CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model

The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operatin...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Future generation computer systems Ročník 111; s. 460 - 474
Hlavní autoři: Wang, Yawen, Guo, Yunfei, Guo, Zehua, Baker, Thar, Liu, Wenyan
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.10.2020
Témata:
ISSN:0167-739X, 1872-7115
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operating system vulnerabilities are regarded as different “attack” strategies; and different operating system distributions in a virtual machine cluster executing the workflows are regarded as different “defense” strategies. The information of the attacker and defender is not balanced. In other words, the defender cannot obtain the information about the attacker’s strategies, while the attacker can acquire information about the defender’s strategies through a network scan. Therefore, we propose to dynamically switch the defense strategies during the workflow execution, which can weaken the network scan effects and transform the workflow security problem into an attack–defense game problem. Then, the probability distribution of the optimal mixed defense strategies can be achieved by calculating the Nash Equilibrium in the attack–defense game model. Based on this probability, diverse VMs are provisioned for workflow execution. Furthermore, a task-VM mapping algorithm based on dynamic Heterogeneous Earliest Finish Time (HEFT) is presented to accelerate the defense strategy switching and improve workflow efficiency. The experiments are conducted on both simulation and actual environment, experimental results demonstrate that compared with other algorithms, the proposed algorithm can reduce the attacker’s benefits by around 15.23%, and decrease the time costs of the algorithm by around 7.86%. •Workflow scheduling is used as a defense method to secure cloud scientific workflows.•CLOSURE can weaken reconnaissance effects by switching defense strategies.•Dynamic HEFT is proposed to speed-up the switching period of defense strategies.•We built a prototype system based on OpenStack.
AbstractList The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud scientific wOrkflow SchedUling algoRithm based on attack–defensE game model (CLOSURE). In the algorithm, attacks based on different operating system vulnerabilities are regarded as different “attack” strategies; and different operating system distributions in a virtual machine cluster executing the workflows are regarded as different “defense” strategies. The information of the attacker and defender is not balanced. In other words, the defender cannot obtain the information about the attacker’s strategies, while the attacker can acquire information about the defender’s strategies through a network scan. Therefore, we propose to dynamically switch the defense strategies during the workflow execution, which can weaken the network scan effects and transform the workflow security problem into an attack–defense game problem. Then, the probability distribution of the optimal mixed defense strategies can be achieved by calculating the Nash Equilibrium in the attack–defense game model. Based on this probability, diverse VMs are provisioned for workflow execution. Furthermore, a task-VM mapping algorithm based on dynamic Heterogeneous Earliest Finish Time (HEFT) is presented to accelerate the defense strategy switching and improve workflow efficiency. The experiments are conducted on both simulation and actual environment, experimental results demonstrate that compared with other algorithms, the proposed algorithm can reduce the attacker’s benefits by around 15.23%, and decrease the time costs of the algorithm by around 7.86%. •Workflow scheduling is used as a defense method to secure cloud scientific workflows.•CLOSURE can weaken reconnaissance effects by switching defense strategies.•Dynamic HEFT is proposed to speed-up the switching period of defense strategies.•We built a prototype system based on OpenStack.
Author Baker, Thar
Guo, Yunfei
Guo, Zehua
Liu, Wenyan
Wang, Yawen
Author_xml – sequence: 1
  givenname: Yawen
  surname: Wang
  fullname: Wang, Yawen
  organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China
– sequence: 2
  givenname: Yunfei
  surname: Guo
  fullname: Guo, Yunfei
  organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China
– sequence: 3
  givenname: Zehua
  surname: Guo
  fullname: Guo, Zehua
  email: guolizihao@hotmail.com
  organization: Beijing Institute of Technology, Beijing 100081, China
– sequence: 4
  givenname: Thar
  surname: Baker
  fullname: Baker, Thar
  organization: Liverpool John Moores University, Liverpool L3 3AF, UK
– sequence: 5
  givenname: Wenyan
  surname: Liu
  fullname: Liu, Wenyan
  organization: National Digital Switching System Engineering Technology Research Center, Zhengzhou 450002, China
BookMark eNqFkM1KAzEUhYMo2Kpv4CIvMGPuZCbTcSGUUn-gIKgFV4Y0ualppxPJpBZ3voNv6JM4ta5c6OrC4X4Hztcn-41vkJBTYCkwEGeL1K7jOmCaMahSgJQxvkd6MCizpAQo9kmveyuTklePh6TftgvGGJQceuRpNLm9n96Nz-mQ6tqvDW21wyY66zTd-LC0td902TOade2aOVX13AcXn1d0plo01DdUxaj08vP9w6DFpkU6VyukK2-wPiYHVtUtnvzcIzK9HD-MrpPJ7dXNaDhJNGciJkplM1OKiitdaZaLAVYW7UyowgwynlvOoRCYlzovLIh8plWhqgEyVmQgCmH5ETnf9erg2zagldpFFZ1vYlCulsDk1pRcyJ0puTUlAWRnqoPzX_BLcCsV3v7DLnYYdsNeHQb5rU6jcQF1lMa7vwu-AO9KiXI
CitedBy_id crossref_primary_10_1109_TII_2024_3393560
crossref_primary_10_1109_MNET_001_2200593
crossref_primary_10_1016_j_ins_2021_03_003
crossref_primary_10_1109_TPDS_2021_3135907
crossref_primary_10_1016_j_future_2022_07_007
crossref_primary_10_1109_TNSE_2020_2981449
crossref_primary_10_1007_s10586_022_03579_2
crossref_primary_10_1016_j_future_2023_05_015
crossref_primary_10_1007_s12083_023_01541_6
crossref_primary_10_3390_electronics13030487
crossref_primary_10_1016_j_jnca_2023_103648
crossref_primary_10_1007_s00607_020_00838_1
crossref_primary_10_1007_s11227_021_03842_0
crossref_primary_10_7717_peerj_cs_747
crossref_primary_10_1007_s11432_021_3462_4
crossref_primary_10_3390_fi17020051
crossref_primary_10_1109_JIOT_2025_3533016
crossref_primary_10_1016_j_measurement_2021_110175
crossref_primary_10_1109_TCC_2021_3057422
crossref_primary_10_1109_JIOT_2020_3026493
crossref_primary_10_1002_cpe_7409
crossref_primary_10_1016_j_jpdc_2020_03_022
crossref_primary_10_1007_s12652_021_03187_9
crossref_primary_10_1007_s00607_020_00866_x
crossref_primary_10_1051_itmconf_20235401005
crossref_primary_10_1007_s10586_023_03998_9
crossref_primary_10_1007_s11432_021_3408_y
crossref_primary_10_1109_ACCESS_2020_3032545
crossref_primary_10_1186_s13638_021_01912_8
crossref_primary_10_1080_23311916_2023_2287303
crossref_primary_10_1016_j_future_2025_107708
Cites_doi 10.1016/j.parco.2017.01.002
10.4028/www.scientific.net/AMM.539.374
10.1109/TCC.2015.2489638
10.1145/1645164.1645167
10.1631/FITEE.1800621
10.1109/TPDS.2017.2687923
10.1109/ACCESS.2019.2938823
10.1016/j.ins.2017.01.035
10.1016/j.future.2014.10.008
10.1109/MCSE.2010.70
10.1109/IWQoS.2016.7590399
10.1007/s10115-014-0755-x
10.1007/s10723-015-9337-8
10.1109/TCC.2015.2453966
10.1587/transinf.2016EDP7346
10.1002/spe.2180
10.1016/j.knosys.2016.01.037
10.1155/2018/3759626
10.1109/TPDS.2017.2678507
10.1109/ACCESS.2017.2691326
10.1109/TPDS.2011.66
10.3390/fi9020020
10.1016/j.knosys.2015.02.012
10.1109/COMST.2016.2556979
10.1109/TCC.2015.2404807
10.1016/j.jpdc.2011.01.008
10.1016/j.ins.2015.01.025
10.1007/s10922-012-9253-1
10.1631/FITEE.1601321
10.1109/71.993206
10.1109/TSC.2016.2543719
10.1109/ACCESS.2015.2508940
10.1109/MIC.2016.15
10.1002/cpe.1636
10.1016/j.jpdc.2014.09.002
10.1016/j.future.2015.12.014
10.1007/s00500-017-2897-8
10.1109/TSC.2009.4
10.1002/cpe.4041
10.1007/s11227-015-1438-4
ContentType Journal Article
Copyright 2019 Elsevier B.V.
Copyright_xml – notice: 2019 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2019.11.003
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 474
ExternalDocumentID 10_1016_j_future_2019_11_003
S0167739X19313603
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-aa2bd7693ac9c0468e9fefb6a5d8234f33156e47c45f164bca5a98e00521656f3
ISICitedReferencesCount 33
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000541155100034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-739X
IngestDate Tue Nov 18 22:40:03 EST 2025
Sat Nov 29 07:26:55 EST 2025
Fri Feb 23 02:47:12 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Moving target defense
Attack–defense game
Scientific workflow
Workflow scheduling
Diverse operating systems
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-aa2bd7693ac9c0468e9fefb6a5d8234f33156e47c45f164bca5a98e00521656f3
PageCount 15
ParticipantIDs crossref_citationtrail_10_1016_j_future_2019_11_003
crossref_primary_10_1016_j_future_2019_11_003
elsevier_sciencedirect_doi_10_1016_j_future_2019_11_003
PublicationCentury 2000
PublicationDate October 2020
2020-10-00
PublicationDateYYYYMMDD 2020-10-01
PublicationDate_xml – month: 10
  year: 2020
  text: October 2020
PublicationDecade 2020
PublicationTitle Future generation computer systems
PublicationYear 2020
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Liu, Ge, Yarom (b49) 2016
Guo, Bhattacharya (b17) 2014
Musial, Guzek, Bouvry (b66) 2018
Rodriguez, Buyya (b8) 2017; 29
Conitzer, Sandholm (b74) 2006
Poola, Ramamohanarao, Buyya (b39) 2016; 10
Zhang, Chen (b45) 2013; 21
Sujana, Revathi, Priya (b52) 2019; 23
Nepal, Sinnott, Friedrich (b16) 2015; 5
Yuan, Yang, Liu (b7) 2012; 24
Chen, Zhu, Qiu (b5) 2017; 28
S. Bharathi, A. Chervenak, E. Deelman, et al. Characterization of scientific workflows, in: IEEE Workshop on Workflows in Support of Large-Scale Science, Austin, USA, 2008, pp. 1–10.
Lee, Han, Zomaya (b34) 2015; 80
Feng, Zheng, Mohapatra (b54) 2017
Rowe, Levitt, Demir (b57) 2012
Zhao, Li, Raicu (b1) 2014
Del Piccolo, Amamou, Haddadou (b71) 2016; 18
Szefer, Keller, Lee (b44) 2011
Lin, Lu, Fei (b68) 2009; 2
Manadhata (b61) 2013
Carter, Riordan, Okhravi (b63) 2014
Wang, Yang, Fu (b48) 2016
Osborne, Rubinstein (b73) 1994
Garcia, Bessani, Gashi (b19) 2014; 44
Yao, Ding, Hao (b27) 2017; 28
.
Zuo, Shu, Dong (b25) 2015; 3
Byun, Kee, Kim (b28) 2011; 71
Chen, Deelman (b30) 2012
Irazoqui, Eisenbarth, Sunar (b51) 2015
Narayana, Pasupuleti (b14) 2018
Song (b46) 2014; 539
Sengupta, Vadlamudi, Kambhampati (b55) 2017
Topcuoglu, Hariri, Wu (b29) 2002; 13
Adams, Hitefield, Hoy (b58) 2013
Abass, Xiao, Mandayam (b65) 2017; 5
Kliazovich, Pecero, Tchernykh (b67) 2016; 14
Zhu, Basar (b62) 2013
Liu, Peng, Du (b41) 2014; 41
Liu, Yarom, Ge (b50) 2015
Ostermann, Iosup, Yigitbasi (b75) 2009
Wang, Guo, Liu (b78) 2018; 55
Z. Guo, S. Hui, Y. Xu, et al. Dynamic flow scheduling for power efficient data center networks, in: IEEE/ACM International Symposium on Quality of Service, Beijing, China, 2016, pp. 1–10.
