Survey on Secure Scientific Workflow Scheduling in Cloud Environments
Abstract
:1. Introduction
2. Scientific Workflows in the Cloud
- CyberShake: Developed by the Southern California Earthquake Center, CyberShake is designed to assess seismic hazards in a region by using probabilistic seismic hazard analysis (PSHA). It simulates earthquake ground motions by integrating faults, geology, and seismic wave propagation information.
- Montage: Created by NASA, Montage is a workflow application that creates large-scale sky mosaics by stitching together multiple astronomical images. Using input images from various telescopes and data sources, Montage generates high-resolution mosaics that astronomers use to study celestial objects across different wavelengths.
- LIGO inspiral: The Laser Interferometer Gravitational-Wave Observatory (LIGO) uses this workflow to analyze gravitational wave data produced by events such as the merging of binary systems, including black holes and neutron stars.
- Sipht: Developed by Harvard University, Sipht is a workflow used in bioinformatics research to search for small, non-coding RNAs across various bacterial genomes. These small RNAs play a critical role in gene regulation, and identifying them is essential for understanding cellular processes and developing medical applications.
- Epigenomics is in the bioinformatics field, a CPU-intensive application that automates the execution of various genome sequencing operations [3].
3. Scientific Workflow Scheduling in the Cloud
- Mapping task classes to virtual resources results in a significant make-span, and the challenge is in identifying a minimal set of ideal schedules that maximize performance according to user-defined quality of service parameters, such as cost and speed.
- A user-controlled scheduler assigns resources in a cloud environment. The challenge lies in determining the types and quantities of resources required for the workflow application to function effectively. Resource overprovisioning enhances performance but escalates costs, while resource under-provisioning detrimentally affects efficiency.
- Dependencies on data and control flow between tasks increase the wait time before a task is ready to start, which lengthens the makespan.
4. Scheduling Objectives
4.1. Cost
4.2. Makespan
4.3. Workload Maximization
4.4. VM Utilization Maximization
4.5. Energy Consumption Minimization
4.6. Reliability Awareness
4.7. Security Awareness
4.7.1. Authentication
4.7.2. Integrity
4.7.3. Confidentiality
5. Cloud Security
6. Threats of the Scientific Workflows in Clouds
- Data of Loss: VMs typically store workflow intermediate data. The availability of the intermediate data will be jeopardized if these virtual machines fail, as the intermediate data will be lost.
- Traffic Eavesdropping: This could make it easier for attackers to obtain information transferred over the network unlawfully. Numerous workflows are associated with significant scientific computing activities, including atmospheric science, bioinformatics, high-energy physics, and so forth [25]. Because process intermediate data frequently contains key secrets in some domains, data theft would result in significant losses. The confidentiality of intermediate data will be in jeopardy due to this assault.
- Malicious Medium: This threat involves intercepting and modifying data while it is being transmitted across the network. In some cases, adversaries may introduce malicious content to compromise the security of the data. Such actions can corrupt the workflow by altering or injecting harmful elements into the intermediate data. As a result, the integrity of the data is compromised, leading to inaccurate results and potentially rendering the entire workflow unreliable.
- To verify that each sub-task can be executed without any VM failures, the systems must assess the average earliest finish time of the virtual cluster about the subtask sub-deadline.
- Systems must be capable of (i) evaluating the accuracy of sub-task results by analyzing the confidence of intermediate data across all copies and (ii) rectifying modified outputs to safeguard the system from the third type of assault by re-executing the current task.
- The system must possess sufficient strength to endure the fourth type of attack by eliminating latent threats and purging executors through resource recycling.
- Preserving system efficiency while implementing security measures, guaranteeing that the fault-intrusion-tolerant method does not adversely affect workflow performance.
- Protecting Intellectual Property (IP): Researchers want to protect their property from unauthorized access or modification.
- Maintaining Integrity in Workflow: Unauthorized interference or manipulation of the scientific process is prevented by a secure workflow, which guarantees that only permitted actions are carried out in the correct order.
- Preserving Reproducibility: A fundamental aspect of scientific inquiry is reproducibility. Because the workflow is not changed, secure workflows contribute to the assurance that others may precisely repeat experiments.
- Securing Resources: Scientific workflows often rely on computational resources like cloud platforms. Security measures protect these resources from unauthorized access, abuse, and exploitation, ensuring that they are available and functioning correctly when needed.
7. Secure Scientific Workflow in the Cloud
7.1. Data Security
7.2. Datacenter Security
7.3. Allocation Security
8. Survey of Secure Workflow Scheduling Approaches in Cloud Environments
9. Discussion
- References [13,14,26,27,28,29,31,32,33,34,35,36,37,38,40,41,42,43,44,45,47,48,49,50,51,52,53,55,56,57,58,59]: These sources address security concerns in workflow scheduling, highlighting the development of security-aware algorithms, cost-effectiveness strategies, and privacy-preserving techniques. They underscore the importance of integrating security measures into scheduling algorithms.
- Confidentiality: Safeguarding sensitive workflow data from unauthorized access is essential, especially in private or classified data processes. Heuristic methods, including encryption techniques, offer rapid answers but may be deficient in scalability. Metaheuristic techniques, such as particle swarm optimization (PSO) and hybrid strategies like SPHEFT, include robust encryption protocols and allocate jobs to high-security virtual machines to maintain confidentiality while preserving efficiency.
- Integrity: Data integrity guarantees that workflow data remains unchanged during execution. Heuristic approaches frequently use hashing algorithms such as MD5 or SHA-256 to ensure data integrity. Metaheuristic methods, like genetic algorithms (GA), use sophisticated integrity-checking systems in optimization procedures.
- Availability: Workflow availability guarantees continuous access to resources and the prompt execution of tasks. Heuristic methods depend on fundamental failover mechanisms, but metaheuristics employ dynamic resource allocation to ensure availability during system failures. Hybrid methodologies such as ACISO employ resource redundancy and load balancing to guarantee the uninterrupted operation of processes in the face of disturbances.
- Scalability limitations: Numerous paper approaches encounter challenges in scalability when implemented in extensive, intricate operations. As the work quantity rises, expenses escalate considerably, resulting in possible inefficiencies.
- Resource Heterogeneity: Although many methodologies tackle resource allocation and security levels of datasets, they frequently neglect the heterogeneity inherent in cloud systems. This issue may lead to inefficient work distribution and increased operational expenses.
- Dynamic Threats: Several papers emphasize static security measures but lack adaptability to dynamic and evolving threats, such as zero-day vulnerabilities or other threats.
- Energy Efficiency: The Day World focuses on energy consumption, a critical metric. So, few algorithms integrate energy-aware scheduling. This omission could lead to unsustainable cloud operations.
10. Conclusions and Future Work
10.1. Conclusions
- Security Integration: Most reviewed approaches incorporate security considerations such as confidentiality, integrity, and availability directly into the scheduling process. This integration ensures that workflows are executed securely without compromising the performance of cloud resources.
- Adaptability and Efficiency: The use of diverse algorithms—from heuristic and metaheuristic approaches to advanced deep learning models—demonstrates the flexibility and robustness required to manage cloud environments’ dynamic and often unpredictable nature.
- Trade-offs in Optimization: These methodologies focus on balancing the trade-offs between performance metrics such as makespan and security measures. This balance is crucial in scientific workflows, where execution time and data protection are of paramount importance.
- Resource Management: Techniques like VM utilization maximization and energy-aware scheduling address resource efficiency and environmental sustainability goals, catering to user needs and global ecological concerns.
10.2. Future Work
- Advanced AI Models: The development of AI-driven models, particularly in reinforcement learning, that can dynamically adapt to new threats while optimizing workflows.
- Multi-Cloud Interoperability: Research into secure workflow scheduling across multiple cloud platforms, addressing interoperability issues while maintaining robust security standards.
- Trust-Based Scheduling: We are further developing trust-based models that evaluate the reliability and security history of cloud resources, allowing for more accurate and secure task assignments.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Tarafdar, A.; Karmakar, K.; Das, R.K.; Khatua, S. Multi-criteria scheduling of scientific workflows in the Workflow as a Service platform. Comput. Electr. Eng. 2023, 105, 108458. [Google Scholar] [CrossRef]
- Menaka, M.; Kumar, K.S. Workflow scheduling in cloud environment—Challenges, tools, limitations & methodologies: A review. Meas. Sens. 2022, 24, 100436. [Google Scholar] [CrossRef]
- Rodriguez, M.A.; Buyya, R. Scientific Workflow Management System for Clouds. In Software Architecture for Big Data and the Cloud; Elsevier: Amsterdam, The Netherlands, 2017; pp. 367–387. [Google Scholar] [CrossRef]
- Alejandra, M.; Sossa, R. Resource Provisioning and Scheduling Algorithms for Scientific Workflows in Cloud Computing Environments. Doctoral Dissertation, Department of Computing and Information Systems, University of Melbourne, Melbourne, Australia, 2016. [Google Scholar]
- Ahmed, S.; Omara, F.A. A Modified Workflow Scheduling Algorithm for Cloud Computing Environment. Int. J. Intell. Eng. Syst. 2022, 15, 336–352. [Google Scholar] [CrossRef]
- Wang, Y.; Guo, Y.; Guo, Z.; Liu, W.; Yang, C. Protecting scientific workflows in clouds with an intrusion tolerant system. IET Inf. Secur. 2020, 14, 157–165. [Google Scholar] [CrossRef]
- Wang, Y.-W.; Wu, J.-X.; Guo, Y.-F.; Hu, H.-C.; Liu, W.-Y.; Cheng, G.-Z. Scientific workflow execution system based on mimic defense in the cloud environment. Front. Inf. Technol. Electron. Eng. 2018, 19, 1522–1536. [Google Scholar] [CrossRef]
- Hammouti, S.; Yagoubi, B.; Makhlouf, S.A. Parametric Scientific Workflow Scheduling Algorithm in Cloud Computing. In Proceedings of the 2022 International Symposium on iNnovative Informatics of Biskra, ISNIB 2022, Biskra, Algeria, 7–8 December 2022; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2022. [Google Scholar] [CrossRef]
- Shishido, H.Y.; Estrella, J.C.; Toledo, C.F.M.; Arantes, M.S. Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds. Comput. Electr. Eng. 2018, 69, 378–394. [Google Scholar] [CrossRef]
- Alouffi, B.; Hasnain, M.; Alharbi, A.; Alosaimi, W.; Alyami, H.; Ayaz, M. A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 2021, 9, 57792–57807. [Google Scholar] [CrossRef]
- Shishido, H.Y.; Estrella, J.C.; Toledo, C.F.M.; Reiff-Marganiec, S. Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm. Computing 2021, 103, 1281–1303. [Google Scholar] [CrossRef]
- Sarra, H. Job Scheduling in Cloud Computing Environment. Master’s Thesis, University Mohamed Boudiaf-M’sila, M’Sila, Algeria, 2020. [Google Scholar]
- Farid, M.; Latip, R.; Hussin, M.; Wati, A.; Hamid, A.; Senthil Kumar, A.V. Comparative Analysis of PSO-derived Workflow Scheduling Algorithms in Cloud Computing based on QoS Requirements. Int. J. Adv. Res. Eng. Technol. 2020, 11, 1387–1399. [Google Scholar] [CrossRef]
- Kour, R.; Koul, S.; Kour, M. A Classification Based Approach for Data Confidentiality in Cloud Environment. In Proceedings of the 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), Jammu, India, 11–12 December 2017; pp. 24–28. [Google Scholar] [CrossRef]
- Pasha, F.; Natarajan, J. Research on secure workload execution scheme in heterogeneous cloud environment. Indones. J. Electr. Eng. Comput. Sci. 2023, 29, 1047–1054. [Google Scholar] [CrossRef]
- Kaur, S.; Bagga, P.; Hans, R.; Kaur, H. Quality of Service (QoS) Aware Workflow Scheduling (WFS) in Cloud Computing: A Systematic Review. Arab. J. Sci. Eng. 2019, 44, 2867–2897. [Google Scholar] [CrossRef]
- Rodriguez, M.A.; Buyya, R. A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments. Concurr. Comput. Pract. Exp. 2017, 29, e4041. [Google Scholar] [CrossRef]
- Wang, Y.; Guo, Y.; Guo, Z.; Baker, T.; Liu, W. CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model. Future Gener. Comput. Syst. 2020, 111, 460–474. [Google Scholar] [CrossRef]
- Yang, L.; Xia, Y.; Ye, L.; Gao, R.; Zhan, Y. A Fully Hybrid Algorithm for Deadline Constrained Workflow Scheduling in Clouds. IEEE Trans. Cloud Comput. 2023, 11, 3197–3210. [Google Scholar] [CrossRef]
- Alkhanak, E.N.; Lee, S.P. A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing. Future Gener. Comput. Syst. 2018, 86, 480–506. [Google Scholar] [CrossRef]
- Jihad, A.A.; Al-Janabi, S.T.F.; Yassen, E.T. A survey on provisioning and scheduling algorithms for scientific workflows in cloud computing. AIP Conf. Proc. 2022, 2400, 020019. [Google Scholar] [CrossRef]
- Soveizi, N.; Karastoyanova, D. Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer Science and Business Media Deutschland GmbH: Berlin/Heidelberg, Germany, 2024; pp. 157–175. [Google Scholar] [CrossRef]
- Muñoz, A.; Maña, A.; González, J. Dynamic security properties monitoring architecture for cloud computing. In Security Engineering for Cloud Computing: Approaches and Tools; IGI Global: Hershey, PA, USA, 2012; pp. 1–18. [Google Scholar] [CrossRef]
- Singh, P.; Dutta, M.; Aggarwal, N. A review of task scheduling based on meta-heuristics approach in cloud computing. Knowl. Inf. Syst. 2017, 52, 1–51. [Google Scholar] [CrossRef]
- Manasrah, A.M.; Ali, H.B. Workflow Scheduling Using Hybrid GA-PSO Algorithm in Cloud Computing. Wirel. Commun. Mob. Comput. 2018, 2018, 1934784. [Google Scholar] [CrossRef]
- Solanki, S.V. An Approach for Task Scheduling in Cloud Computing Using Hybrid Algorithm. Available online: http://www.webology.org (accessed on 23 May 2024).
