Security Aware and Energy-Efficient Virtual Machine Consolidation in - - PowerPoint PPT Presentation

security aware and energy efficient virtual machine
SMART_READER_LITE
LIVE PREVIEW

Security Aware and Energy-Efficient Virtual Machine Consolidation in - - PowerPoint PPT Presentation

Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems Farhad Ahamed, Seyed Shahrestani and Bahman Javadi School hool of of Comput omputing, ing, Engineer ngineering ing and and Mathema hematics ics


slide-1
SLIDE 1

Security Aware and Energy-Efficient Virtual Machine Consolidation in Cloud Computing Systems

Farhad Ahamed, Seyed Shahrestani and Bahman Javadi

School hool of

  • f Comput
  • mputing,

ing, Engineer ngineering ing and and Mathema hematics ics Wes ester ern n Sydney dney Univ Univer ersit ity, , Aus ustralia alia

slide-2
SLIDE 2

Secur ecurit ity Concer

  • ncerns

ns in in Cloud loud Comput

  • mputing

ing

Attac ack k types pes – – cons consider idering ing res esour

  • urce

ce shar haring ing is issue ue

slide-3
SLIDE 3

VM consolidation – What and why ?

How ¡do ¡we ¡ensure ¡that ¡our ¡data ¡in ¡the ¡Cloud ¡is ¡not ¡living ¡with ¡a ¡malicious ¡neighbour? ¡

slide-4
SLIDE 4

a) The Compartment Isolation Approach of Secure Virtual Machine Consolidation b) Security Profiles for the Virtual Machines

PAGE 4 PAGE 4

Propos

  • posed

ed Appr pproac

  • aches

hes

slide-5
SLIDE 5

Secur ecure e VM Cons

  • nsolida
  • lidation

ion SIR model

  • Susceptible
  • Infected
  • Recovered

Using the isolated compartment strategy; separation of VMs reduces the probability cross computer malware spreading.

The Compartment Isolation Approach of Secure Virtual Machine Consolidation

PAGE 5 PAGE 5

slide-6
SLIDE 6

Secur ecure e VM Cons

  • nsolida
  • lidation

ion

Security Profiles for the Virtual Machines

PAGE 6 PAGE 6

slide-7
SLIDE 7

Security Profiles for the Virtual Machines

Secur ecure e VM Cons

  • nsolida
  • lidation

ion

PAGE 7 PAGE 7

slide-8
SLIDE 8

Int nter ernal nal vulner ulnerabilit bility

Internal vulnerability and Intrusion analysis score

PAGE 8 PAGE 8

slide-9
SLIDE 9

Ranking of the security profiles of the VMs

slide-10
SLIDE 10

VM Mig igration ion Select election ion 1.

  • 1. Random

andom Select election ion (RS) 2.

  • 2. Minimum

inimum Mig igration ion Time ime (MMT) 3.

  • 3. Maximum

aximum cor correla elation ion (MC) 4.

  • 4. Minimum

inimum Ut Utiliz ilization ion (MU) U)

High High le level el pr procedur

  • cedure

e of

  • f the

he VM mig migration ion

VM Mig igration ion Placement lacement 1.

  • 1. Local

Local Regres ession ion (LR LR) 2.

  • 2. Local

Local Regres ession ion Robus

  • bust (LR

LRR) 3.

  • 3. Median

edian Abs bsolut

  • lute

e Devia iation ion (MAD 4.

  • 4. Static

ic Thr hres eshold hold (THR HR)

slide-11
SLIDE 11

Secur ecure e VM Select election ion Algor lgorit ithm hm (SBS)

slide-12
SLIDE 12

Secur ecure e VM Placement lacement Algor lgorit ithm hm (SBP)

slide-13
SLIDE 13

Simula imulation ion Set etup up

a) CloudSim Simulator b) PlanetLab Workload c) Power Consumption Profile

PAGE 13 PAGE 13

slide-14
SLIDE 14

PAGE 14 PAGE 14

Virtual Machine Details Virtual Machine Details

Total MIPS of VM 2500 Total PES (Processor unit) of VM 1 Total RAM of VM 1024 MB Network Bandwidth of VM 100 Mbit/s Total Storage size of VM 2.5 GB

Physical Machine Details Physical Machine Details

Total MIPS of PM 2660 Total PES (Processor unit) of PM 2 Total RAM of PM 8192 MB Total Storage size of PM 80 GB

VM and PM initial configuration for simulation

slide-15
SLIDE 15

PAGE 15 PAGE 15

Security aware VM consolidation comparison for low- medium workload for 800 hosts

304.000 ¡ 306.000 ¡ 308.000 ¡ 310.000 ¡ 312.000 ¡ 314.000 ¡ 316.000 ¡ 318.000 ¡ 320.000 ¡ 322.000 ¡ 2 ¡ 3 ¡ 4 ¡ 5 ¡ 6 ¡ 7 ¡ 8 ¡ 9 ¡ 10 ¡ kWh ¡ Security ¡level ¡

slide-16
SLIDE 16

PAGE 16 PAGE 16

nergy consumption versus security graph when the number of PMs are 1000, 2000 and 3000

4500 4600 4700 4800 4900 5000 5100 1 2 3 4 5 6 7 8 9 10 kWh kWh Security level Security level 1000 Hosts 2000 Hosts 3000 Hosts

slide-17
SLIDE 17

PAGE 17 PAGE 17

280.000 290.000 300.000 310.000 320.000 330.000 340.000 2 3 4 5 6 7 8 9 10 kWh kWh Security level Security level Secure IQR-MC Secure MAD-MMT Secure LLR-MMT Secure LR-MU Secure LR-MMT Secure THR-MMT

Security level vs. energy consumption in multiple security-aware algorithms

slide-18
SLIDE 18
  • Introduced the compartment isolation technique to achieve the security aware VM consolidation.
  • Different types of simulation setup and the subsequent result confirms that there are no abrupt

changes in power consumption to achieve security aware VM consolidation.

  • The solution presents an added protection measure with the minimal impact on energy efficient

algorithm.

  • This work could be extended to improve the VM reliability as well as security and energy

This work could be extended to improve the VM reliability as well as security and energy consumption. consumption.

PAGE 18 PAGE 18

Conc

  • nclus

lusions ions