Ding, Yao, Hao (b37) 2017; 393
Xu, Dou, Zhang (b35) 2016; 4
Wu, Wu, Tan (b22) 2015; 71
Pietri, Malawski, Juve (b33) 2013
Feng, Zheng, Cansever (b56) 2017
Sefraoui, Aissaoui, Eleuldj (b31) 2012; 55
Iosup, Ostermann, Yigitbasi (b3) 2011; 22
Chen, Zhu, Qiu (b42) 2017; 28
Zhou, He, Liu (b23) 2016; 4
Deelman, Vahi, Juve (b77) 2015; 46
Wang, Wu, Guo (b15) 2018; 19
Lei, Zhang, Tan (b21) 2018
Rodriguez, Buyya (b26) 2015
Rehr, Vila, Gardner (b2) 2010; 12
Cai, Wang, Hu (b20) 2016; 17
Feng, Zheng, Mohapatra (b64) 2017
Wang, Guo, Guo (b70) 2019; 7
Wen, Cała, Watson (b53) 2016; 10
Zeng, Veeravalli, Li (b40) 2015; 75
John, Smith, Turkett (b60) 2014
Jiang, Song (b24) 2017; 100
Wang, Wu, Guo (b11) 2016
Sen (b47) 2015
Atya, Qian, Krishnamurthy (b9) 2017
Wu, Lei, Chen (b12) 2017; 9
Campanelli, Gennaro (b72) 2015
Ai, Chen, Guo (b18) 2019
Yao, Ding, Ren (b38) 2016; 99
Li, Ge, Yang (b13) 2016; 65
Ali, Khan, Vasilakos (b43) 2015; 305
M. Crouse, E.W. Fulp, D. Canas, Improving the diversity defense of genetic algorithm-based moving target approaches, in: Proceedings of the National Symposium on Moving Target Research, 2012.
Deelman, Vahi, Rynge (b4) 2016; 20
Verma, Kaushal (b76) 2017; 62
Zhang, Juels, Reiter (b10) 2014
Deelman (10.1016/j.future.2019.11.003_b77) 2015; 46
Wen (10.1016/j.future.2019.11.003_b53) 2016; 10
Wang (10.1016/j.future.2019.11.003_b78) 2018; 55
Lee (10.1016/j.future.2019.11.003_b34) 2015; 80
Chen (10.1016/j.future.2019.11.003_b30) 2012
Zuo (10.1016/j.future.2019.11.003_b25) 2015; 3
Yuan (10.1016/j.future.2019.11.003_b7) 2012; 24
Ostermann (10.1016/j.future.2019.11.003_b75) 2009
Chen (10.1016/j.future.2019.11.003_b42) 2017; 28
Campanelli (10.1016/j.future.2019.11.003_b72) 2015
Ai (10.1016/j.future.2019.11.003_b18) 2019
Feng (10.1016/j.future.2019.11.003_b56) 2017
Wu (10.1016/j.future.2019.11.003_b12) 2017; 9
Rowe (10.1016/j.future.2019.11.003_b57) 2012
Deelman (10.1016/j.future.2019.11.003_b4) 2016; 20
Sengupta (10.1016/j.future.2019.11.003_b55) 2017
Lei (10.1016/j.future.2019.11.003_b21) 2018
Cai (10.1016/j.future.2019.11.003_b20) 2016; 17
Szefer (10.1016/j.future.2019.11.003_b44) 2011
Zhu (10.1016/j.future.2019.11.003_b62) 2013
Musial (10.1016/j.future.2019.11.003_b66) 2018
Liu (10.1016/j.future.2019.11.003_b49) 2016
Kliazovich (10.1016/j.future.2019.11.003_b67) 2016; 14
Iosup (10.1016/j.future.2019.11.003_b3) 2011; 22
Atya (10.1016/j.future.2019.11.003_b9) 2017
Del Piccolo (10.1016/j.future.2019.11.003_b71) 2016; 18
10.1016/j.future.2019.11.003_b59
Sefraoui (10.1016/j.future.2019.11.003_b31) 2012; 55
Feng (10.1016/j.future.2019.11.003_b54) 2017
Sujana (10.1016/j.future.2019.11.003_b52) 2019; 23
Chen (10.1016/j.future.2019.11.003_b5) 2017; 28
Irazoqui (10.1016/j.future.2019.11.003_b51) 2015
Conitzer (10.1016/j.future.2019.11.003_b74) 2006
Osborne (10.1016/j.future.2019.11.003_b73) 1994
Zhou (10.1016/j.future.2019.11.003_b23) 2016; 4
Rodriguez (10.1016/j.future.2019.11.003_b8) 2017; 29
Liu (10.1016/j.future.2019.11.003_b41) 2014; 41
Nepal (10.1016/j.future.2019.11.003_b16) 2015; 5
Adams (10.1016/j.future.2019.11.003_b58) 2013
Wang (10.1016/j.future.2019.11.003_b11) 2016
Topcuoglu (10.1016/j.future.2019.11.003_b29) 2002; 13
Zhao (10.1016/j.future.2019.11.003_b1) 2014
Yao (10.1016/j.future.2019.11.003_b38) 2016; 99
Yao (10.1016/j.future.2019.11.003_b27) 2017; 28
10.1016/j.future.2019.11.003_b69
10.1016/j.future.2019.11.003_b6
Garcia (10.1016/j.future.2019.11.003_b19) 2014; 44
Pietri (10.1016/j.future.2019.11.003_b33) 2013
Poola (10.1016/j.future.2019.11.003_b39) 2016; 10
Wang (10.1016/j.future.2019.11.003_b48) 2016
Xu (10.1016/j.future.2019.11.003_b35) 2016; 4
Byun (10.1016/j.future.2019.11.003_b28) 2011; 71
Wang (10.1016/j.future.2019.11.003_b15) 2018; 19
Zhang (10.1016/j.future.2019.11.003_b10) 2014
Wang (10.1016/j.future.2019.11.003_b70) 2019; 7
Guo (10.1016/j.future.2019.11.003_b17) 2014
Ding (10.1016/j.future.2019.11.003_b37) 2017; 393
Ali (10.1016/j.future.2019.11.003_b43) 2015; 305
Rodriguez (10.1016/j.future.2019.11.003_b26) 2015
Lin (10.1016/j.future.2019.11.003_b68) 2009; 2
Zhang (10.1016/j.future.2019.11.003_b45) 2013; 21
Carter (10.1016/j.future.2019.11.003_b63) 2014
Abass (10.1016/j.future.2019.11.003_b65) 2017; 5
Liu (10.1016/j.future.2019.11.003_b50) 2015
Narayana (10.1016/j.future.2019.11.003_b14) 2018
10.1016/j.future.2019.11.003_b36
Feng (10.1016/j.future.2019.11.003_b64) 2017
Sen (10.1016/j.future.2019.11.003_b47) 2015
Verma (10.1016/j.future.2019.11.003_b76) 2017; 62
Jiang (10.1016/j.future.2019.11.003_b24) 2017; 100
Song (10.1016/j.future.2019.11.003_b46) 2014; 539
Manadhata (10.1016/j.future.2019.11.003_b61) 2013
Li (10.1016/j.future.2019.11.003_b13) 2016; 65
John (10.1016/j.future.2019.11.003_b60) 2014
Rehr (10.1016/j.future.2019.11.003_b2) 2010; 12
10.1016/j.future.2019.11.003_b32
Zeng (10.1016/j.future.2019.11.003_b40) 2015; 75
Wu (10.1016/j.future.2019.11.003_b22) 2015; 71
References_xml – volume: 71
  start-page: 848
  year: 2011
  end-page: 862
  ident: b28
  article-title: BTS: Resource capacity estimate for time-targeted science workflows
  publication-title: J. Parallel Distrib. Comput.
