{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T22:00:35Z","timestamp":1709589635794},"reference-count":55,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia","award":["IFP-2022-34"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"The problem treated in this article is the storage of sensitive data in the cloud environment and how to choose regions and zones to minimize the number of transfer file events. Handling sensitive data in the global internet network many times can increase risks and minimize security levels. Our work consists of scheduling several files on the different regions based on the security and load balancing parameters in the cloud. Each file is characterized by its size. If data is misplaced from the start it will require a transfer from one region to another and sometimes from one area to another. The objective is to find a schedule that assigns these files to the appropriate region ensuring the load balancing executed in each region to guarantee the minimum number of migrations. This problem is NP-hard. A novel model regarding the regional security and load balancing of files in the cloud environment is proposed in this article. This model is based on the component called \u201cScheduler\u201d which utilizes the proposed algorithms to solve the problem. This model is a secure solution to guarantee an efficient dispersion of the stored files to avoid the most storage in one region. Consequently, damage to this region does not cause a loss of big data. In addition, a novel method called the \u201cGrouping method\u201d is proposed. Several variants of the application of this method are utilized to propose novel algorithms for solving the studied problem. Initially, seven algorithms are proposed in this article. The experimental results show that there is no dominance between these algorithms. Therefore, three combinations of these seven algorithms generate three other algorithms with better results. Based on the dominance rule, only six algorithms are selected to discuss the performance of the proposed algorithms. Four classes of instances are generated to measure and test the performance of algorithms. In total, 1,360 instances are tested. Three metrics are used to assess the algorithms and make a comparison between them. The experimental results show that the best algorithm is the \u201cBest-value of four algorithms\u201d in 86.5% of cases with an average gap of 0.021 and an average running time of 0.0018 s.<\/jats:p>","DOI":"10.7717\/peerj-cs.1513","type":"journal-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T07:17:42Z","timestamp":1701501462000},"page":"e1513","source":"Crossref","is-referenced-by-count":0,"title":["A secure solution based on load-balancing algorithms between regions in the cloud environment"],"prefix":"10.7717","volume":"9","author":[{"given":"Sarah","family":"Eljack","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Majmaah, Saudi Arabia"}]},{"given":"Mahdi","family":"Jemmali","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Majmaah, Saudi Arabia"},{"name":"Mars Laboratory, University of Sousse, Sousse, Tunisia"},{"name":"Department of Computer Science, Higher Institute of Computer Science and Mathematics, University of Monastir, Monastir, Tunisia"}]},{"given":"Mohsen","family":"Denden","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Technologies, College of Telecommunication and Information, Technical and Vocational Training Corporation TV TC, Riyadh CTI, Saudi Arabia"},{"name":"Department of Computer Science, Higher Institute of Applied Sciences of Sousse, Sousse University, Sousse, Tunisia"}]},{"given":"Sadok","family":"Turki","sequence":"additional","affiliation":[{"name":"Department of Logistic and Maintenance, UFR MIM at Metz, University of Lorraine, Metz, France"}]},{"given":"Wael M.","family":"Khedr","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Majmaah, Saudi Arabia"},{"name":"Department of Mathematics, Faculty of Science, Zagazig University, Zagazig, Egypt"}]},{"given":"Abdullah M.","family":"Algashami","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Majmaah, Saudi Arabia"}]},{"given":"Mutasim","family":"ALsadig","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information, College of Science at Zulfi, Majmaah University, Majmaah, Saudi Arabia"}]}],"member":"4443","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"10.7717\/peerj-cs.1513\/ref-1","doi-asserted-by":"publisher","first-page":"102994","DOI":"10.1016\/j.jnca.2021.102994","article-title":"A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices","volume":"180","author":"Aburukba","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"10.7717\/peerj-cs.1513\/ref-2","first-page":"1676","article-title":"Heuristics to optimize the reading of railway sensors data","author":"Al\u00a0Fayez","year":"2019"},{"key":"10.7717\/peerj-cs.1513\/ref-3","first-page":"137","article-title":"A survey of load balancing in cloud computing: challenges and