skip to main content
10.1145/2905055.2905152acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud

Published:04 March 2016Publication History

ABSTRACT

Cloud Computing is a new evolutionary and dynamic platform that makes use of virtualization technology. In Cloud computing environment, virtualization abstracts the hardware system resources in software so that each application can be run in an isolated environment called the virtual machine and hypervisor does the allocation of virtual machines to different users that are hosted on same server. Although it provides many benefits like resource-sharing, cost-efficiency, high-performance computability and decrease in hardware cost but it also imposes a number of security threats. The threats can be directly on Virtual Machines (VMs) or indirectly on Hyper-visor through virtual machines that are hosted on it. This paper presents a review of all possible security threats and also their countermeasures by using Game-Theoretic approaches. Game Theory can be used as a defensive measure because of independent and strategic rational decision making nature of cloud users where each player would compete for best possible solution

References

  1. Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez, 2014. Game Theoretic Modeling of Security And Interdependency In A Public Cloud, IEEE International Conference On Cloud Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu, 2013. A Game Theoretic Method to Model and Evaluate Attack-Defense Strategy in Cloud Computing, IEEE 10th International Conference on Services Computing, June 28 2013-July 3 2013, 659--666. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Iliana Iankoulova, Maya Daneva, 2012. Cloud Computing Security Requirements: a Systematic Review, (RCIS), 2012 Sixth International Conference on Research Challenges in Information Science, 16-18 May 2012, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  4. K. Lye and J. Wing, Game strategies in network security, 2005. International Journal of Information Security, Vol. 4, No. 1-2, 2005, 71--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Sallhammar, S. Knapskog, and B. Helvik, Using stochastic game theory to compute the expected behavior of attackers, In Proc. 2005 International Symposium on Applications and the Internet Workshops (Saint2005), 102--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew Martin, 2015. Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach, IEEE 8th International Conference on Cloud Computing, 13 Jan 2015, 556--563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Maha Jebalia, Asma Ben Letaïfa, Mohamed Hamdi, Sami Tabbane, 2013. A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 17-20 June 2013, 336--341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mahdi Aiash, Glenford Mapp, Orhan Gemikonakli, 2014. Secure Live Virtual Machines Migration: Issues and Solutions, 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, 160--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michael Pearce, Sherali Zeadally, Ray Hunt, 2013. Virtualization: Issues, security threats, and solutions, ACM Computing Surveys, Vol. 45, No. 2, Article 17, February 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Parvathy S. Pillai, Shrisha Rao, 2014. Resource Allocation in Cloud Computing using the Uncertainty Principle of Game Theory, Systems Journal, IEEE, 09 May 2014, ISSN:1932--8184, 1--12.Google ScholarGoogle Scholar
  11. Rajkuar Buyya, James Broberg, Andrej Goscinski, Cloud Computing: Principles and Paradigms, Wiley series on Parallel and Distributed Computing, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng, "H-SVM: Hardware-Assisted Secure Virtual Machines under A Vulnerable Hypervisor", IEEE Transactions On Computers, Vol. 64, No. 10, October 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Xin Xu and Huiqun Yu, A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2014, Article ID 915878.Google ScholarGoogle Scholar
  14. Xiannuan Liang and Yang Xiao, 2013. Game Theory for Network Security", IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, First Quarter 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie, 2013. Security Games For Virtual Machine Allocation In Cloud Computing, 4th International Conference on Decision and Game Theory for Security-Vol. 8252, 99--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart, 2012. Cross-VM side channels and their use to extract private keys, Proceedings of the 2012 ACM conference on Computer and communications security, 305--316, DOI= http://doi.acm.org/10.1145/2382196.23822301 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Zhenping Lu, Xiangming Wen, A game theory based resource sharing scheme in cloud computing environment, 2012. Information and Communication Technologies (WICT), World Congress on Oct. 30-Nov. 2 2012, 1097--1102.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
    March 2016
    843 pages
    ISBN:9781450339629
    DOI:10.1145/2905055

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 March 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate97of270submissions,36%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader