TruXy: Trusted Storage Cloud for Scientific Workflows
A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately su...
Saved in:
| Published in: | IEEE transactions on cloud computing Vol. 5; no. 3; pp. 428 - 442 |
|---|---|
| Main Authors: | , , , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE Computer Society
01.07.2017
|
| Subjects: | |
| ISSN: | 2168-7161, 2372-0018 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately support the repeatability of science. As a result, a number of systems that integrate clouds with these workflow systems have emerged including CloudMap, CloudMan, Galaxy cloud, BioBlend, etc. Though these systems have proven to be successful in service and data integration, they have not dealt with the data security issue inherent in cloud-based systems with the outsourced models of infrastructure provisioning. For many domains, e.g., health, this poses serious challenges regarding the adoption of cloud infrastructures. Yet such domains also have much to gain from clouds especially given the explosion of genomics data and opportunities for personalized medicine in the big data era. This paper addresses this problem by presenting a trusted storage cloud for scientific workflows, called TruXy. The paper describes the TruXy architecture, the corresponding protocols and illustrates the adoption of TruXy to support collaborative bioinformatics research in endocrine genomics. A range of experiments have been performed to measure the performance of TruXy for processing of exome data sets on individuals with a rare genetic disorders: disorders of sex development (DSD). Our results show that the performance of TruXy is comparable to that of using a standalone workflow tool and that it can handle the big data security challenges required. |
|---|---|
| AbstractList | A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as Taverna and Galaxy to model the execution of tasks to support and expedite the reenactment of complex processes, and ultimately support the repeatability of science. As a result, a number of systems that integrate clouds with these workflow systems have emerged including CloudMap, CloudMan, Galaxy cloud, BioBlend, etc. Though these systems have proven to be successful in service and data integration, they have not dealt with the data security issue inherent in cloud-based systems with the outsourced models of infrastructure provisioning. For many domains, e.g., health, this poses serious challenges regarding the adoption of cloud infrastructures. Yet such domains also have much to gain from clouds especially given the explosion of genomics data and opportunities for personalized medicine in the big data era. This paper addresses this problem by presenting a trusted storage cloud for scientific workflows, called TruXy. The paper describes the TruXy architecture, the corresponding protocols and illustrates the adoption of TruXy to support collaborative bioinformatics research in endocrine genomics. A range of experiments have been performed to measure the performance of TruXy for processing of exome data sets on individuals with a rare genetic disorders: disorders of sex development (DSD). Our results show that the performance of TruXy is comparable to that of using a standalone workflow tool and that it can handle the big data security challenges required. |
| Author | Jinhui Yao Sinnott, Richard O. Shiping Chen Friedrich, Carsten Wise, Catherine Lonie, Andrew Nepal, Surya Kanwal, Sehrish |
| Author_xml | – sequence: 1 givenname: Surya surname: Nepal fullname: Nepal, Surya email: surya.nepal@csiro.au organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia – sequence: 2 givenname: Richard O. surname: Sinnott fullname: Sinnott, Richard O. email: rsinnott@unimelb.edu.au organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia – sequence: 3 givenname: Carsten surname: Friedrich fullname: Friedrich, Carsten email: Carsten.Friedrich@csiro.au organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia – sequence: 4 givenname: Catherine surname: Wise fullname: Wise, Catherine email: Catherine.Wise@csiro.au organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia – sequence: 5 surname: Shiping Chen fullname: Shiping Chen email: shiping.chen@csiro.au organization: Comput. Inf. Group, CSIRO, Canberra, ACT, Australia – sequence: 6 givenname: Sehrish surname: Kanwal fullname: Kanwal, Sehrish email: skanwal@student.unimelb.edu.au organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia – sequence: 7 surname: Jinhui Yao fullname: Jinhui Yao email: jinhui.yao@gmail.com organization: Sch. of Electr. & Inf. Eng., Univ. of Sydney, Sydney, NSW, Australia – sequence: 8 givenname: Andrew surname: Lonie fullname: Lonie, Andrew email: alonie@unimelb.edu.au organization: Dept. of Comput. & Inf. Syst., Univ. of Melbourne, Melbourne, VIC, Australia |
| BookMark | eNp9j01LAzEQhoNUsNbeBS_7B7Zmkk028SaLXyB4aEVvS5qdSHTdSJIi_fduafHgwbm8Ay_PDM8pmQxhQELOgS4AqL5cNc2CURALViktuToiU8ZrVlIKajLuIFVZg4QTMk_pnY6jBGjQUyJWcfO6vSrGSBm7YplDNG9YNH3YdIULsVhaj0P2ztviJcQP14fvdEaOnekTzg85I8-3N6vmvnx8untorh9LyznPpanXjBoUBgGwqyvGqlo6bYRUrFNC2rFzWq-llRqEq5CjVkZQVbOucpXlM0L3d20MKUV07Vf0nyZuW6DtzrwdzdudeXswHxH5B7E-m-zDkKPx_X_gxR70iPj7p2ZaCs35DyXDZtg |
| CODEN | ITCCF6 |
| CitedBy_id | crossref_primary_10_1007_s00607_021_00905_1 crossref_primary_10_1109_ACCESS_2019_2938823 crossref_primary_10_1016_j_future_2019_11_003 crossref_primary_10_7717_peerj_cs_747 crossref_primary_10_1007_s41019_016_0014_0 crossref_primary_10_1002_ett_4108 crossref_primary_10_1016_j_future_2020_08_004 crossref_primary_10_1080_10580530_2023_2194063 |
| Cites_doi | 10.1145/505452.505453 10.1109/MNET.2010.5510914 10.1109/eScience.2013.33 10.1145/1460877.1460889 10.1093/bioinformatics/btt199 10.1109/TSC.2013.2295611 10.1109/eScience.2008.167 10.1109/TPDS.2013.191 10.1186/gb-2010-11-8-r86 10.1109/35.312841 10.1109/CyberC.2011.80 10.1109/TKDE.2007.190647 10.1109/MobServ.2012.11 10.1534/genetics.112.144204 10.1007/978-3-540-79228-4_1 10.1109/ICDCSW.2010.36 10.1145/1653662.1653688 10.1145/2046707.2046767 10.1109/CCGRID.2010.17 10.1109/TSC.2011.24 10.1109/PDCAT.2013.49 10.1109/CIT.2010.171 10.1109/TKDE.2011.62 10.1002/cpe.3282 10.1007/978-1-84628-757-2 10.1093/bioinformatics/bth361 10.1145/1653662.1653686 10.1007/978-0-85729-439-5_6 10.1109/TPDS.2011.252 10.1109/ICDE.2005.42 10.1038/nbt.2028 10.1007/978-3-642-39640-3_27 10.1109/CEC.2011.45 10.1007/978-1-84996-241-4_9 10.1007/978-1-4419-6524-0_13 10.1109/ESCIW.2009.5408002 10.1109/CLOUD.2010.64 10.1109/71.910866 10.1109/TC.2011.245 10.1109/MSST.2010.5496972 10.1007/978-1-4614-1933-4 10.1145/1315245.1315317 10.1109/CCGrid.2013.109 10.1109/DSNW.2011.5958795 10.1109/CLOUD.2011.35 10.1145/2535929 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TCC.2015.2489638 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2372-0018 |
| EndPage | 442 |
| ExternalDocumentID | 10_1109_TCC_2015_2489638 7296593 |
| Genre | orig-research |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE AAYXX CITATION |
| ID | FETCH-LOGICAL-c333t-a7b20ae5ae11ed7422476f9a5682d856cae5f99b6c6915f4e3e98a50872d4f4c3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000416650800006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2168-7161 |
| IngestDate | Sat Nov 29 04:10:57 EST 2025 Tue Nov 18 22:20:18 EST 2025 Wed Aug 27 03:07:55 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c333t-a7b20ae5ae11ed7422476f9a5682d856cae5f99b6c6915f4e3e98a50872d4f4c3 |
| PageCount | 15 |
| ParticipantIDs | crossref_primary_10_1109_TCC_2015_2489638 crossref_citationtrail_10_1109_TCC_2015_2489638 ieee_primary_7296593 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-07-01 |
| PublicationDateYYYYMMDD | 2017-07-01 |
| PublicationDate_xml | – month: 07 year: 2017 text: 2017-07-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on cloud computing |
| PublicationTitleAbbrev | TCC |
| PublicationYear | 2017 |
| Publisher | IEEE Computer Society |
| Publisher_xml | – name: IEEE Computer Society |
| References | ref13 ref12 ref15 ateniese (ref35) 0 ref14 ref53 ref11 ref54 ref17 ref16 ref18 ref51 ref50 ref46 ref45 ref41 ref43 hao (ref30) 2011; 23 ref49 lin (ref42) 2012; 23 ref8 roy (ref47) 0 ref7 ref4 ref6 ref5 ref40 keahey (ref3) 2008 ref34 long (ref52) 1994; 7 ref37 bugiel (ref23) 0 ref36 ref31 ref33 ref32 ko (ref48) 0 ref2 ref1 ref39 ref38 kamara (ref44) 2011 liu (ref19) 2012 ref24 ref26 ref25 ref20 ref22 ref21 sinnott (ref10) 2014; 27 ref28 ref27 ref29 deelman (ref9) 0 |
| References_xml | – ident: ref51 doi: 10.1145/505452.505453 – ident: ref34 doi: 10.1109/MNET.2010.5510914 – ident: ref17 doi: 10.1109/eScience.2013.33 – year: 2011 ident: ref44 article-title: Cs2: A searchable cryptographic cloud storage system – ident: ref36 doi: 10.1145/1460877.1460889 – ident: ref13 doi: 10.1093/bioinformatics/btt199 – ident: ref29 doi: 10.1109/TSC.2013.2295611 – ident: ref1 doi: 10.1109/eScience.2008.167 – ident: ref28 doi: 10.1109/TPDS.2013.191 – ident: ref8 doi: 10.1186/gb-2010-11-8-r86 – start-page: 32 year: 0 ident: ref23 article-title: Twin clouds: Secure cloud computing with low latency publication-title: Proc 12th Int Conf Commun Multimedia Security – ident: ref46 doi: 10.1109/35.312841 – ident: ref20 doi: 10.1109/CyberC.2011.80 – ident: ref31 doi: 10.1109/TKDE.2007.190647 – ident: ref54 doi: 10.1109/MobServ.2012.11 – ident: ref14 doi: 10.1534/genetics.112.144204 – ident: ref26 doi: 10.1007/978-3-540-79228-4_1 – ident: ref32 doi: 10.1109/ICDCSW.2010.36 – ident: ref38 doi: 10.1145/1653662.1653688 – ident: ref49 doi: 10.1145/2046707.2046767 – start-page: 598 year: 0 ident: ref35 article-title: Provable data possession at untrusted stores publication-title: Proc 14th ACM Conf Comput Commun Security – ident: ref18 doi: 10.1109/CCGRID.2010.17 – ident: ref33 doi: 10.1109/TSC.2011.24 – ident: ref50 doi: 10.1109/PDCAT.2013.49 – ident: ref43 doi: 10.1109/CIT.2010.171 – volume: 23 start-page: 1432 year: 2011 ident: ref30 article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2011.62 – volume: 27 start-page: 358 year: 2014 ident: ref10 article-title: The Australia urban research gateway publication-title: Concurrency Comput Pract Experience doi: 10.1002/cpe.3282 – ident: ref5 doi: 10.1007/978-1-84628-757-2 – ident: ref11 doi: 10.1093/bioinformatics/bth361 – ident: ref41 doi: 10.1145/1653662.1653686 – ident: ref12 doi: 10.1007/978-0-85729-439-5_6 – volume: 23 start-page: 995 year: 2012 ident: ref42 article-title: A secure erasure code-based cloud storage system with secure data forwarding publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2011.252 – ident: ref25 doi: 10.1109/ICDE.2005.42 – ident: ref15 doi: 10.1038/nbt.2028 – ident: ref16 doi: 10.1007/978-3-642-39640-3_27 – start-page: 11 year: 0 ident: ref9 article-title: Pegasus: Mapping scientific workflows onto the grid publication-title: Proc 2nd Eur AcrossGrids Conf Grid Comput – ident: ref24 doi: 10.1109/CEC.2011.45 – ident: ref4 doi: 10.1007/978-1-84996-241-4_9 – start-page: 8 year: 0 ident: ref48 article-title: The HybrEx model for confidentiality and privacy in cloud computing publication-title: Proc 3rd USENIX Conf Hot Topics Cloud Comput – ident: ref7 doi: 10.1007/978-1-4419-6524-0_13 – ident: ref2 doi: 10.1109/ESCIW.2009.5408002 – ident: ref6 doi: 10.1109/CLOUD.2010.64 – ident: ref53 doi: 10.1109/71.910866 – volume: 7 start-page: 333 year: 1994 ident: ref52 article-title: Swift/RAID: A distributed RAID system publication-title: Comput Syst – ident: ref27 doi: 10.1109/TC.2011.245 – ident: ref45 doi: 10.1109/MSST.2010.5496972 – year: 2012 ident: ref19 publication-title: Design Cloud Workflow Systems doi: 10.1007/978-1-4614-1933-4 – ident: ref37 doi: 10.1145/1315245.1315317 – ident: ref22 doi: 10.1109/CCGrid.2013.109 – start-page: 297 year: 0 ident: ref47 article-title: Airavat: Security and privacy for MapReduce publication-title: Proc 7th USENIX Conf Netw Syst Des Implementation – ident: ref21 doi: 10.1109/DSNW.2011.5958795 – ident: ref39 doi: 10.1109/CLOUD.2011.35 – ident: ref40 doi: 10.1145/2535929 – start-page: 825 year: 2008 ident: ref3 article-title: Science clouds: Early experiences in cloud computing for scientific applications publication-title: Proc Workshop Cloud Comput Appl |
| SSID | ssj0000851919 |
| Score | 2.1211734 |
| Snippet | A wide array of clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and... |
| SourceID | crossref ieee |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 428 |
| SubjectTerms | Bioinformatics Cloud computing data encryption Data privacy Distributed/Internet based software engineering tools and technique Encryption health care integrity and protection Protocols security |
| Title | TruXy: Trusted Storage Cloud for Scientific Workflows |
| URI | https://ieeexplore.ieee.org/document/7296593 |
| Volume | 5 |
| WOSCitedRecordID | wos000416650800006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2372-0018 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000851919 issn: 2168-7161 databaseCode: RIE dateStart: 20130101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEB1q8eDFqlWsX-zBi2DafO1u1psEi6ciGKG3sNndgFAaaRvFf-_OJg0KIngLyQTCyybzZnZmHsC1NjTiQnNPSlV4OJDcK6RkHkU1SBs0YzekE5vgs1kyn4unHtx2vTDGGFd8ZsZ46PbydaVqTJVNLBFkVEQ7sMM5a3q1unwKUgcRiO1OpC8mWZpi6RYdh3GCy-yH5_kmpeI8yXTwv2c4gP2WMZL75hUfQs8sj2CwVWMg7cc5BJqt6vnnHcmwi8Jo8myjafuzIOmiqjWx3LQxdbVBBHPk5aL6WB_Dy_QhSx-9VhTBU1EUbTzJi9CXhkoTBEbbwDaMOSuFpCwJdUKZstdKIQqmmAhoGZvIiERaGsZDHZexik6gv6yW5hQI86MC-UQgJPaTWuZi-Y_0VcAKy9JYOILJFrBctRPDUbhikbvIwRe5hThHiPMW4hHcdHe8NdMy_rAdIrqdXQvs2e-nz2EvRIfqCmUvoL9Z1eYSdtX75nW9unJL4QtwfbBH |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7mFPTFqVOcP_Pgi2Bd2zRp45sUx8Q5BCvsraRJCsJYZVsV_3uTtCsKIvhW2iuUr2nvu8vdfQAXUhEcMhk6nIvMMQPJnYxz6hCjBqmDZtMNacUmwvE4mkzYUwuuml4YpZQtPlPX5tDu5ctClCZV1tdEkBKG12CdBIHvVt1aTUbFkAfmsdVepMv6SRyb4i1y7QeRWWg_fM83MRXrSwad_z3FDmzXnBHdVi95F1pqtgedlR4Dqj_PLpBkXk4-b1Bi-iiURM86nta_CxRPi1IizU4rU1sdhEyWPJ8WH4t9eBncJfHQqWURHIExXjo8zHyXK8KV5ympQ1s_CGnOOKGRLyNChb6WM5ZRQZlH8kBhxSKuiVjoyyAPBD6A9qyYqUNA1MWZYRQe46ajVHMXzYC4KzyaaZ5G_R70V4Clop4ZbqQrpqmNHVyWaohTA3FaQ9yDy-aOt2pexh-2XYNuY1cDe_T76XPYHCaPo3R0P344hi3fuFdbNnsC7eW8VKewId6Xr4v5mV0WX8vZs44 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=TruXy%3A+Trusted+Storage+Cloud+for+Scientific+Workflows&rft.jtitle=IEEE+transactions+on+cloud+computing&rft.au=Nepal%2C+Surya&rft.au=Sinnott%2C+Richard+O.&rft.au=Friedrich%2C+Carsten&rft.au=Wise%2C+Catherine&rft.date=2017-07-01&rft.pub=IEEE+Computer+Society&rft.eissn=2372-0018&rft.volume=5&rft.issue=3&rft.spage=428&rft.epage=442&rft_id=info:doi/10.1109%2FTCC.2015.2489638&rft.externalDocID=7296593 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-7161&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-7161&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-7161&client=summon |