Quantification of Security for Compute Intensive Workloads in Clouds

Cloud Computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. However, improving dependability of Cloud Computing is critical for realization of its potential. In this paper, we describe our efforts to quantify security for Clouds to facilitate provision of assurance for quality of service, one of the factors contributing to dependability. This has profound implications for delivering customized security solutions such as effective intrusion prevention and detection which is the overall objective of our research. In order to demonstrate the applicability of our research, we have incorporated these requirements in the resource acquisition phase for Clouds. We also present experiments to demonstrate the effectiveness of our approach to address the Random Migration Problem for virtualized computing environments.

[1]  Valérie Gay,et al.  Integration of security parameters in the service level specification to improve QoS management of secure distributed multimedia services , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[2]  Robert P. Goldberg,et al.  Survey of virtual machine research , 1974, Computer.

[3]  Axel Keller,et al.  The virtual resource manager: an architecture for SLA-aware resource management , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[4]  Philippe Massonet,et al.  Using Sla Based Approach To Handle Sabotage Tolerance In The Grids , 2008 .

[5]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[6]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[7]  Tal Garfinkel,et al.  When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.

[8]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[9]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[10]  Информатика,et al.  International Symposium on Reliable Distributed Systems , 2010 .

[11]  Odej Kao,et al.  Introducing Risk Management into the Grid , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).