4.6 Article

Modeling adaptive security-aware task allocation in mobile cloud computing

期刊

出版社

ELSEVIER
DOI: 10.1016/j.simpat.2022.102491

关键词

Security; Mobile Cloud Computing; Machine learning; Simulation

资金

  1. Polish Ministry of Science and Higher Education
  2. GUARD European Commission project, Poland [833456]

向作者/读者索取更多资源

In this paper, a security-aware task allocation model strategy is proposed for Mobile Cloud Computing. The model generates an optimal and secure configuration of communication protocols to meet the specific data confidentiality requirements defined by end users. Resource utilization is predicted using Machine Learning methods, and the optimal secure service for task execution is selected. The results show a significant improvement in the level of security compared to a configuration based on processing time and energy consumption as the main criteria for task allocation.
Security is one of the most important criteria in the management of cloud resources. In Mobile Cloud Computing (MCC), secure allocation of tasks remains challenging due to the limited storage, battery life and computational power of mobile devices connected to the core cloud cluster infrastructure. Secure wireless communication channels and protocols for protecting the data and information sent to the cloud, and remote access to secure cloud services, are other important problems related to task scheduling and processing in dynamic MCC. In this paper, we developed a new security-aware task allocation model strategy in Mobile Cloud Computing. In this model, we define an allocation algorithm which generates an optimal and secure configuration of communication protocols in order to meet the specific data confidentiality requirements defined by end users. Resource utilization is predicted using Machine Learning methods, and the optimal secure service for task execution is selected. We developed a simulation environment (MocSecSim) for the evaluation of the algorithms proposed in several scenarios based on the users' requirements. The results of simulations and experiments have demonstrated that the model proposed significantly improves the level of security of calculations in comparison with a configuration where processing time and energy consumption are the main criteria for optimizing task allocation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据