CBAC4C : conflict-based VM isolation control for cloud computing

Please be advised that the site will be down for maintenance on Sunday, September 1, 2024, from 08:00 to 18:00, and again on Monday, September 2, 2024, from 08:00 to 09:00. We apologize for any inconvenience this may cause.

Show simple item record

dc.contributor.author Dlamini, Moses Thandokuhle
dc.contributor.author Eloff, Jan H.P.
dc.contributor.author Venter, H.S. (Hein)
dc.contributor.author Eloff, Mariki M.
dc.date.accessioned 2022-06-13T09:50:29Z
dc.date.issued 2022-01
dc.description.abstract For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM (where VM is virtual machine) attack, also known as cross-VM attack, is one threat through which cloud-hosted confidential data could be leaked to unintended third parties. An inter-VM attack exploits vulnerabilities between co-resident guest VMs that share the same cloud infrastructure. In an attempt to stop such an attack, this paper uses the principles of logical analysis to model a solution that provides physical separation of VMs belonging to conflicting tenants based on their levels of conflict. The derived mathematical model is founded on scientific principles and implemented using four conflict-aware VM placement algorithms. The resultant algorithms consider a tenant's risk appetite and cost implications. The model offers guidance to VM placement and is validated using a proof of concept. A cloud simulation tool was used to test and evaluate the effectiveness and efficiency of the model. The findings reflect that the introduction of the proposed model introduced a time lag in the time it took to place VM instances. On top of this, it was also discovered that the number and size of the VM instances has an effect on the VM placement performance. The findings further illustrate that the conflict tolerance level of a VM has a direct impact on the time it took to place. en_US
dc.description.department Computer Science en_US
dc.description.embargo 2023-01-14
dc.description.librarian hj2022 en_US
dc.description.uri https://onlinelibrary.wiley.com/journal/14753995 en_US
dc.identifier.citation Dlamini, M.T., Eloff, J.H.P., Venter, H.S. et al. 2022, 'CBAC4C: conflict-based VM isolation control for cloud computing', International Transactions in Operational Research, vol. 29, no. 1, pp. 372-395, doi : 10.1111/itor.12935. en_US
dc.identifier.issn 0969-6016 (print)
dc.identifier.issn 1475-3995 (online)
dc.identifier.other 10.1111/itor.12935
dc.identifier.uri https://repository.up.ac.za/handle/2263/85804
dc.language.iso en en_US
dc.publisher Wiley en_US
dc.rights © 2021 The Authors. International Transactions in Operational Research © 2021 International Federation of Operational Research Societies. This is the pre-peer reviewed version of the following article : 'CBAC4C: conflict-based VM isolation control for cloud computing', International Transactions in Operational Research, vol. 29, no. 1, pp. 372-395, 2022, doi : 10.1111/itor.12935. The definite version is available at : https://onlinelibrary.wiley.com/journal/14753995. en_US
dc.subject Cloud computing en_US
dc.subject Conflict-aware virtual machine placement en_US
dc.subject Data leakage en_US
dc.subject Mathematical modeling en_US
dc.title CBAC4C : conflict-based VM isolation control for cloud computing en_US
dc.type Postprint Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record