2014 12th International Conference on Frontiers of Information Technology (FIT) (2014)
Dec. 17, 2014 to Dec. 19, 2014
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/FIT.2014.47
Cloud Computing is an emerging field of technology that relies on sharing of resources over the Internet to achieve economy of scales. It has gained momentum among both individuals and corporate sectors due to a variety of applications such as ease of administration, mobility and collaboration, reduction of hardware and licensing cost, and scalability. Researchers are also trying to explore and analyze the Cloud environment, but due to the lack of resources for performing large-scale experiments, they mostly rely on Cloud simulators. In this regards, several Cloud simulators have been developed to analyze different features as evaluation of fetching a virtual machine, power consumption of network equipment's, resource consumptions and allocation of memory. However, according to the best of our knowledge, none of these simulators provide any support for analyzing the security aspects of the Cloud. In this paper, we have designed and implemented a new Cloud simulator, entitled as secure Cloud Simulator (sec Cloud Sim). The sec Cloud Sim is an extension of existing iCan Cloud simulator, which provides the basic security features of authentication and authorization. After the successful implementation, we have evaluated the performance of sec Cloud Sim and iCan Cloud in terms of packet rate, processing time, response time, and time delay. Our performance evaluation results revealed that sec Cloud Sim has a low performance impact as compared to iCan Cloud. This low performance impact of sec Cloud Sim is due to the integration of security features to iCan Cloud architecture.
Cloud computing, Authentication, Clouds, Simulation, Virtual machining, Conferences,Simulator, Authentication, Cloud Computing, iCan Cloud, sec Cloud Sim, Security
Ubaid Ur Rehman, Amir Ali, Zahid Anwar, "secCloudSim: Secure Cloud Simulator", 2014 12th International Conference on Frontiers of Information Technology (FIT), vol. 00, no. , pp. 208-213, 2014, doi:10.1109/FIT.2014.47