IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v26y2024i4d10.1007_s10796-022-10304-2.html
   My bibliography  Save this article

Security, Cost and Energy Aware Scheduling of Real-Time IoT Workflows in a Mist Computing Environment

Author

Listed:
  • Georgios L. Stavrinides

    (Aristotle University of Thessaloniki)

  • Helen D. Karatza

    (Aristotle University of Thessaloniki)

Abstract

The rapid expansion of the Internet of Things (IoT) led to the emergence of new computing paradigms, such as mist and fog computing, in order to tackle the problem of transferring vast volumes of data to remote cloud data centers. In this paper, we propose a security, cost and energy aware scheduling heuristic for real-time workflow jobs that process IoT data with various security requirements. The environment under study is a four-tier architecture, consisting of IoT, mist, fog and cloud layers. The resources in the mist, fog and cloud tiers are considered to be heterogeneous. The proposed scheduling approach is compared to a baseline strategy, which is security aware, but not cost and energy aware. The performance of both heuristics is evaluated through extensive simulation experiments, under different values of security level probabilities for the initial IoT input data of the entry tasks of the workflow jobs. The simulation results reveal that the proposed approach, not only provides a better Quality of Service (QoS) compared to the baseline strategy, but it also achieves monetary cost and energy savings.

Suggested Citation

  • Georgios L. Stavrinides & Helen D. Karatza, 2024. "Security, Cost and Energy Aware Scheduling of Real-Time IoT Workflows in a Mist Computing Environment," Information Systems Frontiers, Springer, vol. 26(4), pages 1223-1241, August.
  • Handle: RePEc:spr:infosf:v:26:y:2024:i:4:d:10.1007_s10796-022-10304-2
    DOI: 10.1007/s10796-022-10304-2
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-022-10304-2
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-022-10304-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Pei-Fang Hsu, 2022. "A Deeper Look at Cloud Adoption Trajectory and Dilemma," Information Systems Frontiers, Springer, vol. 24(1), pages 177-194, February.
    2. Davy Preuveneers & Giuseppe Garofalo & Wouter Joosen, 2021. "Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom," Information Systems Frontiers, Springer, vol. 23(1), pages 151-164, February.
    3. Sanjaya K. Panda & Indrajeet Gupta & Prasanta K. Jana, 2019. "Task scheduling algorithms for multi-cloud systems: allocation-aware approach," Information Systems Frontiers, Springer, vol. 21(2), pages 241-259, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. John Oredo & Denis Dennehy, 2023. "Exploring the Role of Organizational Mindfulness on Cloud Computing and Firm Performance: The Case of Kenyan Organizations," Information Systems Frontiers, Springer, vol. 25(5), pages 2029-2050, October.
    2. Shuai Yuan & Sanjukta Das & Ram Ramesh & Chunming Qiao, 2023. "Availability-Aware Virtual Resource Provisioning for Infrastructure Service Agreements in the Cloud," Information Systems Frontiers, Springer, vol. 25(4), pages 1495-1512, August.
    3. Shuraida, Shadi & Titah, Ryad, 2023. "An examination of cloud computing adoption decisions: Rational choice or cognitive bias?," Technology in Society, Elsevier, vol. 74(C).
    4. Longling Zhang & Bochen Shen & Ahmed Barnawi & Shan Xi & Neeraj Kumar & Yi Wu, 2021. "FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia," Information Systems Frontiers, Springer, vol. 23(6), pages 1403-1415, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:26:y:2024:i:4:d:10.1007_s10796-022-10304-2. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.