Authors: Sandeep Mehmi; Harsh Kumar Verma; Amrit Lal Sangal
Addresses: Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar 144011, India ' Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar 144011, India ' Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar 144011, India
Abstract: The exceptional advantages of cloud have attracted the organisations to shift their IT business on to cloud. Smart grid is maximum optimisation of energy management achieved through transmission and distribution automation and integration of smart devices. The monitoring sensors generate enormous uncorrelated data that need scalable storage servers and this requirement can be fulfilled by smart grid cloud. But the biggest concerns of organisations moving towards cloud computing are security and privacy. Precise intrusion detection techniques in addition to intrusion prevention techniques are necessary to augment cloud security. In this paper the cloudlet completion time analysis has been done under normal and attack conditions with respect to number of cloudlets, cloudlet length, virtual machine (VM) RAM and VM bandwidth in a space shared mapping policy for VM and cloudlets. The results indicate that during attack the cloudlet completion time increased drastically and this analysis can prove to be an important parameter to detect intrusion.
Keywords: cloud computing; cloud security; smart grid; CloudSim; space shared mapping policy; cloudlet completion time; attacks; intrusion detection; cloudlets; cloudlet length; virtual machines; RAM; VM bandwidth.
International Journal of Cloud Computing, 2015 Vol.4 No.4, pp.353 - 376
Available online: 19 Jan 2016Full-text access for editors Access for subscribers Purchase this article Comment on this article