INHIBITOR: An intrusion tolerant scheduling algorithm in cloud-based scientific workflow system
With the development of cloud computing technologies, more and more scientific workflows have been executed in clouds. However, cloud-based scientific workflows face many threats due to the resource sharing. Adversaries in clouds can directly or indirectly destroy them by means of side channels, vir...
Saved in:
| Published in: | Future generation computer systems Vol. 114; pp. 272 - 284 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.01.2021
|
| Subjects: | |
| ISSN: | 0167-739X, 1872-7115 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | With the development of cloud computing technologies, more and more scientific workflows have been executed in clouds. However, cloud-based scientific workflows face many threats due to the resource sharing. Adversaries in clouds can directly or indirectly destroy them by means of side channels, virtual machine escape, and so on, which will cause interruption or produce incorrect outputs. Cloud-based scientific workflows are often applied in important scientific research fields, their failures will bring huge losses. Therefore, we propose an Intrusion toleraNt scHeduling algorIthm in cloud-Based scIenTific wORkflow system (INHIBITOR) to enhance the security. This algorithm constructs three replicas for each sub-task and designs a voting mechanism to realize the result verification. Based on this framework, INHIBITOR studies how to schedule these sub-task replicas and deduces the constraints which should be satisfied for intrusion tolerant scheduling. Furthermore, an elastic resource provisioning strategy is presented to improve resource utilization. To verify the effectiveness of INHIBITOR, we conduct experiments with WorkflowSim toolkit and use success rate, task completion rate and execution costs to evaluate it. Experimental results demonstrate that, compared with existing methods, INHIBITOR can not only increase the success rate by around 12.54%, but also improve the efficiency by about 4.7% and reduce execution costs by around 11.29%.
•We analyze ITSW and conclude that scheduling affects intrusion tolerance of ITSW.•We deduce the time and location constraints of intrusion tolerant scheduling.•We present an elastic resource provisioning mechanism. |
|---|---|
| ISSN: | 0167-739X 1872-7115 |
| DOI: | 10.1016/j.future.2020.08.004 |