algorithms","author":"Al\u00a0Nuaimi","year":"2012"},{"key":"10.7717\/peerj-cs.1513\/ref-4","doi-asserted-by":"publisher","first-page":"17331","DOI":"10.1109\/ACCESS.2020.2964952","article-title":"Ensemble methods for instance-based arabic language authorship attribution","volume":"8","author":"Al-Sarem","year":"2020","journal-title":"IEEE Access"},{"key":"10.7717\/peerj-cs.1513\/ref-5","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/3607547","article-title":"Algorithms for investment project distribution on regions","volume":"2020","author":"Alharbi","year":"2020","journal-title":"Computational Intelligence and Neuroscience"},{"issue":"3","key":"10.7717\/peerj-cs.1513\/ref-6","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MWC.001.2000428","article-title":"Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles","volume":"28","author":"Alladi","year":"2021","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"10.7717\/peerj-cs.1513\/ref-7","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s11277-021-08524-x","article-title":"Fixed urgent window pass for a wireless network with user preferences","volume":"120","author":"Alquhayz","year":"2021","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10.7717\/peerj-cs.1513\/ref-8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5755\/j01.itc.50.1.25531","article-title":"Max-min processors scheduling","volume":"50","author":"Alquhayz","year":"2021","journal-title":"Information Technology and Control"},{"key":"10.7717\/peerj-cs.1513\/ref-9","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/1072485","article-title":"Dispatching-rule variants algorithms for used spaces of storage supports","volume":"2020","author":"Alquhayz","year":"2020","journal-title":"Discrete Dynamics in Nature and Society"},{"issue":"2","key":"10.7717\/peerj-cs.1513\/ref-10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.38094\/jastt1219","article-title":"Comparison among cloud technologies and cloud performance","volume":"1","author":"Alzakholi","year":"2020","journal-title":"Journal of Applied Science and Technology Trends"},{"issue":"24","key":"10.7717\/peerj-cs.1513\/ref-11","doi-asserted-by":"publisher","first-page":"e4295","DOI":"10.1002\/cpe.4295","article-title":"FFBAT: a security and cost-aware workflow scheduling approach combining firefly and bat algorithms","volume":"29","author":"Arunarani","year":"2017","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.7717\/peerj-cs.1513\/ref-12","first-page":"1","article-title":"Task scheduling in cloud computing environment by grey wolf optimizer","author":"Bacanin","year":"2019"},{"key":"10.7717\/peerj-cs.1513\/ref-13","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-981-15-7106-0_16","article-title":"Enhanced flower pollination algorithm for task scheduling in cloud computing environment","volume-title":"Machine learning for predictive analysis","author":"Bezdan","year":"2021"},{"key":"10.7717\/peerj-cs.1513\/ref-14","first-page":"35","article-title":"Spatio-temporal modeling for knowledge discovery in satellite image databases","author":"Boulila","year":"2010"},{"issue":"9","key":"10.7717\/peerj-cs.1513\/ref-15","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1109\/TPDS.2017.2678507","article-title":"Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds","volume":"28","author":"Chen","year":"2017","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.7717\/peerj-cs.1513\/ref-16","doi-asserted-by":"publisher","first-page":"59326","DOI":"10.1109\/ACCESS.2020.2982592","article-title":"Servicing your requirements: an fca and rca-driven approach for semantic web services composition","volume":"8","author":"Driss","year":"2020","journal-title":"IEEE Access"},{"issue":"6","key":"10.7717\/peerj-cs.1513\/ref-17","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1109\/TPDS.2012.257","article-title":"A truthful dynamic workflow scheduling mechanism for commercial multicloud environments","volume":"24","author":"Fard","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.7717\/peerj-cs.1513\/ref-18","first-page":"71","article-title":"Exploration of secured workflow scheduling models in cloud environment: a survey","author":"Francis","year":"2018"},{"issue":"23","key":"10.7717\/peerj-cs.1513\/ref-19","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.3390\/rs11232852","article-title":"Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network","volume":"11","author":"Ghaleb","year":"2019","journal-title":"Remote Sensing"},{"key":"10.7717\/peerj-cs.1513\/ref-20","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jnca.2017.04.007","article-title":"Load-balancing algorithms in cloud computing: a survey","volume":"88","author":"Ghomi","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"10.7717\/peerj-cs.1513\/ref-21","article-title":"Genetic-based task scheduling algorithm in cloud computing environment","volume":"7","author":"Hamad","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"6","key":"10.7717\/peerj-cs.1513\/ref-22","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.1109\/TNET.2019.2953806","article-title":"OnDisc: online latency-sensitive job dispatching and scheduling in heterogeneous edge-clouds","volume":"27","author":"Han","year":"2019","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.7717\/peerj-cs.1513\/ref-23","first-page":"1162","article-title":"Bounding strategies for scheduling on identical parallel machines","author":"Haouari","year":"2006"},{"issue":"1","key":"10.7717\/peerj-cs.1513\/ref-24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.24846\/v31i1y202207","article-title":"Near-optimal solutions for mold constraints on two parallel machines","volume":"31","author":"Hmida","year":"2022","journal-title":"Studies in Informatics and Control"},{"key":"10.7717\/peerj-cs.1513\/ref-25","doi-asserted-by":"publisher","first-page":"100841","DOI":"10.1016\/j.swevo.2021.100841","article-title":"Task scheduling in cloud computing based on meta-heuristics: review, taxonomy, open challenges, and future trends","volume":"62","author":"Houssein","year":"2021","journal-title":"Swarm and Evolutionary Computation"},{"issue":"6","key":"10.7717\/peerj-cs.1513\/ref-26","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/TPDS.2019.2960226","article-title":"Faster parallel core maintenance algorithms in dynamic graphs","volume":"31","author":"Hua","year":"2019","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.7717\/peerj-cs.1513\/ref-27","volume-title":"Cloud computing task scheduling model based on improved whale optimization algorithm. Wireless communications and mobile computing","author":"Jia","year":"2021"},{"issue":"11","key":"10.7717\/peerj-cs.1513\/ref-28","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2019.0101177","article-title":"Budgets balancing algorithms for the projects assignment","volume":"10","author":"Jemmali","year":"2019","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"10.7717\/peerj-cs.1513\/ref-29","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1051\/ro\/2021043","article-title":"An optimal solution for the budgets assignment problem","volume":"55","author":"Jemmali","year":"2021","journal-title":"RAIRO-Operations Research"},{"issue":"3","key":"10.7717\/peerj-cs.1513\/ref-30","doi-asserted-by":"crossref","DOI":"10.14201\/ADCAIJ2021103293305","article-title":"Projects distribution algorithms for regional development","volume":"10","author":"Jemmali","year":"2021","journal-title":"ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal"},{"issue":"1","key":"10.7717\/peerj-cs.1513\/ref-31","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s40747-021-00524-5","article-title":"Intelligent algorithms and complex system for a smart parking for vaccine delivery center of COVID-19","volume":"8","author":"Jemmali","year":"2022","journal-title":"Complex & Intelligent Systems"},{"issue":"4","key":"10.7717\/peerj-cs.1513\/ref-32","doi-asserted-by":"crossref","first-page":"43","DOI":"10.17512\/jamcm.2021.4.04","article-title":"Mathematical model bounds for maximizing the minimum completion time problem","volume":"20","author":"Jemmali","year":"2021","journal-title":"Journal of Applied Mathematics and Computational Mechanics"},{"key":"10.7717\/peerj-cs.1513\/ref-33","first-page":"297","article-title":"Equity data distribution algorithms on identical routers","author":"Jemmali","year":"2020"},{"key":"10.7717\/peerj-cs.1513\/ref-34","first-page":"1","article-title":"Time-slots transmission data algorithms into network","author":"Jemmali","year":"2020"},{"key":"10.7717\/peerj-cs.1513\/ref-35","first-page":"1","article-title":"An efficient optimization of battery-drone-based transportation systems for monitoring solar power plant","author":"Jemmali","year":"2022","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"10.7717\/peerj-cs.1513\/ref-36","first-page":"1","article-title":"Quick dispatching-rules-based solution for the two parallel machines problem under mold constraints","volume":"17","author":"Jemmali","year":"2023","journal-title":"Flexible Services and Manufacturing Journal"},{"issue":"4","key":"10.7717\/peerj-cs.1513\/ref-37","doi-asserted-by":"publisher","first-page":"2721","DOI":"10.1051\/ro\/2022094","article-title":"Real time read-frequency optimization for railway monitoring system","volume":"56","author":"Jemmali","year":"2022","journal-title":"RAIRO-Operations Research"},{"key":"10.7717\/peerj-cs.1513\/ref-38","first-page":"949","article-title":"Randomized-variants lower bounds for gas turbines aircraft engines","author":"Jemmali","year":"2019"},{"issue":"1","key":"10.7717\/peerj-cs.1513\/ref-39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-99269-x","article-title":"Smart-parking management algorithms in smart city","volume":"12","author":"Jemmali","year":"2022","journal-title":"Scientific Reports"},{"issue":"3","key":"10.7717\/peerj-cs.1513\/ref-40","doi-asserted-by":"crossref","first-page":"637","DOI":"10.26713\/cma.v10i3.1218","article-title":"Lower bounds for gas turbines aircraft engines","volume":"10","author":"Jemmali","year":"2019","journal-title":"Communications in Mathematics and Applications"},{"key":"10.7717\/peerj-cs.1513\/ref-41","doi-asserted-by":"publisher","first-page":"e819","DOI":"10.7717\/peerj-cs.819","article-title":"Equity distribution of quality evaluation reports to doctors in health care organizations","volume":"8","author":"Jemmali","year":"2022","journal-title":"PeerJ Computer Science"},{"key":"10.7717\/peerj-cs.1513\/ref-42","first-page":"19","article-title":"Max-min probabilistic algorithms for parallel machines","author":"Jemmali","year":"2020"},{"issue":"1","key":"10.7717\/peerj-cs.1513\/ref-43","doi-asserted-by":"publisher","first-page":"2","DOI":"10.2991\/ijndc.2013.1.1.2","article-title":"A view of cloud computing","volume":"1","author":"Lee","year":"2013","journal-title":"International Journal of Networked and Distributed Computing"},{"key":"10.7717\/peerj-cs.1513\/ref-44","doi-asserted-by":"publisher","first-page":"43","DOI":"10.5772\/intechopen.69224v","article-title":"Heuristics techniques for scheduling problems with reducing waiting time variance","volume-title":"Heuristics and hyper-heuristics-principles and applications","author":"Mahapatra","year":"2017"},{"key":"10.7717\/peerj-cs.1513\/ref-45","first-page":"1","article-title":"Intelligent real-time intervention system applied in smart city","author":"Melhim","year":"2018"},{"issue":"6","key":"10.7717\/peerj-cs.1513\/ref-46","doi-asserted-by":"crossref","first-page":"4219","DOI":"10.1109\/TII.2020.2995348","article-title":"Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications","volume":"17","author":"Meng","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.7717\/peerj-cs.1513\/ref-47","first-page":"1","article-title":"Swarm intelligence and data mining: a review of literature and applications in healthcare","author":"Nayar","year":"2019"},{"key":"10.7717\/peerj-cs.1513\/ref-48","doi-asserted-by":"publisher","first-page":"e851","DOI":"10.7717\/peerj-cs.851","article-title":"A three-stage heuristic task scheduling for optimizing the service level agreement satisfaction in device-edge-cloud cooperative computing","volume":"8","author":"Sang","year":"2022","journal-title":"PeerJ Computer Science"},{"issue":"3","key":"10.7717\/peerj-cs.1513\/ref-49","doi-asserted-by":"publisher","first-page":"e0278183","DOI":"10.1371\/journal.pone.0278183","article-title":"Novel intelligent architecture and approximate solution for future networks","volume":"18","author":"Sarhan","year":"2023","journal-title":"PLOS ONE"},{"issue":"2","key":"10.7717\/peerj-cs.1513\/ref-50","doi-asserted-by":"crossref","first-page":"737","DOI":"10.24297\/ijct.v4i2C2.4194","article-title":"Analysis of load balancing techniques in cloud computing","volume":"4","author":"Sidhu","year":"2013","journal-title":"International Journal of Computers & Technology"},{"key":"10.7717\/peerj-cs.1513\/ref-51","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","article-title":"Cloud security issues and challenges: a survey","volume":"79","author":"Singh","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"10.7717\/peerj-cs.1513\/ref-52","doi-asserted-by":"crossref","first-page":"5794","DOI":"10.1109\/JIOT.2020.3033265","article-title":"Hierarchical security paradigm for iot multiaccess edge computing","volume":"8","author":"Singh","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"10.7717\/peerj-cs.1513\/ref-53","first-page":"64","article-title":"Cloud task scheduling based on ant colony optimization","author":"Tawfeek","year":"2013"},{"key":"10.7717\/peerj-cs.1513\/ref-54","doi-asserted-by":"publisher","first-page":"205635","DOI":"10.1109\/ACCESS.2020.3037965","article-title":"A study on heuristic task scheduling optimizing task deadline violations in heterogeneous computational environments","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"issue":"7","key":"10.7717\/peerj-cs.1513\/ref-55","doi-asserted-by":"publisher","first-page":"6398","DOI":"10.1109\/TVT.2018.2799620","article-title":"Mobile edge computing empowered energy efficient task offloading in 5G","volume":"67","author":"Yang","year":"2018","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-1513.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1513.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1513.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1513.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T07:17:59Z","timestamp":1701501479000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-1513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"references-count":55,"alternative-id":["10.7717\/peerj-cs.1513"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.1513","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.7287\/peerj-cs.1513v0.1\/reviews\/1","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1513v0.1\/reviews\/2","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1513v0.2\/reviews\/1","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1513v0.2\/reviews\/2","asserted-by":"object"}]},"ISSN":["2376-5992"],"issn-type":[{"value":"2376-5992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"article-number":"e1513"}}