TruXy: Trusted Storage Cloud for Scientific Workflows

A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately su...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on cloud computing Ročník 5; číslo 3; s. 428 - 442
Hlavní autoři: Nepal, Surya, Sinnott, Richard O., Friedrich, Carsten, Wise, Catherine, Shiping Chen, Kanwal, Sehrish, Jinhui Yao, Lonie, Andrew
Médium: Journal Article
Jazyk:angličtina
Vydáno: IEEE Computer Society 01.07.2017
Témata:
ISSN:2168-7161, 2372-0018
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately support the repeatability of science. As a result, a number of systems that integrate clouds with these workflow systems have emerged including CloudMap, CloudMan, Galaxy cloud, BioBlend, etc. Though these systems have proven to be successful in service and data integration, they have not dealt with the data security issue inherent in cloud-based systems with the outsourced models of infrastructure provisioning. For many domains, e.g., health, this poses serious challenges regarding the adoption of cloud infrastructures. Yet such domains also have much to gain from clouds especially given the explosion of genomics data and opportunities for personalized medicine in the big data era. This paper addresses this problem by presenting a trusted storage cloud for scientific workflows, called TruXy. The paper describes the TruXy architecture, the corresponding protocols and illustrates the adoption of TruXy to support collaborative bioinformatics research in endocrine genomics. A range of experiments have been performed to measure the performance of TruXy for processing of exome data sets on individuals with a rare genetic disorders: disorders of sex development (DSD). Our results show that the performance of TruXy is comparable to that of using a standalone workflow tool and that it can handle the big data security challenges required.
AbstractList A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately support the repeatability of science. As a result, a number of systems that integrate clouds with these workflow systems have emerged including CloudMap, CloudMan, Galaxy cloud, BioBlend, etc. Though these systems have proven to be successful in service and data integration, they have not dealt with the data security issue inherent in cloud-based systems with the outsourced models of infrastructure provisioning. For many domains, e.g., health, this poses serious challenges regarding the adoption of cloud infrastructures. Yet such domains also have much to gain from clouds especially given the explosion of genomics data and opportunities for personalized medicine in the big data era. This paper addresses this problem by presenting a trusted storage cloud for scientific workflows, called TruXy. The paper describes the TruXy architecture, the corresponding protocols and illustrates the adoption of TruXy to support collaborative bioinformatics research in endocrine genomics. A range of experiments have been performed to measure the performance of TruXy for processing of exome data sets on individuals with a rare genetic disorders: disorders of sex development (DSD). Our results show that the performance of TruXy is comparable to that of using a standalone workflow tool and that it can handle the big data security challenges required.
Author Jinhui Yao
Sinnott, Richard O.
Shiping Chen
Friedrich, Carsten
Wise, Catherine
Lonie, Andrew
Nepal, Surya
Kanwal, Sehrish
Author_xml – sequence: 1
  givenname: Surya
  surname: Nepal
  fullname: Nepal, Surya
  email: surya.nepal@csiro.au
  organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia
– sequence: 2
  givenname: Richard O.
  surname: Sinnott
  fullname: Sinnott, Richard O.
  email: rsinnott@unimelb.edu.au
  organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia
– sequence: 3
  givenname: Carsten
  surname: Friedrich
  fullname: Friedrich, Carsten
  email: Carsten.Friedrich@csiro.au
  organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia
– sequence: 4
  givenname: Catherine
  surname: Wise
  fullname: Wise, Catherine
  email: Catherine.Wise@csiro.au
  organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia
– sequence: 5
  surname: Shiping Chen
  fullname: Shiping Chen
  email: shiping.chen@csiro.au
  organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia
– sequence: 6
  givenname: Sehrish
  surname: Kanwal
  fullname: Kanwal, Sehrish
  email: skanwal@student.unimelb.edu.au
  organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia
– sequence: 7
  surname: Jinhui Yao
  fullname: Jinhui Yao
  email: jinhui.yao@gmail.com
  organization: Sch. of Electr. & Inf. Eng., Univ. of Sydney, Sydney, NSW, Australia
– sequence: 8
  givenname: Andrew
  surname: Lonie
  fullname: Lonie, Andrew
  email: alonie@unimelb.edu.au
  organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia
BookMark eNp9j01LAzEQhoNUsNbeBS_7B7Zmkk028SaLXyB4aEVvS5qdSHTdSJIi_fduafHgwbm8Ay_PDM8pmQxhQELOgS4AqL5cNc2CURALViktuToiU8ZrVlIKajLuIFVZg4QTMk_pnY6jBGjQUyJWcfO6vSrGSBm7YplDNG9YNH3YdIULsVhaj0P2ztviJcQP14fvdEaOnekTzg85I8-3N6vmvnx8untorh9LyznPpanXjBoUBgGwqyvGqlo6bYRUrFNC2rFzWq-llRqEq5CjVkZQVbOucpXlM0L3d20MKUV07Vf0nyZuW6DtzrwdzdudeXswHxH5B7E-m-zDkKPx_X_gxR70iPj7p2ZaCs35DyXDZtg
CODEN ITCCF6
CitedBy_id crossref_primary_10_1007_s00607_021_00905_1
crossref_primary_10_1109_ACCESS_2019_2938823
crossref_primary_10_1016_j_future_2019_11_003
crossref_primary_10_7717_peerj_cs_747
crossref_primary_10_1007_s41019_016_0014_0
crossref_primary_10_1002_ett_4108
crossref_primary_10_1016_j_future_2020_08_004
crossref_primary_10_1080_10580530_2023_2194063
Cites_doi 10.1145/505452.505453
10.1109/MNET.2010.5510914
10.1109/eScience.2013.33
10.1145/1460877.1460889
10.1093/bioinformatics/btt199
10.1109/TSC.2013.2295611
10.1109/eScience.2008.167
10.1109/TPDS.2013.191
10.1186/gb-2010-11-8-r86
10.1109/35.312841
10.1109/CyberC.2011.80
10.1109/TKDE.2007.190647
10.1109/MobServ.2012.11
10.1534/genetics.112.144204
10.1007/978-3-540-79228-4_1
10.1109/ICDCSW.2010.36
10.1145/1653662.1653688
10.1145/2046707.2046767
10.1109/CCGRID.2010.17
10.1109/TSC.2011.24
10.1109/PDCAT.2013.49
10.1109/CIT.2010.171
10.1109/TKDE.2011.62
10.1002/cpe.3282
10.1007/978-1-84628-757-2
10.1093/bioinformatics/bth361
10.1145/1653662.1653686
10.1007/978-0-85729-439-5_6
10.1109/TPDS.2011.252
10.1109/ICDE.2005.42
10.1038/nbt.2028
10.1007/978-3-642-39640-3_27
10.1109/CEC.2011.45
10.1007/978-1-84996-241-4_9
10.1007/978-1-4419-6524-0_13
10.1109/ESCIW.2009.5408002
10.1109/CLOUD.2010.64
10.1109/71.910866
10.1109/TC.2011.245
10.1109/MSST.2010.5496972
10.1007/978-1-4614-1933-4
10.1145/1315245.1315317
10.1109/CCGrid.2013.109
10.1109/DSNW.2011.5958795
10.1109/CLOUD.2011.35
10.1145/2535929
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TCC.2015.2489638
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2372-0018
EndPage 442
ExternalDocumentID 10_1109_TCC_2015_2489638
7296593
Genre orig-research
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
ID FETCH-LOGICAL-c333t-a7b20ae5ae11ed7422476f9a5682d856cae5f99b6c6915f4e3e98a50872d4f4c3
IEDL.DBID RIE
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416650800006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2168-7161
IngestDate Sat Nov 29 04:10:57 EST 2025
Tue Nov 18 22:20:18 EST 2025
Wed Aug 27 03:07:55 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c333t-a7b20ae5ae11ed7422476f9a5682d856cae5f99b6c6915f4e3e98a50872d4f4c3
PageCount 15
ParticipantIDs crossref_primary_10_1109_TCC_2015_2489638
crossref_citationtrail_10_1109_TCC_2015_2489638
ieee_primary_7296593
PublicationCentury 2000
PublicationDate 2017-07-01
PublicationDateYYYYMMDD 2017-07-01
PublicationDate_xml – month: 07
  year: 2017
  text: 2017-07-01
  day: 01
PublicationDecade 2010
PublicationTitle IEEE transactions on cloud computing
PublicationTitleAbbrev TCC
PublicationYear 2017
Publisher IEEE Computer Society
Publisher_xml – name: IEEE Computer Society
References ref13
ref12
ref15
ateniese (ref35) 0
ref14
ref53
ref11
ref54
ref17
ref16
ref18
ref51
ref50
ref46
ref45
ref41
ref43
hao (ref30) 2011; 23
ref49
lin (ref42) 2012; 23
ref8
roy (ref47) 0
ref7
ref4
ref6
ref5
ref40
keahey (ref3) 2008
ref34
long (ref52) 1994; 7
ref37
bugiel (ref23) 0
ref36
ref31
ref33
ref32
ko (ref48) 0
ref2
ref1
ref39
ref38
kamara (ref44) 2011
liu (ref19) 2012
ref24
ref26
ref25
ref20
ref22
ref21
sinnott (ref10) 2014; 27
ref28
ref27
ref29
deelman (ref9) 0
References_xml – ident: ref51
  doi: 10.1145/505452.505453
– ident: ref34
  doi: 10.1109/MNET.2010.5510914
– ident: ref17
  doi: 10.1109/eScience.2013.33
– year: 2011
  ident: ref44
  article-title: Cs2: A searchable cryptographic cloud storage system
– ident: ref36
  doi: 10.1145/1460877.1460889
– ident: ref13
  doi: 10.1093/bioinformatics/btt199
– ident: ref29
  doi: 10.1109/TSC.2013.2295611
– ident: ref1
  doi: 10.1109/eScience.2008.167
– ident: ref28
  doi: 10.1109/TPDS.2013.191
– ident: ref8
  doi: 10.1186/gb-2010-11-8-r86
– start-page: 32
  year: 0
  ident: ref23
  article-title: Twin clouds: Secure cloud computing with low latency
  publication-title: Proc 12th Int Conf Commun Multimedia Security
– ident: ref46
  doi: 10.1109/35.312841
– ident: ref20
  doi: 10.1109/CyberC.2011.80
– ident: ref31
  doi: 10.1109/TKDE.2007.190647
– ident: ref54
  doi: 10.1109/MobServ.2012.11
– ident: ref14
  doi: 10.1534/genetics.112.144204
– ident: ref26
  doi: 10.1007/978-3-540-79228-4_1
– ident: ref32
  doi: 10.1109/ICDCSW.2010.36
– ident: ref38
  doi: 10.1145/1653662.1653688
– ident: ref49
  doi: 10.1145/2046707.2046767
– start-page: 598
  year: 0
  ident: ref35
  article-title: Provable data possession at untrusted stores
  publication-title: Proc 14th ACM Conf Comput Commun Security
– ident: ref18
  doi: 10.1109/CCGRID.2010.17
– ident: ref33
  doi: 10.1109/TSC.2011.24
– ident: ref50
  doi: 10.1109/PDCAT.2013.49
– ident: ref43
  doi: 10.1109/CIT.2010.171
– volume: 23
  start-page: 1432
  year: 2011
  ident: ref30
  article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2011.62
– volume: 27
  start-page: 358
  year: 2014
  ident: ref10
  article-title: The Australia urban research gateway
  publication-title: Concurrency Comput Pract Experience
  doi: 10.1002/cpe.3282
– ident: ref5
  doi: 10.1007/978-1-84628-757-2
– ident: ref11
  doi: 10.1093/bioinformatics/bth361
– ident: ref41
  doi: 10.1145/1653662.1653686
– ident: ref12
  doi: 10.1007/978-0-85729-439-5_6
– volume: 23
  start-page: 995
  year: 2012
  ident: ref42
  article-title: A secure erasure code-based cloud storage system with secure data forwarding
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2011.252
– ident: ref25
  doi: 10.1109/ICDE.2005.42
– ident: ref15
  doi: 10.1038/nbt.2028
– ident: ref16
  doi: 10.1007/978-3-642-39640-3_27
– start-page: 11
  year: 0
  ident: ref9
  article-title: Pegasus: Mapping scientific workflows onto the grid
  publication-title: Proc 2nd Eur AcrossGrids Conf Grid Comput
– ident: ref24
  doi: 10.1109/CEC.2011.45
