Open Access
ARTICLE
TRS Scheduling for Improved QoS Performance in Cloud System
1 Department of Computer Science and Engineering, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamilnadu, 603203, India
2 Department of Computing Technologies, School of Computing, College of Engineering andTechnology,SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamilnadu, 603203, India
* Corresponding Author: M. Baskar. Email:
Computers, Materials & Continua 2023, 75(1), 1547-1559. https://doi.org/10.32604/cmc.2023.033300
Received 13 June 2022; Accepted 14 December 2022; Issue published 06 February 2023
Abstract
Numerous methods are analysed in detail to improve task scheduling and data security performance in the cloud environment. The methods involve scheduling according to the factors like makespan, waiting time, cost, deadline, and popularity. However, the methods are inappropriate for achieving higher scheduling performance. Regarding data security, existing methods use various encryption schemes but introduce significant service interruption. This article sketches a practical Real-time Application Centric TRS (Throughput-Resource utilization–Success) Scheduling with Data Security (RATRSDS) model by considering all these issues in task scheduling and data security. The method identifies the required resource and their claim time by receiving the service requests. Further, for the list of resources as services, the method computes throughput support (Thrs) according to the number of statements executed and the complete statements of the service. Similarly, the method computes Resource utilization support (Ruts) according to the idle time on any duty cycle and total servicing time. Also, the method computes the value of Success support (Sus) according to the number of completions for the number of allocations. The method estimates the TRS score (Throughput Resource utilization Success) for different resources using all these support measures. According to the value of the TRS score, the services are ranked and scheduled. On the other side, based on the requirement of service requests, the method computes Requirement Support (RS). The selection of service is performed and allocated. Similarly, choosing the route according to the Route Support Measure (RSM) enforced route security. Finally, data security has gets implemented with a service-based encryption technique. The RATRSDS scheme has claimed higher performance in data security and scheduling.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.