Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems

The increasing number of data centers is consuming significant power with an upward surge. Hence, to preserve such huge energy and operating cost of data centers, the cloud service providers consolidate Virtual Machines (VM) to minimize the number of active physical machines. However, lack of reliable security measurements and policy enforcement during the consolidation process, have increased the security risks to the clients. In this paper, the compartment isolation technique is introduced to improve the system security during the consolidation process. The security-based selection and placement algorithms are also presented. The comparative analysis of this improved security approach shows that utilizing the proposed method will reduce the security risks without impacting the overall power consumption in data centers.

[1]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[2]  Haibo Chen,et al.  Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[3]  Robert Haas,et al.  A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds , 2011, Middleware.

[4]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[5]  KyoungSoo Park,et al.  CoMon: a mostly-scalable monitoring system for PlanetLab , 2006, OPSR.

[6]  Rajkumar Buyya,et al.  Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers , 2012, Concurr. Comput. Pract. Exp..

[7]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[8]  Seyed A Shahrestani,et al.  Developing security profile for virtual machines to ensure secured consolidation : conceptual model , 2015 .

[9]  Tao Dong,et al.  Modeling Computer Virus and Its Dynamics , 2013 .

[10]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[11]  Massoud Pedram,et al.  Minimizing data center cooling and server power costs , 2009, ISLPED.

[12]  Matti A. Hiltunen,et al.  An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.