- 无标题文档
查看论文信息

论文中文题名:

 基于区块链机制的云计算安全高效调度算法研究    

姓名:

 Muhammad Usman Sana    

学号:

 18508049006    

保密级别:

 公开    

论文语种:

 eng    

学科代码:

 083700    

学科名称:

 工学 - 安全科学与工程    

学生类型:

 博士    

学位级别:

 工学博士    

学位年度:

 2022    

培养单位:

 西安科技大学    

院系:

 安全科学与工程学院    

专业:

 安全科学与工程    

研究方向:

 云计算    

第一导师姓名:

 李占利    

第一导师单位:

 西安科技大学    

第二导师姓名:

 于振华    

论文提交日期:

 2023-01-12    

论文答辩日期:

 2022-12-08    

论文外文题名:

 Secure and efficient scheduling in cloud computing based on blockchain mechanism    

论文中文关键词:

 云计算 ; 区块链 ; 粒子群优化算法 ; 全同态加密 ; 神经网络 ; 信息安全    

论文外文关键词:

 Cloud computing ; Blockchain ; Particle Swarm Optimization ; Fully homomorphic encryption ; Neural network ; Information security    

论文中文摘要:

云计算能够根据需求高效地提供计算服务。近年来,随着云计算的快速发展,数据规模急剧增长,在现有的计算标准中,云计算具有适应性设置、易于访问和以网络为中心的特点,这使得保护数据的隐私和安全性以及验证合规性变得困难。在将数据存储到不可信的云服务器之前,必须执行一系列的步骤来保证数据的安全性。在云的体系结构中,通过使用可访问的资源来分配任务,任务以这样的方式被调度到虚拟机中,以尽可能地减少执行时间。任务调度是一个NP-hard问题,其中定位资源的时间取决于问题的规模。该论文围绕在云计算中如何高效而安全的进行任务调度,引入了区块链机制对其进行研究,旨在利用区块链的优势来实现云环境中的效率和安全性。主要做了三个方面的工作:

⑴ 针对引入区块链机制时新区块产生时间长及效率低的问题,提出一种将文件块数据保存在相邻的哈希节点中的方法,从而得到最优区块大小,有效减少在区块链安排中产生新区块的时间,同时可提高交易安全等级。区块形成时间的中断和延迟被视作一个独立的原则进行测量,重点关注交易发生的时间以及交易之间安全的维护。为了解决的尺寸和传输时间的矛盾,文件块数据被保存在相邻的哈希节点中,调节两个目标任务,以获得一个最优的块大小,同时最小化时间。实验结果表明,在交易时间较少的情况下,交易的安全等级得到了提高。

⑵ 针对传统的粒子群算法易陷入局部最优的问题,提出一种基于改进粒子群优化算法(IPSO)和区块链的新型区块形成方法。将区块链的事务性原理引入传统的粒子群优化算法,从而使得改进后的粒子群优化算法在执行任务调度问题时,不但可以较快得到最优解,而且能保证安全的交易。首先,有效地遍历解的空间,当种群数量和迭代次数越高,IPSO达到最优解的可能性越高。其次,提出了一种基于区块链技术的新型区块形成技术,该技术将交易序列信息和并行机信息结合在一个交易节点上,并与所有交易节点相关联,形成交易列表。该方案进一步进行局部搜索。接着,通过一些有限制的迭代得到一个最优解。利用区块链的事务性原理,在调度中降低了makespan值和不平衡度,实现了机器之间的安全交易。最后,作者将该方法应用于作业车间任务调度的实际场景。仿真实验结果表明,所提出的算法可提高调度效率,实现安全交易,在调度中的作业车间问题的管理中是安全和有效的。

⑶ 针对云计算任务调度时出现的数据安全问题,提出一种基于区块链和神经网络的同态加密方法,使得数据驱动的加密成为可能,从而在保证安全性的同时,提高准确性和时间效率。该方法将全同态加密( FHE )、区块链和深度学习神经网络技术结合,并引入密码体制来保证数据安全交易。任务在每个云节点上传输之前,先应用了一种基于矩阵的同态加密算法- MORE对数据进行加密,并将其放入深度学习人工神经网络( ANN )模型中,这使得加密和解密可以直接在浮点数据上的神经网络中执行,从而有效地保持数据的隐私性和权威性。此外,区块链的使用提供了去中心化的身份验证,提高了数据精度,有助于增加操作功能。实验结果表明,本文提出的模型在准确率、运行时间和性能上都得到了提升,与之前的全同态技术相比,本文的方案更加有效。

论文外文摘要:

With the rapid development of Cloud Computing, computational services are efficiently provided over the internet by Cloud Computing on demand. In Cloud Computing, people can distribute tasks by using accessible resources. Task scheduling is an NP-hard problem in which the time it takes to position the resources depends on the size of the problem. Cloud Computing is commonly characterized by the adaptable set-up, easy access, and net-centric technology, which makes it difficult to keep the privacy and security of data and validate compliance. A number of procedures must be implemented to assure the security of data before it is stored in an untrusted server of the cloud. Blockchain emerges as a promising technique for attaining clusters of cloud, providing data security, easy access, and storage.

