Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability

•Study the role of uncertainty in the cloud computing resource and service provisioning.•Review sources of uncertainty and approaches for scheduling under uncertainty.•Consider privacy in the presence of the risks of confidentiality, integrity, and availability.•Discuss mitigating the risks of the l...

Full description

Saved in:
Bibliographic Details
Published inJournal of computational science Vol. 36; p. 100581
Main Authors Tchernykh, Andrei, Schwiegelsohn, Uwe, Talbi, El-ghazali, Babenko, Mikhail
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.09.2019
Elsevier
Subjects
Online AccessGet full text
ISSN1877-7503
1877-7511
DOI10.1016/j.jocs.2016.11.011

Cover

Loading…
More Information
Summary:•Study the role of uncertainty in the cloud computing resource and service provisioning.•Review sources of uncertainty and approaches for scheduling under uncertainty.•Consider privacy in the presence of the risks of confidentiality, integrity, and availability.•Discuss mitigating the risks of the loss of information, denial of access, interruptions in connections, and information leakage.•Discuss the challenge of defining a multi-criteria version of the problems. An extensive research has led to a general understanding of uncertainty issues in different fields ranging from computational biology to decision making in economics. However, a study of uncertainty on large scale computing systems and cloud computing systems is limited. Most of works examine uncertainty phenomena in users’ perceptions of the qualities, intentions and actions of cloud providers. In this paper, we discuss the role of uncertainty in the resource and service provisioning, privacy, etc. especially, in the presence of the risks of confidentiality, integrity, and availability. We review sources of uncertainty, and fundamental approaches for scheduling under uncertainty. We also discuss potentials of these approaches, and address methods for mitigating the risks of confidentiality, integrity, and availability associated with the loss of information, denial of access for a long time, and information leakage.
ISSN:1877-7503
1877-7511
DOI:10.1016/j.jocs.2016.11.011