Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing
|
|
|
- Solomon Parrish
- 9 years ago
- Views:
Transcription
1 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing Jaiganesh M. 1,, Vincent Antony Kumar A. 1 and Ramadoss B. 2 1 Department of Information Technology, PSNA College of Engineering and Technology, Dindigul , Tamilnadu, India. 2 Department of Computer Applications, National Institute of Technology, Tiruchirrapalli, Tamilnadu, India. 1 [email protected] Abstract. Cloud computing is opening a new age in receiving information pools by getting connected to internet through any connected device. It provides pay per use method. The services are asked for by the users through on demand. Cloud service providers consider the cloud user as a virtual client to establish a virtual environment of cloud computing. The major concern in cloud computing is assuring security against the unauthenticated accessibility of the cloud services. Massive amount of cloud services results in a growing insist for skilled resource organization and Trust management. We propose a trust model called Hypervisor Hardware Fuzzy Trust Monitor to determine the illegal behavior in virtual environment. We include a fuzzy based controller in hypervisor; monitor the hardware and resource based attackers. We present a major three factors such that Network Traffic, Disk space, GFLOPS to assure trust to the user. We perform simulations to find the trust less users accessing resources in cloud computing. Keywords: cloud computing, security, trust analysis, trust worthiness, virtualization. 1. Introduction Cloud computing is an evolving paradigm to access assortment of data pool via internet by using connective devices such as Personal Digital Assistant (PDA), Work station and Mobile [4,6]. It is ability based computing and which has the capability to deliver services over the internet. It provides on demand access without the need of any human intervention. The standard deployment object that is used in cloud computing is Virtual Machines (VM). It enhances flexibility and enables data center as dynamic in nature. The technique of dividing a physical computer into several partly or completely isolated machines is known as virtualization. Virtualization is the buzz of the enterprisers IT market, and the upcoming IPO of VMware, the industry s most successful virtualization solution Corresponding author K. R. Venugopal and L. M. Patnaik (Eds.) ICCN 2013, pp Elsevier Publications 2013.
2 Jaiganesh M., et al. vendor, is of great interest. Virtualization has the ability to hire a server or thousand servers that can be run in a geophysical modelling application in anywhere. Here the isolated machines are known as either the virtual client or the guest machines. The guest machine is having an individual virtual client which runs each instance of the operating system and its tasks separately. These guest operating systems are monitored, managed and controlled by a Virtual Machine Monitor (VMM) named hypervisor. It supervises the task, threads flow between the guest operating system and the virtual physical hardware like Disk usage, CPU utilization and Memory. Security issues concerned are broadly classified into two classes such as service provider s side and customer side [5]. It is the responsibility of the data center to provide necessary security measures needed for both the data center and clients. The clients must ensure that the data, applications they receive and services are secure [1]. One of the biggest concerns with cloud computing is the un trusted usage of cloud computing resources without the knowledge of cloud service provider. The data from various users must not be interlinked with others and storage of data is another important factor. Availability of data is another work of the server. It should ensure that the data and services in the server are available to users round the clock. As the amount of web based disseminated system rises, the occurrence of malware behavior also increased [3]. Here, finding trust is an uncertainty in nature, so, we are including a stochastic uncertainty for reasoning using fuzzy expert system. The informal fuzziness has been used to identify the trust of clients in cloud computing [2]. Fuzzy Logic was introduced by Zadah [14,15]. It is a problem solving system methodology that lends itself to survive systems ranging from simple to sophisticated to survive. It is used in embedded, networked, distributed systems. Fuzzy set is a common set that has collection of elements measuring improbability in the set. It has varying degrees of membership in the set. A typical function of a crisp set allocates a value of either 1 or 0 to each individual in the universal set. The function can be comprehensive in such a manner that the values are assigned to the elements of the universal set. Huge values represent upper degrees of set membership and it is called membership function and the set is identified as fuzzy set. This paper is organized as follows. Section 2, gives the problem identification. Section 3, the deals with problem formulation, preliminaries and definitions. Section 4, presents finding of Hypervisor Hardware Trust Monitor using fuzzy modelling and Section 5, Performance analyzes and experiment results shows the realistic of proposed model and Section 6 gives conclusion of the paper. 2. Problem statement Virtual isolation is a problem in which the virtual clients are attacked by malware by injecting codes into other virtual clients. Hypervisor also is vulnerable to these attacks. The virtual isolation problem is revealed in Figure 1. The three different essentials can be showed as follows 1. Data center (Hardware units, Storages and resources) 2. Hypervisor 3. Virtual Client (VC) Data center: Datacenter is considered being a sophisticated server having high volume of disk capacity, hardware units and resource. Virtual clients include simulations of hardware especially storage and networking done in data center itself [9]. Data center is able to control the resources of virtual clients. All virtual clients share the data center hardware and memory. A data center is restricted to access area containing automated systems that constantly monitor processor availability, Web traffic and Network performance. 2
3 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing Figure 1. Virtual isolation problem. Hypervisor: The hyper visor is the virtual machine monitor that is responsible for virtual client to access hard ware and allocate physical properties and resources to each client like disk separation, utilization of network cards. It is also possible for application level partition. (E.g. many applications share a single OS). Virtual Client: A client requesting service is called virtual client. More number of clients request for service and are provided virtually. Virtual clients are utilized to provide highly secure access to remote and desktop virtually from any client at any time. It simplifies system management and application deployment [11]. It helps in lower cost and maintenance. Client services is classified into three major categories and they are software as a service, platform as a service, Infrastructure as a service. These services enable highly available, reliable in its desktop users. In figure 1 depicts, the virtual clients request for own resources and they run in their own application domain. Each Virtual Client (VC) is isolated to run in an individual domain. The domain 1 is coupled by including VC1 and VC2, domain 2 is coupled by including VC3 and VC4, domain 3 is coupled by including VC5 and VC6. In this scenario VC3 is a malware which is able to attack VC1 and VC6 and exploit the properties of hardware, CPU utilization, Disk access and eavesdrop their resources. It is a most imperative circumstance to be noted down in our virtual hypervisor security. If a virtual client is attacked by a malware, cause nearby virtual client is also affected and may get the complete control. The crashing out of virtual client is called as virtual client escape or VM escape. Thus it is essential to note down an individual attacker or a group of attackers that cause a high risk. The hypervisor is able to monitor and manage the virtual clients and perform their tasks called introspection [12]. The hypervisor is responsible for monitoring the following resource introspection capabilities of various clients and any illegitimate activities by the clients. 1) High Network Traffic. 2) Giga Floating-point Operations per Second (GLOPS) 3) Disk space. High Network Traffic: It is not giving operational transaction and bandwidth assurance. Segmentation of bandwidth is important. In cloud computing, cloud service provider might provide committed information rate. It includes the guaranteed amount of bandwidth that the every client should get. The number of service tends to grow and cloud service provider increases the cloud information 3
4 Jaiganesh M., et al. rate which brings increase in their bandwidth. The volume of services on the cloud computing keeps growing and tends to ever more bandwidth hungry. Giga Floating-point Operations Per Second (GFLOPS): GFLOPS, or GigaFLOPS, measures a quantity in billions of floating-point operations per second (FLOPS) that a computer s microprocessor can handle. Frequently, the word Giga FLOPS is perplexed with frequency. The difference is that frequency measures the number of cycles the CPU runs at, and the GFLOPS calculates the number of floating point operations it can handle. Thus FLOPS is a standard that shows how the system executes while computing very difficult mathematical estimations. Disk space: Disk space is the storage capacity available for a particular virtual client. It purely depends on the application or task used by the client [13]. In cloud computing, the applications are permanently stored in the data center for the access of the users whenever they need. Thus the memory should be elastic in nature to support the changing applications of all the users. 