       Therefore, we introduced the blockchain mechanism, to ensure safe and efficient task scheduling in cloud computing. First, we consider the formation of optimal blocks in task scheduling; second, since Particle Swarm Optimization (PSO) is a trusted algorithm utilized in existing operations, to schedule tasks using available resources in a cloud environment, we consider combining particle swarm optimization (PSO) and blockchain, an Improved Particle Swarm Optimization (IPSO) is proposed to improve scheduling efficiency and provide secure transactions; finally, we propose a blockchain and neural network-based homomorphic encryption method for cloud data security in task scheduling. The details are as follows:

       (1) With the introduction of a blockchain mechanism in order to reduce the time to generate a new block improving efficiency. We studied how to generate the optimal size of the block, for this reason, interruptions and delays in block formation time are measured as an independent principle, while focusing on the time of transactions and maintenance of security between the transactions. To solve this problem, the file block data is kept in adjacent hash nodes, and adjusting the two objective tasks to obtain an optimal block size while minimizing time. The results show that the security level of the transaction is improved when the transaction time is less.

        (2) The transactional principle of blockchain is introduced into the traditional particle swarm optimization algorithm PSO so that the improved particle swarm optimization algorithm (IPSO) can not only obtain the optimal solution quickly but also ensure safe transactions when performing task scheduling problems. First, in order to obtain the optimal solution by changing the dominant operation, the IPSO algorithm effectively traverses the space of the solution. The higher the population size and the number of iterations, the higher the possibility for the IPSO to achieve an optimal solution. The optimum solution remains unaffected to a specific level once the number of population and the number of iterations reaches that level.  Second, in blockchain, each block is revealed by a small sequence of random numbers formed by hash and is associated with a list of records. A novel block formation technique based on blockchain technology is proposed, by which transaction sequence information and parallel machine information are combined in a transaction node and associated with all transaction nodes to create a transaction list. This scheme makes further local searching. Afterward, it constantly explores the optimum solutions by carefully altering the selected machines of the leading transactions. Finally, an optimum solution is attained by means of some restricted iterations. Utilizing the transactional principle of blockchain, makespan value and degree of imbalance are reduced and secure transactions between machines are achieved in scheduling. To verify the execution performance of our improved algorithm IPSO, we apply the method to the job shop problem by implementing IPSO with a blockchain approach to provide efficient and secure job transactions for a set of operations. The performance of IPSO is assessed with reference to the makespan, execution time, improvement ratio, degree of imbalance, and security. Results of experiments specify that the proposed algorithm transcends the state-of-the-art task scheduling algorithms and is secure and efficient in the management of job shop problems in scheduling.

       (3) To solve the data security problems that arise during cloud computing task scheduling, we introduce a cryptographic system to ensure secure transactions of data. The efficacy of fully homomorphic encryption has constantly reflected its expediency. The efficacy of fully homomorphic encryption has always reflected its expediency. Nowadays, blockchain outsourcing can offer great applicability. Aiming at security issues, a combination of Fully Homomorphic Encryption (FHE), blockchain, and deep learning neural network technology is proposed. To form a secure and trusted data transmission mechanism, blockchain is used between different cloud nodes. To encrypt the data before being transmitted on each cloud node, a matrix-based homomorphic encryption algorithm—MORE is applied which allows the encryption and decryption to be executed directly within a neural network on floating-point data and put into the deep learning Artificial Neural Network (ANN) model, hence we efficiently keep the privacy and authority of data. Furthermore, the use of blockchain offers decentralized authentication which increases data precision and helps to increase operational functions. In a decentralized mode, blockchain with fully homomorphic encryption can help to secure important information without disclosing the data of the provider party, and allow the third parties to use the information in an encrypted form. The experimental results present that improved accuracy, runtime, and performance are attained with this proposed model. The proposed scheme is safe and more effective compared with the previous fully homomorphic techniques.

参考文献:

[1] Sunyaev, A. Cloud computing [J]. In Internet computing. Springer, 2020, 195-236.

[2] Kaur, A., et al. Cloud computing challenges: a survey [J]. Int. J. Comput. Sci. Eng. Technol. (IJCSET), 2015.

[3] Kaur, A. Scheduling Optimization in Cloud Computing: Review and Issues [C]// 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) IEEE, 2021.

[4] Jia, R., et al. A systematic review of scheduling approaches on multi-tenancy cloud platforms [J]. Information and Software Technology, 2021, 132: 106478.

[5] Sheikh, A., M. Munro, and D. Budgen. Systematic Literature Review (SLR) of resource scheduling and security in cloud computing [J]. International journal of advanced computer science and applications, 2019, 10(4).

[6] Khallouli, W. and J. Huang. Cluster resource scheduling in cloud computing: literature review and research challenges [J]. The Journal of Supercomputing, 2021, 1-46.

[7] Berdik, D., et al. A survey on blockchain for information systems management and security [J]. Information Processing & Management, 2021, 58(1): 102397.

[8] Marzouki, B., O.B. Driss, and K. Ghédira. Multi agent model based on chemical reaction optimization with greedy algorithm for flexible job shop scheduling problem [J]. Procedia Computer Science, 2017, 112: 81-90.

[9] Gao, K.Z., et al. A two-stage artificial bee colony algorithm scheduling flexible job-shop scheduling problem with new job insertion [J]. Expert systems with applications, 2015, 42(21): 7652-7663.

[10] Libralesso, L., et al. Study on partial flexible job-shop scheduling problem under tooling constraints: complexity and related problems [J]. 2019.

[11] Zhang, J., J. Yang, and Y. Zhou. Robust scheduling for multi-objective flexible job-shop problems with flexible workdays [J]. Engineering Optimization, 2016, 48(11): 1973-1989.

[12] Yao, L., et al. An improved UKPK-PSO algorithm inspired from block chain technology for flexible job shop scheduling problem [C]//2019 Chinese Control Conference (CCC) IEEE, 2019.

[13] Bolt, W. Bitcoin and cryptocurrency technologies: A comprehensive introduction [M]. 2017, JSTOR.

