Self-Adapting Security Monitoring in Eucalyptus Cloud Environment
نویسندگان
چکیده
This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling increasing number tasks due to virtualization and technology adoption. The evaluates legacy methods specific VM algorithms Eucalyptus environment compare existing using QoS. also presents a self-adapting security monitoring system infrastructure that takes into account requirements each tenant. uses Master Adaptation Drivers convert tenant configuration settings Manager coordinate adaptation process. framework ensures security, cost efficiency, responsiveness dynamic events environment. need improvement current platform support more types devices cover consequences multi-tenant setups. Future work includes incorporating log collectors aggregators addressing needs super-tenant architecture. equitable sharing resources between tenants provider should be established with an adjustable threshold mentioned SLA. results experiments show Enhanced Round-Robin less energy compared other methods, Fusion Method outperforms techniques by reducing Physical Machines turned on power efficiency.
منابع مشابه
Increasing Security in Cloud Environment
The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to t...
متن کاملSelf - Monitoring and Self - Adapting Operating Systems
Extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. Exten-sibility enables a system to efficiently support a broader class of applications than is currently supported. This paper discusses the key challenge in making extensible systems practical: determining which parts of the system need to b...
متن کاملMulti-cloud Applications Security Monitoring
The issue of data security and privacy in multi-cloud based environments requires different solutions for implementing and enforcing security policies. In these environments, many security aspects must be faced, such as security-by-design, risk management, data privacy and isolation, and vulnerability scans. Moreover, it also becomes necessary to have a system that interrelates and operates all...
متن کاملSecurity Management Model in Cloud Computing Environment
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which...
متن کاملSecurity Issue Analysis in Cloud Computing Environment
The growth in field of cloud computing increases threat security aspects. Security has remained a constant issue for Internet and networking, when we are talking about security cloud really effects. Lack of security is the only a problem or difficulty that must be overcome in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examinin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2023
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2023.0140310