Research article Special Issues

Multi-cloud resource scheduling intelligent system with endogenous security

  • Received: 17 November 2023 Revised: 16 January 2024 Accepted: 24 January 2024 Published: 02 February 2024
  • A secure and reliable intelligent multi-cloud resource scheduling system in cyberspace is especially important in some industry applications. However, this task has become exceedingly challenging due to the intricate nature of information, the variety of knowledge representations, the compatibility of diverse knowledge reasoning engines, and the numerous security threats found in cloud networks. In this paper, we applied the endogenous security theory to the multi-cloud resource scheduling intelligent system and presented a novel model of the system. The proposed model incorporates various knowledge representations and inference engines, resulting in a multi-cloud resource scheduling intelligent system that ensures endogenous security. In addition, we have devised a scheme for an intelligent system that schedules multi-cloud resources using dual-channels and has an endogenous security mechanism, which we have named Dynamic, Heterogeneous, and Redundant (DHR). Finally, we have used the multi-cloud resource scheduling intelligent run log database to carry out numerous experiments to validate the efficiency of the dual-channel redundant reasoning system with the endogenous security mechanism's DHR property. The results of the experiment demonstrated that the multi-cloud resource intelligent scheduling system model with an endogenous security mechanism was superior to the current single-channel inference system scheme in regards to security and reliability.

    Citation: Nishui Cai, Guofeng He. Multi-cloud resource scheduling intelligent system with endogenous security[J]. Electronic Research Archive, 2024, 32(2): 1380-1405. doi: 10.3934/era.2024064

    Related Papers:

  • A secure and reliable intelligent multi-cloud resource scheduling system in cyberspace is especially important in some industry applications. However, this task has become exceedingly challenging due to the intricate nature of information, the variety of knowledge representations, the compatibility of diverse knowledge reasoning engines, and the numerous security threats found in cloud networks. In this paper, we applied the endogenous security theory to the multi-cloud resource scheduling intelligent system and presented a novel model of the system. The proposed model incorporates various knowledge representations and inference engines, resulting in a multi-cloud resource scheduling intelligent system that ensures endogenous security. In addition, we have devised a scheme for an intelligent system that schedules multi-cloud resources using dual-channels and has an endogenous security mechanism, which we have named Dynamic, Heterogeneous, and Redundant (DHR). Finally, we have used the multi-cloud resource scheduling intelligent run log database to carry out numerous experiments to validate the efficiency of the dual-channel redundant reasoning system with the endogenous security mechanism's DHR property. The results of the experiment demonstrated that the multi-cloud resource intelligent scheduling system model with an endogenous security mechanism was superior to the current single-channel inference system scheme in regards to security and reliability.



