Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2018

30.09.2016

DFA-VMP: An efficient and secure virtual machine placement strategy under cloud environment

verfasst von: Weichao Ding, Chunhua Gu, Fei Luo, Yaohui Chang, Ulysse Rugwiro, Xiaoke Li, Geng Wen

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The problem of Virtual Machine (VM) placement is critical to the security and efficiency of the cloud infrastructure. Nowadays most research focuses on the influences caused by the deployed VM on the data center load, energy consumption, resource loss, etc. Few works consider the security and privacy issues of the tenant data on the VM. For instance, as the application of virtualization technology, the VM from different tenants may be placed on one physical host. Hence, attackers may steal secrets from other tenants by using the side-channel attack based on the shared physical resources, which will threat the data security of the tenants in the cloud computing. To address the above issues, this paper proposes an efficient and secure VM placement strategy. Firstly, we define the related security and efficiency indices in the cloud computing system. Then, we establish a multi-objective constraint optimization model for the VM placement considering the security and performance of the system, and find resolution towards this model based on the discrete firefly algorithm. The experimental results in OpenStack cloud platform indicates that the above strategy can effectively reduce the possibility of malicious tenants and targeted tenants on the same physical node, and reduce energy consumption and resource loss at the data center.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armbrust M, Fox A, Griffith R et al (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R et al (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
2.
Zurück zum Zitat Kang C, Wei-Ming Z (2009) Cloud computing: system instances and current research. J Softw 20(5):1337–1348 (in Chinese) Kang C, Wei-Ming Z (2009) Cloud computing: system instances and current research. J Softw 20(5):1337–1348 (in Chinese)
4.
Zurück zum Zitat Ristenpart T (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [C] CCS Ristenpart T (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. [C] CCS
5.
Zurück zum Zitat Vattikonda B, Das S, Shacham H (2011) Eliminating fine grained timers in Xen. In: Proceedings of 3rd ACM workshop on cloud computing security workshop (CCSW 2011), pp 41–46 Vattikonda B, Das S, Shacham H (2011) Eliminating fine grained timers in Xen. In: Proceedings of 3rd ACM workshop on cloud computing security workshop (CCSW 2011), pp 41–46
6.
Zurück zum Zitat Wu J, Ding L, Lin Y, Min Allah N, Wang Y (2012) XenPump: a new method to mitigate timing channel in cloud computing. In: Proceedings of 5th IEEE international conference on cloud computing (CLOUD 2012), pp 678–685 Wu J, Ding L, Lin Y, Min Allah N, Wang Y (2012) XenPump: a new method to mitigate timing channel in cloud computing. In: Proceedings of 5th IEEE international conference on cloud computing (CLOUD 2012), pp 678–685
7.
Zurück zum Zitat Aviram A, Hu S, Ford B, Gummadi R (2010) Determinating timing channels in compute clouds. In: Proceedings of ACM workshop on cloud computing security workshop, pp 103–108 Aviram A, Hu S, Ford B, Gummadi R (2010) Determinating timing channels in compute clouds. In: Proceedings of ACM workshop on cloud computing security workshop, pp 103–108
8.
Zurück zum Zitat Shi J, Song X, Chen H, Zang B. (2011) Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of 41st annual IEEE/IFIP international conference on dependable systems and networks workshops (DSN-W 2011), pp 194–199 Shi J, Song X, Chen H, Zang B. (2011) Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of 41st annual IEEE/IFIP international conference on dependable systems and networks workshops (DSN-W 2011), pp 194–199
9.
Zurück zum Zitat Keller K, Szefer J, Rexford J, Lee RB (2010) NoHype: virtualized cloud infrastructure without the virtualization. In: Proceedings of 37th international symposium on computer architecture (ISCA’ 10). Saint-Malo, pp 350–361 Keller K, Szefer J, Rexford J, Lee RB (2010) NoHype: virtualized cloud infrastructure without the virtualization. In: Proceedings of 37th international symposium on computer architecture (ISCA’ 10). Saint-Malo, pp 350–361
10.
