32
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Optimal Data Placement for Scientific Workflows in Cloud

References

  • Yang K, Jia X. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst. 2012;24(9):1717–26. doi:10.1109/TPDS.2012.278.
  • Usman M, Jan MA, He X. Cryptography-based secure data storage and sharing using HEVC and public clouds. Inf Sci (NY). 2017;387:90–102. doi:10.1016/j.ins.2016.08.059.
  • Sookhak M Dynamic remote data auditing for securing big data storage in cloud computing [ Doctoral dissertation]. University of Malaya; 2015
  • Xia Z, Wang X, Sun X, Wang Q. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst. 2015;27(2):340–52. doi:10.1109/TPDS.2015.2401003.
  • Zhao J, Ou S, Hu L, Ding Y, Xu G. A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration. Cluster Comput. 2017;20(4):3131–46. doi:10.1007/s10586-017-1011-4.
  • Balaji K, Sai Kiran P, Sunil Kumar M. Power aware virtual machine placement in IaaS cloud using discrete firefly algorithm. Appl Nanosci. 2023 Mar;13(3):2003–11. doi:10.1007/s13204-021-02337-x.
  • Gadde S, Amutharaj J, Usha S. Cloud multimedia data security by optimization-assisted cryptographic technique. Int J Image Graph. 2023;2450010. doi:10.1142/S0219467824500104.
  • Mangalagowri R, Venkataraman R. Ensure secured data transmission during virtual machine migration over cloud computing environment. Int J Syst Assur Eng Manag. 2023;1–2. doi:10.1007/s13198-022-01834-8.
  • Yang T, Yu B, Wang H, Li J, Lv Z. Cryptanalysis and improvement of Panda-public auditing for shared data in cloud and internet of things. Multimed Tools Appl. 2017;76(19):19411–28. doi:10.1007/s11042-015-3139-7.
  • He D, Wang H, Zhang J, Wang L. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf Sci (NY). 2017;375:48–53. doi:10.1016/j.ins.2016.09.049.
  • Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw. 2016;113:130–39. doi:10.1016/j.jss.2015.11.044.
  • Lin C, Shen Z, Chen Q, Sheldon FT. A data integrity verification scheme in mobile cloud computing. J Netw Comput Appl. 2017;77:146–51. doi:10.1016/j.jnca.2016.08.017.
  • Wang B, Li B, Li H. Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput. 2013;8(1):92–106. doi:10.1109/TSC.2013.2295611.
  • Sood SK. A combined approach to ensure data security in cloud computing. J Netw Comput Appl. 2012;35(6):1831–38. doi:10.1016/j.jnca.2012.07.007.
  • Worku SG, Xu C, Zhao J, He X. Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng. 2014;40(5):1703–13. doi:10.1016/j.compeleceng.2013.10.004.
  • Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services. IEEE Netw. 2010;24(4):19–24. doi:10.1109/MNET.2010.5510914.
  • Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS Dynamic audit services for integrity verification of outsourced storages in clouds. Proceedings of the 2011 ACM Symposium on Applied Computing; Taichung, Taiwan; 2011. p. 1550–57.
  • Chen HC, Lee PP. Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation. IEEE Trans Parallel Distrib Syst. 2013;25(2):407–16. doi:10.1109/TPDS.2013.164.
  • Yang K, Jia X. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web. 2012;15(4):409–28. doi:10.1007/s11280-011-0138-0.
  • Chen W, Paik I, Li Z. Tology-aware optimal data placement algorithm for network traffic optimization. IEEE Trans Comput. 2015;65(8):2603–17. doi:10.1109/TC.2015.2485230.
  • Guo L, He Z, Zhao S, Zhang N, Wang J, Jiang C. Multi-objective optimization for data placement strategy in cloud computing. Int Conf Inf Comput Appl. 2012;119–26.
  • Mansouri Y, Toosi AN, Buyya R. Cost optimization for dynamic replication and migration of data in cloud data centers. IEEE Trans Cloud Comput. 2017;7(3):705–18. doi:10.1109/TCC.2017.2659728.
  • Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BI. A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensic Secur. 2015;11(3):556–70. doi:10.1109/TIFS.2015.2505680.
  • Levitin G, Xing L, Dai Y. Optimal data partitioning in cloud computing system with random server assignment. Future Gen Comput Syst. 2017;70:17–25. doi:10.1016/j.future.2016.12.025.
  • Liu W, Peng S, Du W, Wang W, Zeng GS. Security-aware intermediate data placement strategy in scientific cloud workflows. Knowl Inf Syst. 2014;41(2):423–47. doi:10.1007/s10115-014-0755-x.
  • Xu X, Zhao X, Ruan F, Zhang J, Tian W, Dou W, Liu AX. Data placement for privacy-aware applications over big data in hybrid clouds. Secur Commun Netw. 2017;2017:1–15. doi:10.1155/2017/2376484.
  • Mohamed AA, Abdellatif AD, Alburaikan A, Khalifa HA, Elaziz MA, Abualigah L, AbdelMouty AM. A novel hybrid arithmetic optimization algorithm and salp swarm algorithm for data placement in cloud computing. Soft Comput. 2023;27(9):1–12. doi:10.1007/s00500-022-07805-2.
  • Shi W, Tang Q. Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment. J Comb Optim. 2023;45(1):22. doi:10.1007/s10878-022-00934-2.
  • Shimbre N, Deshpande P Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. 2015 International Conference on Computing Communication Control and Automation; Pune, India. IEEE; 2015. p. 35–39.
  • Blackwell TM, Kennedy J, Poli R. Particle swarm optimization. Swarm Intell. 2007;1(1):33–57. doi:10.1007/s11721-007-0002-0.
  • Fathollahi-Fard AM, Hajiaghaei-Keshteli M, Tavakkoli-Moghaddam R. Red deer algorithm (RDA): a new nature-inspired meta-heuristic. Soft Comput. 2020;24(19):14637–65. doi:10.1007/s00500-020-04812-z.
  • Xie Y, Zhu Y, Wang Y, Cheng Y, Xu R, Sani AS, Yuan D, Yang Y. A novel directional and non-local-convergent particle swarm optimization based workflow scheduling in cloud–edge environment. Future Gen Comput Syst. 2019;97:361–78. doi:10.1016/j.future.2019.03.005.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.