Energy Conserving Secure VM Allocation in Untrusted Cloud Computing Environment

被引:0
|
作者
Sharma, Swati [1 ]
Kaushal, Rishabh [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
关键词
Cloud Computing; Security; Green Computing; ALGORITHM; TRUST;
D O I
10.1145/3140107.3140121
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the latest buzz in most of the IT organizations which are witnessing a a trend of migration from traditional computing to cloud computing, thereby reducing their infrastructure cost and improving efficiency and performance. Cloud computing provides services through virtualization layer, which helps to execute more than one operating systems and applications on a single machine. Being a crucial part of cloud computing, virtualization layer faces major security threats, most challenging being an insider threat wherein attacker can either compromise existing virtual machines (VMs) or create rogue VMs. The objective of this work is to propose virtual machine (VM) allocation algorithm which operates in an untrusted cloud computing environment with non-trustworthy VMs. Our approach is based on the notion of trust. Lack of trust is modeled by either introducing faults or monitoring SLAs per host on which VMs are hosted. Detailed experiments considering varying cloud infrastructure and varying workloads are conducted using CloudSim. Results show that proposed algorithm works well in untrusted environment while at the same time is energy efficient and reduces the computational costs by decreasing the number of migrations and SLA violations.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [31] Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing
    Ullah, Arif
    Alomari, Zakaria
    Alkhushayni, Suboh
    Al-Zaleq, Du'a
    Taha, Mohammad Bany
    Remmach, Hassnae
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 11407 - 11426
  • [32] Task scheduling and VM placement to resource allocation in Cloud computing: challenges and opportunities
    Karima Saidi
    Dalal Bardou
    [J]. Cluster Computing, 2023, 26 : 3069 - 3087
  • [33] An Approach Towards Amelioration of an Efficient VM Allocation Policy in Cloud Computing Domain
    Sourav Banerjee
    Riman Mandal
    Utpal Biswas
    [J]. Wireless Personal Communications, 2018, 98 : 1799 - 1820
  • [34] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [35] A Secure Agent Based Architecture for Resource Allocation in Cloud Computing
    Hussain, Wahid
    Liaqat, Rao Muzamal
    Saqib, Nazar Abbas
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 166 - 171
  • [36] QoS and Performance Optimization with VM Provisioning Approach in Cloud Computing Environment
    Bheda, Hitesh A.
    Lakhani, Jignesh
    [J]. 3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [37] A Secure Service Agreement Underlying Cloud Computing Environment
    Chiang, Mao-Lun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1753 - 1761
  • [38] An Approach Towards Amelioration of an Efficient VM Allocation Policy in Cloud Computing Domain
    Banerjee, Sourav
    Mandal, Riman
    Biswas, Utpal
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) : 1799 - 1820
  • [39] Using a Network of Untrusted Computers for Secure Computing
    Maly, Michal
    [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011), 2011, : 57 - 61
  • [40] An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence Attack
    Liu, Yuhong
    Ruan, Xiaojun
    Cai, Songjie
    Li, Ruiwen
    He, Hanxiao
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 349 - 353