2017
DOI: 10.1109/tpds.2017.2678507
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 105 publications
(52 citation statements)
references
References 36 publications
0
51
0
1
Order By: Relevance
“…If no preplaced datasets are taken into account, then our problem can be reduced to the non‐uniform graph partition problem. In addition, as high quality security services are increasingly critical for processing workflow applications, data sensitivity constraints were considered in the works of Wen et al and Chen et al Wen et al regarded that cloud customers' sensitive data are restricted to being processed by specific trusted data centers and studied how to schedule workflow with data privacy protection constraints, while minimizing both monetary cost and execution time for workflow applications . Chen et al considered the security requirements of the intermediate data, and studied the performance impact of encryption time of intermediate data on the start of subsequent workflow tasks .…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…If no preplaced datasets are taken into account, then our problem can be reduced to the non‐uniform graph partition problem. In addition, as high quality security services are increasingly critical for processing workflow applications, data sensitivity constraints were considered in the works of Wen et al and Chen et al Wen et al regarded that cloud customers' sensitive data are restricted to being processed by specific trusted data centers and studied how to schedule workflow with data privacy protection constraints, while minimizing both monetary cost and execution time for workflow applications . Chen et al considered the security requirements of the intermediate data, and studied the performance impact of encryption time of intermediate data on the start of subsequent workflow tasks .…”
Section: Related Workmentioning
confidence: 99%
“…In addition, as high quality security services are increasingly critical for processing workflow applications, data sensitivity constraints were considered in the works of Wen et al and Chen et al Wen et al regarded that cloud customers' sensitive data are restricted to being processed by specific trusted data centers and studied how to schedule workflow with data privacy protection constraints, while minimizing both monetary cost and execution time for workflow applications . Chen et al considered the security requirements of the intermediate data, and studied the performance impact of encryption time of intermediate data on the start of subsequent workflow tasks . However, since we regard that the owner of the scientific workflow application trusts these geo‐distributed data centers for its execution, which is common in large scientific collaborations, we thus leave the concern of data privacy or security out of the scope of this paper.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…50,51 For work-flow applications, a number of work-flow scheduling strategies have been proposed to deploy them to cloud. [52][53][54][55][56][57] In these methods, they often assumed that the running time of each subtask are available before scheduling and remain unchangeable, and a subtask can start execution as soon as it arrives. These strategies tried to minimize the completion time of the task by adjusting the arrival time of subtasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They investigate the security and privacy necessities and allegations, and also studied existing systems, and in the end develop architecture of a secure manager for cloud-based healthcarerelated data management and exchange. H.Chen.et.al [17] develops a model which focuses SecuritySensitive Intermediate Data by using Selective Tasks Duplication in Cloud environments. With the extensive consumption of cloud computing in numerous business enterprises as well as science and engineering domains, high quality safety services are increasingly critical for giving out workflow applications with confidential transitional data.…”
Section: Related Workmentioning
confidence: 99%