Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 9 of 9
  • Item
    Optimal scheduling of computational task in cloud using Virtual Machine Tree
    (2012) Achar, R.; Santhi Thilagam, P.; Shwetha, D.; Pooja, H.; Roshn; I Andrea
    The increasing demand in computing resources and widespread adaptation of Service Oriented Architecture (SOA) has made cloud as a new IT delivery mechanism. In cloud, computing resources are provided to the requester as a service, which include Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Cloud Computing is still in developing stage and faces many challenges. Out of the various issues, scheduling plays a very important role in determining the efficient execution of tasks in cloud environment. In this paper we present a scheduling algorithm which uses tree based data structure called Virtual Machine Tree (VMT) for efficient execution of tasks. The proposed algorithm is tested using CloudSim simulator and the results shows that algorithm gives better performance compared to other traditional scheduling algorithms. © 2012 IEEE.
  • Item
    Load balancing in cloud based on live migration of virtual machines
    (2013) Achar, R.; Santhi Thilagam, P.S.; Soans, N.; Vikyath, P.V.; Rao, S.; Vijeth, A.M.
    Cloud computing is an upcoming trend in the field of computer science in recent years. In cloud, computing resources are provided as service in the form of virtual machine to its clients across the globe based on demand. Huge demand for cloud resources results in overutilization of servers whenever there is a heavy load. It is necessary to distribute the load across the servers in cloud by taking into consideration of allocating the right amount of resources dynamically based on the load to improve the performance of applications running in virtual machines. In this paper we present an algorithm which dynamically allocate resources based on the need and distribute the load across the servers. We conducted the experiment on Xen Cloud Platform. We use response time as a metric. The experiments conducted shows that the proposed algorithm improves the performance of applications running in virtual machines by using the feature scaling and migration. © 2013 IEEE.
  • Item
    Virtual machine introspection based spurious process detection in virtualized cloud computing environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Virtual Machines are prime target for adversary to take control by exploiting the identified vulnerability present in it. Due to increasing number of Advanced Persistent Attacks such as malware, rootkit, spyware etc., virtual machine protection is highly challenging task. The key element of Advanced Persistent Threat is rootkit that provides stealthy control of underlining Operating System (kernel). Protecting individual guest operating system by using antivirus and commercial security defense mechanism is cost effective and ineffective for virtualized environment. To solve this problem, Virtual Machine Introspection has emerged as one of the promising approaches to secure the state of the virtual machine. Virtual Machine Introspection inspects the state of multiple virtual machines by operating outside the virtual machine i.e. at hypervisor level. In this work, Virtual Machine Introspection based malicious process detection approach is proposed. It extracts the high level information such as system call details, opened known backdoor ports from introspected memory to identify the spurious process. It triggers an alert in response to detected intrusion. © 2015 IEEE.
  • Item
    Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Cloud Computing enabled by virtualization technology exhibits revolutionary change in IT Infrastructure. Hypervisor is a pillar of virtualization and it allows sharing of resources to virtual machines. Vulnerabilities present in virtual machine leveraged by an attacker to launch the advanced persistent attacks such as stealthy rootkit, Trojan, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack etc. Virtual Machines are prime target for malignant cloud user or an attacker to launch attacks as they are easily available for rent from Cloud Service Provider (CSP). Attacks on virtual machine can disrupt the normal operation of cloud infrastructure. In order to secure the virtual environment, defence mechanism is highly imperative at each virtual machine to identify the attacks occurring at virtual machine in timely manner. This work proposes In-and-Out-of-the-Box Virtual Machine and Hypervisor based Intrusion Detection and Prevention System for virtualized environment to ensure robust state of the virtual machine by detecting followed by eradicating rootkits as well as other attacks. We conducted experiments using popular open source Host based Intrusion Detection System (HIDS) called Open Source SECurity Event Correlator (OSSEC). Both Linux and windows based rootkits, DoS attack, Files integrity verification test are conducted and they are successfully detected by OSSEC. © 2015 IEEE.
  • Item
    An objective study on improvement of task scheduling mechanism using computational intelligence in cloud computing
    (Institute of Electrical and Electronics Engineers Inc., 2016) George, N.; Chandrasekaran, K.; Binu, A.
    Cloud Computing facilitates delivery of various types of computational services through the internet. These services can be availed according to the user demand. The resource scarcity problems within the Service Providers are met using Virtualization technique, which allows scalability of resources and thereby helps to meet the client requirements. Allocation of resources to client tasks is an issue that is being addressed for a long time. Due to the increased complexity in the area, there has not yet been a perfect scheduling mechanism. Practices have been done profusely in order to find solutions for scheduling that nears optimality. A single scheduling mechanism may not always give the expected outcome. The task scheduling mechanisms are designed in a manner as to optimize some metrics related to the Cloud. This paper overviews various literature associated with task scheduling and resource scheduling in Cloud Computing. An examination of the techniques is done and a proposal is made, which will allow to further improve the scheduling mechanism. © 2015 IEEE.
