a trust service-oriented scheduling model for workflow applications in cloud computing

11

Click here to load reader

Upload: tong

Post on 25-Dec-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

IEEE SYSTEMS JOURNAL 1

A Trust Service-Oriented Scheduling Model forWorkflow Applications in Cloud Computing

WenAn Tan, Yong Sun, Ling Xia Li, GuangZhen Lu, and Tong Wang

Abstract—Cloud services have been utilized in large-scaledistributed environments. As an effective service aggregationmethodology, workflow technology has been used to constructcomposite services. Efficient and dependable workflow scheduling(WFS) is crucial for integrating enterprise systems. While WFShas been widely studied, WFS-related algorithms are mainly fo-cused on optimizing execution time or cost. However, in cloud com-puting environment, WFS is up against the threats of the inherentuncertainty and unreliability to the applications. Therefore, trustservice-oriented strategies must be considered in WFS. As a result,this paper proposes a trust service-oriented workflow schedulingalgorithm. The scheduling algorithm adopts a trust metric thatcombines direct trust and recommendation trust. In addition,we provide balance policies to enable users to balance differentrequirements, including time, cost, and trust. A case study wasconducted to illustrate the value of the proposed algorithm. Theexperimental results show that the proposed approach is effectiveand feasible.

Index Terms—Cloud computing, enterprise systems (ES), fuzzysets, industrial information integration engineering, trust, work-flow scheduling (WFS).

I. INTRODUCTION

ENTERPRISE SYSTEMS (ES) are being challenged byincreased complexity and growing needs for systems in-

tegration to meet manufacturing and service industry require-ments [1], [2]. Due to increasing competition and economicglobalization, ES are being required to integrate extendedenterprises in various industry-specific environments in thesupply chain environment [3], [4]. As a result, the integra-tion of various ES is being conducted in many large enter-prises [5]–[13].

Cloud computing, which aims to aggregate and share alarge pool of cloud services, is a promising technique for

Manuscript received December 18, 2008; revised February 7, 2013; acceptedFebruary 2, 2013. This work was supported in part by the National Natural Sci-ence Foundation of China under Grants 60874120, 61272036, and 71132008,by the Innovation Program of Shanghai Municipal Education Commissionunder Grant 11ZZ188, by the Changjiang Scholar Program of the Ministryof Education of China, and by the U.S. National Science Foundation underGrant 1044845.

W. Tan is with the Nanjing University of Aeronautics and Astronautics,Nanjing 210016, China, and also with the Shanghai Second Polytechnic Uni-versity, Shanghai 100044, China (e-mail: [email protected]).

Y. Sun and G. Lu are with the Nanjing University of Aeronautics andAstronautics, Nanjing 210016, China (e-mail: [email protected]).

L. X. Li is with the Old Dominion University, Norfolk, VA 23529 USA(e-mail: [email protected]).

T. Wang is with the Shanghai Second Polytechnic University, Shanghai100044, China.

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/JSYST.2013.2260072

systems integration [14]–[17]. So far, cloud computing has beensuccessfully used to integrate various services for governments,businesses, and industries. Cloud computing can be defined asa new style of collaborative environment in which dynamicallyscalable and virtualized resources are provided as a service overthe Internet [18], [19]. Due to the heterogeneous problems indata formats, structures, and semantics, it is hard to integratecloud services into a composite service for supporting collabo-rative business process [20], [21].

Typically, the service workflow is deployed as the aggrega-tion of services to facilitate the requirements and automationof large-scale distributed systems [22]–[25]. A workflow ap-plication has become a standard solution for managing com-plicated processes in many business organizations [26]–[33].These workflow applications consist of multiple tasks whichcan be executed by a series of similar cloud services at differentlevels of quality. Workflow scheduling (WFS) is defined asthe allocation of workflow tasks to suitable cloud services. Asan effective service method for integration, WFS has attracteda lot of attention from both researchers and practitioners inrecent years. A number of scheduling algorithms have beendeveloped to satisfy industrial requirements in many large-scalesystems. Currently, most of these algorithms are focused onminimizing their execution time or cost on commercial cloudservice platforms.

However, most of the existing commercial cloud services areowned and operated by geographically distributed and hetero-geneous organizations and enterprises in a cloud computingenvironment [34]. The inherent uncertainty and unreliabilityof large-scale distributed systems often pose threats to theoperation of workflow applications [35]–[37]. For example,cloud services sometimes may be offline unexpectedly due topower outage or other reasons.

Scheduling complex tasks on dependable services becomeseven more important in large-scale network [38]. As theautonomous requirement of each participating service provider,the network is a failure-prone environment. Different serviceproviders without interaction before may cause failure to theexecution of a composite service [39]. Trust between serviceproviders is essential to collaborative business process [40]. Tobe effective, WFS needs to consider the trust factor in additionto time and cost factors. Optimizing both time and cost for thetrust service-oriented workflow scheduling (TWFS) model isan NP-hard problem. WFS usually requires certain policies likeLOSS, GAIN, and deadline-Markov Decision Process (MDP)to balance different and conflicting requirements such as time,cost, and trust at the same time in the cloud environment[48]–[50].

1932-8184/$31.00 © 2013 IEEE

Page 2: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE SYSTEMS JOURNAL

In this paper, we develop specific scheduling strategies toeffectively optimize time, cost, and trust factors in ES. In orderto address the problem of WFS in an optimal and reliable way,a TWFS model is proposed to meet the requirements of ESintegration.

The rest of this paper is organized as follows. We discuss therelated work about WFS and trust calculation in Section II. TheWFS model, multiobjective optimization, and fuzzy methodsare presented in Section III. In Section IV, a TWFS model isproposed, followed by a discussion on the scheduling algorithmin Section V. A case study was conducted to illustrate the valueof the proposed algorithm in Section VI. The experimentalresults are presented in Section VII, followed by the conclusion.

II. RELATED WORK

A. Trust Computing

Trust plays an important part in e-commerce. Thus, buildingtrust is also essential for cloud service providers. In general,customers are given the opportunity to provide feedback alongwith a rating to the service provider after each transaction.In this case, positive feedback rate can be calculated as R =P/(P +N), where P is the number of positive ratings and Nis the number of negative ratings from the buyers. Another wayof calculating positive feedback rate considers a central author-ity model where ratings are supplied by different users [41].However, the user ratings may be incorrect for some reasons.

In the area of distributed information sharing networks,considerable amount of research work has been done to shareand distribute information with trustworthy participating peers.For example, the PowerTrust model proposed by Zhou andHwang computed the local trust value based on the feedbackof successful transactions [42]. The EigenTrust algorithm com-puted the global trust value of a given peer based on the trustvalue of local successful transactions by using binary ratingmodel [43]. A trust model proposed by Jøsang et al. calculatedsubjective rating by using the Dempster–Shafer belief theory[44]. A WFS model was proposed to optimize execution timeand reliability on heterogeneous systems [45]. Technically, theaforementioned trust aggregation approaches can be catego-rized as direct trust.

