30
123 Smart Innovation, Systems and Technologies 49 V. Vijayakumar V. Neelanarayanan Editors Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’)

Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

123

Smart Innovation, Systems and Technologies 49

V. VijayakumarV. Neelanarayanan Editors

Proceedings of the 3rdInternational Symposiumon Big Data and CloudComputing Challenges(ISBCC – 16’)

Page 2: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Smart Innovation, Systems and Technologies

Volume 49

Series editors

Robert J. Howlett, KES International, Shoreham-by-Sea, UKe-mail: [email protected]

Lakhmi C. Jain, Bournemouth University, Fern Barrow, Poole, UK, andUniversity of Canberra, Canberra, Australiae-mail: [email protected]

Page 3: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

About this Series

The Smart Innovation, Systems and Technologies book series encompasses thetopics of knowledge, intelligence, innovation and sustainability. The aim of theseries is to make available a platform for the publication of books on all aspects ofsingle and multi-disciplinary research on these themes in order to make the latestresults available in a readily-accessible form. Volumes on interdisciplinaryresearch combining two or more of these areas is particularly sought.

The series covers systems and paradigms that employ knowledge andintelligence in a broad sense. Its scope is systems having embedded knowledgeand intelligence, which may be applied to the solution of world problems inindustry, the environment and the community. It also focusses on theknowledge-transfer methodologies and innovation strategies employed to makethis happen effectively. The combination of intelligent systems tools and a broadrange of applications introduces a need for a synergy of disciplines from science,technology, business and the humanities. The series will include conferenceproceedings, edited collections, monographs, handbooks, reference books, andother relevant types of book in areas of science and technology where smartsystems and technologies can offer innovative solutions.

High quality content is an essential feature for all book proposals accepted for theseries. It is expected that editors of all accepted volumes will ensure thatcontributions are subjected to an appropriate level of reviewing process and adhereto KES quality principles.

More information about this series at http://www.springer.com/series/8767

Page 4: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

V. Vijayakumar • V. NeelanarayananEditors

Proceedings of the 3rdInternational Symposiumon Big Data and CloudComputing Challenges(ISBCC – 16’)

123

Page 5: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

EditorsV. VijayakumarSchool of Computing SciencesVIT UniversityChennaiIndia

V. NeelanarayananSchool of Computing SciencesVIT UniversityChennaiIndia

ISSN 2190-3018 ISSN 2190-3026 (electronic)Smart Innovation, Systems and TechnologiesISBN 978-3-319-30347-5 ISBN 978-3-319-30348-2 (eBook)DOI 10.1007/978-3-319-30348-2

Library of Congress Control Number: 2016932320

© Springer International Publishing Switzerland 2016This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar ordissimilar methodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exemptfrom the relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material containedherein or for any errors or omissions that may have been made.

Printed on acid-free paper

This Springer imprint is published by SpringerNatureThe registered company is Springer International Publishing AG Switzerland

Page 6: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Preface

The 3rd International Symposium on Big Data and Cloud Computing(ISBCC’2016) was held at VIT University, Chennai on 10 and 11 March 2016.As an exciting initiative in the area of big data and cloud computing, this sym-posium series is becoming a leading forum for disseminating the latest advances inbig data and cloud computing research and development. The aim of the conferenceis to bring together scientists interested in all aspects of theory and practise of cloudcomputing and big data technology, providing an international forum forexchanging ideas, setting questions for discussion, and sharing the experience.

The symposium attracted high-quality original research papers on variousaspects of big data and cloud computing. This year, we received 154 submissions.After a rigorous peer-review process undertaken by the programme committeemembers, 42 papers were accepted, representing acceptance rates of 27 %. Wecongratulate the authors of those accepted papers and sincerely thank all the sub-mitting authors for their interest in the symposium.

The 3rd ISBCC symposium consists of eight full session presentations. All thepresentations reflect perspectives from the industrial and research community onhow to address challenges in big data and cloud computing. The submissions weresplit between various conference areas, i.e., computer security, WSN, cloud com-puting, image processing, big data, IOT, and artificial intelligence. Track 1,Computer Security, incorporates all security domains including information secu-rity, network security, cloud security and mobile security. Track 2, Wireless SensorNetworks (WSN), focuses on novel approaches, quality and quantitative aspects ofWSN. Track 3, cloud computing focuses on energy efficiency, scheduling andoptimization. Track 4, Image Processing, focuses on pattern recognition, tracking,computer vision, image retrieval and object detection. Track 5, Big Data, incor-porates data management, mining approaches, search techniques, recommendationsystem, data classification and social graphs. Track 6, Internet of Things (IOT),focuses on key fields of IOT implementation such as healthcare systems andinteractive systems; and link management. Track 7, Artificial Intelligence, focuses

v

Page 7: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

on prediction and decision making algorithms using fuzzy theory. Track 8,Software Engineering, focuses on business tools, requirement analysis and metrics.

We are honoured to feature the following high-profile distinguished speakers fortheir inspiring and insightful keynotes:

• Dr. P.A. Subrahmanyam (FIXNIX, USA)• Dr. Ron Doyle (IBM, USA)• Dr. Shajulin Benedict (St. Xavier’s Catholic College of Engineering, India)• Dr. Wahiba Ben Abdessalem (Taif University, Saudi Arabia)• Dr. Surya Putchala (ZettaMine Technologies, Hyderabad)• Mr. Chidambaram Kollengode (DataXu Inc, India)• Dr. Jemal H. Abawajy (Deakin University, Australia)• Dr. Mohan Kumar (Trendwise Analytics, India)• Dr. Md. Fokhray Hossain (Daffodil International University, Bangladesh)• Dr. Nilanjan Dey (Techno India College of Technology, India)• Dr. Dinesh Garg (IBM Research Laboratory India)• Dr. Kapilan Radhakrishnan (University of Wales Trinity St. David, UK)• Mr. P. Ravishankar (CTS, India)• Dr. Neeran M. Karnik (Vuclip, Inc. Canada)• Dr. B. Ravi Kishore (HCL, India)• Dr. Prof. Md Abdul Hannan Mia (Agni Systems, Bangladesh)• Dr. R. Venkateswaran (Persistent Systems, India)• Dr. A. Clementking (King Khalid University, Saudi Arabia)• Dr. V.N. Mani (DEIT, India)• Prof. P.D. Jose (MET’s School of Engineering, India)• Ms. Kiran mai Yanamala (Freelance Consultant, India)• Dr. Praveen Jayachandran (IBM Research, India)• Dr. Ajay Deshpande (Rakya Technologies, India)• Dr. Murali Meenakshi Sundaram, Consultant, CTS India• Prof. Dr. Lorna Uden, Staffordshire University, UK• Dr. Tulika Pandey, Department of Electronics and IT, India• Mr. Narang N. Kishor, Narnix Technolabs Pvt. Ltd, India• Mr. S. Kailash, CDAC, India

In addition, the symposium features workshops covering many emergingresearch directions in big data and cloud computing by both industry experts andacademia.

