Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    Phoenix: System for implementing private and hybrid cloud for OMIC sciences applications
    (2010) Prahalad, H.A.; Talukder, A.; Pardeshi, S.; Tamsekar, S.; Hari Krishna, R.; Chandrashekar, M.A.; Niket, B.; Gandham, S.
    Computational Quantitative Biology applications like Genomics, Transcriptomics, Proteomics, Metabolomics and Systems Biology at large require high computing resources that include both processing and storage. Cloud computing provides dynamically scalable on-demand infrastructure in a virtualised environment for processor intensive and data/storage intensive applications. Users need not own this infrastructure; rather use them as and when needed by paying for these resources in pay-as-you-use model that are generally available as a service over the internet. In this paper we present Phoenix - a middleware system for platform as a service (PaaS). This paper describes Phoenix as a novel system for implementing GenomicsCloud - A Cloud computing solution designed specifically to solve OMIC sciences problems. It comprises of a vast pool of compute, storage and application infrastructure for processing the data generated by next generation sequencers (NGS). ©2010 IEEE.
  • Item
    Achieving operational efficiency with cloud based services
    (2011) Bellur, K.V.; Krupal, M.; Jain, P.; Raghavendra, P.S.
    Cloud Computing is the evolution of a variety of technologies that have come together to alter an organization's approach to building IT infrastructure. It borrows from several computing techniques - grid computing, cluster computing, software-as-a-service, utility computing, autonomic computing and many more. It provides a whole new deployment model for enterprise web-applications. The cloud proposes significant cost cuts when compared to using an internal IT infrastructure. The "pay for what you use" model of cloud computing is significantly cheaper for a company than the "pay for everything up front" model of internal IT. Hardware Virtualization is the enabling technology behind many of the cloud infrastructure vendor offerings. Through virtualization, a physical server can be partitioned into any number of virtual servers running their own operating systems, in their allocated memory, CPU and disk footprints. From the perspective of the user or application on the virtual server, no indication exists to suggest that the server is not a real, physical server. In this paper, we make an attempt to enhance dynamic cloud based services using efficient load balancing techniques. We describe various steps involved in developing and utilizing cloud based infrastructure in such a way that cloud based services can be offered to users in an efficient manner. In the design of load balancing algorithms for an application offering cloud based services, the various details described in this paper offer useful insight, while the actual implementation may be based on the exact requirements at hand. © 2011 IEEE.
  • Item
    Virtual machine introspection based spurious process detection in virtualized cloud computing environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Virtual Machines are prime target for adversary to take control by exploiting the identified vulnerability present in it. Due to increasing number of Advanced Persistent Attacks such as malware, rootkit, spyware etc., virtual machine protection is highly challenging task. The key element of Advanced Persistent Threat is rootkit that provides stealthy control of underlining Operating System (kernel). Protecting individual guest operating system by using antivirus and commercial security defense mechanism is cost effective and ineffective for virtualized environment. To solve this problem, Virtual Machine Introspection has emerged as one of the promising approaches to secure the state of the virtual machine. Virtual Machine Introspection inspects the state of multiple virtual machines by operating outside the virtual machine i.e. at hypervisor level. In this work, Virtual Machine Introspection based malicious process detection approach is proposed. It extracts the high level information such as system call details, opened known backdoor ports from introspected memory to identify the spurious process. It triggers an alert in response to detected intrusion. © 2015 IEEE.
  • Item
    Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Cloud Computing enabled by virtualization technology exhibits revolutionary change in IT Infrastructure. Hypervisor is a pillar of virtualization and it allows sharing of resources to virtual machines. Vulnerabilities present in virtual machine leveraged by an attacker to launch the advanced persistent attacks such as stealthy rootkit, Trojan, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack etc. Virtual Machines are prime target for malignant cloud user or an attacker to launch attacks as they are easily available for rent from Cloud Service Provider (CSP). Attacks on virtual machine can disrupt the normal operation of cloud infrastructure. In order to secure the virtual environment, defence mechanism is highly imperative at each virtual machine to identify the attacks occurring at virtual machine in timely manner. This work proposes In-and-Out-of-the-Box Virtual Machine and Hypervisor based Intrusion Detection and Prevention System for virtualized environment to ensure robust state of the virtual machine by detecting followed by eradicating rootkits as well as other attacks. We conducted experiments using popular open source Host based Intrusion Detection System (HIDS) called Open Source SECurity Event Correlator (OSSEC). Both Linux and windows based rootkits, DoS attack, Files integrity verification test are conducted and they are successfully detected by OSSEC. © 2015 IEEE.
  • Item
    Dynamic resource allocation for multi-tier applications in cloud
    (Springer Verlag service@springer.de, 2016) Achar, R.; Santhi Thilagam, P.; Meghana; Niha Fathima Haris, B.; Bhat, H.; Ekta, K.
    Increasing demand for computing resources and widespread adaption of service-oriented architecture has made cloud as a new IT delivery mechanism. Number of cloud providers offer computing resources in the form of virtual machines to the cloud customers based on business requirements. Load experienced by the present business applications hosted in cloud are dynamic in nature. This creates a need for a mechanism which allocates resources dynamically to the applications in order to minimize performance degradations. This paper presents a mechanism which dynamically allocates the resources based on load of the application using vertical and horizontal scaling. Cloud environment is set up using Xen cloud platform and multi-tier web application is deployed on virtual machines. Experimental study conducted for various loads show that proposed mechanism ensures the response time is within the acceptable range. © Springer Science+Business Media Singapore 2016.