Self-Adapting Security Monitoring in Eucalyptus Cloud Environment

نویسندگان

چکیده

This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling increasing number tasks due to virtualization and technology adoption. The evaluates legacy methods specific VM algorithms Eucalyptus environment compare existing using QoS. also presents a self-adapting security monitoring system infrastructure that takes into account requirements each tenant. uses Master Adaptation Drivers convert tenant configuration settings Manager coordinate adaptation process. framework ensures security, cost efficiency, responsiveness dynamic events environment. need improvement current platform support more types devices cover consequences multi-tenant setups. Future work includes incorporating log collectors aggregators addressing needs super-tenant architecture. equitable sharing resources between tenants provider should be established with an adjustable threshold mentioned SLA. results experiments show Enhanced Round-Robin less energy compared other methods, Fusion Method outperforms techniques by reducing Physical Machines turned on power efficiency.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing Security in Cloud Environment

The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to t...

متن کامل

Self - Monitoring and Self - Adapting Operating Systems

Extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. Exten-sibility enables a system to efficiently support a broader class of applications than is currently supported. This paper discusses the key challenge in making extensible systems practical: determining which parts of the system need to b...

متن کامل

Multi-cloud Applications Security Monitoring

The issue of data security and privacy in multi-cloud based environments requires different solutions for implementing and enforcing security policies. In these environments, many security aspects must be faced, such as security-by-design, risk management, data privacy and isolation, and vulnerability scans. Moreover, it also becomes necessary to have a system that interrelates and operates all...

متن کامل

Security Management Model in Cloud Computing Environment

In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which...

متن کامل

Security Issue Analysis in Cloud Computing Environment

The growth in field of cloud computing increases threat security aspects. Security has remained a constant issue for Internet and networking, when we are talking about security cloud really effects. Lack of security is the only a problem or difficulty that must be overcome in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examinin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2023

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2023.0140310