Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing

An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing. The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment. This approach has been simulated on two types of Virtual Machine Manager (VMM) Quick EMUlator (Qemu), HVM (Hardware Virtual Machine) Xen and outputs of the simulation in VMInsight show that when service is getting singly used, the overhead of its performance will be increased. As a secure system, the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement. Moreover, the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications (Defragmentation, Compression, Linux Boot Decompression and Kernel Boot). Therefore, this has been resulted that to secure multi-tenant environment, managers and supervisors should independently install a security monitoring system for each Virtual Machines (VMs) which will come up to have the management heavy workload of. While the proposed approach, can respond to all VM’s with just one virtual machine as a supervisor..

[1]  E. Garfield When to Cite , 1996, The Library Quarterly.

[2]  B. Shwetha Bindu,et al.  Secure Data Storage In Cloud Computing , 2011 .

[3]  Rajkumar Buyya,et al.  Energy Efficient Allocation of Virtual Machines in Cloud Data Centers , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[4]  Calvin J. Ribbens,et al.  Hybrid Computing - Where HPC meets grid and Cloud Computing , 2011, Future Gener. Comput. Syst..

[5]  Thomas F. Wenisch,et al.  PowerNap: eliminating server idle power , 2009, ASPLOS.

[6]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[7]  Roberto Di Pietro,et al.  KvmSec: a security extension for Linux kernel virtual machines , 2009, SAC '09.

[8]  Antonio Puliafito,et al.  Improving Virtual Machine Migration in Federated Cloud Environments , 2010, 2010 2nd International Conference on Evolving Internet.

[9]  Suhardi,et al.  Performance Measurement of Cloud Computing Services , 2012, CloudCom 2012.

[10]  Mansaf Alam CLOUD ALGEBRA FOR HANDLING UNSTRUCTURED DATA IN CLOUD DATABASE M ANAGEMENT SYSTEM , 2012, CloudCom 2012.

[11]  Kevin Borders,et al.  Virtual Machine Security Systems , 2006 .

[12]  Jianxin Li,et al.  A secure collaboration service for dynamic virtual organizations , 2010, Inf. Sci..

[13]  Jianxin Li,et al.  An Efficient Resource Management System for On-Line Virtual Cluster Provision , 2009, 2009 IEEE International Conference on Cloud Computing.

[14]  Ajanta De Sarkar,et al.  EXECUTION ANALYSIS OF LOAD BALANCING ALGORITHMS IN CLOUD C OMPUTING ENVIRONMENT , 2012, CloudCom 2012.

[15]  Peng Ning,et al.  HIMA: A Hypervisor-Based Integrity Measurement Agent , 2009, 2009 Annual Computer Security Applications Conference.