Towards Optimized Security-aware (O-Sec) VM Placement Algorithms

Motlatsi i Isaac Thulo, J. H. P. Eloff

2017

Abstract

Cloud computing is a technology that takes advantage of virtualization. Through virtualization, Virtual Machines (VMs) within the same host machine share physical resources. Cloud service providers (CSP) take advantage of virtualization by providing on-demand computing resources through the use of the Internet. In order to provide good Quality of Service (QoS) and to lower costs, CSPs need to optimize the cloud environment. This optimization can be achieved by the strategic placement of Virtual Machines (VMs) in cloud architecture, usually through VM placement algorithms. Despite these efforts, there are some remaining problems that need to be addressed. Amongst these are threats introduced by the cloud’s architectural vulnerabilities. This paper, therefore, focuses on evaluating currently available VM placement algorithms. The objective is to identify VM placement algorithms that show potential to be further augmented with security features or that can be improved from a security perspective. Future work will investigate how these algorithms can be adapted to be security-aware.

References

  1. Afoulki, Z., Bousquet, A., and Rouzaud-Cornabas, J. (2011). A security-aware scheduler for virtual machines on IaaS clouds. Report 2011.
  2. Andreolini, M., Casolari, S., Colajanni, M., and Messori, M. (2009). Dynamic load management of virtual machines in cloud architectures. In International Conference on Cloud Computing, pages 201-214. Springer.
  3. Biran, O., Corradi, A., Fanelli, M., Foschini, L., Nus, A., Raz, D., and Silvera, E. (2012). A stable networkaware VM placement for cloud systems. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), pages 498-506. IEEE Computer Society.
  4. Bobroff, N., Kochut, A., and Beaty, K. (2007). Dynamic placement of virtual machines for managing SLA violations. In 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pages 119- 128. IEEE.
  5. Caron, E., Le, A. D., Lefray, A., and Toinard, C. (2013). Definition of security metrics for the cloud computing and security-aware virtual machine placement algorithms. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013 International Conference on, pages 125-131. IEEE.
  6. Chowdhury, M. R., Mahmud, M. R., and Rahman, R. M. (2015). Implementation and performance analysis of various vm placement strategies in cloudsim. Journal of Cloud Computing, 4(1):1.
  7. Dong, Z., Liu, N., and Rojas-Cessa, R. (2015). Greedy scheduling of tasks with time constraints for energyefficient cloud-computing data centers. Journal of Cloud Computing, 4(1):1.
  8. Eloff, J. H. (1983). Selection process for security packages. Computers & Security, 2(3):256-260.
  9. Gao, J. and Tang, G. (2013). Virtual machine placement strategy research. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013 International Conference on, pages 294-297. IEEE.
  10. Ilkhechi, A. R., Korpeoglu, I., and Ulusoy, O. (2015). Network-aware virtual machine placement in cloud data centers with multiple traffic-intensive components. Computer Networks, 91:508-527.
  11. Kochut, A. and Beaty, K. (2007). On strategies for dynamic resource management in virtualized server environments. In 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pages 193-200. IEEE.
  12. Kuo, C.-F., Yeh, T.-H., Lu, Y.-F., and Chang, B.-R. (2015). Efficient allocation algorithm for virtual machines in cloud computing systems. In Proceedings of the ASE BigData & SocialInformatics 2015, page 48. ACM.
  13. Li, K., Zheng, H., Wu, J., and Du, X. (2015). Virtual machine placement in cloud systems through migration process. International Journal of Parallel, Emergent and Distributed Systems, 30(5):393-410.
  14. Li, M., Zhang, Y., Bai, K., Zang, W., Yu, M., and He, X. (2012). Improving cloud survivability through dependency based virtual machine placement. In SECRYPT, pages 321-326.
  15. Lin, C.-C., Liu, P., and Wu, J.-J. (2011). Energy-efficient virtual machine provision algorithms for cloud systems. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on, pages 81- 88. IEEE.
  16. Lindemann, J. (2015). Towards abuse detection and prevention in IaaS cloud computing. In Availability, Reliability and Security (ARES), 2015 10th International Conference on, pages 211-217. IEEE.
  17. Meng, X., Pappas, V., and Zhang, L. (2010). Improving the scalability of data center networks with traffic-aware virtual machine placement. In INFOCOM, 2010 Proceedings IEEE, pages 1-9. IEEE.
  18. Ohta, S. (2013). Virtual machine placement algorithms to minimize physical machine count. In APNOMS, pages 1-3.
  19. Shneiderman, B. (1984). Response time and display rate in human performance with computers. ACM Computing Surveys (CSUR), 16(3):265-285.
  20. Soltesz, S., Pötzl, H., Fiuczynski, M. E., Bavier, A., and Peterson, L. (2007). Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. In ACM SIGOPS Operating Systems Review, volume 41, pages 275-287. ACM.
  21. Suseela, B. B. J. (2013). Survey on VM placement algorithms. International Journal of Engineering Trends and Technology (IJETT), 6(7):349-352.
  22. Venkata, S., Kumar, K., and Padmapriya, S. (2004). A survey on cloud computing security threats and vulnerabilities.
  23. Vu, H. T. and Hwang, S. (2014). A traffic and power-aware algorithm for virtual machine placement in cloud data center. International Journal of Grid & Distributed Computing, 7(1):350-355.
  24. Wu, H., Ding, Y., Winer, C., and Yao, L. (2010). Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pages 18-21. IEEE.
  25. Xu, J. and Fortes, J. (2011). A multi-objective approach to virtual machine management in datacenters. In Proceedings of the 8th ACM international conference on Autonomic computing, pages 225-234. ACM.
  26. Yang, J.-S., Liu, P., and Wu, J.-J. (2012). Workload characteristics-aware virtual machine consolidation algorithms. In Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on, pages 42-49. IEEE.
  27. Yuchi, X. and Shetty, S. (2015). Enabling security-aware virtual machine placement in IaaS clouds. In Military Communications Conference, MILCOM 2015- 2015 IEEE, pages 1554-1559. IEEE.
  28. Zaouch, A. and Benabbou, F. (2015). Load balancing for improved quality of service in the cloud. International Journal of Advanced Computer Science and Applications IJACSA, 6(7):184-189.
Download


Paper Citation


in Harvard Style

i Isaac Thulo M. and H. P. Eloff J. (2017). Towards Optimized Security-aware (O-Sec) VM Placement Algorithms . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 411-422. DOI: 10.5220/0006206504110422


in Bibtex Style

@conference{icissp17,
author={Motlatsi i Isaac Thulo and J. H. P. Eloff},
title={Towards Optimized Security-aware (O-Sec) VM Placement Algorithms},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={411-422},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006206504110422},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Towards Optimized Security-aware (O-Sec) VM Placement Algorithms
SN - 978-989-758-209-7
AU - i Isaac Thulo M.
AU - H. P. Eloff J.
PY - 2017
SP - 411
EP - 422
DO - 10.5220/0006206504110422