Abstract
In cloud computing environment, the workflow allocation mainly focuses on task assignment to satisfy the quality-of-service (QoS) standards and workload balancing by the best use of the demanded resources as a service on pay per use basis to optimize objectives from service level agreements. In secured workflow allocation (SWA), the intermediate data transfers in sensitive workflow tasks demand security requirements during the execution across the virtual machines. Security-aware workflow execution challenges result in a significant share of security overhead which affects the QoS performance. The aim of this work is to facilitate the researcher's selection of suitable SWA approaches from the existing approaches in the literature. To achieve this, we have comprehensively reviewed the current state-of-the-art approaches of the SWA models in cloud computing environments. Also, a secured workflow allocation challenges taxonomy by describing the security overhead model and QoS objectives and constraints is presented. Finally, it determines and discusses the existing open issues, challenges, and future research direction in the SWA model based on the study's literature review. The study will help researchers in the domain with current security challenges for SWA research trends.
Similar content being viewed by others
Data availability
Data and materials sharing is not applicable to this article as no new data were created or analyzed in this study. Only some sources are used for this study, which is explained in Sect. 2.4.
Abbreviations
- ABC:
-
Artificial bee colony
- ACO:
-
Ant colony optimization
- CEDP:
-
Cost and energy aware data placement method
- CESTAD:
-
Cost-effective and security-aware multi-hop resource-sharing task allocation algorithm for dynamic WSNs
- CPM:
-
Cost prediction matrix
- DLS:
-
Dynamic level scheduling
- EERS:
-
Energy-efficient and reliability aware workflow task scheduling
- EMCK:
-
Extended multiple-choice knapsack
- FFBAT:
-
Firefly and BAT
- GA :
-
Genetic algorithm
- GASF:
-
Genetic algorithm-based secure framework
- HEFT:
-
Heterogenous earliest finish time
- HSOS-SOA:
-
Hybrid multi-objective optimization algorithm using SOS and SOA
- ICS:
-
Industrial control systems
- IE-ABC:
-
Improved efficient-ABC
- ILPSO:
-
Integer linear programming security optimization
- MDP:
-
Markov decision process
- MMA:
-
Matching and multi-round allocation
- MOPA:
-
Multi-objective privacy-aware workflow scheduling Algorithm
- MOWS:
-
Multi-objective workflow scheduling
- PSO:
-
Particle swarm optimization
- PSLS:
-
Privacy and security-aware list scheduling
- PSSA:
-
Privacy and security-aware simulated annealing
- RATSA:
-
Reliability-aware task scheduling algorithm
- REMWM:
-
Reliability, rental cost, and energy-aware multi-workflow scheduling in the multi-cloud
- SABA:
-
Security-aware and budget-aware workflow scheduling strategy
- SAI:
-
Security-aware intermediate data placement
- SAWA:
-
Security aware workflow allocation
- SAHEFT:
-
Security aware HEFT
- SAST:
-
Sensitivity annotation for security tasks
- SAWS:
-
Security-aware workflow scheduling
- SCAS:
-
Security and cost aware scheduling
- SCP:
-
Set covering problem
- SCEDA:
-
Security driven cost effective deadline aware workflow allocation
- SCPS:
-
Secured cost prediction-based scheduling
- SCEAH:
-
Security, cost, and energy aware heuristic
- SDLS:
-
Security driven DLS
- SDS:
-
Security driven scheduling
- SWA:
-
Secured workflow allocation
- SEWA:
-
Security driven energy efficient workflow allocation
- SLA:
-
Service level agreement
- SOA:
-
Seagull optimization algorithm
- SOM :
-
Security overhead model
- SODA:
-
Security oriented deadline aware workflow allocation
- SOLID:
-
Scheduling approach with selective tasks duplication
- SOS:
-
Symbiotic organisms search
- SPHEFT:
-
Security prioritized HEFT
- SPMWA:
-
Security prioritized multiple workflow allocation
- S-PSO:
-
Set-based particle swarm optimization
- SPSO:
-
Smart particle swarm optimization
- SFLA:
-
Shuffled frog-leaping algorithm
- SVNPSO:
-
Smart variable neighborhood PSO
- T-Aware:
-
Trust aware task allocation
- TBHSA:
-
Trust-based heuristic scheduling algorithm
- TMWS:
-
Trust-based meta heuristic workflow scheduling
- TMOWS:
-
Trust services-oriented multi-objectives workflow scheduling
- TSA:
-
Trust-based workflow scheduling algorithm