With the increasing presence of services on the Internet,researchers have developed a collaborative filtering (CF) modelfor predicting QoS values to make service recommendations.As a strategy that predicts user needs or interests, recommen-dation has been widely deployed for service selection in manywell-known commercial systems and health care informationsystems [46], [47]. A major approach used in recommendationsystems is CF where a user is given recommendation based onthe ratings of other users who are similar with the given user insome aspects. Recommendation systems have been helpful andsuccessful for service composition and selection.

A trust value is easy to calculate for service selection andcomposition. Nevertheless, so far, there are only few studiesconsidering the trust factor in workflow applications. As cloudservices may fail unexpectedly from time to time and cause thetrust issue for workflow applications in cloud computing envi-ronments, trust service-oriented strategies must be considered

in WFS. In this paper, a scheduling algorithm is proposedto adopt a general trust metric that combines direct trust andrecommendation trust.

B. WFS

In the community grid, services are freely shared by dif-ferent organizations. Typically, best effort-based schedulingis adopted to minimize the execution time without consid-ering other factors such as the monetary cost of accessingresources and the satisfaction level associated with varioususers’ QoS. Best effort-based scheduling typically uses rela-tively simple methods such heterogeneous earliest-finish-timealgorithm, min-min algorithm, and max-min algorithm. Thistype of scheduling is mainly focused on time or cost optimiza-tion without considering other factors.

Compared with the traditional distributed computing system,a cloud computing system has a cost saving benefit in variousaspects. As service contracts are signed by users and serviceproviders, cloud service providers have an obligation to adopta series of marketing and technical strategies to ensure thesuccessful fulfillment of service contracts while maintainingtheir profits and satisfying the requirement of the users. Thus,workflow execution costs must be considered for schedul-ing based on the user’s QoS constraints. In [48], schedulingworkflow model with budget, denoted as constraint LOSS andGAIN strategy, is to start from an assignment which has goodperformance under either of the two optimization criteria and,then, to swap tasks between services in order to optimize asmuch as possible for the other criterion. The two strategiesare mainly focused on cost and time. In practice, they need toiteratively adjust time to find a good solution.

A cost-based WFS algorithm, denoted as deadline-MDP, wasproposed by Yu et al. to minimize the execution cost whilemeeting the deadline [49], [50]. The algorithm was imple-mented by distributing the deadline over each task partition[49], [50]. Another deadline-MDP algorithm was developed byYuan et al. who use a backward method to create a new al-gorithm called deadline bottom level (DBL) [51]. Specifically,the workflow deadline is segmented into the time intervals of alltasks. All tasks in each bottom level have the same subdeadline,but the starting time of a task in each level is determined bythe maximum finishing time of its predecessors, rather than thefinishing time of its parent group which is adopted by deadlinetop level (DTL). The DBL algorithm can considerably improvethe average performance of DTL. Although DBL and DTLare very simple and relatively effective, the temporal relation-ships may be partially changed. As a result, workflow appli-cations with shorter deadline constraints cannot be optimizedeffectively. The compromised-time-cost model accommodatesinstance-intensive cost-constrained workflow by compromisingexecution time and cost with the deadline [52]. Overall, theaforementioned three algorithms aim to minimize the totalexecution cost while meeting the deadline.

In summary, the aforementioned WFS algorithms are mainlyfocused on minimizing execution time or cost and do notconsider the critical influence of uncertainty and unreliabil-ity in large-scale distributed systems. Unfortunately, in cloud

Page 3: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TAN et al.: TRUST SERVICE-ORIENTED SCHEDULING MODEL FOR WORKFLOW APPLICATIONS 3

computing environments, many discrete events lead to failuresof a workflow application. Thus, ES are strongly expected toaggregate and share trustworthy services in cloud computingenvironments. From this perspective, we made an effort todevelop a TWFS model in order to balance different andconflicting requirements of enterprises.

III. SYSTEM MODELS

In this section, we provide a brief overview of basic termsrelated to the scope of this paper, including WFS model, fuzzymodeling, and multiobjective modeling. In addition, we discussthe problem related to the TWFS models.

A. WFS Model

If enterprise users submit their requirements for integrationwith the workflow application requiring maximum QoS con-straints, the WFS planner will return the results to users andallow users to choose the most suitable schedule and confirmthe information. Finally, ES start to execute the workflowaccording to the conventional information. In the context ofcloud computing, a wide range of integrated systems can berepresented as workflows which can be modeled as directedacyclic graphs (DAGs) [53]. The following model provides aneffective way to map the node (or task) to service.

Definition 1: Let W = {T,E} denote a workflow whichconsists of a set of tasks T = {T1, . . . , Ti, . . . , Tn} and a set ofdependences among the tasks; tasks are sometimes also callednodes. E = {〈T1, T2〉, . . . , 〈Ti, Tj〉, . . . , 〈Tn−1, Tn〉}, and Ti isthe parent task of Tj , where Tj , Tj ∈ T . A child task cannot beexecuted until all of its parent tasks have been completed.

Definition 2: In a workflow DAG, we call a task which doesnot have any parent tasks an entry task and denote it as Tentry ,while a task which does not have any child tasks is called anexit task, denoted as Texit.

Definition 3: Let m be the total number of candidate ser-vices. There are a set of sij (where 1 ≤ i ≤ n, 1 ≤ j ≤ mi)which are available for the task. Services have varied processingcapability delivered at different prices and time. We denote tijas the sum of processing time and data transmission time andcij as the sum of service price and data transmission cost forprocessing ti on service sij .

Definition 4: The minimum time to complete the schedule isthe length of the critical path from the entry node of workflowto the exit node. In symbols

EF =ES +Di (1a)

LS =LF −Di (1b)

Slack =LF − EF (1c)

where ES represents the earliest start time, EF is the earliestfinish time, LS denotes the latest start time, LF is the latestfinish time, the slack for a task is the difference between itslatest finish time and its earliest finish time, and Di is theestimated duration of the task Ti. Each task with zero slack ison a critical path through the workflow DAGs.

Fig. 1. Membership function for objective.

B. Fuzzy Model

Using max-min as the operator [54], [55], the membershipfunction of objectives is formulated by separating every objec-tive into its maximum and minimum values [56]. The linearmembership functions for optimization goal (Zk, Zl) are givenas follows:

u(x) =

⎧⎪⎨⎪⎩

1, zk ≤ zmink

zmaxk

−zk(x)

zmaxk

−zmink

, zmink ≤ zk ≤ zmax

k

0, zmaxk ≤ zk

(2)

u(x) =

⎧⎪⎨⎪⎩

0, zl ≤ zminl

zl(x)−zminl

zmaxl

−zminl

, zminl ≤ zl ≤ zmax

l

1, zmaxl ≤ zl

(3)

where zmaxk and zmin

k can be computed through solving themultiobjective problem as a single objective in each time. zmax

k

is the maximum value of zk(x), and zmink is the minimum value

of zk(x), as shown in Fig. 1.

C. Multiobjective Model

The workflow planning problem is a multiobjective opti-mization problem in which groups of conflicting objectives aresimultaneously optimized [57].

Definition 5: In order to formulate this model, the notationsare defined as follows:D time constraint (deadline);B cost constraint (budget);Tr trust constraint;tij time of the jth service assigned for the ith task;xij if the jth service is assigned for the ith task, then xi

j =

1; else, xij = 0;

n number of all tasks;mi number of services available for the ith task.Definition 6: Mathematically, a typical model for WFS in

the service cloud can be described as follows:

Minimize: Z1 =

n∑i=1

mi∑j=1

xijc

ij (4a)

Page 4: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE SYSTEMS JOURNAL

Minimize: Z2 =

n∑i=1

mi∑j=1

xijt

ij (4b)

Maximize: Z3 =

n∑i=1

mi∑j=1

xijtr

ij (4c)

subject to: Z1 ≤ B

Z2 ≤ D

Z3 ≥ Tr (4d)

where Zi is the object or criteria for minimization like time,cost, etc. Xd is the set of feasible solutions that satisfy theset of system and policy constraints. The optimization of theworkflow is to map every Ti onto some Si

j in order to achieveminimum execution cost and time while meeting the constraintsof trust.

IV. TWFS MODEL

Based on the aforementioned discussion, the present workconsiders the WFS problem as a fuzzy multiobjective prob-lem which is subject to time, cost, and trust constraints. Theproblem formulation proposed here considers three differentobjectives related to trust, time, and cost.

A. Member Function for Trust Evaluation

In a large-scale distributed system, many discrete eventscould lead to the failures of a workflow application. Therefore,we present a trust service-oriented scheduling algorithm whichconsiders the reliability of a service for workflow execution. Ageneral trust metric that combines direct trust and recommen-dation trust is defined as follows:

Tr(Si) = wi ∗DT (Si) + (1− wi) ∗RT (Si) (5)

where DT (Si) is a direct trust of the ith service by the experi-ences which is based on the history of using the service by theusers. RT (Si) is a recommendation trust of the ith service byother users. wi is the weight of direct trust and recommendationtrust for the ith service, which can be computed as follows:

wi = 1− 1

ek(6)

where k is the number of times that the ith service is used by theservice client and wi is adaptively changing with the value ofk. For a more frequently used service, higher weights should beassigned for the direct trust evaluation. For example, if wi = 0,it means that the client never uses the ith service, so Tr(Si)depends completely on the recommendation trust evaluation.DT (Si) is established through observations on whether the

previous interactions among the services are successful used.The observation is often described by two variables: ni, denot-ing the number of successful interactions, and Ni, denoting thetotal number of interactions for the ith service. The direct trustvalue can be calculated as

DT (Si) =ni + 1

Ni + 2(7)

Fig. 2. Data structure of mapping tasks.

where the trust value of a service is initialized to 1/2.RT (Si) is the recommendation trust value of the ith service.

RT (Si) is the weighted sum of ratings by others, where theweight corresponds to the similarity between the active user andeach of the other users.

To describe the prediction algorithm formally, let S be the setof services being rated, n be the number of users, Si be the setof services rated by user i, and vij be the rating given by user ito the jth service. Next, let average vi be the average rating byuser i as given by

avg(vi) =1

|Si|∗∑j∈Si

vij . (8)

The weight wai reflects the similarity between user a anduser i. Based on these, we can define the predicted rating of theactive user a for service j as (n is the number of users)

RT (Sj) = avg(va) +

∑ni=1 wai(vij − vi)∑n

i=1 |wai|. (9)

The weights for the users are calculated by the Pearsoncorrelation coefficient (PCC) which is widely used to computethe degree of similar relationship between two variables. Thesimilarity between users a and i would be computed as follows:

wai =

∑j∈S(vaj − va)(vij − vi)√∑j∈S(vaj − va)2(vij − vi)2

(10)

where S = Sa ∩ Sb is the subset of services which have beenused by both users a and i.

Using max-min as the operator, the membership function forthe trust evaluation of the service is formulated as follows:

UTi(trx) =

trix − trimin

trimax − trimin

, if trimin ≤ trix ≤ trimax

(11a)

UTi(trx) = 0, if trimin = trix (11b)

UTi(trx) = 1, if trimax = trix (11c)

where trix is the trust value for the service selected for the ithtask, trimax is the max value of trust for the service available forthe ith task, and trimin is the min value of trust for the service.

B. Member Function for Execution Time

There is a set of services in which sij (where 1 ≤ i ≤ n,1 ≤j ≤ mi) is capable of executing the task. The linked list datastructure is employed to solve the problem of mapping task Ti

onto sij , as shown in Fig. 2.In the linked list, we store each service in a node that

contains three elements such as time, cost, feedback value anda reference to the next node in the list, and the list of services issorted in a descending way based on the value of time.

Page 5: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TAN et al.: TRUST SERVICE-ORIENTED SCHEDULING MODEL FOR WORKFLOW APPLICATIONS 5

Using max-min as the operator, the membership function forexecution time is formulated as follows:

UTi(tx) =

timax − tixtimax − timin

, if timin ≤ tix ≤ timax (12a)

UTi(tx) = 0, if timax = tix (12b)

UTi(cx) = 1, if timin = tix (12c)

where tix is the time for the service selected for the ith task, timax

is the max value of time for the service available for the ith task,and timin is the min value of time for the service available forthe ith task.

Member function indicates that the closer the value of tixis to timin, the better the selected service is, and the more theobjective is satisfied.

C. Membership Function for Execution Cost

Similar to the membership function of execution time, themembership function for the execution cost of the ith task canbe defined as follows:

UTi(cx) =

cimax − cixcimax − cimin

, if cimin ≤ cix ≤ cimax (13a)

UTi(cx) = 0, if cimax = cix (13b)

UTi(cx) = 1, if cimin = cix (13c)

where cix is the cost for the service selected for the ith task, cimax

is the max value of cost for the service available for the ith task,and cimin is the min value of cost for the service available for theith task.

The time and cost are conflicting requirements. According tothe analysis of the membership function for execution cost, thelist of services is stored in a descending order based on the time.In contrast, the list is in an ascending order based on the cost.

The equation of the membership function for cost indicatesthat, if the value of cix is high, the membership value is low.On the other hand, if the value of cimin is low, the highermembership value is assigned, the better the selected serviceis, and the more the objective is satisfied.