    加载中


    [1] P. Kühn, D. N. Relke, C. Reuter, Common vulnerability scoring system prediction based on open source intelligence information sources, Comput. Secur., 131 (2023), 1103286. https://doi.org/10.1016/j.cose.2023.103286 doi: 10.1016/j.cose.2023.103286
    [2] S. Nazir, S. Patel, D. Patel, Assessing and augmenting SCADA cyber security: A survey of techniques, Comput. Secur., 70 (2017), 436–454. https://doi.org/10.1016/j.cose.2017.06.010 doi: 10.1016/j.cose.2017.06.010
    [3] J. Wu, Cyberspace endogenous safety, security, Engineering, 15 (2021), 179–185. https://doi.org/10.1016/j.eng.2021.05.015 doi: 10.1016/j.eng.2021.05.015
    [4] B. Yang, S. Wang, Q. Cheng, T. Jin, Scheduling of field service resources in cloud manufacturing based on multi-population competitive-cooperative GWO, Comput. Ind. Eng., 154 (2021), 107104. https://doi.org/10.1016/j.cie.2021.107104 doi: 10.1016/j.cie.2021.107104
    [5] Z. X. Sun, H. Huang, Z. Li, C. Gu, R. Xie, B. Qian, Efficient, economical and energy-saving multi-workflow scheduling in hybrid cloud, Expert Syst. Appl., 228 (2023), 120401. https://doi.org/10.1016/j.eswa.2023.120401 doi: 10.1016/j.eswa.2023.120401
    [6] G. Zhou, W. Tian, R. Buyya, K. Wu, Growable Genetic Algorithm with Heuristic-based Local Search for multi-dimensional resources scheduling of cloud computing, Appl. Soft Comput., 136 (2023), 110027. https://doi.org/10.1016/j.asoc.2023.110027 doi: 10.1016/j.asoc.2023.110027
    [7] G. Agarwal, S. Gupta, R. Ahuja, A. K. Rai, Multiprocessor task scheduling using multi-objective hybrid genetic Algorithm in Fog–cloud computing, Knowledge-Based Syst., 272 (2023), 110563. https://doi.org/10.1016/j.knosys.2023.110563 doi: 10.1016/j.knosys.2023.110563
    [8] W. Zhang, J. Xiao, W. Liu, Y. Sui, Y. Li, S. Zhang, Individualized requirement-driven multi-task scheduling in cloud manufacturing using an extended multifactorial evolutionary algorithm, Comput. Ind. Eng., 179 (2023), 109178. https://doi.org/10.1016/j.cie.2023.109178 doi: 10.1016/j.cie.2023.109178
    [9] W. Xiong, M. K. Lim, M. L. Tseng, Y. Wang, An effective adaptive adjustment model of task scheduling and resource allocation based on multi-stakeholder interests in cloud manufacturing, Adv. Eng. Inf., 56 (2023), 101937. https://doi.org/10.1016/j.aei.2023.101937 doi: 10.1016/j.aei.2023.101937
    [10] W. Zhang, Y. Zheng, W. Ma, R. Ahmad, Multi-task scheduling in cloud remanufacturing system integrating reuse, reprocessing, and replacement under quality uncertainty, J. Manuf. Syst., 68 (2023), 176–195. https://doi.org/10.1016/j.jmsy.2023.03.008
    [11] X. Wang, H. Lou, Z. Dong, C. Yu, R. Lu, Decomposition-based multi-objective evolutionary algorithm for virtual machine and task joint scheduling of cloud computing in data space, Swarm Evol. Comput., 77 (2023), 101230. https://doi.org/10.1016/j.swevo.2023.101230 doi: 10.1016/j.swevo.2023.101230
    [12] Y. H. Wu, H. B. Li, RNNCTPs: A neural symbolic reasoning method using dynamic knowledge partitioning technology, Knowledge-Based Syst., 268 (2023), 110481. https://doi.org/10.1016/j.knosys.2023.110481 doi: 10.1016/j.knosys.2023.110481
    [13] G. Wang, Y. Zhang, F. Zhang, Z. Wu, An ensemble method with DenseNet and evidential reasoning rule for machinery fault diagnosis under imbalanced condition, Measurement, 214 (2023), 112806. https://doi.org/10.1016/j.measurement.2023.112806 doi: 10.1016/j.measurement.2023.112806
    [14] Y. Gao, R. Bao, Z. Pan, G. Ma, J. Li, X. Cai, Q. Peng, Mechanical equipment health management method based on improved intuitionistic fuzzy entropy and case reasoning technology, Eng. Appl. Artif. Intell., 116 (2022), 105372. https://doi.org/10.1016/j.engappai.2022.105372 doi: 10.1016/j.engappai.2022.105372
