2017 3rd International Conference on Advances in Computing,Communication &Amp; Automation (ICACCA) (Fall) 2017
DOI: 10.1109/icaccaf.2017.8344674
|View full text |Cite
|
Sign up to set email alerts
|

Best Fit Sharing and Power Aware (BFSPA) Algorithm for VM placement in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Memory repositories, operating processes, and transmission capacity on the web are included in cloud resources. (d) Quick Flexibility: Facilities provided by the cloud are flexible enough to be provided and released, correspondingly rapidly outside and inside comparative according to the need of user [40,41].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Memory repositories, operating processes, and transmission capacity on the web are included in cloud resources. (d) Quick Flexibility: Facilities provided by the cloud are flexible enough to be provided and released, correspondingly rapidly outside and inside comparative according to the need of user [40,41].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Smart devices are the controlling devices or the devices which give instruction and other devices are the slave devices that perform tasks that are to be instructed or programmed by the controlling module. This system requires that all the devices are to be connected to the cloud all the time for remote access of the system and to synchronize the devices so the functionality should not be compromised [46][47][48]. It has features like notification of urgent calls and messages over laptop or web application if a smartphone is not in reach or the music is loud and your ringtone or notification tone is not audible, etc.…”
Section: Proposed Modelmentioning
confidence: 99%
“…AES keys are encrypted with the RSA algorithm and stored on an internal server Encryption comes from the Greek word kryptos, which means hidden or secret. Data confidentiality can be a very critical aspect of data transfer [59]. Encryption hides information.…”
Section: Data Security Modelmentioning
confidence: 99%