[14] Shakir, M., M. Hammood, and A.K. Muttar. Literature review of security issues in saas for public cloud computing: a meta-analysis [J]. International Journal of Engineering & Technology, 2018, 7(3): 1161-1171.

[15] Srivastava, P. and R. Khan, A review paper on cloud computing [J]. International Journal of Advanced Research in Computer Science and Software Engineering, 2018, 8(6): 17-20.

[16] Buyya, R. and J. Son. Software-defined multi-cloud computing: a vision, architectural elements, and future directions [C]//International Conference on Computational Science and Its Applications. Springer, 2018.

[17] Subramanian, N. and A. Jeyaraj. Recent security challenges in cloud computing [J]. Computers & Electrical Engineering, 2018, 71: 28-42.

[18] Lubomski, P., A. Kalinowski, and H. Krawczyk. Multi-level virtualization and its impact on system performance in cloud computing [C]//International Conference on Computer Networks. Springer, 2016.

[19] Wu, L., S.K. Garg, and R. Buyya. Service level agreement (SLA) based SaaS cloud management system [C]//2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS) IEEE, 2015.

[20] Latif, S., et al. Distributed meta-brokering P2P overlay for scheduling in cloud federation [J]. Electronics, 2019, 8(8): 852.

[21] Rashid, Z.N., et al. Distributed cloud computing and distributed parallel computing: A review [C]//2018 International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2018.

[22] Indu, I., P.R. Anand, and V. Bhaskar, Identity and access management in cloud environment: Mechanisms and challenges [J]. Engineering science and technology, an international journal, 2018, 21(4): 574-588.

[23] Lis, A., et al. Cloud computing and energy efficiency: mapping the thematic structure of research [J]. Energies, 2020, 13(16): 4117.

[24] Nowrin, I. and F. Khanam. Importance of Cloud Deployment Model and Security Issues of Software as a Service (SaaS) for Cloud Computing [C]//2019 International Conference on Applied Machine Learning (ICAML) IEEE, 2019.

[25] Rittinghouse, J.W. and J.F. Ransome. Cloud computing: implementation, management, and security [M], 2017, CRC press.

[26] Foster, I., et al. Cloud computing and grid computing 360-degree compared [C]//2008 grid computing environments workshop IEEE, 2008.

[27] Wang, W.-J., et al. Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments [J]. The Journal of Supercomputing, 2013, 66(2): 783-811.

[28] Dave, Y.P., et al. Various job scheduling algorithms in cloud computing: A survey [C]// International Conference on Information Communication and Embedded Systems (ICICES2014). IEEE, 2014.

[29] Sun, H., et al., Research and simulation of task scheduling algorithm in cloud computing [J]. TELKOMNIKA Indonesian Journal of Electrical Engineering, 2013, 11(11): 6664-6672.

[30] Alboaneen, D.A., H. Tianfield, and Y. Zhang. Glowworm swarm optimisation based task scheduling for cloud computing [C]//Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, 2017.

[31] Tiwari, D. and D. Tiwari. An efficient hybrid SJF and priority based scheduling of jobs in cloud computing [J]. Int. J. Mod. Eng. Manag. Res, 2014, 2(4): 26.

[32] Patel, S. and U. Bhoi, Priority based job scheduling techniques in cloud computing: a systematic review [J]. International journal of scientific & technology research, 2013, 2(11): 147-152.

[33] Khurana, S. and R.K. Singh. Survey of Scheduling and Meta Scheduling Heuristics in Cloud Environment [J]. In Computational Methods and Data Engineering, 2021, Springer. 363-374.

[34] Yiqiu, F., X. Xia, and G. Junwei. Cloud computing task scheduling algorithm based on improved genetic algorithm [C]//2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019.

[35] Abdullahi, M. and M.A. Ngadi. Symbiotic organism search optimization based task scheduling in cloud computing environment [J]. Future Generation Computer Systems, 2016, 56: 640-650.

[36] Hussain, A., et al. RALBA: a computation-aware load balancing scheduler for cloud computing [J]. Cluster Computing, 2018, 21(3): 1667-1680.

[37] Abdullahi, M. and M.A. Ngadi. Correction: hybrid symbiotic organisms search optimization algorithm for scheduling of tasks on cloud computing environment [J]. Plos one, 2016. 11(8): e0162054.

[38] Xing, Y. and Y. Zhan, Virtualization and cloud computing [J]. In future wireless networks and information systems, 2012, Springer. 305-312.

[39] Hussain, A., et al., SLA-RALBA: Cost-efficient and resource-aware load balancing algorithm for cloud computing [J]. The Journal of Supercomputing, 2019, 75(10): 6777-6803.

[40] Zhou, Z., et al. An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments [J]. Neural Computing and Applications, 2020, 32(6): 1531-1541.

[41] Sreenu, K. and M. Sreelatha. W-Scheduler: whale optimization for task scheduling in cloud computing [J]. Cluster Computing, 2019, 22(1): 1087-1098.

[42] Kalra, M. and S. Singh. A review of metaheuristic scheduling techniques in cloud computing [J]. Egyptian informatics journal, 2015, 16(3): 275-295.

[43] Ebadifard, F. and S.M. Babamir. A PSO‐based task scheduling algorithm improved using a load‐balancing technique for the cloud computing environment [J]. Concurrency and Computation: Practice and Experience, 2018, 30(12): e4368.

[44] Deepa, T. and D. Cheelu. A comparative study of static and dynamic load balancing algorithms in cloud computing [C]//2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017.

