Midlands State University Library
Image from Google Jackets

Analysis of cloudlet completion time during attack on smart grid cloud created by Sandeep Mehmi; Harsh Kumar Verma; Amrit Lal Sangal

By: Contributor(s): Material type: TextTextSeries: International journal of cloud computing ; Volume 4 , number 4,United Kingdom: Indersciences, 2013Content type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISSN:
  • 2043-9989
Subject(s): LOC classification:
  • QA76.S85 INT
Online resources: Abstract: The exceptional advantages of cloud have attracted the organisations to shift their IT business on to cloud. Smart grid is maximum optimisation of energy management achieved through transmission and distribution automation and integration of smart devices. The monitoring sensors generate enormous uncorrelated data that need scalable storage servers and this requirement can be fulfilled by smart grid cloud. But the biggest concerns of organisations moving towards cloud computing are security and privacy. Precise intrusion detection techniques in addition to intrusion prevention techniques are necessary to augment cloud security. In this paper the cloudlet completion time analysis has been done under normal and attack conditions with respect to number of cloudlets, cloudlet length, virtual machine (VM) RAM and VM bandwidth in a space shared mapping policy for VM and cloudlets. The results indicate that during attack the cloudlet completion time increased drastically and this analysis can prove to be an important parameter to detect intrusion.
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Vol info Status Notes Date due Barcode
Journal Article Journal Article Main Library - Special Collections QA76.S85 INT (Browse shelf(Opens below)) Vol. 4, no.4 (pages 353-376) Not for loan For in house use only

The exceptional advantages of cloud have attracted the organisations to shift their IT business on to cloud. Smart grid is maximum optimisation of energy management achieved through transmission and distribution automation and integration of smart devices. The monitoring sensors generate enormous uncorrelated data that need scalable storage servers and this requirement can be fulfilled by smart grid cloud. But the biggest concerns of organisations moving towards cloud computing are security and privacy. Precise intrusion detection techniques in addition to intrusion prevention techniques are necessary to augment cloud security. In this paper the cloudlet completion time analysis has been done under normal and attack conditions with respect to number of cloudlets, cloudlet length, virtual machine (VM) RAM and VM bandwidth in a space shared mapping policy for VM and cloudlets. The results indicate that during attack the cloudlet completion time increased drastically and this analysis can prove to be an important parameter to detect intrusion.

There are no comments on this title.

to post a comment.