Secure Hardware Performance Analysis in Virtualized Cloud Environment

The main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data fo...

Full description

Bibliographic Details
Main Authors: Chee-Heng Tan, Ying-Wah Teh
Format: Article
Language:English
Published: Hindawi Limited 2013-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2013/685764
id doaj-620608292c34489ca87277d69411e932
record_format Article
spelling doaj-620608292c34489ca87277d69411e9322020-11-24T23:21:44ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472013-01-01201310.1155/2013/685764685764Secure Hardware Performance Analysis in Virtualized Cloud EnvironmentChee-Heng Tan0Ying-Wah Teh1Faculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, MalaysiaFaculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, MalaysiaThe main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data for diagnostic and remediation purposes. The proposed mechanisms utilized TPC-H benchmark to achieve 2 objectives. First, the underlying hardware performance and consistency is supervised via a control system, which is constructed using a combination of TPC-H queries, linear regression, and machine learning techniques. Second, linear programming techniques are employed to provide input to the algorithms that construct stress-testing scenarios in the virtual machine, using the combination of TPC-H queries. These stress-testing scenarios serve 2 purposes. They provide the boundary resource threshold verification to the first control system, so that periodic training of the synthetic data sets for performance evaluation is not constrained by hardware inadequacy, particularly when the resources in the virtual machine are scaled up or down which results in the change of the utilization threshold. Secondly, they provide a platform for response time verification on critical transactions, so that the expected Quality of Service (QoS) from these transactions is assured.http://dx.doi.org/10.1155/2013/685764
collection DOAJ
language English
format Article
sources DOAJ
author Chee-Heng Tan
Ying-Wah Teh
spellingShingle Chee-Heng Tan
Ying-Wah Teh
Secure Hardware Performance Analysis in Virtualized Cloud Environment
Mathematical Problems in Engineering
author_facet Chee-Heng Tan
Ying-Wah Teh
author_sort Chee-Heng Tan
title Secure Hardware Performance Analysis in Virtualized Cloud Environment
title_short Secure Hardware Performance Analysis in Virtualized Cloud Environment
title_full Secure Hardware Performance Analysis in Virtualized Cloud Environment
title_fullStr Secure Hardware Performance Analysis in Virtualized Cloud Environment
title_full_unstemmed Secure Hardware Performance Analysis in Virtualized Cloud Environment
title_sort secure hardware performance analysis in virtualized cloud environment
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2013-01-01
description The main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data for diagnostic and remediation purposes. The proposed mechanisms utilized TPC-H benchmark to achieve 2 objectives. First, the underlying hardware performance and consistency is supervised via a control system, which is constructed using a combination of TPC-H queries, linear regression, and machine learning techniques. Second, linear programming techniques are employed to provide input to the algorithms that construct stress-testing scenarios in the virtual machine, using the combination of TPC-H queries. These stress-testing scenarios serve 2 purposes. They provide the boundary resource threshold verification to the first control system, so that periodic training of the synthetic data sets for performance evaluation is not constrained by hardware inadequacy, particularly when the resources in the virtual machine are scaled up or down which results in the change of the utilization threshold. Secondly, they provide a platform for response time verification on critical transactions, so that the expected Quality of Service (QoS) from these transactions is assured.
url http://dx.doi.org/10.1155/2013/685764
work_keys_str_mv AT cheehengtan securehardwareperformanceanalysisinvirtualizedcloudenvironment
AT yingwahteh securehardwareperformanceanalysisinvirtualizedcloudenvironment
_version_ 1725570210909388800