Security-Aware Distributed Job Scheduling in Cloud Computing Systems: A Game-Theoretic Cellular Automata-Based Approach

被引:6
|
作者
Gasior, Jakub [1 ]
Seredynski, Franciszek [1 ]
机构
[1] Cardinal Stefan Wyszynski Univ, Dept Math & Nat Sci, Warsaw, Poland
来源
关键词
Collective behavior; Multi-agent systems; Spatial Prisoner's Dilemma Game; Second order cellular automata; ALGORITHMS;
D O I
10.1007/978-3-030-22741-8_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We consider the problem of security-aware scheduling and load balancing in Cloud Computing (CC) systems. This optimization problem we replace by a game-theoretic approach where players tend to achieve a solution by reaching a Nash equilibrium. We propose a fully distributed algorithm based on applying Iterated Spatial Prisoner's Dilemma (ISPD) game and a phenomenon of collective behavior of players participating in the game. Brokers representing users participate in the game to fulfill their own three criteria: the execution time of the submitted tasks, their execution cost and the level of provided Quality of Service (QoS). We experimentally show that in the process of the game a solution is found which provides an optimal resource utilization while users meet their applications' performance and security requirements with minimum expenditure and overhead.
引用
收藏
页码:449 / 462
页数:14
相关论文
共 50 条
  • [31] An Online Cost-Based Job Scheduling Method by Cellular Automata in Cloud Computing Environment
    Neda Zekrizadeh
    Ahmad Khademzadeh
    Mehdi Hosseinzadeh
    Wireless Personal Communications, 2019, 105 : 913 - 939
  • [32] Dynamic Computation Offloading for Mobile Cloud Computing: A Stochastic Game-Theoretic Approach
    Zheng, Jianchao
    Cai, Yueming
    Wu, Yuan
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (04) : 771 - 786
  • [33] A Distributed Game-theoretic Approach for IaaS Service Trading in an Auction-based Cloud Market
    Wei, Yi
    Pan, Li
    Yuan, Dong
    Liu, Shijun
    Wu, Lei
    Meng, Xiangxu
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1543 - 1550
  • [34] Security-aware optimization for ubiquitous computing systems with SEAT graph approach
    Qiu, Meikang
    Zhang, Lei
    Ming, Zhong
    Chen, Zhi
    Qin, Xiao
    Yang, Laurence T.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) : 518 - 529
  • [35] A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing
    Ousmane, Sane Bernard
    Mbacke, Babou Cheikh Saliou
    Ibrahima, Niang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [36] A Security-Driven Approach to Online Job Scheduling in IaaS Cloud Computing Systems
    Gasior, Jakub
    Seredynski, Franciszek
    Tchernykh, Andrei
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2017), PT II, 2018, 10778 : 156 - 165
  • [37] An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing
    Zade, B. Mohammad Hasani
    Javidi, M. M.
    Mansouri, N.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (06) : 2929 - 2984
  • [38] An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing
    B. Mohammad Hasani Zade
    M. M. Javidi
    N. Mansouri
    Peer-to-Peer Networking and Applications, 2023, 16 : 2929 - 2984
  • [39] Immune-like system approach to cellular automata-based scheduling
    Seredynski, F
    Swiecicka, A
    PARALLEL PROCESSING APPLIED MATHEMATICS, 2002, 2328 : 626 - 633
  • [40] Energy-Aware Scheduling of Distributed Systems Using Cellular Automata
    Agrawal, Pragati
    Rao, Shrisha
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 47 - 52