Mahfooz Alam , Mohammad Shahid , Suhel Mustajab , Mohammad Sajid
{"title":"LSDMA:云计算中分层安全驱动的截止日期约束多工作流分配模型","authors":"Mahfooz Alam , Mohammad Shahid , Suhel Mustajab , Mohammad Sajid","doi":"10.1016/j.future.2025.107941","DOIUrl":null,"url":null,"abstract":"<div><div>Security and deadline sensitivity play a crucial role in many cloud applications, requiring a high level of security to ensure confidentiality, integrity, and authentication in cross-platform data transmission. Therefore, we designed a levelized security driven deadline constrained multiple workflow allocation (LSDMA) model in order to optimize the risk probability of satisfying the workflow tasks’ security demands and deadline constraints. To ensure the security in cloud platform, three-level security services, i.e., authentication, integrity, and confidentiality, are employed. However, existing secured workflow allocation literature reports very few models for multiple workflows addressing security and deadline requirements. It leaves scope to develop new models in the domain. Further, the completion time of the workflows is also improved by using level-wise allocation, inserting best-fit successor tasks into idle gaps, and adopting a parallel communication mechanism between levels during execution to reduce overall communication overhead. The prototype simulator for the secured workflow allocator is designed and implemented in MATLAB for performance evaluation with the competitive models from the domain. The meticulous simulation results show that the LSDMA model outperforms at both batch of random workflows and real workflows among the state-of-the-art models on the considered QoS parameters under study. The experimental findings indicate that LSDMA surpasses SDS, LBSIR, SAHEFT, SODA, and HEFT regarding the risk probability, achieving improvements of 21 %–73 %, 15 %–74 %, 12 %–72 %, and 14 %–73 % when varying the batch of random, Montage, CyberShake, and LIGO workflows, respectively.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"174 ","pages":"Article 107941"},"PeriodicalIF":6.2000,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"LSDMA: Levelized security driven deadline constrained multiple workflow allocation model in cloud computing\",\"authors\":\"Mahfooz Alam , Mohammad Shahid , Suhel Mustajab , Mohammad Sajid\",\"doi\":\"10.1016/j.future.2025.107941\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Security and deadline sensitivity play a crucial role in many cloud applications, requiring a high level of security to ensure confidentiality, integrity, and authentication in cross-platform data transmission. Therefore, we designed a levelized security driven deadline constrained multiple workflow allocation (LSDMA) model in order to optimize the risk probability of satisfying the workflow tasks’ security demands and deadline constraints. To ensure the security in cloud platform, three-level security services, i.e., authentication, integrity, and confidentiality, are employed. However, existing secured workflow allocation literature reports very few models for multiple workflows addressing security and deadline requirements. It leaves scope to develop new models in the domain. Further, the completion time of the workflows is also improved by using level-wise allocation, inserting best-fit successor tasks into idle gaps, and adopting a parallel communication mechanism between levels during execution to reduce overall communication overhead. The prototype simulator for the secured workflow allocator is designed and implemented in MATLAB for performance evaluation with the competitive models from the domain. The meticulous simulation results show that the LSDMA model outperforms at both batch of random workflows and real workflows among the state-of-the-art models on the considered QoS parameters under study. The experimental findings indicate that LSDMA surpasses SDS, LBSIR, SAHEFT, SODA, and HEFT regarding the risk probability, achieving improvements of 21 %–73 %, 15 %–74 %, 12 %–72 %, and 14 %–73 % when varying the batch of random, Montage, CyberShake, and LIGO workflows, respectively.</div></div>\",\"PeriodicalId\":55132,\"journal\":{\"name\":\"Future Generation Computer Systems-The International Journal of Escience\",\"volume\":\"174 \",\"pages\":\"Article 107941\"},\"PeriodicalIF\":6.2000,\"publicationDate\":\"2025-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Computer Systems-The International Journal of Escience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167739X25002365\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Computer Systems-The International Journal of Escience","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167739X25002365","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
LSDMA: Levelized security driven deadline constrained multiple workflow allocation model in cloud computing
Security and deadline sensitivity play a crucial role in many cloud applications, requiring a high level of security to ensure confidentiality, integrity, and authentication in cross-platform data transmission. Therefore, we designed a levelized security driven deadline constrained multiple workflow allocation (LSDMA) model in order to optimize the risk probability of satisfying the workflow tasks’ security demands and deadline constraints. To ensure the security in cloud platform, three-level security services, i.e., authentication, integrity, and confidentiality, are employed. However, existing secured workflow allocation literature reports very few models for multiple workflows addressing security and deadline requirements. It leaves scope to develop new models in the domain. Further, the completion time of the workflows is also improved by using level-wise allocation, inserting best-fit successor tasks into idle gaps, and adopting a parallel communication mechanism between levels during execution to reduce overall communication overhead. The prototype simulator for the secured workflow allocator is designed and implemented in MATLAB for performance evaluation with the competitive models from the domain. The meticulous simulation results show that the LSDMA model outperforms at both batch of random workflows and real workflows among the state-of-the-art models on the considered QoS parameters under study. The experimental findings indicate that LSDMA surpasses SDS, LBSIR, SAHEFT, SODA, and HEFT regarding the risk probability, achieving improvements of 21 %–73 %, 15 %–74 %, 12 %–72 %, and 14 %–73 % when varying the batch of random, Montage, CyberShake, and LIGO workflows, respectively.
期刊介绍:
Computing infrastructures and systems are constantly evolving, resulting in increasingly complex and collaborative scientific applications. To cope with these advancements, there is a growing need for collaborative tools that can effectively map, control, and execute these applications.
Furthermore, with the explosion of Big Data, there is a requirement for innovative methods and infrastructures to collect, analyze, and derive meaningful insights from the vast amount of data generated. This necessitates the integration of computational and storage capabilities, databases, sensors, and human collaboration.
Future Generation Computer Systems aims to pioneer advancements in distributed systems, collaborative environments, high-performance computing, and Big Data analytics. It strives to stay at the forefront of developments in grids, clouds, and the Internet of Things (IoT) to effectively address the challenges posed by these wide-area, fully distributed sensing and computing systems.