Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient when virtual machines and other resources work up to their full potential. The main factor that influences the quality of cloud services is the distribution of workflow on virtual machines (VMs). Scheduling tasks to VMs depends on the type of workflow and mechanism of resource allocation. Scientific workflows include large-scale data transfer and consume intensive resources of cloud infrastructures. Therefore, scheduling of tasks from scientific workflows on VMs requires efficient and optimized workflow scheduling techniques. This paper proposes an optimised workflow scheduling approach that aims to improve the utilization of cloud resources without increasing execution time and execution cost.<\/p>","DOI":"10.4018\/ijcac.324809","type":"journal-article","created":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T16:13:22Z","timestamp":1687364002000},"page":"1-25","source":"Crossref","is-referenced-by-count":10,"title":["Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment"],"prefix":"10.4018","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4731-5179","authenticated-orcid":true,"given":"Kamlesh","family":"Lakhwani","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, JECRC University, Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6412-0392","authenticated-orcid":true,"given":"Gajanand","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, JECRC University, Jaipur, India"}]},{"given":"Ramandeep","family":"Sandhu","sequence":"additional","affiliation":[{"name":"School of Computer Science Engineering, Lovely Professional University (LPU), Jalandhar, India"}]},{"given":"Naresh Kumar","family":"Nagwani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology, Raipur, India"}]},{"given":"Sandeep","family":"Bhargava","sequence":"additional","affiliation":[{"name":"EHR Logic IT Services Pvt. Ltd., India"}]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[{"name":"Department of Business Administration, Asia University, Taiwan & Lebanese American University, Beirut, Lebanon & Chandigarh University, Chandigarh, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8808-6114","authenticated-orcid":true,"given":"Ammar","family":"Almomani","sequence":"additional","affiliation":[{"name":"School of Computing, Skyline University College, Sharjah, UAE & Al- Balqa Applied University, Jordan"}]}],"member":"2432","reference":[{"key":"IJCAC.324809-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.004"},{"key":"IJCAC.324809-1","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2015.8.5.24"},{"key":"IJCAC.324809-2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04220-y"},{"key":"IJCAC.324809-3","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297102"},{"key":"IJCAC.324809-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.055"},{"key":"IJCAC.324809-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.023"},{"key":"IJCAC.324809-6","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-014-9294-7"},{"key":"IJCAC.324809-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.07.021"},{"key":"IJCAC.324809-8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2994015"},{"key":"IJCAC.324809-9","first-page":"746","article-title":"Scientific workflow: a survey and research directions.","author":"A.Barker","journal-title":"International Conference on Parallel Processing and Applied Mathematics"},{"key":"IJCAC.324809-10","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297106"},{"key":"IJCAC.324809-11","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2017.083116"},{"key":"IJCAC.324809-12","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2022010105"},{"key":"IJCAC.324809-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.001"},{"key":"IJCAC.324809-14","unstructured":"C., Nigam, G., Sharma, & Menghani. (2022). Comprehensive Review and Analysis on Mobile Cloud Computing and Users Offloading using Improved Optimization Approach for Edge Computing. Int J Intell Syst Appl Eng, 10(1)."},{"key":"IJCAC.324809-15","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"IJCAC.324809-16","doi-asserted-by":"publisher","DOI":"10.1109\/32.4634"},{"key":"IJCAC.324809-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.005"},{"key":"IJCAC.324809-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.008"},{"key":"IJCAC.324809-19","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0275-6"},{"key":"IJCAC.324809-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.093"},{"key":"IJCAC.324809-21","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.2021040103"},{"key":"IJCAC.324809-22","doi-asserted-by":"crossref","unstructured":"Farhat, P., Sami, H., & Mourad, A. (2020). Reinforcement R-learning model for time scheduling of on-demand fog placement. Journal of Supercomputing, 76, 388-410.","DOI":"10.1007\/s11227-019-03032-z"},{"key":"IJCAC.324809-23","doi-asserted-by":"publisher","DOI":"10.1002\/int.23048"},{"key":"IJCAC.324809-24","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.285593"},{"key":"IJCAC.324809-25","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.22"},{"key":"IJCAC.324809-26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.421"},{"key":"IJCAC.324809-27","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., Joshi, R. C., & Misra, M. (2009). Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, 18(5), 224-247.","DOI":"10.1080\/19393550903317070"},{"key":"IJCAC.324809-28","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., Li, K. C., Leung, V. C., Psannis, K. E., & Yamaguchi, S. (2021). Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA Journal of Automatica Sinica, 8(12), 1877-1890.","DOI":"10.1109\/JAS.2021.1004003"},{"key":"IJCAC.324809-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.038"},{"key":"IJCAC.324809-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.008"},{"key":"IJCAC.324809-31","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2022.2075086"},{"key":"IJCAC.324809-32","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0792-66"},{"key":"IJCAC.324809-33","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.2.480-487"},{"key":"IJCAC.324809-34","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-017-9391-5"},{"key":"IJCAC.324809-35","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"IJCAC.324809-36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2993326"},{"key":"IJCAC.324809-37","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01105-y"},{"issue":"1","key":"IJCAC.324809-38","first-page":"1","article-title":"Cat-squirrel optimization algorithm for VM migration in a cloud computing platform.","volume":"18","author":"A.Kumar","year":"2022","journal-title":"International Journal on Semantic Web and Information Systems"},{"key":"IJCAC.324809-39","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311033"},{"key":"IJCAC.324809-40","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00380-9"},{"key":"IJCAC.324809-41","doi-asserted-by":"publisher","DOI":"10.1145\/3430507"},{"key":"IJCAC.324809-42","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3942"},{"key":"IJCAC.324809-43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.004"},{"key":"IJCAC.324809-44","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.300360"},{"key":"IJCAC.324809-45","unstructured":"Mehta, G., Juve, G., & Chen, W. (2016). Workflow generator. https:\/\/confluence. pegasus. isi. edu\/display\/pegasus\/WorkflowGenerator"},{"key":"IJCAC.324809-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"IJCAC.324809-47","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00747-w"},{"issue":"4","key":"IJCAC.324809-48","first-page":"5","article-title":"Task scheduling optimization in heterogeneous distributed systems.","volume":"107","author":"A. A.Nasr","year":"2014","journal-title":"Int. J. Comput. Appl"},{"key":"IJCAC.324809-49","unstructured":"Negi, P., Mishra, A., & Gupta, B. B. (2013). Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. arXiv preprint arXiv:1304.7073."},{"key":"IJCAC.324809-50","doi-asserted-by":"crossref","unstructured":"Onyebuchi, A., Matthew, U. O., Kazaure, J. S., Okafor, N. U., Okey, O. D., Okochi, P. I., ... Matthew, A. O. (2022). Business demand for a cloud enterprise data warehouse in electronic healthcare computing: Issues and developments in e-healthcare cloud. Academic Press.","DOI":"10.4018\/IJCAC.297098"},{"key":"IJCAC.324809-51","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2013.14"},{"key":"IJCAC.324809-52","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2018.07.04"},{"key":"IJCAC.324809-53","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE46687.2019.9015603"},{"key":"IJCAC.324809-54","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311035"},{"key":"IJCAC.324809-55","first-page":"286","article-title":"Multi objective task scheduling algorithm for cloud computing using whale optimization technique.","author":"G. N.Reddy","journal-title":"International Conference on Next Generation Computing Technologies"},{"key":"IJCAC.324809-56","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2556668"},{"key":"IJCAC.324809-57","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2314655"},{"key":"IJCAC.324809-58","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4041"},{"key":"IJCAC.324809-59","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7985-8_14"},{"key":"IJCAC.324809-60","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00329-y"},{"key":"IJCAC.324809-61","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2021100110"},{"key":"IJCAC.324809-62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2014.7001474"},{"key":"IJCAC.324809-63","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2005.11.002"},{"key":"IJCAC.324809-64","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.2021010103"},{"key":"IJCAC.324809-65","doi-asserted-by":"publisher","DOI":"10.5121\/ijccsa.2013.3603"},{"key":"IJCAC.324809-66","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975496"},{"key":"IJCAC.324809-67","unstructured":"Sossa, M. A. R. (2016). Resource provisioning and scheduling algorithms for scientific workflows in cloud computing environments [PhD thesis]. University of Melbourne, Department of Computing and Information Systems."},{"key":"IJCAC.324809-68","doi-asserted-by":"publisher","DOI":"10.1145\/3426972"},{"key":"IJCAC.324809-69","doi-asserted-by":"publisher","DOI":"10.1002\/9780470496916"},{"key":"IJCAC.324809-70","doi-asserted-by":"crossref","unstructured":"Vecchiola, C., Pandey, S., & Buyya, R. (2009). Highperformance cloud computing: A view of scientific applications. In 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (pp. 4\u201316). IEEE.","DOI":"10.1109\/I-SPAN.2009.150"},{"key":"IJCAC.324809-71","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-015-9344-9"},{"key":"IJCAC.324809-72","doi-asserted-by":"publisher","DOI":"10.1145\/1996109.1996114"},{"key":"IJCAC.324809-73","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2694426"},{"key":"IJCAC.324809-74","article-title":"Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns.","author":"Z.Xu","year":"2021","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"IJCAC.324809-75","first-page":"1","article-title":"Cloud computing research and security issues.","author":"J.Yang","journal-title":"2010 International Conference on Computational Intelligence and Software Engineering"},{"key":"IJCAC.324809-76","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-005-9010-8"},{"key":"IJCAC.324809-77","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.003"},{"key":"IJCAC.324809-78","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"IJCAC.324809-79","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4162-z"},{"key":"IJCAC.324809-80","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.80"},{"key":"IJCAC.324809-81","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2446459"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=324809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T10:03:59Z","timestamp":1699956239000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.324809"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2023,6,21]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.324809","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,21]]}}}