Journal
CHINESE JOURNAL OF ELECTRONICS
Volume 24, Issue 4, Pages 709-716Publisher
TECHNOLOGY EXCHANGE LIMITED HONG KONG
DOI: 10.1049/cje.2015.10.008
Keywords
Multi-DAGs scheduling; Security; Availability; Resource utilization
Categories
Funding
- National Natural Science Foundation of China [31370565]
- Doctoral Fund of the China Ministry of Education [20120062110012]
- Technological innovation talent research project in Harbin [2014RFQXJ132]
Ask authors/readers for more resources
In view of the issue concerns multiple Directed acyclic graphs (DAGs) scheduling in multi-tenant cloud computing environment, a scheduling strategy that integrate security and availability is proposed to satisfy the tenants' requirements for resource security and availability, as thus it can not only protect the users' privacy and data security but also advance the success rate. The proposal assesses resource reputation to ensure jobs can be scheduled onto relatively security nodes; during task scheduling, it classifies the DAGs to achieve fairness; in the process of resources allocation, the objective function would maximize the user's security satisfaction and minimize the deviation of availability; meanwhile, it takes advantage of time chips flexibly to promote resource utilization rate; afterwards, we present a Greedy algorithm integrating with security and availability (GISA) to implement the strategy. The experimental results show the correctness and superior of the novel strategy.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available