3. Hypervisor Hardware Fuzzy Trust Monitor The proposed Hypervisor Hardware Fuzzy Trust Monitor (H2FTM) is aimed to actively measure the network based misuse behavior of the guest Virtual Machines (VMs) by permitting the Hypervisor intrinsic of fuzzy controller to observe guest virtual machines and infrastructure components. We propose a novel approach which tightens hypervisor to measure trust in network utilization environment called Hypervisor Hardware Fuzzy Trust Monitor (H2FTM). This knowledge of finding trust worthiness is measured in terms of fuzzy inference rules which connect antecedents with consequences. The method is called If A, thenb (A, B-Fuzzy sets) [7]. Fuzzy controller is working as a feedback system by repeating the cycles to all and attained a desired output. To establish the steps involved in fuzzy controller modelling, to define the input variables and output variables. Hypervisor trust measurement is progressed and the H2FT (τ) is measured among three major network resources to be factors called Network Traffic (NT), Disk Space (DS) and CPU Utilization (CPU). In our assumption these factors are considered as input variables and Hypervisor hardware Trust Monitor as output variable. Hypervisor Hardware trust (τ) is finding as a single variable in spite of Network Traffic, Disk space and CPU cycles. We consider the combinations of any two input variables d, d are considered as Network traffic, CPU cycle and Disk space by utilizing these values, the fuzzy controller produces a controlling variable τ that is (H2FT). 3.1 Step 1 In step one, it is a process of identifying input/output variables and to assign a meaningful linguistic states and their ranges. To prefer exact linguistic states for each variable and pose them by corresponding fuzzy sets. These linguistic states are proposed as fuzzy sets (or) fuzzy numbers. Which consider that the ranges of input variables d, d are [ a, a] and[ b, b] respectively and the range of output variable are τ is [ c, c]. Each input and output variables has three linguistic states. 3.2 Step 2 In this step, we introduce a fuzzification function for each input variable to propose the associate observation uncertainness. To find grades of membership of linguistic values of linear variable 4
5 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing corresponding to an input number or Fuzzy number. It is used to calculate and interpret observations of input variable, each expressed as a real number. Consider a fuzzification function of the form f d :[ a, a] R (1) where R denotes the set of all fuzzy numbers and f d (x 0 ) is a fuzzy number chosen by f d as approximation of the measurement d = x 0. We introduced trapezoidal shape as membership function to define f d (x 0 ). It is showing the two control variables and their trapezoidal view to represent fuzzy numbers. 3.3 Step 3 Fuzzy inference system can be generated as relevant fuzzy inference rules by fuzzy associated memory called FAM square. They can be conveniently represented by FAM square rules. In our approach d, d are inputs, η is output variable then If d = A and d = B, then η = C. (2) where A, B, C are fuzzy numbers chosen from the set of numbers and their linguistic states. The possible rule generated for each input and output variable is 3, so 3 2 = 9 totally we have 36 rules. To find the fuzzy rules practically we need a set of input-output data of the following X{ x k, y k, z k k K } (3) where z k is a attained value of output variable η for given value x k and y k of the input variable d and d respectively, K is an appropriate index set. Let A(x k ), B(y k ), C(z k ) denote the largest membership grades. Then the degree of relevance can be expressed by i 1 [i 2 (A(x k ), B(y k ), C(z k )] (4) where i 1, i 2 are t-norms. Note: A function i : [0, 1] 2 [0, 1] such that for all a, b, d [0, 1]; i(a, 1) = a; b d implies i(a, b) (a, d); i(a, b) = i(b, a); i(a, i(b, d)) = i(i(a, b), d). The function is usually also continuous and such that i(a, a) a for all a [0, 1]. 3.4 Step 4 The observation of input variable must be periodically matched with Fuzzy inference rules to make inference in terms of output variables. 5
6 Jaiganesh M., et al. We choose composite inference logic to define our variables. We convert the given fuzzy inference rules represented in equation (17) which is equivalent to simple fuzzy conditional proposition of the form If d, d is A B, then η is C, (5) where [A B](x, y) = min[a(x), B(y)]. (6) for all x [ a, a]andy [ b, b]. The output variable H2FT τ becomes the problem of approximate reasoning with composite inference in fuzzy proposition. The fuzzy rule base consists of n fuzzy inference values, then, Rule 1 : IF (d, d) is A 1 B 1, then τ is C 1 Rule 2 : IF (d, d) is A 2 B 2, then τ is C 2... Rule n : IF (d, d) is A n B n, then τ is C n Fact: (d, d) is f d (x 0 ) f d (y 0)... Conclusion: τ is C. The symbols A j, B j, C j ( j = 1, 2,...n) denote fuzzy sets that represent the linguistic states of variables d, d, τ respectively. The rule is explained in terms of relation R j. The rules are considered as disjunctive in nature. We derive the equation (16) to conclude the output variable τ is defined by the fuzzy set as C = j [ f d (x 0 ) f d (y 0)], o i R j (7) where o i is the sup-i composition for a t-norm i. The choice of the t-norm is a matter similar to the choice of fuzzy sets for given linguistic labels. 3.5 Step 5 The process of computing single fuzzy number from C is called Defuzzification. The fuzzy output variable is also a linguistic variable, whose value have been assigning grades of membership. In the last step, we find a single number compatible with membership function in Hypervisor Hardware Fuzzy Trust (H2FT) called output membership function. We calculated the output variable with centroid method can be expressed as x = b a μ A(x)xdx b a μ A(x)dx (8) Let μ A (x) be the corresponding grade of membership in the aggregated membership function, let 6
