Cloud Data-Center Network Verification: Approaches, Algorithms and Toolchains

Authors

  • Harsha Vardhan Reddy Kavuluri Wissen infotech Inc
  • Akhil Kumar Pathani Ebay
  • Ajay Dasari Microsoft
  • Venkata Kishore Chilakapati Microsoft
  • Srikanth Reddy Keshireddy Keen Info Tek Inc
  • Venkata Teja Nagumotu Techno-bytes Inc

DOI:

https://doi.org/10.47672/ajce.2889

Keywords:

Cloud Computing, Cloud Data-Center Networks, Computing Networks, Dynamic and Runtime Approaches, Network Verification

Abstract

The Cloud data center networks are the foundation of the modern cloud computing since they allow access to distributed virtualized resources on demand, at scale, and at reasonable costs. With the rapidly rising cloud services, however, new serious concerns have arisen that were associated with energy consumption, security, correctness, and reliability of the large-scale networked infrastructures. This paper gives a detailed analysis of verification methods in cloud data center networks, including static, dynamic and runtime verification methods. The techniques that can be used to identify configuration errors and policy errors before implementation are discussed as static techniques like header space analysis, SMT/SAT-based verification, and graph-based analysis. It is examined using dynamic and runtime methods, such as telemetry-based verification, invariant mining and misconfiguration detection methods to handle dynamic network behaviors and security threats over operational settings. The paper also covers the theoretical base of these techniques, and focus on SMT solvers, symbolic execution, and logical attestation to enforce correctness and access control. Moreover, the achieved tools chains and real-life applications of academic literature, industry cloud vendors, and open-source SDN environments are examined to reflect their strengths and weaknesses.

Downloads

Download data is not yet available.

References

[1] S. Garg, “Predictive Analytics and Auto Remediation using Artificial Inteligence and Machine learning in Cloud Computing Operations,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 7, no. 2, 2019, doi: 10.5281/zenodo.15362327.

[2] S. Singh, Y. S. Jeong, and J. H. Park, “A survey on cloud computing security: Issues, threats, and solutions,” J. Netw. Comput. Appl., 2016, doi: 10.1016/j.jnca.2016.09.002.

[3] Geeta, S. Gupta, and S. Prakash, “QoS and Load Balancing in Cloud Computing: An Approach for Performance Enhancement Using Agent-Based Software,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 11S, pp. 641–644, 2019.

[4] J. Park and J. Park, “Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions,” Symmetry (Basel)., vol. 9, no. 8, p. 164, Aug. 2017, doi: 10.3390/sym9080164.

[5] V. Matko, B. Brezovec, and M. Milanovič, “Intelligent Monitoring of Data Center Physical Infrastructure,” Appl. Sci., vol. 9, no. 23, 2019, doi: 10.3390/app9234998.

[6] V. Matko and B. Brezovec, “Improved Data Center Energy Efficiency and Availability with Multilayer Node Event Processing,” Energies, vol. 11, no. 9, 2018, doi: 10.3390/en11092478.

[7] S. Lee, K. Levanti, and H. S. Kim, “Network monitoring: Present and future,” Comput. Networks, vol. 65, pp. 84–98, Jun. 2014, doi: 10.1016/j.comnet.2014.03.007.

[8] S. Jose, “NSDI ’ 12 : 9th USENIX Symposium on Networked Systems Design and Implementation,” USENIX Assoc., 2012.

[9] C. Schöler, R. Krenz-Baath, A. Murshed, and R. Obermaisser, “Optimal SAT-based Scheduler for Time-Triggered Networks-on-a-Chip,” 2015. doi: 10.1109/SIES.2015.7185054.

[10] V. M. L. G. Nerella, “Automated cross-platform database migration and high availability implementation,” Turkish J. Comput. Math. Educ., vol. 9, no. 2, pp. 823–835, 2018.

[11] T. Uchiumi, S. Kikuchi, and Y. Matsumoto, “Misconfiguration detection for cloud datacenters using decision tree analysis,” in 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2012, pp. 1–4. doi: 10.1109/APNOMS.2012.6356072.

[12] Z. Á. Mann, “Allocation of Virtual Machines in Cloud Data Centers—A Survey of Problem Models and Optimization Algorithms,” ACM Comput. Surv., vol. 48, no. 1, Aug. 2015, doi: 10.1145/2797211.

[13] E. G. Sirer et al., “Logical attestation: an authorization architecture for trustworthy computing,” in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, Oct. 2011, pp. 249–264. doi: 10.1145/2043556.2043580.