V. MODEL ALGORITHM

WFS require policies to strike a balance for the different re-quirements. For example, enterprise may expect to save budgetbut have longer time, or aim to minimize the execution timeof schedule. In order to satisfy the multiple criteria simultane-ously, a compromise should be made to find a suitable solution.

Using max-min as the operator, the aforementioned fuzzymodel can be converted to the following crisp model as:

Maxmize λi (14a)

UTi(tx) ≥ λi (14b)

UTi(cx) ≥ λi (14c)

UTi(trx) ≥ λi (14d)

tx ≥ 0, cx ≥ 0, trx ≥ 0 (14e)

λi ∈ [0, 1], I = 1, . . . , n (14f)

The degree of overall satisfaction is the minimum of all theaforementioned membership values. The fuzzy decision maybe considered as the choice that satisfies all of the objectives.Therefore, the fuzzy decision for overall satisfaction is given asfollows:

λij = min {UTi

(tx), UTi(cx), UTi

(trx)} . (15)

The selection of services for WFS is the maximum of alldegrees of satisfaction. We define the selection decision asfollows:

λik = max{λi

j} (16)

where k means the kth service which has the maximum ofdegrees of satisfaction for the ith task, so the kth service ismapping on the ith task.

The approaches used in [55] do not consider the relativeimportance of objectives. In the max-min model, the weights ofobjectives are equal. However, the relative importance of objec-tives is often different. The selection model can be formulatedby the weighted arithmetic mean operator

Maximize U ∗WT (17a)

wt + wc + wtr = 1, for wt, wc, wtr ∈ [0, 1] (17b)

where W is the weight vector containing wt, wc, and wtr

values; wt means the weight of time, wc is the weight ofcost, and wtr denotes the weight of trust in the model. UT isthe vector of service membership values, which is includingUTi

(tx), UTi(cx), and UTi

(trx).From the aforementioned analysis, the TWFS model is stated

in Algorithm 1.

Algorithm 1 TWFS

Input: request processing time, cost, and trust valueOutput: A workflow schedule strategy for Enterprise Infor-mation Systems1: request processing time, cost, and trust value from avail-

able service ∀Ti ∈ T2: repeat3: compute the indegrees for ∀Ti ∈ T4: while !stack.isEmpty() do5: forall s in available services of the ith task do6: compute λk = max{

∑2j=0 U

Ti

Zj(x)∗ wj}

7: end for8: Mapping service Sk onto the ith task9: forall edge e in adjacent do10: vertices of the ith task11: vertex w = e.dest12: if w.indegree == 0 then13: insert w into stack14 end if15: end for16: end while17: until all tasks have been scheduled

Page 6: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE SYSTEMS JOURNAL

Fig. 3. Sample DAG of the workflow application.

TABLE ISAMPLE OF THE RATINGS OF ENTERPRISES FOR CLOUD SERVICES

TABLE IIENTERPRISE USER-BASED PEARSON CORRELATION

VI. CASE STUDY

In this section, a case study is used to illustrate the value ofthe proposed algorithm. The algorithm is explained using anexample of workflow applications described in Fig. 3.

A. Trust Evaluation for Candidate Services

To illustrate the value of trust evaluation, we consider thefollowing example based on the ratings of Table I.

Example: An enterprise needs to evaluate the candidate ser-vice A for the ith tasks in the example workflow applicationthat the enterprise has not yet used. The blank in Table I meansthat a user’s rating is missing, and it is treated as if it equals thatuser’s average rating.

The similarities between the pairs of enterprises in the exam-ple are computed by PCC, which is given in Table II.

The predicted rating would be calculated as follows:

RT (Sj) = avg(va) +

∑ni=1 wai(vij − vi)∑n

i=1 |wai|

=3.5 +−0.66 ∗ 0.75 + 0.4 ∗ 1.75 + 3.6 ∗ 0.92

0.66 + 0.84 + 0.92

≈ 5. (18)

TABLE IIISAMPLE OF SERVICE LIST

B. Mapping Task Onto Suitable Services

Each task in the workflow can be executed by a series ofsimilar cloud services at different levels of quality. All candi-date cloud services are in the service list of the ith task. Forexample, {(5,3,3),(10,2,4),(20,1,5)} is a candidate service listfor the 6th task. Table III shows the service list of each task forthis workflow example.

Service selection and service ranking are based on the objec-tive functions for cost, time, and trust, respectively. The stepsof service selection are described in the following steps.

Step 1: Using max-min operator, compute the vectors of(UTi

(tx), UTi(cx), UTi

(trx)) for the ith task

t6max=3, t6min=3; c6max=20, c6min=5; tr6max=5, tr6min=3

U1T6

=

(20−5

20−5

3−3

3−1

3−3

5−3

)= (1 0 0)

U2T6

=

(20−10

20−5

3−2

3−1

5−3

5−3

)=

(2

3

1

21

)

U2T6

=

(20−20

20−5

3−1

3−1

4−3

5−3

)=

(0 1

1

2

).

Step 2: Compute max of U ∗WT of execution time and costfor the ith task

U ∗WT = (UTi(tx) UTi

(cx) UTi(trx)) ∗ (wt wc wtr)

T .

Step 3: If λix is max, then six is selected, therefore mapping

the ith task onto the xth service.In various situations, users often have different preferences

for service selection, and the relative importance of their ob-jectives is often different. In this paper, we set a typical weightvector value to illustrate the value of the proposed algorithm.

Case 1: Give W = (1/3 1/3 1/3) to the set of (wt wc wtr)for test. The weights of objectives are equal, which means that

Page 7: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TAN et al.: TRUST SERVICE-ORIENTED SCHEDULING MODEL FOR WORKFLOW APPLICATIONS 7

the user aims at reaching a compromise for all objectives⎛⎝U1

T6

U2T6

U3T6

⎞⎠=

⎛⎝ 1 0 0

2/3 1/2 10 1 1/2

⎞⎠

⎛⎝ 1/3

1/31/3

⎞⎠=

⎛⎝ 1/3

13/181/2

⎞⎠. (19)

In this case, the most suitable service for the 6th task is the ser-vice s26, which is supported by U2

T6> U1

T6and U2

T6> U3

T6. The

results indicate that the solution enables users to compromisefor different requirements.

Case 2: Assuming W = (1, 0, 0), the weight of time isthe most important, which means that enterprise users aim atoptimizing a single objective of execution time⎛⎝U1

T6

U2T6

U3T6

⎞⎠ =

⎛⎝ 1 0 0

2/3 1/2 10 1 1/2

⎞⎠

⎛⎝ 1

00

⎞⎠ =

⎛⎝ 1

2/30

⎞⎠ . (20)

In this case, the service s16 is selected based on matrix computa-tion. As shown in Table III, the service s16 is the most optimizedchoice for execution time.

