We use cookies to ensure that we give you the best experience on our website. By continuing to browse this repository, you give consent for essential cookies to be used. You can read more about our Privacy and Cookie Policy.

Durham e-Theses
You are in:

Scheduling Security Model for a
Cloud Environment

SHEIKH, ABDULLAH,ADNAN (2020) Scheduling Security Model for a
Cloud Environment.
Doctoral thesis, Durham University.

PDF (Abdullah_Sheikh_Thesis) - Accepted Version


Context: Scheduling in the cloud is a complex task due to the number and variety of resources available and the volatility of usage-patterns of resources considering that the resource setting is on the service provider. This is compounded further when security issues and Quality of Service (QoS) are also factored in.

Aim: The aim of this research is to address limitations and gaps in current approaches of resource scheduling in cloud computing by developing a Scheduling Security Model (SSM).

Method: Considering security as a key element that cloud services rely on which affects the services performance, cost and time concerns within the security constraints of the cloud service. Furthermore, this research will investigate and define the considerable challenges facing trusted and cost-effective resource scheduling in cloud computing environments. The SSM analyses the customer requirements for a service then works to schedule all tasks submitted to run over available resources depending on the security level. It then uses the SSM Algorithm and the Fast-Track technique to reduce the cost and the overall waiting time.

Results: The worked examples of the SSM with different scenarios and comparing the SSM against other approaches in the same field show that the SSM can meet the customer requirements for cost effective and the QoS required.

Conclusions: The advantages from the results show that the SSM can reduce the overall service cost compared to other approaches.

Item Type:Thesis (Doctoral)
Award:Doctor of Philosophy
Keywords:Cloud Computing, Cloud Security, Scheduling, Model, Cost
Faculty and Department:Faculty of Science > Computer Science, Department of
Thesis Date:2020
Copyright:Copyright of this thesis is held by the author
Deposited On:27 May 2020 10:51

Social bookmarking: del.icio.usConnoteaBibSonomyCiteULikeFacebookTwitter