Secure Resource Management in Cloud Computing: Challenges, Strategies and Meta-Analysis

被引:0
作者
Saxena, Deepika [1 ,2 ]
Swain, Smruti Rekha [3 ]
Kumar, Jatinder [2 ]
Patni, Sakshi [4 ]
Gupta, Kishu [5 ]
Singh, Ashutosh Kumar [2 ,6 ]
Lindenstruth, Volker [7 ]
机构
[1] Univ Aizu, Div Informat Syst, Aizu Wakamatsu 9650006, Japan
[2] Univ Econ & Human Sci, Dept Comp Sci, PL-01043 Warsaw, Poland
[3] Natl Inst Technol Kurukshetra, Dept Comp Applicat, Kurukshetra 136119, India
[4] Gachon Univ, Dept Comp Engn, Seongnam 461701, South Korea
[5] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
[6] Indian Inst Informat Technol Bhopal, Dept Comp Sci & Engn, Bhopal 462003, India
[7] Goethe Univ Frankfurt, Dept Comp Sci, D-60438 Frankfurt, Germany
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2025年 / 55卷 / 04期
关键词
Cloud computing; Security; Resource management; Virtual machines; Surveys; Computer science; Virtual machine monitors; Social networking (online); Servers; Access control; Cyber threats; hypervisor vulnerability; resource utilization (RU); secure resource management (SRM); virtual machine (VM) vulnerability; VIRTUAL MACHINE PLACEMENT; ENERGY-EFFICIENT; MODEL; ALLOCATION; FRAMEWORK; AWARE;
D O I
10.1109/TSMC.2025.3525956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure resource management (SRM) within a cloud computing environment is a critical yet infrequently studied research topic. This article provides a comprehensive survey and comparative performance evaluation of potential cyber threat countermeasure strategies that address security challenges during cloud workload execution and resource management. Cybersecurity is explored specifically in the context of cloud resource management, with an emphasis on identifying the associated challenges. The cyber threat countermeasure methods are categorized into three classes: defensive strategies, mitigating strategies, and hybrid strategies. The existing countermeasure strategies belonging to each class are thoroughly discussed and compared. In addition to conceptual and theoretical analysis, the leading countermeasure strategies within these categories are implemented on a common platform and examined using two real-world virtual machine (VM) data traces. Based on this comprehensive study and performance evaluation, this article discusses the tradeoffs among these countermeasure strategies and their utility, providing imperative concluding remarks on the holistic study of cloud cyber threat countermeasures and SRM. Furthermore, the study suggests future methodologies that could effectively address the emerging challenges of secure cloud resource management.
引用
收藏
页码:2897 / 2912
页数:16
相关论文
共 73 条
[1]   Secure virtual machine placement in cloud data centers [J].
Agarwal, Amit ;
Ta Nguyen Binh Duong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :210-222
[2]  
Ahamed F, 2016, IEEE TRUST BIG, P1516, DOI [10.1109/TrustCom.2016.0236, 10.1109/TrustCom.2016.234]
[3]  
ALDABAGH MZN, 2021, PROC 6 IEEE INT C RE, P1
[4]   A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies [J].
Alouffi, Bader ;
Hasnain, Muhammad ;
Alharbi, Abdullah ;
Alosaimi, Wael ;
Alyami, Hashem ;
Ayaz, Muhammad .
IEEE ACCESS, 2021, 9 :57792-57807
[5]  
[Anonymous], 2019, CAPITAL ONE DATA BRE
[6]  
[Anonymous], 2014, LIZARD SQUAD CLAIMS
[7]  
[Anonymous], 1999, AMAZON EC2 INSTANCES
[8]  
[Anonymous], 1999, POWER MODEL
[9]  
[Anonymous], 2020, 2020 CLOUD SECURITY
[10]  
[Anonymous], 2022, 7 MOST INFAMOUS CLOU