CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model
The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operatin...
Uloženo v:
| Vydáno v: | Future generation computer systems Ročník 111; s. 460 - 474 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.10.2020
|
| Témata: | |
| ISSN: | 0167-739X, 1872-7115 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operating system vulnerabilities are regarded as different “attack” strategies; and different operating system distributions in a virtual machine cluster executing the workflows are regarded as different “defense” strategies. The information of the attacker and defender is not balanced. In other words, the defender cannot obtain the information about the attacker’s strategies, while the attacker can acquire information about the defender’s strategies through a network scan. Therefore, we propose to dynamically switch the defense strategies during the workflow execution, which can weaken the network scan effects and transform the workflow security problem into an attack–defense game problem. Then, the probability distribution of the optimal mixed defense strategies can be achieved by calculating the Nash Equilibrium in the attack–defense game model. Based on this probability, diverse VMs are provisioned for workflow execution. Furthermore, a task-VM mapping algorithm based on dynamic Heterogeneous Earliest Finish Time (HEFT) is presented to accelerate the defense strategy switching and improve workflow efficiency. The experiments are conducted on both simulation and actual environment, experimental results demonstrate that compared with other algorithms, the proposed algorithm can reduce the attacker’s benefits by around 15.23%, and decrease the time costs of the algorithm by around 7.86%.
•Workflow scheduling is used as a defense method to secure cloud scientific workflows.•CLOSURE can weaken reconnaissance effects by switching defense strategies.•Dynamic HEFT is proposed to speed-up the switching period of defense strategies.•We built a prototype system based on OpenStack. |
|---|---|
| AbstractList | The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operating system vulnerabilities are regarded as different “attack” strategies; and different operating system distributions in a virtual machine cluster executing the workflows are regarded as different “defense” strategies. The information of the attacker and defender is not balanced. In other words, the defender cannot obtain the information about the attacker’s strategies, while the attacker can acquire information about the defender’s strategies through a network scan. Therefore, we propose to dynamically switch the defense strategies during the workflow execution, which can weaken the network scan effects and transform the workflow security problem into an attack–defense game problem. Then, the probability distribution of the optimal mixed defense strategies can be achieved by calculating the Nash Equilibrium in the attack–defense game model. Based on this probability, diverse VMs are provisioned for workflow execution. Furthermore, a task-VM mapping algorithm based on dynamic Heterogeneous Earliest Finish Time (HEFT) is presented to accelerate the defense strategy switching and improve workflow efficiency. The experiments are conducted on both simulation and actual environment, experimental results demonstrate that compared with other algorithms, the proposed algorithm can reduce the attacker’s benefits by around 15.23%, and decrease the time costs of the algorithm by around 7.86%.
•Workflow scheduling is used as a defense method to secure cloud scientific workflows.•CLOSURE can weaken reconnaissance effects by switching defense strategies.•Dynamic HEFT is proposed to speed-up the switching period of defense strategies.•We built a prototype system based on OpenStack. |
| Author | Baker, Thar Guo, Yunfei Guo, Zehua Liu, Wenyan Wang, Yawen |
| Author_xml | – sequence: 1 givenname: Yawen surname: Wang fullname: Wang, Yawen organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China – sequence: 2 givenname: Yunfei surname: Guo fullname: Guo, Yunfei organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China – sequence: 3 givenname: Zehua surname: Guo fullname: Guo, Zehua email: guolizihao@hotmail.com organization: Beijing Institute of Technology, Beijing 100081, China – sequence: 4 givenname: Thar surname: Baker fullname: Baker, Thar organization: Liverpool John Moores University, Liverpool L3 3AF, UK – sequence: 5 givenname: Wenyan surname: Liu fullname: Liu, Wenyan organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China |
| BookMark | eNqFkM1KAzEUhYMo2Kpv4CIvMGPuZCbTcSGUUn-gIKgFV4Y0ualppxPJpBZ3voNv6JM4ta5c6OrC4X4Hztcn-41vkJBTYCkwEGeL1K7jOmCaMahSgJQxvkd6MCizpAQo9kmveyuTklePh6TftgvGGJQceuRpNLm9n96Nz-mQ6tqvDW21wyY66zTd-LC0td902TOade2aOVX13AcXn1d0plo01DdUxaj08vP9w6DFpkU6VyukK2-wPiYHVtUtnvzcIzK9HD-MrpPJ7dXNaDhJNGciJkplM1OKiitdaZaLAVYW7UyowgwynlvOoRCYlzovLIh8plWhqgEyVmQgCmH5ETnf9erg2zagldpFFZ1vYlCulsDk1pRcyJ0puTUlAWRnqoPzX_BLcCsV3v7DLnYYdsNeHQb5rU6jcQF1lMa7vwu-AO9KiXI |
| CitedBy_id | crossref_primary_10_1109_TII_2024_3393560 crossref_primary_10_1109_MNET_001_2200593 crossref_primary_10_1016_j_ins_2021_03_003 crossref_primary_10_1109_TPDS_2021_3135907 crossref_primary_10_1016_j_future_2022_07_007 crossref_primary_10_1109_TNSE_2020_2981449 crossref_primary_10_1007_s10586_022_03579_2 crossref_primary_10_1016_j_future_2023_05_015 crossref_primary_10_1007_s12083_023_01541_6 crossref_primary_10_3390_electronics13030487 crossref_primary_10_1016_j_jnca_2023_103648 crossref_primary_10_1007_s00607_020_00838_1 crossref_primary_10_1007_s11227_021_03842_0 crossref_primary_10_7717_peerj_cs_747 crossref_primary_10_1007_s11432_021_3462_4 crossref_primary_10_3390_fi17020051 crossref_primary_10_1109_JIOT_2025_3533016 crossref_primary_10_1016_j_measurement_2021_110175 crossref_primary_10_1109_TCC_2021_3057422 crossref_primary_10_1109_JIOT_2020_3026493 crossref_primary_10_1002_cpe_7409 crossref_primary_10_1016_j_jpdc_2020_03_022 crossref_primary_10_1007_s12652_021_03187_9 crossref_primary_10_1007_s00607_020_00866_x crossref_primary_10_1051_itmconf_20235401005 crossref_primary_10_1007_s10586_023_03998_9 crossref_primary_10_1007_s11432_021_3408_y crossref_primary_10_1109_ACCESS_2020_3032545 crossref_primary_10_1186_s13638_021_01912_8 crossref_primary_10_1080_23311916_2023_2287303 crossref_primary_10_1016_j_future_2025_107708 |
| Cites_doi | 10.1016/j.parco.2017.01.002 10.4028/www.scientific.net/AMM.539.374 10.1109/TCC.2015.2489638 10.1145/1645164.1645167 10.1631/FITEE.1800621 10.1109/TPDS.2017.2687923 10.1109/ACCESS.2019.2938823 10.1016/j.ins.2017.01.035 10.1016/j.future.2014.10.008 10.1109/MCSE.2010.70 10.1109/IWQoS.2016.7590399 10.1007/s10115-014-0755-x 10.1007/s10723-015-9337-8 10.1109/TCC.2015.2453966 10.1587/transinf.2016EDP7346 10.1002/spe.2180 10.1016/j.knosys.2016.01.037 10.1155/2018/3759626 10.1109/TPDS.2017.2678507 10.1109/ACCESS.2017.2691326 10.1109/TPDS.2011.66 10.3390/fi9020020 10.1016/j.knosys.2015.02.012 10.1109/COMST.2016.2556979 10.1109/TCC.2015.2404807 10.1016/j.jpdc.2011.01.008 10.1016/j.ins.2015.01.025 10.1007/s10922-012-9253-1 10.1631/FITEE.1601321 10.1109/71.993206 10.1109/TSC.2016.2543719 10.1109/ACCESS.2015.2508940 10.1109/MIC.2016.15 10.1002/cpe.1636 10.1016/j.jpdc.2014.09.002 10.1016/j.future.2015.12.014 10.1007/s00500-017-2897-8 10.1109/TSC.2009.4 10.1002/cpe.4041 10.1007/s11227-015-1438-4 |
| ContentType | Journal Article |
| Copyright | 2019 Elsevier B.V. |
| Copyright_xml | – notice: 2019 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.future.2019.11.003 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7115 |
| EndPage | 474 |
| ExternalDocumentID | 10_1016_j_future_2019_11_003 S0167739X19313603 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-aa2bd7693ac9c0468e9fefb6a5d8234f33156e47c45f164bca5a98e00521656f3 |
| ISICitedReferencesCount | 33 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000541155100034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-739X |
| IngestDate | Tue Nov 18 22:40:03 EST 2025 Sat Nov 29 07:26:55 EST 2025 Fri Feb 23 02:47:12 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Moving target defense Attack–defense game Scientific workflow Workflow scheduling Diverse operating systems |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-aa2bd7693ac9c0468e9fefb6a5d8234f33156e47c45f164bca5a98e00521656f3 |
| PageCount | 15 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_future_2019_11_003 crossref_primary_10_1016_j_future_2019_11_003 elsevier_sciencedirect_doi_10_1016_j_future_2019_11_003 |
| PublicationCentury | 2000 |
| PublicationDate | October 2020 2020-10-00 |
| PublicationDateYYYYMMDD | 2020-10-01 |
| PublicationDate_xml | – month: 10 year: 2020 text: October 2020 |
| PublicationDecade | 2020 |
| PublicationTitle | Future generation computer systems |
| PublicationYear | 2020 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Liu, Ge, Yarom (b49) 2016 Guo, Bhattacharya (b17) 2014 Musial, Guzek, Bouvry (b66) 2018 Rodriguez, Buyya (b8) 2017; 29 Conitzer, Sandholm (b74) 2006 Poola, Ramamohanarao, Buyya (b39) 2016; 10 Zhang, Chen (b45) 2013; 21 Sujana, Revathi, Priya (b52) 2019; 23 Nepal, Sinnott, Friedrich (b16) 2015; 5 Yuan, Yang, Liu (b7) 2012; 24 Chen, Zhu, Qiu (b5) 2017; 28 S. Bharathi, A. Chervenak, E. Deelman, et al. Characterization of scientific workflows, in: IEEE Workshop on Workflows in Support of Large-Scale Science, Austin, USA, 2008, pp. 1–10. Lee, Han, Zomaya (b34) 2015; 80 Feng, Zheng, Mohapatra (b54) 2017 Rowe, Levitt, Demir (b57) 2012 Zhao, Li, Raicu (b1) 2014 Del Piccolo, Amamou, Haddadou (b71) 2016; 18 Szefer, Keller, Lee (b44) 2011 Lin, Lu, Fei (b68) 2009; 2 Manadhata (b61) 2013 Carter, Riordan, Okhravi (b63) 2014 Wang, Yang, Fu (b48) 2016 Osborne, Rubinstein (b73) 1994 Garcia, Bessani, Gashi (b19) 2014; 44 Yao, Ding, Hao (b27) 2017; 28 . Zuo, Shu, Dong (b25) 2015; 3 Byun, Kee, Kim (b28) 2011; 71 Chen, Deelman (b30) 2012 Irazoqui, Eisenbarth, Sunar (b51) 2015 Narayana, Pasupuleti (b14) 2018 Song (b46) 2014; 539 Sengupta, Vadlamudi, Kambhampati (b55) 2017 Topcuoglu, Hariri, Wu (b29) 2002; 13 Adams, Hitefield, Hoy (b58) 2013 Abass, Xiao, Mandayam (b65) 2017; 5 Kliazovich, Pecero, Tchernykh (b67) 2016; 14 Zhu, Basar (b62) 2013 Liu, Peng, Du (b41) 2014; 41 Liu, Yarom, Ge (b50) 2015 Ostermann, Iosup, Yigitbasi (b75) 2009 Wang, Guo, Liu (b78) 2018; 55 Z. Guo, S. Hui, Y. Xu, et al. Dynamic flow scheduling for power efficient data center networks, in: IEEE/ACM International Symposium on Quality of Service, Beijing, China, 2016, pp. 1–10. Ding, Yao, Hao (b37) 2017; 393 Xu, Dou, Zhang (b35) 2016; 4 Wu, Wu, Tan (b22) 2015; 71 Pietri, Malawski, Juve (b33) 2013 Feng, Zheng, Cansever (b56) 2017 Sefraoui, Aissaoui, Eleuldj (b31) 2012; 55 Iosup, Ostermann, Yigitbasi (b3) 2011; 22 Chen, Zhu, Qiu (b42) 2017; 28 Zhou, He, Liu (b23) 2016; 4 Deelman, Vahi, Juve (b77) 2015; 46 Wang, Wu, Guo (b15) 2018; 19 Lei, Zhang, Tan (b21) 2018 Rodriguez, Buyya (b26) 2015 Rehr, Vila, Gardner (b2) 2010; 12 Cai, Wang, Hu (b20) 2016; 17 Feng, Zheng, Mohapatra (b64) 2017 Wang, Guo, Guo (b70) 2019; 7 Wen, Cała, Watson (b53) 2016; 10 Zeng, Veeravalli, Li (b40) 2015; 75 John, Smith, Turkett (b60) 2014 Jiang, Song (b24) 2017; 100 Wang, Wu, Guo (b11) 2016 Sen (b47) 2015 Atya, Qian, Krishnamurthy (b9) 2017 Wu, Lei, Chen (b12) 2017; 9 Campanelli, Gennaro (b72) 2015 Ai, Chen, Guo (b18) 2019 Yao, Ding, Ren (b38) 2016; 99 Li, Ge, Yang (b13) 2016; 65 Ali, Khan, Vasilakos (b43) 2015; 305 M. Crouse, E.W. Fulp, D. Canas, Improving the diversity defense