{"id":"https://openalex.org/W4415912562","doi":"https://doi.org/10.58346/jisis.2025.i3.010","title":"Load Balancing in Financial Cloud with Dynamic Task Prioritization: An Efficient Security Model Perspective","display_name":"Load Balancing in Financial Cloud with Dynamic Task Prioritization: An Efficient Security Model Perspective","publication_year":2025,"publication_date":"2025-08-30","ids":{"openalex":"https://openalex.org/W4415912562","doi":"https://doi.org/10.58346/jisis.2025.i3.010"},"language":null,"primary_location":{"id":"doi:10.58346/jisis.2025.i3.010","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.010","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.010","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.58346/jisis.2025.i3.010","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004194078","display_name":"Dhruv Raj Kashyap","orcid":"https://orcid.org/0009-0005-7383-2582"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dipti N. Kashyap","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120264576","display_name":"Dr.T.A. Madankar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr.T.A. Madankar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120264577","display_name":"Yoghesh Dharangutti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yoghesh Dharangutti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104324852","display_name":"Sumitra Padmanabhan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dr. Sumitra Padmanabhan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036504181","display_name":"Rita Rani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Hannah Jessie Rani","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5023933722","display_name":"Divya Paikaray","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Divya Paikaray","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004194078"],"corresponding_institution_ids":[],"apc_list":{"value":550,"currency":"USD","value_usd":550},"apc_paid":{"value":550,"currency":"USD","value_usd":550},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47156124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"3","first_page":"149","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.5220000147819519,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.5220000147819519,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.04569999873638153,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.03849999979138374,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7603999972343445},{"id":"https://openalex.org/keywords/load-balancing","display_name":"Load balancing (electrical power)","score":0.7433000206947327},{"id":"https://openalex.org/keywords/prioritization","display_name":"Prioritization","score":0.6083999872207642},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.4684999883174896},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4465999901294708},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3587000072002411},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.3346000015735626},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.3305000066757202}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7793999910354614},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7603999972343445},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.7433000206947327},{"id":"https://openalex.org/C2777615720","wikidata":"https://www.wikidata.org/wiki/Q11888847","display_name":"Prioritization","level":2,"score":0.6083999872207642},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49729999899864197},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.4684999883174896},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4465999901294708},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3587000072002411},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.3346000015735626},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.3305000066757202},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.31769999861717224},{"id":"https://openalex.org/C141306801","wikidata":"https://www.wikidata.org/wiki/Q7979905","display_name":"Weighted round robin","level":5,"score":0.3061000108718872},{"id":"https://openalex.org/C2779370713","wikidata":"https://www.wikidata.org/wiki/Q357554","display_name":"Load management","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C2779907789","wikidata":"https://www.wikidata.org/wiki/Q22095616","display_name":"CloudSim","level":3,"score":0.2964000105857849},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2782000005245209},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.2533999979496002},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.58346/jisis.2025.i3.010","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.010","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.010","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.58346/jisis.2025.i3.010","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i3.010","pdf_url":"https://doi.org/10.58346/jisis.2025.i3.010","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415912562.pdf","grobid_xml":"https://content.openalex.org/works/W4415912562.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,107],"scheduling":[1],"and":[2,21,27,82,125,148,176,192,206,232],"distribution":[3],"of":[4,8,32,59,75,146,182,210],"tasks":[5,61],"is":[6,18,70,155,169,178,200],"one":[7,31],"the":[9,33,37,50,57,63,73,76,111,126,138,143,153,164,173,208,215,222,227],"biggest":[10],"problems":[11,35],"with":[12],"cloud":[13,43,52,67,88,229],"computing,":[14],"a":[15,90],"platform":[16],"that":[17,49,221],"becoming":[19],"more":[20,22],"popular":[23],"for":[24,117,133],"everyday":[25],"use":[26],"financial":[28,38,51,87,139,211,228],"applications.":[29],"However,":[30],"main":[34],"in":[36,62,86,104,137,180],"segment":[39],"remains":[40],"to":[41,72,202],"be":[42],"security.":[44],"Several":[45],"studies":[46],"have":[47],"demonstrated":[48],"load":[53,80,135],"balancing":[54,81,136],"system":[55],"manages":[56],"arrangement":[58],"n":[60],"process":[64],"flow":[65],"on":[66,122,158,163],"devices,":[68],"which":[69],"critical":[71],"effectiveness":[74],"system.":[77],"To":[78,141],"research":[79,168,219],"dynamic":[83,118],"task":[84,119,151,189],"prioritization":[85,120,190],"systems,":[89],"novel":[91],"adaptive":[92,127],"weighted":[93,128],"round":[94,129],"robin":[95,130],"based":[96,157],"versatile":[97,112],"random":[98,113],"forest":[99,114],"(AWRR-VRF)":[100],"strategy":[101,109],"was":[102],"suggested":[103,108,165,223],"this":[105,167,218],"research.":[106],"uses":[110],"(VRF)":[115],"method":[116],"depending":[121],"security":[123,199,204,231],"requirements":[124],"(AWRR)":[131],"approach":[132],"effective":[134],"cloud.":[140],"categorize":[142],"task-oriented":[144],"priority":[145],"requests":[147],"enable":[149],"efficient":[150],"performance,":[152],"VRF":[154],"implemented":[156],"user":[159],"behavior":[160],"patterns.":[161],"Based":[162],"methodology,":[166],"carried":[170],"out":[171],"using":[172,214],"Python":[174],"program":[175],"performance":[177,233],"examined":[179],"terms":[181],"CPU":[183],"utilization":[184],"(0.0100),":[185],"energy":[186],"consumption":[187],"(62.675),":[188],"(77,600)":[191],"optimized":[193],"memory":[194],"usage":[195],"(5102.50)":[196],"measures.":[197],"Task":[198],"enhanced":[201],"minimize":[203],"threats":[205],"maximize":[207],"protection":[209],"data.":[212],"By":[213],"experimental":[216],"assessment,":[217],"determined":[220],"AWRR-VRF":[224],"technique":[225],"maximizes":[226],"systems":[230],"components.":[234]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-11-05T00:00:00"}
