Skip to main content
Log in

Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Macías, M., & Guitart, J. (2014). SLA negotiation and enforcement policies for revenue maximization and client classification in cloud providers. Future Generation Computer Systems, 41, 19–31.

    Article  Google Scholar 

  2. Rajkumar, B., & Rajiv, R. (2006). Federated resource management in grid and cloud computing systems [J]. Future Generation Computer Systems, 26(8), 1189–1191

    Google Scholar 

  3. Sempolinski Peter and Douglas Thain. A comparison and critique of eucalyptus, opennebula and nimbus. In: Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pp. 417–426. IEEE, 2010.

  4. e Assunção, M. D., di Costanzo, A., & Buyya, R. (2010). A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Cluster Computing, 13(3), 335–347

    Article  Google Scholar 

  5. Zhihua, X., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608

    Article  Google Scholar 

  6. Glover, F. (1989). Tabu search—part I. ORSA Journal on computing, 1(3), 190–206

    Article  Google Scholar 

  7. Aljawarneh, S., & Yassein, M. B. (2018). A multithreaded programming approach for multimedia big data: encryption system. Multimedia Tools and Applications, 77(9), 10997–11016

    Article  Google Scholar 

  8. Denis, R., & Madhubala, P. (2021). Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-021-10723-4

    Article  Google Scholar 

  9. El Mhouti, A., Erradi, M., & Nasseh, A. (2018). Using cloud computing services in e-learning process: Benefits and challenges. Education and Information Technologies, 23(2), 893–909.

    Article  Google Scholar 

  10. Agrawal Divyakant, Sudipto Das and Amr El Abbad. " Big data and cloud computing: current state and future opportunities." In Extending Database Technology, 2011 ACM 14th International Conference on, pp. 530–533. ACM, 2011.

  11. Jayapandian, N., Md Zubair, A. M. J., & Rahman. . (2017). Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, 20(2), 1561–1573

    Article  Google Scholar 

  12. Linthicum, D. S. (2009). Cloud computing and SOA convergence in your enterprise: a step-by-step guide. Pearson Education: US.

    Google Scholar 

  13. Hamscher Volker, Uwe Schwiegelshohn, Achim Streit and Ramin Yahyapour. Evaluation of job-scheduling strategies for grid computing. In: Grid Computing, Springer 2000 International Workshop on, pp. 191–202. Springer, 2000.

  14. Caron, E., Garonne, V., & Tsaregorodtsev, A. (2007). Definition, modelling and simulation of a grid computing scheduling system for high throughput computing. Future Generation Computer Systems, 23(8), 968–976

    Article  Google Scholar 

  15. Yuan-Shun, D., Xie, M., & Poh, K.-L. (2008). Availability modeling and cost optimization for the grid resource management system. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 38(1), 170–179

    Article  Google Scholar 

  16. Huang, Lu., Chen, H.-S., & Ting-ting, Hu. (2013). Survey on resource allocation policy and job scheduling algorithms of cloud computing. Journal of Software, 8(2), 480–487

    Article  Google Scholar 

  17. Hacker Thomas J and Zdzislaw Meglicki. Using queue structures to improve job reliability. In: High performance distributed computing, ACM 2007 16th international symposium on, pp. 43–54. ACM, 2007.

  18. Xia-yu, H., Zheng, J., & Wen-xin, Hu. (2010). Ant colony optimization algorithm for computing resource allocation based on cloud computing environment [J]. Journal of East China Normal University (Natural Science), 1(1), 127–134

    Google Scholar 

  19. Calheiros Rodrigo, N., Ranjan, R., De Anton Beloglazov César, A. F., & Rose and Rajkumar Buyya. . (2011). CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software Practice and experience, 41(1), 23–50

    Article  Google Scholar 

  20. Baomin, Xu., Zhao, C., Enzhao, Hu., & Bin, Hu. (2011). Job scheduling algorithm based on Berger model in cloud environment. Advances in Engineering Software, 42(7), 419–425

    Article  Google Scholar 

  21. Burbano, L., Cómbita, L. F., Quijano, N., & Rueda, S. (2021). Dynamic Data Integration for Resilience to Sensor Attacks in Multi-Agent Systems. IEEE Access, 9, 31236–31245

    Article  Google Scholar 

  22. Bertino, E. " Data Security and Privacy in the IoT." In EDBT, (2016): pp. 1–3.

  23. Li Luqun. An optimistic differentiated service job scheduling system for cloud computing service users and providers. In: Multimedia and Ubiquitous Engineering (MUE'09), 2009 IEEE Third International Conference on, pp. 295–299. IEEE, 2009.

  24. Jayapandian N, AMJ Md Zubair Rahman, Radhikadevi S and Koushikaa M. Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), 2016 IEEE World Conference on, pp. 1–4. IEEE, 2016.

  25. Chang, W., Streiff, B., & Lin, C. Efficient and extensible security enforcement using dynamic data flow analysis. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 39–50. ACM, 2008.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Not applicable.

Corresponding author

Correspondence to N. Jayapandian.

Ethics declarations

Conflicts of interest

The author declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jayapandian, N. Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm. Wireless Pers Commun 120, 2427–2447 (2021). https://doi.org/10.1007/s11277-021-08562-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08562-5

Keywords

Navigation