  • Item
    Load Balancing in Cloud Environment Using a Novel Hybrid Scheduling Algorithm
    (Institute of Electrical and Electronics Engineers Inc., 2016) Domanal, S.; Guddeti, G.R.
    We propose a hybrid scheduling algorithm for load balancing in a distributed environment by combining the methodology of Divide-And-Conquer and Throttled algorithms referred to as DCBT. Our algorithm plays an important role in distributing the incoming load in an efficient manner so that it maximizes resource utilization in a cloud environment. Further, load balancer plays an important role in cloud environment by assigning incoming tasks to Virtual Machines (VM) intelligently. The main aim of the proposed DCBT is to reduce the total execution time of the tasks and thereby maximizing the resource utilization. Further, the proposed DCBT algorithm is analyzed using Cloud Sim simulator and also in customized distributed environment using python. Experimental results demonstrate that the proposed algorithm gives better efficiency in both Cloud Sim and customized environments. The proposed DCBT utilizes the Virtual Machines more efficiently while reducing the execution time of the tasks allocated to Request Handlers (RH) by 9.972% in comparison to the Modified Throttled algorithm. © 2015 IEEE.
  • Item
    Energy efficient quality of service aware virtual machine migration in cloud computing
    (Institute of Electrical and Electronics Engineers Inc., 2018) Sharma, N.; Sharma, P.; Guddeti, R.M.
    This paper deals with mulit-objective (network aware, energy efficient, and Service Level Agreement (SLA) aware) Virtual Machines (VMs) migration at the cloud data center. The proposed VMs migration technique migrate the VMs from the underutilized PMs to the energy efficient Physical Machines (PMs) at the cloud data center. Further, the multi-objective VMs migration technique not only reduces the power consumption of PMs and switches but also guarantees the quality of service by maintaining the SLA at the cloud data center. Our proposed VMs migration approach can find the good balance between three conflict objectives as compared to other algorithms. Further, the cloudsim based experimental results demonstrate the superiority of our proposed multi-objective VMs migration technique in terms of energy efficiency and also reduces the SLA violation over state-of-the-art VMs migration techniques such as Interquartile Range (IQR), and Random VMs migration techniques at the cloud data center. © 2018 IEEE.
  • Item
    Virtual Machine Placement in Non-Cooperative Cloud Federation-Alliance
    (Institute of Electrical and Electronics Engineers Inc., 2023) Addya, S.K.; Satpathy, A.; Turuk, A.K.; Shaoo, B.
    Many inter-cloud organizations have been proposed to overcome the current limitations of cloud computing, such as service interruption, lack of interoperability, and degradation of services. One such multi-cloud architecture is the cloud federation, where multiple geographically distributed autonomous service providers voluntarily agree to share resources governed by a well-defined set of rules. Although federation offers numerous benefits for the service providers, sharing resources is supervised using a strict set of protocols offering limited flexibility. Hence, this paper proposes a relaxed resources sharing model for the service providers called cloud federation-alliance. The formation of the alliance is modeled as a non-cooperative game among the service providers. The game's stability and the alliance's performance loss are also studied using price-of-stability (PoS) and price-of-anarchy (PoA), respectively. A modified best-fit placement strategy is focused on reducing the power consumed. To assess the performance of the alliance placement, we compare its performance with random and worst-fit allocation techniques. This work aims to build a stable, sustainable, multi-cloud federation alliance and address this structure's critical issues. Extensive simulation results show stability between 2% and 30% with varying workloads. © 2023 IEEE.
  • Item
    Analysis of Selected Load Balancing Algorithms in Containerized Cloud Environment for Microservices
    (Institute of Electrical and Electronics Engineers Inc., 2024) Saxena, D.; Bhowmik, B.
    Microservice architecture has become a widely accepted solution to address the challenges, particularly scala-bility, deployment, and flexibility associated with monolithic architecture. A vital attribute of the microservices architecture is its capability to handle load balancing on a large scale. The load balancer collaborates with a scaler to distribute the workload efficiently across multiple instances. In the literature, different studies employ load-balancing algorithms for efficient microservice load balancing. These works overlook cloud-based microservice applications or focus solely on virtual machines, neglecting containers. This paper addresses these limitations by comparatively assessing selected load-balancing algorithms. The three most used algorithms, random, round-robin, and least connection, are studied on a microservice application. The extensive experiments are conducted using Elastic Container Service (ECS) of Amazon Web Service (AWS) for containerized cloud setup where each service resides in a cluster and traffic is generated through Locust. Experimental results show that throughput and response time range of 6.2-288.7 and 312.2-3375.8 ms, respectively. © 2024 IEEE.