Fiber optic communication is a part of optical communication where the data is transmitted and received via optical cables. It is widely used due to its advantages over traditional communication systems. Security is considered as a main concern in any communication systems. Since fiber optics transfers data efficiently for longer distances, an end to end secured fiber optic communication is very difficult. Advanced encryption Standard (AES) is a symmetrical encryption algorithm which founds to be more secure, faster and stronger where tapping of data is not quite easy. As the cyber attacks are continuously developing, AES algorithm is broken by some attacks namely brute force, differential, algebraic and linear attacks. To overcome the limitations of AES algorithm, a new enhanced AES algorithm abbreviated as EAES algorithm is proposed for secured fiber optic communication. EAES differs from AES algorithm in two ways: Dynamic Key Generation and Dynamic s-box generation. It increases the complexity to break the encryption process and also makes it more difficult for the attacker to hack the data. The proposed EAES algorithm is simulated and the results are analyzed in terms of throughput and conversion time. The results show that the EAES method attains higher end to end security in fiber optic communication.
Cloud Computing provides various services to the customer in a flexible and reliable manner. Virtual Machines (VM) are created from physical resources of the data center for handling huge number of requests as a task. These tasks are executed in the VM at the data center which needs excess hosts for satisfying the customer request. The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time. This process is carried out based on various algorithms which follow a predefined capacity of source VM leads to the capacity issue at the destination VM. The proposed VM migration technique performs the migration process based on the request of the requesting host machine. This technique can perform in three ways namely single VM migration, Multiple VM migration and Cluster VM migration. Common Deployment Manager (CDM) is used to support through negotiation that happens across the source host and destination host for providing the high quality service to their customer. The VM migration requests are handled with an exposure of the source host capabilities. The proposed analysis also uses the retired instructions with execution by the hypervisor to achieve high reliability. The objective of the proposed technique is to perform a VM migration process based on the prior knowledge of the resource availability in the target VM.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.