• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen. A Task Scheduling Method for Cloud Workflow Security[J]. Journal of Computer Research and Development, 2018, 55(6): 1180-1189. DOI: 10.7544/issn1000-1239.2018.20170425
Citation: Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen. A Task Scheduling Method for Cloud Workflow Security[J]. Journal of Computer Research and Development, 2018, 55(6): 1180-1189. DOI: 10.7544/issn1000-1239.2018.20170425

A Task Scheduling Method for Cloud Workflow Security

More Information
  • Published Date: May 31, 2018
  • Most of the cloud workflow systems work in the static and homogeneous environment, which will not only lead to fault propagation, reducing the fault tolerant capability of the system, but also make it easier for attackers to acquire the system environment information, helping them to launch accurate attacks. To solve the problem, the task scheduling method for cloud workflow security is proposed. On the basis of the multi-level task division mode in the workflow system, this method employs the task scheduling to avoid the consistent attacks on specific tasks. In order to effectively prevent the attackers from detecting the task execution environment, the diverse operating system images are used to build the heterogeneous task executors, and then the task execution environment is switched dynamically based on these heterogeneous executors, ensuring the randomness of the system environment of cloud workflow. Furthermore, in order to improve the security gain of the heterogeneous systems, the heterogeneity degrees of the executors are quantified, and the quantization results are mapped to the scheduling selection probability, ensuring a significant difference in task execution environments before and after the scheduling. In the experiment, three kinds of attack methods are simulated to test the security of the improved cloud workflow system, and experimental results demonstrate that this method can effectively improve the security of the cloud workflow systems.
  • Cited by

    Periodical cited type(6)

    1. 唐续豪,刘发贵,王彬,李超,蒋俊,唐泉,陈维明,何凤文. 跨云环境下任务调度综述. 计算机研究与发展. 2023(06): 1262-1275 . 本站查看
    2. 仝青,郭云飞,霍树民,王亚文. 面向主动防御的多样性研究进展. 信息安全学报. 2022(03): 119-133 .
    3. 秦轶翚,马涛. 对等网络环境下多目标任务容错调度方法研究. 计算机仿真. 2021(08): 352-355 .
    4. 刘林东. 一种改进的wRR独立任务调度算法研究. 广东第二师范学院学报. 2020(03): 89-93 .
    5. 郑子秋,张卫东,刘宁,付秋璇,尹健康,贺红梅. 信息安全技术在企业ERP系统中的应用. 科技创新与应用. 2019(18): 174-176 .
    6. 徐俊,项倩红,肖刚. 基于改进混合蛙跳算法的云工作流负载均衡调度优化. 计算机科学. 2019(11): 315-322 .

    Other cited types(9)

Catalog

    Article views (1345) PDF downloads (658) Cited by(15)
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return