期刊文献+

混合云环境下成本与隐私感知的工作流调度方法 被引量:5

Cost-aware and privacy-aware workflow scheduling strategy in hybrid clouds
下载PDF
导出
摘要 随着大数据时代的到来,大量企业采用混合云部署应用系统。针对现有云工作流调度方法未考虑工作流多个任务间隐私保护需求的不足,构建了混合云环境下成本与隐私感知的工作流调度模型,并提出一种相应的云工作流调度算法(CPHC)。该算法可在混合云环境下调度多个云工作流应用,并在满足隐私暴露风险与截止时间约束的前提下,优化执行成本。最后,通过仿真实验说明了所提算法的有效性。 With the advent of big data era,many companies have built their application systems in hybrid clouds.Aiming at the shortcoming of no consideration for privacy protection requirements among tasks in existing scheduling methods of cloud workflow normally,a model for cost-aware and privacy-aware workflow scheduling in hybrid clouds was constructed,and a corresponding scheduling strategy name CPHC was proposed.It could meet the privacy protection requirements under the deadline constraint,and reduce the cost and risks of privacy exposure involved in the execution of workflows.The result of simulation experiments showed the effectiveness of the proposed method.
作者 文一凭 王志斌 刘建勋 许小龙 陈爱民 曹步清 WEN Yiping;WANG Zhibin;LIU Jianxun;XU Xiaolong;CHEN Aimin;CAO Buqing(Hunan Provincial Unversity Key Laboratory of Knowledge Processing and Networked Manufacture,Hunan University of Science and Technology,Xiangtan 411201,China;School of Computer and Software,Nanjing University of Information Science&Technology,Nanjing 210044,China;Big Data and Industrial Innovation Development Center of Xiangtan,Xiangtan 411000,China)
出处 《计算机集成制造系统》 EI CSCD 北大核心 2020年第6期1582-1588,共7页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(61402167,61772193,61572187) 湖南省自然科学基金资助项目(2017JJ4036,2018JJ2139) 湖南省教育厅创新平台开放基金资助项目(17K033)。
关键词 混合云 工作流 隐私 成本 调度 hybrid cloud workflow privacy cost scheduling
  • 相关文献

参考文献1

二级参考文献18

  • 1BUYYA R, YEO C, VENUGOPAL S, et al. Cloud compu- ting and emerging IT platforms., vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems,2009,25(6) :599-616.
  • 2ALKHANAK E, LEE S, KHAN S. Cost-aware challenges for workflow scheduling approaches in cloud computing environ- ments: taxonomy and opportunities [J]. Future Generation Computer Systems,2015,50(9) :3-21.
  • 3KAUFMAN L. Data security in the world of cloud computing [J]. IEEE Security and Privacy, 2009,7 (4), 61-64.
  • 4WU Z, LIU X, NI Z, et al, A market-oriented hierarchical scheduling strategy in cloud workflow systems[J], The Journal of Supercomputing, 2013,63 (1) 256-293.
  • 5DURILLO J, PRODAN R. Multi-objective workflow scheduling in Amazon EC2[J]. Cluster Computing, 2014,17 (2) .. 169-189.
  • 6TOPCUOGLU H, HARIRI S, WU M. Performance-effective and low-complexity task scheduling for heterogeneous eompu- ting[J]. IEEE Transactions on Parallel and Distributed Sys- tems,2002,13(3) :260-274.
  • 7BILOGREVIC I, HUGUENIN K, AGIR B, et al. A machine- learning based approach to privacy-aware information-sharing in mobile social networks, pervasive and mobile computing [EB/OL]. (2015-01-31) [ 2015-10-121. http://dx, doi. org/ 10. 1016/j. pmcj. 2015.01. 006.
  • 8In Press. Available online. FABIAN B, ERMAKOVA T, JUNGHANNS P. Collabora- tive and secure sharing of healthcare data in multi-clouds[J]. Information Systems, 2015,48: 132-150. DOI: 10. 1016/j. is. 2014.05. 004.
  • 9YANG J, LI J, NIU Y. A hybrid solution for privacy preser- ving medical data sharing in the cloud environment[J]. Fu- ture Generation Computer Systems, 2015,43-44 : 74-86. DOI: 10. 1016/j. future. 2014.06. 004.
  • 10KE C, WANG R, XIAO F, et al. Requirement-oriented pri- vacy protection analysis architecture in cloud computing[J]. Journal of Communications, 2015,10 (1) : 55-63.

共引文献3

同被引文献34

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部