Skip to main content

Research Repository

Advanced Search

Self-adapting security monitoring in Eucalyptus cloud environment

Mahmood, Salman; Yahaya, Adnan; Hasan, Raza; Hussain, Saqib; Malik, Mazhar Hussain; Kamal Sarker, Uddin

Self-adapting security monitoring in Eucalyptus cloud environment Thumbnail


Authors

Salman Mahmood

Adnan Yahaya

Raza Hasan

Saqib Hussain

Uddin Kamal Sarker



Abstract

This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling the increasing number of tasks due to virtualization and cloud computing technology adoption. The paper evaluates legacy methods and specific VM scheduling algorithms for the Eucalyptus cloud environment and compare existing algorithms using QoS. The paper also presents a self-adapting security monitoring system for cloud infrastructure that takes into account the specific monitoring requirements of each tenant. The system uses Master Adaptation Drivers to convert tenant requirements into configuration settings and the Adaptation Manager to coordinate the adaptation process. The framework ensures security, cost efficiency, and responsiveness to dynamic events in the cloud environment. The paper also presents the need for improvement in the current security monitoring platform to support more types of monitoring devices and cover the consequences of multi-tenant setups. Future work includes incorporating log collectors and aggregators and addressing the needs of a super-tenant in the security monitoring architecture. The equitable sharing of monitoring resources between tenants and the provider should be established with an adjustable threshold mentioned in the SLA. The results of experiments show that Enhanced Round-Robin uses less energy compared to other methods, and the Fusion Method outperforms other techniques by reducing the number of Physical Machines turned on and increasing power efficiency

Citation

Mahmood, S., Yahaya, A., Hasan, R., Hussain, S., Malik, M. H., & Kamal Sarker, U. (2023). Self-adapting security monitoring in Eucalyptus cloud environment. International Journal of Advanced Computer Science and Applications, 14(3), 80-93. https://doi.org/10.14569/IJACSA.2023.0140310

Journal Article Type Article
Acceptance Date Mar 6, 2023
Online Publication Date Mar 30, 2023
Publication Date Mar 30, 2023
Deposit Date Mar 31, 2023
Publicly Available Date Apr 3, 2023
Journal International Journal of Advanced Computer Science and Applications
Print ISSN 2158-107X
Electronic ISSN 2156-5570
Publisher SAI Organization
Peer Reviewed Peer Reviewed
Volume 14
Issue 3
Pages 80-93
DOI https://doi.org/10.14569/IJACSA.2023.0140310
Keywords Component; VM scheduling; cloud computing; Eucalyptus; virtualization; power efficiency; self-adapting security monitoring system; tenant-driven customization; dynamic events; adaptation manager; master adaptation drivers
Public URL https://uwe-repository.worktribe.com/output/10603976
Publisher URL https://thesai.org/Publications/ViewPaper?Volume=14&Issue=3&Code=IJACSA&SerialNo=10
Related Public URLs https://thesai.org/Downloads/Volume14No3/Paper_10-Self_Adapting_Security_Monitoring.pdf

Files





You might also like



Downloadable Citations