S. Shahul Hammed, S. Pavalarajan, C. Preethi, K. Haripriya
{"title":"云计算中采用灵活优化排列的保护框架","authors":"S. Shahul Hammed, S. Pavalarajan, C. Preethi, K. Haripriya","doi":"10.1002/ett.70167","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The idea of cloud computing (CC) originates from making resources available for task execution. Cloud computing is an advancement of supercomputing. The main challenges in CC are the varying resources and workloads, leading to the need for efficient tasking and scheduling. Distributed task scheduling can help us better understand workflow scheduling; autonomous task scheduling that accounts for security and execution time, mutual trust among system participants, better energy efficacy, and system utilization, among other aspects. The MBABE technique expanded as multi-level blockchain attribute-based encryption, which is used to ensure data security. ABE is a combined encryption method that can be effectively utilized for security and access control. Additionally, a new algorithm is presented, which is optimized with a convolutional neural network and snoop slingshot spider optimization (CNN-S3SO). The cost functions are minimized using this S3SO for multipleusers in multiple cloud tasks computing progress. The technique relies on the actions of the arachnid in capturing targets and is utilized to arrange tasks for optimal throughput and minimal makespan. It is additionally recommended as a means of achieving convergence in a brief time frame. In addition, a protocol reliant on blockchain technology is utilized to encode data, ensuring secure transmission. Ultimately, the method is tested through a cloudlet simulator, and its efficiency is assessed through the analysis of the results. The outcome of the resource utilization rate is around 98%. It demonstrates that this methodology outperforms other task scheduling methods.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protected Framework Employing Flexible and Optimum Arrangement in Cloud Computing\",\"authors\":\"S. Shahul Hammed, S. Pavalarajan, C. Preethi, K. Haripriya\",\"doi\":\"10.1002/ett.70167\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The idea of cloud computing (CC) originates from making resources available for task execution. Cloud computing is an advancement of supercomputing. The main challenges in CC are the varying resources and workloads, leading to the need for efficient tasking and scheduling. Distributed task scheduling can help us better understand workflow scheduling; autonomous task scheduling that accounts for security and execution time, mutual trust among system participants, better energy efficacy, and system utilization, among other aspects. The MBABE technique expanded as multi-level blockchain attribute-based encryption, which is used to ensure data security. ABE is a combined encryption method that can be effectively utilized for security and access control. Additionally, a new algorithm is presented, which is optimized with a convolutional neural network and snoop slingshot spider optimization (CNN-S3SO). The cost functions are minimized using this S3SO for multipleusers in multiple cloud tasks computing progress. The technique relies on the actions of the arachnid in capturing targets and is utilized to arrange tasks for optimal throughput and minimal makespan. It is additionally recommended as a means of achieving convergence in a brief time frame. In addition, a protocol reliant on blockchain technology is utilized to encode data, ensuring secure transmission. Ultimately, the method is tested through a cloudlet simulator, and its efficiency is assessed through the analysis of the results. The outcome of the resource utilization rate is around 98%. It demonstrates that this methodology outperforms other task scheduling methods.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 6\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70167\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70167","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Protected Framework Employing Flexible and Optimum Arrangement in Cloud Computing
The idea of cloud computing (CC) originates from making resources available for task execution. Cloud computing is an advancement of supercomputing. The main challenges in CC are the varying resources and workloads, leading to the need for efficient tasking and scheduling. Distributed task scheduling can help us better understand workflow scheduling; autonomous task scheduling that accounts for security and execution time, mutual trust among system participants, better energy efficacy, and system utilization, among other aspects. The MBABE technique expanded as multi-level blockchain attribute-based encryption, which is used to ensure data security. ABE is a combined encryption method that can be effectively utilized for security and access control. Additionally, a new algorithm is presented, which is optimized with a convolutional neural network and snoop slingshot spider optimization (CNN-S3SO). The cost functions are minimized using this S3SO for multipleusers in multiple cloud tasks computing progress. The technique relies on the actions of the arachnid in capturing targets and is utilized to arrange tasks for optimal throughput and minimal makespan. It is additionally recommended as a means of achieving convergence in a brief time frame. In addition, a protocol reliant on blockchain technology is utilized to encode data, ensuring secure transmission. Ultimately, the method is tested through a cloudlet simulator, and its efficiency is assessed through the analysis of the results. The outcome of the resource utilization rate is around 98%. It demonstrates that this methodology outperforms other task scheduling methods.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications