{"id":"https://openalex.org/W4414451423","doi":"https://doi.org/10.1002/spy2.70104","title":"Toward Efficient and Secure Task Scheduling Using Trust Optimizer Multi\u2010Cloud Scheduler","display_name":"Toward Efficient and Secure Task Scheduling Using Trust Optimizer Multi\u2010Cloud Scheduler","publication_year":2025,"publication_date":"2025-09-23","ids":{"openalex":"https://openalex.org/W4414451423","doi":"https://doi.org/10.1002/spy2.70104"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70104","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70104","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119711347","display_name":"Bharti Nikose","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153931","display_name":"D.Y. Patil University","ror":"https://ror.org/045qb5273","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210153931"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bharti Nikose","raw_affiliation_strings":["Department of Computer Engineering Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India","Department of Computer Engineering, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul, Navi Mumbai, Maharashtra, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India","institution_ids":["https://openalex.org/I4210153931"]},{"raw_affiliation_string":"Department of Computer Engineering, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul, Navi Mumbai, Maharashtra, India","institution_ids":["https://openalex.org/I4210153931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042089267","display_name":"Gautam M. Borkar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153931","display_name":"D.Y. Patil University","ror":"https://ror.org/045qb5273","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210153931"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gautam M. Borkar","raw_affiliation_strings":["Department of Information Technology Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India","Department of Information Technology, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul, Navi Mumbai, Maharashtra, India"],"raw_orcid":"https://orcid.org/0009-0005-7908-3199","affiliations":[{"raw_affiliation_string":"Department of Information Technology Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India","institution_ids":["https://openalex.org/I4210153931"]},{"raw_affiliation_string":"Department of Information Technology, Ramrao Adik Institute of Technology, DY Patil Deemed to be University, Nerul, Navi Mumbai, Maharashtra, India","institution_ids":["https://openalex.org/I4210153931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042089267"],"corresponding_institution_ids":["https://openalex.org/I4210153931"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":2.9051,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92990765,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6333000063896179},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5149999856948853},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.49059998989105225},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44850000739097595},{"id":"https://openalex.org/keywords/job-shop-scheduling","display_name":"Job shop scheduling","score":0.4180000126361847},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41679999232292175},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.400299996137619},{"id":"https://openalex.org/keywords/dynamic-priority-scheduling","display_name":"Dynamic priority scheduling","score":0.37540000677108765},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.3619999885559082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8431000113487244},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.671999990940094},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6333000063896179},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5149999856948853},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44850000739097595},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41929998993873596},{"id":"https://openalex.org/C55416958","wikidata":"https://www.wikidata.org/wiki/Q6206757","display_name":"Job shop scheduling","level":3,"score":0.4180000126361847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.400299996137619},{"id":"https://openalex.org/C107568181","wikidata":"https://www.wikidata.org/wiki/Q5319000","display_name":"Dynamic priority scheduling","level":3,"score":0.37540000677108765},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3336000144481659},{"id":"https://openalex.org/C122141398","wikidata":"https://www.wikidata.org/wiki/Q5456330","display_name":"Fixed-priority pre-emptive