Provisioning of Defensing Mechanism Against Threats During VM Migration in Cloud Environment

Provisioning of Defensing Mechanism Against Threats During VM Migration in Cloud Environment

© 2022 by IJETT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : Nelli Chandrakala, Vamsidhar Enireddy
DOI : 10.14445/22315381/IJETT-V70I6P201

How to Cite?

Nelli Chandrakala, Vamsidhar Enireddy, "Provisioning of Defensing Mechanism Against Threats During VM Migration in Cloud Environment," International Journal of Engineering Trends and Technology, vol. 70, no. 6, pp. 1-12, 2022. Crossref,

Defensing cloud computing towards security threats is a challenging task. Cloud Computing (CC) acts as an open platform that lays a platform for attackers with malicious activities from unauthorized users targeting the host. VM migration is a target defense mechanism that mitigates the attackers and offers superior VM position management. Moreover, there is an apparent demand to concentrate on security benefits to the VM migration considering cloud system architecture. This research intends to fill the gap using a random VM model to provide the security gap by state action. The security metrics include measuring the attack rate over the random VM field. The simulation is done in the MATLAB 2020a environment with the unavailability measure of VM migration. The major research contributions are the probability of analyzing the attack rate over the configured system and the selection of VM based on attack tolerance level. The outcomes are validated against simulation outcomes to confirm the level of prediction.

Cloud computing, VM migration, Threat, Attack probability, Random field model.

[1] Wei, H. Gu, K. Wang, X. Yu, and X. Liu, Improving Cloud-Based IoT Services Through Virtual Network Embedding in Elastic Optical Inter-DC Networks, IEEE Internet of Things Journal. 6(1) (2019) 986–996.
[2] Fischer, J. F. Botero, M. T. Beck, H. de Meer, and X. Hesselbach, Virtual Network Embedding: A Survey, IEEE Communications Surveys & Tutorials. 15(4) (2013) 1888–1906.
[3] Habib, M. Tornatore, F. Dikbiyik, and B. Mukherjee, Disaster Survivability in Optical Communication Networks, Computer Communications. 36(6) (2013) 630–644.
[4] Guo, C. Qiao, J. Wang, H. Yu, Y. Zuo, J. Li, Z. Chen, and Y. He, Survivable Virtual Network Design and Embedding to Survive a Facility Node Failure, Journal of Lightwave Technology. 32(3) (2014) 483– 493.
[5] Jiang, L. Gong, and Z. W. Zuqing, Efficient Joint Approaches for Location-Constrained Survivable Virtual Network Embedding, IEEE Global Communications Conference, Austin, TX, USA. 8(12) (2014) 1810–1815.
[6] Gu, K. Shaban, N. Ghani, S. Khan, M. R. Naeini, M. M. Hayat, and C. Assi, Survivable Cloud Network Mapping for Disaster Recovery Support, IEEE Transactions on Computers. 64(8) (2015) 2353–2366.
[7] Couto, S. Secci, M. E. M. Campista, and L. H. M.K. Costa, Server Placement with Shared Backups for Disaster-Resilient Clouds, Computer Networks. 93(3) (2015) 423–434.
[8] Shahriar, R. Ahmed, S. R. Chowdhury, A. Khan, R. Boutaba, and J. Mitra, Generalized Recovery From Node Failure in Virtual Network Embedding, IEEE Transactions on Network and Service Management. 14(2) (2017) 261–274.
[9] Tsakalozos, V. Verroios, M. Roussopoulos, and A. Delis, Live VM Migration Under Time-Constraints in Share-Nothing IaaSClouds, IEEE Transactions on Parallel and Distributed Systems. 28(8) (2017) 2285–2298.
[10] Khan, N. Shahriar, R. Ahmed, and R. Boutaba, Multi-Path Link Embedding for Survivability in Virtual Networks, IEEE Transactions on Network and Service Management. 13(2) (2016) 253-266.
[11] Beloglazov A, Abawajy J, Buyya R, Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centres for Cloud Computing, Future Gener, Comput. Syst. 28(5) (2012) 755–768.
[12] Stergiou C, Psannis K.E, Kim B.G, Gupta B, Secure integration of IoT and Cloud Computing, Future Gener, Comput Syst. 78 (2018) 964–975.
[13] Gupta B.B, Gupta S, Chaudhary P, Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-based XSS Vulnerabilities in the Cloud Int. J. Cloud Appl. Comput. IJCAC. 7(1) (2017) 1–31.
[14] Xue W, Li W, Qi H, Li K, Tao X, Ji X, Communicationaware Virtual Machine Migration in Cloud Data Centres, Int. J. High Perform. Comput. Netw. 10(4–5) (2017) 372–380.
[15] Hu B, Lei Z, Lei Y, Xu D, Li J, A Time-Series Based Pre-Copy Approach for Live Migration of Virtual Machines, In: IEEE 17th International Conference on Parallel and Distributed Systems, ICPADS, IEEE. (2011) 947–952.
[16] Bauchi A, Toshimi Midorikawa E, Netto M, Improving Virtual Machine Live Migration via Application-Level Workload Analysis, In: 2014 10th International Conference on Network and Service Management CNSM, IEEE. (2014) 163–168.
[17] Zhang X, Shae Z.Y, Zheng S, Jamjoom H, Virtual Machine Migration in an Over-Committed Cloud, In: Network Operations and Management Symposium NOMS, IEEE. (2012) 196–203.
[18] Ghavipour M, Meybodi M.R, An Adaptive Fuzzy Recommender System Based on Learning Automata, Electron. Commer. Res. Appl. 20 (2016) 105–115.
[19] Beloglazov A, Buyya R, Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centres, Concurr. Computat. Pract. Exp. 24(13) (2012) 1397–1420.
[20] Beloglazov A, Buyya R, Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centres, Concurr Comput. Prac Exper. 13 (2012) 1397–1420.
[21] Ding W, Luo F, Han L, Gu C, Lu H, Fuentes J, Adaptive Virtual Machine Consolidation Framework Based on the Performance-ToPower Ratio in Cloud Data Centres,Future Gener Computer Syst. 111 (2020) 254–270
[22] Zahedi Fard SY, Ahmadi MR, Adabi S, A Dynamic VM Consolidation Technique for Qos and Energy Consumption in the Cloud Environment, J Supercomput .73 (2017) 4347–4368.
[23] Mohiuddin I, Almogren A, Workload Aware VM Consolidation Method in Edge/Cloud Computing for Iot Applications, J Parallel Distributed Comput. 123 (2019) 204–214.
[24] Wan J, Chen B, Wang S, Xia M, Li D, Liu C, Fog Computing for Energy-Aware Load Balancing and Scheduling in Intelligent Factory, IEEE Trans Indus Inf. 14(10) (2018) 4548–4556.
[25] Ilager S, Kotagiri R, Rajkumar B, Thermal Prediction for Efficient Energy Management of Clouds Using Machine Learning, IEEE Trans Parallel Distrib Syst TPDS. 32 (2020) 1044–1056
[26] R. Santhana Lakshmi1, Factors Influencing SMEs towards Execution of Technology Adoption Model in Cloud Computing.International Journal of Engineering Trends and Technology. 69(3) (2022) 189-194.
[27] V. Gokula Krishnan , J. Deepa , S. Venkata Lakshmi,Securing Mass Distributed Big Data Storage using Intelligent Elliptic Curve Integrated Encryption Scheme in Multi-Cloud Computing, International Journal of Engineering Trends and Technology. 70(1) (2022) 35-42