메뉴 건너뛰기




Volumn 17, Issue 3, 2014, Pages 1013-1030

Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies

Author keywords

Cloud workflow scheduling strategy; Customizable service; Fuzzy clustering; QoS demand analysis; Trust mechanism

Indexed keywords

FUZZY CLUSTERING; QUALITY OF SERVICE;

EID: 84906789337     PISSN: 13867857     EISSN: 15737543     Source Type: Journal    
DOI: 10.1007/s10586-013-0340-1     Document Type: Article
Times cited : (36)

References (50)
  • 1
    • 78149290576 scopus 로고    scopus 로고
    • 2nd edn., Beijing: Publishing House of Electronics Industry
    • Liu, P.: Cloud Computing, 2nd edn. Publishing House of Electronics Industry, Beijing (2011).
    • (2011) Cloud Computing
    • Liu, P.1
  • 3
    • 84906782037 scopus 로고    scopus 로고
    • Chinese Cloud Computing Forum
    • Chinese Cloud Computing Forum. http://bbs. chinacloud. cn.
  • 6
    • 0010322740 scopus 로고
    • Complexity of sequencing problems
    • E. G. Coffman (Ed.), New York: Wiley
    • Ullman, J. D.: Complexity of sequencing problems. In: Coffman, E. G. (ed.) Computer and Job Scheuling Theory. Wiley, New York (1976).
    • (1976) Computer and Job Scheuling Theory
    • Ullman, J.D.1
  • 7
    • 75349103330 scopus 로고    scopus 로고
    • Cognitive model of dynamic trust forecasting
    • Li, X., Gui, X.: Cognitive model of dynamic trust forecasting. J. Softw. 21(1), 163-176 (2010).
    • (2010) J. Softw. , vol.21 , Issue.1 , pp. 163-176
    • Li, X.1    Gui, X.2
  • 8
    • 34447123164 scopus 로고    scopus 로고
    • Research on dynamic trust model for large scale distributed environment
    • Li, X., Gui, X.: Research on dynamic trust model for large scale distributed environment. J. Softw. 18(6), 1510-1521 (2007).
    • (2007) J. Softw. , vol.18 , Issue.6 , pp. 1510-1521
    • Li, X.1    Gui, X.2
  • 9
    • 77950973094 scopus 로고    scopus 로고
    • Reputation-based recommender discovery approach for service selection
    • Pan, J., Xu, F., Lv, J.: Reputation-based recommender discovery approach for service selection. J. Softw. 21(2), 388-400 (2010).
    • (2010) J. Softw. , vol.21 , Issue.2 , pp. 388-400
    • Pan, J.1    Xu, F.2    Lv, J.3
  • 10
    • 70449727086 scopus 로고    scopus 로고
    • Robust feedback credibility-based distributed P2P trust model
    • Hu, J., Wu, Q., Zhou, B., et al.: Robust feedback credibility-based distributed P2P trust model. J. Softw. 20(10), 2885-2898 (2009).
    • (2009) J. Softw. , vol.20 , Issue.10 , pp. 2885-2898
    • Hu, J.1    Wu, Q.2    Zhou, B.3
  • 11
    • 77954300287 scopus 로고    scopus 로고
    • Evaluation approach of subjective trust based on cloud model
    • Wang, S., Zhang, L., Li, H.: Evaluation approach of subjective trust based on cloud model. J. Softw. 21(6), 1341-1352 (2010).
    • (2010) J. Softw. , vol.21 , Issue.6 , pp. 1341-1352
    • Wang, S.1    Zhang, L.2    Li, H.3
  • 12
    • 84863364157 scopus 로고    scopus 로고
    • Approach of service combination based on deepness trust reasoning in complex cross-organizational collaboration
    • Hu, C., Chang, B., Xu, H., Zhao, Q.: Approach of service combination based on deepness trust reasoning in complex cross-organizational collaboration. J. Central South University (Science and Technology) 43(2), 567-575 (2012).
    • (2012) J. Central South University (Science and Technology) , vol.43 , Issue.2 , pp. 567-575
    • Hu, C.1    Chang, B.2    Xu, H.3    Zhao, Q.4
