British Journal of Research Open Access

  • ISSN: 2394-3718
  • Journal h-index: 8
  • Journal CiteScore: 0.52
  • Journal Impact Factor: 0.45
  • Average acceptance to publication time (5-7 days)
  • Average article processing time (30-45 days) Less than 5 volumes 30 days
    8 - 9 volumes 40 days
    10 and more volumes 45 days
Reach us +32 25889658

Opinion - (2023) Volume 10, Issue 2

Cloud-Aware Data Intensive Workflow Scheduling on Volunteer Computing Systems
Toktam Ghafarian*
 
Department of Computer Engineering, Ferdowsi University of Mashhad, Iran
 
*Correspondence: Toktam Ghafarian, Department of Computer Engineering, Ferdowsi University of Mashhad, Iran, Email:

Received: 31-Jan-2023, Manuscript No. IPBJR-23-16448; Editor assigned: 02-Feb-2023, Pre QC No. IPBJR-23-16448 (PQ); Reviewed: 16-Feb-2023, QC No. IPBJR-23-16448; Revised: 21-Feb-2023, Manuscript No. IPBJR-23-16448 (R); Published: 28-Feb-2023, DOI: 10.21767/2394-3718.10.2.18

Introduction

Volunteer computing is a form of distributed computing where individuals or organizations volunteer their unused computing power to contribute to scientific research. This has become a popular way for researchers to harness the processing power of many devices, without having to invest in expensive computing hardware. However, while volunteer computing has many benefits, there are also several drawbacks that need to be considered. One of the biggest drawbacks of volunteer computing is the lack of control over the computing environment. In traditional computing environments, researchers have complete control over the hardware and software used for their experiments. With volunteer computing, however, the environment is largely out of their hands. Participants may have different operating systems, different levels of security, and varying amounts of computing power, which can all impact the results of the experiment. Additionally, because participants are not obligated to keep their devices running for a specific amount of time, there may be periods where computing power is unavailable, which can delay experiments. Another issue with volunteer computing is the potential for security breaches. Because participants are allowing researchers to access their computing power, there is a risk that malicious actors could gain access to sensitive data or inject malware into the system. This risk is heightened because participants are not always screened for security vulnerabilities, and may not have the same level of security protocols in place as traditional computing environments.

Description

Furthermore, volunteer computing is not always cost-effective. While it may seem like a cost-effective solution to research computing, there are many hidden costs associated with volunteer computing. For example, researchers must invest time and resources in developing and testing software that can run on a wide range of devices, which can be a complex and time-consuming process. Additionally, because there is no guarantee that participants will keep their devices running for the duration of the experiment, researchers may have to run multiple trials, which can increase the overall cost of the experiment. Another issue with volunteer computing is the potential for biased results. Because participants are self-selected and may have different motivations for participating, the sample may not be representative of the general population. This can lead to biased results, which can be problematic for research projects that require a representative sample. Finally, volunteer computing may not always be reliable. Because participants are not obligated to keep their devices running, there may be periods of time where computing power is unavailable. This can lead to delays in experiments, which can impact the overall results. Additionally, because participants may have different levels of computing power and May not always has the latest hardware, there may be inconsistencies in the results, which can make it difficult to draw conclusions from the data.

Conclusion

However, researchers must be aware of the limitations of volunteer computing and take steps to mitigate these drawbacks. This may include developing software that can run on a wide range of devices, implementing security protocols to protect against malicious actors, and running multiple trials to ensure the reliability of the results. In conclusion, while volunteer computing has many benefits, there are also several drawbacks that need to be considered. These include the lack of control over the computing environment, the potential for security breaches, the cost-effectiveness of the approach, the potential for biased results, and the reliability of the results. Researchers must be aware of these limitations and take steps to mitigate them, in order to ensure that the data collected through volunteer computing is reliable and useful for scientific research.

Acknowledgement

None.

Conflict of Interest

The author declares there is no conflict of interest.

Citation: Ghafarian T (2023) Cloud-Aware Data Intensive Workflow Scheduling on Volunteer Computing Systems. Br J Res. 10:18.

Copyright: © 2023 Ghafarian T. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.