2017
DOI: 10.1002/cpe.4295
|View full text |Cite
|
Sign up to set email alerts
|

FFBAT: A security and cost‐aware workflow scheduling approach combining firefly and bat algorithms

Abstract: Summary Cloud computing is distributed computing on a large scale driven by practical and effective operations, in which a pay‐per‐use framework provides dynamic scaling in response to the needs of workflow applications. Many existing cloud computing environments do not effectively employ security measures to counter security threats in task scheduling. To improve the scheduling system, we include security service to the scheduling process. However, adding security services to applications inevitably causes ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Arunarani et al combined FA and bat algorithm (BA) to solve the workflow scheduling. 31 To accurately forecast the software cost, Kaushik et al designed a new method by coupling FA and artificial neural network. 32 To deal with the superior solution set search problem, a novel FA was designed based on the quantitative demand level of users.…”
Section: A Review Of Famentioning
confidence: 99%
See 1 more Smart Citation
“…Arunarani et al combined FA and bat algorithm (BA) to solve the workflow scheduling. 31 To accurately forecast the software cost, Kaushik et al designed a new method by coupling FA and artificial neural network. 32 To deal with the superior solution set search problem, a novel FA was designed based on the quantitative demand level of users.…”
Section: A Review Of Famentioning
confidence: 99%
“…There are several scheduling problems in cloud computing. Arunarani et al combined FA and bat algorithm (BA) to solve the workflow scheduling 31 . To accurately forecast the software cost, Kaushik et al designed a new method by coupling FA and artificial neural network 32 .…”
Section: A Review Of Famentioning
confidence: 99%
“…Li et al [8] and Arunarani et al [11] presented algorithms to find schedules that combines different levels of authentication, integrity verification, and encryption services, and a VM instance for each task for minimizing the execution cost, while meeting the minimum security requirement and deadline. However, these algorithms do not guarantee that all tasks that handle sensitive data (critical tasks) will be secured, due the codification of the optimization.…”
Section: Introductionmentioning
confidence: 99%
“…Consider solutions s 1 which applies security services for tasks A-B-C, and leaves D with no security and s 2 where A-C-D are secured, while B is not. The algorithms in [8] and [11] do not take into consideration the semantics of each workflow task. In their work, both solutions s 1 and s 2 have secured three tasks and, therefore, present the same security level.…”
Section: Introductionmentioning
confidence: 99%
“…Arunarani et al propose a security and cost aware scheduling algorithm for heterogeneous tasks in scientific workflow executed in a cloud. A core semantics extraction model (CSEM) is proposed by Liu et al to improve the novel and rich semantics of multi‐document summary.…”
mentioning
confidence: 99%