An enhanced algorithm for scheduling dependent tasks in cloud computing environment

2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.

Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2021 ◽  
Vol 11 (18) ◽  
pp. 8496
Author(s):  
Salah T. Alshammari ◽  
Khalid Alsubhi

Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


TEM Journal ◽  
2020 ◽  
pp. 915-923 ◽  
Author(s):  
Ekkachat Baikloy ◽  
Prasong Praneetpolgrang ◽  
Nivet Jirawichitchai

The research objectives were: 1) to develop cyber resilient model, 2) to develop the cyber resilient capability maturity model and 3) to develop self-assessment model for cyber resilient capability of cloud computing services which are qualitative and applicative research. Referring to the cybersecurity concept from National Institute of Standards and Technology (NIST) from the in-depth interview, focusgroup discussion was developed with cybersecurity experts and data collection from cloud services providers. It was found that trend of cyber-attacks was violent with smarter method. The authors had synthesized the concept of cyber resilient capability maturity model for cloud computing services including developed application for cloud services providers to evaluate their organization in order to improve the better cybersecurity level in cloud computing services and the cyber resilient capability maturity model in the future.


2016 ◽  
pp. 709-734
Author(s):  
Konstantinos Koumaditis ◽  
George Pittas ◽  
Marinos Themistocleous ◽  
George Vassilacopoulos ◽  
Andriana Prentza ◽  
...  

Healthcare organisations are forced to reconsider their current business practices and embark on a cloud adoption journey. Cloud-Computing offers important benefits that make it attractive for healthcare (e.g. cost effective model, big data management etc.). Large Information Technology (IT) companies are investing big sums in building infrastructure, services, tools and applications to facilitate Cloud-Computing for healthcare organisations, practitioners and patients. Yet, many challenges that such integration projects contain are still in the e-health research agenda like design and technology requirements to handle big volume of data, ensure scalability and user satisfaction to name a few. The purpose of this chapter is (a) to address the Cloud-Computing services for healthcare in the form of a Personal Healthcare record (PHR) and (b) demonstrate a multidisciplinary project. In doing so, the authors aim at increasing the awareness of this important endeavour and provide insights on Cloud-Computing e-health services for healthcare organisations.


Author(s):  
Anil Aggarwal

Cloud services are becoming part of every company’s “right”mare. They know it is the future but are afraid to jump on the cloud computing bandwagon. This may be due to lack of standardization, evolving technology, and/or fear of loss of privacy and security. However, every emerging technology has its root in early adopters who defy the common wisdom, take chances, and help it to evolve into something marketable. They get the first advantage before it becomes a norm. History is full of such examples: e-commerce, m-commerce, online banking, check in through kiosk, et cetera. Companies who were early adopters still have an advantage over late adopters. Amazon.com and eBay are prime examples of this. As technology evolves, it transfers from “push” to “pull” cycle. Cloud services are in their infancy and still evolving around “push” cycle. The number of companies offering cloud services is multiplying exponentially. This chapter presents a systems approach to cloud computing services. Specifically, it examines issues in the context of the system development life cycle (SDLC). For completeness purposes, the chapter discusses issues in relation to SDLC; however, in practice, each user has to customize this approach to suit their own application(s).


2015 ◽  
Vol 28 (6) ◽  
pp. 788-807 ◽  
Author(s):  
Anabel Gutierrez ◽  
Elias Boukrami ◽  
Ranald Lumsden

Purpose – The purpose of this paper is to determine the factors influencing managers’ decision to adopt cloud computing in the UK using the “Technology-Organisation-Environment” (TOE) framework. Design/methodology/approach – Data were collected through a self-created questionnaire based survey that was completed by 257 mid-to-senior level decision-making business and information technology (IT) professionals from a range of UK end-user organisations. The derived hypotheses were tested using various data analysis techniques including principal component analysis and logistic regression. Findings – The results show that four out of the eight factors examined have a significant influence on the adoption decision of cloud computing services in the UK. Those key factors include competitive pressure, complexity, technology readiness and trading partner pressure. The latter predictor; trading partner pressure, was the most significant factor for the adoption decision of cloud services reflecting organisations’ concerns on legal regulations, co-creation and customisation, service linkage and vendor locking which adds complexity to the process of selecting an appropriate vendor. Research limitations/implications – This research found trading partners (cloud service providers) significantly influence managers’ decisions to adopt cloud services, however, further research is required to fully understand all the aspects involved especially with the growing number of vendors available. Although over 250 usable responses to the questionnaire were received and analysed, there was not a sufficient quantity of responses from each industry sector or organisation size to conduct further analysis. Practical implications – The findings reveal the important role of cloud computing service providers to enable end-users to better evaluate the use of cloud computing. It also reveals that top management support is no longer a driver as organisations are starting to adopt cloud computing services on the basis of cheaper and more agile IT resources in order to support business growth. Originality/value – This research provides original insight for cloud computing adoption within the UK from a managerial perspective.


Author(s):  
Mubarak S. Almutairi

Computing virtualization is the key technology in cloud computing as it can reduce the investment in the hardware component drastically. The present research work carefully analyse some of the major security threats to the cloud services based on the security threat analysis produced by Cloud Security Alliance (CSA). The physical network components are not necessarily located on the same geographical area but yet are doing the necessary processing and storage. As such, “cloud computing” will be the driving force behind most of today's promising computing technologies. Security will be always an issue which needs to be addresses at two different levels: front-end and back-end. In a nutshell, cloud computing is hugely beneficial for the enterprise and while still evolving, will be around for the long-term. It is crucially important for those enterprises which will adopt the cloud computing model to put long-term security strategy in place. Knowledge of cloud architecture, technology, process, services, and deployment models is vital in specifying security models and identifying security concerns in cloud computing. As the providers and end users increase, standardization and security techniques will play an important role in helping organizations to reduce risks involved. This survey also illustrates the view of cloud providers’ actions and assessment of the cloud-computing services provided by them to the IT users.


2021 ◽  
Vol 39 (1B) ◽  
pp. 41-52
Author(s):  
Turkan A. Khaleel

The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased. Protecting cloud computing and providing security for its resources and users is one of the critical challenges. As a result, most users are afraid to use their resources, because many security problems must be met. For example, authentication and reliability are major security constraints and must be provided in a cloud computing environment. There is a wide range of authentication protocols in use, but the researcher has recommended the Kerberos protocol to represent and test it in a complex environment such as a mixed cloud environment. A model has been developed to implement Kerberos authentication in a hybrid cloud computing environment to securely access the cloud computing services provided. This model is represented using the OPNET Modeler 14.5 simulation system. The network efficiency was measured before and after the hacker. Findings presented in this research are supporting the ability of the Kerberos protocol to prevent illegal access to cloud computing services, whether from within the private cloud or the public cloud. While maintaining the efficient performance of the network.


Sign in / Sign up

Export Citation Format

Share Document