We address the problem of guaranteeing security, with additional consideration on reliability and availability issues, in the management of resources in Cloud environments. We investigate and formulate different requirements that users or service providers may wish to specify. Our framework allows providers to impose restrictions on the allocations to be made to their hosts and users to express constraints on the placement of their virtual machines (VMs). User's placement constraints may impose restrictions in performing allocation to specific locations, within certain boundaries, or depending on some conditions (e.g., requiring a VM to be allocated to a different host wrt other VMs). Our approach for VM allocation goes beyond the classical (performance/cost-oriented) resource consumption to incorporate the security requirements specified by users and providers.

Supporting security requirements for resource management in Cloud Computing / R. Jhawar, V. Piuri, P. Samarati - In: Proceedings of the 15th IEEE International conference on computational science and engineering : CSE 2012 : 5-7 december 2012, Paphos, CyprusLos Alamitos : Institute of electrical and electronics engineers, 2012 Dec. - ISBN 9781467351652. - pp. 170-177 (( Intervento presentato al 15. convegno International Conference on Computational Science and Engineering (CSE) tenutosi a Paphos, Cyprus nel 2012 [10.1109/ICCSE.2012.32].

Supporting security requirements for resource management in Cloud Computing

R. Jhawar;V. Piuri;P. Samarati
2012-12

Abstract

We address the problem of guaranteeing security, with additional consideration on reliability and availability issues, in the management of resources in Cloud environments. We investigate and formulate different requirements that users or service providers may wish to specify. Our framework allows providers to impose restrictions on the allocations to be made to their hosts and users to express constraints on the placement of their virtual machines (VMs). User's placement constraints may impose restrictions in performing allocation to specific locations, within certain boundaries, or depending on some conditions (e.g., requiring a VM to be allocated to a different host wrt other VMs). Our approach for VM allocation goes beyond the classical (performance/cost-oriented) resource consumption to incorporate the security requirements specified by users and providers.
Cloud security; Placement constraints; Reliability and availability; Resource management; VM allocation
Settore INF/01 - Informatica
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/2434/215673
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 64
  • ???jsp.display-item.citation.isi??? 23
social impact