Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems

被引:0
作者
Ahamed, Farhad [1 ]
Shahrestani, Seyed [1 ]
Javadi, Bahman [1 ]
机构
[1] Western Sydney Univ, Sch Comp Engn & Math, Sydney, NSW, Australia
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
Cloud computing security; VM consolidation; VM security measurement; VM security;
D O I
10.1109/TrustCom.2016.234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing number of data centers is consuming significant power with an upward surge. Hence, to preserve such huge energy and operating cost of data centers, the cloud service providers consolidate Virtual Machines (VM) to minimize the number of active physical machines. However, lack of reliable security measurements and policy enforcement during the consolidation process, have increased the security risks to the clients. In this paper, the compartment isolation technique is introduced to improve the system security during the consolidation process. The security-based selection and placement algorithms are also presented. The comparative analysis of this improved security approach shows that utilizing the proposed method will reduce the security risks without impacting the overall power consumption in data centers.
引用
收藏
页码:1516 / 1523
页数:8
相关论文
共 16 条
[1]  
Ahamed F., 2015, 13 AUSTR S PAR DISTR, V163, P85
[2]  
[Anonymous], 2011, P 3 ACM WORKSH CLOUD
[3]   Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers [J].
Beloglazov, Anton ;
Buyya, Rajkumar .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (13) :1397-1420
[4]  
Benchmarks S., 2011, Standard performance evaluation corporation
[5]  
Berger A., 2005, P 2 C S NETW SYST DE, V2
[6]   CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms [J].
Calheiros, Rodrigo N. ;
Ranjan, Rajiv ;
Beloglazov, Anton ;
De Rose, Cesar A. F. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) :23-50
[7]  
Chen Y., 2010, What's New About Cloud Computing Security?
[8]  
Haas R., 2011, P 12 ACM IFIP USENIX
[9]  
Jicheng Shi, 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), P194, DOI 10.1109/DSNW.2011.5958812
[10]  
KyoungSoo Park, 2006, Operating Systems Review, V40, P65, DOI 10.1145/1113361.1113374