MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm

Abstract Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats.

[1]  Quan Z. Sheng,et al.  Science in the Cloud: Allocation and Execution of Data-Intensive Scientific Workflows , 2013, Journal of Grid Computing.

[2]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[3]  Indrakshi Ray,et al.  Recovering from Malicious Attacks in Workflow Systems , 2005, DEXA.

[4]  Jinjun Chen,et al.  A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud , 2015, ICA3PP.

[5]  Chen Junjie,et al.  An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm , 2014 .

[6]  Yao Yan Cloud workflow scheduling algorithm oriented to dynamic price changes , 2013 .

[7]  Xiao Qin,et al.  Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity , 2007, J. Parallel Distributed Comput..

[8]  Shigen Shen,et al.  Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm , 2012, J. Networks.

[9]  Radu Prodan,et al.  A Multi-objective Approach for Workflow Scheduling in Heterogeneous Environments , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[10]  Chase Qishi Wu,et al.  On Scientific Workflow Scheduling in Clouds under Budget Constraint , 2013, 2013 42nd International Conference on Parallel Processing.

[11]  Xiaorong Li,et al.  ScaleStar: Budget Conscious Scheduling Precedence-Constrained Many-task Workflow Applications in Cloud , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[12]  Babita Bhagat,et al.  Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation , 2017, Int. J. Model. Simul. Sci. Comput..

[13]  Xiao Qin,et al.  Dynamic task scheduling with security awareness in real-time systems , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[14]  Robert W. Graves,et al.  The SCEC Southern California Reference Three-Dimensional Seismic Velocity Model Version 2 , 2000 .

[15]  Václav Snásel,et al.  Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments , 2012, Inf. Sci..

[16]  Buqing Cao,et al.  Scheduling workflows with privacy protection constraints for big data applications on cloud , 2020, Future Gener. Comput. Syst..

[17]  Ehud Gudes,et al.  Specifying application-level security in workflow systems , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).

[18]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[19]  Yang Wang,et al.  On Scheduling Algorithms for MapReduce Jobs in Heterogeneous Clouds with Budget Constraints , 2013, OPODIS.

[20]  Jing Liu,et al.  Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm , 2013 .

[21]  M. Livny,et al.  High-Throughput, Kingdom-Wide Prediction and Annotation of Bacterial Non-Coding RNAs , 2008, PloS one.

[22]  Mohamed Cheriet,et al.  Cloud Computing: A Risk Assessment Model , 2014, 2014 IEEE International Conference on Cloud Engineering.

[23]  Manzur Murshed,et al.  Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing , 2014 .

[24]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[25]  Albert Y. Zomaya,et al.  MPHC: Preserving Privacy for Workflow Execution in Hybrid Clouds , 2013, 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[26]  Junwei Cao,et al.  A Case Study on the Use of Workflow Technologies for Scientific Analysis: Gravitational Wave Data Analysis , 2007, Workflows for e-Science, Scientific Workflows for Grids.

[27]  Xiaorong Li,et al.  SABA: A security-aware and budget-aware workflow scheduling strategy in clouds , 2015, J. Parallel Distributed Comput..

[28]  Vijayan Sugumaran,et al.  FFBAT: A security and cost‐aware workflow scheduling approach combining firefly and bat algorithms , 2017, Concurr. Comput. Pract. Exp..

[29]  Jinjun Chen,et al.  Research on Workflow Scheduling Algorithms in the Cloud , 2014 .

[30]  Vijay Varadharajan,et al.  Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.

[31]  Meikang Qiu,et al.  Security-aware optimization for ubiquitous computing systems with SEAT graph approach , 2013, J. Comput. Syst. Sci..

[32]  Kenli Li,et al.  A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems , 2011, IEEE Transactions on Computers.

[33]  Jin-Soo Kim,et al.  Cost optimized provisioning of elastic resources for application workflows , 2011, Future Gener. Comput. Syst..

[34]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[35]  Mohammad Masdari,et al.  Towards workflow scheduling in cloud computing: A comprehensive analysis , 2016, J. Netw. Comput. Appl..

[36]  Lyes Khoukhi,et al.  Malicious virtual machines detection through a clustering approach , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[37]  Xiaomin Zhu,et al.  Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds , 2017, IEEE Transactions on Parallel and Distributed Systems.

[38]  Morteza Analoui,et al.  Effect of anti-malware software on infectious nodes in cloud environment , 2016, Comput. Secur..

[39]  Paul Watson A multi-level security model for partitioning workflows over federated clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[40]  Bertrand Granado,et al.  Multi-Objective Approach for Energy-Aware Workflow Scheduling in Cloud Computing Environments , 2013, TheScientificWorldJournal.

[41]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[42]  Eddy Caron,et al.  Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[43]  Yong Zhao,et al.  Opportunities and Challenges in Running Scientific Workflows on the Cloud , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[44]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[45]  Luke M. Leslie,et al.  Optimizing Scientific Workflows in the Cloud: A Montage Example , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[46]  Nelson Luis Saldanha da Fonseca,et al.  Workflow specification and scheduling with security constraints in hybrid clouds , 2013, 2nd IEEE Latin American Conference on Cloud Computing and Communications.

[47]  Wei Du,et al.  Security-aware intermediate data placement strategy in scientific cloud workflows , 2014, Knowledge and Information Systems.

[48]  Claudio Fabiano Motta Toledo,et al.  Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds , 2017, Comput. Electr. Eng..

[49]  Ewa Deelman,et al.  WorkflowSim: A toolkit for simulating scientific workflows in distributed environments , 2012, 2012 IEEE 8th International Conference on E-Science.

[50]  D. Katz,et al.  The Montage architecture for grid-enabled science processing of large, distributed datasets , 2004 .

[51]  E. M. Mohamed,et al.  Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[52]  Keqin Li,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems Multi-objective Scheduling of Many Tasks in Cloud Platforms , 2022 .

[53]  Salim Hariri,et al.  Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..

[54]  Sandeep K. Sood,et al.  A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..