ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 02 情報科学
  2. 01 学術雑誌論文

Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage

http://hdl.handle.net/10061/0002000993
http://hdl.handle.net/10061/0002000993
0d2a5fc8-df22-47db-9443-b02dd2f3ac71
アイテムタイプ 学術雑誌論文 / Journal Article(1)
公開日 2025-06-11
タイトル
タイトル Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage
言語
言語 eng
キーワード
主題Scheme Other
主題 Virtual machine allocation
キーワード
主題Scheme Other
主題 interdependency attack
キーワード
主題Scheme Other
主題 security
キーワード
主題Scheme Other
主題 workload balance
キーワード
主題Scheme Other
主題 power consumption
キーワード
主題Scheme Other
主題 hypervisor
資源タイプ
資源タイプ journal article
アクセス権
アクセス権 open access
著者 Sane, Bernard Ousmane

× Sane, Bernard Ousmane

en Sane, Bernard Ousmane

Search repository
Ba, Mandicou

× Ba, Mandicou

en Ba, Mandicou

Search repository
Fall, Doudou

× Fall, Doudou

en Fall, Doudou

Search repository
妙中, 雄三

× 妙中, 雄三

ja 妙中, 雄三

ja-Kana タエナカ, ユウゾウ

en Taenaka, Yuzo

Search repository
Niang, Ibrahima

× Niang, Ibrahima

en Niang, Ibrahima

Search repository
門林, 雄基

× 門林, 雄基

ja 門林, 雄基

ja-Kana カドバヤシ, ユウキ

en Kadobayashi, Youki

Search repository
抄録
内容記述タイプ Abstract
内容記述 Cloud computing has completely changed IT (information technology) by providing IT resources as services on the internet. However, certain types of attacks, such as interdependency attacks, impede its wide adoption. With the latter, an attacker who succeeds in compromising the VM of a user can traverse the hypervisor to launch an attack on the VM(s) of other users on the same hypervisor. Unfortunately, we note a lack of secure and performant allocation policies against this problem. Existing policies focus on security but ignore other factors, including workload balance and energy consumption, which are vital for commercial cloud platforms. In this context, we propose different allocation policies for choosing the datacenter server to which we allocate a new virtual machine. These policies aim to minimize the interdependence of different users’ VMs while keeping the system performant regarding workload balance and/or power consumption. By default, our allocation policies treat all legitimate users as attackers and host their virtual machines according to their efficiency and coverage. We first design a secure and balanced solution that increases workload balance to prevent the servers from being overused. Afterward, we propose an algorithm that addresses security, power consumption, and workload balance objectives simultaneously. Based on our simulation results, our solutions perform better than existing algorithms regarding security, workload balance, and power consumption. The balanced solution reduces the chance of an attacker to zero and increases workload balance linearly. In other words, the workload balance is between [5,35] , and it utilizes slightly more hosts than existing proposals, with gains between [2,8] . Although our final proposal is less secure than previous algorithms, it performs better, so it has a good workload balance ( [5,30] ) and consumes less energy.
書誌情報 en : IEEE Access

巻 12, p. 74944-74960, 発行日 2024-05-24
出版者
出版者 IEEE
ISSN
収録物識別子タイプ EISSN
収録物識別子 2169-3536
出版者版DOI
関連タイプ isReplacedBy
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ACCESS.2024.3404949
出版者版URI
関連タイプ isReplacedBy
識別子タイプ URI
関連識別子 https://ieeexplore.ieee.org/abstract/document/10538230
権利
権利情報Resource https://creativecommons.org/licenses/by-nc-nd/4.0/
権利情報 $00A9 2024 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
著者版フラグ
出版タイプ NA
助成情報
助成機関名 IPA
研究課題名 Industrial Cyber Security Center of Excellence Core Human Resources Development Program
助成情報
助成機関名 Japan Society for the Promotion of Science (JSPS)
研究課題番号 JP24K03045
研究課題名 データセントリックな信頼志向データ流通管理の研究
戻る
0
views
See details
Views

Versions

Ver.1 2025-06-11 01:54:47.439766
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3