Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions.

Saved in:
Bibliographic Details
Title: Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions.
Authors: Alam, Mahfooz, Shahid, Mohammad, Mustajab, Suhel
Source: Journal of Supercomputing; May2024, Vol. 80 Issue 8, p11491-11555, 65p
Subject Terms: WORKFLOW, CLOUD computing, WORKFLOW management systems, SERVICE level agreements, VIRTUAL machine systems, TAXONOMY, RESEARCH personnel
Abstract: In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Supercomputing is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends. [ABSTRACT FROM AUTHOR]
ISSN:09208542
DOI:10.1007/s11227-023-05873-1