Szczegóły publikacji
Opis bibliograficzny
Modeling adaptive security-aware task allocation in Mobile Cloud Computing / Piotr NAWROCKI, Jakub Pajor, Bartłomiej ŚNIEŻYŃSKI, Joanna Kołodziej // Simulation Modelling Practice and Theory : International Journal of the Federation of European Simulation Societies ; ISSN 1569-190X. — 2022 — vol. 116 art. no. 102491, s. 1–13. — Bibliogr. s. 12–13, Abstr. — Publikacja dostępna online od: 2022-01-19
Autorzy (4)
- AGHNawrocki Piotr
- AGHPajor Jakub
- AGHŚnieżyński Bartłomiej
- Kołodziej Joanna
Słowa kluczowe
Dane bibliometryczne
ID BaDAP | 138915 |
---|---|
Data dodania do BaDAP | 2022-01-25 |
Tekst źródłowy | URL |
DOI | 10.1016/j.simpat.2022.102491 |
Rok publikacji | 2022 |
Typ publikacji | artykuł w czasopiśmie |
Otwarty dostęp | |
Czasopismo/seria | Simulation Modelling Practice and Theory |
Abstract
Security is one of the most important criteria in the management of cloud resources. In Mobile Cloud Computing (MCC), secure allocation of tasks remains challenging due to the limited storage, battery life and computational power of mobile devices connected to the core cloud cluster infrastructure. Secure wireless communication channels and protocols for protecting the data and information sent to the cloud, and remote access to secure cloud services, are other important problems related to task scheduling and processing in dynamic MCC. In this paper, we developed a new security-aware task allocation model strategy in Mobile Cloud Computing. In this model, we define an allocation algorithm which generates an optimal and secure configuration of communication protocols in order to meet the specific data confidentiality requirements defined by end users. Resource utilization is predicted using Machine Learning methods, and the optimal secure service for task execution is selected. We developed a simulation environment (MocSecSim) for the evaluation of the algorithms proposed in several scenarios based on the users’ requirements. The results of simulations and experiments have demonstrated that the model proposed significantly improves the level of security of calculations in comparison with a configuration where processing time and energy consumption are the main criteria for optimizing task allocation.