Skip to main content
Log in

Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Data and materials sharing is not applicable to this article as no new data were created or analyzed in this study. Only some sources are used for this study, which is explained in Sect. 2.4.

Abbreviations

ABC:

Artificial bee colony

ACO:

Ant colony optimization

CEDP:

Cost and energy aware data placement method

CESTAD:

Cost-effective and security-aware multi-hop resource-sharing task allocation algorithm for dynamic WSNs

CPM:

Cost prediction matrix

DLS:

Dynamic level scheduling

EERS:

Energy-efficient and reliability aware workflow task scheduling

EMCK:

Extended multiple-choice knapsack

FFBAT:

Firefly and BAT

GA :

Genetic algorithm

GASF:

Genetic algorithm-based secure framework

HEFT:

Heterogenous earliest finish time

HSOS-SOA:

Hybrid multi-objective optimization algorithm using SOS and SOA

ICS:

Industrial control systems

IE-ABC:

Improved efficient-ABC

ILPSO:

Integer linear programming security optimization

MDP:

Markov decision process

MMA:

Matching and multi-round allocation

MOPA:

Multi-objective privacy-aware workflow scheduling Algorithm

MOWS:

Multi-objective workflow scheduling

PSO:

Particle swarm optimization

PSLS:

Privacy and security-aware list scheduling

PSSA:

Privacy and security-aware simulated annealing

RATSA:

Reliability-aware task scheduling algorithm

REMWM:

Reliability, rental cost, and energy-aware multi-workflow scheduling in the multi-cloud

SABA:

Security-aware and budget-aware workflow scheduling strategy

SAI:

Security-aware intermediate data placement

SAWA:

Security aware workflow allocation

SAHEFT:

Security aware HEFT

SAST:

Sensitivity annotation for security tasks

SAWS:

Security-aware workflow scheduling

SCAS:

Security and cost aware scheduling

SCP:

Set covering problem

SCEDA:

Security driven cost effective deadline aware workflow allocation

SCPS:

Secured cost prediction-based scheduling

SCEAH:

Security, cost, and energy aware heuristic

SDLS:

Security driven DLS

SDS:

Security driven scheduling

SWA:

Secured workflow allocation

SEWA:

Security driven energy efficient workflow allocation

SLA:

Service level agreement

SOA:

Seagull optimization algorithm

SOM :

Security overhead model

SODA:

Security oriented deadline aware workflow allocation

SOLID:

Scheduling approach with selective tasks duplication

SOS:

Symbiotic organisms search

SPHEFT:

Security prioritized HEFT

SPMWA:

Security prioritized multiple workflow allocation

S-PSO:

Set-based particle swarm optimization

SPSO:

Smart particle swarm optimization

SFLA:

Shuffled frog-leaping algorithm

SVNPSO:

Smart variable neighborhood PSO

T-Aware:

Trust aware task allocation

TBHSA:

Trust-based heuristic scheduling algorithm

TMWS:

Trust-based meta heuristic workflow scheduling

TMOWS:

Trust services-oriented multi-objectives workflow scheduling

TSA:

Trust-based workflow scheduling algorithm

TSS:

Trust-based stochastic scheduling

TWFS:

Trust service-oriented workflow scheduling

WFS:

Workflow security scheduling

WMS:

Workflow management system

WSNs:

Wireless sensor networks

References

  1. Mell P, Grance T (2011) The NIST definition of cloud computing

  2. Buyya R, Vecchiola C, Selvi ST (2013) Mastering cloud computing: foundations and applications programming. Newnes, Boston

    Google Scholar 

  3. Alam M, Shahid M, Mustajab S, Ahmad F (2023) Cloud computing: architecture, vision, challenges, opportunities, and emerging trends. In: International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE. p 1–6

  4. Jawed MS, Sajid M (2022) A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues. Int J Cloud Appl Comput (IJCAC) 12(1):1–33

    Google Scholar 

  5. Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532

    Google Scholar 

  6. Huang H, Zhang YL, Zhang M (2013) A survey of cloud workflow. Adv Mater Res 765:1343–1348

    Google Scholar 

  7. Menaka M, Kumar KS (2022) Workflow scheduling in cloud environment–challenges, tools, limitations & methodologies: a review. Meas: Sens 24:100436

    Google Scholar 

  8. Juve G, Chervenak A, Deelman E, Bharathi S, Mehta G, Vahi K (2013) Characterizing and profiling scientific workflows. Future Gener Comput Syst 29(3):682–692

    Google Scholar 

  9. Hollingsworth D, Hampshire, UK (1995) Workflow management coalition: the workflow reference model. Document Number TC00-1003, 19, 16

  10. Versluis L, Iosup A (2021) A survey of domains in workflow scheduling in computing infrastructures: community and keyword analysis, emerging trends, and taxonomies. Future Gener Comput Syst 123:156–177

    Google Scholar 

  11. Hilman MH, Rodriguez MA, Buyya R (2021) Workflow-as-a-service cloud platform and deployment of bioinformatics workflow applications. Knowledge management in the development of data-intensive systems. CRC Press, Boca Raton, pp 205–226

    Google Scholar 

  12. Soveizi N, Turkmen F, Karastoyanova D (2023) Security and privacy concerns in cloud-based scientific and business workflows: a systematic review. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2023.05.015

    Article  Google Scholar 

  13. Wang B, Wang C, Song Y, Cao J, Cui X, Zhang L (2020) A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds. Cluster Comput 23:2809–2834

    Google Scholar 

  14. Hu W, Li X, Li X (2020) Hybrid cloud workflow scheduling method with privacy data. IEEE Access 8:211540–211552

    Google Scholar 

  15. Topcuoglu H, Hariri S, Wu MY (2002) Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Trans Parallel Distrib Syst 13(3):260–274

    Google Scholar 

  16. Shahid M, Raza Z, Sajid M (2015) Level based batch scheduling strategy with idle slot reduction under DAG constraints for computational grid. J Syst Softw 108:110–133

    Google Scholar 

  17. Li T, Cao D, Lu Y, Huang T, Sun C, Dong Q, Gong X (2019) DBEFT: a dependency-ratio bundling earliest finish time algorithm for heterogeneous computing. IEEE Access 7:173884–173896

    Google Scholar 

  18. Ahmad F, Shahid M, Alam M, Ashraf Z, Sajid M, Kotecha K, Dhiman G (2022) Levelized multiple workflow allocation strategy under precedence constraints with task merging in IaaS cloud environment. IEEE Access 10:92809–92827

    Google Scholar 

  19. Pu J, Meng Q, Chen Y, Sheng H (2023) MPEFT: a novel task scheduling method for workflows. Front Environ Sci 10:2601

    Google Scholar 

  20. Li H, Chen B, Huang J, Cañizares Abreu JR, Chai S, Xia Y (2023) Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud. Cluster Comput. https://doi.org/10.1007/s10586-023-04006-w

    Article  Google Scholar 

  21. Hariri M, Nouri-Baygi M, Abrishami S (2022) A hybrid algorithm for scheduling scientific workflows in IaaS cloud with deadline constraint. J Supercomput 78(15):16975–16996

    Google Scholar 

  22. Li H, Wang D, Xu G, Yuan Y, Xia Y (2022) Improved swarm search algorithm for scheduling budget-constrained workflows in the cloud. Soft Comput 26(8):3809–3824

    Google Scholar 

  23. Singh V, Gupta I, Jana PK (2018) A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources. Futur Gener Comput Syst 79:95–110

    Google Scholar 

  24. Li Z, Yu H, Fan G (2022) Cost-effective approaches for deadline-constrained workflow scheduling in clouds. J Supercomput 79:1–29

    Google Scholar 

  25. Gu XC, Fan L, Wu W, Huang H, Jia X (2018) Greening cloud data centers in an economical way by energy trading with power grid. Future Gener Comput Syst 78:89–101

    Google Scholar 

  26. Gu Y, Budati C (2020) Energy-aware workflow scheduling and optimization in clouds using bat algorithm. Future Gener Comput Syst 113:106–112

    Google Scholar 

  27. Medara R, Singh RS (2021) Energy-aware workflow task scheduling in clouds with virtual machine consolidation using discrete water wave optimization. Simul Model Pract Theory 110:102323

    Google Scholar 

  28. Shahid M, Alam M, Hasan F, Imran M (2021) Security-aware workflow allocation strategy for IaaS cloud environment. In: Proceedings of International Conference on Communication and Computational Technologies: ICCCT-2019. Springer Singapore. p 241–252

  29. Donglai F, Yanhua L (2021) Trust-aware task allocation in collaborative crowdsourcing model. Comput J 64(6):929–940

    Google Scholar 

  30. Stavrinides GL, Karatza HD (2022) Security, cost and energy aware scheduling of real-time IoT workflows in a mist computing environment. Inf Syst Front. https://doi.org/10.1007/s10796-022-10304-2

    Article  Google Scholar 

  31. Taghinezhad-Niar A, Taheri J (2022) Reliability, rental-cost and energy-aware multi-workflow scheduling on multi-cloud systems. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2022.3223869

    Article  Google Scholar 

  32. Alam M, Shahid M, Mustajab S (2023) Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. Cluster Comput. https://doi.org/10.1007/s10586-022-03819-5

    Article  Google Scholar 

  33. Alam M, Shahid M, Mustajab S, Ahmad F, Haidri RA (2023) Security driven cost-effective deadline aware workflow allocation strategy in cloud computing environment. In: 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS). IEEE. p 1–6

  34. Alam M, Shahid M, Mustajab S (2023) A security driven energy efficient workflow allocation algorithm under deadline constraints for cloud computing. In: 4th International Conference on Data Analytics for Business and Industry (ICDABI). IEEE. p 1–6

  35. Gary MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, San Francisco

    Google Scholar 

  36. Internationa data corporation. https://www.idc.com/

  37. Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inf Softw Technol 51(1):7–15

    Google Scholar 

  38. Keele S (2007) Guidelines for performing systematic literature reviews in software engineering. In: Technical report, Ver. 2.3 EBSE Technical Report. EBSE

  39. Dieste O, Grimán A, Juristo N (2009) Developing search strategies for detecting relevant experiments. Empir Softw Eng 14(5):513–539

    Google Scholar 

  40. Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: a survey. ACM Comput Surv (CSUR) 48(1):1–50

    Google Scholar 

  41. Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383

    MathSciNet  Google Scholar 

  42. Anupa J, Sekaran KC (2014) Cloud workflow and security: a survey. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE. p 1598–1607

  43. Francis AO, Emmanuel B, Zhang D, Zheng W, Qin Y, Zhang D (2018). Exploration of secured workflow scheduling models in cloud environment: a survey. In: 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD). IEEE. p. 71–76

  44. Cruzes DS, Dybå T (2011) Research synthesis in software engineering: a tertiary study. Inf Softw Technol 53(5):440–455

    Google Scholar 

  45. Kitchenham BA, Brereton P, Turner M, Niazi MK, Linkman S, Pretorius R, Budgen D (2010) Refining the systematic literature review process—two participant-observer case studies. Empir Softw Eng 15:618–653

    Google Scholar 

  46. Viriyasitavat W, Martin A (2012) A survey of trust in workflows and relevant contexts. IEEE Commun Surv Tutor 14(3):911–940

    Google Scholar 

  47. Sheikh A, Munro M, Budgen D (2019) Systematic literature review (SLR) of resource scheduling and security in cloud computing. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2019.0100404

    Article  Google Scholar 

  48. Fernández-Cerero D, Jakóbik A, Grzonka D, Kołodziej J, Fernández-Montes A (2018) Security supportive energy-aware scheduling and energy policies for cloud environments. J Parallel Distrib Comput 119:191–202

    Google Scholar 

  49. Zade BMH, Mansouri N, Javidi MM (2021) SAEA: a security-aware and energy-aware task scheduling strategy by parallel squirrel search algorithm in cloud environment. Expert Syst Appl 176:114915

    Google Scholar 

  50. Wang B, Wang C, Huang W, Song Y, Qin X (2021) Security-aware task scheduling with deadline constraints on heterogeneous hybrid clouds. J Parallel Distrib Comput 153:15–28

    Google Scholar 

  51. Gharib A, Ibnkahla M (2022) Node embedding for security-aware clustering of mobile information-centric sensor networks. IEEE Internet Things J 9(18):17249–17264

    Google Scholar 

  52. Alam M, Mahak Haidri RA, Yadav DK (2021) Efficient task scheduling on virtual machine in cloud computing environment. Int J Pervasive Comput Commun 17(3):271–287

    Google Scholar 

  53. Shakeel H, Alam M (2022) Load balancing approaches in cloud and fog computing environments: a framework, classification, and systematic review. Int J Cloud Appl Comput (IJCAC) 12(1):1–24

    Google Scholar 

  54. Youn CH, Chen M, Dazzi P, Youn CH, Chen M, Dazzi P (2017) Cost adaptive workflow resource broker in cloud. Cloud broker and cloudlet for workflow scheduling. Springer, Singapore, pp 75–103

    Google Scholar 

  55. Elmagarmid A, Du W (1998) Workflow management: state of the art versus state of the products. Workflow management systems and interoperability. Springer, Berlin, Heidelberg, pp 1–17

    Google Scholar 

  56. Du W, Elmagarmid A (1997) Workflow management: State of the art vs. state of the products. HP LABORATORIES TECHNICAL REPORT HPL

  57. Goble CA, Bhagat J, Aleksejevs S, Cruickshank D, Michaelides D, Newman D, De Roure D (2010) myExperiment: a repository and social network for the sharing of bioinformatics workflows. Nucleic Acids Res 38(suppl_2):677–682

    Google Scholar 

  58. Ludäscher B, Altintas I, Berkley C, Higgins D, Jaeger E, Jones M, Zhao Y (2006) Scientific workflow management and the Kepler system. Concurr Comput: Pract Exp 18(10):1039–1065

    Google Scholar 

  59. Freire J, Silva CT, Callahan SP, Santos E, Scheidegger CE, Vo HT (2006). Managing rapidly-evolving scientific workflows. In: International Provenance and Annotation Workshop. Springer, Berlin, Heidelberg. p 10–18

  60. Deelman E, Singh G, Su MH, Blythe J, Gil Y, Kesselman C, Laity A (2005) Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci Programss 13(3):219–237

    Google Scholar 

  61. Pandey S, Voorsluys W, Buyya R, Dobson J, Chiu K (2009) Brain image registration analysis workflow for fmri studies on global grids. In: 2009 International Conference on Advanced Information Networking and Applications. IEEE. p 435–442

  62. Pandey S, Voorsluys W, Rahman M, Buyya R, Dobson JE, Chiu K (2009) A grid workflow environment for brain imaging analysis on distributed systems. Concurr Comput: Pract Exp 21(16):2118–2139

    Google Scholar 

  63. Huser V, Rasmussen LV, Oberg R, Starren JB (2011) Implementation of workflow engine technology to deliver basic clinical decision support functionality. BMC Med Res Methodol 11(1):43

    Google Scholar 

  64. Zimmermann O, Doubrovski V, Grundler J, Hogg K (2005) Service-oriented architecture and business process choreography in an order management scenario: rationale, concepts, lessons learned. In: Companion to the 20th annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications. ACM. p 301–312

  65. Zhang H, Zheng X, Xia Y, Li M (2019) Workflow scheduling in the cloud with weighted upward-rank priority scheme using random walk and uniform spare budget splitting. IEEE Access 7:60359–60375

    Google Scholar 

  66. Ma X, Xu H, Gao H, Bian M (2021) Real-time multiple-workflow scheduling in cloud environments. IEEE Trans Netw Serv Manage 18(4):4002–4018

    Google Scholar 

  67. Optimization Problem Types-NEOS Guide (https://neos-guide.org/)

  68. Xiaoyong T, Li K, Zeng Z, Veeravalli B (2010) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60(7):1017–1029

    MathSciNet  Google Scholar 

  69. Savic D (2002) Single-objective versus multiobjective optimisation for integrated decision support. In: 1st International Congress on Environmental Modelling and Software-Lugano, Switzerland

  70. Garg SK, Buyya R, Siegel HJ (2010) Time and cost trade-off management for scheduling parallel applications on utility grids. Future Gener Comput Syst 26(8):1344–1355

    Google Scholar 

  71. Wu F, Wu Q, Tan Y (2015) Workflow scheduling in cloud: a survey. J Supercomput 71:3373–3418

    Google Scholar 

  72. Hosseinzadeh M, Ghafour MY, Hama HK, Vo B, Khoshnevis A (2020) Multi-objective task and workflow scheduling approaches in cloud computing: a comprehensive review. J Grid Comput 18:327–356

    Google Scholar 

  73. Singh RM, Awasthi LK, Sikka G (2022) Towards metaheuristic scheduling techniques in cloud and fog: an extensive taxonomic review. ACM Comput Surv (CSUR) 55(3):1–43

    Google Scholar 

  74. Adhi A, Santosa B, Siswanto N (2018). A meta-heuristic method for solving scheduling problem: crow search algorithm. In: IOP Conference Series: Materials Science and Engineering. Vol. 337, No. 1, p 012003. IOP Publishing

  75. Soltani N, Soleimani B, Barekatain B (2017) Heuristic algorithms for task scheduling in cloud computing: a survey. Int J Comput Netw Inf Secur 11(8):16

    Google Scholar 

  76. Asghari Alaie Y, Hosseini Shirvani M, Rahmani AM (2023) A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach. J Supercomput 79(2):1451–1503

    Google Scholar 

  77. Hosseini Shirvani M (2023) A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. J Supercomput. https://doi.org/10.1007/s11227-023-05806-y

    Article  Google Scholar 

  78. Meena J, Kumar M, Vardhan M (2016) Cost effective genetic algorithm for workflow scheduling in cloud under deadline constraint. IEEE Access 4:5065–5082

    Google Scholar 

  79. Wang P, Lei Y, Agbedanu PR, Zhang Z (2020) Makespan-driven workflow scheduling in clouds using immune-based PSO algorithm. IEEE access 8:29281–29290

    Google Scholar 

  80. Zeng L, Veeravalli B, Li X (2015) SABA: a security-aware and budget-aware workflow scheduling strategy in clouds. J Parallel Distrib Comput 75:141–151

    Google Scholar 

  81. Li Z, Ge J, Yang H, Huang L, Hu H, Hu H, Luo B (2016) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener Comput Syst 65:140–152

    Google Scholar 

  82. Shishido HY, Estrella JC, Toledo CFM, Arantes MS (2018) Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds. Comput Electr Eng 69:378–394

    Google Scholar 

  83. Angela Jennifa Sujana J, Revathi T, Siva Priya TS, Muneeswaran K (2019) Smart PSO-Based Secured Scheduling Approaches for Scientific Workflows in Cloud Computing. p 1745–1765

  84. Thanka MR, Uma Maheswari P, Edwin EB (2019) An improved efficient: artificial bee colony algorithm for security and QoS aware scheduling in cloud computing environment. Clust Comput 22:10905–10913

    Google Scholar 

  85. Wen Y, Liu J, Dou W, Xu X, Cao B, Chen J (2020) Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Gener Comput Syst 108:1084–1091

    Google Scholar 

  86. Hammed SS, Arunkumar B (2022) Efficient workflow scheduling in cloud computing for security maintenance of sensitive data. Int J Commun Syst 35(2):e4240

    Google Scholar 

  87. Zhu QH, Tang H, Huang JJ, Hou Y (2021) Task scheduling for multi-cloud computing subject to security and reliability constraints. IEEE/CAA J Autom Sin 8(4):848–865

    MathSciNet  Google Scholar 

  88. Shishido HY, Estrella JC, Toledo CF, Reiff-Marganiec S (2021) Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm. Computing 103:1281–1303

    MathSciNet  Google Scholar 

  89. Ojo AO (2022) Cost-Effective and security-aware task allocation algorithm for dynamic wireless sensor networks. Available at SSRN 4022956

  90. Liu W, Peng S, Du W, Wang W, Zeng GS (2014) Security-aware intermediate data placement strategy in scientific cloud workflows. Knowl Inf Syst 41:423–447

    Google Scholar 

  91. Lei J, Wu Q, Xu J (2022) Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener Comput Syst 131:269–278

    Google Scholar 

  92. Mohammadzadeh A, Javaheri D, Artin J (2023) Chaotic hybrid multi-objective optimization algorithm for scientific workflow scheduling in multisite clouds. J Op Res Soc. https://doi.org/10.1080/01605682.2023.2195426

    Article  Google Scholar 

  93. Arunarani AR, Manjula D, Sugumaran V (2017) FFBAT: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms. Concurr Comput: Pract Exp 29(24):e4295

    Google Scholar 

  94. Naidu PS, Bhagat B (2018) Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation. Int J Model, Simul, Sci Comput 9(01):1750064

    Google Scholar 

  95. Amini Motlagh A, Movaghar A, Rahmani AM (2022) A new reliability-based task scheduling algorithm in cloud computing. Int J Commun Syst 35(3):e5022

    Google Scholar 

  96. Huang B, Xiang Y, Yu D, Wang J, Li Z, Wang S (2021) Reinforcement learning for security-aware workflow application scheduling in mobile edge computing. Secur Commun Netw 2021:1–13

    Google Scholar 

  97. Yang Y, Peng X, Cao J (2015) Trust-based scheduling strategy for cloud workflow applications. Informatica 26(1):159–180

    Google Scholar 

  98. Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2020) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Industr Inf 17(6):4219–4228

    Google Scholar 

  99. Singh K, Alam M, Sharma SK (2015) A survey of static scheduling algorithm for distributed computing system. Int J Comput Appl 129(2):25–30

    Google Scholar 

  100. Atluri V, Huang WK (1996) An authorization model for workflows. In: Computer Security—ESORICS 96: 4th european symposium on research in computer security Rome, Italy, September 25–27, 1996 Proceedings 4. Springer, Berlin, Heidelberg. p 44–64

  101. Brewer DF, Nash MJ (1989) The Chinese wall security policy. In: IEEE symposium on security and privacy. vol 1989, p 206

  102. Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688

    Google Scholar 

  103. Atluri V, Warner J (2008) Security for workflow systems. Handbook of database security: applications and trends. Springer, Boston, pp 213–230

    Google Scholar 

  104. Lone AN, Mustajab S, Alam M (2023) A Comprehensive study on cybersecurity challenges and opportunities in the IoT world. Secur Priv 6(6):e318

    Google Scholar 

  105. Wang W, Zeng G, Tang D, Yao J (2012) Cloud-DLS: dynamic trusted scheduling for cloud computing. Expert Syst Appl 39(3):2321–2329

    Google Scholar 

  106. Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Yang LT (2013) Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J Comput Syst Sci 79(5):518–529

    MathSciNet  Google Scholar 

  107. Yang Y, Peng X (2013) Trust-based scheduling strategy for workflow applications in cloud environment. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE. p 316–320

  108. Angela Jennifa Sujana J, Geethanjali M, Venitta Raj R, Revathi T (2019) Trust model-based scheduling of stochastic workflows in cloud and fog computing. Cloud computing for geospatial big data analytics: intelligent edge, fog and mist computing. p 29–54

  109. Angela Jennifa Sujana J, Revathi T, Joshua Rajanayagam S (2020) Fuzzy-based security-driven optimistic scheduling of scientific workflows in cloud computing. IETE J Res 66(2):224–241

    Google Scholar 

  110. Djigal H, Feng J, Lu J (2020) Performance evaluation of security-aware list scheduling algorithms in IaaS cloud. In: 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). IEEE. p 330–339

  111. Alam M, Shahid M, Mustajab S (2021) SAHEFT: security aware heterogeneous earliest finish time workflow allocation strategy for IaaS cloud environment. In: 2021 IEEE Madras Section Conference (MASCON). IEEE. p 1–8

  112. Alam M, Shahid M, Mustajab S (2022) Security prioritized heterogeneous earliest finish time workflow allocation algorithm for cloud computing. In: Congress on Intelligent Systems: Proceedings of CIS 2021. Singapore: Springer Nature Singapore. vol 1, p 233–246

  113. Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27

    Google Scholar 

  114. Alam M, Shahid M, Mustajab S (2022) Security oriented deadline aware workflow allocation strategy for infrastructure as a service clouds. In: 2022 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE. p 1–6

  115. Xu X, Zhao X, Ruan F, Zhang J, Tian W, Dou W, Liu AX (2017) Data placement for privacy-aware applications over big data in hybrid clouds. Secur Commun Netws. https://doi.org/10.1155/2017/2376484

    Article  Google Scholar 

  116. Alkhanak EN, Lee SP, Khan SUR (2015) Cost-aware challenges for workflow scheduling approaches in cloud computing environments: taxonomy and opportunities. Future Gener Comput Syst 50:3–21

    Google Scholar 

  117. Islam T, Manivannan D, Zeadally S (2016) A classification and characterization of security threats in cloud computing. Int J Next-Gener Comput 7(1):268–285

    Google Scholar 

  118. Hammouti S, Yagoubi B, Makhlouf SA (2020) Workflow security scheduling strategy in cloud computing. In: Modelling and Implementation of Complex Systems: Proceedings of the 6th International Symposium, MISC 2020, Batna, Algeria, October 24–26, 2020. Springer International Publishing, Cham. p 48–61

  119. Alam M, Shahid M, Mustajab S, Ahmad F (2023) Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud. Int J Inf Technol 15:1–9

    Google Scholar 

  120. Tan W, Sun Y, Lu G, Tang A, Cui L (2013) Trust services-oriented multi-objects workflow scheduling model for cloud computing. In: Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28–30, 2012, Revised Selected Papers. Springer Berlin Heidelberg. p 617–630

  121. Tan W, Sun Y, Li LX, Lu G, Wang T (2013) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868–878

    Google Scholar 

  122. Rathanam GJ, Rajaram A (2016) Trust based meta-heuristics workflow scheduling in cloud service environment. Circuits and Systems 7(04):520

    Google Scholar 

  123. Wen Z, Cała J, Watson P, Romanovsky A (2016) Cost effective, reliable and secure workflow deployment over federated clouds. IEEE Trans Serv Comput 10(6):929–941

    Google Scholar 

  124. Abazari F, Analoui M, Takabi H, Fu S (2019) MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm. Simul Model Pract Theory 93:119–132

    Google Scholar 

  125. Medara R, Singh RS (2021) Energy efficient and reliability aware workflow task scheduling in cloud environment. Wireless Pers Commun 119(2):1301–1320

    Google Scholar 

  126. Stavrinides GL, Karatza HD (2021). Security and cost aware scheduling of real-time IoT workflows in a mist computing environment. In: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. p 34–41

  127. Yakoubov S, Gadepally V, Schear N., Shen E, Yerukhimovich A (2014) A survey of cryptographic approaches to securing big-data analytics in the cloud. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC). IEEE. p. 1–6

  128. Chen H, Cheng R, Pedrycz W, Jin Y (2019) Solving many-objective optimization problems via multistage evolutionary search. IEEE Trans Syst, Man, Cybern: Syst 51(6):3552–3564

    Google Scholar 

Download references

Funding

No funding is supported by any agency.

Author information

Authors and Affiliations

Authors

Contributions

MA contributed to main idea, methodology, literature search, data analysis, figures, and writing—original draft preparation—review & editing; MS contributed to main idea, writing—original draft preparation, data analysis, writing—review & editing; SM contributed to resources, writing—review & editing; and MS and SM supervised the study. All the authors reviewed the manuscript.

Corresponding author

Correspondence to Mohammad Shahid.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alam, M., Shahid, M. & Mustajab, S. Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. J Supercomput 80, 11491–11555 (2024). https://doi.org/10.1007/s11227-023-05873-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05873-1

Keywords

Navigation