– year: 1994
  ident: b73
  article-title: A Course in Game Theory
– volume: 99
  start-page: 39
  year: 2016
  end-page: 50
  ident: b38
  article-title: An immune system-inspired rescheduling algorithm for workflow in cloud systems
  publication-title: Knowl.-Based Syst.
– start-page: 406
  year: 2016
  end-page: 418
  ident: b49
  article-title: Catalyst: Defeating last-level cache side channel attacks in cloud computing
  publication-title: 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA)
– volume: 44
  start-page: 735
  year: 2014
  end-page: 770
  ident: b19
  article-title: Analysis of operating system diversity for intrusion tolerance
  publication-title: Softw. - Pract. Exp.
– start-page: 41
  year: 2014
  end-page: 44
  ident: b17
  article-title: Diverse virtual replicas for improving intrusion tolerance in cloud
  publication-title: Proceedings of the 9th Annual Cyber and Information Security Research Conference
– start-page: 82
  year: 2006
  end-page: 90
  ident: b74
  article-title: Computing the optimal strategy to commit to
  publication-title: Proceedings of the 7th ACM Conference on Electronic Commerce
– reference: S. Bharathi, A. Chervenak, E. Deelman, et al. Characterization of scientific workflows, in: IEEE Workshop on Workflows in Support of Large-Scale Science, Austin, USA, 2008, pp. 1–10.
– volume: 24
  start-page: 956
  year: 2012
  end-page: 976
  ident: b7
  article-title: A data dependency based strategy for intermediate data storage in scientific cloud workflow systems
  publication-title: Concurr. Comput.: Pract. Exper.
– volume: 41
  start-page: 423
  year: 2014
  end-page: 447
  ident: b41
  article-title: Security-aware intermediate data placement strategy in scientific cloud workflows
  publication-title: Knowl. Inf. Syst.
– volume: 55
  start-page: 38
  year: 2012
  end-page: 42
  ident: b31
  article-title: OpenStack: toward an open-source solution for cloud computing
  publication-title: Int. J. Comput. Appl.
– start-page: 605
  year: 2015
  end-page: 622
  ident: b50
  article-title: Last-level cache side-channel attacks are practical
  publication-title: IEEE Symposium on Security and Privacy
– volume: 21
  start-page: 562
  year: 2013
  end-page: 587
  ident: b45
  article-title: Security-preserving live migration of virtual machines in the cloud
  publication-title: J. Netw. Syst. Manage.
– volume: 19
  start-page: 1522
  year: 2018
  end-page: 1536
  ident: b15
  article-title: Scientific workflow execution system based on mimic defense in the cloud environment
  publication-title: Front. Inf. Technol. Electron. Eng.
– volume: 4
  start-page: 166
  year: 2016
  end-page: 179
  ident: b35
  article-title: EnReal: An energy-aware resource allocation method for scientific workflow executions in cloud environment
  publication-title: IEEE Trans. Cloud Comput.
– volume: 62
  start-page: 1
  year: 2017
  end-page: 19
  ident: b76
  article-title: A hybrid multi-objective particle swarm optimization for scientific workflow scheduling
  publication-title: Parallel Comput.
– start-page: 401
  year: 2011
  end-page: 412
  ident: b44
  article-title: Eliminating the hypervisor attack surface for a more secure cloud
  publication-title: Proceedings of the 18th ACM Conference on Computer and Communications Security
– volume: 2
  start-page: 79
  year: 2009
  end-page: 92
  ident: b68
  article-title: Architecture for scientific workflow management systems and the VIEW SOA solution
  publication-title: IEEE Trans. Serv. Comput.
– volume: 18
  start-page: 2787
  year: 2016
  end-page: 2821
  ident: b71
  article-title: A survey of network isolation solutions for multi-tenant data centers
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 5
  start-page: 8482
  year: 2017
  end-page: 8491
  ident: b65
  article-title: Evolutionary game theoretic analysis of advanced persistent threats against cloud storage
  publication-title: IEEE Access
– start-page: 990
  year: 2014
  end-page: 1003
  ident: b10
  article-title: Cross-tenant side-channel attacks in PaaS clouds
  publication-title: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
– volume: 65
  start-page: 140
  year: 2016
  end-page: 152
  ident: b13
  article-title: A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds
  publication-title: Future Gener. Comput. Syst.
– volume: 55
  start-page: 66
  year: 2018
  end-page: 75
  ident: b78
  article-title: A task scheduling method for cloud workflow security
  publication-title: J. Comput. Res. Dev.
– year: 2012
  ident: b57
  article-title: Artificial diversity as maneuvers in a control theoretic moving target defense
  publication-title: National Symposium on Moving Target Research
– start-page: 655
  year: 2018
  end-page: 665
  ident: b14
  article-title: Trusted model for virtual machine security in cloud computing
  publication-title: Progress in Computing, Analytics and Networking
– volume: 28
  start-page: 2674
  year: 2017
  end-page: 2688
  ident: b42
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– start-page: 178
  year: 2017
  end-page: 186
  ident: b55
  article-title: A game theoretic approach to strategy generation for moving target defense in web applications
  publication-title: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems
– volume: 71
  start-page: 3373
  year: 2015
  end-page: 3418
  ident: b22
  article-title: Workflow scheduling in cloud: a survey
  publication-title: J. Supercomput.
