Question: In this project, you are going to implement a security-aware task scheduling policy using the CloudSim toolkit. Your implementation should assume a heterogenous environment with

 In this project, you are going to implement a security-aware task

In this project, you are going to implement a security-aware task scheduling policy using the CloudSim toolkit. Your implementation should assume a heterogenous environment with the following specifications: 1. Each task (cloudlet) has a different performance requirement. 2. Each VM has a different processing capacity. 3. Each task has a set of security requirements, following the taxonomy defined in [1]. 4. Each VM has a set of security measures, following the taxonomy defined in [1]. 5. Assume a datacenter with two hosts, each with 5VMs. 6. The taskset must contain 100 randomly generated tasks whose security requirements are randomly assigned. Your scheduling policy should work as follows: a. Each task must be assigned to a VM that supports all its security requirements. b. If there is no available VM that supports all of a particular task's security requirements, that tasks should be scheduled on a VM that supports no less than 60% of its security requirements. - Simulate your scheduling policy 50 times and report the following: Average task completion time. Security satisfaction ratio defined as the percentage of tasks scheduled on VMs that support at lean 75% of their security requirements. Show the histogram of the task completion times and the security satisfaction ratio. - Compare your results to a non-security-aware policy in which tasks are scheduled based on their processing demands only. [1] Al-Tarawneh, M.A.B. Bi-objective optimization of application placement in fog computing environments. J Ambient Intell Human Comput 13, 445-468 (2022). https://doi.org/10.1007/s12652-021-02910-w In this project, you are going to implement a security-aware task scheduling policy using the CloudSim toolkit. Your implementation should assume a heterogenous environment with the following specifications: 1. Each task (cloudlet) has a different performance requirement. 2. Each VM has a different processing capacity. 3. Each task has a set of security requirements, following the taxonomy defined in [1]. 4. Each VM has a set of security measures, following the taxonomy defined in [1]. 5. Assume a datacenter with two hosts, each with 5VMs. 6. The taskset must contain 100 randomly generated tasks whose security requirements are randomly assigned. Your scheduling policy should work as follows: a. Each task must be assigned to a VM that supports all its security requirements. b. If there is no available VM that supports all of a particular task's security requirements, that tasks should be scheduled on a VM that supports no less than 60% of its security requirements. - Simulate your scheduling policy 50 times and report the following: Average task completion time. Security satisfaction ratio defined as the percentage of tasks scheduled on VMs that support at lean 75% of their security requirements. Show the histogram of the task completion times and the security satisfaction ratio. - Compare your results to a non-security-aware policy in which tasks are scheduled based on their processing demands only. [1] Al-Tarawneh, M.A.B. Bi-objective optimization of application placement in fog computing environments. J Ambient Intell Human Comput 13, 445-468 (2022). https://doi.org/10.1007/s12652-021-02910-w

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!