Prathap Kumar, K. and Rohini, R. (2024) Resource allocation on periotity based schuduling and improve the security using DSSHA-256. Data and Metadata, 3. p. 193. ISSN 2953-4917
![[thumbnail of Resource_allocation_on_periotity_based_schuduling_.pdf]](https://ir.vistas.ac.in/style/images/fileicons/archive.png)
Resource_allocation_on_periotity_based_schuduling_.pdf
Download (434kB)
Abstract
Resource allocation on periotity based schuduling and improve the security using DSSHA-256 K. Prathap Kumar R. Rohini
Cloud computing has gained popularity with advancements in virtualization technology and the deployment of 5G. However, scheduling workload in a heterogeneous multi-cloud environment is a complicated process. Users of cloud services want to ensure that their data is secure and private, especially sensitive or proprietary information. Several research works have been proposed to solve the challenges associated with cloud computing. The proposed Adaptive Priority based scheduling (PBS) focuses on reducing data access completion time and computation expense for task scheduling in cloud computing. PBS assigns tasks depending on its size and selects the minimum cost path for data access. It contains a task register, scheduler, and task execution components for efficient task execution. The proposed system also executes a double signature mechanism for data privacy and security in data storage. This study correlates the performance of three algorithms, PBS, (Task Requirement Degree) TRD and (recommended a Risk adaptive Access Control) RADAC, in terms of task execution time and makespan time. The experimental results demonstrate that PBS outperforms TRD and RADAC in both metrics, as the number of tasks increases. PBS has a minimum task execution time and a lower makespan time than the other two algorithms
01 30 2024 193 https://creativecommons.org/licenses/by/4.0 10.56294/dm2024193 https://dm.ageditor.ar/index.php/dm/article/view/333 https://dm.ageditor.ar/index.php/dm/article/download/333/27 https://dm.ageditor.ar/index.php/dm/article/download/333/27 https://dm.ageditor.ar/index.php/dm/article/download/333/28 10.1109/ISCO.2015.7282386 S. Debnath, B. Soni, U. Baruah, and D. K. Sah, “Text-dependent speaker veri�cation system: a review,” in Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–7, IEEE, Coimbatore, India, January 2015 10.1201/9780429438639-2 D. K. Sah, C. Shivalingagowda, and D. P. Kumar, “Optimization problems in wireless sensors networks,” Soft computing in wireless sensor networks, vol. 2018, pp. 41–62, 2018.. 10.1007/978-3-030-03508-2 D. N. K. Jayakody, K. Srinivasan, and V. Sharma, 5G Enabled Secure Wireless Networks, Springer International Publishing, Cham, 2019. 10.1016/j.jnca.2018.03.028 H. Hu, Z. Li, H. Hu et al., “Multi-objective scheduling for scientific workflow in multicloud environment,” Journal of Network and Computer Applications, vol. 114, pp. 108–122, 2018. 10.1016/j.simpat.2021.102338 C. Georgios, F. Evangelia, M. Christos, and N. Maria, “Exploring cost-efficient bundling in a multi-cloud environment,” Simulation Modelling Practice and Teory, vol. 111, Article ID 102338, 2021.. 10.1016/j.future.2022.04.035 Y. Kang, L. Pan, and S. Liu, “Job scheduling for big data analytical applications in clouds: a taxonomy study,” Future Generation Computer Systems, vol. 135, pp. 129–145, 2022.. 10.1016/j.eij.2020.09.003 S. A. Zakaryia, S. A. Ahmed, and M. K. Hussein, “Evolutionary offloading in an edge environment,” Egyptian Informatics Journal, vol. 22, no. 3, pp. 257–267, 2021.. 