We are deeply grateful to all who have contributed to this amazing technicalprogramme in one way or another. Particularly, we profoundly appreciate thegreat contribution by the following international scientific committee members:Dr. P.A. Subrahmanyam (FIXNIX, USA), Dr. Ron Doyle (IBM, USA),Dr. Shajulin Benedict (St. Xavier’s Catholic College of Engineering, India),Dr. Wahiba Ben Abdessalem (Taif University, Saudi Arabia), Dr. Dey (Nilanjan,Techno India College of Technology, India), Dr. Siti Mariyam Shamsuddin(Universiti Teknologi Malaysia, Malaysia), Dr. Robert James Howlett (KES

vi Preface

Page 8: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

International, UK), Dr. Thomas Ditzinger (Executive Editor, Springer, Germany)and Dr. Valentina Emilia Balas (University of Arad, Romania).

We appreciate the contribution by programme committee members and manyexternal reviewers. They reviewed and discussed the submissions carefully, criti-cally and constructively. We thank the contribution from all our sponsors for thegenerous financial support. We thank all the members of the organizing committee.We also thank our volunteers without whom this mission would not be possible.Last but not least, we thank all attendees who joined us in ISBCC 2016. Theattendants of the ISBCC’2016 shared the common opinion that the conference andworkshops were extremely fruitful and well organized.

V. VijayakumarV. Neelanarayanan

Preface vii

Page 9: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Organization Committee

Patrons

Chief PatronDr. G. Viswanathan, Founder—Chancellor of VIT University

PatronsMr. Sankar Viswanathan, Vice President, VIT UniversityMs. Kadhambari S. Viswanathan, Assistant Vice President, VIT UniversityDr. Anand A. Samuel, Vice-Chancellor, VIT UniversityDr. P. Gunasekaran, Pro Vice-Chancellor, VIT University, Chennai Campus, India

Organizing Committee

Dr. V. Vijayakumar, VIT, Chennai, IndiaDr. V. Neelanarayanan, VIT, Chennai, India

Programme Committee

Dr. Backhouse Helen, Northampton University, UKDr. Bates Margaret, Northampton University, UKDr. Burdett Sarah, Northampton University, UKDr. Dravid Rashmi, Northampton University, UKDr. Garwood Rachel, Northampton University, UKDr. Hookings Lynn, Northampton University, UKDr. Tudor Terry, Northampton University, UKDr. Balaji Rajendran, CDAC, IndiaDr. Balakrishnan, NUS, SingaporeDr. Muthukumar, Meenakshi University, IndiaDr. Nithya, Vinayaka Missions University, IndiaDr. S. Prabhakaran, Vinayaka Missions University, India

ix

Page 10: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. Pramod S. Pawar, University of Kent, UKMr. Rupesh, Thirdware Technologies, IndiaDr. Rao, IT University of Copenhagen, DenmarkDr. Sivakumar, Madras Institute of Technology, IndiaDr. N. Subramanian, CDAC, IndiaDr. Subramanisami, Sastra University, Thanjavur, IndiaDr. Vijayakumar, Anna University, IndiaDr. J. Priyadarshini, VIT University, IndiaDr. V. Viswanathan, VIT University, IndiaDr. P. Nithyanandam, VIT University, IndiaMr. Chidambaram Kollengode, Nokia, BengaluruDr. James Xue, The University of Northampton, NorthamptonProf. S.R. Kolla, Bowling Green State University, USAProf. Akshay Kumar Rathore, NUS, SingaporeProf. Vignesh Rajamani, Oklahoma State University, USAProf. Debasish Ghose, IISc, BangaloreDr. Kunihiko Sadakane, University of Tokyo, JapanDr. Arvind K. Bansal, Kent State University, USADr. Bettina Harriehausen, Darmstadt University of Applied Sciences, GermanyDr. Hamid Zarrabi-Zadeh, Sharif University of Technology, IranDr. Maziar Goudarzi, Sharif University of Technology, IranDr. Mansour Jamzad, Sharif University of Technology, IranDr. Morteza Amini, Sharif University of Technology, IranDr. G. Anderson, University of Botswana, BotswanaDr. A.N. Masizana, University of Botswana, BotswanaDr. Shareef M. Shareef, College of Engineering, ErbilDr. Bestoun S. Ahmed, College of Engineering, ErbilDr. Syed Akhter Hossain, Daffodil International University, BangladeshDr. Md. Fokhray Hossain, Daffodil International University, BangladeshDr. Abdullah b Gani, University of Malaya, MalaysiaDr. Seyed Reza Shahamiri, University of Malaya, MalaysiaDr. Adam Krzyzak, Concordia University, CanadaDr. Mia Persson, Malmo University, SwedenDr. Rafiqul Islam, Charles Sturt University, AustraliaDr. Zeyad Al-Zhour, University of Dammam, Saudi ArabiaDr. Imad Fakhri Al-Shaikhli, International Islamic University, MalaysiaDr. Abdul Wahab, International Islamic University, MalaysiaDr. Dinesh Garg, IBM Research Laboratory IndiaDr. Abhijat Vichare, Consultant, IndiaDr. Subhas C. Nandy, Indian Statistical Institute, IndiaDr. Dan Wu, University of Windsor, CanadaDr. Subir Bandyopadhyay, University of Windsor, CanadaDr. Md. Saidur Rahman, BUET, BangladeshDr. M. Sohel Rahman, BUET, BangladeshDr. Guillaume Blin, University of Paris-Est, France