[45] Gulbaz, R., et al. Balancer Genetic Algorithm—A Novel Task Scheduling Optimization Approach in Cloud Computing [J]. Applied Sciences, 2021, 11(14): 6244.

[46] Mansouri, N., B.M.H. Zade, and M.M. Javidi. Hybrid task scheduling strategy for cloud computing by modified particle swarm optimization and fuzzy theory [J]. Computers & Industrial Engineering, 2019, 130: 597-633.

[47] Kokilavani, T. and D.G. Amalarethinam. Load balanced min-min algorithm for static meta-task scheduling in grid computing [C]//International Journal of Computer Applications, 2011, 20(2): 43-49.

[48] Prem Jacob, T. and K. Pradeep, A multi-objective optimal task scheduling in cloud environment using cuckoo particle swarm optimization [J]. Wireless Personal Communications, 2019, 109(1): 315-331.

[49] Al-Maamari, A. and F.A. Omara. Task scheduling using PSO algorithm in cloud computing environments [J]. International Journal of Grid and Distributed Computing, 2015, 8(5): 245-256.

[50] Subashini, S. and V. Kavitha. A survey on security issues in service delivery models of cloud computing [J]. Journal of network and computer applications, 2011, 34(1): 1-11.

[51] Waseem, M., A. Lakhan, and I.A. Jamali. Data security of mobile cloud computing on cloud server [J]. Open Access Library Journal, 2016, 3(4): 1-11.

[52] Jain, M., et al. An overview of variants and advancements of PSO Algorithm [J]. Applied Sciences, 2022, 12(17): 8392.

[53] Wilczyński, A. and A. Widłak. Blockchain networks–Security aspects and consensus models [J]. Journal of Telecommunications and Information Technology, 2019.

[54] Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system [J]. Decentralized Business Review, 2008, 21260.

[55] Zheng, Z., et al. An overview of blockchain technology: Architecture, consensus, and future trends [C]//2017 IEEE international congress on big data (Big Data congress). IEEE, 2017.

[56] Tasca, P. and C.J. Tessone. Taxonomy of blockchain technologies: Principles of identification and classification [J] arXiv: 1708.04872v2, 2018, 31.

[57] Lin, I.-C. and T.-C. Liao. A survey of blockchain security issues and challenges [J]. Int. J. Netw. Secur., 2017, 19(5): 653-659.

[58] Vujičić, D., D. Jagodić, and S. Ranđić. Blockchain technology, bitcoin, and Ethereum: A brief overview [C]//2018 17th international symposium infoteh-jahorina (infoteh). IEEE, 2018.

[59] Gunasekara, H.G., P. Sridarran, and D. Rajaratnam. Effective use of blockchain technology for facilities management procurement process [J]. Journal of Facilities Management, 2021.

[60] Rauchs, M. and G. Hileman. Global cryptocurrency benchmarking study [R]. Cambridge Centre for Alternative Finance Reports, 2017.

[61] Wu, K. An empirical study of blockchain-based decentralized applications [J]. arXiv preprint arXiv:1902.04969, 2019.

[62] Ding, C.H., S. Nutanong, and R. Buyya. P2P Networks for Content Sharing [J]. arXiv preprint cs/0402018, 2004.

[63] Rivest, R.L., A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21(2): 120-126.

[64] Minelli, M. Fully homomorphic encryption for machine learning [M]. 2018, Université Paris sciences et lettres.

[65] Nassif, A.B., et al. Machine learning for cloud security: a systematic review [J]. IEEE Access, 2021, 9: 20717-20735.

[66] Deepika, J., C. Rajan, and T. Senthil. Security and privacy of cloud-and IoT-based medical image diagnosis using fuzzy convolutional neural network [J]. Computational Intelligence and Neuroscience, 2021.

[67] Vizitiu, A., et al. Applying deep neural networks over homomorphic encrypted medical data [J]. Computational and mathematical methods in medicine, 2020.

[68] Abdi, S., S.A. Motamedi, and S. Sharifian. Task scheduling using modified PSO algorithm in cloud computing environment [C]//International conference on machine learning, electrical and mechanical engineering, 2014.

[69] Sujana, J., et al. Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing [J]. Soft Computing, 2019, 23(5): 1745-1765.

[70] Kaur, S. and A. Verma. An efficient approach to genetic algorithm for task scheduling in cloud computing environment [J]. International Journal of Information Technology and Computer Science (IJITCS), 2012, 4(10): 74-79.

[71] Kumar, S., S. Mittal, and M. Singh. Metaheuristic based workflow scheduling in cloud environment. [C]//2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), IEEE, 2016.

[72] Shojafar, M., et al. FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method. Cluster Computing, 2015, 18(2): 829-844.

[73] Xu, M., et al. On cloud storage optimization of blockchain with a clustering-based genetic algorithm [J]. IEEE Internet of Things Journal, 2020, 7(9): 8547-8558.

[74] Wilczyński, A. and J. Kołodziej. Modelling and simulation of security-aware task scheduling in cloud computing based on Blockchain technology [J]. Simulation Modelling Practice and Theory, 2020, 99: 102038.

[75] Sana, M.U., et al. Improved particle swarm optimization based on blockchain mechanism for flexible job shop problem [J]. Cluster Computing, 2021, 1-19.

[76] Masdari, M., et al. A survey of PSO-based scheduling algorithms in cloud computing [J]. Journal of Network and Systems Management, 2017, 25(1): 122-158.

[77] Thanka, M.R., P.U. Maheswari, and E.B. Edwin. A hybrid algorithm for efficient task scheduling in cloud computing environment [J]. International Journal of Reasoning-based Intelligent Systems, 2019, 11(2): 134-140.

