Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing

Download Full Text
Author(s):
Hamid Banirostam, Alireza Hedayati, Ahmad Khadem Zadeh
Published Date:
March 05, 2014
Issue:
Volume 4, Issue 2
Page(s):
25 - 30
DOI:
10.7815/ijorcs.42.2014.082
Views:
4849
Downloads:
123

Keywords:
green cloud computing, multi- tenancy, virtualization, data integrity.
Citation:
Hamid Banirostam, Alireza Hedayati, Ahmad Khadem Zadeh, "Using Virtualization Technique to Increase Security and Reduce Energy Consumption in Cloud Computing". International Journal of Research in Computer Science, 4 (2): pp. 25-30, March 2014. doi:10.7815/ijorcs.42.2014.082 Other Formats

Abstract

An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing. The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment. This approach has been simulated on two types of Virtual Machine Manager (VMM) Quick EMUlator (Qemu), HVM (Hardware Virtual Machine) Xen and outputs of the simulation in VMInsight show that when service is getting singly used, the overhead of its performance will be increased. As a secure system, the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement. Moreover, the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications (Defragmentation, Compression, Linux Boot Decompression and Kernel Boot). Therefore, this has been resulted that to secure multi-tenant environment, managers and supervisors should independently install a security monitoring system for each Virtual Machines (VMs) which will come up to have the management heavy workload of. While the proposed approach, can respond to all VM’s with just one virtual machine as a supervisor.

  1. Celesti Francesco, A., Villari, M.T and Puliafito, A., “Improving Virtual Machine Migration in Federated Cloud Environments”, Second International Conference on Evolving Internet, 20-25 September 2010., pp. 61-67. doi: 10.1109/INTERNET.2010.20
  2. Chen, Y., Wo, T. and Li, J., “An efficient resource management system for on-line virtual cluster provision”, IEEE ICC, 2009 , pp.72–79. doi: 10.1109/CLOUD.2009.64
  3. Shwetha,B. and Balagoni,Y., “Secure Data Storage In Cloud Computing”, International Journal of Research in Computer Science, vol.1, 2011, pp.63-73. doi: 10.7815/ijorcs.11.2011.006
  4. Mateescu, G., Gentzsch , W.and J. Ribbens, C., “Hybrid computingwhere HPC meets grid and cloud computing”, ELSEVIER FGCS, 2011, pp. 440–453. doi: 10.1016/j.future.2010.11.003
  5. Zissis, D.and Lekkas,D., “Addressing cloud computing security issues”, ELSEVIER FGCS, 2011, pp. 583-592. doi: 10.1016/j.future.2010.12.006
  6. Li, J., Huai, J., Hu, C. and Zhu, Y., “A Secure Collaboration Service for Dynamic Virtual Organizations”, IS Elsevier, vol. 180, issue 17, 2010, pp. 3086–3107. doi: 10.1016/j.ins.2010.05.014
  7. Ray, S. and De Sarkar, A., “Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment”, IJCCSA, Vol.2, No.5, 2012, pp. 1-13.
  8. Suakanto, S., H.Supangkat, S. and Saragih, R, “Performance Measurment of Cloud Computing Services”, IJCCSA, Vol.2, No.2, 2012, pp. 9-20.
  9. M. Azab, A., Ning, P., C. Sezer, E. and Zhang, X, “HIMA: a hypervisor based integrity measurement agent”, IEEE Computer Society , 2009,pp. 461-470. doi: 10.1109/ACSAC.2009.50
  10. Zhao, X., Borders, K. and Prakash, A., “Virtual machine security system”, ACSE, 2009, pp. 339-365.
  11. Lombardi, F. and Di Pierto, R., (2009), “KvmSec: a security extension for Linux kernel virtual machines”, ACM SAC, March 8-12, pp. 2029-2034. doi: 10.1145/1529282.1529733
  12. Beloglazov, A. and Buyya, R., “Energy Efficient Allocation of Virtual Machines in Cloud Data Centers", IEEE/ACM ISCluster, 2009, pp. 557-578. doi: 10.1109/CCGRID.2010.45
  13. Meisner, D., T. Gold, B. and F. Wenisch, T., “PowerNap: eliminating server idle power”, ASPLOS 2009,7-11 March, pp. 205–216.
  14. Alam, M., “Cloud Algebra for Handling Unstructured Data in Cloud Database Managements System”, IJCCSA, Vol.2, 2012, pp. 35-42. doi: 10.1145/2393216.2393221

    Sorry, there are no citation(s) for this manuscript yet.