A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing

被引:3
|
作者
Ousmane, Sane Bernard [1 ]
Mbacke, Babou Cheikh Saliou [1 ]
Ibrahima, Niang [1 ]
机构
[1] Cheikh Anta Diop Univ, Fac Sci & Technol, Dakar 5005, Senegal
关键词
Cloud Computing; Security; Virtualization; Game Theory;
D O I
10.1145/3320326.3320379
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Virtualization technologies make cloud computing desirable but they also introduce serious security risks like co-resident attack and interdependence between users on the same hypervisor. The previous works on the subject of virtualization security have some limitations: either we can not implement them, no performance evaluation or it increases the workload at servers or haven't quantitative analysis. This paper proposes a new approach to minimize Virtual machine escape attack in which the attacker's goal is to co-locate their VMs with the targets VMs on the same physical server. In order to proliferate his attack on the virtual machines of other users on the same hypervisor. Hence, we model different basic VM allocation policies using a game theoretic approach to get quantitative analysis. In each VM allocation policies, attacker's action is to decide when to start the VMs, how many VMs to start, what is the security level of its VMs. The goal of the defender will be to find a VM allocation policy that minimizes attacker's possibility. We also presented the attack efficiency, cost, coverage, power consumption and workload balance under the VM allocation policies and compute the numerical solution in CloudSim. This solution does not require any changes to the underlying infrastructure. Our results show that the Round Robin policy is the least secure allocation policy against Virtual machine escape attack. In order to minimise the efficiency rates for the attacker, the cloud provider should use a probabilistic VM allocation policy.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
    Kwiat, Luke
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Tang, Jian
    Martin, Andrew
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 556 - 563
  • [2] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [3] Game Theoretic Resource Allocation in Cloud Computing
    Srinivasa, K. G.
    Kumar, Sharath K.
    Kaushik, Shashank U.
    Srinidhi, S.
    Shenvi, Vignesh
    Mishra, Kushgra
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 36 - 42
  • [4] Hybrid approach for virtual machine allocation in cloud computing
    Booba, B.
    Anitha, X. Joshphin Jasaline
    Mohan, C.
    Jeyalaksshmi, S.
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2024, 41
  • [5] Priority Based Virtual Machine Allocation and Scheduling for Security in Cloud Computing
    Radhika, T. V.
    Gouda, Krushna Chandra
    Kumar, S. Sathish
    SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 617 - 625
  • [6] An Evolutionary Game Theoretic Approach for Efficient Virtual Machine Deployment in Green Cloud
    Han, Ke
    Cai, Xiaobo
    Rong, Hui
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 1 - 4
  • [7] Virtual Machine Allocation in Cloud Computing Environment
    Ezugwu, Absalom E.
    Buhari, Seyed M.
    Junaidu, Sahalu B.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (02) : 47 - 60
  • [8] Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View
    Alamer, Abdulrahman
    Deng, Yong
    Wei, Guiyi
    Lin, Xiaodong
    IEEE NETWORK, 2018, 32 (03): : 72 - 77
  • [9] A Game-Theoretic Approach to Resource Allocation in the Cloud
    Salman, Ola
    Awad, Mariette
    Saab, Farah
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 132 - 137
  • [10] ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING
    Zhang, Chaochao
    Bai, Ling
    Chen, Su
    Jiang, Hai
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 75 - 79