Abstract | ||
---|---|---|
Cloud computing is a technology that takes advantage of virtualization. Through virtualization, Virtual Machines (VMs) within the same host machine share physical resources. Cloud service providers (CSP) take advantage of virtualization by providing on-demand computing resources through the use of the Internet. In order to provide good Quality of Service (QoS) and to lower costs, CSPs need to optimize the cloud environment. This optimization can be achieved by the strategic placement of Virtual Machines (VMs) in cloud architecture, usually through VM placement algorithms. Despite these efforts, there are some remaining problems that need to be addressed. Amongst these are threats introduced by the cloud's architectural vulnerabilities. This paper, therefore, focuses on evaluating currently available VM placement algorithms. The objective is to identify VM placement algorithms that show potential to be further augmented with security features or that can be improved from a security perspective. Future work will investigate how these algorithms can be adapted to be security-aware. |
Year | DOI | Venue |
---|---|---|
2017 | 10.5220/0006206504110422 | ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY |
Keywords | Field | DocType |
Cloud Computing, VM Placement Algorithm, Security-aware VM Placement | Data mining,Computer science,Operating system | Conference |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Motlatsi i Isaac Thulo | 1 | 0 | 0.34 |
Jan H. P. Eloff | 2 | 733 | 117.29 |