Representing Increasing Virtual Machine Security Strategy in Cloud Computing Computations

Mohammad Shirzadi (Department of Computer Engineering, Parand branch, Islamic Azad University of Tehran, IRAN)

Abstract


This paper proposes algorithm for Increasing Virtual Machine Security Strategy in Cloud Computing computations. Imbalance between load and energy has been one of the disadvantages of old methods in providing server and hosting, so that if two virtual severs be active on a host and energy load be more on a host, it would allocated the energy of other hosts (virtual host) to itself to stay steady and this option usually leads to hardware overflow errors and users dissatisfaction. This problem has been removed in methods based on cloud processing but not perfectly, therefore,providing an algorithm not only will implement a suitable security background but also it will suitably divide energy consumption and load balancing among virtual severs. The proposed algorithm is compared with several previously proposed Security Strategy including SC-PSSF, PSSF and DEEAC. Comparisons show that the proposed method offers high performance computing, efficiency and consumes lower energy in the network.


Keywords


Cloud computing; High performance computing; Automation; Security; Server

Full Text:

PDF

References


[1] Josep Balash. March 2014. Implementation aspects of security and privacy in embedded design.

[2] Daniel Petro, Gyogry vesztergombi. Search- LAB security evaluation analysis and research.

[3] J.Kong, O.Aciicmez, JP.Seifert, and H.Zhou.(8002) “Deconstructing new cache designs for thwarting software cache-based side channel attacks.”ACM Work shopon Computer Security Architecture(Csaw):82-43.

[4] Y.Azar, S.Kamara, I.Menache, M.Raykova,and B.Shepard.(8013) “Co-location-resistantclouds.”ACM Cloud Computing Security Workshop(Ccsw):9-.80.

[5] W.Ding, C.Gu, F.Luo, U.Rugwiro, X.Li, and G.Wen.(8012) “DFA-VMP:anefficient and secure virtual machine placement strategy under cloud environment.”Peer-to-Peer Networking and Applications11(8):412-.444.

[6] Y.Qiu, Q.Shen, Y.Luo, C.Li, and Z.Wu.(6017) “A secure virtual machine deployment strategy oreducecoresidency in Cloud.”IEEETrustcomBigDataSEICESS:347-354.

[7] V.Varadarajan, T.Kooburat, B.Farley, T.Ristenpart,and MM.Swift.(6016) “Resource-freeingattacks:-improve your cloud performance(at your neighbor sexpense).”ACM Conferenceon Computer and Communications Security(CCS):281-292.

[8] C.Hyser, B.Mckee, R.Gardner, and BJ.Watson.(6008) “Autonomic virtual machine placement in the data center.”IEEE 33rd International Conferenceon Distributed Computing Systems Workshops(ICDCSW):660-225.

[9] P.Graubner, M.Schmidt, B.Freisleben.(6011) “Energy-efficient management of virtual machines in eucalyptus.”IEEE International Conferenceon Cloud Computing:243-250.

[10] K. Mills, J. Filliben, and C. Dabrowski.(6016) “Comparing VM-placement algorithms forondem and clouds.”Cloud Computing Technology and Science:81-98.

[11] T.Ristenpart, E.Tromer, H.Shacham and S.Savage.(6008) “Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds.”ACM Conferenceon Computerand Communications Security(CCS):188- 221.

[12] HS.Bedi, S.Shiva.(6016) “Securing cloud infrastructure again stco-resident DoS attacks using game theoretic defense mechanisms.”Interna-tional Conference on Advances in Computing,Communications and Informatics(ICACCI):463-469.

[13] V.Varadarajan, T.Kooburat, B.Farley, T.Ristenpart,and MM.Swift.(6016) “Resource-freeing attacks:-improve your cloud performance(at your neighbor sexpense).”ACM Conferenceon Computerand Communications Security(CCS):281-.292.

[14] Department of Computer Science, Princeton University, Princeton.(2009), NJ, 08544, USA Curtis Huttenhower, Avi I Flamholz, Chad L Myers, Matthew A Hibbs & Olga G Troyanskaya”Discovery of biological networks from diverse functional genomic data”.

[15] Lewis-Sigler Institute for Integrative Genomics, Princeton University, Princeton.(2007), NJ,08544,USA Curtis Huttenhower, Chad L Myers, Kellen L Olszewski, Matthew A Hibbs & Olga G Troyanskaya” Nearest Neighbor Networks: clustering expression data based on gene neighborhoods. BMC Bioinformatics 8, 250 )8001.

[16] Department of Molecular Biology, Princeton University, Princeton.(2007), NJ, 08544, USA Jessica N Landis, Sauhard Sahi, Kellen L Olszewski & Hilary A Coller “Nearest Neighbor Networks: clustering expression data based on gene neighborhoods”.

[17] Hefei Jia et al. / Procedia Computer Science 147 (2019) 140-144.

[18] Packet Filtering using IP Tables in Linux,”IJCSI International Journal of Computer Science Issues, Vol.8, Issue 4, No 2, July 2011”ISSN (Online): 1694-0814.

[19] Linux - Wikipedia, the free encyclopediaen.wikipedia.org/wiki/Linux & Security Issues -Linux.orgwww.linux.org/article/view/security-issues & Quick HOWTO:Ch14 : Linux Firewalls Using iptables -Linux Home .www.linuxhomenetworking.com/.../Quick_HOWTO_:_... - United States.&Packet filtering using iptables, http://netfilter.org/documentation/HOWTO/packet-filtering-HOWTO-7.html.

[20] Chung, J.; Claypool, M. NS by Example [Online].Available: http://nile.wpi.edu/NS/ 4. The ns Manual (formerly ns Notes and Documentation [Online].Available:http://www.isi.edu/nsnam/ns/doc/index.html.



DOI: https://doi.org/10.30564/ese.v3i2.3786

Refbacks

  • There are currently no refbacks.
Copyright © 2021 Mohammad Shirzadi


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.