Case 3: Assume W = (0, 1, 0), focusing on minimizing ex-ecution cost for service selection. Similar to Case 2, the services36 is selected⎛⎝U1

T6

U2T6

U3T6

⎞⎠ =

⎛⎝ 1 0 0

2/3 1/2 10 1 1/2

⎞⎠

⎛⎝ 0

10

⎞⎠ =

⎛⎝ 0

1/21

⎞⎠ . (21)

Case 4: Assuming W = (0 0 1), we aim to get the maximumof the trust value. The most trustworthy service is selectedbased on the member function for trust evaluation⎛⎝U1

T6

U2T6

U3T6

⎞⎠ =

⎛⎝ 1 0 0

2/3 1/2 10 1 1/2

⎞⎠

⎛⎝ 0

01

⎞⎠ =

⎛⎝ 0

11/2

⎞⎠ . (22)

The other tasks in the workflow are scheduled by the sameway as the 6th task. The solution for the example WFS is shownin Table IV.

By performing the topological sorting, we can get the se-quence order list as follows: 1 5 4 8 3 2 6 7 11 10 9 14 12 1315 16; the critical path is 1 2 6 7 10 14 15 16, and the executiontime of the WFS is 76.

VII. EXPERIMENTS

A. Setting of the Experiments

To evaluate the proposed scheduling model, we considertime and cost as key factors in the comparison with otherWFS strategies: minimum critical path (MCP), greedy cost,and DBL. MCP sorts services by their time and selects theservice with the minimum time for the corresponding task. Onthe contrary, the greedy-cost approach sorts services by theircost and selects the service with the minimum cost. For DBL,all tasks are partitioned into bottom level groups by using abackward method.

In our experiment, DAGs are randomly generated with differ-ent scales and structures. The expected time for each service israndomly generated from a uniform distribution in the interval[10], [60]. To simplify the problem, the corresponding costof each service is defined by the equation cost = 360/time.

TABLE IVOPTIMUM SOLUTION FOR THE WORKFLOW

All the algorithms are coded in Java and performed on anAdvanced Micro Device (AMD) Athlon II Dual-Core M300with a 2.00-GHz processor and 2-GB RAM which uses theoperating system Window XP.

B. Weight of Impact

Algorithm 2 Computing the Weight for TWFS

Input: A workflow graphOutput: A workflow schedule strategy for EISs1: wt = 0.5; wc = 0.5//wt: weight of time, wc: weight

of cost; the initial value of weights is equal 0.52: while executionTime <= deadline do3: wt = wt + 0.1; wc = wc − 0.14: for all vertex in Topical Sort Array do5: for all s in available services of the ith task do6: if s.trust <= trustConstraint of the ith task then7: λj = UTi

Z0(x) ∗ wt + UTi

Z1(x) ∗ wc

8: λk = max{λj}9: end if10: end for11: Mapping service sk onto the ith task.12: end for13: for all vertex in critical Path Array do14 executionTime+ = vertex.executionTime15: end for16: end while

The key idea of the TWFS algorithm is to find the optimumsolution with the deadline constraint by adjusting the weights oftime and cost. Let the initial weights of the objectives be equal.When the execution time of all tasks is much lower than thedeadline, the weight of cost is adjusted incrementally until the

Page 8: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE SYSTEMS JOURNAL

Fig. 4. Execution cost with respect to different weight of time.

Fig. 5. Time of each task of three strategies.

execution time of all tasks satisfies the deadline. The calculationof weights among the objectives can be obtained by the way of astandard dynamic programming algorithm with value iteration,which is stated in Algorithm 2.

As shown in Fig. 4, when the weight of time is close to thedeadline, TWFS is equivalent to MCP. As the weight of timedecreases to 0, TWFS is equivalent to greedy cost in which theweight of cost is the most important.

C. Comparison of Different Algorithms

The comparison of TWFS, MCP, and greedy-cost models ispresented by using these sample data described in Fig. 3. Theresults of execution time and cost for each task are recorded inFigs. 5 and 6. It concludes that TWFS enables users to find acompromising solution.

The next experiment is to sequentially test the aforemen-tioned three algorithms with different sizes. The number oftasks varies from 10 to 100 with an increment of 20. Thecomparisons of execution time and cost of TWFS, MCP, andgreedy cost are shown in Figs. 7 and 8, respectively.

Fig. 6. Cost of each task of three strategies.

Fig. 7. Comparison of execution time.

Fig. 8. Comparison of execution cost.

Page 9: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TAN et al.: TRUST SERVICE-ORIENTED SCHEDULING MODEL FOR WORKFLOW APPLICATIONS 9

Fig. 9. Execution time with different deadlines.

MCP has the shortest execution time among the algorithmsbut with the highest cost. Conversely, greedy cost has the leastcost but with the longest execution time. As for the TWFSapproach, time and cost are both considered simultaneously,which enables the user to compromise requirements to yielda genuinely better solution.

The aforementioned experiments are tested without strictdeadlines provided by the user. When deadline constraints areprovided, DBL sometimes is a better choice for WFS. In thenext experiment, we compare the proposed algorithm with DBLwith a strict deadline.

In order to evaluate the comparison results with a criticalconstraint, the execution time is normalized by using Execu-tionTime/Deadline, and each workflow execution is given withdifferent deadlines that are defined as follows:

D = Tmin + k ∗ (Tmax − Tmin) (23)

where D is the value of the deadline, Tmin is the min-imum execution time produced by MCP and Tmax is themaximum execution time produced by greedy cost; let k ∈{0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1}. Usually, the longerthe deadline is, the less the workflow pays for service.

Comparisons of execution time and cost for TWFS and DBLat different deadlines are shown in Figs. 9 and 10 separately.

As shown in Figs. 9 and 10, both DBL and TWFS cansatisfy the deadline constraint. As the time to the deadlineincreases, the constraint is more relaxed, and the execution timeof TWFS is much closer to the constraint time than that of DBL.Meanwhile, the execution cost produced by the TWFS andDBL decreases significantly. According to the aforementionedanalysis, the experiment indicates that TWFS is able to find theoptimum solution with the deadline constraint. TWFS performsslightly better than DBL.

VIII. CONCLUSION AND FUTURE WORK

In dynamic and failure-prone large-scale distributed systems,a lack of trust between enterprise and cloud service providersoften prevent businesses from fully adopting cloud services.

Fig. 10. Execution cost with different deadlines.

Integrating several cloud services into a composite serviceeffectively is still a research challenge. In this paper, we dis-cuss the WFS-related problem for system integration in cloudcomputing environments. A TWFS model is proposed for ES.The contribution of this paper is listed as follows.

1) We designed cloud service selection algorithms to formoptimum workflow application while meeting differentconstraints from users.

2) The proposed scheduling algorithm adopts a general trustmetric that combines direct trust and recommendationtrust.

For the TWFS model, the cloud service criteria such asexecution time, cost, and trust are considered simultaneouslyto yield a genuinely optimal solution.

