2022
DOI: 10.21817/indjcse/2022/v13i4/221304159
|View full text |Cite
|
Sign up to set email alerts
|

A Heuristic Model for Securing Virtual Machine Migration During Attack Traces in Cloud Environment

Abstract: Various organizations and companies rely on the virtualized environment for running the applications. These sorts of applications require security policies and rigorous protection mechanisms. The significant challenge towards virtualized system availability is software aging which leads to the system collapsing or encounters some failure. Upgrading the software is the only way to handle the aging issues where the researchers recommend the use of VM migration to diminish the downtime. However, there is a gap in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…In recent years, to counter the security threats in cloud computing, major cloud providers have adopted various security protection mechanisms based on the characteristics of cloud platforms [1]. Cloud computing is a model for delivering ondemand computational resources and services named storage of data as well as computing power over the internet [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, to counter the security threats in cloud computing, major cloud providers have adopted various security protection mechanisms based on the characteristics of cloud platforms [1]. Cloud computing is a model for delivering ondemand computational resources and services named storage of data as well as computing power over the internet [2].…”
Section: Introductionmentioning
confidence: 99%
“…Each cloud user requests a set of VMs to run its application on a cloud data center, where VMs usually communicate with each other to process the International Journal of Intelligent Engineering and Systems, Vol.17, No. 1,2024 DOI: 10.22266/ijies2024.0229. 16 application [6].…”
Section: Introductionmentioning
confidence: 99%