Load Balancing with Priority Algorithm for Job Replications in Secure Computing Environments
Autor: | Dlaim Alqahtani |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2022 |
Předmět: | |
ISSN: | 2348-1196 |
DOI: | 10.5281/zenodo.7056968 |
Popis: | Distributed systems in a grid are heterogeneous resources that can be assigned to do major computing tasks using job-scheduling algorithms. Researchers have proposed job-scheduling algorithms in order to improve grid computing from different aspects such as performance, reliability, scalability, fault-tolerance, security and others. In this project, we focus on the limitations of fuzzy-logic based self-adaptive job replication scheduling (FSARS). It is appropriate for fault-tolerant and secure grid job scheduling. Moreover, it addressed the issue of fixed-number job replication scheduling and enhanced it under dynamic security conditions. FSARS can be improved in terms of performance and grid utilization by minimizing average waiting time of jobs and their average response time. Therefore, we propose a new algorithm called load balancing with priority (LBP). This algorithm is implemented for job scheduling in secure grid environment such that it gets the optimal performance compared to FSARS. LBP algorithm has two main characteristics. First, it uses load balancing between hosts that compute jobs and satisfy security conditions. Consequently, this increases grid utilization of its resources and decreases waiting time for jobs. Second, it sorts hosts based on their processing speed and their expected time to compute jobs. As a result, jobs are assigned to hosts with minimum computation time such that host does not exceed average utilization. This algorithm is implemented using MATLAB such that experimental results show improvements in terms of computing performance for job replication scheduling in secure grid environment. Keywords: grid secuirty; job scheduling; grid computing; grid performance; load balancing; grid utilization. Title: Load Balancing with Priority Algorithm for Job Replications in Secure Computing Environments Author: Dlaim Alqahtani International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Vol. 10, Issue 3, July 2022 - September 2022 Page No: 50-61 Research Publish Journals Website: www.researchpublish.com Published Date: 07-September-2022 DOI: https://doi.org/10.5281/zenodo.7056968 Paper Download Link (Source) https://www.researchpublish.com/papers/load-balancing-with-priority-algorithm-for-job-replications-in-secure-computing-environments International Journal of Computer Science and Information Technology Research, ISSN 2348-1196 (print), ISSN 2348-120X (online), Research Publish Journals, Website: www.researchpublish.com {"references":["[1]\tT. Xie, and X. Qin, \"SAHA: A scheduling algorithm for security-sensitive jobs on data grids,\" CCGrid, pp. 22, 2006.","[2]\tW. Cheng, J. Congfeng, L. Xiaohu, \"Fuzzy logic-based secure and fault tolerant job scheduling in grid,\" Journal of TSINGHUA Science and Technology, Vol. 12, No. S1, pp. 45-50, July 2007.","[3]\tK. Lu, A.Y. Zomaya, \"A hybrid policy for job scheduling and load balancing in heterogeneous computational grids,\" ISPDC, pp. 121-128, 2007.","[4]\tJ. Ma, \"A novel heuristic genetic load balancing algorithm in grid computing,\" IHMSC, pp. 166-169, 2010.","[5]\tH. Zhu, Y. Wang, Z. Ma, H. Li, \"Grid dependent tasks security scheduling model and DPSO algorithm,\" Journal of Networks, Vol. 6, No. 6, pp. 850-857, June 2011.","[6]\tO. Linda, M. Manic, T. Vollmer, \"Improving cyber-security of smart grid systems via anomaly detection and linguistic domain knowledge,\" ISRCS, pp. 48-54, August 2012.","[7]\tH. Casanova, A. Legrand, D. Zagorodnov, and F. Berman, \"Heuristics for scheduling parameter sweep applications in grid environments,\" HCW, pp. 349-363, May 2000.","[8]\tS. Song, K. Hwang, Y.K. Kwok, \"Trusted grid computing with security binding and trust integration,\" Journal of Grid Computing, Vol. 3, pp. 53-73, June 2005.","[9]\tI. Foster, C. Kesselman, G. Tsudik, S. Tuecke, \"A security architecture for computational grids,\" 5th ACM conference on computer and communications security, pp. 83-92, 1998.","[10]\tR. Fotohi, M. Effatparvar, \"A cluster based job scheduing algorithm for grid computing,\" IJITCS, pp. 70-77, November 2013.","[11]\tT.V. Ryutov, B.C. Neuman, \"The specification and enforcement of advanced security policies,\" Conference on Policies for Distributed Systems and Networks, pp. 128-138, June 2002.","[12]\tT.D. Braun, D. Hensgen, R. Freund, \"A comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems,\" Journal of Parallel and Distributed Computing, Vol. 61, pp. 810-837, June 2001.","[13]\tA. Dogana, F. Ozguner, \"Scheduling of a meta-task with QoS requirements in heterogeneous computing systems,\" Journal of Parallel and Distributed Computing, Vol. 66, pp. 181-196, February 2006.","[14]\tS. Hwang, C. Kesselman, \"A flexible framework for fault tolerance in the grid,\" Journal of Grid Computing, Vol. 1, No. 3, pp. 251–272, 2003.","[15]\tS. Song, K. Hwang, Y. Kwok, \"Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling,\" IEEE Transactions on Computers, Vol. 55, No. 6, pp. 703-719, 2006.","[16]\tJ.H. Abawajy, \"Fault-tolerant scheduling policy for grid computing systems,\" IPDPS, April 2004."]} |
Databáze: | OpenAIRE |
Externí odkaz: |