Improving Cloud Survivability through Dependency based Virtual Machine Placement

Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He

2012

Abstract

Cloud computing is becoming more and more popular in computing infrastructure and it also introduces new security problems. For example, a physical server shared by many virtual machines can be taken over by an attacker if the virtual machine monitor is compromised through one of the virtual machines. Thus, collocating with vulnerable virtual machines, or “bad neighbours”, on the same physical server introduces additional security risks. Moreover, the connections between virtual machines, such as the network connection between a web server and its back end database server, are natural paths of attacks. Therefore, both virtual machine placement and connections among virtual machines in the cloud have great impact over the overall security of cloud. In this paper, we quantify the security risks of cloud environments based on virtual machine vulnerabilities and placement schemes. Based on our security evaluation, we develop techniques to generate virtual machine placement that can minimize the security risks considering the connections among virtual machines. According to the experimental results, our approach can greatly improve the survivability of most virtual machines and the whole cloud. The computing costs and deployment costs of our techniques are also practical.

Download


Paper Citation


in Harvard Style

Li M., Zhang Y., Bai K., Zang W., Yu M. and He X. (2012). Improving Cloud Survivability through Dependency based Virtual Machine Placement . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 321-326. DOI: 10.5220/0004076003210326

in Bibtex Style

@conference{secrypt12,
author={Min Li and Yulong Zhang and Kun Bai and Wanyu Zang and Meng Yu and Xubin He},
title={Improving Cloud Survivability through Dependency based Virtual Machine Placement},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={321-326},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004076003210326},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Improving Cloud Survivability through Dependency based Virtual Machine Placement
SN - 978-989-8565-24-2
AU - Li M.
AU - Zhang Y.
AU - Bai K.
AU - Zang W.
AU - Yu M.
AU - He X.
PY - 2012
SP - 321
EP - 326
DO - 10.5220/0004076003210326