The performance of the proposed algorithm has been dis-cussed and compared through an experiment. The TWFS al-gorithm could satisfy the requirements of the enterprise byadjusting the weights of different criteria, and the experimentalresults show that the proposed approach is effective.

There are a lot of research challenges and opportunities inscheduling of workflow applications [58]–[75]. Currently, fewresearch studies have been done about how dynamic run timechanges can affect a statically predetermined schedule. Dueto increased competition and evolution of cloud services overtime, adaptive and context-aware collaboration systems modelare being required to support for uncertainty and unreliableenvironments. As part of our future work, we plan to extend theTWFS algorithm for adaptive collaborative model in responseto changes in cloud computing environments.

REFERENCES

[1] L. Xu, “Enterprise systems: State-of-the-art and future trends,” IEEETrans. Ind. Informat., vol. 7, no. 4, pp. 630–640, Nov. 2011.

[2] L. Li, R. Ge, S. Zhou, and R. Valerdi, “Guest editorial: Integrated health-care information systems,” IEEE Trans. Inf. Technol. Biomed., vol. 16,no. 4, pp. 515–517, Jul. 2012.

[3] S. Wu, L. Xu, and W. He, “Industry-oriented enterprise resource plan-ning,” Enterprise Inf. Syst., vol. 3, no. 4, pp. 409–424, Nov. 2009.

[4] L. Li, “Effects of enterprise technology on supply chain collaboration:Analysis of China-linked supply chain,” Enterprise Inf. Syst., vol. 6, no. 1,pp. 55–77, Feb. 2012.

Page 10: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE SYSTEMS JOURNAL

[5] L. Xu, N. Liang, and Q. Gao, “An integrated approach for agriculturalecosystem management,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.,vol. 38, no. 4, pp. 590–599, Jul. 2008.

[6] N. Niu, M. Jin, and J. Cheng, “A case study of exploiting enterprise re-source planning requirements,” Enterprise Inf. Syst., vol. 5, no. 2, pp. 183–206, May 2011.

[7] J. Guo, L. Xu, Z. Gong, C. Che, and S. Chaudhry, “Semantic inference onheterogeneous e-marketplace activities,” IEEE Trans. Syst., Man, Cybern.A, Syst., Humans, vol. 42, no. 2, pp. 316–330, Mar. 2012.

[8] Y. Yin, Y. Fan, and L. Xu, “EMG and EPP-integrated human-machine interface between the paralyzed and rehabilitation exoskele-ton,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 542–549,Jul. 2012.

[9] L. Xu, C. Wang, Z. Bi, and J. Yu, “AutoAssem: An automated assem-bly planning system for complex products,” IEEE Trans. Ind. Informat.,vol. 8, no. 3, pp. 669–678, Aug. 2012.

[10] L. Duan and L. Xu, “Business intelligence for enterprise systems:A survey,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp. 679–687,Aug. 2012.

[11] Y. Yin, J. Xie, L. Xu, and H. Chen, “Imaginal thinking based human-machine design methodology for the configuration of reconfigurable ma-chine tools,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp. 659–668,Aug. 2012.

[12] J. Guo, L. Xu, G. Xiao, and Z. Gong, “Improving multilingual semanticinteroperation in cross-organizational enterprise systems through conceptdisambiguation,” IEEE Trans. Ind. Informat., vol. 8, no. 3, pp. 647–658,Aug. 2012.

[13] W. He and L. Xu, “Integration of distributed enterprise applications: Asurvey,” IEEE Trans. Ind. Informat., to be published.

[14] M. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, “Cloudcomputing: Distributed internet computing for IT and scientific research,”IEEE Internet Comput., vol. 13, no. 5, pp. 10–13, Sep./Oct. 2009.

[15] S. Li, L. Xu, X. Wang, and J. Wang, “Integration of hybrid wirelessnetworks in cloud services oriented enterprise information systems,” En-terprise Inf. Syst., vol. 6, no. 2, pp. 165–187, May 2012.

[16] B. Leiba, “Having one’s head in the cloud,” IEEE Internet Comput.,vol. 13, no. 5, pp. 4–6, Sep. 2009.

[17] B. Liu, S. Cao, and W. He, “Distributed data mining for e-business,” Inf.Technol. Manage., vol. 12, no. 2, pp. 67–79, Jun. 2011.

[18] R. Mietzner, F. Leymann, and T. Unger, “Horizontal and vertical combi-nation of multi-tenancy patterns in service-oriented applications,” Enter-prise Inf. Syst., vol. 5, no. 1, pp. 59–77, Feb. 2011.

[19] J. Leukel, S. Kim, and T. Schlegel, “Supply chain as a service: A cloudperspective on supply chain systems,” IEEE Syst. J., vol. 5, no. 1, pp. 16–27, Mar. 2011.

[20] K. Wang, X. Bai, J. Li, and C. Ding, “A service-based framework forpharmacogenomics data integration,” Enterprise Inf. Syst., vol. 4, no. 3,pp. 225–245, Aug. 2010.

[21] W. Tan, Y. Xu, W. Xu, L. Xu, X. Zhao, L. Wang, and L. Fu, “A method-ology toward manufacturing grid-based virtual enterprise operation plat-form,” Enterprise Inf. Syst., vol. 4, no. 3, pp. 283–309, Aug. 2010.

[22] N. Ranaldo and E. Zimeo, “Time and cost-driven scheduling of dataparallel tasks in grid workflows,” IEEE Syst. J., vol. 3, no. 1, pp. 104–120, Mar. 2009.

[23] L. Li and J. Liu, “An efficient and flexible web services-based multidisci-plinary design optimisation framework for complex engineering systems,”Enterprise Inf. Syst., vol. 6, no. 3, pp. 345–371, Aug. 2012.

[24] L. Xu, W. Viriyasitavat, P. Ruchikachorn, and A. Martin, “Using propo-sitional logic for requirements verification of service workflow,” IEEETrans. Ind. Informat., vol. 8, no. 3, pp. 631–638, Aug. 2012.

[25] W. Viriyasitavat, L. Xu, and A. Martin, “SWSpec: The requirementsspecification language in service workflow environments,” IEEE Trans.Ind. Informat., vol. 8, no. 3, pp. 639–646, Aug. 2012.

[26] L. Xu, W. Tan, H. Zhen, and W. Shen, “An approach to enterprise processdynamic modeling supporting enterprise process evolution,” Inf. Syst.Front., vol. 10, no. 5, pp. 611–624, Nov. 2008.

[27] L. Xu, H. Liu, S. Wang, and K. Wang, “Modeling and analysis techniquesfor cross-organizational workflow systems,” Syst. Res. Behav. Sci., vol. 26,no. 3, pp. 367–389, May/Jun. 2009.

[28] L. Xu, “Information architecture for supply chain quality management,”Int. J. Prod. Res., vol. 49, no. 1, pp. 183–198, Jan. 2011.

[29] H. Wang and H. Wu, “Supporting process design for e-business via an in-tegrated process repository,” Inf. Technol. Manage., vol. 12, no. 2, pp. 97–109, Jun. 2011.

[30] H. Hou, M. Hu, L. Chen, and J. Choi, “An enhanced model framework ofpersonalized material flow services,” Inf. Technol. Manage., vol. 12, no. 2,pp. 149–159, Jun. 2011.

[31] W. Tan, W. Xu, F. Yang, L. Xu, and C. Jiang, “A framework for service en-terprise workflow simulation with multi-agents cooperation,” EnterpriseInf. Syst., to be published.

[32] W. Liu, Y. Du, and C. Yan, “Soundness preservation in composed logicaltime workflow nets,” Enterprise Inf. Syst., vol. 6, no. 1, pp. 95–113,Feb. 2012.

[33] J. Ma, K. Wang, and L. Xu, “Modelling and analysis of workflow forlean supply chains,” Enterprise Inf. Syst., vol. 5, no. 4, pp. 423–447,Nov. 2011.

[34] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloudcomputing and emerging IT platforms: Vision, hype, and reality for de-livering computing as the 5th utility,” Future Gen. Comput. Syst., vol. 25,no. 6, pp. 599–616, Jun. 2009.

[35] X. Wang, C. S. Yeo, R. Buyya, and J. Su, “Optimizing the makespanand reliability for workflow applications with reputation and a look-aheadgenetic algorithm,” Future Gen. Comput. Syst., vol. 27, no. 8, pp. 1124–1134, Oct. 2011.

[36] S. Sebastian, R. P. Terry, and R. J. Nicholas, “Flexible provisioning of webservice workflows,” ACM Trans. Internet Technol., vol. 9, no. 1, pp. 1–45,Feb. 2009.

[37] M. Rahman, R. Ranjan, and R. Buyya, “Reputation-based dependablescheduling of workflow applications in peer-to-peer grids,” Comput.Netw., vol. 54, no. 18, pp. 3341–3359, Dec. 2010.

[38] C. W. Hang and M. P. Singh, “Trustworthy service selection and com-position,” ACM Trans. Autonom. Adapt. Syst., vol. 6, no. 1, pp. 1–17,Feb. 2011.

[39] S. Hwang, E. Lim, C. Lee, and C. Chen, “Dynamic web service selectionfor reliable web service composition,” IEEE Trans. Services Comput.,vol. 1, no. 2, pp. 104–116, Apr.–Jun. 2008.

[40] F. Skopik and S. Dustdar, “Expert discovery and interactions in mixedservice-oriented systems,” IEEE Trans. Service Comput., vol. 5, no. 2,pp. 233–245, Apr.–Jun. 2012.

[41] eBay.com. [Online]. Available: http://www.eBay.com[42] R. Zhou and K. Hwang, “Powertrust: A robust and scalable reputation

system for trusted peer-to-peer computing,” IEEE Trans. Parallel Distrib.Syst., vol. 18, no. 4, pp. 460–473, Apr. 2007.

[43] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrustalgorithm for reputation management in P2P networks,” in Proc. Int. Conf.WWW, 2003, pp. 640–651.

[44] A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputationsystems for online service provision,” Decis. Support Syst., vol. 43, no. 2,pp. 618–644, Mar. 2007.

[45] J. J. Dongarra, E. Jeannot, E. Saule, and Z. Shi, “Bi-objective schedul-ing algorithms for optimizing makespan and reliability on heterogeneoussystems,” in Proc. 19th Annu. ACM SPAA, 2007, pp. 280–288.

[46] Y. Jiang, J. Liu, M. Tang, and X. Liu, “An effective web service recom-mendation method based on personalized collaborative filtering,” in Proc.IEEE ICWS, 2011, pp. 211–218.

[47] L. Duan, W. Street, and E. Xu, “Healthcare information systems: Datamining methods in the creation of a clinical recommender system,” En-terprise Inf. Syst., vol. 5, no. 2, pp. 169–181, May 2011.

[48] R. Sakellariou, H. Zhao, E. Tsiakkouri, and M. D. Dikaiakos, “Schedulingworkflows with budget constraints,” in Proc. Workshop Integr. Res. GridComput., Pisa, Italy, 2005, pp. 189–202.

[49] J. Yu and R. Buyya, “A taxonomy of workflow management systemsfor grid computing,” J. Grid Comput., vol. 33, no. 3/4, pp. 171–200,Sep. 2005.

[50] J. Yu, R. Buyya, and C. K. Tham, “Cost-based scheduling of scientificworkflow applications on utility grids,” in Proc. 1st IEEE Int. Conf.e-Science Grid Comput., Melbourne, Australia, 2005, pp. 140–147.

[51] Y. Yuan, X. Li, Q. Wang, and Y. Zhang, “Bottom level based heuristic forscheduling workflows in grids,” Chin. J. Comput., vol. 31, no. 2, pp. 282–290, 2008.

[52] K. Liu, H. Jin, J. Chen, X. Liu, D. Yuan, and Y. Yang, “A compromised-time-cost scheduling algorithm in SwinDeW-C for instance-intensivecost-constrained workflows on a cloud computing platform,” Int. J. HighPerform. Comput. Appl., vol. 24, no. 4, pp. 445–456, Nov. 2010.

[53] M. Zhou, W. Guo, S. Xiao, A. Wei, Y. Jin, W. Hu, and G. Geller,“Availability-driven scheduling for real-time directed acyclic graph appli-cations in optical grids,” IEEE/OSA J. Opt. Commun. Netw., vol. 2, no. 7,pp. 469–480, Jul. 2010.

[54] L. Zadeh, “Fuzzy sets,” Inf. Control, vol. 8, no. 3, pp. 338–353, Jun. 1965.[55] H. J. Zimmermann, “Fuzzy programming and linear programming with

several objective function,” Fuzzy Sets Syst., vol. 1, no. 1, pp. 45–55, Jan.1978.

[56] C. Lin, “A weighted max-min model for fuzzy goal programming,” FuzzySets Syst., vol. 142, no. 3, pp. 407–420, Mar. 2004.

Page 11: A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TAN et al.: TRUST SERVICE-ORIENTED SCHEDULING MODEL FOR WORKFLOW APPLICATIONS 11

[57] L. Xu, “A fuzzy multi-objective programming algorithm in decision sup-port systems,” Ann. Oper. Res., vol. 12, no. 1–4, pp. 315–320, Feb. 1988.

[58] S. Feng, L. Xu, C. Tang, and S. Yang, “An intelligent agent with layeredarchitecture for operating systems resource management,” Expert Syst.,vol. 20, no. 4, pp. 171–178, Sep. 2003.

[59] W. Tan, W. Shen, L. Xu, B. Zhou, and L. Li, “A business process intel-ligence system for enterprise process performance management,” IEEETrans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 6, pp. 745–756,Nov. 2008.

[60] W. Tan, C. Jiang, L. Li, and Z. Lv, “Role-oriented process-driven enter-prise cooperative work using the combined rule scheduling strategies,”Inf. Syst. Front., vol. 10, no. 5, pp. 519–529, Nov. 2008.

[61] F. Li, L. Xu, C. Jin, and H. Wang, “Random assignment method based ongenetic algorithms and its application in resource allocation,” Expert Syst.Appl., vol. 39, no. 15, pp. 12 213–12 219, Nov. 2012.

[62] F. Li, L. Xu, C. Jin, and H. Wang, “Study on solution models and methodsfor the fuzzy assignment problems,” Expert Syst. Appl., vol. 39, no. 12,pp. 115 276–115 283, Sep. 2012.

[63] K. Nagothu, B. Kelley, M. Jamshidi, and A. Rajaee, “Persistent Net-AMIfor microgrid infrastructure using cognitive radio on cloud data centers,”IEEE Syst. J., vol. 6, no. 1, pp. 4–15, Mar. 2012.

[64] D. Parlanti, F. Paganelli, and D. Giuli, “A service-oriented approach fornetwork-centric data integration and its application to maritime surveil-lance,” IEEE Syst. J., vol. 5, no. 2, pp. 164–175, Jun. 2011.

[65] Z. Zhou, R. Valerdi, and S. Zhou, “Guest editorial special section onenterprise systems,” IEEE Trans. Ind. Informat., vol. 8, no. 3, p. 630,Aug. 2012.

[66] L. Xu, C. Wang, Z. Bi, and J. Yu, “Object-oriented templates for auto-mated assembly planning of complex products,” IEEE Trans. Autom. Sci.Eng., to be published.

[67] H. Wang, W. He, and F. Wang, “Enterprise cloud service architectures,”Inf. Technol. Manage., vol. 13, no. 4, pp. 445–454, Dec. 2012.

[68] J. Yu, L. Xu, Z. Bi, and C. Wang, “Extended interference matrices forexploded view of assembly planning,” IEEE Trans. Autom. Sci. Eng., tobe published.

[69] N. Niu, L. Xu, and Z. Bi, “Enterprise information systemsarchitecture—Analysis and evaluation,” IEEE Trans. Ind. Informat.,to be published.

[70] S. Xu, L. Xu, and J. Basl, “Introduction advances in e-business engineer-ing,” Inf. Technol. Manage., vol. 13, no. 4, pp. 201–204, Dec. 2012.

[71] S. L, L. Xu, and X. Wang, “Compressed sensing signal and data acquisi-tion in wireless sensor networks and internet of things,” IEEE Trans. Ind.Informat., to be published.

[72] S. Wang, L. Li, K. Wang, and J. Jones, “e-business systems integration: Asystems perspectives,” Inf. Technol. Manage., vol. 13, no. 4, pp. 233–249,Dec. 2012.

[73] L. Zeng, L. L, and L. Duan, “Business intelligence in enterprise com-puting environment,” Inf. Technol. Manage., vol. 13, no. 4, pp. 297–310,Dec. 2012.

[74] F. Tao, Y. Laili, L. Xu, and L. Zhang, “FC-PACO-RM: A parallel methodfor service composition optimal-selection in cloud manufacturing sys-tems,” IEEE Trans. Ind. Informat., to be published.

[75] J. Chang, H. Chao, J. Chen, and C. Lai, “An efficient service discoverysystem for dual-stack cloud file service,” IEEE Syst. J., vol. 6, no. 4,pp. 584–592, Dec. 2012.

WenAn Tan received the Bachelor of Engineeringdegree in computer software and the Ph.D. degree incomputer software and theory from Beihang Univer-sity, Beijing, China, in 1987 and 2001, respectively.

He is currently a Professor of computer sciencewith the Nanjing University of Aeronautics andAstronautics, Nanjing, China. He is also a Profes-sor with Shanghai Second Polytechnic University,Shanghai, China. He was a Postdoctoral Fellow inthe Software Institute, Chinese Academy of Sci-ences, for two years and a Visiting Scientist in the

National Research Council of Canada for one year. His current researchinterests include software engineering, process engineering and developmentenvironment, enterprise dynamic modeling, trusted service computation, andenterprise intelligent information systems. He has published more than 80scientific papers in scientific journals and international conferences/workshops.

Yong Sun received the M.S. degree in computerscience from the China University of Geosciences,Wuhan, China, in 2007. He is currently workingtoward the Ph.D. degree in the School of Com-puter Science and Technology, Nanjing University ofAeronautics and Astronautics, Nanjing, China.

His main fields of research are software engineer-ing, cooperative computing, service computing, gridand cloud computing based on workflow manage-ment, and intelligent information systems.

Ling Xia Li received the M.S. and Ph.D. degreesin production/operations and logistics from the OhioState University, Columbus, OH, USA.

She is currently a Professor of production/operations with Old Dominion University, Norfolk,VA, USA, and a fellow in production and inven-tory management of the Association for OperationsManagement.

Dr. Li has served as an Associate Editor for theIEEE TRANSACTIONS ON INFORMATION TECH-NOLOGY IN BIOMEDICINE, IEEE TRANSACTIONS

ON INDUSTRIAL INFORMATICS, and other IEEE journals. She has pub-lished research articles in journals, including the IEEE TRANSACTIONS ON

SYSTEMS, MAN, AND CYBERNETICS PART C, IEEE TRANSACTIONS ON

INFORMATION TECHNOLOGY IN BIOMEDICINE, IEEE SYSTEMS JOURNAL,European Journal of Operational Research, Journal of Operations Manage-ment, International Journal of Production Research, International Journal ofOperations and Production Management, International Journal of ProductionEconomics, Annals of Operations Research, Computers and Operations Re-search, OMEGA, etc.

GuangZhen Lu is currently working toward theM.S. degree in computer science and technology atthe Nanjing University of Aeronautics and Astronau-tics, Nanjing, China.

His research interests include software engineer-ing, cooperative computing, and service computing.

Tong Wang received the B.S. degree from the Insti-tute of Computer Science and Technology, TaiyuanUniversity of Science and Technology, Taiyuan,China, in 2002, the M.S. degree from the Instituteof Computer Science and Technology, Lanzhou Uni-versity of Technology, Lanzhou, China, in 2006,and the Ph.D. degree from the Institute of ImageProcessing and Pattern Recognition, Shanghai JiaoTong University, Shanghai, China, in 2009.

She is currently a Lecturer with the Institute ofComputer and Information, Shanghai Second Poly-

technic University, Shanghai. Her research interests include data mining,artificial intelligence, and pattern recognition.