    [15] M. B. Fard, A. Hamedani, M. Ebadi, D. Hamidi, K. Motlaghzadeh, M. Emarati, et al., Sustainable waste-to-energy plant site selection by a hybrid method of geographic information system and evidential reasoning: A case study Guilan province, Process Saf. Environ. Prot., 176 (2023), 316–331. https://doi.org/10.1016/j.psep.2023.05.063 doi: 10.1016/j.psep.2023.05.063
    [16] W. Xu, Y. Huang, S. Song, Y. Chen, G. Cao, M. Yu, et al., A new online optimization method for boiler combustion system based on the data-driven technique and the case-based reasoning principle, Energy, 263 (2023), 125508. https://doi.org/10.1016/j.energy.2022.125508 doi: 10.1016/j.energy.2022.125508
    [17] M. R. N. Kalhori, M. H. FazelZarandi, A new interval type-2 fuzzy reasoning method for classification systems based on normal forms of a possibility-based fuzzy measure, Inf. Sci., 581 (2021), 567–586. https://doi.org/10.1016/j.ins.2021.09.060 doi: 10.1016/j.ins.2021.09.060
    [18] J. Wang, Z. Zhang, G. Zhao, Task recommendation method for fusion of multi-view social relationship learning and reasoning in the mobile crowd sensing system, Comput. Commun., 206 (2023), 60–72. https://doi.org/10.1016/j.comcom.2023.04.028 doi: 10.1016/j.comcom.2023.04.028
    [19] W. Xu, Y. Huang, S. Song, B. Chen, X. Qi, A novel online combustion optimization method for boiler combining dynamic modeling, multi-objective optimization and improved case-based reasoning, Fuel, 337 (2023), 126854. https://doi.org/10.1016/j.fuel.2022.126854
    [20] R. Yadav, A. Giri, S. Chatterjee, Understanding the users' motivation and barriers in adopting healthcare apps: A mixed-method approach using behavioral reasoning theory, Technol. Forecasting Social Change, 183 (2022), 121932. https://doi.org/10.1016/j.techfore.2022.121932 doi: 10.1016/j.techfore.2022.121932
    [21] Z. Zhang, L. Wang, J. Duan, Y. M. Wang, An early warning method based on fuzzy evidential reasoning considering heterogeneous information, Int. J. Disaster Risk Reduct., 82 (2022), 103356. https://doi.org/10.1016/j.ijdrr.2022.103356 doi: 10.1016/j.ijdrr.2022.103356
    [22] Z. Zhao, J. Chen, K. Xu, H. Xie, X. Gan, H. Xu, A spatial case-based reasoning method for regional landslide risk assessment, Int. J. Appl. Earth Obs. Geoinf., 102 (2021), 102381. https://doi.org/10.1016/j.jag.2021.102381 doi: 10.1016/j.jag.2021.102381
    [23] X. Long, H. Li, W. Ren, Y. Du, E. Mao, N. Ding, A parameter-extended case-based reasoning method based on a functional basis for automated experiential reasoning in mechanical product designs, Adv. Eng. Inf., 50 (2021), 101409. https://doi.org/10.1016/j.aei.2021.101409 doi: 10.1016/j.aei.2021.101409
    [24] S. Chen, J. Liu, Y. Xu, A logical reasoning based decision making method for handling qualitative knowledge, Int. J. Approximate Reasoning, 129 (2021), 49–63. https://doi.org/10.1016/j.ijar.2020.11.003 doi: 10.1016/j.ijar.2020.11.003
    [25] A. Wang, X. Gao, A variable scale case-based reasoning method for evidence location in digital forensics, Future Gener. Comput. Syst., 122 (2021), 209–219. https://doi.org/10.1016/j.future.2021.03.019 doi: 10.1016/j.future.2021.03.019
    [26] N. Cercone, A. An, C. Chan, Rule-induction and case-based reasoning: Hybrid architectures appear advantageous, IEEE Trans. Knowl. Data Eng., 11 (1999), 166–174. https://doi.org/10.1109/69.755625 doi: 10.1109/69.755625
    [27] D. Sottara, P. Mello, M. Proctor, A configurable rete-oo engine for reasoning with different types of imperfect information, IEEE Trans. Knowl. Data Eng., 22 (2010), 1535–1548. https://doi.org/10.1109/TKDE.2010.125 doi: 10.1109/TKDE.2010.125
    [28] Y. Cao, Z. Zhou, C. Hu, W. He, S. Tang, On the interpretability of belief rule-based expert systems, IEEE Trans. Fuzzy Syst., 29 (2021), 3489–3503. https://doi.org/10.1109/TFUZZ.2020.3024024 doi: 10.1109/TFUZZ.2020.3024024
    [29] S. Guo, W. Zhou, K. Li, Multi-layer Case-based Reasoning Approach of Complex Product System, in 2012 Third World Congress on Software Engineering, (2012), 107–110. https://doi.org/10.1109/WCSE.2012.27
    [30] R. Ouache, E. Bakhtavar, G. Hu, K. Hewage, R. Sadiq, Evidential reasoning and machine learning-based framework for assessment and prediction of human error factors-induced fire incidents, J. Build. Eng., 49 (2022), 104000. https://doi.org/10.1016/j.jobe.2022.104000 doi: 10.1016/j.jobe.2022.104000
    [31] S. Kierner, J. Kucharski, Z. Kierner, Taxonomy of hybrid architectures involving rule-based reasoning and machine learning in clinical decision systems: A scoping review, J. Biomed. Inf., 144 (2023), 104428. https://doi.org/10.1016/j.jbi.2023.104428 doi: 10.1016/j.jbi.2023.104428
    [32] H. Bride, C. H. Cai, J. Dong, J. S. Dong, Z. Hóu, S. Mirjalili, et al., Silas: A high-performance machine learning foundation for logical reasoning and verification, Expert Syst. Appl., 176 (2021), 114806. https://doi.org/10.1016/j.eswa.2021.114806 doi: 10.1016/j.eswa.2021.114806
    [33] Y. Chen, Z. Dai, H. Yu, B. K. H. Low, T. H. Ho, Recursive reasoning-based training-time adversarial machine learning, Artif. Intell., 315 (2023), 103837. https://doi.org/10.1016/j.artint.2022.103837 doi: 10.1016/j.artint.2022.103837
    [34] L. Bellomarini, R. R. Fayzrakhmanov, G. Gottlob, A. Kravchenko, E. Laurenza, Y. Nenov, et al., Data science with Vadalog: Knowledge Graphs with machine learning and reasoning in practice, Future Gener. Comput. Syst., 129 (2022), 407–422. https://doi.org/10.1016/j.future.2021.10.021 doi: 10.1016/j.future.2021.10.021
    [35] M. Namvar, A. Intezari, S. Akhlaghpour, J. P. Brienza, Beyond effective use: Integrating wise reasoning in machine learning development, Int. J. Inf. Manage., 69 (2023), 102566. https://doi.org/10.1016/j.ijinfomgt.2022.102566 doi: 10.1016/j.ijinfomgt.2022.102566
    [36] J. G. C. Krüger, A. de Souza Britto Jr, J. P. Barddal, An explainable machine learning approach for student dropout prediction, Expert Syst. Appl., 233 (2023), 120933. https://doi.org/10.1016/j.eswa.2023.120933 doi: 10.1016/j.eswa.2023.120933
    [37] R. Gao, S. Cui, H. Xiao, W. Fan, H. Zhang, Y. Wang, Integrating the sentiments of multiple news providers for stock market index movement prediction: A deep learning approach based on evidential reasoning rule, Inf. Sci., 615 (2022), 529–556. https://doi.org/10.1016/j.ins.2022.10.029 doi: 10.1016/j.ins.2022.10.029
    [38] J. Liu, Q. Qian, Reinforcement learning-based knowledge graph reasoning for aluminum alloy applications, Comput. Mater. Sci, 221 (2023), 112075. https://doi.org/10.1016/j.commatsci.2023.112075 doi: 10.1016/j.commatsci.2023.112075
    [39] N. Muslim, S. Islam, J. C. Grégoire, Reinforcement learning based offloading framework for computation service in the edge cloud and core cloud, J. Adv. Inf. Technol., 13 (2022), 139–114. https://doi.org/10.12720/jait.13.2.139-146 doi: 10.12720/jait.13.2.139-146
    [40] I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, Overview of 5g security challenges and solutions, IEEE Commun. Stand. Mag., 2 (2018), 36–43. https://doi.org/10.1109/MCOMSTD.2018.1700063 doi: 10.1109/MCOMSTD.2018.1700063
    [41] H. Hu, J. Wu, Z. Wang, G. Cheng, Mimic defense: a designed-in cybersecurity defense framework, IET Inf. Secur., 12 (2018), 226–237. https://doi.org/10.1049/iet-ifs.2017.0086 doi: 10.1049/iet-ifs.2017.0086
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(384) PDF downloads(32) Cited by(0)

Article outline

Figures and Tables

Figures(4)  /  Tables(11)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog