Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Article
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Type | Article |
---|---|
Title | Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems |
Authors | Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. |
Abstract | Cloud computing is the delivery of on‐demand computing resources. It shares the resources or provides vir‐utilization that enables single user to access various Cloud services such as CPU, memory, storage devices, network, and so on. However, more commercial cloud services offered by several cloud service providers (CSPs) are available in the market place. Most CSPs must, therefore, deal with the dynamic resource allocation where the mobile services are migrating from one cloud to another cloud environment to provide heterogeneous resources based on user needs. There is still a lack of heuristics that are able to check requested resources and available resources to allocate and deallocate before it begins the secure service migration. We proposed a resource allocation security protocol that allows resources to be allocated and migrated efficiently in a secure service migration between cloud infrastructures. Furthermore, formal methods can be used for protocols to verify the desired properties, detecting attacks and producing accurate outcomes. This article presents formal modeling and verification of this abstract protocol using ProVerif cryptographic tool to validate the security properties such as secrecy of resources, authentication from both parties and key exchange in order to securely migrate resources in commercial cloud environments. |
Keywords | cloud systems, formal methods, mobile services, QoS, resource allocation, security protocols |
Publisher | Wiley |
Journal | Computational Intelligence |
ISSN | 0824-7935 |
Electronic | 1467-8640 |
Publication dates | |
Online | 09 Feb 2021 |
21 Jun 2022 | |
Publication process dates | |
Deposited | 22 Feb 2021 |
Accepted | 16 May 2020 |
Output status | Published |
Additional information | Volume38, Issue3 - Special Issue: AI and Machine Learning for Smart Cities - Part 2. Intelligent Optimization Methods and their Applications - Part 2 |
Digital Object Identifier (DOI) | https://doi.org/10.1111/coin.12421 |
Language | English |
https://repository.mdx.ac.uk/item/89468
122
total views0
total downloads1
views this month0
downloads this month