Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
Search Results
Item An approach for dynamic scaling of resources in enterprise cloud(IEEE Computer Society, 2013) Kanagala, K.; Chandra Sekaran, K.Elasticity is one of the key governing properties of cloud computing that has major effects on cost and performance directly. Most of the popular Infrastructure as a Service (IaaS) providers such as Amazon Web Services (AWS), Windows Azure, Rack space etc. work on threshold-based auto-scaling. In current IaaS environments there are various other factors like "Virtual Machine (VM)-turnaround time", "VM-stabilization time" etc. that affect the newly started VM from start time to request servicing time. If these factors are not considered while auto-scaling, then they will have direct effect on Service Level Agreement (SLA) implementations and users' response time. Therefore, these thresholds should be a function of load trend, which makes VM readily available when needed. Hence, we developed an approach where the thresholds adapt in advance and these thresholds are functions of all the above mentioned factors. Our experimental results show that our approach gives the better response time. © 2013 IEEE.Item A framework to monitor cloud infrastructure in service oriented approach(2013) Veigas, J.P.; Chandra Sekaran, K.Cloud computing processes and stores the organization's sensitive data in the third party infrastructure. Monitoring these activities within the cloud environment is a major task for the security analysts and the cloud consumer. The cloud service providers may voluntarily suppress the security threats detected in their Infrastructure from the consumers. The goal is to decouple Intrusion Detection System (IDS) related logic from individual application business logic and adhere to the Service Oriented Architecture Standards. This paper provides a framework for Intrusion Detection and reporting service to the cloud consumers based on the type of applications and their necessary security needs. Cloud consumers can choose the desired signatures from this framework to protect their applications. The proposed technique is deployed in existing open source cloud environment with minimum changes. A proof-of-concept prototype has been implemented based on Eucalyptus open source packages to show the feasibility of this approach. Our results show that this framework provides effective way to monitor the cloud infrastructure in service oriented approach. © 2013 IEEE.
