Abstract
High performance in large-scale heterogeneous distributed infrastructure, like cloud computing depends on effective scheduling algorithms. List-based scheduling is one of the most effective heuristic technique for allocating task graphs of fully connected heterogeneous cloud systems. However, few list-based scheduling algorithms used today takes into account the security needs of the applications or the security services provided by the cloud providers. The mapping of high-priority tasks onto the virtual machine satisfying the security requirements is challenging in the cloud environment. In this work, a security-driven dynamic level scheduling (SDLS) algorithm is proposed for the IaaS cloud using a dynamic level, considering the security overheads into account during the task prioritization and the virtual machine selection phases. SDLS offers more reliable virtual machines to the higher security demand tasks to reduce the risk probability. The suggested SDLS outperforms the existing algorithm in terms of makespan and risk probability, as shown in the performance study.
Similar content being viewed by others
Data availability
References
Hwang K, Dongarra J, Fox GC (2013) Distributed and cloud computing: from parallel processing to the internet of things. Morgan kaufmann
Alam M, Haidri RA, Yadav DK (2021) Efficient task scheduling on virtual machine in cloud computing environment. Int J Pervasive Comput Commun 17(13):271–287
Brown DA, Brady PR, Dietz A, Cao J, Johnson B, McNabb J (2007) A case study on the use of workflow technologies for scientific analysis: gravitational wave data analysis. In: Workflows for e-Science. Springer, London, pp 39–59
Juve G, Deelman E (2011) Scientific workflows in the cloud. In: Cafaro M, Aloisio G (eds) Grids, clouds and virtualization. CCN. Springer, London, pp 71–91
Topcuoglu H, Hariri S, Wu MY (2002) Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Trans Parallel Distrib Syst 13(3):260–274
Xiaoyong T, Li K, Zeng Z, Veeravalli B (2010) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60:1017–1029
Hu B, Cao Z, Zhou M (2019) Scheduling real-time parallel applications in cloud to minimize energy consumption. IEEE Trans Cloud Comput 10(1):662–674. https://doi.org/10.1109/tcc.2019.2956498
Shakeel H, Alam M (2023) Load balancing approaches in cloud and fog computing environments: a framework, classification, and systematic review. Int J Cloud Appl Comput (IJCAC) 12(1):1–24
Kaur R, Kaur J (2015) Cloud computing security issues and its solution: a review. In: Proceeding of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom. pp 1198–1200. New Delhi, India.
Dastjerdi AV, Buyya R (2012) An autonomous reliability-aware negotiation strategy for cloud computing environments. In: Proceeding of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). pp. 284–291, Ottawa, ON, Canada
Anjana, Singh A (2019) Security concerns and countermeasures in cloud computing: a qualitative analysis. Int J Inf Technol 11:683–690
Sih GC, Lee EA (1993) A compile-time scheduling heuristic for interconnection-constrained heterogeneous processor architectures. IEEE Trans Parallel Distrib Syst 4(2):175–187
Huang B, Xiang Y, Yu D, Wang J, Li Z, Wang S (2021) Reinforcement learning for security-aware workflow application scheduling in mobile edge computing. Secur Commun Netw. https://doi.org/10.1155/2021/5532410
Lei J, Wu Q, Xu J (2022) Privacy and security-aware workflow scheduling in a hybrid cloud. Futur Gener Comput Syst 131:269–278
Alam M, Shahid M, Mustajab S (2022) Security prioritized heterogeneous earliest finish time workflow allocation algorithm for cloud computing. In: Congress on Intelligent Systems. 1. Springer, Singapore, pp 233–246
Kaur A, Kaur B, Singh D (2019) Meta-heuristic based framework for workflow load balancing in cloud environment. Int J Inf Technol 11:119–125
Ahmad F, Ahmad W (2022) An efficient astronomical image processing technique using advance dynamic workflow scheduler in cloud environment. Int J Inf Technol 14(6):2779–2791
Bala M (2018) Proportionate resource utilization based VM allocation method for large scaled datacenters. Int J Inf Technol 10:349–357. https://doi.org/10.1007/s41870-018-0150-z
Kaur R, Laxmi V (2022) Balkrishan: Performance evaluation of task scheduling algorithms in virtual cloud environment to minimize makespan. Int J Inf Technol 14:79–93. https://doi.org/10.1007/s41870-021-00753-4
Tank D, Aggarwal A, Chaubey N (2022) Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison. Int J Inf Technol 14:847–862. https://doi.org/10.1007/s41870-019-00294-x
Kwok KY-K, Ahmed I (1999) Static scheduling algorithms for allocating directed task graphs to multiprocessors. ACM Comput Surv 31(4):406–471
Shahid M, Raza Z, Alam M Performance evaluation of batch scheduling strategy with precedence constraints for computational grid. In: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). pp 641–646. IEEE
Rajasekar P, Palanichamy Y (2021) Adaptive resource provisioning and scheduling algorithm for scientific workflows on IaaS cloud. SN Comput Sci 2:1–16
Pu J, Meng Q, Chen Y, Sheng H (2023) MPEFT: A novel task scheduling method for workflows. Front Environ Sci 10:2601
Alam M, Shahid M & Mustajab S (2021) SAHEFT: Security aware heterogeneous earliest finish time workflow allocation strategy for IaaS cloud environment. In: 2021 IEEE Madras Section Conference (MASCON) (pp 1–8). IEEE
Alam M, Shahid M, Mustajab S (2023) Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. In: Cluster Computing. pp 1–36
Stavrinides GL, Karatza HD (2022) Security, cost and energy aware scheduling of real-time IoT workflows in a mist computing environment. Inf Syst Front. https://doi.org/10.1007/s10796-022-10304-2
Alam M, Shahid M, Mustajab S (2023) Security oriented deadline aware workflow allocation strategy for infrastructure as a service clouds. In: 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM). pp 1–6, IEEE
Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532
Ojo AO (2022) Cost-effective and security-aware task allocation algorithm for dynamic wireless sensor networks. Available at SSRN 4022956
Funding
No funding is supported by any agency.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alam, M., Shahid, M., Mustajab, S. et al. Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud. Int. j. inf. tecnol. 16, 721–729 (2024). https://doi.org/10.1007/s41870-023-01523-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01523-0