dc.contributor.author |
Llwaah, Faris |
|
dc.date.accessioned |
2024-08-23T21:54:19Z |
|
dc.date.available |
2024-08-23T21:54:19Z |
|
dc.date.issued |
2024-08-24 |
|
dc.identifier.uri |
https://journal.uob.edu.bh:443/handle/123456789/5844 |
|
dc.description.abstract |
Increasing the number of applications with data-intensive workflows, like healthcare workflow, has led to a tendency to embed highly popular cloud computing in the matter of delivering substantial computing resources, and ensuring the security and performance of these complex applications is of utmost importance while estimating sufficient execution time and the amount of resources required for deployment. While that cloud-based execution time includes CPU time, I/O operations, and security time, particularly for workflows involving big data. However, in our previous work, we introduced a methodology to model, simulate, and predict the runtime of big data workflow, including intricate Next Generation Sequencing (NGS) pipelines. This simulation approach provides a realistic estimate of the runtime for test data that is much larger than the training data used. In this paper, we tackle the problem of predicting big data workflow security time performance using a simulation model that takes the (Advanced Encryption Standard) AES algorithm into account. To precisely assess the runtime impact, our methodology entails modeling and simulating the encryption and decryption procedures within big data workflows. We demonstrate our method's effectiveness in generating precise runtime predictions and validate it using an NGS pipeline implemented in e-Science Central. For ensuring optimization performance without compromising data security, the results show the importance of considering security overhead in the NGS pipeline. However, this work makes contributions to the field by applying a practical simulation framework based on WorkflowSim to predict security-related performance impacts. The results confirm an exponential relationship between the stable execution time of implementing security algorithms and the volume of processed big data, indicating that the time doubles as the data volume doubles. |
en_US |
dc.publisher |
University of Bahrain |
en_US |
dc.subject |
Big data workflow, Data-Intensive simulation, cloud computing, WorkflowSim, Next Generation Sequencing NGS, Advanced Encryption Standard AES, security time performance, I/O operations |
en_US |
dc.title |
Security Time Prediction of Big Data Workflows with AES Algorithm-aware Simulation |
en_US |
dc.identifier.doi |
xxxxxx |
|
dc.volume |
16 |
en_US |
dc.issue |
1 |
en_US |
dc.pagestart |
1 |
en_US |
dc.pageend |
11 |
en_US |
dc.contributor.authorcountry |
United Kingdom (Great Britain |
en_US |
dc.contributor.authoraffiliation |
University of Mosul |
en_US |
dc.source.title |
International Journal of Computing and Digital Systems |
en_US |
dc.abbreviatedsourcetitle |
IJCDS |
en_US |