Skip to main content

Performance Considerations of a Logging System Simultaneously with a Customer Virtual Machine in Infrastructure as a Service Cloud

  • Conference paper
  • First Online:
  • 1260 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 621))

Abstract

An Infrastructure as a Service or IaaS cloud can offer a virtual machine or VM to the cloud customers to rent with pay per use basis. Although this cloud is widely used in many areas of applications, its security issues are obstacles for its adoptions. A logging system can mitigate the risks associated with these issues. This system can monitor and log malicious processes in IaaS customer’s VMs. However, the performance of this system is important to be measured. Moreover, the performance of this VM is also needed to be measured. Thus, this paper focuses on simultaneously measuring and evaluating the performance of both the logging system and the VM. To the best of our knowledge, there is no this kind of measuring methods in the literature. The main result of this paper is that we found the optimal point when the logging system and the VM can have suitable performance levels when both of them are working. This optimal point can be used by the IaaS providers to offer marketing packages for mitigating the risks associated with the issues of a customer VM with the consideration of his/her VM performance simultaneously. To mitigate risks associated with the security issues of an IaaS, this paper can be a guild-line to enable logging systems to be truly worked in the IaaS real-word production.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Runathong W, Wongthai W, Panithansuwan S (2017) A system for classroom environment monitoring using the internet of things and cloud computing. Lecture notes in electrical engineering, vol 424. Springer, Singapore, pp 732–742

    Google Scholar 

  2. Haque S, Atkison T (2018) A forensic enabled data provenance model for public cloud. J Dig Forensics Secur Law 13(3)

    Google Scholar 

  3. CSA (2016) The treacherous 12: cloud computing top threats in 2016. Top threats working group, Cloud Security Alliance

    Google Scholar 

  4. Wongthai W (2014) Systematic support for accountability in the cloud: Ph.D. dissertation. Newcastle University

    Google Scholar 

  5. Ko RKL, Jagadpramana P, Lee BS (2011) Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE, pp 765–771

    Google Scholar 

  6. Molyneaux I (2014) The art of application performance testing: from strategy to tools. O’Reilly Media, Inc

    Google Scholar 

  7. Payne BD, de Martim DPA, Lee W (2007) Secure and flexible monitoring of virtual machines. In: Twenty-third annual computer security applications conference (ACSAC 2007). IEEE, , pp 385–397

    Google Scholar 

  8. Chan-In P, Wongthai W (2017) Performance improvement considerations of cloud logging systems. ICIC Exp Lett 1:37–43

    Google Scholar 

  9. Tickoo O, Iyer R, Illikkal R, Newell D (2010) Modeling virtual machine performance: challenges and approaches. ACM Sigmetrics Perform Eval Rev 37(3):55–60

    Article  Google Scholar 

  10. Wongthai W, van Moorsel A (2017) Logging system architectures for infrastructure as a service cloud. J Telecommun Electron Comput Eng (JTEC) 9(2):35–40

    Google Scholar 

  11. Ko RKL, Kirchberg M, Lee BS (2011) From system-centric to data-centric logging-accountability, trust and security in cloud computing. In: 2011 defense science research conference and expo (DSR). IEEE, pp 1–4

    Google Scholar 

  12. Ko RKL, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang W, Lee BS (2011) TrustCloud: a framework for accountability and trust in cloud computing. In: 2011 IEEE world congress on services. IEEE, pp 584–588

    Google Scholar 

  13. Spring J (2011) Monitoring cloud computing by layer, part 1. IEEE Secur Priv 9(2):66–68

    Article  Google Scholar 

  14. Spring J (2011) Monitoring cloud computing by layer, part 2. IEEE Secur Priv 9(3):52–55

    Article  Google Scholar 

  15. Aceto G, Botta A, De Donato W, Pescapè A (2012) Cloud monitoring: definitions, issues and future directions. In: 2012 IEEE 1st international conference on cloud networking (CLOUDNET). IEEE, pp 63–67

    Google Scholar 

  16. NSA (2011) Cloud security considerations. The National Security Agency, Tech. Rep

    Google Scholar 

  17. Wongthai W, Rocha LF, van, Moorsel A (2013) A generic logging template for infrastructure as a service cloud. In: 2013 27th international conference on advanced information networking and applications workshops. IEEE, pp 1153–1160

    Google Scholar 

  18. Wongthai W, Van Moorsel A (2016) Performance measurement of logging systems in infrastructure as a service cloud. ICIC Exp Lett 2:347–354

    Google Scholar 

  19. Wongthai W, Van Moorsel A (2016) Quality analysis of logging system components in the cloud. Lecture notes in electrical engineering, vol 376. Springer, Singapore, pp 651–662

    Google Scholar 

  20. Kopytov A (2012) SysBench manual. MySQLAB

    Google Scholar 

  21. Scheuner J, Cito J, Leitner P, Gall H (2015) Cloud workbench: benchmarking iaas providers based on infrastructure-as-code. In: Proceedings of the 24th international conference on world wide web. ACM, pp 239–242

    Google Scholar 

  22. Sefraoui O, Aissaoui M, Eleuldj M (2012) OpenStack: toward an open-source solution for cloud computing. Int J Comput Appl 55(3):38–42

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Winai Wongthai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Auxsorn, T., Wongthai, W., Phoka, T., Jaiboon, W. (2020). Performance Considerations of a Logging System Simultaneously with a Customer Virtual Machine in Infrastructure as a Service Cloud. In: Kim, K., Kim, HY. (eds) Information Science and Applications. Lecture Notes in Electrical Engineering, vol 621. Springer, Singapore. https://doi.org/10.1007/978-981-15-1465-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1465-4_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1464-7

  • Online ISBN: 978-981-15-1465-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics