Energy Conserving Secure VM Allocation in Untrusted Cloud Computing Environment

被引:0
作者
Sharma, Swati [1 ]
Kaushal, Rishabh [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
来源
COMPUTE'17: PROCEEDINGS OF THE 10TH ANNUAL ACM INDIA COMPUTE CONFERENCE | 2017年
关键词
Cloud Computing; Security; Green Computing; ALGORITHM; TRUST;
D O I
10.1145/3140107.3140121
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the latest buzz in most of the IT organizations which are witnessing a a trend of migration from traditional computing to cloud computing, thereby reducing their infrastructure cost and improving efficiency and performance. Cloud computing provides services through virtualization layer, which helps to execute more than one operating systems and applications on a single machine. Being a crucial part of cloud computing, virtualization layer faces major security threats, most challenging being an insider threat wherein attacker can either compromise existing virtual machines (VMs) or create rogue VMs. The objective of this work is to propose virtual machine (VM) allocation algorithm which operates in an untrusted cloud computing environment with non-trustworthy VMs. Our approach is based on the notion of trust. Lack of trust is modeled by either introducing faults or monitoring SLAs per host on which VMs are hosted. Detailed experiments considering varying cloud infrastructure and varying workloads are conducted using CloudSim. Results show that proposed algorithm works well in untrusted environment while at the same time is energy efficient and reduces the computational costs by decreasing the number of migrations and SLA violations.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 23 条
[1]  
Adair Robin J, 1966, TECHNICAL REPORT
[2]  
Alhamad Mohammed, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P321, DOI 10.1109/NBiS.2010.67
[3]  
Almenarez F., 2004, First Workshop on Pervasive Security, Privacy and Trust PSPT, V4, P1
[4]  
[Anonymous], 2011, International Workshop on Critical Information Infrastructures Security
[5]  
Beloglazov A., 2013, Energy-efficient management of virtual machines in data centers for cloud computing
[6]   Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers [J].
Beloglazov, Anton ;
Buyya, Rajkumar .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (13) :1397-1420
[7]   Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing [J].
Beloglazov, Anton ;
Abawajy, Jemal ;
Buyya, Rajkumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (05) :755-768
[8]   CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms [J].
Calheiros, Rodrigo N. ;
Ranjan, Rajiv ;
Beloglazov, Anton ;
De Rose, Cesar A. F. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) :23-50
[9]   Insider Threats to Cloud Computing: Directions for New Research Challenges [J].
Claycomb, William R. ;
Nicoll, Alex .
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, :387-394
[10]  
Dawoud W., 2010, 2010 7 INT C INF SYS, P1