid M, Mustajab S (2022) Security prioritized heterogeneous earliest finish time workflow allocation algorithm for cloud computing. In: Congress on Intelligent Systems. 1. Springer, Singapore, pp 233–246

  16. Kaur A, Kaur B, Singh D (2019) Meta-heuristic based framework for workflow load balancing in cloud environment. Int J Inf Technol 11:119–125

    Google Scholar 

  17. Ahmad F, Ahmad W (2022) An efficient astronomical image processing technique using advance dynamic workflow scheduler in cloud environment. Int J Inf Technol 14(6):2779–2791

    Google Scholar 

  18. Bala M (2018) Proportionate resource utilization based VM allocation method for large scaled datacenters. Int J Inf Technol 10:349–357. https://doi.org/10.1007/s41870-018-0150-z

    Article  Google Scholar 

  19. Kaur R, Laxmi V (2022) Balkrishan: Performance evaluation of task scheduling algorithms in virtual cloud environment to minimize makespan. Int J Inf Technol 14:79–93. https://doi.org/10.1007/s41870-021-00753-4

    Article  Google Scholar 

  20. Tank D, Aggarwal A, Chaubey N (2022) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 14:847–862. https://doi.org/10.1007/s41870-019-00294-x

    Article  Google Scholar 

  21. Kwok KY-K, Ahmed I (1999) Static scheduling algorithms for allocating directed task graphs to multiprocessors. ACM Comput Surv 31(4):406–471

    Article  Google Scholar 

  22. Shahid M, Raza Z, Alam M Performance evaluation of batch scheduling strategy with precedence constraints for computational grid. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). pp 641–646. IEEE

  23. Rajasekar P, Palanichamy Y (2021) Adaptive resource provisioning and scheduling algorithm for scientific workflows on IaaS cloud. SN Comput Sci 2:1–16

    Article  Google Scholar 

  24. Pu J, Meng Q, Chen Y, Sheng H (2023) MPEFT: A novel task scheduling method for workflows. Front Environ Sci 10:2601

    Article  Google Scholar 

  25. Alam M, Shahid M & Mustajab S (2021) SAHEFT: Security aware heterogeneous earliest finish time workflow allocation strategy for IaaS cloud environment. In: 2021 IEEE Madras Section Conference (MASCON) (pp 1–8). IEEE

  26. Alam M, Shahid M, Mustajab S (2023) Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. In: Cluster Computing. pp 1–36

  27. Stavrinides GL, Karatza HD (2022) Security, cost and energy aware scheduling of real-time IoT workflows in a mist computing environment. Inf Syst Front. https://doi.org/10.1007/s10796-022-10304-2

    Article  Google Scholar 

  28. Alam M, Shahid M, Mustajab S (2023) Security oriented deadline aware workflow allocation strategy for infrastructure as a service clouds. In: 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM). pp 1–6, IEEE

  29. Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532

    Article  Google Scholar 

  30. Ojo AO (2022) Cost-effective and security-aware task allocation algorithm for dynamic wireless sensor networks. Available at SSRN 4022956

Download references

Funding

No funding is supported by any agency.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahfooz Alam.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alam, M., Shahid, M., Mustajab, S. et al. Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud. Int. j. inf. tecnol. 16, 721–729 (2024). https://doi.org/10.1007/s41870-023-01523-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01523-0

Keywords

Navigation