- Yin, L.; Sun, C.; Gao, M.; Fang, Y.; Li, M.; Zhou, F. Hyper-Heuristic Task Scheduling Algorithm Based on Reinforcement Learning in Cloud Computing. Intell. Autom. Soft Comput. 2023, 37, 1587–1608. [Google Scholar] [CrossRef]
- Medara, R.; Singh, R.S. A Review on Energy-Aware Scheduling Techniques for Workflows in IaaS Clouds. Wirel. Pers. Commun. 2022, 125, 1545–1584. [Google Scholar] [CrossRef]
- Kołodziej, J.; Khan, S.U.; Wang, L.; Kisiel-Dorohinicki, M.; Madani, S.A.; Niewiadomska-Szynkiewicz, E.; Zomaya, A.Y.; Xu, C.-Z. Security, energy, and performance-aware resource allocation mechanisms for computational grids. Future Gener. Comput. Syst. 2014, 31, 77–92. [Google Scholar] [CrossRef]
- Prakash, V.; Bawa, S.; Garg, L. Multi-Dependency and Time Based Resource Scheduling Algorithm for Scientific Applications in Cloud Computing. Electronics 2021, 10, 1320. [Google Scholar] [CrossRef]
- Ahmad, S.; Mehfuz, S.; Urooj, S.; Alsubaie, N. Machine learning-based intelligent security framework for secure cloud key management. Clust. Comput. 2024, 27, 5953–5979. [Google Scholar] [CrossRef]
- Ahmad, S.; Mehfuz, S.; Mebarek-Oudina, F.; Beg, J. RSM analysis based cloud access security broker: A systematic literature review. Clust. Comput. 2022, 25, 3733–3763. [Google Scholar] [CrossRef] [PubMed]
- Sotiriadis, S.; Bessis, N.; Antonopoulos, N.; Anjum, A. SimIC: Designing a New Inter-cloud Simulation Platform for Integrating Large-Scale Resource Management. In Proceedings of the 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, 25–28 March 2013; pp. 90–97. [Google Scholar] [CrossRef]
- Albtoush, A.; Yunus, F.; Almi’ani, K.; Noor, N.M.M. Structure-Aware Scheduling Methods for Scientific Workflows in Cloud. Appl. Sci. 2023, 13, 1980. [Google Scholar] [CrossRef]
- Wang, Y.; Guo, Y.; Guo, Z.; Liu, W.; Yang, C. Securing the Intermediate Data of Scientific Workflows in Clouds with ACISO. IEEE Access 2019, 7, 126603–126617. [Google Scholar] [CrossRef]
- Ma, J.; Cao, J.; Zhang, Y. Efficiently supporting secure and reliable collaboration in scientific workflows. J. Comput. Syst. Sci. 2010, 76, 475–489. [Google Scholar] [CrossRef]
- Wang, Y.; Guo, Y.; Wang, W.; Liang, H.; Huo, S. INHIBITOR: An intrusion tolerant scheduling algorithm in cloud-based scientific workflow system. Future Gener. Comput. Syst. 2021, 114, 272–284. [Google Scholar] [CrossRef]
- Francis, A.O.; Emmanuel, B.; Zhang, D.; Zheng, W.; Qin, Y.; Zhang, D. Exploration of Secured Workflow Scheduling Models in Cloud Environment: A Survey. In Proceedings of the 2018 6th International Conference on Advanced Cloud and Big Data, CBD 2018, Lanzhou, China, 12–15 August 2018; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2018; pp. 71–76. [Google Scholar] [CrossRef]
- Soveizi, N.; Turkmen, F.; Karastoyanova, D. Security and privacy concerns in cloud-based scientific and business workflows: A systematic review. Future Gener. Comput. Syst. 2023, 148, 184–200. [Google Scholar] [CrossRef]
- Sheikh, A.; Munro, M.; Budgen, D. Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing. 2019. Available online: www.ijacsa.thesai.org (accessed on 3 May 2024).
- Shishido, H.Y.; Estrella, J.C.; Toledo, C.F.M.; Reiff-Marganiec, S. (WIP) Tasks Selection Policies for Securing Sensitive Data on Workflow Scheduling in Clouds. In Proceedings of the 2018 IEEE International Conference on Services Computing, SCC 2018—Part of the 2018 IEEE World Congress on Services, San Francisco, CA, USA, 2–7 July 2018; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2018; pp. 233–236. [Google Scholar] [CrossRef]
- Li, Z.; Ge, J.; Yang, H.; Huang, L.; Hu, H.; Hu, H.; Luo, B. A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener. Comput. Syst. 2016, 65, 140–152. [Google Scholar] [CrossRef]
- Hussain, M.; Wei, L.-F.; Rehman, A.; Abbas, F.; Hussain, A.; Ali, M. Deadline-constrained energy-aware workflow scheduling in geographically distributed cloud data centers. Future Gener. Comput. Syst. 2022, 132, 211–222. [Google Scholar] [CrossRef]
- Chen, Z.; Zhao, X.; Lin, B. Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments. Discret. Dyn. Nat. Soc. 2020, 2020, 8105145. [Google Scholar] [CrossRef]
- Marcon, D.S.; Bittencourt, L.F.; Dantas, R.; Neves, M.C.; Madeira, E.R.M.; Fernandes, S.; Kamienski, C.A.; Barcelos, M.P.; Gaspary, L.P.; da Fonseca, N.L.S. Workflow specification and scheduling with security constraints in hybrid clouds. In Proceedings of the 2013 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud), Maceio, Brazil, 9–10 December 2013; pp. 29–34. [Google Scholar] [CrossRef]
- Sujana, J.A.J.; Revathi, T.; Priya, T.S.S.; Muneeswaran, K. Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing. Soft Comput. 2019, 23, 1745–1765. [Google Scholar] [CrossRef]
- Singh, H.; Tyagi, S.; Kumar, P.; Gill, S.S.; Buyya, R. Metaheuristics for scheduling of heterogeneous tasks in cloud computing environments: Analysis, performance evaluation, and future directions. Simul. Model. Pract. Theory 2021, 111, 102353. [Google Scholar] [CrossRef]
- Manzoor, M.F.; Abid, A.; Farooq, M.S.; Azam, N.A.; Farooq, U. Resource Allocation Techniques in Cloud Computing: A Review and Future Directions. Elektron. Elektrotechnika 2020, 26, 40–51. [Google Scholar] [CrossRef]
- Boroumand, A.; Shirvani, M.H.; Motameni, H. A heuristic task scheduling algorithm in cloud computing environment: An overall cost minimization approach. Clust. Comput. 2025, 28, 137. [Google Scholar] [CrossRef]
- Zeng, L.; Veeravalli, B.; Li, X. SABA: A security-aware and budget-aware workflow scheduling strategy in clouds. J. Parallel Distrib. Comput. 2015, 75, 141–151. [Google Scholar] [CrossRef]
- Arunarani, A.R.; Manjula, D.; Sugumaran, V. FFBAT: A security and cost-aware workflow scheduling approach combining firefly and bat algorithms. In Concurrency and Computation: Practice and Experience; John Wiley and Sons Ltd.: Hoboken, NJ, USA, 2017. [Google Scholar] [CrossRef]
- Shishido, H.Y.; Estrella, J.C.; Toledo, C.F.M.; Reiff-Marganiec, S. A CloudSim Extension for Evaluating Security Overhead in Workflow Execution in Clouds. In Proceedings of the 2018 Sixth International Symposium on Computing and Networking (CANDAR), Takayama, Japan, 27–30 November 2018; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2018; pp. 174–180. [Google Scholar] [CrossRef]
- Abdali, A.; Nia, S. A new optimization method for security-constrained workflow scheduling. Indian J. Comput. Sci. Eng. 2019, 10, 8–25. [Google Scholar] [CrossRef]
- Hammouti, S.; Yagoubi, B.; Makhlouf, S.A. Workflow Security Scheduling Strategy in Cloud Computing. In Modelling and Implementation of Complex Systems; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Farid, M.; Latip, R.; Hussin, M.; Hamid, N.A.W.A. A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud. PeerJ Comput. Sci. 2021, 7, e747. [Google Scholar] [CrossRef]
- Hammed, S.; Arunkumar, B. Efficient workflow scheduling in cloud computing for security maintenance of sensitive data. Int. J. Commun. Syst. 2022, 35, e4240. [Google Scholar] [CrossRef]
- Alam, M.; Shahid, M.; Mustajab, S. Security Prioritized Heterogeneous Earliest Finish Time Workflow Allocation Algorithm for Cloud Computing. In Congress on Intelligent Systems; Lecture Notes on Data Engineering and Communications Technologies, Volume 114; Springer Science and Business Media Deutschland GmbH: Berlin/Heidelberg, Germany, 2022; pp. 233–246. [Google Scholar] [CrossRef]
- Lei, J.; Wu, Q.; Xu, J. Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener. Comput. Syst. 2022, 131, 269–278. [Google Scholar] [CrossRef]
- Farid, M.; Lim, H.S.; Lee, C.P.; Latip, R. Scheduling Scientific Workflow in Multi-Cloud: A Multi-Objective Minimum Weight Optimization Decision-Making Approach. Symmetry 2023, 15, 2047. [Google Scholar] [CrossRef]
- Alam, M.; Shahid, M.; Mustajab, S. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. Clust. Comput. 2023, 27, 341–376. [Google Scholar] [CrossRef]
- Alam, M.; Shahid, M.; Mustajab, S.; Ahmad, F.; Haidri, R.A. Security Driven Cost-Effective Deadline Aware Workflow Allocation Strategy in Cloud Computing Environment. In Proceedings of the 2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, 1–3 November 2023; pp. 1–7. [Google Scholar] [CrossRef]
- Mangalampalli, S.; Hashmi, S.S.; Gupta, A.; Karri, G.R.; Rajkumar, K.V.; Chakrabarti, T.; Chakrabarti, P.; Margala, M. Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing. IEEE Access 2024, 12, 5373–5392. [Google Scholar] [CrossRef]
- Liang, H.; Zhang, S.; Liu, X.; Cheng, G.; Ma, H.; Wang, Q. SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing. Electronics 2024, 13, 3246. [Google Scholar] [CrossRef]
- Alimoğlu, A.; Özturan, C. An autonomous blockchain-based workflow execution broker for e-science. Clust. Comput. 2024, 27, 10235–10244. [Google Scholar] [CrossRef]
- Prasanna, G.A.S. Integration of Ethereum Blockchain with Cloud Computing for Secure Healthcare Data Management System. J. Electr. Syst. 2024, 20, 111–124. [Google Scholar] [CrossRef]
Approach | Differences | Benefits | Limitations |
---|---|---|---|
Reinforcement Learning |
|
|
|
Metaheuristics |
|
|
|
Heuristics |
|
|
|
Hybrid Approaches |
|
|
|
Hyper-heuristics |
|
|
|
Ref. | Year | Object/Aim | Algorithm | Advantage/Contribution | Type of Security | Parameters/Strategy | Limitations |
---|---|---|---|---|---|---|---|
[50] | 2015 | Optimizing for security requirements while adhering to budget constraints in cloud environments. | Security-Aware and Budget-Aware (SABA) | Balances security requirements with budget constraints. | Confidentiality, Integrity, and Availability (CIA) | Allocation of resources, balancing cost against security needs, security level, dictating. | The algorithm’s effectiveness may decrease with an increase in the number of tasks or complexity of workflows. |
[42] | 2016 | Minimize total cost while fulfilling timeline and risk rate restrictions. | PSO (particle swarm optimization) | Reduce the total workflow execution cost. | CIA | Cost, the deadline, and risk rate. | Limited scalability for large workflows. |
[51] | 2017 | Reduce execution costs while meeting the deadline and risk rate requirements. | FFBAT (Firefly and Bat) algorithm | The proposed algorithm is based on the hybrid optimization approach, which combines the the Firefly and Bat algorithms. | Confidentiality (SEAL, RC4, Blowfish, Khufu/Khafre RC5, Rijndael DES, IDEA) | Cost, deadline, risk rate, security overhead. | High computational overhead. |
[41] | 2018 | For minimizing workflow execution cost, preserving the privacy of critical tasks while respecting the deadline. | Hybrid Metaheuristic | Optimized for privacy and execution costs. | CIA+ specific encryption protocols | Make-span, cost, and security risk. | Limited flexibility with heterogeneous workflows. |
[52] | 2018 | Evaluate scheduling algorithms that preserve the security of sensitive data. | Meta-heuristic algorithms. | An extension for workflow simulators to support security services. | Encryption (SEAL, RC4, Blowfish, Knufu/Khafre, RC5, Rijndael, DES, IDEA) Integrity (MD4, MD5, RIPEMD, RIPEMD128, SHA1, RIPEMD160, TIGER) Authentication HMAC (MD5, SHA1), CBC, MAC-AES | Makespan, monetary cost, reliability, energy consumption, and risk. | There is another approach for securing workflow execution. It involves assigning sensitive tasks to private clouds and non-sensitive chores to public clouds. |
[35] | 2019 | To find the best solution by comparing alternative weights, narrowing the search for an optimal solution through iterative refinement. | Multi-objective FR-MOS-MWO algorithm that combines FR-MOS and the minimum weight optimization method | A user-preference-based minimal weight optimization (MWO) method chooses and shows a feasible solution using the Pareto front’s optimum set. The MWO-based multi-objective algorithm is compared to five standard workflow scheduling decision-making methods. | CIA | Reliability, cost, utilization of resources, risk probability, and time makespan. | Optimizing workflow scheduling using more than five QoS criteria. They will expand our energy-saving method to achieve fault tolerance while scheduling workflow in a hybrid environment. |
[53] | 2019 | The goal is to optimize scheduling performance, minimize total execution costs, and balance resource load while adhering to constraints regarding deadlines and risk rates. | CPSO and GA | Assess the suggested algorithm in the context of extensive scientific procedures. Utilizing such tools has led to numerous significant discoveries. To examine the validity, integrity, or fallacy of the proposed procedure. | CIA | Makespan, risk rate, cost, load balance. | Schedules that optimize the entire budget may attract interest. Thus, both makepan and reliability can also be minimized. Using more effective optimization procedures will be beneficial in educating the reader about the latest trends in technique acquisition to address the task-resource scheduling problem. |
[18] | 2020 | He proposes CLOSURE to enhance the challenges for attackers attempting to infiltrate virtual machines executing workflow sub-tasks. | HEFT | Propose the dynamic recycling and redeployment of VMs to alternate defense strategies during workflow execution; a task scheduling technique based on dynamic HEFT is introduced to enhance the speed of defense strategy transitions and improve workflow efficiency. | Reduce the attacker’s benefits, decrease the time and costs. | A multiplayer game model is needed if there are multiple attackers. | |
[54] | 2020 | This module aims to safeguard sensitive data designated for storage in the cloud, their associated tasks, and data transferring between the (public and private) clouds. | The pre-scheduler designates each job or dataset for execution or storage in the “private or public” cloud. The security improvement module focuses on incorporating the necessary security services for the dataset while minimizing the expenses and overhead generated by these services. Post-Scheduler allocates each job or dataset for execution or storage in an appropriate virtual machine (VM) while adhering to budgetary and temporal limitations. | Confidentiality | Cost · security · budget · deadline. | The system can concurrently tackle the incorporation of security services at both the data and task levels, devise a more economical cryptographic method to fulfill security requirements, and pinpoint a scheduling plan that incorporates extra parameters and constraints, such as energy concerns. | |
[55] | 2021 | The goal is to create a FITSW workflow scheduling algorithm that enhances system failure and intrusion tolerance. | FITSW | Propose the fault and intrusion-tolerant workflow scheduling algorithm (FITSW). | |||
[11] | 2021 | This work aims to enhance the security needs of workflow tasks while minimizing the cost and makespan of workflows in public clouds. | MPGA | (1) Examination of the effects of implementing security services only for sensitive jobs using a task annotation methodology; (2) a scheduling algorithm that enhances task-VM allocation; and (3) metrics for calculating the ratio-risk and the inefficiency in guarding non-sensitive tasks. | CIA | Risk rate, cost, time, makespan. | |
[56] | 2022 | The security provisioning in terms of validation, verification, and encryption allotted only to the sensitized tasks even reduces the cost and the time to a certain level compared to the other methods for scheduling. | GA | The authors describe a useful method for managing workflows that differentiates between high-value and low-value data. They also develop an algorithm that works as a scheduler by implementing it in parallel with the natural processes of a genetic algorithm (GA), ensuring that high-value information is kept safe. | CIA | Time of execution and total cost. | |
[57] | 2022 | The algorithm aims to enhance both security and efficiency. Ultimately, the goal is to create a reliable and secure cloud system for workflow execution. | SPHEFT algorithm | The proposed SPHEFT, which integrates security awareness into workflow scheduling by considering security priorities during task allocation. | Confidentiality | Security overhead, deadline. | |
[58] | 2022 | We employ a three-level privacy and security model and use encryption methods and hash functions to guarantee the security of cross-platform data transmission. | PSLS + PSSA (Simulated Annealing) | Handles privacy, minimizes cost, maintains deadlines | Confidentiality and integrity (IDEA, SHA, Blowfish). | Costs and performance, deadline. | Runtime increases with workload size. |
[59] | 2023 | Reduce makespan, cost, and risk probability, and maximize resource utilization and dependability, which are concurrently considered alongside the interests of service providers and customers. | FR-MOS--MWO | Offers superior solutions relative to the extended Pareto dominance and alternative decision-making techniques utilizing the FR-OS algorithm. | CIA | Makespan, cost resource utilization, reliability, risk propalitty. | One may contemplate incorporating over five QoS criteria to enhance workflow scheduling. One may broaden this technique to diminish energy consumption and achieve fault tolerance while orchestrating the workflow in a hybrid environment. |
[60] | 2023 | To optimize the failure probability and number of task failures as per the requirements of the cloud users. | (SPMWA) Security-Prioritized Workflow Allocation | (SPMWA) A paradigm for the IaaS cloud computing environment is suggested by incorporating the security-priori mapping scheme. Workflow processing performance in risky contexts is projected to be improved by implementing a security-prioritized allocation strategy under precedence restrictions. This model assigns jobs requiring high levels of security to more reliable virtual machines, thereby reducing the likelihood of cloud system failure. | CIA | Task failure, failure probability, and makespan. | High dependency on security metrics. |
[61] | 2024 | To optimize the risk probability while satisfying the precedence constraints in workflow applications and to solve the allocation problem. | SCEDA | Propose a multi-constraints workflow allocation strategy for heterogeneous tasks in cloud computing. | Authentication | Risk probability and the execution cost, budget, and deadline constraints. | Future research related to this contribution will take into account the VM’s termination delay, VMs located in various countries, and other security services offered by CSPs. Moreover, the extended work can include more than one objective with many constraints. |
[22] | 2024 | The methodology emphasizes the surveillance of cloud services and networks to identify security breaches during workflow operations. | RL and MDP | They have proposed two ways to determine the optimal action to mitigate the consequences of such infractions. The initial technique identifies the most economical adaptation measure, whilst the subsequent one utilizes adaptive learning from previous responses. | CIA | Attack score and cost. | They will broaden their research to encompass additional possible enemies, including renters and their users, and implement security measures to counter these threats. |
[62] | 2024 | Minimizing makespan and energy consumption. | MOPWSDRL | A prioritized multi-objective workflow scheduling algorithm was developed using a deep Q-learning network model. | Priorities of both tasks and VMs | Cost and makespan. | Particular attributes should be retrieved to enhance parameters, rendering the scheduler more resilient and efficient for various operations. A trust-based scheduling mechanism must be created in a multi-cloud context utilizing reinforcement learning techniques. |
[63] | 2024 | Secure and makespan-oriented workflow execution in serverless computing. | SMWE (secure and makespan workflow execution) | Enhances security and reduces makespan. | Confidentiality, integrity | Selection based on task sensitivity and dynamic resource allocation. | Applicability to highly heterogeneous workflows. |
[64] | 2024 | Autonomous blockchain-based workflow execution broker for e-science. | Autonomous blockchain workflow broker | Facilitates trustless collaboration in e-science environments using blockchain. | Confidentiality, integrity, non-repudiation | Integration of blockchain for trustless workflow execution; use of smart contracts for workflow orchestration. | High latency and resource demands of blockchain technology; scalability issues with large scale. |
[65] | 2024 | Integration of Ethereum blockchain with cloud computing for secure healthcare data management. | Ethereum blockchain integration | Ensures secure healthcare data management by integrating Ethereum blockchain with cloud computing; provides immutability and decentralized security. | Confidentiality, integrity, availability (CIA) | Smart contract-enabled data access control; decentralized storage mechanisms to enhance security and prevent unauthorized access. | Ethereum’s transaction throughput and high gas fees. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saeed, H.A.; Al-Janabi, S.T.F.; Yassen, E.T.; Aldhaibani, O.A. Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet 2025, 17, 51. https://doi.org/10.3390/fi17020051
Saeed HA, Al-Janabi STF, Yassen ET, Aldhaibani OA. Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet. 2025; 17(2):51. https://doi.org/10.3390/fi17020051
Chicago/Turabian StyleSaeed, Hadeel Amjed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen, and Omar A. Aldhaibani. 2025. "Survey on Secure Scientific Workflow Scheduling in Cloud Environments" Future Internet 17, no. 2: 51. https://doi.org/10.3390/fi17020051
APA StyleSaeed, H. A., Al-Janabi, S. T. F., Yassen, E. T., & Aldhaibani, O. A. (2025). Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet, 17(2), 51. https://doi.org/10.3390/fi17020051