2018 IEEE International Conference on Services Computing (SCC) 2018
DOI: 10.1109/scc.2018.00037
|View full text |Cite
|
Sign up to set email alerts
|

(WIP) Tasks Selection Policies for Securing Sensitive Data on Workflow Scheduling in Clouds

Abstract: Scheduling is an important topic to support data security for workflow execution in clouds. Some workflow scheduling algorithms use security services such as authentication, integrity verification, and encryption for all workflow tasks. However, applying security services to no sensitive data does not make sense as no benefit is gained, yet it increases the makespan and monetary costs. In this paper, we introduce five policies for selection of tasks that handle sensitive data. We also propose a workflow schedu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Liu et al [14] presented a new searchable encryption scheme that guarantees data privacy as well as efficient data search and retrieval in a distributed environment. Because encryption increases execution times, Shishido et al [15] proposed a task selection strategy for private clouds according to the MPGA (multi-population genetic algorithm) method. Yin et al [16] proposed a location privacy protection method that satisfies differential privacy constraints to protect location data privacy and maximizes data and algorithm utility.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Liu et al [14] presented a new searchable encryption scheme that guarantees data privacy as well as efficient data search and retrieval in a distributed environment. Because encryption increases execution times, Shishido et al [15] proposed a task selection strategy for private clouds according to the MPGA (multi-population genetic algorithm) method. Yin et al [16] proposed a location privacy protection method that satisfies differential privacy constraints to protect location data privacy and maximizes data and algorithm utility.…”
Section: Related Workmentioning
confidence: 99%
“…Ten instances are generated for each number of jobs. The number of stages in each job is uniformly distributed in U (15,20). The number of tasks in each stage is uniformly distributed in U (50, 100).…”
Section: A Parameter Calibrationmentioning
confidence: 99%
“…This extension is available on GitHub 1 . As part of the ongoing research carried out by the authors' group, the workflow management system simulator is employed in a study on security-and cost aware workflow scheduling algorithms in three publications [13], [18], [19]. The studies investigate the application of meta-heuristic algorithms for optimizing the assignment of different VM instances and security services for each task.…”
Section: Usage Examplementioning
confidence: 99%