Abstract
The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique.
Similar content being viewed by others
References
Macías, M., & Guitart, J. (2014). SLA negotiation and enforcement policies for revenue maximization and client classification in cloud providers. Future Generation Computer Systems, 41, 19–31.
Rajkumar, B., & Rajiv, R. (2006). Federated resource management in grid and cloud computing systems [J]. Future Generation Computer Systems, 26(8), 1189–1191
Sempolinski Peter and Douglas Thain. A comparison and critique of eucalyptus, opennebula and nimbus. In: Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pp. 417–426. IEEE, 2010.
e Assunção, M. D., di Costanzo, A., & Buyya, R. (2010). A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Cluster Computing, 13(3), 335–347
Zhihua, X., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608
Glover, F. (1989). Tabu search—part I. ORSA Journal on computing, 1(3), 190–206
Aljawarneh, S., & Yassein, M. B. (2018). A multithreaded programming approach for multimedia big data: encryption system. Multimedia Tools and Applications, 77(9), 10997–11016
Denis, R., & Madhubala, P. (2021). Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-021-10723-4
El Mhouti, A., Erradi, M., & Nasseh, A. (2018). Using cloud computing services in e-learning process: Benefits and challenges. Education and Information Technologies, 23(2), 893–909.
Agrawal Divyakant, Sudipto Das and Amr El Abbad. " Big data and cloud computing: current state and future opportunities." In Extending Database Technology, 2011 ACM 14th International Conference on, pp. 530–533. ACM, 2011.
Jayapandian, N., Md Zubair, A. M. J., & Rahman. . (2017). Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Cluster Computing, 20(2), 1561–1573
Linthicum, D. S. (2009). Cloud computing and SOA convergence in your enterprise: a step-by-step guide. Pearson Education: US.
Hamscher Volker, Uwe Schwiegelshohn, Achim Streit and Ramin Yahyapour. Evaluation of job-scheduling strategies for grid computing. In: Grid Computing, Springer 2000 International Workshop on, pp. 191–202. Springer, 2000.
Caron, E., Garonne, V., & Tsaregorodtsev, A. (2007). Definition, modelling and simulation of a grid computing scheduling system for high throughput computing. Future Generation Computer Systems, 23(8), 968–976
Yuan-Shun, D., Xie, M., & Poh, K.-L. (2008). Availability modeling and cost optimization for the grid resource management system. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 38(1), 170–179
Huang, Lu., Chen, H.-S., & Ting-ting, Hu. (2013). Survey on resource allocation policy and job scheduling algorithms of cloud computing. Journal of Software, 8(2), 480–487
Hacker Thomas J and Zdzislaw Meglicki. Using queue structures to improve job reliability. In: High performance distributed computing, ACM 2007 16th international symposium on, pp. 43–54. ACM, 2007.
Xia-yu, H., Zheng, J., & Wen-xin, Hu. (2010). Ant colony optimization algorithm for computing resource allocation based on cloud computing environment [J]. Journal of East China Normal University (Natural Science), 1(1), 127–134
Calheiros Rodrigo, N., Ranjan, R., De Anton Beloglazov César, A. F., & Rose and Rajkumar Buyya. . (2011). CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software Practice and experience, 41(1), 23–50
Baomin, Xu., Zhao, C., Enzhao, Hu., & Bin, Hu. (2011). Job scheduling algorithm based on Berger model in cloud environment. Advances in Engineering Software, 42(7), 419–425
Burbano, L., Cómbita, L. F., Quijano, N., & Rueda, S. (2021). Dynamic Data Integration for Resilience to Sensor Attacks in Multi-Agent Systems. IEEE Access, 9, 31236–31245
Bertino, E. " Data Security and Privacy in the IoT." In EDBT, (2016): pp. 1–3.
Li Luqun. An optimistic differentiated service job scheduling system for cloud computing service users and providers. In: Multimedia and Ubiquitous Engineering (MUE'09), 2009 IEEE Third International Conference on, pp. 295–299. IEEE, 2009.
Jayapandian N, AMJ Md Zubair Rahman, Radhikadevi S and Koushikaa M. Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), 2016 IEEE World Conference on, pp. 1–4. IEEE, 2016.
Chang, W., Streiff, B., & Lin, C. Efficient and extensible security enforcement using dynamic data flow analysis. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 39–50. ACM, 2008.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
Not applicable.
Corresponding author
Ethics declarations
Conflicts of interest
The author declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jayapandian, N. Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm. Wireless Pers Commun 120, 2427–2447 (2021). https://doi.org/10.1007/s11277-021-08562-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08562-5