– reference: M. Crouse, E.W. Fulp, D. Canas, Improving the diversity defense of genetic algorithm-based moving target approaches, in: Proceedings of the National Symposium on Moving Target Research, 2012.
– start-page: 1
  year: 2012
  end-page: 8
  ident: b30
  article-title: Workflowsim: A toolkit for simulating scientific workflows in distributed environments
  publication-title: 2012 IEEE 8th International Conference on E-Science
– volume: 28
  start-page: 2674
  year: 2017
  end-page: 2688
  ident: b5
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– start-page: 315
  year: 2017
  end-page: 335
  ident: b64
  article-title: A stackelberg game and markov modeling of moving target defense
  publication-title: International Conference on Decision and Game Theory for Security
– start-page: 270
  year: 2015
  end-page: 288
  ident: b72
  article-title: Sequentially composable rational proofs
  publication-title: International Conference on Decision and Game Theory for Security
– volume: 17
  start-page: 1122
  year: 2016
  end-page: 1153
  ident: b20
  article-title: Moving target defense: state of the art and characteristics
  publication-title: Front. Inf. Technol. Electron. Eng.
– start-page: 1261
  year: 2014
  end-page: 1268
  ident: b60
  article-title: Evolutionary based moving target cyber defense
  publication-title: Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation
– volume: 100
  start-page: 813
  year: 2017
  end-page: 821
  ident: b24
  article-title: Dynamic scheduling of workflow for makespan and robustness improvement in the iaas cloud
  publication-title: IEICE Trans. Inf. Syst.
– year: 2018
  ident: b21
  article-title: Moving target defense techniques: A survey
  publication-title: Secur. Commun. Netw.
– volume: 305
  start-page: 357
  year: 2015
  end-page: 383
  ident: b43
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
– volume: 9
  start-page: 20
  year: 2017
  ident: b12
  article-title: An access control model for preventing virtual machine escape attack
  publication-title: Future Internet
– volume: 5
  start-page: 428
  year: 2015
  end-page: 442
  ident: b16
  article-title: TruXy: Trusted storage cloud for scientific workflows
  publication-title: IEEE Trans. Cloud Comput.
– volume: 3
  start-page: 2687
  year: 2015
  end-page: 2699
  ident: b25
  article-title: A multi-objective optimization scheduling method based on the ant colony algorithm in cloud computing
  publication-title: IEEE Access
– volume: 46
  start-page: 17
  year: 2015
  end-page: 35
  ident: b77
  article-title: Pegasus, a workflow management system for science automation
  publication-title: Future Gener. Comput. Syst.
– volume: 80
  start-page: 153
  year: 2015
  end-page: 162
  ident: b34
  article-title: Resource-efficient workflow scheduling in clouds
  publication-title: Knowl.-Based Syst.
– volume: 28
  start-page: 3671
  year: 2017
  end-page: 3683
  ident: b27
  article-title: Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– start-page: 181
  year: 2016
  end-page: 186
  ident: b48
  article-title: A shared memory based cross-VM side channel attacks in IaaS cloud
  publication-title: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
– start-page: 1
  year: 2017
  end-page: 9
  ident: b56
  article-title: A signaling game model for moving target defense
  publication-title: IEEE INFOCOM 2017-IEEE Conference on Computer Communications
– volume: 13
  start-page: 260
  year: 2002
  end-page: 274
  ident: b29
  article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– year: 2019
  ident: b18
  article-title: Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment
  publication-title: Future Gener. Comput. Syst.
– start-page: 115
  year: 2009
  end-page: 131
  ident: b75
  article-title: A performance analysis of EC2 cloud computing services for scientific computing
  publication-title: International Conference on Cloud Computing
– start-page: 21
  year: 2014
  end-page: 30
  ident: b63
  article-title: A game theoretic approach to strategy determination for dynamic platform defenses
  publication-title: Proceedings of the First ACM Workshop on Moving Target Defense
– volume: 29
  start-page: 1
  year: 2017
  end-page: 23
  ident: b8
  article-title: A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments
  publication-title: Concurr. Comput.: Pract. Exper.
– volume: 12
  start-page: 34
  year: 2010
  ident: b2
  article-title: Scientific computing in the cloud
  publication-title: Comput. Sci. Eng.
– start-page: 315
  year: 2017
  end-page: 335
  ident: b54
  article-title: A stackelberg game and markov modeling of moving target defense
  publication-title: International Conference on Decision and Game Theory for Security
– volume: 539
  start-page: 374
  year: 2014
  end-page: 377
  ident: b46
  article-title: Analysis of risks for virtualization technology
  publication-title: Appl. Mech. Mater. Trans. Tech. Publ.
– start-page: 231
  year: 2014
  end-page: 256
  ident: b1
  article-title: Migrating scientific workflow management systems from the grid to the cloud
  publication-title: Cloud Computing for Data-Intensive Applications
– reference: Z. Guo, S. Hui, Y. Xu, et al. Dynamic flow scheduling for power efficient data center networks, in: IEEE/ACM International Symposium on Quality of Service, Beijing, China, 2016, pp. 1–10.
– volume: 75
  start-page: 141
  year: 2015
  end-page: 151
  ident: b40
  article-title: SABA: A security-aware and budget-aware workflow scheduling strategy in clouds
  publication-title: J. Parallel Distrib. Comput.
– year: 2013
  ident: b58
  article-title: Application of cybernetics and control theory for a new paradigm in cybersecurity
– start-page: 144
  year: 2016
  end-page: 145
  ident: b11
  article-title: Secure virtual network embedding to mitigate the risk of covert channel attacks
  publication-title: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
– volume: 393
  start-page: 47
  year: 2017
  end-page: 65
  ident: b37
  article-title: Fault-tolerant elastic scheduling algorithm for workflow in cloud systems
  publication-title: Inform. Sci.