scheduling","level":5,"score":0.32899999618530273},{"id":"https://openalex.org/C31689143","wikidata":"https://www.wikidata.org/wiki/Q733809","display_name":"Fair-share scheduling","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.2953000068664551},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2842999994754791},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C175893541","wikidata":"https://www.wikidata.org/wiki/Q1196582","display_name":"Round-robin scheduling","level":4,"score":0.2685999870300293},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C119948110","wikidata":"https://www.wikidata.org/wiki/Q7858726","display_name":"Two-level scheduling","level":4,"score":0.26080000400543213},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.25940001010894775},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70104","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70104","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2118676041","https://openalex.org/W2795170223","https://openalex.org/W2982223210","https://openalex.org/W3004652046","https://openalex.org/W3085760006","https://openalex.org/W3090866681","https://openalex.org/W3138090604","https://openalex.org/W3204337244","https://openalex.org/W4293764232","https://openalex.org/W4297836393","https://openalex.org/W4311185526","https://openalex.org/W4387183101","https://openalex.org/W4388412059","https://openalex.org/W4389320247","https://openalex.org/W4394573751","https://openalex.org/W4401011499","https://openalex.org/W4401831502","https://openalex.org/W4402654857","https://openalex.org/W4406167494","https://openalex.org/W4406985532","https://openalex.org/W4408927133","https://openalex.org/W4409538002"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"The":[1,163],"growing":[2],"demand":[3],"for":[4,97],"computational":[5],"resources":[6],"has":[7],"led":[8],"to":[9,23],"the":[10,56,69,76,121,179,187,220],"adoption":[11],"of":[12,42,207,211],"multi\u2010cloud":[13,99,180],"frameworks":[14],"that":[15,86],"distribute":[16],"workloads":[17],"across":[18],"various":[19],"cloud":[20],"service":[21],"providers":[22],"enhance":[24],"scalability":[25],"and":[26,45,75,112,129,140,161,176,199,214],"availability.":[27],"However,":[28],"existing":[29],"task":[30,88,157,172,192],"scheduling":[31,135,198],"algorithms":[32],"in":[33,178,184,223],"such":[34],"environments":[35],"often":[36],"suffer":[37],"from":[38],"inefficient":[39],"prioritization,":[40],"lack":[41],"dependency":[43],"handling,":[44],"inadequate":[46],"security":[47],"measures.":[48],"To":[49],"address":[50],"these":[51],"challenges,":[52],"this":[53],"paper":[54],"introduces":[55],"Multi\u2010Cloud":[57],"Secure":[58],"Task":[59],"Scheduling":[60],"Optimizer":[61],"(MCSTSO)":[62],"framework,":[63],"which":[64,124],"combines":[65],"two":[66],"core":[67],"innovations:":[68],"Paired":[70],"Flutter":[71],"Optimization":[72,94],"(PFO)":[73],"algorithm":[74,85],"SecureX":[77,145,164],"RSA":[78,146,165],"encryption":[79],"mechanism.":[80],"PFO":[81,188,195],"is":[82],"a":[83,91,152,205],"hybrid":[84],"integrates":[87],"pairing":[89],"with":[90,186,226],"modified":[92,122],"Butterfly":[93],"Algorithm":[95],"(BOA)":[96],"efficient":[98],"scheduling.":[100],"It":[101,182],"begins":[102],"by":[103,170],"grouping":[104],"tasks":[105],"into":[106],"pairs":[107,116],"based":[108],"on":[109],"calculated":[110],"attributes":[111],"threshold":[113],"values.":[114],"These":[115],"are":[117],"then":[118],"scheduled":[119],"using":[120],"BOA,":[123],"considers":[125],"deadlines,":[126],"resource":[127,142,200],"availability,":[128],"execution":[130,177],"costs.":[131],"This":[132],"approach":[133],"improves":[134],"efficiency,":[136],"minimizes":[137],"completion":[138],"time,":[139],"enhances":[141],"utilization.":[143],"Simultaneously,":[144],"ensures":[147,167],"robust":[148],"data":[149,158,168,173,228],"protection":[150],"through":[151],"multi\u2010layered":[153],"cryptographic":[154,233],"scheme,":[155],"safeguarding":[156],"during":[159,174],"transmission":[160,175],"execution.":[162],"mechanism":[166],"confidentiality":[169],"encrypting":[171],"environment.":[181],"works":[183],"tandem":[185],"algorithm,":[189],"securing":[190],"each":[191],"pair":[193],"while":[194],"optimizes":[196],"their":[197],"allocation.":[201],"Experimental":[202],"results":[203],"demonstrate":[204],"makespan":[206],"1471":[208],"s,":[209,213],"throughput":[210],"0.28":[212],"91.11%":[215],"Virtual":[216],"Machine":[217],"utilization,":[218],"confirming":[219],"framework's":[221],"effectiveness":[222],"balancing":[224],"performance":[225],"strong":[227],"security,":[229],"even":[230],"under":[231],"added":[232],"overhead.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-10T00:00:00"}
