Saeed, HA, Al-Janabi, STF, Yassen, ET and Aldhaibani, OA (2025) Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet, 17 (2).
Preview |
Text
Survey on Secure Scientific Workflow Scheduling in Cloud Environments.pdf - Published Version Available under License Creative Commons Attribution. Download (2MB) | Preview |
Abstract
In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security of intermediate data, often transmitted between virtual machines during workflow execution, is critical for maintaining the integrity and confidentiality of scientific workflows. This review analyzes methods for securing scientific workflow scheduling in cloud environments, emphasizing the application of security principles such as confidentiality, authentication, and integrity. Various scheduling algorithms, including heuristics and metaheuristics, are examined for their effectiveness in balancing security with constraints like execution time and cost.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | 4606 Distributed Computing and Systems Software; 46 Information and Computing Sciences; 4604 Cybersecurity and Privacy; 46 Information and computing sciences |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science and Mathematics |
Publisher: | MDPI |
Date of acceptance: | 16 January 2025 |
Date of first compliant Open Access: | 6 June 2025 |
Date Deposited: | 06 Jun 2025 13:53 |
Last Modified: | 06 Jun 2025 14:00 |
DOI or ID number: | 10.3390/fi17020051 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/26543 |
![]() |
View Item |