[14] G. Fylaktopoulos, G. Goumas, M. Skolarikis, A. Sotiropoulos, and I. Maglogiannis, “An overview of platforms for cloud based development,” Springerplus, vol. 5, no. 1, p. 38, 2016, doi: 10.1186/s40064-016-1688-5.

[15] N. Paladi, “Towards Secure SDN Policy Management,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), IEEE, Dec. 2015, pp. 607–611. doi: 10.1109/UCC.2015.106.

[16] S. Majumdar et al., “User-Level Runtime Security Auditing for the Cloud,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 5, pp. 1185–1199, 2018, doi: 10.1109/TIFS.2017.2779444.

[17] Y. Li et al., “A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 940–969, 2019, doi: 10.1109/COMST.2018.2868050.

[18] J. Backes et al., “Reachability Analysis for AWS-Based Networks,” in Computer Aided Verification, I. Dillig and S. Tasiran, Eds., Cham: Springer International Publishing, 2019, pp. 231–241.

[19] K.-K. Yap et al., “Taking the Edge off with Espresso,” in Proceedings of the Conference of the ACM Special Interest Group on Data Communication, Aug. 2017, pp. 432–445. doi: 10.1145/3098822.3098854.

[20] E. Kaljic, A. Maric, P. Njemcevic, and M. Hadzialic, “A Survey on Data Plane Flexibility and Programmability in Software-Defined Networking,” IEEE Access, vol. 7, pp. 47804–47840, 2019, doi: 10.1109/ACCESS.2019.2910140.

[21] L. Freire, M. Neves, L. Leal, K. Levchenko, A. Schaeffer-Filho, and M. Barcellos, “Uncovering Bugs in P4 Programs with Assertion-based Verification,” in Proceedings of the Symposium on SDN Research, ACM, Mar. 2018, pp. 1–7. doi: 10.1145/3185467.3185499.

[22] L. Toka, B. Gema, and B. Sonkoly, “A stable matching method for cloud scheduling,” in 2019 IEEE 8th International Conference on Cloud Networking (CloudNet), 2019, pp. 1–6. doi: 10.1109/CloudNet47604.2019.9064121.

[23] S. Dai, A. Zhou, and S. Wang, “The Performance Evaluation of Virtual Machine Placement Algorithm Based on WebCloudSim,” in 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018, pp. 950–953. doi: 10.1109/CLOUD.2018.00143.

[24] A. H. M. Jakaria and M. A. Rahman, “A Formal Framework of Resource Management for VNFaaS in Cloud,” in 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, pp. 254–261. doi: 10.1109/CLOUD.2017.40.

[25] A. W. Malik et al., “CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++,” IEEE Trans. Serv. Comput., vol. 10, no. 4, pp. 506–519, 2017, doi: 10.1109/TSC.2015.2496164.

[26] S. Al Noor, R. Khan, M. Hossain, and R. Hasan, “Litigo: A Cost-Driven Model for Opaque Cloud Services,” in 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 2016, pp. 172–179. doi: 10.1109/CLOUD.2016.0032.

[27] F. Ma and L. Zhang, “Multi-objective optimization for dynamic virtual machine management in cloud data center,” in 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2015, pp. 170–174. doi: 10.1109/ICSESS.2015.7339030.

Attipalli, A., BITKURI, V., KURMA, J., Enokkaren, S., Kendyala, R., & Mamidala, J. V. (2021). A Survey of Artificial Intelligence Methods in Liquidity Risk Management: Challenges and Future Directions. Available at SSRN 5741342.

Attipalli, A., BITKURI, V., Mamidala, J. V., Kendyala, R., & KURMA, J. (2022). Empowering Cloud Security with Artificial Intelligence: Detecting Threats Using Advanced Machine learning Technologies. Available at SSRN 5741263.

Attipalli, A., Enokkaren, S., BITKURI, V., Kendyala, R., KURMA, J., & Mamidala, J. V. (2021). Enhancing Cloud Infrastructure Security Through AI-Powered Big Data Anomaly Detection. Available at SSRN 5741305.

Bitkuri, V., Kendyala, R., Kurma, J., Mamidala, V., Enokkaren, S. J., & Attipalli, A. (2021). Systematic Review of Artificial Intelligence Techniques for Enhancing Financial Reporting and Regulatory Compliance. International Journal of Emerging Trends in Computer Science and Information Technology, 2(4), 73-80.

Kothamaram, R. R., Rajendran, D., Namburi, V. D., Singh, A. A. S., Tamilmani, V., & Maniar, V. (2021). A Survey of Adoption Challenges and Barriers in Implementing Digital Payroll Management Systems in Across Organizations. International Journal of Emerging Research in Engineering and Technology, 2(2), 64-72.

