• DocumentCode
    1709396
  • Title

    Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach

  • Author

    Kwiat, Luke ; Kamhoua, Charles A. ; Kwiat, Kevin A. ; Tang, Jian ; Martin, Andrew

  • Author_Institution
    Dept. of Ind. & Syst. Eng., Univ. of Florida, Gainesville, FL, USA
  • fYear
    2015
  • Firstpage
    556
  • Lastpage
    563
  • Abstract
    With the growth of cloud computing, many businesses, both small and large, are opting to use cloud services compelled by a great cost savings potential. This is especially true of public cloud computing which allows for quick, dynamic scalability without many overhead or long-term commitments. However, one of the largest dissuasions from using cloud services comes from the inherent and unknown danger of a shared platform such as the hyper visor. An attacker can attack a virtual machine (VM) and then go on to compromise the hyper visor. If successful, then all virtual machines on that hyper visor can become compromised. This is the problem of negative externalities, where the security of one player affects the security of another. This work shows that there are multiple Nash equilibria for the public cloud security game. It also demonstrates that we can allow the players´ Nash equilibrium profile to not be dependent on the probability that the hyper visor is compromised, reducing the factor externality plays in calculating the equilibrium. Finally, by using our allocation method, the negative externality imposed onto other players can be brought to a minimum compared to other common VM allocation methods.
  • Keywords
    cloud computing; game theory; probability; security of data; virtual machines; cloud services; game theoretic approach; multiple Nash equilibria; negative externality; probability; public cloud computing; public cloud security game; security-aware virtual machine allocation method; Cloud computing; Games; Nash equilibrium; Resource management; Security; Virtual machine monitors; Virtual machining; Cloud Computing; cyber security; externality; game theory; virtual machine allocation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on
  • Conference_Location
    New York City, NY
  • Print_ISBN
    978-1-4673-7286-2
  • Type

    conf

  • DOI
    10.1109/CLOUD.2015.80
  • Filename
    7214090