{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:28:16Z","timestamp":1775068096153,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:00:00Z","timestamp":1758585600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The growing demand for computational resources has led to the adoption of multi\u2010cloud frameworks that distribute workloads across various cloud service providers to enhance scalability and availability. However, existing task scheduling algorithms in such environments often suffer from inefficient prioritization, lack of dependency handling, and inadequate security measures. To address these challenges, this paper introduces the Multi\u2010Cloud Secure Task Scheduling Optimizer (MCSTSO) framework, which combines two core innovations: the Paired Flutter Optimization (PFO) algorithm and the SecureX RSA encryption mechanism. PFO is a hybrid algorithm that integrates task pairing with a modified Butterfly Optimization Algorithm (BOA) for efficient multi\u2010cloud scheduling. It begins by grouping tasks into pairs based on calculated attributes and threshold values. These pairs are then scheduled using the modified BOA, which considers deadlines, resource availability, and execution costs. This approach improves scheduling efficiency, minimizes completion time, and enhances resource utilization. Simultaneously, SecureX RSA ensures robust data protection through a multi\u2010layered cryptographic scheme, safeguarding task data during transmission and execution. The SecureX RSA mechanism ensures data confidentiality by encrypting task data during transmission and execution in the multi\u2010cloud environment. It works in tandem with the PFO algorithm, securing each task pair while PFO optimizes their scheduling and resource allocation. Experimental results demonstrate a makespan of 1471\u2009s, throughput of 0.28\u2009s, and 91.11% Virtual Machine utilization, confirming the framework's effectiveness in balancing performance with strong data security, even under added cryptographic overhead.<\/jats:p>","DOI":"10.1002\/spy2.70104","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T05:52:06Z","timestamp":1758693126000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Toward Efficient and Secure Task Scheduling Using Trust Optimizer Multi\u2010Cloud Scheduler"],"prefix":"10.1002","volume":"8","author":[{"given":"Bharti","family":"Nikose","sequence":"first","affiliation":[{"name":"Department of Computer Engineering Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7908-3199","authenticated-orcid":false,"given":"Gautam M.","family":"Borkar","sequence":"additional","affiliation":[{"name":"Department of Information Technology Ramrao Adik Institute of Technology, DY Patil Deemed to be University  Nerul, Navi Mumbai Maharashtra India"}]}],"member":"311","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"issue":"4","key":"e_1_2_13_2_1","first-page":"448","article-title":"Emerging Challenges in Cloud Computing Security: A Comprehensive Review","volume":"1","author":"Yanamala A. K. Y.","year":"2024","journal-title":"International Journal of Advanced Engineering Technologies and Innovations"},{"key":"e_1_2_13_3_1","first-page":"1","volume-title":"Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021","author":"Alam A.","year":"2022"},{"issue":"9","key":"e_1_2_13_4_1","first-page":"379","article-title":"Cloud Computing Security for Multi\u2010Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape","volume":"16","author":"Achar S.","year":"2022","journal-title":"International Journal of Computer and Systems Engineering"},{"key":"e_1_2_13_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-020-00194-7"},{"key":"e_1_2_13_6_1","first-page":"P600","article-title":"Multi\u2010Cloud Strategies for Distributed AI Workflows and Application","volume":"10","author":"Sekar J.","year":"2023","journal-title":"Journal of Emerging Technologies and Innovative Research"},{"key":"e_1_2_13_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09533-z"},{"key":"e_1_2_13_8_1","unstructured":"H.GuptaandA.Bhardwaj \u201cSecuring the Cloud: An In\u2010Depth Exploration of Conceptual Models Emerging Trends and Forward\u2010Looking Insights \u201d2023."},{"key":"e_1_2_13_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03038-7"},{"key":"e_1_2_13_10_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.022287"},{"key":"e_1_2_13_11_1","doi-asserted-by":"publisher","DOI":"10.33022\/ijcs.v13i2.3811"},{"key":"e_1_2_13_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03048-8"},{"key":"e_1_2_13_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11199005"},{"key":"e_1_2_13_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04662-6"},{"key":"e_1_2_13_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16781-0"},{"key":"e_1_2_13_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1003934"},{"key":"e_1_2_13_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-72774-5"},{"issue":"7","key":"e_1_2_13_18_1","first-page":"776","article-title":"Energy Aware Genetic Algorithm for Independent Task Scheduling in Heterogeneous Multi\u2010Cloud Environment","volume":"81","author":"Pradhan R.","year":"2022","journal-title":"Journal of Scientific & Industrial Research"},{"issue":"1","key":"e_1_2_13_19_1","first-page":"436","article-title":"Research on Scheduling of Two Types of Tasks in Multi\u2010Cloud Environment Based on Multi\u2010Task Optimization Algorithm","volume":"14","author":"Yi C.","year":"2024","journal-title":"Journal of Applied Analysis and Computation"},{"key":"e_1_2_13_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-46284-9"},{"key":"e_1_2_13_21_1","doi-asserted-by":"publisher","DOI":"10.55524\/ijircst.2025.13.2.6"},{"key":"e_1_2_13_22_1","first-page":"1","article-title":"An Efficient Strategy for Ensuring Multi\u2010Cloud Information Security","volume":"16","author":"Bansal S.","year":"2025","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"e_1_2_13_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym17040503"},{"issue":"3","key":"e_1_2_13_24_1","first-page":"928","article-title":"Towards Security\u2010Based Formation of Cloud Federations: A Game Theoretical Approach","volume":"8","author":"Halabi T.","year":"2020","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_13_25_1","doi-asserted-by":"crossref","unstructured":"K. V.VishwanathandN.Nagappan \u201cCharacterizing Cloud Computing Hardware Reliability \u201din Proceedings of the 1st ACM Symposium on Cloud Computing (2010) 193\u2013204.","DOI":"10.1145\/1807128.1807161"},{"key":"e_1_2_13_26_1","doi-asserted-by":"publisher","DOI":"10.33640\/2405-609X.3396"},{"key":"e_1_2_13_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112129"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:54Z","timestamp":1763451774000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,23]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70104"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70104","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,23]]},"assertion":[{"value":"2025-04-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70104"}}