A Comprehensive Taxonomy and Critical Survey of Scientific Workflow Scheduling Paradigms in IaaS Cloud Computing: Evaluating Fitness for High-Stakes Environmental Modeling
Abstract
The escalating computational demands of modern science necessitate the use of Infrastructure-as-a-Service (IaaS) cloud platforms, particularly for large-scale, interdependent Scientific Workflows (SWFs). Critical high-stakes applications, such as the modeling of climate-induced seismicity (e.g., the link between rising sea levels and increased seismic activity in coastal regions), require scheduling solutions that ensure not only efficiency but also unparalleled reliability and deadline adherence. This paper provides a comprehensive, systematic survey and novel taxonomy of SWF scheduling algorithms in IaaS environments. The primary objective is to classify state-of-the-art methods and, critically, assess their inherent suitability and limitations when applied to time-sensitive, computationally-intensive research that must account for dynamic, real-world data, such as the 5% increase in seismic events since 2020. We propose a multi-dimensional taxonomy based on primary optimization objectives (e.g., makespan, cost, energy), algorithmic strategy (e.g., heuristic, meta-heuristic, hybrid), and resource provisioning models, performing a detailed analysis on the strengths and weaknesses of key contributions. Current scheduling paradigms exhibit strong performance on traditional benchmarks but reveal significant deficiencies when confronted with the strict reliability and fault tolerance required by critical environmental models, highlighting a prevalent trade-off between cost-effectiveness and system robustness. Ultimately, we conclude that current predictive models are insufficient—not only due to geophysical complexity but also because the underlying resource scheduling and provisioning mechanisms lack the necessary agility and guaranteed performance to accurately and reliably process the influx of high-velocity, high-volume data, underscoring the imperative for a new generation of reliability-aware, deadline-sensitive scheduling.
Keywords
References
Similar Articles
- Julia H. Whitaker, PROACTIVE CYBER THREAT HUNTING AND PREDICTIVE INTELLIGENCE IN CLOUD-ENABLED CRITICAL INFRASTRUCTURE: AN INTEGRATED FRAMEWORK FOR RESILIENT DIGITAL ECOSYSTEMS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Aghasi Gevorgyan, Automation of Compliance Control Processes According to PCI DSS Standards in Hybrid Cloud Environments , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Prof. Daniel M. Hughes, A HYBRID SECURE SPECTRUM ALLOCATION FRAMEWORK FOR SPACE-DIVISION MULTIPLEXING ELASTIC OPTICAL NETWORKS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 01 (2025): Volume 02 Issue 01
- Dr. Arben Kola, Dr. Elira Hoxha, Dr. Gentian Leka, Study of Threat Evaluation and Forecasting Framework for Communication Infrastructure Using Neural Intelligence Techniques , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Laura Stein, ADVANCING PROACTIVE CYBERSECURITY THROUGH CYBER THREAT INTELLIGENCE MINING: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Dr. Jakob R. Neumann, Prof. Leila F. Mahmoud, Securing the Virtual Meeting Space: An Analysis of Cybersecurity Risks and Mitigation Strategies for Video Conferencing Platforms , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- Dr. Alistair C. Finch, From Reactive to Predictive: A Framework for Integrating Threat Intelligence with SIEM for Proactive Threat Hunting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Nyra Quellin, Strategic Risk-Based Cybersecurity Governance: Integrating Policy Frameworks, Organizational Controls, and Compliance Mechanisms for Contemporary Information Systems , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Elena Marovic, Dr. Sofia Markovic, Cybersecurity Governance and Resilience in Small and Medium-Sized Enterprises: A Socio-Technical, Resource-Based, and Regulatory Framework for Sustainable Digital Competitiveness , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 04 (2026): Volume 03 Issue 04
- Dr. Marcus A. Rodriguez, A Longitudinal Analysis of Cybersecurity Technology and Innovation: A Technology Mining Approach Using Bibliometric and Patent Analysis , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 05 (2026): Volume 03 Issue 05
You may also start an advanced similarity search for this article.