7 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing 1. X min be the minimum x value attain the minimum of Hypervisor Hardware Fuzzy Trust τ. 2. X mod be the moderate x value attain the moderate of Hypervisor Hardware Fuzzy Trust τ. 3. X max be the maximum x value attain the maximum of Hypervisor Hardware Fuzzy Trust τ. X is defuzzified output as a real number value. 4. Performance Analysis We discuss the trust output using the proposed model of fuzzy inference systems. We considered the factors like Network traffic, GFLOPS and Disk space to find out the trust factor for a particular user. The abnormal usage of the above resources by the virtual client indicates the possibility of hacking. The trust model results are retrieved using MATLAB 7.8 version with INTEL core2 processor running at 2 GHZ, 2048 MB of RAM with fuzzy inference system editor. The first step of simulation in trust model is the fuzzification process. Here the factors for trust are converted in to trapezoidal member functions using membership function editor. The factors are converted in a degree of membership between (0-1). The factors are enumerated into small, medium and large in case of memory and low, medium, high in case of Network traffic, GFLOPS and Disk space. The next step of trust model is constructing the fuzzy rule base. The trust output for different combinations of input variables and their values are documented as if-then rules. These are formulated by rule-editor. Mamdani method is used for accessing the rules. Finally, the last step of trust model is the defuzzification process to get crisp result. We can see the H2FT showing the client s behavior with respect to Network traffic due of bandwidth and GFLOPS in Figure 2. The region of increase and decrease in the usage of resources is clear from the figures. The combined view of the usage of Network traffic and Disk space by the client is shown using fuzzy 3D view in Figure 2. The view of the client behavior towards the Disc space and GFLOPS is shown in Figure 3. From the utilization of bandwidth more, the Network traffic is seen to be maximum. The figures depict that the resources are utilized at the maximum at some points indicating the chance of attack. The input for fuzzy inference engine is calculated by simple attribute function and output is found by using Mamdani method. We infer from the analysis that the hypervisor is able to detect the trust of the Figure 2. (a) Fuzzy view of network traffic vs H2FT; (b) Fuzzy view of disk space vs H2FT. 7
8 Jaiganesh M., et al. Figure 3. Fuzzy view of network traffic vs H2FT. virtual clients before allocating the resources. It also terminates the allocation of Network traffic, GFLOPS and Disk space to a virtual client, if he is not trust worthy. The Analysis shows that the trust system model suggested is more accurate in predicting the trust in virtual cloud environment than human supervising. Thus the above model holds good in its analytical results shown and helps the hypervisor in taking rapid decisions. 5. Conclusion As stated in the paper, though are several factors to have a assured trust in using the cloud environment. The virtual world has worn out the last decade staggering on protecting resources and networks from conventional security attacks. The problems are out sourcing the resources, maintaining the Network traffic and monitoring the disk space are the three important factors to be solved. The H2FTM idea is implemented in the above paper which calculates the trust worthiness of a user based on the above three factors. As illustrated in the paper, the drips in cloud results in illicit cloud service as well as the entire cloud hack. So the control of resources and their distribution to multiple hosts must be secured and optimized. Thus having a hypervisor based trust monitor provides its service in administering the resources of the cloud users. References [1] Vincent Antony Kumar, A. and Jaiganesh, M.: JNLP Based Secure Software as a Service in Cloud Computing. In Proceedings Communications in Computer and Information Science, Springer Verlag, 283, (2012). [2] Vincent Antony Kumar, A. and Jaiganesh, M.: ACDP: Prediction of Application Cloud Data Center Proficiency using Fuzzy Modeling. In International Conference on Modeling, Optimization and Computing, Procedia Engineering, Elsevier Publications, 38(3), (2012). [3] Wang, C., Ren, K. and Wang, J.: Secure and Practical Outsourcing of Linear Programming in Cloud Computing. In Proceedings of IEEE INFOCOM International Conference, (2011). [4] Francesco Maria, A., Gianni, F. and Simone, S.: An Approach to a Cloud Computing Network. In Proceedings International Conference on Applications of Digital Information and Web Technologies, (2008). 8
