Abdulla Sheikh
SSM: Scheduling Security Model for a Cloud Environment
Sheikh, Abdulla; Munro, Malcolm; Budgen, David
Abstract
Scheduling in the cloud is a complex task due to the number and variety of resources available and the volatility of usage-patterns of resources considering that the resource setting is on the service provider. This complexity is compounded further when Security issues and Quality of Service (QoS) are also factored in. The aim of this paper is to describe a model that based on Security (SSM) as a key element that cloud services rely on which affects the performance, cost and time concerns within the security constraints of the cloud service. Definition of the Scheduling Security Model (SSM), and evaluation through worked example that can meet the customer requirements of cost and the quality of service in the required time.
Citation
Sheikh, A., Munro, M., & Budgen, D. (2018, December). SSM: Scheduling Security Model for a Cloud Environment. Presented at 2nd International Conference on Cloud and Big Data Computing (ICCBDC), Barcelona, Spain
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 2nd International Conference on Cloud and Big Data Computing (ICCBDC) |
Acceptance Date | Jul 5, 2018 |
Online Publication Date | Aug 3, 2018 |
Publication Date | Aug 3, 2018 |
Deposit Date | Sep 11, 2018 |
Publicly Available Date | Sep 12, 2018 |
Pages | 11-15 |
Series Title | ACM International Conference Proceedings Series |
Book Title | Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing (ICCBDC'18). |
DOI | https://doi.org/10.1145/3264560.3264568 |
Public URL | https://durham-repository.worktribe.com/output/1145751 |
Files
Accepted Conference Proceeding
(211 Kb)
PDF
Copyright Statement
© Owner/Author | ACM} 2018. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing (ICCBDC'18), https://doi.org/10.1145/3264560.3264568
You might also like
How Should Software Engineering Secondary Studies Include Grey Material?
(2022)
Journal Article
SEGRESS: Software Engineering Guidelines for REporting Secondary Studies
(2022)
Journal Article
Short communication: Evolution of secondary studies in software engineering
(2022)
Journal Article
A Service Scheduling Security Model for a Cloud Environment
(2020)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search