Zurück zum Zitat Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of 18th ACM conference on computer and communications security (CCS’ 11). Chicago, pp 401–412 Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of 18th ACM conference on computer and communications security (CCS’ 11). Chicago, pp 401–412
11.
Zurück zum Zitat Coffman J, Garey MR, Johnson DS (1997) Approximation algorithms for bin packing: a survey. Approximation algorithms for Np-Hard problems. PWS Publishing, Boston, pp 46–93 Coffman J, Garey MR, Johnson DS (1997) Approximation algorithms for bin packing: a survey. Approximation algorithms for Np-Hard problems. PWS Publishing, Boston, pp 46–93
12.
Zurück zum Zitat Shieh A, Kandula S, Greenberg A, Kim C (2010) Seawall, performance isolation for cloud datacenter networks. In: Proceedings 2nd USENIX conference on hot topics in cloud computing (HotCloud’ 10). Boston, pp 1–1 Shieh A, Kandula S, Greenberg A, Kim C (2010) Seawall, performance isolation for cloud datacenter networks. In: Proceedings 2nd USENIX conference on hot topics in cloud computing (HotCloud’ 10). Boston, pp 1–1
13.
Zurück zum Zitat Raj H, Nathuji R, Singh A, England P (2009) Resource management for isolation enhanced cloud services. In: Proceedings of ACM workshop on cloud computing security (CCSW’ 09). Chicago, pp 77–84 Raj H, Nathuji R, Singh A, England P (2009) Resource management for isolation enhanced cloud services. In: Proceedings of ACM workshop on cloud computing security (CCSW’ 09). Chicago, pp 77–84
14.
Zurück zum Zitat Gupta D, Cherkasova L, Gardner R, Vahdat A (2006) Enforcing performance isolation across virtual machines in Xen. In: Proceedings of ACM/IFIP/USENIX international conference on middleware (Middleware’ 06). Melbourne, pp 342–362 Gupta D, Cherkasova L, Gardner R, Vahdat A (2006) Enforcing performance isolation across virtual machines in Xen. In: Proceedings of ACM/IFIP/USENIX international conference on middleware (Middleware’ 06). Melbourne, pp 342–362
15.
Zurück zum Zitat Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: a virtual machine-based platform for trusted computing. In: Proceedings of 19th ACM symposium on operating systems principles (SOSP’ 03). Bolton Landing, pp 193–206 Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: a virtual machine-based platform for trusted computing. In: Proceedings of 19th ACM symposium on operating systems principles (SOSP’ 03). Bolton Landing, pp 193–206
16.
Zurück zum Zitat Sailer R, Jaeger T, Valdez E, Caceres R, Perez R, Berger S, Griffin J L (2005) Building a MAC-based security architecture for the Xen open-source hypervisor. In: Proceedings of the 21st annual computer security applications conferences. Tucson, pp 276– 285 Sailer R, Jaeger T, Valdez E, Caceres R, Perez R, Berger S, Griffin J L (2005) Building a MAC-based security architecture for the Xen open-source hypervisor. In: Proceedings of the 21st annual computer security applications conferences. Tucson, pp 276– 285
17.
Zurück zum Zitat Han Y, Chan J, Alpcan T, Leckie C (2014) Virtual machine allocation policies against co-resident attacks in cloud computing. In: Proceedings IEEE international conference on communications (ICC 2014), pp 786–792 Han Y, Chan J, Alpcan T, Leckie C (2014) Virtual machine allocation policies against co-resident attacks in cloud computing. In: Proceedings IEEE international conference on communications (ICC 2014), pp 786–792
18.
Zurück zum Zitat Han Y, Chan J, Alpcan T, Leckie C (2015) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. Proc IEEE Trans Dependable Secure Comput Han Y, Chan J, Alpcan T, Leckie C (2015) Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. Proc IEEE Trans Dependable Secure Comput
19.
Zurück zum Zitat Dian S (2012) Research and implementation of virtual machine security placement mechanism in cloud computing. [D]. South East University, Nan Jing Dian S (2012) Research and implementation of virtual machine security placement mechanism in cloud computing. [D]. South East University, Nan Jing
20.
Zurück zum Zitat Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Futur Gener Comput Syst 28(5):755– 768CrossRef Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Futur Gener Comput Syst 28(5):755– 768CrossRef
21.
Zurück zum Zitat Mao-Lin T, Shen-chen P (2015) A hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers. Neural Process Lett 41(2):211–221CrossRef Mao-Lin T, Shen-chen P (2015) A hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers. Neural Process Lett 41(2):211–221CrossRef
22.
Zurück zum Zitat Jamali S, Malektaji S (2014) Improving grouping genetic algorithm for virtual machine placement in cloud data centers. In: Proceedings of 4th international conference on computer and knowledge engineering (ICCKE). Mashhad, pp 328– 333 Jamali S, Malektaji S (2014) Improving grouping genetic algorithm for virtual machine placement in cloud data centers. In: Proceedings of 4th international conference on computer and knowledge engineering (ICCKE). Mashhad, pp 328– 333
23.
Zurück zum Zitat Liu C, Chen-Yang S, Si-Tian L et al (2014) A new evolutionary multi-objective algorithm to virtual machine placement in virtualized data center. In: Proceedings of 5th IEEE international conference on software engineering and service science (ICSESS). Beijing, pp 272–275 Liu C, Chen-Yang S, Si-Tian L et al (2014) A new evolutionary multi-objective algorithm to virtual machine placement in virtualized data center. In: Proceedings of 5th IEEE international conference on software engineering and service science (ICSESS). Beijing, pp 272–275
24.
Zurück zum Zitat Hendtlass T, Moser I, Randall M. (2009) Dynamic problems and nature inspired meta-heuristics. Springer, HeidelbergCrossRef Hendtlass T, Moser I, Randall M. (2009) Dynamic problems and nature inspired meta-heuristics. Springer, HeidelbergCrossRef
25.
Zurück zum Zitat Yong-Qiang G, Hai-Bing G, Zheng-Wei Q et al (2013) A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. J Comput Syst Sci 79(8):1230– 1242MathSciNetCrossRef Yong-Qiang G, Hai-Bing G, Zheng-Wei Q et al (2013) A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. J Comput Syst Sci 79(8):1230– 1242MathSciNetCrossRef
26.
Zurück zum Zitat Xu B, Zhi-Ping P, Fang-Xiong X et al (2015) Dynamic deployment of virtual machines in cloud computing using multi-objective optimization. Soft Comput 19(8):2265–2273CrossRef Xu B, Zhi-Ping P, Fang-Xiong X et al (2015) Dynamic deployment of virtual machines in cloud computing using multi-objective optimization. Soft Comput 19(8):2265–2273CrossRef
27.
Zurück zum Zitat Jian-Kang D, Hong-Bo W, Yang-Yang L et al (2014) Virtual machine placement optimizing to improve network performance in cloud data centers. J China Univ Posts Telecommun 21(3):62–70CrossRef Jian-Kang D, Hong-Bo W, Yang-Yang L et al (2014) Virtual machine placement optimizing to improve network performance in cloud data centers. J China Univ Posts Telecommun 21(3):62–70CrossRef
28.
Zurück zum Zitat Yang XS (2008) Nature-inspired metaheuristic algorithms. Luniver Press, UK Yang XS (2008) Nature-inspired metaheuristic algorithms. Luniver Press, UK
29.
Zurück zum Zitat Yang XS (2009) Firefly algorithms for multimodal optimization [C]//International Symposium on Stochastic Algorithms. Springer, Berlin Heidelberg, pp 169–178 Yang XS (2009) Firefly algorithms for multimodal optimization [C]//International Symposium on Stochastic Algorithms. Springer, Berlin Heidelberg, pp 169–178
30.