– start-page: 34
  year: 2013
  end-page: 41
  ident: b33
  article-title: Energy-constrained provisioning for scientific workflow ensembles
  publication-title: 2013 International Conference on Cloud and Green Computing
– start-page: 591
  year: 2015
  end-page: 604
  ident: b51
  article-title: S $ A: A shared cache attack that works across cores and defies VM sandboxing–and its application to AES
  publication-title: IEEE Symposium on Security and Privacy
– volume: 7
  start-page: 126603
  year: 2019
  end-page: 126617
  ident: b70
  article-title: Securing the intermediate data of scientific workflows in clouds with ACISO
  publication-title: IEEE Access
– year: 2018
  ident: b66
  article-title: A note on the complexity of scheduling of communication-aware directed acyclic graph
  publication-title: Bull. Pol. Acad. Sci. Tech. Sci.
– start-page: 1
  year: 2013
  end-page: 13
  ident: b61
  article-title: Game theoretic approaches to attack surface shifting
  publication-title: Moving Target Defense II
– start-page: 839
  year: 2015
  end-page: 848
  ident: b26
  article-title: A responsive knapsack-based algorithm for resource provisioning and scheduling of scientific workflows in clouds
  publication-title: 2015 44th International Conference on Parallel Processing
– volume: 20
  start-page: 70
  year: 2016
  end-page: 76
  ident: b4
  article-title: Pegasus in the cloud: Science automation through workflow technologies
  publication-title: IEEE Internet Comput.
– start-page: 1
  year: 2017
  end-page: 9
  ident: b9
  article-title: Malicious co-residency on the cloud: Attacks and defense
  publication-title: IEEE INFOCOM 2017-IEEE Conference on Computer Communications
– start-page: 1585
  year: 2015
  end-page: 1630
  ident: b47
  article-title: Security and privacy issues in cloud computing. Cloud technology: Concepts, methodologies, tools, and applications
  publication-title: IGI Global
– reference: .
– volume: 23
  start-page: 1745
  year: 2019
  end-page: 1765
  ident: b52
  article-title: Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing
  publication-title: Soft Comput.
– volume: 10
  start-page: 30
  year: 2016
  ident: b39
  article-title: Enhancing reliability of workflow execution using task replication and spot instances
  publication-title: ACM Trans. Auton. Adapt. Syst. (TAAS)
– volume: 14
  start-page: 23
  year: 2016
  end-page: 39
  ident: b67
  article-title: CA-DAG: Modeling communication-aware applications for scheduling in cloud computing
  publication-title: J. Grid Comput.
– start-page: 246
  year: 2013
  end-page: 263
  ident: b62
  article-title: Game-theoretic approach to feedback-driven multi-stage moving target defense
  publication-title: International Conference on Decision and Game Theory for Security
– volume: 22
  start-page: 931
  year: 2011
  end-page: 945
  ident: b3
  article-title: Performance analysis of cloud computing services for many-tasks scientific computing
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 4
  start-page: 34
  year: 2016
  end-page: 48
  ident: b23
  article-title: Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds
  publication-title: IEEE Trans. Cloud Comput.
– volume: 10
  start-page: 929
  year: 2016
  end-page: 941
  ident: b53
  article-title: Cost effective, reliable and secure workflow deployment over federated clouds
  publication-title: IEEE Trans. Serv. Comput.
– start-page: 144
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b11
  article-title: Secure virtual network embedding to mitigate the risk of covert channel attacks
– start-page: 1
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b56
  article-title: A signaling game model for moving target defense
– ident: 10.1016/j.future.2019.11.003_b32
– ident: 10.1016/j.future.2019.11.003_b59
– start-page: 1
  year: 2013
  ident: 10.1016/j.future.2019.11.003_b61
  article-title: Game theoretic approaches to attack surface shifting
– start-page: 591
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b51
  article-title: S $ A: A shared cache attack that works across cores and defies VM sandboxing–and its application to AES
– volume: 62
  start-page: 1
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b76
  article-title: A hybrid multi-objective particle swarm optimization for scientific workflow scheduling
  publication-title: Parallel Comput.
  doi: 10.1016/j.parco.2017.01.002
– year: 1994
  ident: 10.1016/j.future.2019.11.003_b73
– start-page: 315
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b54
  article-title: A stackelberg game and markov modeling of moving target defense
– volume: 539
  start-page: 374
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b46
  article-title: Analysis of risks for virtualization technology
  publication-title: Appl. Mech. Mater. Trans. Tech. Publ.
  doi: 10.4028/www.scientific.net/AMM.539.374
– start-page: 41
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b17
  article-title: Diverse virtual replicas for improving intrusion tolerance in cloud
– volume: 5
  start-page: 428
  issue: 3
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b16
  article-title: TruXy: Trusted storage cloud for scientific workflows
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2015.2489638
– ident: 10.1016/j.future.2019.11.003_b69
  doi: 10.1145/1645164.1645167
– volume: 19
  start-page: 1522
  issue: 12
  year: 2018
  ident: 10.1016/j.future.2019.11.003_b15
  article-title: Scientific workflow execution system based on mimic defense in the cloud environment
  publication-title: Front. Inf. Technol. Electron. Eng.
  doi: 10.1631/FITEE.1800621
– volume: 28
  start-page: 3671
  issue: 12
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b27
  article-title: Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2017.2687923
– volume: 7
  start-page: 126603
  issue: 1
  year: 2019
  ident: 10.1016/j.future.2019.11.003_b70
  article-title: Securing the intermediate data of scientific workflows in clouds with ACISO
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2938823
– start-page: 401
  year: 2011
  ident: 10.1016/j.future.2019.11.003_b44
  article-title: Eliminating the hypervisor attack surface for a more secure cloud
– year: 2019
  ident: 10.1016/j.future.2019.11.003_b18
  article-title: Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment
  publication-title: Future Gener. Comput. Syst.
– volume: 55
  start-page: 66
  issue: 6
  year: 2018
  ident: 10.1016/j.future.2019.11.003_b78
  article-title: A task scheduling method for cloud workflow security
  publication-title: J. Comput. Res. Dev.
– volume: 393
  start-page: 47
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b37
  article-title: Fault-tolerant elastic scheduling algorithm for workflow in cloud systems
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2017.01.035
– volume: 46
  start-page: 17
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b77
  article-title: Pegasus, a workflow management system for science automation
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2014.10.008
– volume: 12
  start-page: 34
  issue: 3
  year: 2010
  ident: 10.1016/j.future.2019.11.003_b2
  article-title: Scientific computing in the cloud
  publication-title: Comput. Sci. Eng.
  doi: 10.1109/MCSE.2010.70
– ident: 10.1016/j.future.2019.11.003_b36
  doi: 10.1109/IWQoS.2016.7590399
– volume: 41
  start-page: 423
  issue: 2
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b41
  article-title: Security-aware intermediate data placement strategy in scientific cloud workflows
  publication-title: Knowl. Inf. Syst.
  doi: 10.1007/s10115-014-0755-x
– start-page: 178
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b55
  article-title: A game theoretic approach to strategy generation for moving target defense in web applications
– start-page: 1261
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b60
  article-title: Evolutionary based moving target cyber defense
– volume: 14
  start-page: 23
  issue: 1
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b67
  article-title: CA-DAG: Modeling communication-aware applications for scheduling in cloud computing
  publication-title: J. Grid Comput.
  doi: 10.1007/s10723-015-9337-8
– start-page: 34
  year: 2013
  ident: 10.1016/j.future.2019.11.003_b33
  article-title: Energy-constrained provisioning for scientific workflow ensembles
– volume: 4
  start-page: 166
  issue: 2
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b35
  article-title: EnReal: An energy-aware resource allocation method for scientific workflow executions in cloud environment
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2015.2453966
– start-page: 990
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b10
  article-title: Cross-tenant side-channel attacks in PaaS clouds
– volume: 100
  start-page: 813
  issue: 4
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b24
  article-title: Dynamic scheduling of workflow for makespan and robustness improvement in the iaas cloud
  publication-title: IEICE Trans. Inf. Syst.
  doi: 10.1587/transinf.2016EDP7346
– ident: 10.1016/j.future.2019.11.003_b6
– volume: 44
  start-page: 735
  issue: 6
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b19
  article-title: Analysis of operating system diversity for intrusion tolerance
  publication-title: Softw. - Pract. Exp.
  doi: 10.1002/spe.2180
– volume: 99
  start-page: 39
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b38
  article-title: An immune system-inspired rescheduling algorithm for workflow in cloud systems
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2016.01.037
– start-page: 605
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b50
  article-title: Last-level cache side-channel attacks are practical
– start-page: 1
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b9
  article-title: Malicious co-residency on the cloud: Attacks and defense
– year: 2018
  ident: 10.1016/j.future.2019.11.003_b21
  article-title: Moving target defense techniques: A survey
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2018/3759626
– volume: 28
  start-page: 2674
  issue: 9
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b42
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2017.2678507
– volume: 5
  start-page: 8482
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b65
  article-title: Evolutionary game theoretic analysis of advanced persistent threats against cloud storage
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2691326
– volume: 22
  start-page: 931
  issue: 6
  year: 2011
  ident: 10.1016/j.future.2019.11.003_b3
  article-title: Performance analysis of cloud computing services for many-tasks scientific computing
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2011.66
– volume: 9
  start-page: 20
  issue: 2
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b12
  article-title: An access control model for preventing virtual machine escape attack
  publication-title: Future Internet
  doi: 10.3390/fi9020020
– volume: 80
  start-page: 153
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b34
  article-title: Resource-efficient workflow scheduling in clouds
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2015.02.012
– volume: 18
  start-page: 2787
  issue: 4
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b71
  article-title: A survey of network isolation solutions for multi-tenant data centers
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2016.2556979
– start-page: 655
  year: 2018
  ident: 10.1016/j.future.2019.11.003_b14
  article-title: Trusted model for virtual machine security in cloud computing
– start-page: 21
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b63
  article-title: A game theoretic approach to strategy determination for dynamic platform defenses
– volume: 4
  start-page: 34
  issue: 1
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b23
  article-title: Monetary cost optimizations for hosting workflow-as-a-service in IaaS clouds
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2015.2404807
– start-page: 315
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b64
  article-title: A stackelberg game and markov modeling of moving target defense
– volume: 71
  start-page: 848
  issue: 6
  year: 2011
  ident: 10.1016/j.future.2019.11.003_b28
  article-title: BTS: Resource capacity estimate for time-targeted science workflows
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2011.01.008
– start-page: 1585
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b47
  article-title: Security and privacy issues in cloud computing. Cloud technology: Concepts, methodologies, tools, and applications
  publication-title: IGI Global
– volume: 28
  start-page: 2674
  issue: 9
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b5
  article-title: Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2017.2678507
– volume: 305
  start-page: 357
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b43
  article-title: Security in cloud computing: opportunities and challenges
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.01.025
– start-page: 839
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b26
  article-title: A responsive knapsack-based algorithm for resource provisioning and scheduling of scientific workflows in clouds
– volume: 21
  start-page: 562
  issue: 4
  year: 2013
  ident: 10.1016/j.future.2019.11.003_b45
  article-title: Security-preserving live migration of virtual machines in the cloud
  publication-title: J. Netw. Syst. Manage.
  doi: 10.1007/s10922-012-9253-1
– start-page: 181
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b48
  article-title: A shared memory based cross-VM side channel attacks in IaaS cloud
– volume: 17
  start-page: 1122
  issue: 11
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b20
  article-title: Moving target defense: state of the art and characteristics
  publication-title: Front. Inf. Technol. Electron. Eng.
  doi: 10.1631/FITEE.1601321
– volume: 13
  start-page: 260
  issue: 3
  year: 2002
  ident: 10.1016/j.future.2019.11.003_b29
  article-title: Performance-effective and low-complexity task scheduling for heterogeneous computing
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/71.993206
– volume: 10
  start-page: 929
  issue: 6
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b53
  article-title: Cost effective, reliable and secure workflow deployment over federated clouds
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2016.2543719
– start-page: 406
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b49
  article-title: Catalyst: Defeating last-level cache side channel attacks in cloud computing
– volume: 3
  start-page: 2687
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b25
  article-title: A multi-objective optimization scheduling method based on the ant colony algorithm in cloud computing
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2015.2508940
– volume: 20
  start-page: 70
  issue: 1
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b4
  article-title: Pegasus in the cloud: Science automation through workflow technologies
  publication-title: IEEE Internet Comput.
  doi: 10.1109/MIC.2016.15
– volume: 24
  start-page: 956
  issue: 9
  year: 2012
  ident: 10.1016/j.future.2019.11.003_b7
  article-title: A data dependency based strategy for intermediate data storage in scientific cloud workflow systems
  publication-title: Concurr. Comput.: Pract. Exper.