Padur, S. K. R. (2018). Autonomous cloud economics: AI driven right sizing and cost optimization in hybrid infrastructures. International Journal of Scientific Research in Science and Technology, 4(5), 2090-2097.

Padur, S. K. R. (2019). Machine learning for predictive capacity planning: Evolution from analytical modeling to autonomous infrastructure. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 5(5), 285-293.

Padur, S. K. R. (2020). AI augmented disaster recovery simulations: From chaos engineering to autonomous resilience orchestration. International Journal of Scientific Research in Science, Engineering and Technology, 7(6), 367-378.

Padur, S. K. R. (2020). From centralized control to democratized insights: Migrating enterprise reporting from IBM Cognos to Microsoft Power BI. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, 6(1), 218-225.

Padur, S. K. R. (2021). Bridging Human, System, and Cloud Integration through RESTful Automation and Governance. the International Journal of Science, Engineering and Technology, 9(6).

Padur, S. K. R. (2021). Deep learning and process mining for ERP anomaly detection: Toward predictive and self-monitoring enterprise platforms. Available at SSRN 5605531

Padur, S. K. R. (2021). From Control to Code: Governance Models for Multi-Cloud ERP Modernization. International Journal of Scientific Research & Engineering Trends, 7(3).

Padur, S. K. R. (2022). AI augmented platform engineering, transforming developer experience through intelligent automation and self-optimizing internal platforms. International Journal of Science, Engineering and Technology, 10(5), 10-5281.

Padur, S. K. R. (2022). Intelligent resource management: AI methods for predictive workload forecasting in cloud data centers. J. Artif. Intell. Mach. Learn. & Data Sci, 1(1), 2936-2941.

Polam, R. M., Kamarthapu, B., Kakani, A. B., Nandiraju, S. K. K., Chundru, S. K., & Vangala, S. R. (2022). Data Security in Cloud Computing: Encryption, Zero Trust, and Homomorphic Encryption. International Journal of Emerging Trends in Computer Science and Information Technology, 3(4), 31-41.

Polu, A. R., Buddula, D. V. K. R., Narra, B., Gupta, A., Vattikonda, N., & Patchipulusu, H. (2021). Evolution of AI in Software Development and Cybersecurity: Unifying Automation, Innovation, and Protection in the Digital Age. Available at SSRN 5266517.

Rajendran, D., Namburi, V. D., Singh, A. A. S., Tamilmani, V., Maniar, V., & Kothamaram, R. R. (2021). Anomaly Identification in IoT-Networks Using Artificial Intelligence-Based Data-Driven Techniques in Cloud Environmen. International Journal of Emerging Trends in Computer Science and Information Technology, 2(2), 83-91.

Reddy Padur, S. K. (2021). From Scripts to Platforms-as-Code: The Role of Terraform and Ansible in Declarative Infrastructure Rollouts. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 621-628.

Routhu, K. K. (2021). Harnessing AI Dashboards in Oracle Cloud HCM: Advancing Predictive Workforce Intelligence and Managerial Agility. International Journal of Scientific Research & Engineering Trends, 7(6).

Routhu, K. K. (2022). From Case Management to Conversational HR: Redefining Help Desks with Oracle’s AI and NLP Framework. International Journal of Science, Engineering and Technology, 10(6).

Routhu, K. K. (2022). From RFID to Geofencing: IoT-Enabled Smart Time Tracking in Oracle HCM Cloud. International Journal of Science, Engineering and Technology, 10(4).

Singh, A. A. S., Tamilmani, V., Maniar, V., Kothamaram, R. R., Rajendran, D., & Namburi, V. D. (2021). Predictive Modeling for Classification of SMS Spam Using NLP and ML Techniques. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 2(4), 60-69.

Vattikonda, N., Gupta, A. K., Polu, A. R., Narra, B., Buddula, D. V. K. R., & Patchipulusu, H. H. S. (2022). Blockchain Technology in Supply Chain and Logistics: A Comprehensive Review of Applications, Challenges, and Innovations. International Journal of Emerging Trends in Computer Science and Information Technology, 3(3), 72-80.

Downloads

Published

2023-10-27

How to Cite

Kavuluri, H. V. R., Pathani, A. K., Dasari, A., Chilakapati, V. K., Keshireddy, S. R., & Nagumotu, V. T. (2023). Cloud Data-Center Network Verification: Approaches, Algorithms and Toolchains. American Journal of Computing and Engineering, 6(2), 18–32. https://doi.org/10.47672/ajce.2889

Issue

Section

Articles