ABSTRACT
Cloud computing is the latest buzz in most of the IT organizations which are witnessing a a trend of migration from traditional computing to cloud computing, thereby reducing their infrastructure cost and improving efficiency and performance. Cloud computing provides services through virtualization layer, which helps to execute more than one operating systems and applications on a single machine. Being a crucial part of cloud computing, virtualization layer faces major security threats, most challenging being an insider threat wherein attacker can either compromise existing virtual machines (VMs) or create rogue VMs. The objective of this work is to propose virtual machine (VM) allocation algorithm which operates in an untrusted cloud computing environment with non-trustworthy VMs. Our approach is based on the notion of trust. Lack of trust is modeled by either introducing faults or monitoring SLAs per host on which VMs are hosted. Detailed experiments considering varying cloud infrastructure and varying workloads are conducted using CloudSim. Results show that proposed algorithm works well in untrusted environment while at the same time is energy efficient and reduces the computational costs by decreasing the number of migrations and SLA violations.
- Robin J Adair, RJ Creasey, RU Bayles, and LW Comeau. 1966. A virtual machine system for the 360/40. Technical Report.Google Scholar
- Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang. 2010. Sla-based trust model for cloud computing. In Network-Based Information Systems (NBiS), 2010 13th International Conference on. IEEE, 321--324. Google ScholarDigital Library
- Florina Almenárez, Andrés Marín, Celeste Campo, and Carlos Garcia. 2004. PTM: A pervasive trust management model for dynamic open environments. In First Workshop on Pervasive Security, Privacy and Trust PSPT, Vol. 4. 1--8.Google Scholar
- Anton Beloglazov. 2013. Energy-efficient management of virtual machines in data centers for cloud computing. University of Melbourne, Department of Computing and Information Systems.Google Scholar
- Anton Beloglazov, Jemal Abawajy, and Rajkumar Buyya. 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems 28, 5 (2012), 755--768. Google ScholarDigital Library
- Anton Beloglazov and Rajkumar Buyya. 2012. Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency and Computation: Practice and Experience 24, 13 (2012), 1397--1420. Google ScholarDigital Library
- Rodrigo N Calheiros, Rajiv Ranjan, Anton Beloglazov, César AF De Rose, and Rajkumar Buyya. 2011. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and experience 41, 1 (2011), 23--50. Google ScholarDigital Library
- William R Claycomb and Alex Nicoll. 2012. Insider threats to cloud computing: Directions for new research challenges. In Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual. IEEE, 387--394. Google ScholarDigital Library
- Wesam Dawoud, Ibrahim Takouna, and Christoph Meinel. 2010. Infrastructure as a service security: Challenges and solutions. In Informatics and Systems (INFOS), 2010 the 7th International Conference on. IEEE, 1--8.Google Scholar
- R Kanniga Devi and S Sujan. 2014. A survey on application of cloudsim toolkit in cloud computing. International Journal of Innovative Research in Science, Engineering and Technology 3, 6 (2014), 13146--13153.Google Scholar
- Nils Gruschka and Meiko Jensen. 2010. Attack surfaces: A taxonomy for attacks on cloud services. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 276--279. Google ScholarDigital Library
- Punit Gupta, Mayank Kumar Goyal, and Prakash Kumar. 2013. Trust and reliability based load balancing algorithm for cloud IaaS. In Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 65--69.Google ScholarCross Ref
- Yi Han, Jeffrey Chan, Tansu Alpcan, and Christopher Leckie. 2014. Virtual machine allocation policies against co-resident attacks in cloud computing. In Communications (ICC), 2014 IEEE International Conference on. IEEE, 786--792.Google ScholarCross Ref
- Miltiadis Kandias, Nikos Virvilis, and Dimitris Gritzalis. 2011. The insider threat in cloud computing. In International Workshop on Critical Information Infrastructures Security. Springer, 93--103.Google Scholar
- Ryan KL Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang, and Bu Sung Lee. 2011. TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on. IEEE, 584--588. Google ScholarDigital Library
- Shengmei Luo, Zhaoji Lin, Xiaohua Chen, Zhuolin Yang, and Jianyong Chen. 2011. Virtualization security for cloud computing service. In Cloud and Service Computing (CSC), 2011 International Conference on. IEEE, 174--179. Google ScholarDigital Library
- Mihaela-Catalina Nita, Florin Pop, Mariana Mocanu, and Valentin Cristea. 2014. FIM-SIM: Fault injection module for CloudSim based on statistical distributions. Journal of telecommunications and information technology 4 (2014), 14.Google Scholar
- Jon Oberheide, Evan Cooke, and Farnam Jahanian. 2008. Empirical exploitation of live virtual machine migration. In Proc. of BlackHat DC convention.Google Scholar
- Mendel Rosenblum. 2004. The reincarnation of virtual machines. Queue 2, 5 (2004), 34. Google ScholarDigital Library
- Xiaodong Sun, Guiran Chang, and Fengyun Li. 2011. A trust management model to enhance security of cloud computing environments. In Networking and Distributed Computing (ICNDC), 2011 Second International Conference on. IEEE, 244--248. Google ScholarDigital Library
- Yan Lindsay Sun, Wei Yu, Zhu Han, and KJ Ray Liu. 2006. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 305--317. Google ScholarDigital Library
- Chia-Ming Wu, Ruay-Shiung Chang, and Hsin-Yu Chan. 2014. A green energy-efficient scheduling algorithm using the DVFS technique for cloud datacenters. Future Generation Computer Systems 37 (2014), 141--147.Google ScholarCross Ref
- Munwar Ali Zardari, Low Tang Jung, and Nordin Zakaria. 2014. K-NN classifier for data confidentiality in cloud computing. In Computer and Information Sciences (ICCOINS), 2014 International Conference on. IEEE, 1--6.Google ScholarCross Ref
Index Terms
- Energy Conserving Secure VM Allocation in Untrusted Cloud Computing Environment
Recommendations
Load and Thermal-Aware VM Scheduling on the Cloud
Algorithms and Architectures for Parallel ProcessingAbstractVirtualization is one of the key technologies that enable Cloud Computing, a novel computing paradigm aiming at provisioning on-demand computing capacities as services. With the special features of self-service and pay-as-you-use, Cloud Computing ...
A dynamic VM consolidation technique for QoS and energy consumption in cloud environment
Cloud-based data centers consume a significant amount of energy which is a costly procedure. Virtualization technology, which can be regarded as the first step in the cloud by offering benefits like the virtual machine and live migration, is trying to ...
Energy Efficient VM Live Migration and Allocation at Cloud Data Centers
Aiming at data center virtual machines Migration, allocating resource dynamically in order to reduce energy is a significant problem in cloud. This energy doesn't cause only the decrease of cloud provider's profit but also emit a large amount of carbon ...
Comments