Authors:
Kanika Sharma,Parul Khurana,Ramandeep Sandhu,Chander Prabha,Harpreet Kaur,Deepali Gupta,DOI NO:
https://doi.org/10.26782/jmcms.2025.07.00011Keywords:
Cloud Computing,Containerization,Isolation,Resource allocation,Scheduling,Security,Abstract
Container-based virtualization has become prominent as lightweight virtualization due to its scalability, resource utilization, and portability, especially in microservices. Container scheduler plays an essential role in Container services to optimize performance to reduce the overall cost by managing load balancing. However, scheduling Containers with efficiency while ensuring the Container security remains one of the major challenges. This paper presents a hybrid scheduling approach by combining a nature-inspired algorithm with the security principle. Our proposed technique combines the optimization of the Intelligent Water Drop (IWD) algorithm with Anti-Collocation and Security Affinity Rules (ACAR) to ensure the privacy of Containers. IWD-ACAR focuses on resource optimization, and one of the security concerns is that no more than two Containers should be placed on the less secure node. To simulate the proposed technique, we have used Python, and the simulation results demonstrate 25% improvement in the resource utilization along with a 98% threat detection rate in real-time monitoring. The proposed approach balances the various performance evaluation parameters like CPU utilization, memory utilization, along security in a cloud environment.Refference:
I. Bachiega, Naylor G., Paulo S. L. de Souza, Sarita M. Bruschi, and Simone do R. S. de Souza. “Container-Based Performance Evaluation: A Survey and Challenges.” 2018 IEEE International Conference on Cloud Engineering (IC2E), IEEE, April 2018, pp. 398–403. 10.1109/IC2E.2018.00075.
II. Rathi, Sugandha, Renuka Nagpal, Gautam Srivastava, and Deepti Mehrotra. “A Multi-Objective Fitness Dependent Optimizer for Workflow Scheduling.” Applied Soft Computing, vol. 152, 2024, article 111247. 10.1016/j.asoc.2024.111247. jscca.uotechnology.edu.iq+7dl.acm.org+7ouci.dntb.gov.ua+7
III. Li, Jun, Peng Wang, and Yan Zhang. “A Survey on Scheduling Algorithms in Cloud Computing.” Journal of Cloud Computing, vol. 10, no. 1, 2021, pp. 1–20. 10.3233/MGS-220217. journals.sagepub.com+2dl.acm.org+2researchgate.net+2
IV. Jeon, Jueun, et al. “Efficient container scheduling with hybrid deep learning model for improved service reliability in cloud computing.” IEEE Access (2024). 10.1109/ACCESS.2024.3396652
V. Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. “A survey on security challenges in cloud computing: issues, threats, and solutions.” The journal of supercomputing 76.12 (2020): 9493-9532. 10.1007/s11227-020-03213-1
VI. Huang, Lin, Xuefeng Li, and Zhiqiang Zhang. “Security-Enhanced Cloud Scheduling for Container-Based Environments.” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, 2023, pp. 1345 1357. 10.1145/3579856.3582835
VII. Xiong, Ke, Zhonghao Wu, and Xuzhong Jia. “DeepContainer: A Deep Learning-based Framework for Real-time Anomaly Detection in Cloud-Native Container Environments.” Journal of Advanced Computing Systems 5.1 (2025): 1-17.DOI: 10.69987/JACS.2025.50101
VIII. Parampottupadam, Santhosh, and Arghir-Nicolae Moldovann. “Cloud-based real-time network intrusion detection using deep learning.” 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2018. 10.1109/CyberSecPODS.2018.8560674
IX. Tao, Ye, et al. “Dynamic resource allocation algorithm for container-based service computing.” 2017 IEEE 13th international symposium on autonomous decentralized system (ISADS). IEEE, 2017. 10.1109/ISADS.2017.20
X. Ahmad, Shahnawaz, et al. “Machine learning-based intelligent security framework for secure cloud key management.” Cluster Computing 27.5 (2024): 5953-5979. 10.1007/s10586-024-04288-8
XI. Altahat, Mohammad A., Tariq Daradkeh, and Anjali Agarwal. “Optimized encryption-integrated strategy for containers scheduling and secure migration in multi-cloud data centers.” IEEE Access (2024). 10.1109/ACCESS.2024.3386169
XII. Muthakshi, S., and K. Mahesh. “Secure and energy-efficient task scheduling in cloud container using VMD-AOA and ECC-KDF.” Malaysian Journal of Computer Science 37.1 (2024): 48-70. 10.22452/mjcs.vol37no1.2
XIII. Sadeghi Hesar, Alireza, Seyed Reza Kamel Tabakh, and Mahboobeh Houshmand. “Task Scheduling Using the PSO-IWD Hybrid Algorithm in Cloud Computing with Heterogeneous Resources.” Journal of Control 15.2 (2021): 81-96. 10.52547/joc.15.2.81
XIV. Pal, Souvik, et al. “An intelligent task scheduling model for hybrid internet of things and cloud environment for big data applications.” Sustainability 15.6 (2023): 5104. 10.3390/su15065104
XV. Mangalampalli, Sudheer M., et al. “Multi Objective Prioritized Task Scheduler Using Improved Asynchronous Advantage Actor Critic (A3C) Algorithm in Multi Cloud Environment.” IEEE Access, 2024. 10.1109/ACCESS.2024.3355092
XVI. Aron, Rajni, and Ajith Abraham. “Resource scheduling methods for cloud computing environment: The role of meta-heuristics and artificial intelligence.” Engineering Applications of Artificial Intelligence 116 (2022): 105345. 10.1016/j.engappai.2022.105345
XVII. Yahia, Hazha Saeed, et al. “Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling.” Asian Journal of Research in Computer Science 8.2 (2021): 1-16. 10.9734/AJRCOS/2021/v8i230195
XVIII. Chen, Honghua, et al. “Container Scheduling Algorithms for Distributed Cloud Environments.” Processes 12.9 (2024): 1804. 10.3390/pr12091804
XIX. Rambabu, D., and A. Govardhan. “Optimized Data Replication in Cloud Using Hybrid Optimization Approach.” Transactions on Emerging Telecommunications Technologies, vol. 35, no. 11, 2024, e70022. 10.1002/ett.70022