INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.8, No.1, Jan. 2018

Previously-Selected-Server-First based Scalable VM Placement Algorithm for Mitigating Side Channel Attacks in Cloud Computing

Full Text (PDF, 631KB), PP.50-59


Views:55   Downloads:3

Author(s)

Adi Maheswara Reddy G, K Venkata Rao, JVR Murthy

Index Terms

Cloud Security;Co-resistance Attacks;VM placement policy;PSSF;Greedy Algorithm;VM migration

Abstract

Pertaining to the rapid usage of cloud computing, cloud based approaches are growing as an fascinating domain for numerous malignant tasks. Security is one of the vital issues faced by the cloud computing environment while sharing resources over the internet. Consumers are facing distinct security hazards while using cloud computing platform. Previous works mainly attempted to mitigate the side channels attacks by altering the infrastructure and the internal procedures of the cloud stack. However, the deployments of these alterations are not so easy and could not resist the attacks. In this paper, the authors attempted to solve the issues by enhancing the VM Placement policies in such a way that, it is complex for the invaders to collocate their object. A secure Dynamic VM placement approach is presented for the VM allocations into different servers in the cloud. The performance comparison of the suggested methodology is shows that the proposed approach has better efficiency evaluations such as hit rate, loss rate and resource loss when compared to other V M placement policies.

Cite This Paper

Adi Maheswara Reddy G, K Venkata Rao, JVR Murthy," Previously-Selected-Server-First based Scalable VM Placement Algorithm for Mitigating Side Channel Attacks in Cloud Computing", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.8, No.1, pp. 50-59, 2018.DOI: 10.5815/ijwmt.2018.01.06

Reference

[1]Y. Zhang, A. Juels, M. Reiter, and T. Ristenpart, "Cross-VM Side Channels and Their Use to Extract Private Keys," Proc. 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 305-316, 2012.

[2]Y. Han, T. Alpcan, J. Chan, and C. Leckie, “Security games for virtual machine allocation in cloud computing,” in 4th International Conference on Decision and Game Theory for Security, Fort Worth, TX, 2013.

[3]Zhu Jianrong, Li Jing and Zhuang Yi “Utility-based Virtual Cloud Resource Allocation Model and Algorithm in Cloud Computing” International Journal of Grid Distribution Computing Vol.8, No.2 (2015), pp.177-190

[4]Bhrugu Sevak “Security against Side Channel Attack in Cloud Computing” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-2, December 2012.

[5]T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” in Proc. of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, 2009.

[6]Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter, “Homealone: Co-residency detection in the cloud via side-channel analysis,” in Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, 2011.

[7]Z. Xu, H. Wang, and Z. Wu, “A measurement study on coresidence threat inside the cloud,” in Proc. of the 24th USENIX Security Symposium (USENIX Security), Washington, DC, 2015.

[8]A. Herzberg, H. Shulman, J. Ullrich, and E. Weippl, “Cloudoscopy: Services discovery and topology mapping,” in Proceedings of the ACM Workshop on Cloud Computing Security Workshop (CCSW), Berlin, Germany, 2013.

[9]V. Varadarajan, Y. Zhang, T. Ristenpart, and M. Swift, “A placement vulnerability study in multi-tenant public clouds,” in Proc. of the 24th USENIX Security Symposium (USENIX Security), Washington, DC, 2015.

[10]Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting, “An exploration of l2 cache covert channels in virtualized environments,” in Proc. of the 3rd ACM Workshop on Cloud Computing Security Workshop (CCSW), Chicago, IL, 2011.

[11]A. Bates, B. Mood, J. Pletcher, H. Pruse, M. Valafar, and K. Butler, “Detecting co-residency with active traffic analysis techniques,” in Proc. of the ACM Workshop on Cloud Computing Security Workshop (CCSW), Raleigh, NC,2012.

[12]Bhattacharya, J., Vashistha, S.: Utility computing-based framework for e-governance. In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV’08, Cairo, pp. 303–309. ACM, New York (2008). doi:10.1145/ 1509096.1509160.

[13]Caracas, A., Altmann, J.: A pricing information service for grid computing. In: Proceedings of the 8th ACM/IFIP/USENIX International Middleware Conference: 5th International Workshop on Middleware for Grid Computing,MGC’07, Newport Beach, pp. 4:1–4:6. ACM, New York (2007). doi:10.1145/1376849.1376853.

[14]Kephart, J.O.: Autonomic computing: the first decade. In: Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC’11, Huddersfield, pp. 1–2. ACM, New York (2011). doi:10.1145/1998582.1998584.

[15]Maggio, M., Hoffmann, H., Santambrogio, M.D., Agarwal, A., Leva, A.: Decision making in autonomic computing systems: comparison of approaches and techniques. In: Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC’11, Karlsruhe, pp. 201–204. ACM, New York (2011). doi:10.1145/1998582.1998629.

[16]Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (Feb 2009).

[17]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter, “Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration”, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1595-1606, ACM, 2015.