Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions

Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions

Sukhpal Singh Gill, Arash Shaghaghi
Copyright: © 2020 |Pages: 8
DOI: 10.4018/JOEUC.2020070102
Article PDF Download
Open access articles are freely available for download

Abstract

Cloud computing has emerged as a dominant platform for computing for the foreseeable future. A key factor in the adoption of this technology is its security and reliability. Here, this article addresses a key challenge which is the secure allocation of resources. The authors propose a security-based resource allocation model for execution of cloud workloads called STARK. The solution is designed to ensure security against probing, User to Root (U2R), Remote to Local (R2L) and Denial of Service (DoS) attacks whilst the execution of heterogeneous cloud workloads. Further, this paper highlights the promising directions for future research.
Article Preview
Top

1. Introduction

The fast developments in Information and Communication Technology (ICT) have enabled the emerging of the “cloud” as a successful paradigm for conveniently storing, accessing, processing, and sharing information (Varghese & Buyya 2017). With its significant benefits of scalability and elasticity, the cloud paradigm has appealed companies as well as individuals, which are more and more resorting to the multitude of available providers for storing and processing data. Unfortunately, such convenience comes at the price of owners’ loss of control over their data, and consequent security threats, which can limit the potential widespread adoption and acceptance of the cloud computing paradigm (Singh et al., 2017). Figure 1 shows the different types of attacks for cloud services such as software, platform, application and infrastructure.

Figure 1.

Different types of attacks for cloud services

JOEUC.2020070102.f01

On the one hand, cloud providers can be assumed to employ basic security mechanisms for protecting data in storage, processing, and communication, devoting resources to ensure security that many individuals and companies may not be able to afford. On the other hand, data owners, as well as users of the cloud, lose control over data and their processing. Currently, cloud services are provisioned and scheduled according to resources’ availability without ensuring the required security (Singh et al., 2017). The cloud provider should evolve its ecosystem to meet security requirements of each cloud component (Pietro et al., 2016) and specifically, deploy mechanisms to ensure the secure and autonomic management of resources.

In this research paper, we have proposed a conceptual model for security-aware allocation of cloud resources called STARK, which provides protection against security threats during resource management for workload execution. This work (STARK) is an extension of our previous research work i.e. STAR (Singh et al., 2017). The rest of paper is structured as follows. Section 2 presents proposed security-aware resource management model. Thereafter, we present a set of future research directions and conclude the paper in Section 3.

Top

2. Stark: Security Based Resource Allocation Model For Clustered Workloads

As the scale of mobile networks and the population of mobile users increases, the applications of cloud computing have emerged where social users can use their mobile devices to exchange and share contents with each other (Qu et al., 2010). The security resource is needed to protect mobile social big data during the delivery. However, due to the limited security resource, how to allocate the security resource becomes a new challenge. Existing security-based resource management techniques only focuses on homogenous cloud workloads and provide protection against Denial of Service (DoS) attack (Wailly et al., 2012; Singh & Chana 2013; Bittencourt et al., 2017). To solve this problem, there is the need for a new solution, which can protect the cloud against different types of security attacks during the autonomic execution of cloud workloads.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing