Security-aware resource allocation in clouds

  • Saeed Al-Haj
  • , Ehab Al-Shaer
  • , Hari Govind V. Ramasamy

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Scopus citations

Abstract

Elasticity and economic considerations make Infrastructure-as-a-Service (IaaS) clouds attractive propositions for hosting enterprise IT applications. However, for prospective cloud customers, that potential is tempered by concerns, chief among them being security. We consider the problem of resource allocation in IaaS clouds while factoring in reachability and access control requirements of the cloud virtual machines (VMs). We describe a security-aware resource allocation framework that allows for effective enforcement of defense-in-depth for cloud VMs by determining (1) the grouping of VMs into security groups based on the similarity of their reachability requirements, and (2) the placement of virtual machines in a manner that reduces residual risks for individual VMs as well as security groups. We formalize security-aware resource allocation as a Constraint Satisfaction Problem (CSP), which can be solved using widely available Satisfiability Modulo Theories (SMT) solvers. Our experimental evaluation shows the effectiveness of our approach in reducing risk and improving manageability of security configurations for the cloud VMs.

Original languageEnglish
Title of host publicationProceedings - IEEE 10th International Conference on Services Computing, SCC 2013
Pages400-407
Number of pages8
DOIs
StatePublished - 2013
Externally publishedYes
Event2013 IEEE 10th International Conference on Services Computing, SCC 2013 - Santa Clara, CA, United States
Duration: 27 Jun 20132 Jul 2013

Publication series

NameProceedings - IEEE 10th International Conference on Services Computing, SCC 2013

Conference

Conference2013 IEEE 10th International Conference on Services Computing, SCC 2013
Country/TerritoryUnited States
CitySanta Clara, CA
Period27/06/132/07/13

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Security-aware resource allocation in clouds'. Together they form a unique fingerprint.

Cite this