  • 13
    • 84864523667 scopus 로고    scopus 로고
    • Dynamic and comprehensive evaluation method for interoperability trust based on fuzzy variable weighting
    • Wang, Y., Xiao, X., Jia, L.: Dynamic and comprehensive evaluation method for interoperability trust based on fuzzy variable weighting. J. Comput. Res. Dev. 49(6), 1235-1242 (2012).
    • (2012) J. Comput. Res. Dev. , vol.49 , Issue.6 , pp. 1235-1242
    • Wang, Y.1    Xiao, X.2    Jia, L.3
  • 14
    • 84861695283 scopus 로고    scopus 로고
    • Trust model based on double incentive and deception detection for cloud computing
    • Xie, X., Liu, L., Zhao, P.: Trust model based on double incentive and deception detection for cloud computing. J. Electron. Inform. Technol. 34(4), 812-817 (2012).
    • (2012) J. Electron. Inform. Technol. , vol.34 , Issue.4 , pp. 812-817
    • Xie, X.1    Liu, L.2    Zhao, P.3
  • 15
    • 84863586754 scopus 로고    scopus 로고
    • A strategy-proof trust based decision mechanism for pervasive computing environments
    • Wei, Z., Zhou, W., Ren, X., Wei, Q., et al.: A strategy-proof trust based decision mechanism for pervasive computing environments. Chin. J. Comput. 35(5), 871-882 (2012).
    • (2012) Chin. J. Comput. , vol.35 , Issue.5 , pp. 871-882
    • Wei, Z.1    Zhou, W.2    Ren, X.3    Wei, Q.4
  • 16
    • 84863591585 scopus 로고    scopus 로고
    • A hierarchical trust model for the internet of things
    • Liu, W., Yin, L., Fang, B., Zhang, H.: A hierarchical trust model for the internet of things. Chin. J. Comput. 35(5), 846-855 (2012).
    • (2012) Chin. J. Comput. , vol.35 , Issue.5 , pp. 846-855
    • Liu, W.1    Yin, L.2    Fang, B.3    Zhang, H.4
  • 17
    • 84863263005 scopus 로고    scopus 로고
    • A web services composition strategy based on trust reasoning and evolution
    • Long, J., Liu, X., Yuan, X., Zhang, Z., et al.: A web services composition strategy based on trust reasoning and evolution. Chin. J. Comput. 35(2), 298-314 (2012).
    • (2012) Chin. J. Comput. , vol.35 , Issue.2 , pp. 298-314
    • Long, J.1    Liu, X.2    Yuan, X.3    Zhang, Z.4
  • 18
    • 84874793636 scopus 로고    scopus 로고
    • Provably secure authentication protocol based on convertible proxy signcryption in cloud computing
    • Qi, x, Jiyi, W., Guilin, W., Wenhao, L., et al.: Provably secure authentication protocol based on convertible proxy signcryption in cloud computing. Sci. China 42(3), 303-313 (2012).
    • (2012) Sci. China , vol.42 , Issue.3 , pp. 303-313
    • Qi, .1    Jiyi, W.2    Guilin, W.3    Wenhao, L.4
  • 19
    • 84906787947 scopus 로고    scopus 로고
    • Cloud computing: concept and platform
    • Jiyi, W., Ping, L., Pan, X., Zhuo, L.: Cloud computing: concept and platform. Telecommun. Sci. 33(3), 59-66 (2012).
    • (2012) Telecommun. Sci. , vol.33 , Issue.3 , pp. 59-66
    • Jiyi, W.1    Ping, L.2    Pan, X.3    Zhuo, L.4
  • 20
    • 84861122486 scopus 로고    scopus 로고
    • Cloud service discovery algorithm based on trust fuzzy comprehensive evaluation
    • Li, Wenjuan, Ping, L., Li, J., Qiu, Q.: Cloud service discovery algorithm based on trust fuzzy comprehensive evaluation. ICIC Express Lett. Part B 3(2), 1-6 (2012).
    • (2012) ICIC Express Lett. Part B , vol.3 , Issue.2 , pp. 1-6
    • Li, W.1    Ping, L.2    Li, J.3    Qiu, Q.4
  • 22
    • 84859649645 scopus 로고    scopus 로고
    • Research on trust management strategies in cloud computing environment
