method to compare the optimization objectives re-
flected in the different VM placement algorithms.
This evaluation method uses an equation which scores
the different optimization objectives based on their
importance rating. According to the evaluation
method, the VM placement algorithm which scores
the highest is assumed to have the most important op-
timization objectives. The idea is to further expand
such an algorithm to include security-aware objec-
tives in order to achieve an Optimized Security-aware
(O-Sec) VM placement algorithm.
To achieve their goal, the authors of this pa-
per have categorized VM placement algorithms into
three. These categories are based on what the algo-
rithms aim to accomplish; cost reduction, good QoS
and security. The authors further discuss how the VM
placement algorithms for each category can further be
adapted or modified to accomplish the notion of O-
Sec VM placement algorithm. The optimization ob-
jectives reflected in these VM placement algorithms
help to identify and rate the objectives suitable for
the evaluation criteria. After the evaluation process,
the Traffic and Power-aware VM Placement algorithm
(TPVMP) is found as a potential candidate to further
be augmented with security features.
For future envision, the authors propose the pos-
sible extension to the TPVMP to include some secu-
rity features. This extension takes into consideration
the optimization objectives of TPVMP, which are; en-
ergy consumption, VM communication and elastic-
ity. In addition to these, the proposed implementation
will strive to place critical and non-critical VMs sep-
arately with the provision to detect potential attacks
to the VMs. Whenever there is an alert for potential
attacks, migrations will be used to neutralize the sit-
uation. The proposed VM placement algorithm aims
to ensure the availability of the critical VMs through
strategic placement.
ACKNOWLEDGEMENTS
We would like to thank Moseme Anna Thulo, who is
a sister to the first author, for helping in editing the
article in hand.
REFERENCES
Afoulki, Z., Bousquet, A., and Rouzaud-Cornabas, J.
(2011). A security-aware scheduler for virtual ma-
chines on IaaS clouds. Report 2011.
Al-Haj, S., Al-Shaer, E., and Ramasamy, H. V. (2013).
Security-aware resource allocation in clouds. In
Services Computing (SCC), 2013 IEEE International
Conference on, pages 400–407. IEEE.
Alani, M. M. (2014). Securing the cloud: Threats, attacks
and mitigation techniques. Journal of Advanced Com-
puter Science & Technology, 3(2):202.
Andreolini, M., Casolari, S., Colajanni, M., and Messori,
M. (2009). Dynamic load management of virtual ma-
chines in cloud architectures. In International Confer-
ence on Cloud Computing, pages 201–214. Springer.
Biran, O., Corradi, A., Fanelli, M., Foschini, L., Nus, A.,
Raz, D., and Silvera, E. (2012). A stable network-
aware VM placement for cloud systems. In Proceed-
ings of the 2012 12th IEEE/ACM International Sym-
posium on Cluster, Cloud and Grid Computing (ccgrid
2012), pages 498–506. IEEE Computer Society.
Bobroff, N., Kochut, A., and Beaty, K. (2007). Dynamic
placement of virtual machines for managing SLA vio-
lations. In 2007 10th IFIP/IEEE International Sympo-
sium on Integrated Network Management, pages 119–
128. IEEE.
Caron, E., Le, A. D., Lefray, A., and Toinard, C. (2013).
Definition of security metrics for the cloud comput-
ing and security-aware virtual machine placement al-
gorithms. In Cyber-Enabled Distributed Computing
and Knowledge Discovery (CyberC), 2013 Interna-
tional Conference on, pages 125–131. IEEE.
Chowdhury, M. R., Mahmud, M. R., and Rahman, R. M.
(2015). Implementation and performance analysis of
various vm placement strategies in cloudsim. Journal
of Cloud Computing, 4(1):1.
Dong, Z., Liu, N., and Rojas-Cessa, R. (2015). Greedy
scheduling of tasks with time constraints for energy-
efficient cloud-computing data centers. Journal of
Cloud Computing, 4(1):1.
Eloff, J. H. (1983). Selection process for security packages.
Computers & Security, 2(3):256–260.
Gao, J. and Tang, G. (2013). Virtual machine placement
strategy research. In Cyber-Enabled Distributed Com-
puting and Knowledge Discovery (CyberC), 2013 In-
ternational Conference on, pages 294–297. IEEE.
Ilkhechi, A. R., Korpeoglu, I., and Ulusoy,
¨
O. (2015).
Network-aware virtual machine placement in cloud
data centers with multiple traffic-intensive compo-
nents. Computer Networks, 91:508–527.
Kochut, A. and Beaty, K. (2007). On strategies for dy-
namic resource management in virtualized server en-
vironments. In 2007 15th International Symposium on
Modeling, Analysis, and Simulation of Computer and
Telecommunication Systems, pages 193–200. IEEE.
Kuo, C.-F., Yeh, T.-H., Lu, Y.-F., and Chang, B.-R. (2015).
Efficient allocation algorithm for virtual machines in
cloud computing systems. In Proceedings of the ASE
BigData & SocialInformatics 2015, page 48. ACM.
Li, K., Zheng, H., Wu, J., and Du, X. (2015). Virtual ma-
chine placement in cloud systems through migration
process. International Journal of Parallel, Emergent
and Distributed Systems, 30(5):393–410.
Li, M., Zhang, Y., Bai, K., Zang, W., Yu, M., and He, X.
(2012). Improving cloud survivability through depen-
Towards Optimized Security-aware (O-Sec) VM Placement Algorithms
419