Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds - 2017

Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds

Research Area:  Cloud Computing

Abstract:

With the wide deployment of cloud computing in many business enterprises as well as science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most existing worklfow scheduling approaches disregard the security requirements of the intermediate data produced by workflows, and overlook the performance impact of encryption time of intermediate data on the start of subsequent workflow tasks. Furthermore, the idle time slots on resources, resulting from data dependencies among workflow tasks, have not been adequately exploited to mitigate the impact of data encryption time on workflows makespans and monetary cost. To address these issues, this paper presents a novel task-scheduling framework for security sensitive workflows with three novel features. First, we provide comprehensive theoretical analyses on how selectively duplicating a tasks predecessor tasks is helpful for preventing both the data transmission time and encryption time from delaying tasks start time. Then, we define workflow tasks latest finish time, and prove that tasks can be completed before tasks latest finish time by using cheapest resources to reduce monetary cost without delaying tasks successors start time and workflows makespans. Based on these analyses, we devise a novel scheduling appro ach with selective tasks duplication, named SOLID, incorporating two important phases: 1) task scheduling with selectively duplicating predecessor tasks to idle time slots on resources; and 2) intermediate data encrypting by effectively exploiting tasks laxity time. We evaluate our solution approach through rigorous performance evaluation study using both randomly generated workflows and some real-world workflow traces. Our results show that the proposed SOLID approach prevails over existing algorithms in terms of makespan, monetary costs and resource efficiency.

Keywords:  

Author(s) Name:  Huangke Chen,Xiaomin Zhu,Dishan Qiu,Ling Liu and Zhihui Du

Journal name:  IEEE Transactions on Parallel and Distributed Systems

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/TPDS.2017.2678507

Volume Information:  Sept. 2017, pp. 2674-2688, vol. 28