Zurück zum Zitat Yang X-S (2010) Nature-inspired metaheuristic algorithms, 2nd edn. Luniver Press, Frome Yang X-S (2010) Nature-inspired metaheuristic algorithms, 2nd edn. Luniver Press, Frome
32.
Zurück zum Zitat Fan X, Weber WD, Barroso LA (2007) Power provisioning for a warehouse-sized computer. In: Proceedings of 34th annual international symposium on computer architecture. New York, pp 13–23 Fan X, Weber WD, Barroso LA (2007) Power provisioning for a warehouse-sized computer. In: Proceedings of 34th annual international symposium on computer architecture. New York, pp 13–23
33.
Zurück zum Zitat Hu L, Jin H, Liao X, et al. (2008) Magnet: a novel scheduling policy for power reduction in cluster with virtual machines. In: Proceedings of 2008 IEEE international conference on cluster computing. Tsukuba, pp 13–22 Hu L, Jin H, Liao X, et al. (2008) Magnet: a novel scheduling policy for power reduction in cluster with virtual machines. In: Proceedings of 2008 IEEE international conference on cluster computing. Tsukuba, pp 13–22
34.
Zurück zum Zitat Augkulanon P, Chai-ead N, Luangpaiboon P (2011) Bees and firefly algorithms for noisy nonlinear optimisation problems[A]. In: The international multiconference of engineers and computer scientists, p 2 Augkulanon P, Chai-ead N, Luangpaiboon P (2011) Bees and firefly algorithms for noisy nonlinear optimisation problems[A]. In: The international multiconference of engineers and computer scientists, p 2
35.
Zurück zum Zitat Marichelvam M K, Prabaharan T, Yang X-S (2014) A discrete firefly algorithm for the multi-objective hybrid flowshop scheduling problems. IEEE Trans Evol Comput 18(2):301– 305CrossRef Marichelvam M K, Prabaharan T, Yang X-S (2014) A discrete firefly algorithm for the multi-objective hybrid flowshop scheduling problems. IEEE Trans Evol Comput 18(2):301– 305CrossRef
36.
Zurück zum Zitat Sayadi MK, Hafezalkotob A, Naini SGJ (2013) Firefly-inspired algorithm for discrete optimization problems: an application to manufacturing cell formation. J Manuf Syst 32(1):78– 84CrossRef Sayadi MK, Hafezalkotob A, Naini SGJ (2013) Firefly-inspired algorithm for discrete optimization problems: an application to manufacturing cell formation. J Manuf Syst 32(1):78– 84CrossRef
37.
Zurück zum Zitat Lu K, Sun J (2016) Convergence analysis of firefly algorithm. J Front Comput Sci Technol 10(02) Lu K, Sun J (2016) Convergence analysis of firefly algorithm. J Front Comput Sci Technol 10(02)
39.
Zurück zum Zitat Jansen R, Brenner PR (2011) Energy efficient virtual machine allocation in the coud: an analysis of cloud allocation policies. In: Proceedings of international green computing conference and workshops (IGCC 2011), pp 1–8 Jansen R, Brenner PR (2011) Energy efficient virtual machine allocation in the coud: an analysis of cloud allocation policies. In: Proceedings of international green computing conference and workshops (IGCC 2011), pp 1–8
Metadaten
Titel
DFA-VMP: An efficient and secure virtual machine placement strategy under cloud environment
verfasst von
Weichao Ding
Chunhua Gu
Fei Luo
Yaohui Chang
Ulysse Rugwiro
Xiaoke Li
Geng Wen
Publikationsdatum
30.09.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0502-z

Weitere Artikel der Ausgabe 2/2018

Peer-to-Peer Networking and Applications 2/2018 Zur Ausgabe