x Organization Committee

Page 11: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. William F. Smyth, McMaster University, CanadaDr. Burkhard Morgenstern, University of Göttingen, GermanyDr. Basim Alhadidi, Al-Balqa Applied University, JordanDr. N. Raghavendra Rao, IndiaDr. Radhakrishnan Delhibabu, Kazan Federal University, RussiaDr. Dong Huang, Chongqing University, ChinaDr. S. Kishore Reddy, Adama Science and Technology University, EthiopiaDr. V. Dhanakoti, SRM Valliammai Engineering College, IndiaDr. R. Nandhini, VIT Chennai, IndiaDr. S.V. Nagaraj, VIT Chennai, IndiaDr. R. Sakkaravarthi, VIT Chennai, IndiaDr. S. Asha, VIT Chennai, IndiaDr. Y. Asnath Victy Phamila, VIT Chennai, IndiaDr. Renta Chintala Bhargavi, VIT Chennai, IndiaDr. B. Saleena, VIT Chennai, IndiaDr. R. Vishnu Priya, VIT Chennai, IndiaDr. V. Viswanathan, VIT Chennai, IndiaDr. P. Sandhya, VIT Chennai, IndiaDr. E. Umamaheswari, VIT Chennai, IndiaDr. S. Geetha, VIT Chennai, IndiaDr. Subbulakshmi, VIT Chennai, IndiaDr. R. Kumar, VIT Chennai, IndiaDr. Sweetlin Hemalatha, VIT Chennai, IndiaDr. Janaki Meena, VIT Chennai, IndiaDr. G. Babu, AEC, Chennai, IndiaDr. S. Hariharan, VIT Chennai, IndiaDr. S. Kaliyappan, VIT Chennai, IndiaDr. S Dhanasekar, VIT Chennai, IndiaDr. V.N. Mani, DEIT, IndiaDr. R. Venkateswaran, Persistent Systems, IndiaDr. B. Ravi Kishore, HCL, IndiaProf. P.D. Jose, MET’s School of Engineering, IndiaMr. P. Ravishankar, Director, CTS, IndiaMs. Kiran mai Yanamala, Freelance Consultant, IndiaDr. Praveen Jayachandran Researcher, Distributed Systems Research, IBMResearch, IndiaDr. Ajay Deshpande CTO, Rakya Technologies India

Advisory Committee

Dr. P.A. Subrahmanyam, FIXNIX, USADr. Ron Doyle, IBM, USADr. Shajulin Benedict, St. Xavier’s Catholic College of Engineering, IndiaDr. Wahiba Ben Abdessalem, Taif University, Saudi Arabia

Organization Committee xi

Page 12: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. Dey, Nilanjan, Techno India College of Technology, IndiaDr. Siti Mariyam Shamsuddin, Universiti Teknologi Malaysia, MalaysiaDr. Robert James Howlett, KES International, UKDr. Thomas Ditzinger, Executive Editor, Springer, GermanyDr. Valentina Emilia Balas, University of Arad, RomaniaDr. Anca L. Ralescu, College of Engineering University of Cincinnati, USADr. Emmanuel Udoh, Sullivan University, USADr. Mohammad Khan, Sullivan University, USADr. Ching-Hsien Hsu, Chung Hua University, TaiwanDr. Kaushal K. Srivastava, IIT(BHU), IndiaDr. R.K.S. Rathore, IITK, IndiaDr. Tanuja Srivastava, IITR, IndiaDr. Radu-Emil Precup, Politehnica University of Timisoara, RomaniaDr. John Rumble, Codata, USADr. Diane Rumble, Codata, USADr. Jay Liebowitz, University of Maryland, USADr. Sarah Callaghan, STFC, UKDr. Jemal H. Abawajy, Deakin University, AustraliaDr. Rajkumar Buyya, Melbourne University, AustraliaDr. Hamid R. Arbania, University of Georgia, USADr. Mustafa Mat Deris, MalaysiaProf. Ekow J. Otoo, University of the WitwatersrandDr. Weiyi Meng, Binghamton University, USADr. Venu Dasigi, Bowling Green State University, USADr. Hassan Rajaei, Bowling Green State University, USADr. Robert C. Green, Bowling Green State University, USADr. Hyun Park, Kookmin University, South KoreaDr. R.S.D. Wahida Banu, GCES, IndiaDr. L. Jegannathan, VIT, Chennai, IndiaDr. N. Maheswari, VIT, Chennai, IndiaDr. Nayeemulla Khan, VIT, Chennai, IndiaDr. V. Pattabiraman, VIT, Chennai, IndiaDr. R. Parvathi, VIT, Chennai, IndiaDr. B. Rajesh Kanna, VIT, Chennai, IndiaDr. Bharadwaja Kumar, VIT, Chennai, IndiaDr. R. Ganesan, VIT, Chennai, IndiaDr. D. Rekha, VIT, Chennai, IndiaDr. S. Justus, VIT, Chennai, IndiaDr. S.P. Syed Ibrahim, VIT, Chennai, IndiaDr. M. Sivabalakrishnan, VIT, Chennai, IndiaDr. L.M. Jenila Livingston, VIT, Chennai, IndiaDr. G. Malathi, VIT, Chennai, IndiaDr. A. Kannan, Anna University, IndiaDr. E.A. Mary Anita, SAEC, IndiaDr. Kay Chen Tan, NUS, Singapore

xii Organization Committee

Page 13: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. Abel Bliss, University of Illinois, USADr. Daniel O’Leary, USC Marshall School of Business, USADr. B.S. Bindu Madhava, CDAC, BangaloreDr. Murali Meenakshi Sundaram, CSC, ChennaiDr. Ajay Ohri, CEO, Decisionstats, DelhiDr. Dharanipragada Janakiram, IITM, ChennaiDr. Surya Putchala, CEO, ZettaMine Technologies, HyderabadDr. Patrick Martinent, CTO, CloudMatters, ChennaiDr. R.S. Mundada, BARC, MumbaiDr. Natarajan Vijayarangan, TCS, ChennaiDr. Karthik Padmanabhan, IBM, IndiaDr. Rajdeep Dua, VMWare, HyderabadDr. Shuveb Hussain, K7 Computing Pvt. Ltd, IndiaDr. Mohan Kumar, Trendwise Analytics, BangaloreDr. Wolfgang von Loeper, Mysmartfarm, SouthafricaDr. Pethuru Raj, IBM Resrarch Laboratory, IndiaDr. Ravichandran, CTS Research Laboratory, IndiaDr. K. Ananth Krishnan, TCS, IndiaDr. Zaigham Mahmood, University of Derby, UKDr. Madhav Mukund, CMI, ChennaiDr. Bala Venkatesh, Ryerson University, Toronto, CanadaDr. Zvi M. Kedem, New York University, USADr. Bennecer Abdeldjalil, Northampton University, UKDr. Lakhmi C. Jain, University of Canberra, AustraliaDr. Mika Sato-Ilic, University of Tsukuba, JapanDr. Manuel Mazzara, Innopolis University, RussiaDr. Max Talanov, Kazan Federal University and Innopolis University, RussiaDr. Salvatore Distefano, Politecnico di Milano, ItalyDr. Jordi Vallverdú, Universitat Autònoma de Barcelona, SpainDr. Vladimir Ivanov, Kazan Federal University, RussiaDr. Meghana Hemphill, WILEY, USADr. Alexandra Cury, WILEY, USADr. Erica Byrd, WILEY, USADr. Cassandra Strickland, WILEY, USADr. Witold Pedrycz, University of Alberta, CanadaDr. Sushmita Mitra, Indian Statistical Institute, IndiaDr. ArulMurugan Ambikapathi, UTECHZONE Co. Ltd, TaiwanDr. Neeran M. Karnik, Vuclip, Inc. CanadaDr. K.V. Ramanathan, University of Washington Foster Business School, USADr. Prof. Md Abdul Hannan Mia, Agni Systems, BangladeshDr. A. Clementking, King Khalid University, Saudi Arabia

Organization Committee xiii

Page 14: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Reviewers

Dr. G. Anderson, University of Botswana, BotswanaDr. P. Nithyanandam, VIT, Chennai, IndiaDr. E. Umamaheswari, VIT, Chennai, IndiaProf. Abdul Quadir Md, VIT, Chennai, IndiaDr. B. Rajesh Kanna, VIT, Chennai, IndiaDr. Dong Huang, Chongqing University, ChinaProf. T.S. Pradeepkumar, VIT, Chennai, IndiaDr. S. Asha, VIT, Chennai, IndiaProf. Tulasi Prasad Sariki, VIT, Chennai, IndiaDr. M. Kaliyappan, VIT, Chennai, IndiaDr. Syed Akhter Hossain, Daffodil International University, BangladeshProf. P. Rukmani, VIT, Chennai, IndiaProf. G. Anusooya, VIT, Chennai, IndiaProf. K.V. Pradeep, VIT, Chennai, IndiaProf. Alok Chauhan, VIT, Chennai, IndiaDr. P. Vijayakumar, VIT, Chennai, IndiaProf. V. Kanchanadevi, VIT, Chennai, IndiaDr. R. Sakkaravarthi, VIT, Chennai, IndiaDr. G. Singaravel, KSR College of Engineering, IndiaDr. G. Malathi, VIT, Chennai, IndiaDr. Bharathwaja Kumar, VIT, Chennai, IndiaDr. M. Janakimeena, VIT, Chennai, IndiaDr. V. Dhanakoti, SRM Valliammai Engineering College, IndiaProf. S. Harini, VIT, Chennai, IndiaDr. A. Clementking, King Khalid University, Saudi ArabiaProf. Ekow J. Otoo, University of the WitwatersrandDr. Arvind K. Bansal, Kent State University, USADr. S.P. Syed Ibrahim, VIT, Chennai, IndiaDr. R. Parvathi, VIT, Chennai, IndiaProf. M. Rajesh, VIT, Chennai, IndiaDr. E.A. Mary Anita, SAEC, IndiaDr. Y. Asnath Victy Phamila, VIT Chennai, IndiaDr. M. Sivabalakrishnan, VIT, Chennai, IndiaProf. M. Sivagami, VIT, Chennai, IndiaDr. Subramanisami, Sastra University, Thanjavur, IndiaDr. Imad Fakhri Al-Shaikhli, International Islamic University, MalaysiaDr. Sweetlin Hemalatha, VIT, Chennai, IndiaDr. James Xue, The University of Northampton, NorthamptonDr. V. Pattabirman, VIT, Chennai, IndiaProf. A. Vijayalakshmi, VIT, Chennai, IndiaDr. V. Viswanathan, VIT, Chennai, IndiaDr. Abhijat Vichare, Consultant, IndiaDr. Wahiba Ben Abdessalem, Taif University, Saudi Arabia

xiv Organization Committee

Page 15: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. G. Babu, AEC, Chennai, IndiaProf. S. Bharathiraja, VIT, Chennai, IndiaDr. J. Priyadarshini, VIT, Chennai, IndiaProf. M. Nivedita, VIT, Chennai, IndiaDr. Hyun Park, Kookmin University, South KoreaProf. B.V.A.N.S.S. Prabhakar Rao, VIT, Chennai, IndiaProf. K. Khadar Nawas, VIT, Chennai, IndiaProf. A. Karmel, VIT, Chennai, IndiaProf. R. Maheswari, VIT, Chennai, IndiaDr. Jenila Livingston, VIT, Chennai, IndiaProf. S. Shridevi, VIT, Chennai, IndiaProf. S. Geetha, VIT, Chennai, IndiaProf. R. Gayathri, VIT, Chennai, IndiaDr. S.V. Nagaraj, VIT, Chennai, IndiaDr. Josephc Tsai, National Yang-Ming University, TaiwanProf. Rabindra Kumar Singh, VIT, Chennai, IndiaDr. Pramod S. Pawar, University of Kent, UKProf. S. Sajidha, VIT, Chennai, IndiaDr. Dinesh Garg, IBM Research Laboratory IndiaProf. M. Nishav, VIT, Chennai, IndiaProf. J. Prassanna, VIT, Chennai, IndiaDr. Madhav Mukund, CMI, ChennaiDr. T. Vigneswaran, VIT, Chennai, IndiaProf. M. Vergin Raja Sarobin, VIT, Chennai, IndiaProf. S. Rajarajeswari, VIT, Chennai, IndiaMr. Ajay Ohri, CEO, Decisionstats, DelhiProf. S. Maheswari, VIT, Chennai, IndiaDr. N. Maheswari, VIT, Chennai, IndiaProf. S. Nithyadarisinip, VIT, Chennai, IndiaProf. M. Priyaadharshini, VIT, Chennai, IndiaProf. G. Suganya, VIT, Chennai, IndiaDr. Valentina Emilia Balas, University of Arad, RomaniaProf. B. Sathiskumar, VIT, Chennai, IndiaProf. S. Rajkumar, VIT, Chennai, IndiaDr. Adam Krzyzak, Concordia University, CanadaProf. S. Dhanasekar, VIT, Chennai, IndiaProf. M. Sakthiganesh, VIT, Chennai, IndiaDr. R. Dhanalakshmi, VIT, Chennai, IndiaDr. Renta Chintala Bhargavi, VIT, Chennai, IndiaDr. Seyed Reza Shahamiri, University of Malaya, MalaysiaDr. Jordi Vallverdú, Universitat Autònoma de Barcelona, SpainProf. Rajeshkumar, VIT, Chennai, IndiaDr. P. Sandhya, VIT, Chennai, IndiaDr. Robert C. Green, Bowling Green State University, USADr. Sriniavasa Rao, VIT, Chennai, India

Organization Committee xv

Page 16: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Dr. Pethuru Raj, IBM Resrarch Laboratory, IndiaProf. B. Gayathridevi, VIT, Chennai, IndiaDr. Hamid Zarrabi-Zadeh, Sharif University of Technology, IranProf. K. Deivanai, VIT, Chennai, IndiaProf. I. Sumaiya Thaseen, VIT, Chennai, IndiaMs. Jayalakshmi Sankaran, VIT, Chennai, India

Event Coordinators (VIT University)

Dr. M. SivabalakrishnanDr. D. RekhaDr. UmamaheswariDr. S. GeethaDr. P. NithyanandamDr. S.P. SyedIbrahimProf. R. SridharProf. Ramesh RagalaProf. G. SugunaProf. J. PrassannaProf. G. AnusooyaProf. K. PunithaProf. Abdul Quadir MdProf. S. Raja RajeswariProf. S. Usha RaniProf. K.V. PradeepProf. J. Christy JacksonProf. Rajiv VincentProf. Alok ChauhanProf. Rabindra Kumar SinghProf. R. GayathriProf. AparnaProf. Sakthi GaneshDr. R. NandhiniProf. V. Kanchana DeviProf. A. VijayalakshmiProf. T.S. PradeepKumarProf. R. PrabakaranMs. Jayalakshmi SankaranMr. Arunkumar GogeMr. SivakumarMr. S. ArunkumarMr. JeevaMs. BharathiMs. Durgalakshmi

xvi Organization Committee

Page 17: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Contents

Part I Computer Security: Information Security, NetworkSecurity, Cloud Security, Mobile Security

A Preventive Method for Host Level Security in CloudInfrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3S. Ramamoorthy and S. Rajalakshmi

Trust Enabled CARE Resource Broker . . . . . . . . . . . . . . . . . . . . . . . . 13Kumar Rangasamy and Thamarai Selvi Somasundaram

An Initiation for Testing the Security of a Cloud Service Provider . . . . 33D.M. Ajay and E. Umamaheswari

Security and Privacy in Bigdata Learning Analytics . . . . . . . . . . . . . . . 43Jeremie Seanosky, Daniel Jacques, Vive Kumar and Kinshuk

Detection of XML Signature Wrapping Attack Using NodeCounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Abhinav Nath Gupta and P. Santhi Thilagam

Secure and Efficient Distance Effect Routing Algorithmfor Mobility (SE_DREAM) in MANETs . . . . . . . . . . . . . . . . . . . . . . . . 65H.J. Shanthi and E.A. Mary Anita

Intrusion Detection Model Using Chi Square Feature Selectionand Modified Naïve Bayes Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . 81I. Sumaiya Thaseen and Ch. Aswani Kumar

An Intelligent Detection System for SQL Attacks on WebIDS in a Real-Time Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93K.G. Maheswari and R. Anita

xvii

Page 18: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Real-Time Scene Change Detection and Entropy BasedSemi-Fragile Watermarking Scheme for Surveillance VideoAuthentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101V.M. Manikandan and V. Masilamani

Secure Video Watermarking Technique UsingCohen-Daubechies-Feauveau Wavelet and GollmanCascade Filtered Feedback Carry Shift Register (F-FCSR) . . . . . . . . . . 111Ayesha Shaik and V. Masilamani

Part II Wireless Sensor Network

Quality Measurements of Fruits and VegetablesUsing Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Amol Bandal and Mythili Thirugnanam

Part III Cloud Computing

Associate Scheduling of Mixed Jobs in Cloud Computing . . . . . . . . . . . 133Dinesh Komarasamy and Vijayalakshmi Muthuswamy

Towards an Analysis of Load Balancing Algorithms to EnhanceEfficient Management of Cloud Data Centres . . . . . . . . . . . . . . . . . . . . 143J. Prassanna, P. Ajit Jadhav and V. Neelanarayanan

Energy Efficient Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Subramaniyam Kannan and Suresh Rajendran

Power Optimization System for a Small PC Using Docker . . . . . . . . . . 173G. Anusooya and V. Vijayakumar

A Survey on Desktop Grid Systems-Research Gap . . . . . . . . . . . . . . . . 183Neelanarayanan Venkataraman

Trust Based Resource Selection in Grids Using Immune SystemInspired Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213V. Vijayakumar

Part IV Image Processing

Discrete Orthogonal Moments Based Framework for AssessingBlurriness of Camera Captured Document Images . . . . . . . . . . . . . . . . 227K. De and V. Masilamani

An Analysis of BoVW and cBoVW Based Image Retrieval . . . . . . . . . . 237P. Arulmozhi and S. Abirami

Performance Analysis of Background Estimation Methodsfor Video Surveillance Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 249M. Sivabalakrishnan and K. Shanthi

xviii Contents

Page 19: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Part V Big Data

Interactive Big Data Management in Healthcare Using Spark . . . . . . . . 265J. Archenaa and E.A. Mary Anita

Data Science as a Service on Cloud Platform . . . . . . . . . . . . . . . . . . . . 273Aishwarya Srinivasan and V. Vijayakumar

Data Mining Approach for Intelligent Customer BehaviorAnalysis for a Retail Store. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283M. Abirami and V. Pattabiraman

Comparison of Search Techniques in Social Graph Neo4j . . . . . . . . . . . 293Anita Brigit Mathew

A Novel Approach for High Utility Closed Itemset Miningwith Transaction Splitting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307J. Wisely Joe and S.P. Syed Ibrahim

Efficient Mining of Top k-Closed Itemset in Real Time . . . . . . . . . . . . . 317Riddhi Anjankumar Shah, M. Janaki Meena and S.P. Syed Ibrahim

Mining Frequent Itemsets in Real Time . . . . . . . . . . . . . . . . . . . . . . . . 325Nilanjana Dev Nath, M. Janaki Meena and S.P. Syed Ibrahim

Adaptation of SQL-Isolation Levels to No-SQL ConsistencyMetrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335Bhagyashri Vyas and Shraddha Phansalkar

Mood Based Recommendation System in Social MediaUsing PSV Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345R. Anto Arockia Rosaline and R. Parvathi

Design of Lagrangian Decomposition Model for EnergyManagement Using SCADA System . . . . . . . . . . . . . . . . . . . . . . . . . . . 353R. Subramani and C. Vijayalakhsmi

Twitter Data Classification Using Side Information. . . . . . . . . . . . . . . . 363Darshan Barapatre, M. Janaki Meena and S.P. Syed Ibrahim

Part VI Internet of Things

IoT Based Health Monitoring System for Autistic Patients . . . . . . . . . . 371K.B. Sundhara Kumar and Krishna Bairavi

Addressing Identity and Location Privacy of Thingsfor Indoor—Case Study on Internet of Everything’s (IoE) . . . . . . . . . . 377Ajay Nadargi and Mythili Thirugnanam

Intuitive Touch Interaction to Amputated Fingers . . . . . . . . . . . . . . . . 387B. Rajesh Kanna, Devarati Kar, Sandra Felice and Nikhil Joseph

Contents xix

Page 20: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

A Novel Approach for Web Service Annotation Verificationand Service Parameters Validation Using Ontology . . . . . . . . . . . . . . . 399S. Shridevi and G. Raju

Part VII Artificial Intelligence

Prediction of Protein Folding Kinetic States Using Fuzzy BackPropagation Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419M. Anbarasi and M.A. Saleem Durai

Decision Making Using Fuzzy Soft Set Inference System . . . . . . . . . . . . 445U. Chandrasekhar and Saurabh Mathur

Part VIII Software Engineering

Reverse Logistic: A Tool for a Successful Business . . . . . . . . . . . . . . . . 461B. Neeraja, Arti Chandani, Mita Mehta and M. Radhikaashree

Improving User Participation in Requirement Elicitationand Analysis by Applying Gamification Using Architect’sUse Case Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471B. Sathis Kumar and Ilango Krishnamurthi

A Study of the Factors Which Influence the Recruitersfor Choosing a Particular Management Institute . . . . . . . . . . . . . . . . . 483Rajiv Divekar and Pallab Bandhopadhyay

Subset Selection in Market-Driven Product Development:An Empirical Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493S.A. Sahaaya Arul Mary and G. Suganya

A Survey on Collaborative Filtering Based RecommendationSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503G. Suganeshwari and S.P. Syed Ibrahim

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

xx Contents

Page 21: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Part IComputer Security: Information Security,

Network Security, Cloud Security,Mobile Security

Page 22: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

A Preventive Method for Host LevelSecurity in Cloud Infrastructure

S. Ramamoorthy and S. Rajalakshmi

Abstract Cloud Virtual Infrastructure management is the emerging technology inthe IT industry today. Most of the IT business process demanding on the virtualinfrastructure as a service from the cloud service providers including compute,network and storage etc., The dynamic adoption of computing resource and elim-ination of major investment cost to setup the physical infrastructure attracted the ITindustry towards cloud infrastructure. Live VM Migration techniques allows morefrequently move the virtual machines from one physical location to another to avoidthe situations like load balancing, Fault tolerance, edge computing, virtual migra-tion etc., The major challenge which found on this process security issues on theVM live migration. The proposed model trying to eliminate the security challengesin the pre-copy migration strategy by introducing the network addressing levelhashing technique to avoid the critical part of migration process. The dirty VMmemory pages are released to the destination server only after the authenticatednetwork process.

Keywords Cloud computing � VM live migration � Hashing � Pre-copy �Memorypages � Network addressing

1 Introduction

Cloud Computing Data Center model will provide the facility to operate the ITbusiness services by offering its infrastructure like Compute, Storage, Network etc.,Number of physical Servers are massively utilized to perform many number ofapplications with the hypervisor support on the physical Environment. Every

S. Ramamoorthy (&) � S. RajalakshmiDepartment of Computer Science and Engineering, SCSVMV University,Kancheepuram, Indiae-mail: [email protected]

S. Rajalakshmie-mail: [email protected]

© Springer International Publishing Switzerland 2016V. Vijayakumar and V. Neelanarayanan (eds.), Proceedings of the 3rd InternationalSymposium on Big Data and Cloud Computing Challenges (ISBCC – 16’),Smart Innovation, Systems and Technologies 49, DOI 10.1007/978-3-319-30348-2_1

3

Page 23: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Hypervisor creates multiple number of Virtual machines to perform the host leveloperations. Virtual Machines are nothing but the set of files which will inherit theabstract behavior of the physical machine. There are number of Virtual machinemigration operations performed on the same cloud environment for continuity ofuninterrupted Service offered by the cloud to its customers.

Cloud Computing is a Internet based Technology offers computing resources asa services to its end users support various IT business process. The computingresources are physical infrastructure as a service including compute, network andstorage etc., The Cloud computing services are offered to the customers in thedifferent models like Infrastructure as a Service (IaaS), Platform as a Service (PaaS)and Software as a Service (SaaS).

Cloud Deployment models selected by the customers based on their specificbusiness needs. If the customer is more concern about the data and less concernabout the cost they opted to go for the private cloud model in the home location. Ifthe customer is less concern about the data security but more concern about thehiring cost then they will go for an public cloud model for their organization.

The third model will provide the intermediate level facility to the customers byoffering hybrid infrastructure for their business process.

Virtual Infrastructure is the backbone of the cloud computing business model,this will eliminate the need for setting up the physical infrastructure by customers.Instead of these customers can hire the computing resources as pay as you go modelstructure.

Virtual machine Manager (Hypervisor) abstract the physical infrastructure to theVirtual Machines running on the Hypervisor. This model allows the Multiple VM’sto run multiple guest operation system on the same physical server. Many appli-cation’s can be deployed using this flexibility of the physical infrastructure.Automated Live VM migration is the one of the technique which is frequentlyhandled by the hypervisor to move the Virtual machine into different physicalservers depends on the requirement of the resource availability.

VM level attacks like monitoring and capturing the traffic between the virtualnetwork will lead to the different level of issues on the Co located VMs. VM levelchallenges like Multitenancy, Colocated VM attack must be Addressed in aEffective way in order to reduce the risk associated with infrastructure level threatsin the cloud environment. As an example Cloud Platform like Amazon EC2,Microsoft Azure running multiple number of VMs on the same Environment canlead multiple number of Security issues at the host level. Predominant usage ofinternet services in the process of Connection establishment between Cloud datacenter and the Client machine will reflect the untrusted channel communication inpublic cloud environment. Untrusted Network operations, Untrusted Port group,protocols and interconnecting devices will require maximum attention while settingup the Cloud Environment for running multiple number of VM on the samephysical Machine.

Remote Level machine authentication is also part of this data center activitywhich needs to prove itself as a authorized user to access the Virtual Machinecreated on the cloud Environment.

4 S. Ramamoorthy and S. Rajalakshmi

Page 24: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

2 Characteristics of VM Operations

Virtual machine is the set of files which inherit the abstract concept from thephysical machine and creates the Virtual environment as a mirror image of physicalmachine. Hypervisor is the software layer which allows the multiple number ofOS’s run simultaneously by sharing the common resource among themselves fromthe underlying physical machine.

There are two types of Hypervisor namely (a) Bare metal Hypervisor (b) HostedHypervisor that is a software layer which allows the VM level interaction betweenphysical hardware and Virtual Machine created on the same hypervisor (Fig. 1).

From the above diagram it is clear that various level of security enforcement arerequired on the cloud Infrastructure at Infrastructure level (IaaS), Platform level(PaaS) and Application level (SaaS).

3 Live VM Migration Process

Live VM Migration is the process of migrating the VM from one physical server toanother physical server to different location. VM contents like CPU state, Memorypages, VM configuration data etc., migrated to the destination server while VM stillin running state.

Two types of Migration strategies are followed in the process of LiveMigrations.

1. Pre copy Migration2. Post copy Migration

Fig. 1 Hosted hypervisor

A Preventive Method for Host Level Security … 5

Page 25: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

In the Pre copy migration process the Running VM contents are copied at a timeand all the memory pages of the VM are migrated to destination host, this processwas done without disturbing the running application.

In Stop and Copy migration process the currently running VM was stopped forthe specific point of time in the source, in subsequent iteration the modified memorypages (Dirty pages) are copied to the destination server, after that VM will beresumed at the destination server.

4 Challenges Related to Co Located VM’s

Primary threat for a Virtual machine is due to running multiple VMs on the SameHypervisor. The attack surface will be very high among the VMs even the mali-cious VMs can also the part of this Surface. Efficient sharing of resources amongthe number of VMs will also lead to different issues on this environment. LiveMigration of Failed VM from one hypervisor to another hypervisor will carry thesensitive information to the untrusted environment which could have the possibilityto attack the target VM and extract the confidential information about the target.

The major challenge in the Live VM migration is the Security issues related tothe VM content migration. Secure transfer of VM memory pages must be protectedfrom the unauthorized modification. The VM’s are still running state while trans-ferred between different physical servers. There is a possibility of masquerade VMcontents into another. Strong Cryptographic Techniques are need to be deployed toavoid this kind of memory modification but key management is the another over-head for this kind of security mechanism. The proposed model trying to eliminatethis critical situation by introducing the network level Hashing technique toauthenticate the memory page migrations.

Types of Operations on Cloud Virtual Machine (Table 1).

Table 1 VM level operations

S. No. Type of VMoperation

Function

1. VM livemigration

Moving the Live VM from one hypervisor to anotherhypervisor

2. VM copy Copy the contents of VRAM disk into another

3. VM move Movement of VM from one hypervisor to another physicalserver

4. VM clone Performing cloning operation to take multiple copies of VM

5. VM template Taking the contents of VM in the form of template to producemultiple copies

6 S. Ramamoorthy and S. Rajalakshmi

Page 26: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

5 Proposed Methodology

Proposed model try to achieve the required level of security by implementingfollowing security polices at VM level.

• Self Destructive nature of VM when there is an unauthorized effect made on theVM.

• Authenticated move or Copy of VM operations at hypervisor level.• For every VM operation required to prove itself as a authenticated operation on

a VM.• Identification of unauthorized move can be monitored based on the level of

traffic flow between two VM’s and Virtual Switch.• If the traffic flow exceed the preset Limit then it will become concluded as a

unauthorized move of VM and it will destroy by itself (Figure 2).

Abnormal traffic rate identified between VM’s are enforced to apply some set ofsecurity policy given below.

6 Behavior of VM Security Policy Rule

Traffic Rate = HIGH − Destroy the VM fail to provide Signature IdentityTraffic Rate = MEDIUM − Signature Identity CheckTraffic Rate = LOW − Continue its normal operation.

6.1 Proposed Algorithm

Let us Consider N-number of Virtual Machines running in an Hypervisor H.

