Font Size: a A A

DAG(s) Scheduling Strategy Research Integrating With Security And Availability In Cloud Environment

Posted on:2016-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:H R ShaoFull Text:PDF
GTID:2308330470482765Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Cloud computing has been widely used in many fields such as e-government, medical and pharmacy, financial and energy, educationanl research, for its novel business model and advantages such as economic, convenience and efficient, etc.In cloud computing environment, an excellent scheduling system could achieve the efficient and quality of tasks execution; a security cloud environment could protect the tenants’ data and privacy, advance the trust of cloud users and promote the healthy and stable development of cloud computing. For these reasons, this paper starts from the two points and integrates resource security and availability into the DAGs scheduling system to satisfy the users’ requirements on security and availability, protect the data, achieve the success rate and improve the user experience.Firstly, the proposal improves the subjective logical trust model to evaluate the security in terms of the characteristics of cloud environment for use in subsequent; secondly, for the case of multi-DAGs, the strategy would classify the DAG on the basis of the execution rank, and then adds the classified to the cloud system, and for the tasks located at the same system level, the scheduler calculates the priority accordding to the deadline, and this is the way the strategy improves the fairness; thirdly, in the process of resource allocation, the scheduler strategy would maximum the objective function which integrate resource security and availability to insure the tasks can be dispatched to secure nodes and takes advantage of the time chips to avoid the waste of the resources; finally, the paper implements the scheduling strategy by greedy algorithm and does simulation experiments under different environment with different algorithms on the experimental indexes, and the results indicate the proposed algorithm could achieve the success rate, resource utilization rate and fairness as well as decrease the scheduling length.
Keywords/Search Tags:Cloud computing, Cloud security, Resource availability, Task scheduling
PDF Full Text Request
Related items