of genetic algorithm-based moving target approaches, in: Proceedings of the National Symposium on Moving Target Research, 2012. Deelman, Vahi, Rynge (b4) 2016; 20 Verma, Kaushal (b76) 2017; 62 Zhang, Juels, Reiter (b10) 2014 Deelman (10.1016/j.future.2019.11.003_b77) 2015; 46 Wen (10.1016/j.future.2019.11.003_b53) 2016; 10 Wang (10.1016/j.future.2019.11.003_b78) 2018; 55 Lee (10.1016/j.future.2019.11.003_b34) 2015; 80 Chen (10.1016/j.future.2019.11.003_b30) 2012 Zuo (10.1016/j.future.2019.11.003_b25) 2015; 3 Yuan (10.1016/j.future.2019.11.003_b7) 2012; 24 Ostermann (10.1016/j.future.2019.11.003_b75) 2009 Chen (10.1016/j.future.2019.11.003_b42) 2017; 28 Campanelli (10.1016/j.future.2019.11.003_b72) 2015 Ai (10.1016/j.future.2019.11.003_b18) 2019 Feng (10.1016/j.future.2019.11.003_b56) 2017 Wu (10.1016/j.future.2019.11.003_b12) 2017; 9 Rowe (10.1016/j.future.2019.11.003_b57) 2012 Deelman (10.1016/j.future.2019.11.003_b4) 2016; 20 Sengupta (10.1016/j.future.2019.11.003_b55) 2017 Lei (10.1016/j.future.2019.11.003_b21) 2018 Cai (10.1016/j.future.2019.11.003_b20) 2016; 17 Szefer (10.1016/j.future.2019.11.003_b44) 2011 Zhu (10.1016/j.future.2019.11.003_b62) 2013 Musial (10.1016/j.future.2019.11.003_b66) 2018 Liu (10.1016/j.future.2019.11.003_b49) 2016 Kliazovich (10.1016/j.future.2019.11.003_b67) 2016; 14 Iosup (10.1016/j.future.2019.11.003_b3) 2011; 22 Atya (10.1016/j.future.2019.11.003_b9) 2017 Del Piccolo (10.1016/j.future.2019.11.003_b71) 2016; 18 10.1016/j.future.2019.11.003_b59 Sefraoui (10.1016/j.future.2019.11.003_b31) 2012; 55 Feng (10.1016/j.future.2019.11.003_b54) 2017 Sujana (10.1016/j.future.2019.11.003_b52) 2019; 23 Chen (10.1016/j.future.2019.11.003_b5) 2017; 28 Irazoqui (10.1016/j.future.2019.11.003_b51) 2015 Conitzer (10.1016/j.future.2019.11.003_b74) 2006 Osborne (10.1016/j.future.2019.11.003_b73) 1994 Zhou (10.1016/j.future.2019.11.003_b23) 2016; 4 Rodriguez (10.1016/j.future.2019.11.003_b8) 2017; 29 Liu (10.1016/j.future.2019.11.003_b41) 2014; 41 Nepal (10.1016/j.future.2019.11.003_b16) 2015; 5 Adams (10.1016/j.future.2019.11.003_b58) 2013 Wang (10.1016/j.future.2019.11.003_b11) 2016 Topcuoglu (10.1016/j.future.2019.11.003_b29) 2002; 13 Zhao (10.1016/j.future.2019.11.003_b1) 2014 Yao (10.1016/j.future.2019.11.003_b38) 2016; 99 Yao (10.1016/j.future.2019.11.003_b27) 2017; 28 10.1016/j.future.2019.11.003_b69 10.1016/j.future.2019.11.003_b6 Garcia (10.1016/j.future.2019.11.003_b19) 2014; 44 Pietri (10.1016/j.future.2019.11.003_b33) 2013 Poola (10.1016/j.future.2019.11.003_b39) 2016; 10 Wang (10.1016/j.future.2019.11.003_b48) 2016 Xu (10.1016/j.future.2019.11.003_b35) 2016; 4 Byun (10.1016/j.future.2019.11.003_b28) 2011; 71 Wang (10.1016/j.future.2019.11.003_b15) 2018; 19 Zhang (10.1016/j.future.2019.11.003_b10) 2014 Wang (10.1016/j.future.2019.11.003_b70) 2019; 7 Guo (10.1016/j.future.2019.11.003_b17) 2014 Ding (10.1016/j.future.2019.11.003_b37) 2017; 393 Ali (10.1016/j.future.2019.11.003_b43) 2015; 305 Rodriguez (10.1016/j.future.2019.11.003_b26) 2015 Lin (10.1016/j.future.2019.11.003_b68) 2009; 2 Zhang (10.1016/j.future.2019.11.003_b45) 2013; 21 Carter (10.1016/j.future.2019.11.003_b63) 2014 Abass (10.1016/j.future.2019.11.003_b65) 2017; 5 Liu (10.1016/j.future.2019.11.003_b50) 2015 Narayana (10.1016/j.future.2019.11.003_b14) 2018 10.1016/j.future.2019.11.003_b36 Feng (10.1016/j.future.2019.11.003_b64) 2017 Sen (10.1016/j.future.2019.11.003_b47) 2015 Verma (10.1016/j.future.2019.11.003_b76) 2017; 62 Jiang (10.1016/j.future.2019.11.003_b24) 2017; 100 Song (10.1016/j.future.2019.11.003_b46) 2014; 539 Manadhata (10.1016/j.future.2019.11.003_b61) 2013 Li (10.1016/j.future.2019.11.003_b13) 2016; 65 John (10.1016/j.future.2019.11.003_b60) 2014 Rehr (10.1016/j.future.2019.11.003_b2) 2010; 12 10.1016/j.future.2019.11.003_b32 Zeng (10.1016/j.future.2019.11.003_b40) 2015; 75 Wu (10.1016/j.future.2019.11.003_b22) 2015; 71 |
| References_xml | – volume: 71 start-page: 848 year: 2011 end-page: 862 ident: b28 article-title: BTS: Resource capacity estimate for time-targeted science workflows publication-title: J. Parallel Distrib. Comput. – year: 1994 ident: b73 article-title: A Course in Game Theory – volume: 99 start-page: 39 year: 2016 end-page: 50 ident: b38 article-title: An immune system-inspired rescheduling algorithm for workflow in cloud systems publication-title: Knowl.-Based Syst. – start-page: 406 year: 2016 end-page: 418 ident: b49 article-title: Catalyst: Defeating last-level cache side channel attacks in cloud computing publication-title: 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA) – volume: 44 start-page: 735 year: 2014 end-page: 770 ident: b19 article-title: Analysis of operating system diversity for intrusion tolerance publication-title: Softw. - Pract. Exp. – start-page: 41 year: 2014 end-page: 44 ident: b17 article-title: Diverse virtual replicas for improving intrusion tolerance in cloud publication-title: Proceedings of the 9th Annual Cyber and Information Security Research Conference – start-page: 82 year: 2006 end-page: 90 ident: b74 article-title: Computing the optimal strategy to commit to publication-title: Proceedings of the 7th ACM Conference on Electronic Commerce – reference: S. Bharathi, A. Chervenak, E. Deelman, et al. Characterization of scientific workflows, in: IEEE Workshop on Workflows in Support of Large-Scale Science, Austin, USA, 2008, pp. 1–10. – volume: 24 start-page: 956 year: 2012 end-page: 976 ident: b7 article-title: A data dependency based strategy for intermediate data storage in scientific cloud workflow systems publication-title: Concurr. Comput.: Pract. Exper. – volume: 41 start-page: 423 year: 2014 end-page: 447 ident: b41 article-title: Security-aware intermediate data placement strategy in scientific cloud workflows publication-title: Knowl. Inf. Syst. – volume: 55 start-page: 38 year: 2012 end-page: 42 ident: b31 article-title: OpenStack: toward an open-source solution for cloud computing publication-title: Int. J. Comput. Appl. – start-page: 605 year: 2015 end-page: 622 ident: b50 article-title: Last-level cache side-channel attacks are practical publication-title: IEEE Symposium on Security and Privacy – volume: 21 start-page: 562 year: 2013 end-page: 587 ident: b45 article-title: Security-preserving live migration of virtual machines in the cloud publication-title: J. Netw. Syst. Manage. – volume: 19 start-page: 1522 year: 2018 end-page: 1536 ident: b15 article-title: Scientific workflow execution system based on mimic defense in the cloud environment publication-title: Front. Inf. Technol. Electron. Eng. – volume: 4 start-page: 166 year: 2016 end-page: 179 ident: b35 article-title: EnReal: An energy-aware resource allocation method for scientific workflow executions in cloud environment publication-title: IEEE Trans. Cloud Comput. – volume: 62 start-page: 1 year: 2017 end-page: 19 ident: b76 article-title: A hybrid multi-objective particle swarm optimization for scientific workflow scheduling publication-title: Parallel Comput. – start-page: 401 year: 2011 end-page: 412 ident: b44 article-title: Eliminating the hypervisor attack surface for a more secure cloud publication-title: Proceedings of the 18th ACM Conference on Computer and Communications Security – volume: 2 start-page: 79 year: 2009 end-page: 92 ident: b68 article-title: Architecture for scientific workflow management systems and the VIEW SOA solution publication-title: IEEE Trans. Serv. Comput. – volume: 18 start-page: 2787 year: 2016 end-page: 2821 ident: b71 article-title: A survey of network isolation solutions for multi-tenant data centers publication-title: IEEE Commun. Surv. Tutor. – volume: 5 start-page: 8482 year: 2017 end-page: 8491 ident: b65 article-title: Evolutionary game theoretic analysis of advanced persistent threats against cloud storage publication-title: IEEE Access – start-page: 990 year: 2014 end-page: 1003 ident: b10 article-title: Cross-tenant side-channel attacks in PaaS clouds publication-title: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security – volume: 65 start-page: 140 year: 2016 end-page: 152 ident: b13 article-title: A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds publication-title: Future Gener. Comput. Syst. – volume: 55 start-page: 66 year: 2018 end-page: 75 ident: b78 article-title: A task scheduling method for cloud workflow security publication-title: J. Comput. Res. Dev. – year: 2012 ident: b57 article-title: Artificial diversity as maneuvers in a control theoretic moving target defense publication-title: National Symposium on Moving Target Research – start-page: 655 year: 2018 end-page: 665 ident: b14 article-title: Trusted model for virtual machine security in cloud computing publication-title: Progress in Computing, Analytics and Networking – volume: 28 start-page: 2674 year: 2017 end-page: 2688 ident: b42 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. – start-page: 178 year: 2017 end-page: 186 ident: b55 article-title: A game theoretic approach to strategy generation for moving target defense in web applications publication-title: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems – volume: 71 start-page: 3373 year: 2015 end-page: 3418 ident: b22 article-title: Workflow scheduling in cloud: a survey publication-title: J. Supercomput. – reference: M. Crouse, E.W. Fulp, D. Canas, Improving the diversity defense of genetic algorithm-based moving target approaches, in: Proceedings of the National Symposium on Moving Target Research, 2012. – start-page: 1 year: 2012 end-page: 8 ident: b30 article-title: Workflowsim: A toolkit for simulating scientific workflows in distributed environments publication-title: 2012 IEEE 8th International Conference on E-Science – volume: 28 start-page: 2674 year: 2017 end-page: 2688 ident: b5 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. – start-page: 315 year: 2017 end-page: 335 ident: b64 article-title: A stackelberg game and markov modeling of moving target defense publication-title: International Conference on Decision and Game Theory for Security – start-page: 270 year: 2015 end-page: 288 ident: b72 article-title: Sequentially composable rational proofs publication-title: International Conference on Decision and Game Theory for Security – volume: 17 start-page: 1122 year: 2016 end-page: 1153 ident: b20 article-title: Moving target defense: state of the art and characteristics publication-title: Front. Inf. Technol. Electron. Eng. – start-page: 1261 year: 2014 end-page: 1268 ident: b60 article-title: Evolutionary based moving target cyber defense publication-title: Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation – volume: 100 start-page: 813 year: 2017 end-page: 821 ident: b24 article-title: Dynamic scheduling of workflow for makespan and robustness improvement in the iaas cloud publication-title: IEICE Trans. Inf. Syst. – year: 2018 ident: b21 article-title: Moving target defense techniques: A survey publication-title: Secur. Commun. Netw. – volume: 305 start-page: 357 year: 2015 end-page: 383 ident: b43 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. – volume: 9 start-page: 20 year: 2017 ident: b12 article-title: An access control model for preventing virtual machine escape attack publication-title: Future Internet – volume: 5 start-page: 428 year: 2015 end-page: 442 ident: b16 article-title: TruXy: Trusted storage cloud for scientific workflows publication-title: IEEE Trans. Cloud Comput. – volume: 3 start-page: 2687 year: 2015 end-page: 2699 ident: b25 article-title: A multi-objective optimization scheduling method based on the ant colony algorithm in cloud computing publication-title: IEEE Access – volume: 46 start-page: 17 year: 2015 end-page: 35 ident: b77 article-title: Pegasus, a workflow management system for science automation publication-title: Future Gener. Comput. Syst. – volume: 80 start-page: 153 year: 2015 end-page: 162 ident: b34 article-title: Resource-efficient workflow scheduling in clouds publication-title: Knowl.-Based Syst. – volume: 28 start-page: 3671 year: 2017 end-page: 3683 ident: b27 article-title: Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems publication-title: IEEE Trans. Parallel Distrib. Syst. – start-page: 181 year: 2016 end-page: 186 ident: b48 article-title: A shared memory based cross-VM side channel attacks in IaaS cloud publication-title: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) – start-page: 1 year: 2017 end-page: 9 ident: b56 article-title: A signaling game model for moving target defense publication-title: IEEE INFOCOM 2017-IEEE Conference on Computer Communications – volume: 13 start-page: 260 year: 2002 end-page: 274 ident: b29 article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing publication-title: IEEE Trans. Parallel Distrib. Syst. – year: 2019 ident: b18 article-title: Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment publication-title: Future Gener. Comput. Syst. – start-page: 115 year: 2009 end-page: 131 ident: b75 article-title: A performance analysis of EC2 cloud computing services for scientific computing publication-title: International Conference on Cloud Computing – start-page: 21 year: 2014 end-page: 30 ident: b63 article-title: A game theoretic approach to strategy determination for dynamic platform defenses publication-title: Proceedings of the First ACM Workshop on Moving Target Defense – volume: 29 start-page: 1 year: 2017 end-page: 23 ident: b8 article-title: A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments publication-title: Concurr. Comput.: Pract. Exper. – volume: 12 start-page: 34 year: 2010 ident: b2 article-title: Scientific computing in the cloud publication-title: Comput. Sci. Eng. – start-page: 315 year: 2017 end-page: 335 ident: b54 article-title: A stackelberg game and markov modeling of moving target defense publication-title: International Conference on Decision and Game Theory for Security – volume: 539 start-page: 374 year: 2014 end-page: 377 ident: b46 article-title: Analysis of risks for virtualization technology publication-title: Appl. Mech. Mater. Trans. Tech. Publ. – start-page: 231 year: 2014 end-page: 256 ident: b1 article-title: Migrating scientific workflow management systems from the grid to the cloud publication-title: Cloud Computing for Data-Intensive Applications – reference: Z. Guo, S. Hui, Y. Xu, et al. Dynamic flow scheduling for power efficient data center networks, in: IEEE/ACM International Symposium on Quality of Service, Beijing, China, 2016, pp. 1–10. – volume: 75 start-page: 141 year: 2015 end-page: 151 ident: b40 article-title: SABA: A security-aware and budget-aware workflow scheduling strategy in clouds publication-title: J. Parallel Distrib. Comput. – year: 2013 ident: b58 article-title: Application of cybernetics and control theory for a new paradigm in cybersecurity – start-page: 144 year: 2016 end-page: 145 ident: b11 article-title: Secure virtual network embedding to mitigate the risk of covert channel attacks publication-title: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) – volume: 393 start-page: 47 year: 2017 end-page: 65 ident: b37 article-title: Fault-tolerant elastic scheduling algorithm for workflow in cloud systems publication-title: Inform. Sci. – start-page: 34 year: 2013 end-page: 41 ident: b33 article-title: Energy-constrained provisioning for scientific workflow ensembles publication-title: 2013 International Conference on Cloud and Green Computing – start-page: 591 year: 2015 end-page: 604 ident: b51 article-title: S $ A: A shared cache attack that works across cores and defies VM sandboxing–and its application to AES publication-title: IEEE Symposium on Security and Privacy – volume: 7 start-page: 126603 year: 2019 end-page: 126617 ident: b70 article-title: Securing the intermediate data of scientific workflows in clouds with ACISO publication-title: IEEE Access – year: 2018 ident: b66 article-title: A note on the complexity of scheduling of communication-aware directed acyclic graph publication-title: Bull. Pol. Acad. Sci. Tech. Sci. – start-page: 1 year: 2013 end-page: 13 ident: b61 article-title: Game theoretic approaches to attack surface shifting publication-title: Moving Target Defense II – start-page: 839 year: 2015 end-page: 848 ident: b26 article-title: A responsive knapsack-based algorithm for resource provisioning and scheduling of scientific workflows in clouds publication-title: 2015 44th International Conference on Parallel Processing – volume: 20 start-page: 70 year: 2016 end-page: 76 ident: b4 article-title: Pegasus in the cloud: Science automation through workflow technologies publication-title: IEEE Internet Comput. – start-page: 1 year: 2017 end-page: 9 ident: b9 article-title: Malicious co-residency on the cloud: Attacks and defense publication-title: IEEE INFOCOM 2017-IEEE Conference on Computer Communications – start-page: 1585 year: 2015 end-page: 1630 ident: b47 article-title: Security and privacy issues in cloud computing. Cloud technology: Concepts, methodologies, tools, and applications publication-title: IGI Global – reference: . – volume: 23 start-page: 1745 year: 2019 end-page: 1765 ident: b52 article-title: Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing publication-title: Soft Comput. – volume: 10 start-page: 30 year: 2016 ident: b39 article-title: Enhancing reliability of workflow execution using task replication and spot instances publication-title: ACM Trans. Auton. Adapt. Syst. (TAAS) – volume: 14 start-page: 23 year: 2016 end-page: 39 ident: b67 article-title: CA-DAG: Modeling communication-aware applications for scheduling in cloud computing publication-title: J. Grid Comput. – start-page: 246 year: 2013 end-page: 263 ident: b62 article-title: Game-theoretic approach to feedback-driven multi-stage moving target defense publication-title: International Conference on Decision and Game Theory for Security – volume: 22 start-page: 931 year: 2011 end-page: 945 ident: b3 article-title: Performance analysis of cloud computing services for many-tasks scientific computing publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 4 start-page: 34 year: 2016 end-page: 48 ident: b23 article-title: Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds publication-title: IEEE Trans. Cloud Comput. – volume: 10 start-page: 929 year: 2016 end-page: 941 ident: b53 article-title: Cost effective, reliable and secure workflow deployment over federated clouds publication-title: IEEE Trans. Serv. Comput. – start-page: 144 year: 2016 ident: 10.1016/j.future.2019.11.003_b11 article-title: Secure virtual network embedding to mitigate the risk of covert channel attacks – start-page: 1 year: 2017 ident: 10.1016/j.future.2019.11.003_b56 article-title: A signaling game model for moving target defense – ident: 10.1016/j.future.2019.11.003_b32 – ident: 10.1016/j.future.2019.11.003_b59 – start-page: 1 year: 2013 ident: 10.1016/j.future.2019.11.003_b61 article-title: Game theoretic approaches to attack surface shifting – start-page: 591 year: 2015 ident: 10.1016/j.future.2019.11.003_b51 article-title: S $ A: A shared cache attack that works across cores and defies VM sandboxing–and its application to AES – volume: 62 start-page: 1 year: 2017 ident: 10.1016/j.future.2019.11.003_b76 article-title: A hybrid multi-objective particle swarm optimization for scientific workflow scheduling publication-title: Parallel Comput. doi: 10.1016/j.parco.2017.01.002 – year: 1994 ident: 10.1016/j.future.2019.11.003_b73 – start-page: 315 year: 2017 ident: 10.1016/j.future.2019.11.003_b54 article-title: A stackelberg game and markov modeling of moving target defense – volume: 539 start-page: 374 year: 2014 ident: 10.1016/j.future.2019.11.003_b46 article-title: Analysis of risks for virtualization technology publication-title: Appl. Mech. Mater. Trans. Tech. Publ. doi: 10.4028/www.scientific.net/AMM.539.374 – start-page: 41 year: 2014 ident: 10.1016/j.future.2019.11.003_b17 article-title: Diverse virtual replicas for improving intrusion tolerance in cloud – volume: 5 start-page: 428 issue: 3 year: 2015 ident: 10.1016/j.future.2019.11.003_b16 article-title: TruXy: Trusted storage cloud for scientific workflows publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2489638 – ident: 10.1016/j.future.2019.11.003_b69 doi: 10.1145/1645164.1645167 – volume: 19 start-page: 1522 issue: 12 year: 2018 ident: 10.1016/j.future.2019.11.003_b15 article-title: Scientific workflow execution system based on mimic defense in the cloud environment publication-title: Front. Inf. Technol. Electron. Eng. doi: 10.1631/FITEE.1800621 – volume: 28 start-page: 3671 issue: 12 year: 2017 ident: 10.1016/j.future.2019.11.003_b27 article-title: Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2017.2687923 – volume: 7 start-page: 126603 issue: 1 year: 2019 ident: 10.1016/j.future.2019.11.003_b70 article-title: Securing the intermediate data of scientific workflows in clouds with ACISO publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2938823 – start-page: 401 year: 2011 ident: 10.1016/j.future.2019.11.003_b44 article-title: Eliminating the hypervisor attack surface for a more secure cloud – year: 2019 ident: 10.1016/j.future.2019.11.003_b18 article-title: Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment publication-title: Future Gener. Comput. Syst. – volume: 55 start-page: 66 issue: 6 year: 2018 ident: 10.1016/j.future.2019.11.003_b78 article-title: A task scheduling method for cloud workflow security publication-title: J. Comput. Res. Dev. – volume: 393 start-page: 47 year: 2017 ident: 10.1016/j.future.2019.11.003_b37 article-title: Fault-tolerant elastic scheduling algorithm for workflow in cloud systems publication-title: Inform. Sci. doi: 10.1016/j.ins.2017.01.035 – volume: 46 start-page: 17 year: 2015 ident: 10.1016/j.future.2019.11.003_b77 article-title: Pegasus, a workflow management system for science automation publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2014.10.008 – volume: 12 start-page: 34 issue: 3 year: 2010 ident: 10.1016/j.future.2019.11.003_b2 article-title: Scientific computing in the cloud publication-title: Comput. Sci. Eng. doi: 10.1109/MCSE.2010.70 – ident: 10.1016/j.future.2019.11.003_b36 doi: 10.1109/IWQoS.2016.7590399 – volume: 41 start-page: 423 issue: 2 year: 2014 ident: 10.1016/j.future.2019.11.003_b41 article-title: Security-aware intermediate data placement strategy in scientific cloud workflows publication-title: Knowl. Inf. Syst. doi: 10.1007/s10115-014-0755-x – start-page: 178 year: 2017 ident: 10.1016/j.future.2019.11.003_b55 article-title: A game theoretic approach to strategy generation for moving target defense in web applications – start-page: 1261 year: 2014 ident: 10.1016/j.future.2019.11.003_b60 article-title: Evolutionary based moving target cyber defense – volume: 14 start-page: 23 issue: 1 year: 2016 ident: 10.1016/j.future.2019.11.003_b67 article-title: CA-DAG: Modeling communication-aware applications for scheduling in cloud computing publication-title: J. Grid Comput. doi: 10.1007/s10723-015-9337-8 – start-page: 34 year: 2013 ident: 10.1016/j.future.2019.11.003_b33 article-title: Energy-constrained provisioning for scientific workflow ensembles – volume: 