Survey on Secure Scientific Workflow Scheduling in Cloud Environments

Saeed, HA, Al-Janabi, STF, Yassen, ET and Aldhaibani, OA (2025) Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet, 17 (2).

[thumbnail of Survey on Secure Scientific Workflow Scheduling in Cloud Environments.pdf]
Preview
Text
Survey on Secure Scientific Workflow Scheduling in Cloud Environments.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security of intermediate data, often transmitted between virtual machines during workflow execution, is critical for maintaining the integrity and confidentiality of scientific workflows. This review analyzes methods for securing scientific workflow scheduling in cloud environments, emphasizing the application of security principles such as confidentiality, authentication, and integrity. Various scheduling algorithms, including heuristics and metaheuristics, are examined for their effectiveness in balancing security with constraints like execution time and cost.

Item Type: Article
Uncontrolled Keywords: 4606 Distributed Computing and Systems Software; 46 Information and Computing Sciences; 4604 Cybersecurity and Privacy; 46 Information and computing sciences
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science and Mathematics
Publisher: MDPI
Date of acceptance: 16 January 2025
Date of first compliant Open Access: 6 June 2025
Date Deposited: 06 Jun 2025 13:53
Last Modified: 06 Jun 2025 14:00
DOI or ID number: 10.3390/fi17020051
URI: https://researchonline.ljmu.ac.uk/id/eprint/26543
View Item View Item