H={VM1,VM2,VM3…VmN}Th.Value=Max.traffic rate between VM & VswitchIf(traffic flow rate<=Threshold Value)

Fig. 2 Co-located VMsurface attack

A Preventive Method for Host Level Security … 7

Page 27: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

ThenContinue the normal operationElse if(traffic flow rate>Threshold Value)Perform Signature Authentication CheckVSigID=GSigIDEnforce the Security policy over VMEndif.

6.1.1 Vsignature—Authentication Process

Every clustered hypervisor’s group generated some hash value signature when itwas created as the part of cluster group for the Authentication purpose. This hashbased signature used to identify the hypervisor while moving the Live VM’sbetween one Hypervisor to another in the same cluster group (Fig. 3).

This Signature Authentication will provide sufficient security to prevent theVirtual Machine hosted in a attackers hypervisor in unauthorized manner.

Every time the Virtual machine will update the new MAC Address by throwingback to its router where its previously hosted network. The Signature Verificationmodule will now recomputed the hash value based on the MAC address which isthrown by the hypervisor.

7 Implementation and Result Analysis

The above work is simulated using Cloudsim by setting up the two different datacenter along with multiple number of Virtual machines running on the samehypervisor cloudlet. It is allowed to move a virtual machine from one hypervisor to

Fig. 3 Proposed architecture

8 S. Ramamoorthy and S. Rajalakshmi

Page 28: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

another hypervisor and the data transfer rates are monitored at the VM and VSwitchlevel.

Capacity of Cloudlet ¼Xn

i¼0

CðiÞ=Nvm

By setting pre Limit condition to the data traffic rate between two VMs andVswitch identifies the unauthorized behavior of the Virtual machine.

Mathematical Evaluation:

Tmr ¼ TcþTsd ð1Þ

T service downtime ¼ Tmr � Tcycles ð2Þ

Tsd[Est:Th value ð3Þ

Concluded as a abnormal behaviour VM.RTT/ICMP Packet: (Vswitch)Total Data transfer = Total no. of RTTpeak@/CPU cycles + Data Transfer + Total down time

RTT ! mean time between Time at first packet sentTime at response

Let the size of the virtual machine RAM is ‘V’ the peak rate at which packet’ssent ‘P’ and the network bandwidth available be ‘B’.

For an instance, Xen virtualization environment.The Threshold limit, on the number of RTT peaks/CPU cycles limited to 5.If RTT > Peaks > 5VM − abnormalIf the maximum amount of data transfers, set to 3 times of Vm RAM.

(1) If amount of data transfer >3 times VRAM

Forcefully stop VM and directed signature authenticationThen, set Th memory page = 50 (or) >50 memory pages

(2) If VM migration amount is <X then, downtime >Th value

Then destroy VM and migration.→ Data migration during its nth cycle will always less than (or) equal to size of

VRAM − V.

V � PB

� �n� 1\V; n[ ¼ 1 ð4Þ

The RTT peak rate always less than network bandwidth available.

RTTP < B → B

A Preventive Method for Host Level Security … 9

Page 29: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

Tc = V/B

Tc ¼ V=RTTP½ � ð5Þ

Total Data migrated during the down time,

VPB

� �n\WV ð6Þ

W Limit data transfer

7.1 Results Analysis

Variation in the IOPS from the above statistical analysis clearly shows that unex-pected data traffic between the VM’s and Vswitch will lead to an unauthorizedmove of Virtual machine from the known Hypervisor to target attack surface in thecloud environment (Table 2).

From the estimated values above graph shows a sudden rise of the curve whenthere is high volume of data transfer at specific point of time (Fig. 4).

7.2 Notations and Symbols Used

See Table 3.

Table 2 Report analysis

S.No. Preset transfer rate(IOPS)

Starting time(ms)

Completion time(ms)

Actual transfer Rate(IOPS)

1. 3000 4.03 5.08 2800

2. 4000 5.09 6.05 3000

3. 4200 6.15 7.10 7000

4. 3500 7.12 8.10 8000

Fig. 4 Transfer rate resultanalysis

10 S. Ramamoorthy and S. Rajalakshmi

Page 30: Proceedings of the 3rd International Symposium on Big Data and … · 2016-02-23 · † Dr. Mohan Kumar (Trendwise Analytics, India) † Dr. Md. Fokhray Hossain (Daffodil International

8 Conclusion

The Proposed model tries to reduce the Co-located VM attack on the samehypervisor and enforcing the security polices over the Virtual Machine, when thereis an unauthorized move or Copy of Live VMs into malicious hypervisor.Monitoring preset data traffic rate between two VMs and Vswitch node helps toidentify uncertainty of VMs at a specific point of time.

Simulated results also shows that proposed model will reduce the risk associatedon the VM running on the suspected hypervisor in cloud.

9 Future Enhancements

Proposed model is focused on the live migration of single VM from one hypervisorto another hypervisor, in future case, cluster of VM’s running on hypervisor mayconsider for the secure group VM migration among different hypervisor.

Acknowledgement I dedicate this research paper to my research supervisor ProfDr. S. Rajalakshmi, Director Advanced Computing Centre, SCSVMV University for the supportand guidance throughout my research work.

References

1. Brohi, S.N., Bamiah, M.A., Brohi, M.N., Kamran, R.: Identifying and analyzing securitythreats to virtualized cloud computing infrastructures. In: Cloud ComputingTechnologies IEEE (2012)

2. Heen, O., Neumann, C., Montalvo, L., Defrance, S.: Improving the resistance to side-channelattacks on cloud storage services. In: New Technologies, Mobility and Security (NTMS),IEEE (2012)

3. Riquet, D., Grimaud, G., Hauspie, M.: Large-scale coordinated attacks: impact on the cloudsecurity. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012Sixth International Conference on IEEE, May 2012

4. Zhang, Y., Li, M., Bai, K., Yu, M., Zang, W.: Incentive compatible moving target defenseagainst VM-colocation attacks in clouds. In: Computer Science Department, VirginiaCommonwealth University, IBM T.J. Watson Research Center, USA (2012)

Table 3 Notations andoperation

S. No. Notation used Operation

1. VM Virtual machine

2. VSwitch Virtual switch

3. VRAM Virtual RAM memory

4. VsigID Virtual signature identity

5. GSigID Global signature identity

A Preventive Method for Host Level Security … 11