A MODEL FOR THE DISTRIBUTION OF COMPUTATIONAL TASKS IN CLOUD INFRASTRUCTURE INCORPORATING PERFORMANCE, COST, AND SECURITY CONSIDERATIONS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.836

Keywords:

Cloud Computing, task allocation, multi-objective optimization, game theory, cybersecurity, risk, NSGA-II algorithm, Pareto optimality

Abstract

Cloud systems (CSs)—now integral to the business processes of many organisations—face sophisticated challenges such as targeted attacks, exploitation of software vulnerabilities and the leakage of confidential data. These threats greatly increase the demands on both security and efficient resource allocation. Against a backdrop of escalating cyber-risks and rising performance requirements, it is essential to design new task-allocation models that simultaneously account for security, performance and cost within cloud infrastructures. Existing theoretical approaches often study these factors in isolation and ignore the strategic interaction between attacker and defender, limiting their practical usefulness.This paper presents a hybrid model that couples antagonistic game theory for cloud-risk assessment with multi-objective optimisation based on a modified NSGA-II algorithm. Attacker behaviour is represented by an aggressiveness parameter (λ) that influences the probability of node compromise, whereas defender behaviour relies on adaptive task-allocation mechanisms. The optimisation problem minimises three objectives: total task-placement risk (cloud security), total task-processing time (cloud performance) and total cost of resource usage (cloud cost-efficiency). Simulations carried out in a Python environment confirm the effectiveness of the method, yielding IGD = 0.2263, Spacing = 0.0106 and Hypervolume ≈ 1.3310. These metrics indicate good convergence, a uniform spread and high diversity of the Pareto-optimal front for a protected cloud system. The proposed model therefore offers a flexible trade-off among conflicting criteria and can adapt to diverse adversary-behaviour scenarios.

Downloads

Download data is not yet available.

References

Mykhailiv, V. I. (2015). Experimental research of information technology for data protection in cloud computing systems. Current Issues of Automation and Information Technologies, (19), 52–66.

Kobevko, A. T., & Tymchenko, O. V. (2019). Features of DDoS attacks on cloud services. Mechanical Engineering, 11(3), 1–15.

Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57–65.

Hosseini, S., & Vakili, R. (2019). Game theory approach for detecting vulnerable data centers in cloud computing network. International Journal of Communication Systems, 32(8), e3938.

Kakkad, V., Shah, H., Patel, R., & Doshi, N. (2019). A comparative study of applications of game theory in cyber security and cloud computing. Procedia Computer Science, 155, 680–685.

Banerjee, K., Gupta, R. R., Vyas, K., & Mishra, B. (2020). Exploring alternatives to softmax function. arXiv preprint arXiv:2011.11538. https://arxiv.org/abs/2011.11538

Sun, Y., Lin, F., & Xu, H. (2018). Multi-objective optimization of resource scheduling in fog computing using an improved NSGA-II. Wireless Personal Communications, 102, 1369–1385.

Tsai, J. T., Fang, J. C., & Chou, J. H. (2013). Optimized task scheduling and resource allocation on cloud computing environment using improved differential evolution algorithm. Computers & Operations Research, 40(12), 3045–3055.

Chołodowicz, E., & Orłowski, P. (2017). Comparison of SPEA2 and NSGA-II applied to automatic inventory control system using hypervolume indicator. Studies in Informatics and Control, 26(1), 67–74.

Tian, Y., Zhang, X., Cheng, R., & Jin, Y. (2016, July). A multi-objective evolutionary algorithm based on an enhanced inverted generational distance metric. In 2016 IEEE Congress on Evolutionary Computation (CEC), 5222–5229. IEEE. https://doi.org/10.1109/CEC.2016.7748362

Ramesh, S., Kannan, S., & Baskar, S. (2012). Application of modified NSGA-II algorithm to multi-objective reactive power planning. Applied Soft Computing, 12(2), 741–753.

Glorfeld, L. W., & Palko, J. (1988). A comparison of novice algorithm composition performance using flowcharting or pseudocode as the design tool. Journal of Research on Computing in Education, 21(1), 82–96.

Vayadande, K., Bailke, P. A., Dombale, A. B., Dange, V. R., & Kulkarni, A. M. (2024). Converting pseudo code to code: A review. In How Machine Learning is Innovating Today’s World: A Concise Technical Guide, 57–68.

Choi, J., Choi, C., Lynn, H. M., & Kim, P. (2015, November). Ontology based APT attack behavior analysis in cloud computing. In 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 375–379. IEEE. https://doi.org/10.1109/BWCCA.2015.69

Alshaikh, A., Alanesi, M., Yang, D., & Alshaikh, A. (2023, June). Advanced techniques for cyber threat intelligence-based APT detection and mitigation in cloud environments. In International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 12718, 147–157). SPIE. https://doi.org/10.1117/12.2676532

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Tsyrkaniuk, D. (2025). A MODEL FOR THE DISTRIBUTION OF COMPUTATIONAL TASKS IN CLOUD INFRASTRUCTURE INCORPORATING PERFORMANCE, COST, AND SECURITY CONSIDERATIONS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 619–632. https://doi.org/10.28925/2663-4023.2025.28.836