- TSS:
-
Trust-based stochastic scheduling
- TWFS:
-
Trust service-oriented workflow scheduling
- WFS:
-
Workflow security scheduling
- WMS:
-
Workflow management system
- WSNs:
-
Wireless sensor networks
References
Mell P, Grance T (2011) The NIST definition of cloud computing
Buyya R, Vecchiola C, Selvi ST (2013) Mastering cloud computing: foundations and applications programming. Newnes, Boston
Alam M, Shahid M, Mustajab S, Ahmad F (2023) Cloud computing: architecture, vision, challenges, opportunities, and emerging trends. In: International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE. p 1–6
Jawed MS, Sajid M (2022) A comprehensive survey on cloud computing: architecture, tools, technologies, and open issues. Int J Cloud Appl Comput (IJCAC) 12(1):1–33
Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493–9532
Huang H, Zhang YL, Zhang M (2013) A survey of cloud workflow. Adv Mater Res 765:1343–1348
Menaka M, Kumar KS (2022) Workflow scheduling in cloud environment–challenges, tools, limitations & methodologies: a review. Meas: Sens 24:100436
Juve G, Chervenak A, Deelman E, Bharathi S, Mehta G, Vahi K (2013) Characterizing and profiling scientific workflows. Future Gener Comput Syst 29(3):682–692
Hollingsworth D, Hampshire, UK (1995) Workflow management coalition: the workflow reference model. Document Number TC00-1003, 19, 16
Versluis L, Iosup A (2021) A survey of domains in workflow scheduling in computing infrastructures: community and keyword analysis, emerging trends, and taxonomies. Future Gener Comput Syst 123:156–177
Hilman MH, Rodriguez MA, Buyya R (2021) Workflow-as-a-service cloud platform and deployment of bioinformatics workflow applications. Knowledge management in the development of data-intensive systems. CRC Press, Boca Raton, pp 205–226
Soveizi N, Turkmen F, Karastoyanova D (2023) Security and privacy concerns in cloud-based scientific and business workflows: a systematic review. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2023.05.015
Wang B, Wang C, Song Y, Cao J, Cui X, Zhang L (2020) A survey and taxonomy on workload scheduling and resource provisioning in hybrid clouds. Cluster Comput 23:2809–2834
Hu W, Li X, Li X (2020) Hybrid cloud workflow scheduling method with privacy data. IEEE Access 8:211540–211552
Topcuoglu H, Hariri S, Wu MY (2002) Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Trans Parallel Distrib Syst 13(3):260–274
Shahid M, Raza Z, Sajid M (2015) Level based batch scheduling strategy with idle slot reduction under DAG constraints for computational grid. J Syst Softw 108:110–133
Li T, Cao D, Lu Y, Huang T, Sun C, Dong Q, Gong X (2019) DBEFT: a dependency-ratio bundling earliest finish time algorithm for heterogeneous computing. IEEE Access 7:173884–173896
Ahmad F, Shahid M, Alam M, Ashraf Z, Sajid M, Kotecha K, Dhiman G (2022) Levelized multiple workflow allocation strategy under precedence constraints with task merging in IaaS cloud environment. IEEE Access 10:92809–92827
Pu J, Meng Q, Chen Y, Sheng H (2023) MPEFT: a novel task scheduling method for workflows. Front Environ Sci 10:2601
Li H, Chen B, Huang J, Cañizares Abreu JR, Chai S, Xia Y (2023) Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud. Cluster Comput. https://doi.org/10.1007/s10586-023-04006-w
Hariri M, Nouri-Baygi M, Abrishami S (2022) A hybrid algorithm for scheduling scientific workflows in IaaS cloud with deadline constraint. J Supercomput 78(15):16975–16996
Li H, Wang D, Xu G, Yuan Y, Xia Y (2022) Improved swarm search algorithm for scheduling budget-constrained workflows in the cloud. Soft Comput 26(8):3809–3824
Singh V, Gupta I, Jana PK (2018) A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources. Futur Gener Comput Syst 79:95–110
Li Z, Yu H, Fan G (2022) Cost-effective approaches for deadline-constrained workflow scheduling in clouds. J Supercomput 79:1–29
Gu XC, Fan L, Wu W, Huang H, Jia X (2018) Greening cloud data centers in an economical way by energy trading with power grid. Future Gener Comput Syst 78:89–101
Gu Y, Budati C (2020) Energy-aware workflow scheduling and optimization in clouds using bat algorithm. Future Gener Comput Syst 113:106–112
Medara R, Singh RS (2021) Energy-aware workflow task scheduling in clouds with virtual machine consolidation using discrete water wave optimization. Simul Model Pract Theory 110:102323
