Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3264560.3264568acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbdcConference Proceedingsconference-collections
research-article

SSM: Scheduling Security Model for a Cloud Environment

Published: 03 August 2018 Publication History

Abstract

Scheduling in the cloud is a complex task due to the number and variety of resources available and the volatility of usage-patterns of resources considering that the resource setting is on the service provider. This complexity is compounded further when Security issues and Quality of Service (QoS) are also factored in. The aim of this paper is to describe a model that based on Security (SSM) as a key element that cloud services rely on which affects the performance, cost and time concerns within the security constraints of the cloud service. Definition of the Scheduling Security Model (SSM), and evaluation through worked example that can meet the customer requirements of cost and the quality of service in the required time.

References

[1]
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., and Stoica, I. Above the clouds: a berkeley view of cloud computing. University of California at Berkeley (2009).
[2]
Bessani, A., Correia, M., Quaresma, B., André, F., and Sousa, P. Depsky: dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage (TOS) 9, 4 (2013), 12.
[3]
Buyya, R., Ranjan, R., and Calheiros, R. Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. International Conference on Algorithms and Architectures for Parallel Processing (2010), 13--31.
[4]
Cachin, C., Haas, R., and Vukolic, M. Dependable storage in the intercloud. Tech. rep., Research Report RZ, 3783, 2010.
[5]
Chang, V., Bacigalupo, D., Wills, G., and De Roure, D. A categorisation of cloud computing business models. Proceedings of the 10th ieee/acm international conference on cluster, cloud and grid computing (2010), 509--512.
[6]
Che, J., Duan, Y., Zhang, T., and Fan, J. Study on the security models and strategies of cloud computing. Procedia Engineering 23 (2011), 586--593.
[7]
Hu, Y., Chen, H. C., Lee, P. P., and Tang, Y. Nccloud: applying network coding for the storage repair in a cloud-of-clouds. FAST (2012), 21.
[8]
Jackson, D., Snell, Q., and Clement, M. Core algorithms of the maui scheduler. Workshop on Job Scheduling Strategies for Parallel Processing (2001), Workshop on Job Scheduling Strategies for Parallel Processing pp.87--102.
[9]
Kim, Y. G., Wang, Y., Park, B., and Choi, H. H. A heuristic resource scheduling scheme in time-constrained networks. Computers & Electrical Engineering 54 (2016), 1--15.
[10]
Li, Q., Hao, Q., Xiao, L., and Li, Z. Adaptive management of virtualized resources in cloud computing using feedback control. First International Conference on Information Science and Engineering, IEEE (2009), 99--102.
[11]
Nallur, V., and Bahsoon, R. A decentralized self-adaptation mechanism for service-based applications in the cloud. IEEE Transactions on Software Engineering 39, 5 (2013), 591--612.
[12]
Patil, R., and Singh, R. Scaling in cloud computing. International Journal of Advance Research, IJOAR 1 (2013), 21--27.
[13]
Paul, W. A multi-level security model for partitioning workflows over federated clouds. Journal of Cloud Computing, Springer 1, 1 (2012), 1--15.
[14]
Tripathy, L., and Patra, R. R. Scheduling in cloud computing. International Journal on Cloud Computing: Services and Architecture (IJCCSA) 4, 5 (2014), 21--7.
[15]
Wongthai, W., Rocha, F., and Van Moorsel, A. Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud. Cloud Computing and Big Data (CloudCom-Asia), International Conference on IEEE (2013), 163--170.
[16]
Xie, T., and Qin, X. Scheduling security-critical real-time applications on clusters. IEEE Transactions on Computers 55, 7 (2006), 864--879.

Cited By

View all
  • (2019)Cost and Effect of Using Scheduling Security Model in a Cloud Environment2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.00-12(95-101)Online publication date: Jun-2019

Index Terms

  1. SSM: Scheduling Security Model for a Cloud Environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCBDC '18: Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing
    August 2018
    98 pages
    ISBN:9781450364744
    DOI:10.1145/3264560
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    In-Cooperation

    • Brookes: Oxford Brookes University
    • Northumbria University: University of Northumbria at Newcastle

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 August 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud Computing
    2. Cost
    3. Model
    4. Scheduling
    5. Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCBDC'18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Cost and Effect of Using Scheduling Security Model in a Cloud Environment2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.00-12(95-101)Online publication date: Jun-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media