  doi: 10.1002/cpe.1636
– volume: 75
  start-page: 141
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b40
  article-title: SABA: A security-aware and budget-aware workflow scheduling strategy in clouds
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2014.09.002
– volume: 65
  start-page: 140
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b13
  article-title: A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2015.12.014
– start-page: 246
  year: 2013
  ident: 10.1016/j.future.2019.11.003_b62
  article-title: Game-theoretic approach to feedback-driven multi-stage moving target defense
– start-page: 270
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b72
  article-title: Sequentially composable rational proofs
– start-page: 1
  year: 2012
  ident: 10.1016/j.future.2019.11.003_b30
  article-title: Workflowsim: A toolkit for simulating scientific workflows in distributed environments
– volume: 23
  start-page: 1745
  issue: 5
  year: 2019
  ident: 10.1016/j.future.2019.11.003_b52
  article-title: Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing
  publication-title: Soft Comput.
  doi: 10.1007/s00500-017-2897-8
– volume: 2
  start-page: 79
  issue: 1
  year: 2009
  ident: 10.1016/j.future.2019.11.003_b68
  article-title: Architecture for scientific workflow management systems and the VIEW SOA solution
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2009.4
– volume: 29
  start-page: 1
  issue: 8
  year: 2017
  ident: 10.1016/j.future.2019.11.003_b8
  article-title: A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments
  publication-title: Concurr. Comput.: Pract. Exper.
  doi: 10.1002/cpe.4041
– volume: 10
  start-page: 30
  issue: 4
  year: 2016
  ident: 10.1016/j.future.2019.11.003_b39
  article-title: Enhancing reliability of workflow execution using task replication and spot instances
  publication-title: ACM Trans. Auton. Adapt. Syst. (TAAS)
– year: 2013
  ident: 10.1016/j.future.2019.11.003_b58
– volume: 55
  start-page: 38
  issue: 3
  year: 2012
  ident: 10.1016/j.future.2019.11.003_b31
  article-title: OpenStack: toward an open-source solution for cloud computing
  publication-title: Int. J. Comput. Appl.
– start-page: 82
  year: 2006
  ident: 10.1016/j.future.2019.11.003_b74
  article-title: Computing the optimal strategy to commit to
– year: 2018
  ident: 10.1016/j.future.2019.11.003_b66
  article-title: A note on the complexity of scheduling of communication-aware directed acyclic graph
  publication-title: Bull. Pol. Acad. Sci. Tech. Sci.
– volume: 71
  start-page: 3373
  issue: 9
  year: 2015
  ident: 10.1016/j.future.2019.11.003_b22
  article-title: Workflow scheduling in cloud: a survey
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-015-1438-4
– start-page: 231
  year: 2014
  ident: 10.1016/j.future.2019.11.003_b1
  article-title: Migrating scientific workflow management systems from the grid to the cloud
– year: 2012
  ident: 10.1016/j.future.2019.11.003_b57
  article-title: Artificial diversity as maneuvers in a control theoretic moving target defense
– start-page: 115
  year: 2009
  ident: 10.1016/j.future.2019.11.003_b75
  article-title: A performance analysis of EC2 cloud computing services for scientific computing
SSID ssj0001731
Score 2.468
Snippet The multi-tenant coexistence service mode makes the cloud-based scientific workflow encounter the risks of being intruded. For this problem, we propose a CLoud...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 460
SubjectTerms Attack–defense game
Diverse operating systems
Moving target defense
Scientific workflow
Workflow scheduling
Title CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model
URI https://dx.doi.org/10.1016/j.future.2019.11.003
Volume 111
WOSCitedRecordID wos000541155100034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7115
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001731
  issn: 0167-739X
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JbtswECWMpIdeuhdNN_DQW6DAtDayNyNwuiBIi8ZBnR4qkBQZO1CkwJWSHPsPPfX3-iUdLpKMuugG9CIYhGQTnOfZNDMPoWc0EUOZj-KAcM6CSGgSMBWKQEitiBSUamVH5u-nBwd0NmNvB4OvbS_MRZGWJb26Yuf_VdSwBsI2rbN_Ie7uS2EBPoPQ4Qpih-sfCX53_83h0buJazmXRdXkvuvRFAVZahhdVJewNgcrY5vReXFSLRf1_Gzb2LTcvD_gdc1BUfpKiDBXGsJdtX3Cz5Qjz1l1avfsXBJDxqw8nqTnivCDoju__b3PTh_zy74F7UVj07XHTanV4ofFD2re9CkD7ktApnO-XE1XQGzaFr75HNpaH41La4K6TkNLqgtWyalimoLvT1yzZ6ervWZ22jZyVATecEeO7mfNJrj0xOmOG9JiqvnYjhncOgx7G9hVJh6arZidgGNLwsTMkd0cpTEDhbk5fjWZve7MPEk92aXfetuXaYsH13_r537Pii8zvYVu-CAEjx14bqOBKu-gmy3BB_b6_i766LH0HI-xRRLukYRbJOEeSbhDErZIwlWJHZK-ff7iMYQNhrDF0D10tDeZ7r4MPCFHICGyrAPORyI35JlcMjmMEqqYVlokPM7pKIx0GJI4UVEqo1hDGC4kjzmjyrx6MEOedHgfbZRVqR4gTMC4aSIoZzwy3dRiqEFHSDJkVAsuyRYK2-PKpJ9Wb0hTiqwtSzzN3CFn5pAhkDVTbrdQ0D117qa1_Ob-tJVE5j1O50lmAJ5fPvnwn598hK73_4vHaKNeNuoJuiYv6sWn5VOPsu_0hKm8
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CLOSURE%3A+A+cloud+scientific+workflow+scheduling+algorithm+based+on+attack%E2%80%93defense+game+model&rft.jtitle=Future+generation+computer+systems&rft.au=Wang%2C+Yawen&rft.au=Guo%2C+Yunfei&rft.au=Guo%2C+Zehua&rft.au=Baker%2C+Thar&rft.date=2020-10-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=111&rft.spage=460&rft.epage=474&rft_id=info:doi/10.1016%2Fj.future.2019.11.003&rft.externalDocID=S0167739X19313603
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon