4.6 Article

Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TASE.2023.3319373

Keywords

Cloud computing; Servers; Energy efficiency; Industries; Estimation; resource utilization; risk analysis; server; virtual machine; vulnerability; risk score matrix; VM threat

Ask authors/readers for more resources

This paper proposes a novel resource allocation framework (ETP-WE) based on VM threat prediction and dynamic workload estimation, which can predict VM threats and resource usage in real-time. By conducting multiple risk analyses for each VM, efficient VM placement, and developing an ensemble predictor for resource utilization, the framework achieves secure and resource-efficient VM allocation.
The inefficient sharing of industrial cloud resour-ces among multiple users and vulnerabilities of virtual machines (VM)s and servers prompt unauthorized access to users' sensitive data along with excess consumption of power and resource wastage. To address these entangled issues, this paper proposes a novel Emerging VM Threat Prediction and Dynamic Workload Estimation based Resource Allocation (ETP-WE) framework that predicts VM threats and resource usage proactively in real-time. The proposed framework contributes by introducing a Risk-Score Matrix that analyses multiple risks for each VM; utilizing knowledge of proposed security and workload analyzers for efficient VM Placement (VMP), and estimating resource utilization by developing an ensemble predictor for prior mitigation of over-/under-load on servers. ETP-WE framework collaborates machine-learning-based security and workload analysis for secure and resource-efficient VMP, thereby reducing the number of security threats, optimizing resource utilization, power-consumption, and adapting to the changes in application demands. The performance of the proposed framework is evaluated using two benchmark datasets OpenNebula and Google Cluster. The simulation-based comparison with state-of-the-arts validates the efficacy of ETP-WE in terms of reduction of security threats, power consumption, and number of active servers up to 86.9%, 66.67% and 30%-80%, respectively with an improved resource utilization up to 60%-75% over existing approaches Note to Practitioners-Industry clouds serve the precise needs and provide the service features and tools as per the industry's needs to help organizations meet their workloads processing and storage demands. For instance, healthcare and financial organizations have to comply with extended security to meet specific service requirements. To this context, we have proposed a novel ETP-WE framework for prediction and mitigation of cyberthreats on virtual resources in real-time for secure execution of industrial applications on third-party servers. ETP-WE collaborates machine-learning based security and workload analysis for secure and resource efficient VM allocation, thereby reducing number of security threats, optimizing resource utilization, power-consumption and adaptating to the changes in application demands. During the processing of any sensitive transaction such as medical data, bank transactions, ETP-WE framework will induce improved data protection by mitigating potential data breaches. ETP-WE framework will be deployed at Resource Scheduler to boost security performance by estimating the multiple risks score status of VMs engaged in execution of industrial transactions or workloads. It will help to predict and analyze the probable security threats or breaches proactively and facilitate their mitigation. The performance evaluation and comparison with state-of-the-arts validate potency of ETP-WE in terms of reduction of cybersecurity threats and number of active servers with an improved resource utilization over existing approaches.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available