10.1007/s11227-014-1376-6 S. K. Panda and P. K. Jana, “Efficient task scheduling algorithms for heterogeneous multi-cloud environment,” 9e Journal of Supercomputing, vol. 71, no. 4, pp. 1505–1533, 2015 10.34306/itsdi.v1i2.103 T. Alam, “Cloud computing and its role in the information technology,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 1, no. 2, pp. 108–115, 2020 Castillo-Gonzalez W, Lepez CO, Bonardi MC. Augmented reality and environmental education: strategy for greater awareness. Gamification and Augmented Reality 2023;1:10–10. https://doi.org/10.56294/gr202310. Aveiro-Róbalo TR, Pérez-Del-Vallín V. Gamification for well-being: applications for health and fitness. Gamification and Augmented Reality 2023;1:16–16. https://doi.org/10.56294/gr202316. 10.1109/SURV.2013.050113.00090 Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud computing: taxonomy and open challenges,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 369–392, 2014 10.4236/jsea.2014.78063 R. Branch, H. Tjeerdsma, C. Wilson, R. Hurley, and S. Mcconnell, “Cloud computing and big data: a review of current service models and hardware perspectives,” Journal of Software Engineering and Applications, vol. 07, no. 08, pp. 686–693, 2014. 10.1007/978-3-319-27221-4_9 Shojafar, M.; Kardgar, M.; Hosseinabadi, A.A.R.; Shamshirband, S.; Abraham, A. TETS: A Genetic-Based Scheduler in Cloud Computing to Decrease Energy and Makespan. In Proceedings of the 15th International Conference HIS 2015 on Hybrid Intelligent Systems, Seoul, South Korea, 16–18 November 2015; pp. 103–115. 10.1007/s10586-018-2858-8 Panda, S.K.; Jana, P.K. An energy-ecient task scheduling algorithm for heterogeneous cloud computing systems. Clust. Comput. 2018. 10.5220/0005880802730282 Mhedheb, Y.; Streit, A. Energy-ecient Task Scheduling in Data Centers. In Proceedings of the 6th International Conference on Cloud Computing and Services Science, Rome, Italy, 23–25 April 2016; Volume 1, pp. 273–282. 10.1504/IJCSE.2016.078933 Khaleel, M.; Zhu, M.M. Energy-ecient Task Scheduling and Consolidation Algorithm for Workflow Jobs in Cloud. Int. J. Comput. Sci. Eng. 2016, 13, 268–284. Auza-Santiváñez JC, Díaz JAC, Cruz OAV, Robles-Nina SM, Escalante CS, Huanca BA. Bibliometric Analysis of the Worldwide Scholarly Output on Artificial Intelligence in Scopus. Gamification and Augmented Reality 2023;1:11–11. https://doi.org/10.56294/gr202311. Castillo JIR. Aumented reality im surgery: improving precision and reducing ridk. Gamification and Augmented Reality 2023;1:15–15. https://doi.org/10.56294/gr202315. 10.1016/j.jnca.2015.05.001 Zhao, Q.; Xiong, C.; Yu, C.; Zhang, C.; Zhao, X.Anew energy-aware task scheduling method for data-intensive applications in the cloud. J. Netw. Comput. Appl. 2016, 59, 14–27. Fall, D.; Blanc, G.; Okuda, T.; Kadobayashi, Y.; Yamaguchi, S. Toward quantified risk-adaptive access control for multi-tenant cloud computing. In Proceedings of the 6th Joint Workshop on Information Security, Tokyo, Japan, 8–10 November 2011; pp. 1–14. Yu, E.; Cysneiros, L. Designing for privacy and other competing requirements. In Proceedings of the 2nd Symposium on Requirements Engineering for Information Security (SREIS’02), Raleigh, NC, USA, 16–18 October 2002; pp. 15–16. 10.1145/767193.767196 Kobsa, A.; Schreck, J. Privacy through pseudonymity in user-adaptive systems. ACM Trans. Internet Technol. 2003, 3, 149–183. 10.1109/WETICE.2019.00073 Sgaglione, L.; Coppolino, L.; D’Antonio, S.; Mazzeo, G.; Romano, L.; Cotroneo, D.; Scognamiglio, A. Privacy Preserving Intrusion Detection Via Homomorphic Encryption. In Proceedings of the 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Napoli, Italy, 12–14 June 2019; pp. 321–326.
Item Type: | Article |
---|---|
Subjects: | Computer Applications > Computer Graphics |
Divisions: | Computer Applications |
Depositing User: | Mr IR Admin |
Date Deposited: | 09 Oct 2024 10:36 |
Last Modified: | 09 Oct 2024 10:36 |
URI: | https://ir.vistas.ac.in/id/eprint/9583 |