2023
DOI: 10.32604/cmc.2023.035161
|View full text |Cite
|
Sign up to set email alerts
|

Performance Framework for Virtual Machine Migration in Cloud Computing

Abstract: In the cloud environment, the transfer of data from one cloud server to another cloud server is called migration. Data can be delivered in various ways, from one data centre to another. This research aims to increase the migration performance of the virtual machine (VM) in the cloud environment. VMs allow cloud customers to store essential data and resources. However, server usage has grown dramatically due to the virtualization of computer systems, resulting in higher data centre power consumption, storage ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…The integration of cloud technology and wearable computing has been an active area of research and development in recent years, and there has been a growing body of literature exploring various aspects of these interactions [3]. Some of the key areas of focus include Cloud-based wearable applications: Researchers have been exploring the use of cloud technology to support various applications on wearable devices, such as health monitoring, fitness tracking, and entertainment.Wearable-cloud integration: Researchers have been investigating ways to optimize the interaction between wearable devices and cloud-based services, such as improving data transfer and synchronization, reducing latency, and enhancing security [4]. Big data analysis for wearable devices: Researchers are exploring how to use cloud technology to process, store, and analyze the large amounts of data generated by wearable devices [6].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The integration of cloud technology and wearable computing has been an active area of research and development in recent years, and there has been a growing body of literature exploring various aspects of these interactions [3]. Some of the key areas of focus include Cloud-based wearable applications: Researchers have been exploring the use of cloud technology to support various applications on wearable devices, such as health monitoring, fitness tracking, and entertainment.Wearable-cloud integration: Researchers have been investigating ways to optimize the interaction between wearable devices and cloud-based services, such as improving data transfer and synchronization, reducing latency, and enhancing security [4]. Big data analysis for wearable devices: Researchers are exploring how to use cloud technology to process, store, and analyze the large amounts of data generated by wearable devices [6].…”
Section: Related Workmentioning
confidence: 99%
“…For example, the transfer of large amounts of data between wearable devices and cloud-based resources can be slow and unreliable, leading to delays and disruptions in the user experience [3].In addition, the security of sensitive personal data stored and processed in the cloud is a major concern, and must be addressed to ensure user privacy and data protection. Despite these challenges, the future of cloud technology and wearable computing interaction is bright, with ongoing research and development in this field poised to deliver new innovations and breakthroughs in the years to come [4]. This research is exploring new approaches and solutions for integrating cloud technology and wearable computing, including new hardware and software designs, improved communication protocols, and enhanced security mechanisms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, in this paper, a variety of approaches have been studied in-depth with the purpose of better understanding to introduce the best model for detecting malware attacks in network security. The following detection model has been studied in this paper [4] • The investigation findings into the Attention Residual Network-based Visualization model show that the proposed method for identifying RGB and grayscale images has a greater accuracy rate. [5] •…”
Section: Malware Attacks Detection In Network Security Using Deepmentioning
confidence: 99%
“…However, this Data Security and multi-cloud Privacy concerns convenience comes with its own set of challenges. Cloud computing services are vulnerable to a variety of security threats, including data breaches, data loss, and unauthorized access [2].…”
Section: Introductionmentioning
confidence: 99%