[78] Garg, D. and P. Kumar. A Survey on Metaheuristic approaches and its evaluation for load balancing in cloud computing [C]//International Conference on Advanced Informatics for Computing Research. Springer, 2018.

[79] Singh, P., M. Dutta, and N. Aggarwal. A review of task scheduling based on meta-heuristics approach in cloud computing [J]. Knowledge and Information Systems, 2017, 52(1): 1-51.

[80] Singh, S. and I. Chana Resource provisioning and scheduling in clouds: QoS perspective [J]. The Journal of Supercomputing, 2016, 72(3): 926-960.

[81] Damodar, T., S. Shailendra, and S. Sanjeev. Theoretical analysis of bio-inspired load balancing approach in cloud computing environment [J]. International Journal of Database Theory and Application, 2017, 10(11): 15-26.

[82] Kaur, S., et al. Quality of Service (QoS) aware workflow scheduling (WFS) in cloud computing: A systematic review [J]. Arabian Journal for Science and Engineering, 2019, 44(4): 2867-2897.

[83] Potluri, S. and K.S. Rao. Quality of service based task scheduling algorithms in cloud computing [J]. International Journal of Electrical and Computer Engineering, 2017, 7(2): 1088.

[84] Alkhanak, E.N., et al. Cost optimization approaches for scientific workflow scheduling in cloud and grid computing: A review, classifications, and open issues [J]. Journal of Systems and Software, 2016, 113: 1-26.

[85] Lawler, E.L., J.K. Lenstra, and A. Rinnooy Kan. Recent developments in deterministic sequencing and scheduling: a survey [J]. Deterministic and stochastic scheduling, 1982, Springer, 35-73.

[86] Hatchuel, A., D. Saidi-Kabeche, and J. Sardas. Towards a new planning and scheduling approach for multistage production systems [J]. International Journal of Production Research, 1997, 35(3): 867-886.

[87] Pinedo, M. and K. Hadavi. Scheduling: theory, algorithms and systems development [J], Operations research proceedings 1991, 1992, Springer, 35-42.

[88] Madni, S.H.H., et al. Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment [J]. PloS one, 2017, 12(5): e0176321.

[89] Brandwajn, A. and T. Begin. First-come-first-served queues with multiple servers and customer classes [J]. Performance Evaluation, 2019, 130: 51-63.

[90] Waheed, M., et al. Shortest job first load balancing algorithm for efficient resource management in cloud [C]//International Conference on Broadband and Wireless Computing, Communication and Applications. Springer, 2018.

[91] Samadi, Y., M. Zbakh, and C. Tadonki. E-HEFT: enhancement heterogeneous earliest finish time algorithm for task scheduling based on load balancing in cloud computing [C]//2018 International Conference on High Performance Computing & Simulation (HPCS) IEEE, 2018.

[92] Balharith, T. and F. Alhaidari. Round robin scheduling algorithm in CPU and cloud computing: a review [C]//2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019.

[93] Li, B., et al. Minimum Completion Time Offloading Algorithm for Mobile Edge Computing [C]//2018 IEEE 4th International Conference on Computer and Communications (ICCC). IEEE, 2018.

[94] Krishnaveni, H. and V. Sinthu Janita Prakash. Execution time based sufferage algorithm for static task scheduling in cloud [J], Advances in Big Data and Cloud Computing, 2019, Springer, 61-70.

[95] Sörensen, K. and F. Glover. Metaheuristics [J]. Encyclopedia of operations research and management science, 2013, 62: 960-970.

[96] Houssein, E.H., A.G. Gad, and Y.M. Wazery. Jaya algorithm and applications: A comprehensive review [J]. Metaheuristics and Optimization in Computer and Electrical Engineering, 2021, 3-24.

[97] Del Ser, J., et al. Bio-inspired computation: Where we stand and what's next [J]. Swarm and Evolutionary Computation, 2019, 48: 220-250.

[98] Beni, G. and J. Wang. Swarm intelligence in cellular robotic systems, in Robots and biological systems: towards a new bionics? [J]. Springer, 1993, 703-712.

[99] Muller, S.D., et al. Optimization based on bacterial chemotaxis [J]. IEEE transactions on Evolutionary Computation, 2002, 6(1): 16-29.

[100] Dorigo, M. Optimization, learning and natural algorithms [D]. Ph. D. Thesis, Politecnico di Milano, 1992.

[101] Eberhart, R. and J. Kennedy. A new optimizer using particle swarm theory [C]//MHS'95. Proceedings of the sixth international symposium on micro machine and human science. IEEE, 1995.

[102] Lucic, P. and D. Teodorovic. Transportation modeling: an artificial life approach [C]//14th IEEE International Conference on Tools with Artificial Intelligence. IEEE, 2002, (ICTAI 2002).

[103] Rjoub, G. and J. Bentahar. Cloud task scheduling based on swarm intelligence and machine learning [C]//2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2017.

[104] Pradhan, A., Bisoy, S.K. and Das, A. A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment [J]. Journal of King Saud University-Computer and Information Sciences, 2021.

[105] Tiwari, H. and M. RB. A Review of Particle Swarm Optimization in Cloud Computing [J]. Smart IoT for Research and Industry, 2022: 93-108.

[106] Cheikh, S. and J.J. Walker. Solving Task Scheduling Problem in the Cloud Using a Hybrid Particle Swarm Optimization Approach [J]. International Journal of Applied Metaheuristic Computing (IJAMC), 2022, 13(1): 1-25.