– ident: ref4
  doi: 10.1007/978-1-84996-241-4_9
– start-page: 8
  year: 0
  ident: ref48
  article-title: The HybrEx model for confidentiality and privacy in cloud computing
  publication-title: Proc 3rd USENIX Conf Hot Topics Cloud Comput
– ident: ref7
  doi: 10.1007/978-1-4419-6524-0_13
– ident: ref2
  doi: 10.1109/ESCIW.2009.5408002
– ident: ref6
  doi: 10.1109/CLOUD.2010.64
– ident: ref53
  doi: 10.1109/71.910866
– volume: 7
  start-page: 333
  year: 1994
  ident: ref52
  article-title: Swift/RAID: A distributed RAID system
  publication-title: Comput Syst
– ident: ref27
  doi: 10.1109/TC.2011.245
– ident: ref45
  doi: 10.1109/MSST.2010.5496972
– year: 2012
  ident: ref19
  publication-title: Design Cloud Workflow Systems
  doi: 10.1007/978-1-4614-1933-4
– ident: ref37
  doi: 10.1145/1315245.1315317
– ident: ref22
  doi: 10.1109/CCGrid.2013.109
– start-page: 297
  year: 0
  ident: ref47
  article-title: Airavat: Security and privacy for MapReduce
  publication-title: Proc 7th USENIX Conf Netw Syst Des Implementation
– ident: ref21
  doi: 10.1109/DSNW.2011.5958795
– ident: ref39
  doi: 10.1109/CLOUD.2011.35
– ident: ref40
  doi: 10.1145/2535929
– start-page: 825
  year: 2008
  ident: ref3
  article-title: Science clouds: Early experiences in cloud computing for scientific applications
  publication-title: Proc Workshop Cloud Comput Appl
SSID ssj0000851919
Score 2.1211734
Snippet A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 428
SubjectTerms Bioinformatics
Cloud computing
data encryption
Data privacy
Distributed/Internet based software engineering tools and technique
Encryption
health care
integrity and protection
Protocols
security
Title TruXy: Trusted Storage Cloud for Scientific Workflows
URI https://ieeexplore.ieee.org/document/7296593
Volume 5
WOSCitedRecordID wos000416650800006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2372-0018
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000851919
  issn: 2168-7161
  databaseCode: RIE
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH7M4cGLU6c4f5GDF8FubZqkiTcZDg8yBKvsVtIkBWGssq2K_71J2hUFEbyV9gXKl7Tvey_fywO4FFFOVB6bgOuCBIR4EYBmgShwKCMmsfBqi5eHZDrls5l47MB1WwtjjPHiMzN0l34vX5eqcqmykSWCjIp4C7aShNW1Wm0-xVEHEYnNTmQoRul47KRbdIgJd8vsh-f51krFe5JJ73_vsAe7DWNEt_UU70PHLA6gt-nGgJqPsw80XVazzxuUuioKo9GTjabtzwKN52WlkeWmtanXBiGXIy_m5cfqEJ4nd-n4PmiaIgQqjuN1IJPcomioNFFktA1sMUlYISRlHGtOmbLPCiFyppiIaEFMbASXloYlWJOCqPgIuotyYY4BcW0Hcc21tqzIQiYpzRM7c5YkYiZ5OIDRBrBMNSeGu8YV88xHDqHILMSZgzhrIB7AVTvirT4t4w_bvkO3tWuAPfn99insYOdQvVD2DLrrZWXOYVu9r19Xywu_FL4AwLqw7w
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFL3MKeiLU6c4P_Pgi2C3fiRp4psMx8Q5BKvsraRNCsJYZVsV_71J2hUFEXwr7U0pJ0nvyc25uQAX3EtwmgTKYTLDDsZWBCCpwzPfFR4VPrdqi5dROB6zyYQ_NuCqzoVRSlnxmeqaS7uXL_O0MKGyniaClPBgDdaJfqtbZmvVERVDHrjHV3uRLu9F_b4Rb5Guj5kZaD98z7diKtaXDFr_-4od2K44I7opO3kXGmq2B61VPQZUTc82kGheTD6vUWTyKJRET3o9rX8XqD_NC4k0Oy1NrToImSh5Ns0_FvvwPLiN-kOnKovgpEEQLB0RJhpHRYTyPCX10tbHIc24IJT5khGa6mcZ5wlNKfdIhlWgOBOaiIW-xBlOgwNozvKZOgTEpG7EJJNS8yINmSAkCXXfaZroU8HcDvRWgMVpdWa4KV0xje3aweWxhjg2EMcVxB24rFu8ledl_GHbNujWdhWwR7_fPofNYfQwikd34_tj2PKNe7Wy2RNoLueFOoWN9H35upif2WHxBSPRtDY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=TruXy%3A+Trusted+Storage+Cloud+for+Scientific+Workflows&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Nepal%2C+Surya&rft.au=Sinnott%2C+Richard+O.&rft.au=Friedrich%2C+Carsten&rft.au=Wise%2C+Catherine&rft.date=2017-07-01&rft.pub=IEEE+Computer+Society&rft.eissn=2372-0018&rft.volume=5&rft.issue=3&rft.spage=428&rft.epage=442&rft_id=info:doi/10.1109%2FTCC.2015.2489638&rft.externalDocID=7296593
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon