A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures

  • Diego Kreutz
  • António Casimiro
  • Marcelo Pasin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7272)

Abstract

We propose a fault- and intrusion-tolerant framework for datacenter and cloud infrastructure monitoring. In contrast to existing approaches, our framework is able to deal with Byzantine faults. It is based on a replicated event broker, lying in the core of the monitoring infrastructure, supporting the dissemination of all monitoring events. We describe the architecture and the behavior of the framework, explaining how we can deal with different requirements on QoS and QoP. We provide evaluation results as proof of concept for the proposed framework.

References

  1. 1.
    Vaquero, L., Rodero-Merino, L., Morn, D.: Locking the sky: a survey on iaas cloud security. Computing 91, 93–118 (2011)MATHCrossRefGoogle Scholar
  2. 2.
    Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Security Privacy 8(6), 24–31 (2010)CrossRefGoogle Scholar
  3. 3.
    Mansfield-Devine, S.: Danger in the clouds. Network Security (12), 9–11 (2008)Google Scholar
  4. 4.
    Padhy, S., Kreutz, D., Casimiro, A., Pasin, M.: TRONE - First Specification of the Architecture. Technical report, FCUL (October 2011), http://trone.di.fc.ul.pt
  5. 5.
    Ibrahim, A.S., et al.: Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the 5th International Conference on Network and System Security. IEEE (2011)Google Scholar
  6. 6.
    De Chaves, S., Uriarte, R., Westphall, C.: Toward an architecture for monitoring private clouds. IEEE Communications Magazine 49(12), 130–137 (2011)CrossRefGoogle Scholar
  7. 7.
    Campbell, R.H., Montanari, M., Farivar, R.: A middleware for assured clouds. Journal of Internet Services and Applications (December 2011)Google Scholar
  8. 8.
    Cristian, F., Fetzer, C.: The timed asynchronous distributed system model. IEEE Transactions on Parallel and Distributed Systems 10, 642–657 (1999)CrossRefGoogle Scholar
  9. 9.
    Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Computing Survey 35, 114–131 (2003)CrossRefGoogle Scholar
  10. 10.
    Wang, H., Liao, C., Tian, Z.: Providing quality of service over time delay networks by efficient queue management. In: 2011 IEEE 36th Conference on Local Computer Networks (LCN), pp. 275–278 (October 2011)Google Scholar
  11. 11.
    Foley, S.N., et al.: Multilevel Security and Quality of Protection. In: Gollmann, D., Massacci, F., Yautsiukhin, A. (eds.) Quality of Protection. Advances in Information Security, vol. 23, pp. 93–105. Springer, US (2006)CrossRefGoogle Scholar
  12. 12.
    Bessani, A.N., et al.: BFT-SMaRt - High-performance Byzantine-Fault-Tolerant State Machine Replication (2011), http://code.google.com/p/bft-smart/

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Diego Kreutz
    • 1
  • António Casimiro
    • 1
  • Marcelo Pasin
    • 1
  1. 1.LaSIGE, Faculty of SciencesUniversity of LisbonPortugal

Personalised recommendations