[107] Kumar, R. and J. Bhagwan. A Comparative Study of Meta-Heuristic-Based Task Scheduling in Cloud Computing [J]. Artificial Intelligence and Sustainable Computing. Springer, 2022, 129-141.

[108] Arora, N. and R.K. Banyal. Hybrid scheduling algorithms in cloud computing: a review [J]. International Journal of Electrical & Computer Engineering (2088-8708), 2022, 12(1).

[109] Mittal, A., A. Pattnaik, and A. Tomar. Different Variants of Particle Swarm Optimization Algorithms and Its Application: A Review [J]. Metaheuristic and Evolutionary Computation: Algorithms and Applications, 2021: 131-163.

[110] Dhawan, S., et al. Various Swarm Optimization Algorithms: Review, Challenges, and Opportunities [J]. Soft Computing for Intelligent Systems, 2021: 291-301.

[111] Ranjan, A., et al. A Review of PSO-Based Task and Workflow Scheduling Analysis in Cloud Environment [J]. Available at SSRN 3842717, 2021.

[112] Kumpati, V.R. and M. Pandey. A review on efficient scheduling techniques for cloud computing [J]. Data Intelligence and Cognitive Informatics. Springer. 2021, 111-120.

[113] Zhang, M., et al. An improved genetic-based approach to task scheduling in inter-cloud environment [C]//2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015.

[114] Samaniego, M., U. Jamsrandorj, and R. Deters. Blockchain as a Service for IoT [C]//2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), IEEE, 2016.

[115] Gai, K., K.-K.R. Choo, and L. Zhu. Blockchain-enabled reengineering of cloud datacenters [J]. IEEE Cloud Computing, 2018, 5(6): 21-25.

[116] Viriyasitavat, W., et al. New blockchain-based architecture for service interoperations in internet of things [J]. IEEE Transactions on Computational Social Systems, 2019, 6(4): 739-748.

[117] Song, D.X., D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data [C]//Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 2000, IEEE.

[118] Boneh, D., et al. Public key encryption with keyword search [C]//International conference on the theory and applications of cryptographic technique. Springer, 2004.

[119] Golle, P., J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data [C]//International conference on applied cryptography and network security, Springer, 2004.

[120] Li, J., et al. Fuzzy keyword search over encrypted data in cloud computing [C]//2010 Proceedings IEEE INFOCOM, IEEE, 2010.

[121] Poh, G.S., et al. Searchable symmetric encryption: designs and challenges [J]. ACM Computing Surveys (CSUR), 2017, 50(3): 1-37.

[122] Chen, X., et al. New publicly verifiable databases with efficient updates [J]. IEEE Transactions on Dependable and Secure Computing, 2014, 12(5): 546-556.

[123] Fu, Z., et al. Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data [J]. IEEE Transactions on Consumer Electronics, 2014, 60(4): 762-770.

[124] Cheng, R., et al. Verifiable searchable symmetric encryption from indistinguishability obfuscation [C]//Proceedings of the 10th ACM symposium on information, computer and communications security, 2015.

[125] Chen, L., et al. Blockchain based searchable encryption for electronic health record sharing [J]. Future generation computer systems, 2019, 95: 420-429.

[126] Zhang, Y., et al. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage [J]. IEEE Transactions on Cloud Computing, 2019.

[127] Niu, J., et al. Blockchain-based anti-key-leakage key aggregation searchable encryption for IoT [J]. IEEE Internet of Things Journal, 2019, 7(2): 1502-1518.

[128] Jiang, P., et al. Searchain: Blockchain-based private keyword search in decentralized storage [J]. Future Generation Computer Systems, 2020, 107: 781-792.

[129] Zhang, Y., et al. TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain [J]. IEEE Access, 2018, 6: 31077-31087.

[130] Choudhuri, A.R., et al. Fairness in an unfair world: Fair multiparty computation from public bulletin boards [C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017.

[131] Shin, Y., D. Koo, and J. Hur. A survey of secure data deduplication schemes for cloud storage systems [J]. ACM computing surveys (CSUR), 2017, 49(4): 1-38.

[132] Douceur, J.R., et al. Reclaiming space from duplicate files in a serverless distributed file system [C]//Proceedings 22nd international conference on distributed computing systems, IEEE, 2002.

[133] Bellare, M., S. Keelveedhi, and T. Ristenpart. Message-locked encryption and secure deduplication [C]//Annual international conference on the theory and applications of cryptographic techniques. Springer, 2013.

[134] Keelveedhi, S., M. Bellare, and T. Ristenpart. {DupLESS}:{Server-Aided} Encryption for Deduplicated Storage [C]//22nd USENIX security symposium (USENIX security 13). 2013.

[135] Harnik, D., B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage [J]. IEEE Security & Privacy, 2010, 8(6): 40-47.

[136] Li, Y., et al. CloudShare: Towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains [C]//International Conference on Mobile Networks and Management. Springer, 2017.

[137] Liu, H., Y. Zhang, and T. Yang. Blockchain-enabled security in electric vehicles cloud and edge computing [J]. IEEE Network, 2018, 32(3): 78-83.

[138] Li, J., et al. Deduplication with blockchain for secure cloud storage [C]//CCF Conference on Big Data. Springer, 2018.

[139] Liu, C.H., Q. Lin, and S. Wen, Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning [J]. IEEE Transactions on Industrial Informatics, 2018, 15(6): 3516-3526.

[140] Ahmed, E.-Y. and M.D. Elkettani. Fully homomorphic encryption: state of art and comparison [J]. International Journal of Computer Science and Information Security (IJCSIS), 2016, 14(4).

