Secure Hardware Performance Analysis in Virtualized Cloud Environment
The main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data fo...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2013-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2013/685764 |
id |
doaj-620608292c34489ca87277d69411e932 |
---|---|
record_format |
Article |
spelling |
doaj-620608292c34489ca87277d69411e9322020-11-24T23:21:44ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472013-01-01201310.1155/2013/685764685764Secure Hardware Performance Analysis in Virtualized Cloud EnvironmentChee-Heng Tan0Ying-Wah Teh1Faculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, MalaysiaFaculty of Computer Science & Information Technology, University of Malaya, 50603 Kuala Lumpur, MalaysiaThe main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data for diagnostic and remediation purposes. The proposed mechanisms utilized TPC-H benchmark to achieve 2 objectives. First, the underlying hardware performance and consistency is supervised via a control system, which is constructed using a combination of TPC-H queries, linear regression, and machine learning techniques. Second, linear programming techniques are employed to provide input to the algorithms that construct stress-testing scenarios in the virtual machine, using the combination of TPC-H queries. These stress-testing scenarios serve 2 purposes. They provide the boundary resource threshold verification to the first control system, so that periodic training of the synthetic data sets for performance evaluation is not constrained by hardware inadequacy, particularly when the resources in the virtual machine are scaled up or down which results in the change of the utilization threshold. Secondly, they provide a platform for response time verification on critical transactions, so that the expected Quality of Service (QoS) from these transactions is assured.http://dx.doi.org/10.1155/2013/685764 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chee-Heng Tan Ying-Wah Teh |
spellingShingle |
Chee-Heng Tan Ying-Wah Teh Secure Hardware Performance Analysis in Virtualized Cloud Environment Mathematical Problems in Engineering |
author_facet |
Chee-Heng Tan Ying-Wah Teh |
author_sort |
Chee-Heng Tan |
title |
Secure Hardware Performance Analysis in Virtualized Cloud Environment |
title_short |
Secure Hardware Performance Analysis in Virtualized Cloud Environment |
title_full |
Secure Hardware Performance Analysis in Virtualized Cloud Environment |
title_fullStr |
Secure Hardware Performance Analysis in Virtualized Cloud Environment |
title_full_unstemmed |
Secure Hardware Performance Analysis in Virtualized Cloud Environment |
title_sort |
secure hardware performance analysis in virtualized cloud environment |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2013-01-01 |
description |
The main obstacle in mass adoption of cloud computing for database operations is the data security issue. In this paper, it is shown that IT services particularly in hardware performance evaluation in virtual machine can be accomplished effectively without IT personnel gaining access to real data for diagnostic and remediation purposes. The proposed mechanisms utilized TPC-H benchmark to achieve 2 objectives. First, the underlying hardware performance and consistency is supervised via a control system, which is constructed using a combination of TPC-H queries, linear regression, and machine learning techniques. Second, linear programming techniques are employed to provide input to the algorithms that construct stress-testing scenarios in the virtual machine, using the combination of TPC-H queries. These stress-testing scenarios serve 2 purposes. They provide the boundary resource threshold verification to the first control system, so that periodic training of the synthetic data sets for performance evaluation is not constrained by hardware inadequacy, particularly when the resources in the virtual machine are scaled up or down which results in the change of the utilization threshold. Secondly, they provide a platform for response time verification on critical transactions, so that the expected Quality of Service (QoS) from these transactions is assured. |
url |
http://dx.doi.org/10.1155/2013/685764 |
work_keys_str_mv |
AT cheehengtan securehardwareperformanceanalysisinvirtualizedcloudenvironment AT yingwahteh securehardwareperformanceanalysisinvirtualizedcloudenvironment |
_version_ |
1725570210909388800 |