skip to main content
10.1145/2905055.2905152acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud

Published: 04 March 2016 Publication History

Abstract

Cloud Computing is a new evolutionary and dynamic platform that makes use of virtualization technology. In Cloud computing environment, virtualization abstracts the hardware system resources in software so that each application can be run in an isolated environment called the virtual machine and hypervisor does the allocation of virtual machines to different users that are hosted on same server. Although it provides many benefits like resource-sharing, cost-efficiency, high-performance computability and decrease in hardware cost but it also imposes a number of security threats. The threats can be directly on Virtual Machines (VMs) or indirectly on Hyper-visor through virtual machines that are hosted on it. This paper presents a review of all possible security threats and also their countermeasures by using Game-Theoretic approaches. Game Theory can be used as a defensive measure because of independent and strategic rational decision making nature of cloud users where each player would compete for best possible solution

References

[1]
Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez, 2014. Game Theoretic Modeling of Security And Interdependency In A Public Cloud, IEEE International Conference On Cloud Computing.
[2]
Guisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu, 2013. A Game Theoretic Method to Model and Evaluate Attack-Defense Strategy in Cloud Computing, IEEE 10th International Conference on Services Computing, June 28 2013-July 3 2013, 659--666.
[3]
Iliana Iankoulova, Maya Daneva, 2012. Cloud Computing Security Requirements: a Systematic Review, (RCIS), 2012 Sixth International Conference on Research Challenges in Information Science, 16-18 May 2012, 1--7.
[4]
K. Lye and J. Wing, Game strategies in network security, 2005. International Journal of Information Security, Vol. 4, No. 1-2, 2005, 71--86.
[5]
K. Sallhammar, S. Knapskog, and B. Helvik, Using stochastic game theory to compute the expected behavior of attackers, In Proc. 2005 International Symposium on Applications and the Internet Workshops (Saint2005), 102--105.
[6]
Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew Martin, 2015. Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach, IEEE 8th International Conference on Cloud Computing, 13 Jan 2015, 556--563.
[7]
Maha Jebalia, Asma Ben Letaïfa, Mohamed Hamdi, Sami Tabbane, 2013. A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 17-20 June 2013, 336--341.
[8]
Mahdi Aiash, Glenford Mapp, Orhan Gemikonakli, 2014. Secure Live Virtual Machines Migration: Issues and Solutions, 28th International Conference on Advanced Information Networking and Applications Workshops, 13-16 May 2014, 160--165.
[9]
Michael Pearce, Sherali Zeadally, Ray Hunt, 2013. Virtualization: Issues, security threats, and solutions, ACM Computing Surveys, Vol. 45, No. 2, Article 17, February 2013.
[10]
Parvathy S. Pillai, Shrisha Rao, 2014. Resource Allocation in Cloud Computing using the Uncertainty Principle of Game Theory, Systems Journal, IEEE, 09 May 2014, ISSN:1932--8184, 1--12.
[11]
Rajkuar Buyya, James Broberg, Andrej Goscinski, Cloud Computing: Principles and Paradigms, Wiley series on Parallel and Distributed Computing, 2014.
[12]
Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng, "H-SVM: Hardware-Assisted Secure Virtual Machines under A Vulnerable Hypervisor", IEEE Transactions On Computers, Vol. 64, No. 10, October 2015.
[13]
Xin Xu and Huiqun Yu, A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing, Hindawi Publishing Corporation Mathematical Problems in Engineering, Volume 2014, Article ID 915878.
[14]
Xiannuan Liang and Yang Xiao, 2013. Game Theory for Network Security", IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, First Quarter 2013.
[15]
Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie, 2013. Security Games For Virtual Machine Allocation In Cloud Computing, 4th International Conference on Decision and Game Theory for Security-Vol. 8252, 99--118.
[16]
Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart, 2012. Cross-VM side channels and their use to extract private keys, Proceedings of the 2012 ACM conference on Computer and communications security, 305--316, DOI= http://doi.acm.org/10.1145/2382196.23822301
[17]
Zhenping Lu, Xiangming Wen, A game theory based resource sharing scheme in cloud computing environment, 2012. Information and Communication Technologies (WICT), World Congress on Oct. 30-Nov. 2 2012, 1097--1102.

Cited By

View all
  • (2024)A Two-Tier Virtualized Cloud Data Center Energy-Aware Host Resource Management Framework2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA)10.1109/AIMLA59606.2024.10531619(1-4)Online publication date: 15-Mar-2024
  • (2021)Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in CloudJournal of Information Technology Research10.4018/JITR.202110010414:4(45-57)Online publication date: 1-Oct-2021
  • (2019)A Hidden Markov Model Combined With Markov Games for Intrusion Detection in CloudJournal of Cases on Information Technology10.4018/JCIT.201910010221:4(14-26)Online publication date: 1-Oct-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
March 2016
843 pages
ISBN:9781450339629
DOI:10.1145/2905055
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud computing
  2. Game-Theory
  3. Payoff
  4. Player
  5. Virtualization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICTCS '16

Acceptance Rates

Overall Acceptance Rate 97 of 270 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Two-Tier Virtualized Cloud Data Center Energy-Aware Host Resource Management Framework2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA)10.1109/AIMLA59606.2024.10531619(1-4)Online publication date: 15-Mar-2024
  • (2021)Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in CloudJournal of Information Technology Research10.4018/JITR.202110010414:4(45-57)Online publication date: 1-Oct-2021
  • (2019)A Hidden Markov Model Combined With Markov Games for Intrusion Detection in CloudJournal of Cases on Information Technology10.4018/JCIT.201910010221:4(14-26)Online publication date: 1-Oct-2019
  • (2019)A Survey of Game Theoretic Solutions for Cloud Computing Security IssuesInnovations and Interdisciplinary Solutions for Underserved Areas10.1007/978-3-030-34863-2_1(1-12)Online publication date: 9-Nov-2019
  • (2017)Game-theory based detection and prevention of DoS attacks on networking node in open stack private cloud2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS)10.1109/ICTUS.2017.8286057(481-486)Online publication date: Dec-2017
  • (2017)Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in CloudNetworking Communication and Data Knowledge Engineering10.1007/978-981-10-4600-1_8(83-92)Online publication date: 3-Nov-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media