A platform for research: civil engineering, architecture and urbanism
Research on Job Security Scheduling Strategy in Cloud Computing Model
This paper concentrates on the problem of job security scheduling problem under the cloud computing environment. The Architecture of the cloud computing platform is made up of four layers, including 1) SOA architecture, 2) Management Middleware, 3) Resource virtualization and 4) Physical Resources. Next, we formally describe the problem of the job security scheduling under cloud computing. To guarantee the security level of job scheduling, security demand and trust level are defined in our work. Afterwards, the proposed genetic algorithm based job security scheduling is proposed. The main innovation of our proposed algorithm lies in that we utilize each chromosome to represent a schedule of a set of jobs on several computers, and then each gene is represented as a pair to describe the relationships between jobs and computers. Finally, experimental results demonstrate that our algorithm can effectively schedule jobs with higher level security and lower processing time cost.
Research on Job Security Scheduling Strategy in Cloud Computing Model
This paper concentrates on the problem of job security scheduling problem under the cloud computing environment. The Architecture of the cloud computing platform is made up of four layers, including 1) SOA architecture, 2) Management Middleware, 3) Resource virtualization and 4) Physical Resources. Next, we formally describe the problem of the job security scheduling under cloud computing. To guarantee the security level of job scheduling, security demand and trust level are defined in our work. Afterwards, the proposed genetic algorithm based job security scheduling is proposed. The main innovation of our proposed algorithm lies in that we utilize each chromosome to represent a schedule of a set of jobs on several computers, and then each gene is represented as a pair to describe the relationships between jobs and computers. Finally, experimental results demonstrate that our algorithm can effectively schedule jobs with higher level security and lower processing time cost.
Research on Job Security Scheduling Strategy in Cloud Computing Model
Zhang, Hanqing (author)
2015-12-01
242993 byte
Conference paper
Electronic Resource
English
BIM Application Research Based on Cloud Computing
Trans Tech Publications | 2012
|Fuzzy Modeling for Information Security Management Issues in Cloud Computing
British Library Online Contents | 2014
|Cloud Computing Information System Security Monitoring Under Artificial Intelligence Technology
Springer Verlag | 2023
|BIM Application Research Based on Cloud Computing
British Library Conference Proceedings | 2012
|