Szczegóły publikacji
Opis bibliograficzny
Security-aware job allocation in mobile cloud computing / Piotr NAWROCKI, Jakub Pajor, Bartłomiej ŚNIEŻYŃSKI, Joanna Kołodziej // W: CCGrid 2021 [Dokument elektroniczny] : 21st IEEE/ACM international symposium on Cluster, Cloud and Internet Computing : 10-13 May 2021, Melbourne, Australia : proceedings / eds. Laurent Lefevre, [et al.]. — Wersja do Windows. — Dane tekstowe. — Piscataway: IEEE, cop. 2021. — Dod. ISBN: 978-1-7281-9587-2. — e-ISBN: 978-1-7281-9586-5. — S. 713-719. — Wymagania systemowe: Adobe Reader. — Bibliogr. s. 719, Abstr. — Publikacja dostępna online od: 2021-08-02
Autorzy (4)
- AGHNawrocki Piotr
- AGHPajor Jakub
- AGHŚnieżyński Bartłomiej
- Kołodziej Joanna
Słowa kluczowe
Dane bibliometryczne
ID BaDAP | 135559 |
---|---|
Data dodania do BaDAP | 2021-09-06 |
Tekst źródłowy | URL |
DOI | 10.1109/CCGrid51090.2021.00086 |
Rok publikacji | 2021 |
Typ publikacji | materiały konferencyjne (aut.) |
Otwarty dostęp | |
Wydawca | Institute of Electrical and Electronics Engineers (IEEE) |
Konferencja | 2021 IEEE/ACM 21st international symposium on Cluster, Cloud and Internet Computing |
Abstract
The ultimate goal of Mobile Cloud Computing is to allow users of mobile devices to execute their applications and complex numerical tasks on a broad range of cloud services and resources. One of the most challenging problems in the flow of mobile tasks related to remote cloud services is the security of all aspects of communication, service security and the reliability of cloud resources. In this paper, we developed a new security-aware job flow model for mobile computational clouds. In our model, we defined dedicated algorithm models such as the Filtration Algorithm and Prediction Module to generate an optimal secure system architecture for task and data processing and to ensure optimal cloud resource and service utilization. The robust performance of our model has been demonstrated by experimental analysis. Results of the experiments performed show that our flow model significantly enhances the security level of computations compared to a configuration in which computation time is the major criterion for job processing optimization.