9 Hypervisor Hardware Fuzzy Trust Monitor in Cloud Computing [5] Hamlen, K., Kantarcioglu, M., Khan, L. and Bhavani, T.: Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), (2010). [6] Foster, I., Zhao, Y., Raicu, I. and Shiyong, L.: Cloud Computing and Grid Computing 360-Degree Compared, Grid Computing Environments Workshop, 4 6 (2008). [7] Varia, J.: Cloud Architectures, White Paper by Amazon Web Services, Amazon Company, 1 14 (2008). [8] Mamdani, E. H. and Assilian: An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller, International Journal Man-Machine Studies, 1 13 (1975). [9] Armbrust, M., Armando, F. and Gri, R.: Above the Clouds: A Berkeley View of Cloud Computing, /Pubs/TechRpts/2009/EECS html, 4 6. [10] Nelson, M., Charles, C., Fernando, F., Marcos, A., Tereza, C. M. B., Naslund, M. and Pourzandi, M.: A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing, Journal of Cloud Computing: Advances, Systems and Applications, 1(11): 1 21 (2012). [11] Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed System, 22(5): (2011). [12] Buyya, R.: Market-Oriented Cloud Computing: Vision, Hype and Reality of Delivering Computing as the 5th Utility. In Proceedings IEEE/ACM International Symposium on Cluster Computing and the Grid, 1 13 (2009). [13] Subhasini, S. and Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing, Journal of Network and Computer Applications, 34(1), 1 11 (2011). [14] Zadeh, L. A.: Fuzzy Sets and Systems, International Journal of general systems, Taylor Francis, (1990). [15] Zadeh, L. A.: Outline of a New Approach to the Analysis of Complex Systems and Decision Processes, IEEE Transactions on Systems, Man and Cybernetics, 3, (1973). [16] Zeng, X. J. and Singh, M. G.: Approximation Theory of Fuzzy Systems: SISO case, IEEE Tranactions on Fuzzy Systems, 2(2), (1994). 9
Fuzzy Based Reactive Resource Pricing in Cloud Computing
Fuzzy Based Reactive Resource Pricing in Cloud Computing 1P. Pradeepa, 2M. Jaiganesh, 3A. Vincent Antony Kumar, 4M. Karthiha Devi 1, 2, 3, 4 Department of Information Technology, PSNA College of Engineering
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A.Vanitha Katherine (1) and K.Alagarsamy (2 ) 1 Department of Master of Computer Applications, PSNA College
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Relational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
A Trust-Evaluation Metric for Cloud applications
A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow
Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction
Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud
2015 (8): 131-135 FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud Rogheyeh Salehi 1, Alireza Mahini 2 1. Sama technical and vocational training college, Islamic
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
The Review of Virtualization in an Isolated Computer Environment
The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,
Project Management Efficiency A Fuzzy Logic Approach
Project Management Efficiency A Fuzzy Logic Approach Vinay Kumar Nassa, Sri Krishan Yadav Abstract Fuzzy logic is a relatively new technique for solving engineering control problems. This technique can
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based
Threat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Estimating Trust Value for Cloud Service Providers using Fuzzy Logic
Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,
STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
Efficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
International Journal of Computer & Organization Trends Volume20 Number1 May 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Introduction to Fuzzy Control
Introduction to Fuzzy Control Marcelo Godoy Simoes Colorado School of Mines Engineering Division 1610 Illinois Street Golden, Colorado 80401-1887 USA Abstract In the last few years the applications of
Sistemi Operativi e Reti. Cloud Computing
1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi [email protected] 2 Introduction Technologies
EMPLOYEE PERFORMANCE APPRAISAL SYSTEM USING FUZZY LOGIC
EMPLOYEE PERFORMANCE APPRAISAL SYSTEM USING FUZZY LOGIC ABSTRACT Adnan Shaout* and Mohamed Khalid Yousif** *The Department of Electrical and Computer Engineering The University of Michigan Dearborn, MI,
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR
BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software
Technical Enablers for Cloud Computing Successful Adoption
Technical Enablers for Cloud Computing Successful Adoption Torki Altameem Dept. of Computer Science, RCC, King Saud University, P.O. Box: 28095 11437 Riyadh-Saudi Arabia. [email protected] Abstract :
CLOUD COMPUTING IN HIGHER EDUCATION
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS
INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.
CLOUD COMPUTING Mr. Dhananjay Kakade CSIT, CHINCHWAD, Mr Giridhar Gundre CSIT College Chinchwad Abstract: Cloud computing is a technology that uses the internet and central remote servers to maintain data
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR
GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
Data Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Intuitionistic fuzzy load balancing in cloud computing
8 th Int. Workshop on IFSs, Banská Bystrica, 9 Oct. 2012 Notes on Intuitionistic Fuzzy Sets Vol. 18, 2012, No. 4, 19 25 Intuitionistic fuzzy load balancing in cloud computing Marin Marinov European Polytechnical
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Parallels Server 4 Bare Metal
Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Data Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Understanding the Benefits of IBM SPSS Statistics Server
IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004
Windows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
Migration of Virtual Machines for Better Performance in Cloud Computing Environment
Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
Li Sheng. [email protected]. Nowadays, with the booming development of network-based computing, more and more
36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng [email protected] Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors
Cloud Computing. Alex Crawford Ben Johnstone
Cloud Computing Alex Crawford Ben Johnstone Overview What is cloud computing? Amazon EC2 Performance Conclusions What is the Cloud? A large cluster of machines o Economies of scale [1] Customers use a
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Group Based Load Balancing Algorithm in Cloud Computing Virtualization
Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Pluribus Netvisor Solution Brief
Pluribus Netvisor Solution Brief Freedom Architecture Overview The Pluribus Freedom architecture presents a unique combination of switch, compute, storage and bare- metal hypervisor OS technologies, and
Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013. Applying Virtualization Technology in Security Education
Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 141 ( 2014 ) 10 14 WCLTA 2013 Applying Virtualization Technology in Security Education Wenjuan Xu a *,
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
Automated deployment of virtualization-based research models of distributed computer systems
Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
SURVEY ON VIRTUALIZATION VULNERABILITIES
SURVEY ON VIRTUALIZATION VULNERABILITIES Indumathy M Department of MCA, Acharya Institute of Technology, Bangalore, (India) ABSTRACT Virtualization plays a major role in serving the organizations to reduce
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Security Benefits of Cloud Computing
Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: [email protected] Abstract: The nature of the Internet is
Performance Analysis of Resource Provisioning for Cloud Computing Frameworks
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Performance Analysis of Resource Provisioning for Cloud Computing Frameworks Sanjeev Kumar Pippal 1, Rahul Kumar Dubey 2, Arjun
SERVER 101 COMPUTE MEMORY DISK NETWORK
Cloud Computing ก ก ก SERVER 101 COMPUTE MEMORY DISK NETWORK SERVER 101 1 GHz = 1,000.000.000 Cycle/Second 1 CPU CYCLE VIRTUALIZATION 101 VIRTUALIZATION 101 VIRTUALIZATION 101 HISTORY YEAR 1800 YEARS LATER
Environments, Services and Network Management for Green Clouds
Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time
Tamsui Oxford Journal of Management Sciences, Vol. 0, No. (-6) Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Chih-Hsun Hsieh (Received September 9, 00; Revised October,
CHAPTER 2 THEORETICAL FOUNDATION
CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should
Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database
JIOS, VOL. 35, NO. 1 (2011) SUBMITTED 02/11; ACCEPTED 06/11 UDC 004.75 Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database University of Ljubljana Faculty of Computer and Information
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
A FUZZY LOGIC APPROACH FOR SALES FORECASTING
A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for
CloudAnalyzer: A cloud based deployment framework for Service broker and VM load balancing policies
CloudAnalyzer: A cloud based deployment framework for Service broker and VM load balancing policies Komal Mahajan 1, Deepak Dahiya 1 1 Dept. of CSE & ICT, Jaypee University Of Information Technology, Waknaghat,
GUIDELINE. on SERVER CONSOLIDATION and VIRTUALISATION. National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis
GUIDELINE on SERVER CONSOLIDATION and VIRTUALISATION National Computer Board, 7th Floor Stratton Court, La Poudriere Street, Port Louis Introduction There is an ever increasing need for both organisations