[141] Sathya, S.S., et al. A review of homomorphic encryption libraries for secure computation [J]. arXiv preprint arXiv:1812.02428, 2018.

[142] Cheon, J.H., et al. Homomorphic encryption for arithmetic of approximate numbers [C]// International conference on the theory and application of cryptology and information security. Springer, 2017.

[143] Fan, J. and F. Vercauteren. Somewhat practical fully homomorphic encryption [J]. Cryptology ePrint Archive, 2012.

[144] Halevi, S. and V. Shoup. Bootstrapping for helib [J]. Journal of Cryptology, 2021, 34(1): 1-44.

[145] Vizitiu, A., et al. Towards privacy-preserving deep learning based medical imaging applications [C]//2019 IEEE international symposium on medical measurements and applications (MeMeA) IEEE, 2019.

[146] Parmar, P.V., et al. Survey of various homomorphic encryption algorithms and schemes [J]. International Journal of Computer Applications, 2014, 91(8).

[147] Chung, H. and M. Kim. Encoding rational numbers for fhe-based applications [J]. Cryptology ePrint Archive, 2016.

[148] Mohassel, P. and Y. Zhang. Secureml: A system for scalable privacy-preserving machine learning [C]//2017 IEEE symposium on security and privacy (SP). IEEE, 2017.

[149] Alabdulatif, A., I. Khalil, and X. Yi. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption [J]. Journal of Parallel and Distributed Computing, 2020, 137: 192-204.

[150] Park, J., D.S. Kim, and H. Lim. Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures [J]. IEEE Access, 2020, 8: 203564-203579.

[151] Pang, H. and B. Wang. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment [J]. IEEE Systems Journal, 2020, 15(2): 3131-3141.

[152] Li, J., et al. Privacy preservation for machine learning training and classification based on homomorphic encryption schemes [J]. Information Sciences, 2020, 526: 166-179.

[153] Vizer, D. and S. Vaudenay. Cryptanalysis of chosen symmetric homomorphic scheme [J]. Stud. Sci. Math. Hung, 2015, 52(2): 288-306.

[154] Kim, H., et al. Efficient privacy-preserving machine learning for blockchain network [J]. IEEE Access, 2019, 7: 136481-136495.

[155] Hang, L. and D.-H. Kim. Design and implementation of an integrated iot blockchain platform for sensing data integrity. Sensors, 2019, 19(10): 2228.

[156] Serrano, W. The BlockChain Neural Network: Neuron as a Service [C]//2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020.

[157] Nasir, I.M., et al. SCNN: A Secure Convolutional Neural Network using Blockchain [C]// 2020 2nd International Conference on Computer and Information Sciences (ICCIS). IEEE, 2020.

[158] Liu, Y., et al. Proof of Learning (PoLe): empowering neural network training with consensus building on blockchains [J]. Computer Networks, 2021, 201: 108594.

[159] Kim, S.-K. and J.-H. Huh. Artificial neural network blockchain techniques for healthcare system: Focusing on the personal health records. Electronics, 2020, 9(5): 763.

[160] Covarrubias, J.Z.L. Transparencia y protección de datos personales en la cadena de bloques (blockchain). Estudios en derecho a la información, 2021, (11): 27-63.

[161] Pointcheval, D. Asymmetric cryptography and practical security [J]. Journal of Telecommunications and Information Technology, 2002: 41-56.

[162] Bošnjak, L., J. Sreš, and B. Brumen. Brute-force and dictionary attack on hashed real-world passwords [C]//2018 41st international convention on information and communication technology, electronics and microelectronics (mipro). IEEE, 2018.

[163] Rachmawati, D., J. Tarigan, and A. Ginting. A comparative study of Message Digest 5 (MD5) and SHA256 algorithm [C]//Journal of Physics: Conference Series. IOP Publishing, 2018.

[164] Wang, L., S. Wang, and M. Liu. A Pareto-based estimation of distribution algorithm for the multi-objective flexible job-shop scheduling problem [J]. International Journal of Production Research, 2013, 51(12): 3574-3592.

[165] Gao, L., et al. An efficient memetic algorithm for solving the job shop scheduling problem [J]. Computers & Industrial Engineering, 2011, 60(4): 699-705.

[166] Hu, D. An introductory survey on attention mechanisms in NLP problems [C]// Proceedings of SAI Intelligent Systems Conference. Springer, 2019.

[167] Guo, L., et al. Task scheduling optimization in cloud computing based on heuristic algorithm [J]. Journal of networks, 2012, 7(3): 547.

[168] Zhang, G. and X. Zuo. Deadline constrained task scheduling based on standard-PSO in a hybrid cloud [C]//International Conference in Swarm Intelligence. Springer, 2013.

[169] Yang, Z., et al. Optimized task scheduling and resource allocation in cloud computing using PSO based fitness function [J]. Information Technology Journal, 2013, 12(23): 7090.

[170] Suffian, M.D.M. and S. Ibrahim. A prediction model for system testing defects using regression analysis [J]. arXiv preprint arXiv:1401.5830, 2014.

[171] Chitra, S., et al. Local minima jump PSO for workflow scheduling in cloud computing environments [J]. Advances in computer science and its applications. Springer, 2014, 1225-1234.

[172] Zuo, X., G. Zhang, and W. Tan. Self-adaptive learning PSO-based deadline constrained task scheduling for hybrid IaaS cloud [J]. IEEE Transactions on Automation Science and Engineering, 2013, 11(2): 564-573.

