Transparent Data Access for Scientific Workflows Across Clouds

Author(s):  
Michał Orzechowski ◽  
Bartosz Baliś ◽  
Łukasz Dutka ◽  
Renata G. Słota ◽  
Jacek Kitowski
2021 ◽  
Author(s):  
Jan Lansky ◽  
Mokhtar Mohammadi ◽  
Adil Hussein Mohammed ◽  
Sarkhel H.Taher Karim ◽  
Shima Rashidi ◽  
...  

Abstract Mobile Edge Computing (MEC) is an interesting technology aimed at providing various processing and storage resources at the edge of the Internet of things (IoT) networks. However, MECs contain limited resources, and they should be managed effectively to improve resource utilization. Workflow scheduling is a process that tries to map the workflow tasks to the most proper set of computing resources regarding some objectives. For this purpose, this paper presents DBOA, a discrete version of the Butterfly Optimization Algorithm (BOA) that applies the Levy flight to improve its convergence speed and prevent the local optima problem. Then, DBOA is applied for DVFS-based data-intensive workflow scheduling and data placement in MEC environments. This scheme also employs the HEFT algorithm's task prioritization method to find the task execution order in the scientific workflows. For evaluating the performance of the proposed scheduling scheme, extensive simulations are conducted on various well-known scientific workflows with different sizes. The obtained experimental results indicate that this method can outperform other algorithms regarding energy consumption, data access overheads, etc.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2011 ◽  
Vol 34 (3) ◽  
pp. 473-481
Author(s):  
Guo-Fu XIE ◽  
Wen-Cheng WANG
Keyword(s):  

2020 ◽  
Vol 28 (1) ◽  
pp. 181-195
Author(s):  
Quentin Vanhaelen

: Computational approaches have been proven to be complementary tools of interest in identifying potential candidates for drug repurposing. However, although the methods developed so far offer interesting opportunities and could contribute to solving issues faced by the pharmaceutical sector, they also come with their constraints. Indeed, specific challenges ranging from data access, standardization and integration to the implementation of reliable and coherent validation methods must be addressed to allow systematic use at a larger scale. In this mini-review, we cover computational tools recently developed for addressing some of these challenges. This includes specific databases providing accessibility to a large set of curated data with standardized annotations, web-based tools integrating flexible user interfaces to perform fast computational repurposing experiments and standardized datasets specifically annotated and balanced for validating new computational drug repurposing methods. Interestingly, these new databases combined with the increasing number of information about the outcomes of drug repurposing studies can be used to perform a meta-analysis to identify key properties associated with successful drug repurposing cases. This information could further be used to design estimation methods to compute a priori assessment of the repurposing possibilities.


Sign in / Sign up

Export Citation Format

Share Document