Security-Aware Workflow Allocation Strategy for IaaS Cloud Environment

In last few decades, cloud computing has been established itself as a globally accepted platform even in security services needed in various domains having capacity to attain better performance. Security is emerging as an essential issue in IaaS cloud env

  • PDF / 412,004 Bytes
  • 12 Pages / 439.37 x 666.142 pts Page_size
  • 10 Downloads / 193 Views

DOWNLOAD

REPORT


Security-Aware Workflow Allocation Strategy for IaaS Cloud Environment Mohammad Shahid, Mahfooz Alam, Faraz Hasan, and Mohammad Imran

1 Introduction Cloud platform has got more attention and established itself as a new form of computing model. Cloud computing integrates various resources, viz. storage, software, executing platforms, machines for processing to provide resources as a reliable services effectively by implementing multi-level virtualization and abstraction [1]. There are some typical cloud system used for storage applications, Web search and social networking, namely Google App Engine [2], Amazon EC2, Microsoft Azure and IBM Cloud. Cloud system (CS) is mainly used to satisfy on demand requirements of high computation power for solving complex problem by resource sharing with increased efficiency and rapid growing network infrastructure. Virtualization technique is used in cloud system which allows sharing a single physical host among various users by creating more virtual machines (VMs) as VMs are easier to manage than physical host [3, 4].

M. Shahid Department of Commerce, Aligarh Muslim University, Aligarh, India e-mail: [email protected] M. Alam (B) Department of Computer Science, Al-Barkaat College of Graduate Studies, Aligarh, India e-mail: [email protected] F. Hasan Department of Computer Applications, BSA Crescent Institute of Science and Technology, Chennai, India e-mail: [email protected] M. Imran Department of Computer Science Engineering, Polytechnic MANUU, Hyderabad, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2021 S. D. Purohit et al. (eds.), Proceedings of International Conference on Communication and Computational Technologies, Algorithms for Intelligent Systems, https://doi.org/10.1007/978-981-15-5077-5_22

241

242

M. Shahid et al.

In heterogeneous cloud environment, scientific workflow applications are presented by directed acyclic graph (DAG) to describe interrelated tasks relationships. Allocation problem in CS is verified to be NP-complete. The emerging use of IaaS service model of CS is to process large numbers of compute intensive workflow applications with optimized QoS parameters. This problem of allocation of workflows focused on optimum mapping of tasks/applications onto by preserving the execution order so that task independence/precedence conditions are fulfilled with optimized QoS parameters [5–7]. Yet, to fully exploit and efficiently use of resources in cloud system, resource management layer is needed to cover the complication of different physical architectures, communication and allocation a batch of tasks in workflow, reducing complexity arises in managing synchronization, dealing with exploitation of parallelism and preserving precedence constraints in workflow applications. Moreover, the allocation of workflow applications is more difficult to achieve needed performance in cloud systems. Various security applications such as E-commerce services, transaction processing system, digital computer for government and medic