[173] Verma, A. and S. Kaushal. Bi-criteria priority based particle swarm optimization workflow scheduling algorithm for cloud [C]//2014 Recent Advances in Engineering and Computational Sciences (RAECS) IEEE, 2014.

[174] Qian, F., et al. Overview of multiobjective particle swarm optimization algorithm [J]. 工程科学学报, 2021, 43(6): 745-753.

[175] Jena, R. Multi objective task scheduling in cloud environment using nested PSO framework [J]. Procedia Computer Science, 2015, 57: 1219-1227.

[176] Miglani, N. and G. Sharma. Modified particle swarm optimization based upon task categorization in cloud environment [J]. Int J Eng Adv Technol (IJEAT), 2019, 8.

[177] Zhou, Z., et al. A modified PSO algorithm for task scheduling optimization in cloud computing [J]. Concurrency and Computation: Practice and Experience, 2018, 30(24): e4970.

[178] Kumar, M. and S.C. Sharma. PSO-COGENT: Cost and energy efficient scheduling in cloud environment with deadline constraint [J]. Sustainable Computing: Informatics and Systems, 2018, 19: 147-164.

[179] Zhao, G. Cost-aware scheduling algorithm based on PSO in cloud computing environment [J]. International Journal of Grid and Distributed Computing, 2014, 7(1): 33-42.

[180] Bansal, J.C. and K. Deep. A modified binary particle swarm optimization for knapsack problems [J]. Applied Mathematics and Computation, 2012, 218(22): 11042-11061.

[181] Jena, U., P. Das, and M. Kabat. Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment [J]. Journal of King Saud University-Computer and Information Sciences, 2020.

[182] Yadav, H.K., V. Kumar, and V.K. Yadav. Potential of solar energy in India: a review [J]. International Advanced Research Journal in Science, Engineering and Technology, 2015, 2(1): 63-66.

[183] Huang, S.-Y. and C.-L. Chen. A hybrid particle swarm optimization algorithm with diversity for flow-shop scheduling problem. [C]//2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC) IEEE, 2009.

[184] Sardaraz, M. and M. Tahir. A hybrid algorithm for scheduling scientific workflows in cloud computing [J]. IEEE Access, 2019, 7: 186137-186146.

[185] Kar, U.N. and D.K. Sanyal. An overview of device-to-device communication in cellular networks [J]. ICT express, 2018, 4(4): 203-208.

[186] Dadgar, M., et al. Comparison of Mamdani and Sugeno fuzzy inference system in prediction of residual frieze effect of frieze carpet yarns [J]. Tekstilna industrija, 2013, 61(2): 16-25.

[187] Gulamali, M., et al. Using ICENI to run parameter sweep applications across multiple Grid resources [C]//Global Grid Forum 10, Case Studies on Grid Applications Workshop, 2004.

[188] Clerc, M. and J. Kennedy. The particle swarm-explosion, stability, and convergence in a multidimensional complex space [J]. IEEE transactions on Evolutionary Computation, 2002, 6(1): 58-73.

[189] Javanmardi, S., et al. Fr trust: a fuzzy reputation–based model for trust management in semantic p2p grids [J]. International Journal of Grid and Utility Computing, 2015, 6(1): 57-66.

[190] Wang, Y., et al. Self-adaptive learning based particle swarm optimization [J]. Information Sciences, 2011, 181(20): 4515-4538.

[191] Liang, J.J., et al. Comprehensive learning particle swarm optimizer for global optimization of multimodal functions [J]. IEEE transactions on evolutionary computation, 2006, 10(3): 281-295.

[192] Pant, M., T. Radha, and V. Singh. A new particle swarm optimization with quadratic interpolation [C]//International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) IEEE, 2007.

[193] Palai, A., M. Vora, and A. Shah. Empowering light nodes in blockchains with block summarization [C]//2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, 2018.

[194] Cai, X., et al. A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things [J]. IEEE Transactions on Industrial Informatics, 2021, 17(11): 7650-7658.

[195] Gabi, D., et al. Cloud scalable multi-objective task scheduling algorithm for cloud computing using cat swarm optimization and simulated annealing [C]//2017 8th International Conference on Information Technology (ICIT). IEEE, 2017.

[196] Wen, Y., H. Xu, and J. Yang, A heuristic-based hybrid genetic-variable neighborhood search algorithm for task scheduling in heterogeneous multiprocessor system [J]. Information Sciences, 2011, 181(3): 567-581.

[197] Hariss, K., H. Noura, and A.E. Samhat. Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications [J]. Journal of Information Security and Applications, 2017. 34: p. 233-242.

[198] Chabanne, H., et al. Privacy-preserving classification on deep neural network [J]. Cryptology ePrint Archive, 2017.

[199] Hesamifard, E., H. Takabi, and M. Ghasemi. Cryptodl: Deep neural networks over encrypted data [J]. arXiv preprint arXiv:1711.05189, 2017.

[200] Xiao, L., O. Bastani, and I.-L. Yen. An efficient homomorphic encryption protocol for multi-user systems. Cryptology ePrint Archive, 2012.

[201] Kipnis, A. and E. Hibshoosh. Efficient methods for practical fully homomorphic symmetric-key encrypton, randomization and verification [J]. Cryptology ePrint Archive, 2012.

[202] Sana, M. U, et al. Enhanced Security in Cloud Computing Using Neural Network and Encryption [J]. IEEE Access, 2021, 9: 145785-145799.

中图分类号:

 TP393.027    

开放日期:

 2023-03-21    

无标题文档

   建议浏览器: 谷歌 火狐 360请用极速模式,双核浏览器请用极速模式