Shamir-based virtual machine placement policy

被引:0
作者
Tian J. [1 ]
Wang Z. [1 ]
He X. [1 ]
Li Z. [1 ]
机构
[1] School of Cyber Security and Computer, Hebei University, Baoding
来源
Tongxin Xuebao/Journal on Communications | 2019年 / 40卷 / 10期
基金
中国国家自然科学基金;
关键词
Block chain; Co-resident attack; Multi-objective optimization; Virtual machine placement;
D O I
10.11959/j.issn.1000-436x.2019141
中图分类号
学科分类号
摘要
In order to alleviate the harm of co-location attack in cloud environment, a virtual machine placement strategy based on Shamir was proposed, and a virtual machine placement framework was designed. The security of key data was ensured by the blockchain in the proposed placement strategy. The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment, and reduce resource waste. Finally, the effectiveness of the scheme is proved by simulation experiments. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:90 / 100
页数:10
相关论文
共 26 条
  • [1] Ristenpart T., Tromer E., Shacham H., Et al., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, ACM Conference on Computer and Communications Security, (2009)
  • [2] Zhang Y., Juels A., Reiter M.K., Et al., Cross-VM side channels and their use to extract private keys, ACM Conference on Computer and Communications Security, pp. 305-316, (2012)
  • [3] Liu F., Yarom Y., Ge Q., Et al., Last-level cache side-channel attacks are practical, IEEE Symposium on Security and Privacy, pp. 605-622, (2015)
  • [4] Younis Y.A., Kifayat K., Shi Q., Et al., A new prime and probe cache side-channel attack for cloud computing, The 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), pp. 1718-1724, (2015)
  • [5] Inci M.S., Gulmezoglu B., Apecechea G.I., Et al., Seriously, Get off my Cloud! Cross-VM RSA Key Recovery in a Public cloud, IACR Cryptology ePrint Archive, 2015, pp. 1-15, (2015)
  • [6] Chen K., Shen Q., Li C., Et al., Sift - an efficient method for co-residency detection on Amazon EC2, International Conference on Information Systems Security and Privacy, pp. 423-431, (2016)
  • [7] Bates A., Mood B., Pletcher J., Et al., On detecting co-resident cloud instances using network flow watermarking techniques, International Journal of Information Security, 13, 2, pp. 171-189, (2014)
  • [8] Zhang Y., Li M., Bai K., Et al., Incentive compatible moving target defense against VM-colocation attacks in clouds, IFIP International Information Security Conference, pp. 388-399, (2012)
  • [9] Azar Y., Kamara S., Menache I., Et al., Co-location-resistant clouds, The 6th Edition of the ACM Workshop on Cloud Computing Security, pp. 9-20, (2014)
  • [10] Han Y., Chan J., Alpcan T., Et al., Using virtual machine allocation policies to defend against co-resident attacks in cloud computing, IEEE Transactions on Dependable & Secure Computing, 14, 1, pp. 95-108, (2017)