Skip to main navigation menu Skip to main content Skip to site footer

A Synergistic Metaheuristic Framework for Secure Task Scheduling and Resource Allocation in Heterogeneous IoT-Cloud Ecosystems

Abstract

The rapid proliferation of Internet of Things (IoT) devices has fundamentally altered the landscape of distributed computing, necessitating robust architectures that bridge the gap between edge perception and cloud-based analytical power. However, the inherent constraints of IoT nodes-specifically limited energy reserves, processing capabilities, and memory-create significant bottlenecks when managing high-volume data streams and complex task dependencies. This research presents an integrated conceptual framework that addresses the dual challenges of operational efficiency and network security within IoT-Cloud environments. By synthesizing principles from nature-inspired metaheuristic algorithms, specifically the Whale Optimization Algorithm (WOA) and the Grey Wolf Optimizer (GWO), this study proposes a hybrid approach for effectual job scheduling and resource distribution. Furthermore, the article explores the critical integration of intrusion detection systems (IDS) as a non-negotiable component of the scheduling lifecycle. Through an extensive theoretical elaboration of emperor penguin colony optimization, flower pollination mechanisms, and golden jackal behavior, we analyze how decentralized intelligence can optimize load balancing while maintaining a high defense posture against evolving cyber threats. The results suggest that hybridizing bio-inspired search strategies significantly reduces task latency and energy consumption while enhancing the detection accuracy of network anomalies. This comprehensive analysis provides a foundational roadmap for developing resilient, self-optimizing distributed systems capable of sustaining the next generation of smart infrastructure.

Keywords

Internet of Things, Cloud Computing, Resource Allocation, Metaheuristic Optimization

PDF

References

  1. Al-Masri E, Souri A, Mohamed H, Yang W, Olmsted J, Kotevska O (2023) Energy-efficient cooperative resource allocation and task scheduling for internet of things environments. Internet Things 23:100832
  2. Alweshah M, Hammouri A, Alkhalaileh S, Alzubi O (2023) Intrusion detection for the Internet of Things (IoT) based on the emperor penguin colony optimization algorithm. J Ambient Intell Humaniz Comput 14(5):6349–6366
  3. Asghari A, Sohrabi MK, Yaghmaee F (2021) Task scheduling, resource provisioning, and load balancing on scientific workflows using parallel SARSA reinforcement learning agents and genetic algorithm. J Supercomputing 77(3):2800–2828
  4. Dahou A et al (2002) Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput Intel Neurosci, vol 2022
  5. Gangula R, M. M. V (2022) Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier. Concurrency and Computation: Practice and Experience 34(21):e7103
  6. Hanafi AV, Ghaffari A, Rezaei H, Valipour A, Arasteh B (2023) Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. Cluster Computing, pp 1–18
  7. Kashani MH, Mahdipour E (2022) Load balancing algorithms in fog computing. IEEE Trans Serv Comput 16(2):1505–1521
  8. Krishnamurthy Sukumar H. K., "A Novel Hybrid Grey Wolf Whale Optimization for Effectual Job Scheduling and Resource Distribution in Dynamic Cloud Computing," 2025 International Conference on Sustainability, Innovation & Technology (ICSIT), Nagpur, India, 2025, pp. 1-6, doi: 10.1109/ICSIT65336.2025.11293898.
  9. Kumar S, Mohbey KK (2022) A review of big data based parallel and distributed approaches of pattern mining. J King Saud University-Computer Inform Sci 34(5):1639–1662
  10. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
  11. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61
  12. Ng JS, Lim WYB, Luong NC, Xiong Z, Asheralieva A, Niyato D, Miao C (2021) A comprehensive survey on coded distributed computing: Fundamentals, challenges, and networking applications. IEEE Commun Surveys Tutorials 23(3):1800–1837
  13. Wu Z, Sun J, Zhang Y, Wei Z, Chanussot J (2021) Recent developments in parallel and distributed computing for remotely sensed big data processing. Proc IEEE 109(8):1282–1305
  14. Xiao H, Yi K, Peng R, Kou G (2021) Reliability of a distributed computing system with performance sharing. IEEE Trans Reliab 71(4):1555–1566
  15. Zhang J, Zhang D (2023) Internet of things network intrusion detection model based on quantum artificial fish group and fuzzy kernel clustering algorithm. Security and Privacy 6(2):e220
  16. Zhang Y, Li P, Wang X (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711–31722
  17. Zhao F, Bao H, Wang L, Cao J, Tang J (2022) A multipopulation cooperative coevolutionary whale optimization algorithm with a two-stage orthogonal learning mechanism. Knowl-Based Syst 246:108664

Downloads

Download data is not yet available.