4 start-page: 166 issue: 2 year: 2016 ident: 10.1016/j.future.2019.11.003_b35 article-title: EnReal: An energy-aware resource allocation method for scientific workflow executions in cloud environment publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2453966 – start-page: 990 year: 2014 ident: 10.1016/j.future.2019.11.003_b10 article-title: Cross-tenant side-channel attacks in PaaS clouds – volume: 100 start-page: 813 issue: 4 year: 2017 ident: 10.1016/j.future.2019.11.003_b24 article-title: Dynamic scheduling of workflow for makespan and robustness improvement in the iaas cloud publication-title: IEICE Trans. Inf. Syst. doi: 10.1587/transinf.2016EDP7346 – ident: 10.1016/j.future.2019.11.003_b6 – volume: 44 start-page: 735 issue: 6 year: 2014 ident: 10.1016/j.future.2019.11.003_b19 article-title: Analysis of operating system diversity for intrusion tolerance publication-title: Softw. - Pract. Exp. doi: 10.1002/spe.2180 – volume: 99 start-page: 39 year: 2016 ident: 10.1016/j.future.2019.11.003_b38 article-title: An immune system-inspired rescheduling algorithm for workflow in cloud systems publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2016.01.037 – start-page: 605 year: 2015 ident: 10.1016/j.future.2019.11.003_b50 article-title: Last-level cache side-channel attacks are practical – start-page: 1 year: 2017 ident: 10.1016/j.future.2019.11.003_b9 article-title: Malicious co-residency on the cloud: Attacks and defense – year: 2018 ident: 10.1016/j.future.2019.11.003_b21 article-title: Moving target defense techniques: A survey publication-title: Secur. Commun. Netw. doi: 10.1155/2018/3759626 – volume: 28 start-page: 2674 issue: 9 year: 2017 ident: 10.1016/j.future.2019.11.003_b42 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2017.2678507 – volume: 5 start-page: 8482 year: 2017 ident: 10.1016/j.future.2019.11.003_b65 article-title: Evolutionary game theoretic analysis of advanced persistent threats against cloud storage publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2691326 – volume: 22 start-page: 931 issue: 6 year: 2011 ident: 10.1016/j.future.2019.11.003_b3 article-title: Performance analysis of cloud computing services for many-tasks scientific computing publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2011.66 – volume: 9 start-page: 20 issue: 2 year: 2017 ident: 10.1016/j.future.2019.11.003_b12 article-title: An access control model for preventing virtual machine escape attack publication-title: Future Internet doi: 10.3390/fi9020020 – volume: 80 start-page: 153 year: 2015 ident: 10.1016/j.future.2019.11.003_b34 article-title: Resource-efficient workflow scheduling in clouds publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2015.02.012 – volume: 18 start-page: 2787 issue: 4 year: 2016 ident: 10.1016/j.future.2019.11.003_b71 article-title: A survey of network isolation solutions for multi-tenant data centers publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2016.2556979 – start-page: 655 year: 2018 ident: 10.1016/j.future.2019.11.003_b14 article-title: Trusted model for virtual machine security in cloud computing – start-page: 21 year: 2014 ident: 10.1016/j.future.2019.11.003_b63 article-title: A game theoretic approach to strategy determination for dynamic platform defenses – volume: 4 start-page: 34 issue: 1 year: 2016 ident: 10.1016/j.future.2019.11.003_b23 article-title: Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2015.2404807 – start-page: 315 year: 2017 ident: 10.1016/j.future.2019.11.003_b64 article-title: A stackelberg game and markov modeling of moving target defense – volume: 71 start-page: 848 issue: 6 year: 2011 ident: 10.1016/j.future.2019.11.003_b28 article-title: BTS: Resource capacity estimate for time-targeted science workflows publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2011.01.008 – start-page: 1585 year: 2015 ident: 10.1016/j.future.2019.11.003_b47 article-title: Security and privacy issues in cloud computing. Cloud technology: Concepts, methodologies, tools, and applications publication-title: IGI Global – volume: 28 start-page: 2674 issue: 9 year: 2017 ident: 10.1016/j.future.2019.11.003_b5 article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2017.2678507 – volume: 305 start-page: 357 year: 2015 ident: 10.1016/j.future.2019.11.003_b43 article-title: Security in cloud computing: opportunities and challenges publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.01.025 – start-page: 839 year: 2015 ident: 10.1016/j.future.2019.11.003_b26 article-title: A responsive knapsack-based algorithm for resource provisioning and scheduling of scientific workflows in clouds – volume: 21 start-page: 562 issue: 4 year: 2013 ident: 10.1016/j.future.2019.11.003_b45 article-title: Security-preserving live migration of virtual machines in the cloud publication-title: J. Netw. Syst. Manage. doi: 10.1007/s10922-012-9253-1 – start-page: 181 year: 2016 ident: 10.1016/j.future.2019.11.003_b48 article-title: A shared memory based cross-VM side channel attacks in IaaS cloud – volume: 17 start-page: 1122 issue: 11 year: 2016 ident: 10.1016/j.future.2019.11.003_b20 article-title: Moving target defense: state of the art and characteristics publication-title: Front. Inf. Technol. Electron. Eng. doi: 10.1631/FITEE.1601321 – volume: 13 start-page: 260 issue: 3 year: 2002 ident: 10.1016/j.future.2019.11.003_b29 article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/71.993206 – volume: 10 start-page: 929 issue: 6 year: 2016 ident: 10.1016/j.future.2019.11.003_b53 article-title: Cost effective, reliable and secure workflow deployment over federated clouds publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2016.2543719 – start-page: 406 year: 2016 ident: 10.1016/j.future.2019.11.003_b49 article-title: Catalyst: Defeating last-level cache side channel attacks in cloud computing – volume: 3 start-page: 2687 year: 2015 ident: 10.1016/j.future.2019.11.003_b25 article-title: A multi-objective optimization scheduling method based on the ant colony algorithm in cloud computing publication-title: IEEE Access doi: 10.1109/ACCESS.2015.2508940 – volume: 20 start-page: 70 issue: 1 year: 2016 ident: 10.1016/j.future.2019.11.003_b4 article-title: Pegasus in the cloud: Science automation through workflow technologies publication-title: IEEE Internet Comput. doi: 10.1109/MIC.2016.15 – volume: 24 start-page: 956 issue: 9 year: 2012 ident: 10.1016/j.future.2019.11.003_b7 article-title: A data dependency based strategy for intermediate data storage in scientific cloud workflow systems publication-title: Concurr. Comput.: Pract. Exper. doi: 10.1002/cpe.1636 – volume: 75 start-page: 141 year: 2015 ident: 10.1016/j.future.2019.11.003_b40 article-title: SABA: A security-aware and budget-aware workflow scheduling strategy in clouds publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2014.09.002 – volume: 65 start-page: 140 year: 2016 ident: 10.1016/j.future.2019.11.003_b13 article-title: A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2015.12.014 – start-page: 246 year: 2013 ident: 10.1016/j.future.2019.11.003_b62 article-title: Game-theoretic approach to feedback-driven multi-stage moving target defense – start-page: 270 year: 2015 ident: 10.1016/j.future.2019.11.003_b72 article-title: Sequentially composable rational proofs – start-page: 1 year: 2012 ident: 10.1016/j.future.2019.11.003_b30 article-title: Workflowsim: A toolkit for simulating scientific workflows in distributed environments – volume: 23 start-page: 1745 issue: 5 year: 2019 ident: 10.1016/j.future.2019.11.003_b52 article-title: Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing publication-title: Soft Comput. doi: 10.1007/s00500-017-2897-8 – volume: 2 start-page: 79 issue: 1 year: 2009 ident: 10.1016/j.future.2019.11.003_b68 article-title: Architecture for scientific workflow management systems and the VIEW SOA solution publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2009.4 – volume: 29 start-page: 1 issue: 8 year: 2017 ident: 10.1016/j.future.2019.11.003_b8 article-title: A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments publication-title: Concurr. Comput.: Pract. Exper. doi: 10.1002/cpe.4041 – volume: 10 start-page: 30 issue: 4 year: 2016 ident: 10.1016/j.future.2019.11.003_b39 article-title: Enhancing reliability of workflow execution using task replication and spot instances publication-title: ACM Trans. Auton. Adapt. Syst. (TAAS) – year: 2013 ident: 10.1016/j.future.2019.11.003_b58 – volume: 55 start-page: 38 issue: 3 year: 2012 ident: 10.1016/j.future.2019.11.003_b31 article-title: OpenStack: toward an open-source solution for cloud computing publication-title: Int. J. Comput. Appl. – start-page: 82 year: 2006 ident: 10.1016/j.future.2019.11.003_b74 article-title: Computing the optimal strategy to commit to – year: 2018 ident: 10.1016/j.future.2019.11.003_b66 article-title: A note on the complexity of scheduling of communication-aware directed acyclic graph publication-title: Bull. Pol. Acad. Sci. Tech. Sci. – volume: 71 start-page: 3373 issue: 9 year: 2015 ident: 10.1016/j.future.2019.11.003_b22 article-title: Workflow scheduling in cloud: a survey publication-title: J. Supercomput. doi: 10.1007/s11227-015-1438-4 – start-page: 231 year: 2014 ident: 10.1016/j.future.2019.11.003_b1 article-title: Migrating scientific workflow management systems from the grid to the cloud – year: 2012 ident: 10.1016/j.future.2019.11.003_b57 article-title: Artificial diversity as maneuvers in a control theoretic moving target defense – start-page: 115 year: 2009 ident: 10.1016/j.future.2019.11.003_b75 article-title: A performance analysis of EC2 cloud computing services for scientific computing |
| SSID | ssj0001731 |
| Score | 2.468 |
| Snippet | The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 460 |
| SubjectTerms | Attack–defense game Diverse operating systems Moving target defense Scientific workflow Workflow scheduling |
| Title | CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model |
| URI | https://dx.doi.org/10.1016/j.future.2019.11.003 |
| Volume | 111 |
| WOSCitedRecordID | wos000541155100034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001731 issn: 0167-739X databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JbtswECWMpIdeuhdNN_DQW6DAtDayNyNwuiBIi8ZBnR4qkBQZO1CkwJWSHPsPPfX3-iUdLpKMuugG9CIYhGQTnOfZNDMPoWc0EUOZj-KAcM6CSGgSMBWKQEitiBSUamVH5u-nBwd0NmNvB4OvbS_MRZGWJb26Yuf_VdSwBsI2rbN_Ie7uS2EBPoPQ4Qpih-sfCX53_83h0buJazmXRdXkvuvRFAVZahhdVJewNgcrY5vReXFSLRf1_Gzb2LTcvD_gdc1BUfpKiDBXGsJdtX3Cz5Qjz1l1avfsXBJDxqw8nqTnivCDoju__b3PTh_zy74F7UVj07XHTanV4ofFD2re9CkD7ktApnO-XE1XQGzaFr75HNpaH41La4K6TkNLqgtWyalimoLvT1yzZ6ervWZ22jZyVATecEeO7mfNJrj0xOmOG9JiqvnYjhncOgx7G9hVJh6arZidgGNLwsTMkd0cpTEDhbk5fjWZve7MPEk92aXfetuXaYsH13_r537Pii8zvYVu-CAEjx14bqOBKu-gmy3BB_b6_i766LH0HI-xRRLukYRbJOEeSbhDErZIwlWJHZK-ff7iMYQNhrDF0D10tDeZ7r4MPCFHICGyrAPORyI35JlcMjmMEqqYVlokPM7pKIx0GJI4UVEqo1hDGC4kjzmjyrx6MEOedHgfbZRVqR4gTMC4aSIoZzwy3dRiqEFHSDJkVAsuyRYK2-PKpJ9Wb0hTiqwtSzzN3CFn5pAhkDVTbrdQ0D117qa1_Ob-tJVE5j1O50lmAJ5fPvnwn598hK73_4vHaKNeNuoJuiYv6sWn5VOPsu_0hKm8 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CLOSURE%3A+A+cloud+scientific+workflow+scheduling+algorithm+based+on+attack%E2%80%93defense+game+model&rft.jtitle=Future+generation+computer+systems&rft.au=Wang%2C+Yawen&rft.au=Guo%2C+Yunfei&rft.au=Guo%2C+Zehua&rft.au=Baker%2C+Thar&rft.date=2020-10-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=111&rft.spage=460&rft.epage=474&rft_id=info:doi/10.1016%2Fj.future.2019.11.003&rft.externalDocID=S0167739X19313603 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |