ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
abstract
Workflow scheduling is one of the prominent issues in cloud computing which is aimed at complete execution of workflows by considering their QoS requirements such as deadline and budget constraints. Numerous state of the art workflow scheduling schemes have been proposed in the literature for scheduling simple and scientific workflows in the cloud computing and this paper presents a comprehensive survey and analysis of these schemes. It illuminates the objectives of scheduling schemes in the cloud computing and provides a classification of the proposed schemes based on the type of scheduling algorithm applied in each scheme. Beside, each scheme is illustrated and a complete comparison of them is presented to highlight their objectives, properties and limitations. Finally, the concluding remarks and future research directions are provided.
5. Conclusion
A workflow is a logical sequence of the dependent tasks. Numerous studies have been conducted about the workflow scheduling in the cloud computing which utilize heuristics and metaheuristics algorithms to obtain the approximated solutions.
This paper provided a comprehensive analysis of the workflow scheduling schemes proposed for the cloud computing environment. These schemes are classified based on the type of the algorithm utilized in the workflow scheduling and their various objectives and properties are analyzed and compared. Also, various factors which are considered in each scheduling scheme are highlighted, and the limitations and advantages of the scheduling schemes are specified.
One of the issues which have less been addressed in most workflow scheduling schemes is the concept of the secure scheduling. Considering the ever increasing security attacks against the cloud environment, various attacks have been presented in the literature which target the cloud schedulers and other cloud components such as the VMs. As a result, in the future research and studies, the security and trust-related concept should be integrated in the cloud scheduling to differentiate the workflow requests issued by the attackers and the trusted cloud users. Thus, regarding the security vulnerabilities of the cloud environment, cloud scheduler should be empowered with the secure algorithms to prevent or thwart various attacks such as the cloud internal denial of the service attacks, the VM sprawl attacks, the VM neighbor attacks, the VM migrate and escape attacks and so on.