    • Li, W., Ping, L., Qiu, Q., Zhang, Q.: Research on trust management strategies in cloud computing environment. J. Comput. Inform. Syst. 8(4), 1757-1763 (2012).
    • (2012) J. Comput. Inform. Syst. , vol.8 , Issue.4 , pp. 1757-1763
    • Li, W.1    Ping, L.2    Qiu, Q.3    Zhang, Q.4
  • 23
    • 84906785674 scopus 로고    scopus 로고
    • Research on adaptive genetic algorithm based service workflow scheduling problem
    • Guangzhou
    • Zhao, G.: Research on adaptive genetic algorithm based service workflow scheduling problem. Sun yat-sen university, Guangzhou (2010).
    • (2010) Sun yat-sen university
    • Zhao, G.1
  • 24
    • 71949091638 scopus 로고    scopus 로고
    • A resource allocating algorithm in reliability
    • Yu, J., Tian, G., Cao, Y., et al.: A resource allocating algorithm in reliability. J. Comput. Res. Dev. 46(2), 1821-1829 (2009).
    • (2009) J. Comput. Res. Dev. , vol.46 , Issue.2 , pp. 1821-1829
    • Yu, J.1    Tian, G.2    Cao, Y.3
  • 25
    • 62549088709 scopus 로고    scopus 로고
    • Time optimization heuristics for scheduling budget\_constrained grid workflows
    • Yuan, Y., Li, X., Wang, Q., et al.: Time optimization heuristics for scheduling budget\_constrained grid workflows. J. Comput. Res. Dev. 46(2), 194-201 (2009).
    • (2009) J. Comput. Res. Dev. , vol.46 , Issue.2 , pp. 194-201
    • Yuan, Y.1    Li, X.2    Wang, Q.3
  • 27
    • 33845907972 scopus 로고    scopus 로고
    • QoS-awared grid workflow schedule
    • Wang, Y., Hu, C., Du, Z.: QoS-awared grid workflow schedule. J. Softw. 17(11), 2341-2351 (2006).
    • (2006) J. Softw. , vol.17 , Issue.11 , pp. 2341-2351
    • Wang, Y.1    Hu, C.2    Du, Z.3
  • 29
    • 0041344298 scopus 로고    scopus 로고
    • QoS guided Min-rain heuristic for grid task scheduling
    • He, X., Sun, X., Gregor, V. L.: QoS guided Min-rain heuristic for grid task scheduling. J. Comput. Sci. Technol. 18(4), 442-451 (2003).
    • (2003) J. Comput. Sci. Technol. , vol.18 , Issue.4 , pp. 442-451
    • He, X.1    Sun, X.2    Gregor, V.L.3
  • 30
    • 10644221057 scopus 로고    scopus 로고
    • Heuristic scheduling for bag -of-tasks applications in combination with QoS in the computational grid
    • Weng, C., Lu, X.: Heuristic scheduling for bag -of-tasks applications in combination with QoS in the computational grid. Future Gener. Comput. Syst. 21(2), 271-280 (2005).
    • (2005) Future Gener. Comput. Syst. , vol.21 , Issue.2 , pp. 271-280
    • Weng, C.1    Lu, X.2
  • 31
    • 0036871453 scopus 로고    scopus 로고
    • Economic models for resource management and scheduling in grid computing
    • Buyya, R., Abramson, D., Giddy, J., et al.: Economic models for resource management and scheduling in grid computing. J. Concurr. Comput. 14(13-15), 1507-1542 (2002).
    • (2002) J. Concurr. Comput. , vol.14 , Issue.13-15 , pp. 1507-1542
    • Buyya, R.1    Abramson, D.2    Giddy, J.3
  • 32
    • 0034863850 scopus 로고    scopus 로고
    • Security implications of typical grid computing usage scenario
    • San Francisco, CA
    • Hum, P. M., Thompson, M. R.: Security implications of typical grid computing usage scenario, pp. 95-103. Proceedings of the IEEE HPDC, San Francisco, CA (2001).
    • (2001) Proceedings of the IEEE HPDC , pp. 95-103
    • Hum, P.M.1    Thompson, M.R.2
  • 34
    • 33747417748 scopus 로고    scopus 로고
    • A trust-QoS enhanced grid service scheduling
    • Zhang, W., Fang, B., et al.: A trust-QoS enhanced grid service scheduling. chin. J. Comput. 29(7), 1157-1166 (2006).
    • (2006) Chin. J. Comput. , vol.29 , Issue.7 , pp. 1157-1166
    • Zhang, W.1    Fang, B.2
  • 35
    • 33747400481 scopus 로고    scopus 로고
    • Dynamic level scheduling based on trust model in grid computing
    • Yuan, L., Zeng, G., et al.: Dynamic level scheduling based on trust model in grid computing. Chin. J. Comput. 29(7), 1217-1224 (2006).
    • (2006) Chin. J. Comput. , vol.29 , Issue.7 , pp. 1217-1224
    • Yuan, L.1    Zeng, G.2
  • 36
    • 84872558822 scopus 로고    scopus 로고
    • Grid workflow scheduling algorithm under constraints of trust
    • Hu, Z., Juan, H.: Grid workflow scheduling algorithm under constraints of trust. Appl. Res. Comput. 27(8), 2936-2938 (2010).
    • (2010) Appl. Res. Comput. , vol.27 , Issue.8 , pp. 2936-2938
    • Hu, Z.1    Juan, H.2
  • 37
    • 61349130758 scopus 로고    scopus 로고
    • QoS scheduling based on trust relationship in web service workflow
    • Hu, C., Wu, M., Liu, G.: QoS scheduling based on trust relationship in web service workflow. Chin. J. Comput. 32(1), 42-53 (2009).
    • (2009) Chin. J. Comput. , vol.32 , Issue.1 , pp. 42-53
    • Hu, C.1    Wu, M.2    Liu, G.3
  • 38
    • 34548608734 scopus 로고    scopus 로고
    • An approach to constructing web service workflow based on business spanning graph
    • Hu, C., Wu, M., Liu, G., et al.: An approach to constructing web service workflow based on business spanning graph. J. Softw. 18(8), 1870-1882 (2007).
    • (2007) J. Softw. , vol.18 , Issue.8 , pp. 1870-1882
    • Hu, C.1    Wu, M.2    Liu, G.3
  • 41
    • 84859747994 scopus 로고    scopus 로고
    • Cloud scheduling algorithm based on fuzzy clustering
    • Li, W., Zhang, Q., Ping, L., Pan, X.: Cloud scheduling algorithm based on fuzzy clustering. J. Commun. 33(3), 146-154 (2012).
    • (2012) J. Commun. , vol.33 , Issue.3 , pp. 146-154
    • Li, W.1    Zhang, Q.2    Ping, L.3    Pan, X.4
  • 44
    • 84906788756 scopus 로고    scopus 로고
    • NetLogo home page
    • NetLogo home page. http://ccl. northwestern. edu/netlogo.
  • 47
    • 0025491484 scopus 로고
    • Scheduling periods jobs that allow imprecise results
    • Chung, J. Y., Shih, W. K., Jane, W. S., et al.: Scheduling periods jobs that allow imprecise results. IEEE Trans. Comput. 39(9), 1156-1174 (1990).
    • (1990) IEEE Trans. Comput. , vol.39 , Issue.9 , pp. 1156-1174
    • Chung, J.Y.1    Shih, W.K.2    Jane, W.S.3
  • 48
    • 0007311376 scopus 로고    scopus 로고
    • Scheduling parallelizable imprecise computations on multiprocessor
    • Anaheim, CA, USA, pp. April 30-May 2 1991
    • Yu, A. C., Lin, K. J.: Scheduling parallelizable imprecise computations on multiprocessor. In: Proceedings of the 5th International Symposium on Parallel Processing. Anaheim, CA, USA, pp. 531-536 April 30-May 2 1991.
    • Proceedings of the 5th International Symposium on Parallel Processing , pp. 531-536
    • Yu, A.C.1    Lin, K.J.2
  • 49
    • 33747382691 scopus 로고    scopus 로고
    • Trust-driven job scheduling heuristics for computing grid
    • Zhang, W., Liu, X., Yun, X., Zhang, H., et al.: Trust-driven job scheduling heuristics for computing grid. J. Commun. 27(2), 73-79 (2006).
    • (2006) J. Commun. , vol.27 , Issue.2 , pp. 73-79
    • Zhang, W.1    Liu, X.2    Yun, X.3    Zhang, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.