scholarly journals Privacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment

Author(s):  
Suneeta Mohanty ◽  
Prasant Kumar Pattnaik ◽  
G. B. Mund

<p>Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as the winner by the auctioneer (Cloud Service Provider) to gain more. In this auction mechanism, individual bid values are revealed to the auctioneer in order to select the winner as a result of which privacy of bid values are lost. In this paper, we proposed an auction scheme to select the winner without revealing the individual bid values to the auctioneer to maintain privacy of bid values. The winner will get the access to the bundle of VM instances. This  scheme relies on a set of cryptographic protocols including Oblivious Transfer (OT) protocol and Yao’s protocol to maintain privacy of bid values.</p>

Efficient computations are increasing now a day, so their need is very high in the world. Infrastructure and computation techniques are not as much as efficient in conventionally or in present scenario, therefore the cloud computing is new to deal this type of problems. Sequencing of hardware and software technologies, for giving scalable and low cost computational understandings in cloud computing. The major focus of this research is to diminish the transportation cost of resource allocation along with various virtual machines in cloud computing environment. In this research paper, implementation of Vogel's Approximation Method (VAM) to obtain an Initial Basic Feasible Solution (IBFS) and an algorithm to optimize the cost of resource transportations for cloud service provider (CSP) as well as present an example also to understand the proposed method for total supply values and total demand values. Although the calculation of cost reduction until the iteration still has a non-negative values, and the calculation is done again until the last iteration. A comparison has been shown the cost of the proposed mechanism is much less from other technique.


2020 ◽  
Vol 20 (1) ◽  
pp. 36-52
Author(s):  
C. Vijaya ◽  
P. Srinivasan

AbstractThe goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.


Author(s):  
Trinathbasu Miriyala ◽  
JKR Sastry

<p><span lang="EN-US">Cloud computing technologies are being used by many who need computing resources such as software, platform and infrastructure as per their business requirements in terms of provisioning and pay for the usage as per actual consumption of the services based on the SLA signed by the user and cloud service provider. Software running on a physical machine is being provided as services to the end users. For the reasons of cost economies access to software that uses a database is being provided to multiple users. The access to the software is provided either directly or through a virtual machine. The software being provided as service uses the same database for many of the users who have requisitioned for the same. As a result, there could be encroachments by the users into the data of others. There is a need to secure the data belonging to several users while all of them access the data using the same application. In this paper an efficient method is presented for securing the data processed by software which is offered as a service to multiple users either directly or through virtual machines.    </span></p>


2019 ◽  
Vol 8 (3) ◽  
pp. 1457-1462

Cloud computing technology has gained the attention of researchers in recent years. Almost every application is using cloud computing in one way or another. Virtualization allows running many virtual machines on a single physical computer by sharing its resources. Users can store their data on datacenter and run their applications from anywhere using the internet and pay as per service level agreement documents accordingly. It leads to an increase in demand for cloud services and may decrease the quality of service. This paper presents a priority-based selection of virtual machines by cloud service provider. The virtual machines in the cloud datacenter are configured as Amazon EC2 and algorithm is simulated in cloud-sim simulator. The results justify that proposed priority-based virtual machine algorithm shortens the makespan, by 11.43 % and 5.81 %, average waiting time by 28.80 % and 24.50%, and cost of using the virtual machine by 21.24% and 11.54% as compared to FCFS and ACO respectively, hence improving quality of service.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Ruirui Zhang ◽  
Xin Xiao

Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state of user-level programs, which can detect attacks on the dynamic runtime of applications and has high real-time performance. There are five modules in the model: antigen presenting module, signal acquisition module, immune response module, signal measurement module, and information monitoring module, which are distributed into different levels of virtual machine environment. Performance analysis and experimental results show that the model brings a small performance overhead for the virtual machine system and has a good detection performance. It is applicable to judge the state of user-level application in guest virtual machine, and it is feasible to use it to increase the user-level security in software services of cloud computing platform.


2019 ◽  
pp. 992-1013
Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Kumaraswamy S ◽  
Mydhili K Nair

<p>Cloud computing has become more commercial and familiar. The Cloud data centers havhuge challenges to maintain QoS and keep the Cloud performance high. The placing of virtual machines among physical machines in Cloud is significant in optimizing Cloud performance. Bin packing based algorithms are most used concept to achieve virtual machine placement(VMP). This paper presents a rigorous survey and comparisons of the bin packing based VMP methods for the Cloud computing environment. Various methods are discussed and the VM placement factors in each methods are analyzed to understand the advantages and drawbacks of each method. The scope of future research and studies are also highlighted.</p>


Application portability in a cloud computing condition is characterized to be the exchange of utilization or its segments starting with one cloud administration then onto the next cloud administration of its specialized comparability. The application should be such transferred that it does not make any significant changes in the application code although recompilation or relinking may be allowed. Application portability can be performed by the customer only in case of IaaS and PaaS services because for SaaS the application code relies on the cloud service provider itself. The application artifacts and their dependencies play a major role in the target environment. Containers and their related infrastructure hold valuable importance for application portability. In this paper, we will elaborate on all the issues, challenges, scenarios, and approaches for application portability that rose to date. We will study all the facets of data and application portability such as its instruction, syntax, metadata, and policies. The evolution of automation tools and technologies has made the portability of applications easier as the manual processes were inefficient and error-prone.


2013 ◽  
Vol 311 ◽  
pp. 15-19 ◽  
Author(s):  
Hee Seung Jo ◽  
Myung Ho Lee ◽  
Dong Hoon Choi

Machine virtualization and cloud computing environment have highlighted for last several years. This trend is based on the endeavor to enhance the utilization and reduce the ownership cost of machines. On the other hand, in aspect of high performance computing, graphics processing unit (GPU) has proved its capability for general purpose computing in many research areas. Evolving from traditional APIs such as the OpenGL and the Direct3D to program GPU as a graphics device, the CUDA of NIVDIA and the OpenCL provide more general programming environment for users. By supporting memory access model, interfaces to access GPUs directly and programming toolkits, users can perform parallel computation using the hundreds of GPU cores. In this paper, we propose a GPU virtualization mechanism to exploit GPU on virtualized cloud computing environment. Differently from the previous work which mostly reimplemented GPU programming APIs and virtual device drivers, our proposed mechanism uses the direct pass-through of PCI-E channel having GPU. The main limitation of previous approaches is virtualization overhead. Since they were focused on the sharing of GPU among virtual machines, they reimplemented GPU programming APIs at virtual machine monitor (VMM) level, and it incurred significant performance overhead. Moreover, if APIs are changed, they need to reengineer the most of APIs. In our approach, bypassing virtual machine monitor layer with negligible overhead, the mechanism can achieve similar computation performance to bare-metal system and is transparent to the GPU programming APIs.


Sign in / Sign up

Export Citation Format

Share Document