Task scheduling in cloud computing based on meta-heuristics: review, taxonomy, open challenges, and future trends
Cloud computing is a recently looming-evoked paradigm, the aim of which is to provide on-
demand, pay-as-you-go, internet-based access to shared computing resources (hardware …
demand, pay-as-you-go, internet-based access to shared computing resources (hardware …
A comprehensive survey for scheduling techniques in cloud computing
Resource scheduling becomes the prominent issue in cloud computing due to rapid growth
of on demand request and heterogeneous nature of cloud resources. Cloud provides …
of on demand request and heterogeneous nature of cloud resources. Cloud provides …
Secure gene profile data processing using lightweight cryptography and blockchain
H Mahajan, KTV Reddy - Cluster computing, 2024 - Springer
Human microarray gene profile analysis has become popular for early cancer detection.
Due to security risks, Healthcare 4.0 standards make processing patient gene data difficult …
Due to security risks, Healthcare 4.0 standards make processing patient gene data difficult …
RSM analysis based cloud access security broker: a systematic literature review
Abstract A Cloud Access Security Broker (CASB) is a security enforcement point or cloud-
based software that is placed between cloud service users and cloud applications of cloud …
based software that is placed between cloud service users and cloud applications of cloud …
MCDM and various prioritization methods in AHP for CSS: A comprehensive review
Availability and diversity of cloud service providers (CSPs) had put the users into confusion
for its selection of the appropriate service providers. Some cloud service providers are good …
for its selection of the appropriate service providers. Some cloud service providers are good …
[PDF][PDF] Secured web application based on CapsuleNet and OWASP in the cloud
R Vallabhaneni, S Pillai, SA Vaddadi… - Indonesian Journal of …, 2024 - researchgate.net
The tremendous use of sensitive and consequential information in the advanced web
application confronts the security issues. To defend the web application while it processing …
application confronts the security issues. To defend the web application while it processing …
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud
C Li, Q Cai, Y Lou - Future Generation Computer Systems, 2022 - Elsevier
At present, the amount of data from users is increasing exponentially, and most of the data is
stored in data centers distributed in different geographic locations. The cost of transferring …
stored in data centers distributed in different geographic locations. The cost of transferring …
A machine-learning-based auction for resource trading in fog computing
Fog computing is considered to be a key enabling technology for future networks. By
broadening the cloud computing services to the network edge, fog computing can support …
broadening the cloud computing services to the network edge, fog computing can support …
Fault-tolerant scheduling and data placement for scientific workflow processing in geo-distributed clouds
C Li, J Liu, M Wang, Y Luo - Journal of Systems and Software, 2022 - Elsevier
Scientific workflow processing in geo-distributed cloud is crucial for the scheduling of large-
scale tasks and the massive data placement among tasks. However, the task execution time …
scale tasks and the massive data placement among tasks. However, the task execution time …
A survey of profit optimization techniques for cloud providers
As the demand for computing resources grows, cloud computing becomes more and more
popular as a pay-as-you-go model, in which the computing resources and services are …
popular as a pay-as-you-go model, in which the computing resources and services are …