Shahid M, Alam M, Hasan F, Imran M (2021) Security-aware workflow allocation strategy for IaaS cloud environment. In: Proceedings of International Conference on Communication and Computational Technologies: ICCCT-2019. Springer Singapore. p 241–252
Donglai F, Yanhua L (2021) Trust-aware task allocation in collaborative crowdsourcing model. Comput J 64(6):929–940
Stavrinides GL, Karatza HD (2022) Security, cost and energy aware scheduling of real-time IoT workflows in a mist computing environment. Inf Syst Front. https://doi.org/10.1007/s10796-022-10304-2
Taghinezhad-Niar A, Taheri J (2022) Reliability, rental-cost and energy-aware multi-workflow scheduling on multi-cloud systems. IEEE Trans Cloud Comput. https://doi.org/10.1109/TCC.2022.3223869
Alam M, Shahid M, Mustajab S (2023) Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. Cluster Comput. https://doi.org/10.1007/s10586-022-03819-5
Alam M, Shahid M, Mustajab S, Ahmad F, Haidri RA (2023) Security driven cost-effective deadline aware workflow allocation strategy in cloud computing environment. In: 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS). IEEE. p 1–6
Alam M, Shahid M, Mustajab S (2023) A security driven energy efficient workflow allocation algorithm under deadline constraints for cloud computing. In: 4th International Conference on Data Analytics for Business and Industry (ICDABI). IEEE. p 1–6
Gary MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, San Francisco
Internationa data corporation. https://www.idc.com/
Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inf Softw Technol 51(1):7–15
Keele S (2007) Guidelines for performing systematic literature reviews in software engineering. In: Technical report, Ver. 2.3 EBSE Technical Report. EBSE
Dieste O, Grimán A, Juristo N (2009) Developing search strategies for detecting relevant experiments. Empir Softw Eng 14(5):513–539
Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: a survey. ACM Comput Surv (CSUR) 48(1):1–50
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383
Anupa J, Sekaran KC (2014) Cloud workflow and security: a survey. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE. p 1598–1607
Francis AO, Emmanuel B, Zhang D, Zheng W, Qin Y, Zhang D (2018). Exploration of secured workflow scheduling models in cloud environment: a survey. In: 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD). IEEE. p. 71–76
Cruzes DS, Dybå T (2011) Research synthesis in software engineering: a tertiary study. Inf Softw Technol 53(5):440–455
Kitchenham BA, Brereton P, Turner M, Niazi MK, Linkman S, Pretorius R, Budgen D (2010) Refining the systematic literature review process—two participant-observer case studies. Empir Softw Eng 15:618–653
Viriyasitavat W, Martin A (2012) A survey of trust in workflows and relevant contexts. IEEE Commun Surv Tutor 14(3):911–940
Sheikh A, Munro M, Budgen D (2019) Systematic literature review (SLR) of resource scheduling and security in cloud computing. Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2019.0100404
Fernández-Cerero D, Jakóbik A, Grzonka D, Kołodziej J, Fernández-Montes A (2018) Security supportive energy-aware scheduling and energy policies for cloud environments. J Parallel Distrib Comput 119:191–202
Zade BMH, Mansouri N, Javidi MM (2021) SAEA: a security-aware and energy-aware task scheduling strategy by parallel squirrel search algorithm in cloud environment. Expert Syst Appl 176:114915
Wang B, Wang C, Huang W, Song Y, Qin X (2021) Security-aware task scheduling with deadline constraints on heterogeneous hybrid clouds. J Parallel Distrib Comput 153:15–28
Gharib A, Ibnkahla M (2022) Node embedding for security-aware clustering of mobile information-centric sensor networks. IEEE Internet Things J 9(18):17249–17264
Alam M, Mahak Haidri RA, Yadav DK (2021) Efficient task scheduling on virtual machine in cloud computing environment. Int J Pervasive Comput Commun 17(3):271–287
Shakeel H, Alam M (2022) Load balancing approaches in cloud and fog computing environments: a framework, classification, and systematic review. Int J Cloud Appl Comput (IJCAC) 12(1):1–24
Youn CH, Chen M, Dazzi P, Youn CH, Chen M, Dazzi P (2017) Cost adaptive workflow resource broker in cloud. Cloud broker and cloudlet for workflow scheduling. Springer, Singapore, pp 75–103
Elmagarmid A, Du W (1998) Workflow management: state of the art versus state of the products. Workflow management systems and interoperability. Springer, Berlin, Heidelberg, pp 1–17
Du W, Elmagarmid A (1997) Workflow management: State of the art vs. state of the products. HP LABORATORIES TECHNICAL REPORT HPL
Goble CA, Bhagat J, Aleksejevs S, Cruickshank D, Michaelides D, Newman D, De Roure D (2010) myExperiment: a repository and social network for the sharing of bioinformatics workflows. Nucleic Acids Res 38(suppl_2):677–682
Ludäscher B, Altintas I, Berkley C, Higgins D, Jaeger E, Jones M, Zhao Y (2006) Scientific workflow management and the Kepler system. Concurr Comput: Pract Exp 18(10):1039–1065
Freire J, Silva CT, Callahan SP, Santos E, Scheidegger CE, Vo HT (2006). Managing rapidly-evolving scientific workflows. In: International Provenance and Annotation Workshop. Springer, Berlin, Heidelberg. p 10–18
Deelman E, Singh G, Su MH, Blythe J, Gil Y, Kesselman C, Laity A (2005) Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci Programss 13(3):219–237
Pandey S, Voorsluys W, Buyya R, Dobson J, Chiu K (2009) Brain image registration analysis workflow for fmri studies on global grids. In: 2009 International Conference on Advanced Information Networking and Applications. IEEE. p 435–442
Pandey S, Voorsluys W, Rahman M, Buyya R, Dobson JE, Chiu K (2009) A grid workflow environment for brain imaging analysis on distributed systems. Concurr Comput: Pract Exp 21(16):2118–2139
Huser V, Rasmussen LV, Oberg R, Starren JB (2011) Implementation of workflow engine technology to deliver basic clinical decision support functionality. BMC Med Res Methodol 11(1):43
Zimmermann O, Doubrovski V, Grundler J, Hogg K (2005) Service-oriented architecture and business process choreography in an order management scenario: rationale, concepts, lessons learned. In: Companion to the 20th annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications. ACM. p 301–312
Zhang H, Zheng X, Xia Y, Li M (2019) Workflow scheduling in the cloud with weighted upward-rank priority scheme using random walk and uniform spare budget splitting. IEEE Access 7:60359–60375
Ma X, Xu H, Gao H, Bian M (2021) Real-time multiple-workflow scheduling in cloud environments. IEEE Trans Netw Serv Manage 18(4):4002–4018
Optimization Problem Types-NEOS Guide (https://neos-guide.org/)
Xiaoyong T, Li K, Zeng Z, Veeravalli B (2010) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60(7):1017–1029
Savic D (2002) Single-objective versus multiobjective optimisation for integrated decision support. In: 1st International Congress on Environmental Modelling and Software-Lugano, Switzerland
Garg SK, Buyya R, Siegel HJ (2010) Time and cost trade-off management for scheduling parallel applications on utility grids. Future Gener Comput Syst 26(8):1344–1355
Wu F, Wu Q, Tan Y (2015) Workflow scheduling in cloud: a survey. J Supercomput 71:3373–3418
Hosseinzadeh M, Ghafour MY, Hama HK, Vo B, Khoshnevis A (2020) Multi-objective task and workflow scheduling approaches in cloud computing: a comprehensive review. J Grid Comput 18:327–356
Singh RM, Awasthi LK, Sikka G (2022) Towards metaheuristic scheduling techniques in cloud and fog: an extensive taxonomic review. ACM Comput Surv (CSUR) 55(3):1–43
Adhi A, Santosa B, Siswanto N (2018). A meta-heuristic method for solving scheduling problem: crow search algorithm. In: IOP Conference Series: Materials Science and Engineering. Vol. 337, No. 1, p 012003. IOP Publishing
Soltani N, Soleimani B, Barekatain B (2017) Heuristic algorithms for task scheduling in cloud computing: a survey. Int J Comput Netw Inf Secur 11(8):16
Asghari Alaie Y, Hosseini Shirvani M, Rahmani AM (2023) A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach. J Supercomput 79(2):1451–1503
Hosseini Shirvani M (2023) A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. J Supercomput. https://doi.org/10.1007/s11227-023-05806-y
Meena J, Kumar M, Vardhan M (2016) Cost effective genetic algorithm for workflow scheduling in cloud under deadline constraint. IEEE Access 4:5065–5082
Wang P, Lei Y, Agbedanu PR, Zhang Z (2020) Makespan-driven workflow scheduling in clouds using immune-based PSO algorithm. IEEE access 8:29281–29290
Zeng L, Veeravalli B, Li X (2015) SABA: a security-aware and budget-aware workflow scheduling strategy in clouds. J Parallel Distrib Comput 75:141–151
Li Z, Ge J, Yang H, Huang L, Hu H, Hu H, Luo B (2016) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener Comput Syst 65:140–152
Shishido HY, Estrella JC, Toledo CFM, Arantes MS (2018) Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds. Comput Electr Eng 69:378–394
Angela Jennifa Sujana J, Revathi T, Siva Priya TS, Muneeswaran K (2019) Smart PSO-Based Secured Scheduling Approaches for Scientific Workflows in Cloud Computing. p 1745–1765
Thanka MR, Uma Maheswari P, Edwin EB (2019) An improved efficient: artificial bee colony algorithm for security and QoS aware scheduling in cloud computing environment. Clust Comput 22:10905–10913
Wen Y, Liu J, Dou W, Xu X, Cao B, Chen J (2020) Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Gener Comput Syst 108:1084–1091
Hammed SS, Arunkumar B (2022) Efficient workflow scheduling in cloud computing for security maintenance of sensitive data. Int J Commun Syst 35(2):e4240
Zhu QH, Tang H, Huang JJ, Hou Y (2021) Task scheduling for multi-cloud computing subject to security and reliability constraints. IEEE/CAA J Autom Sin 8(4):848–865
Shishido HY, Estrella JC, Toledo CF, Reiff-Marganiec S (2021) Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm. Computing 103:1281–1303
Ojo AO (2022) Cost-Effective and security-aware task allocation algorithm for dynamic wireless sensor networks. Available at SSRN 4022956
Liu W, Peng S, Du W, Wang W, Zeng GS (2014) Security-aware intermediate data placement strategy in scientific cloud workflows. Knowl Inf Syst 41:423–447
Lei J, Wu Q, Xu J (2022) Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener Comput Syst 131:269–278
Mohammadzadeh A, Javaheri D, Artin J (2023) Chaotic hybrid multi-objective optimization algorithm for scientific workflow scheduling in multisite clouds. J Op Res Soc. https://doi.org/10.1080/01605682.2023.2195426
Arunarani AR, Manjula D, Sugumaran V (2017) FFBAT: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms. Concurr Comput: Pract Exp 29(24):e4295
Naidu PS, Bhagat B (2018) Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation. Int J Model, Simul, Sci Comput 9(01):1750064
Amini Motlagh A, Movaghar A, Rahmani AM (2022) A new reliability-based task scheduling algorithm in cloud computing. Int J Commun Syst 35(3):e5022
Huang B, Xiang Y, Yu D, Wang J, Li Z, Wang S (2021) Reinforcement learning for security-aware workflow application scheduling in mobile edge computing. Secur Commun Netw 2021:1–13
Yang Y, Peng X, Cao J (2015) Trust-based scheduling strategy for cloud workflow applications. Informatica 26(1):159–180
Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2020) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Industr Inf 17(6):4219–4228
Singh K, Alam M, Sharma SK (2015) A survey of static scheduling algorithm for distributed computing system. Int J Comput Appl 129(2):25–30
Atluri V, Huang WK (1996) An authorization model for workflows. In: Computer Security—ESORICS 96: 4th european symposium on research in computer security Rome, Italy, September 25–27, 1996 Proceedings 4. Springer, Berlin, Heidelberg. p 44–64
Brewer DF, Nash MJ (1989) The Chinese wall security policy. In: IEEE symposium on security and privacy. vol 1989, p 206
Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688
Atluri V, Warner J (2008) Security for workflow systems. Handbook of database security: applications and trends. Springer, Boston, pp 213–230
Lone AN, Mustajab S, Alam M (2023) A Comprehensive study on cybersecurity challenges and opportunities in the IoT world. Secur Priv 6(6):e318
Wang W, Zeng G, Tang D, Yao J (2012) Cloud-DLS: dynamic trusted scheduling for cloud computing. Expert Syst Appl 39(3):2321–2329
Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Yang LT (2013) Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J Comput Syst Sci 79(5):518–529
Yang Y, Peng X (2013) Trust-based scheduling strategy for workflow applications in cloud environment. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. IEEE. p 316–320
Angela Jennifa Sujana J, Geethanjali M, Venitta Raj R, Revathi T (2019) Trust model-based scheduling of stochastic workflows in cloud and fog computing. Cloud computing for geospatial big data analytics: intelligent edge, fog and mist computing. p 29–54
Angela Jennifa Sujana J, Revathi T, Joshua Rajanayagam S (2020) Fuzzy-based security-driven optimistic scheduling of scientific workflows in cloud computing. IETE J Res 66(2):224–241
Djigal H, Feng J, Lu J (2020) Performance evaluation of security-aware list scheduling algorithms in IaaS cloud. In: 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID). IEEE. p 330–339
Alam M, Shahid M, Mustajab S (2021) SAHEFT: security aware heterogeneous earliest finish time workflow allocation strategy for IaaS cloud environment. In: 2021 IEEE Madras Section Conference (MASCON). IEEE. p 1–8
Alam M, Shahid M, Mustajab S (2022) Security prioritized heterogeneous earliest finish time workflow allocation algorithm for cloud computing. In: Congress on Intelligent Systems: Proceedings of CIS 2021. Singapore: Springer Nature Singapore. vol 1, p 233–246
Zhang P, Zhou M, Fortino G (2018) Security and trust issues in fog computing: a survey. Future Gener Comput Syst 88:16–27
Alam M, Shahid M, Mustajab S (2022) Security oriented deadline aware workflow allocation strategy for infrastructure as a service clouds. In: 2022 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE. p 1–6
Xu X, Zhao X, Ruan F, Zhang J, Tian W, Dou W, Liu AX (2017) Data placement for privacy-aware applications over big data in hybrid clouds. Secur Commun Netws. https://doi.org/10.1155/2017/2376484
Alkhanak EN, Lee SP, Khan SUR (2015) Cost-aware challenges for workflow scheduling approaches in cloud computing environments: taxonomy and opportunities. Future Gener Comput Syst 50:3–21
Islam T, Manivannan D, Zeadally S (2016) A classification and characterization of security threats in cloud computing. Int J Next-Gener Comput 7(1):268–285
Hammouti S, Yagoubi B, Makhlouf SA (2020) Workflow security scheduling strategy in cloud computing. In: Modelling and Implementation of Complex Systems: Proceedings of the 6th International Symposium, MISC 2020, Batna, Algeria, October 24–26, 2020. Springer International Publishing, Cham. p 48–61
Alam M, Shahid M, Mustajab S, Ahmad F (2023) Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud. Int J Inf Technol 15:1–9
Tan W, Sun Y, Lu G, Tang A, Cui L (2013) Trust services-oriented multi-objects workflow scheduling model for cloud computing. In: Pervasive Computing and the Networked World: Joint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28–30, 2012, Revised Selected Papers. Springer Berlin Heidelberg. p 617–630
Tan W, Sun Y, Li LX, Lu G, Wang T (2013) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868–878
Rathanam GJ, Rajaram A (2016) Trust based meta-heuristics workflow scheduling in cloud service environment. Circuits and Systems 7(04):520
Wen Z, Cała J, Watson P, Romanovsky A (2016) Cost effective, reliable and secure workflow deployment over federated clouds. IEEE Trans Serv Comput 10(6):929–941
Abazari F, Analoui M, Takabi H, Fu S (2019) MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm. Simul Model Pract Theory 93:119–132
Medara R, Singh RS (2021) Energy efficient and reliability aware workflow task scheduling in cloud environment. Wireless Pers Commun 119(2):1301–1320
Stavrinides GL, Karatza HD (2021). Security and cost aware scheduling of real-time IoT workflows in a mist computing environment. In: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE. p 34–41
Yakoubov S, Gadepally V, Schear N., Shen E, Yerukhimovich A (2014) A survey of cryptographic approaches to securing big-data analytics in the cloud. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC). IEEE. p. 1–6
Chen H, Cheng R, Pedrycz W, Jin Y (2019) Solving many-objective optimization problems via multistage evolutionary search. IEEE Trans Syst, Man, Cybern: Syst 51(6):3552–3564
Funding
No funding is supported by any agency.
Author information
Authors and Affiliations
Contributions
MA contributed to main idea, methodology, literature search, data analysis, figures, and writing—original draft preparation—review & editing; MS contributed to main idea, writing—original draft preparation, data analysis, writing—review & editing; SM contributed to resources, writing—review & editing; and MS and SM supervised the study. All the authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Ethical Approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alam, M., Shahid, M. & Mustajab, S. Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. J Supercomput 80, 11491–11555 (2024). https://doi.org/10.1007/s11227-023-05873-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05873-1