Sorce: Security of IO Resources in Cloud Storage Environment for Third Party Services

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : P.Murugesan, A.Vegi Fernando, J.Raj Thilak

pdf
Citation:
MLA Style:

P.Murugesan, A.Vegi Fernando, J.Raj Thilak, "Sorce: Security of IO Resources in Cloud Storage Environment for Third Party Services" SSRG International Journal of Computer Science and Engineering 2.2 (2015): 1-5.

APA Style:

P.Murugesan, A.Vegi Fernando, J.Raj Thilak, (2015). Sorce: Security of IO Resources in Cloud Storage Environment for Third Party Services. SSRG International Journal of Computer Science and Engineering 2.2, 1-5.

Abstract:

The proceed paradigm of cloud computing, e.g., Amazon Elastic cipher Cloud (EC2), guarantees a extremely flexible however strong setting for large-scale perform. Ideally, whereas multiple virtual machines (VM) share an equivalent nature property each perform ought to be allot to associate degree severally managed VM and isolated from each other .like that, the absence of natural isolation inevitably opens doors to variety of care threats. This demonstrate in EC2 a brand new variety of security vulnerability caused by competition between virtual I/O workloads - i.e., by investing the competition for shared resources associate degree individual may designedly curtail the execution of a targeted application during a VM that shares an equivalent hardware. specially, we have a tendency to specialise in I/O resources like hard-drive turnout and/or network information measure - that area unit essential for data-intensive applications .This model implement SORCE, a framework that uses a fastidiously designed tasks at hand to incur important delays on the driven perform and VM with minimum value.

References:

[1] M. Armbrust et al., “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010. 
[2] V. Varadarajan et al., “Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense),” in CCS, 2012, pp. 281–292. 
[3] R. Kohavi et al., “Online experiments: Lessons learned,” Computer, vol. 40, no. 9, pp. 103–105, 2007. 
[4] T. Ristenpart et al., “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in CCS, 2009. 
[5] A. Greenberg et al., “The cost of a cloud: research problems in data center networks,” SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 68–73, Dec. 2008. 
[6] G. Wang et al., “The impact of virtualization on network performance of amazon ec2 data center,” in INFOCOM. IEEE, 2010,pp. 1–9. 
[7] G. Soundararajan et al., “Dynamic resource allocation for database servers running on virtual storage,” in FAST, 2009. 
[8] “Performance of virtual machines under networked denial of service attacks: Experiments and analysis,” Systems Journal, IEEE, vol. 7, no. 2, pp. 335–345, 2013.

Key Words:

Cloud Computing,i/o resources, ,Multiple Access, Security ,virtual Machine.