[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2046707.2093512acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: LBMS: load balancing based on multilateral security in cloud

Published: 17 October 2011 Publication History

Abstract

Load balancing has been widely used on the field of Cloud Computing, which makes sure that none of the existing resources are idle while other physical machines are being utilized by Cloud Computing providers. However, VMs of tenants may be migrated to a physical machine with potential attacks which may use memory caches as side channels. So the security problem coexisting on the same physical machine is an important barrier for enterprise to adopt of cloud computing. We present a new security load balancing architecture--Load Balancing based on Multilateral Security (LBMS) which can migrate tenants' VMs automatically to the ideal security physical machine when reach peak-load by index and negotiation. We are implementing our prototype based on CloudSim, a Cloud computing simulation. Our architecture makes an effort to avoid potential attacks when VMs migrate to physical machine due to load balancing.

References

[1]
LBVM: Load balancing of virtual machine, http://lbvm.sourceforge.net/.
[2]
B. Shirazi, A.R. Hurson, and K.M. Kavi, Scheduling and Load Balancing in Parallel and Distributed Systems. IEEE CS Press, 1995.
[3]
Amazon Elastic Load Balancer, http://aws.amazon.com/elasticloadbalancing/.
[4]
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS'09, pages 199--212, 2009.
[5]
Kai Rannenberg. Multilateral Security: A concept and examples for balanced security. In Proceedings of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, pages 151--162, 2001.
[6]
Calheiros RN, Ranjan R, Beloglazov A, Rose CAFD, Buyya R. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience 2011;41(1):23--50.

Cited By

View all
  • (2017)Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity ManagementIEEE Transactions on Cloud Computing10.1109/TCC.2015.24048165:2(290-302)Online publication date: 1-Apr-2017
  • (2013)Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based AttacksInformation and Communications Security10.1007/978-3-319-02726-5_9(113-124)Online publication date: 20-Nov-2013

Index Terms

  1. Poster: LBMS: load balancing based on multilateral security in cloud

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
    October 2011
    742 pages
    ISBN:9781450309486
    DOI:10.1145/2046707

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 October 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IAAS
    2. cloud computing
    3. co-residency
    4. load balancing
    5. multilateral security
    6. negotiation

    Qualifiers

    • Poster

    Conference

    CCS'11
    Sponsor:

    Acceptance Rates

    CCS '11 Paper Acceptance Rate 60 of 429 submissions, 14%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity ManagementIEEE Transactions on Cloud Computing10.1109/TCC.2015.24048165:2(290-302)Online publication date: 1-Apr-2017
    • (2013)Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based AttacksInformation and Communications Security10.1007/978-3-319-02726-5_9(113-124)Online publication date: 20-Nov-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media