2021
DOI: 10.1002/spy2.197
|View full text |Cite
|
Sign up to set email alerts
|

BlockchainBus: A lightweight framework for secure virtual machine migration in cloud federations using blockchain

Abstract: Cloud federations offer numerous advantages such as improved resilience, improved performance, and the prevention of vendor lock-in. In order to function efficiently, however, they must be supported by automated solutions to deploy cloud resources securely and efficiently. In particular, a system which allows virtual machine (VM) migration from one cloud to another while recording this for charging and security purposes is particularly useful. This paper presents a lightweight framework called BlockchainBus wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Edge AI refers to the use of AI algorithms and techniques on devices located at or near the edge of a network, such as on a mobile device, sensor, or IoT device, rather than relying on a central cloud server for processing [77]. This allows for faster and more efficient data processing, as well as improved privacy and security [78]. Fig.…”
Section: Edge Ai: Reshaping the Future Of Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Edge AI refers to the use of AI algorithms and techniques on devices located at or near the edge of a network, such as on a mobile device, sensor, or IoT device, rather than relying on a central cloud server for processing [77]. This allows for faster and more efficient data processing, as well as improved privacy and security [78]. Fig.…”
Section: Edge Ai: Reshaping the Future Of Edge Computingmentioning
confidence: 99%
“…The major challenge to Edge Computing is that of security for users who may have confidence in hardware from manufacturers they trust but have no access to the identities of other components: switches, routers and base stations in publicly accessible modes [114,131]. At the conceptual level, FC and MEC may develop different security protocols and policies because they face different threats and have different weaknesses [78], but advances in one paradigm will be valuable for others [219].…”
Section: Securitymentioning
confidence: 99%
“…Sabiri et al 16,32 strongly recommended using the ADM approach. ADM is currently considered the best legacy migrating strategy.…”
Section: Related Workmentioning
confidence: 99%
“…[86] NS-3 Consensus processing time, implementation cost (hardware implementation area), power consumption [87] N/A Storage cost [88] Python & NS-3 Storage cost, block propagation time, number of calculations [89] N/A Storage cost [90] Cooja Number of transactions mined, latency, consensus time, energy consumption [91] C The increment of the Flash and RAM memory occupation and the average network latency [92] Hyperledger Storage efficiency, computational cost, communication cost [93] Ethereum Computational complexity, communication overhead [94] N/A CPU usage, memory usage, transactions performance [95] Matlab Consensus algorithm complexity, consensus efficiency [96] N/A Transaction throughput, memory usage, CPU utilization, bandwidth consumption [97] N/A Resource utilization, consensus delay [98] Ethereum Blockchain size, CPU and memory overhead, storage latency, PKI latency [99] Ethereum Storage cost, computational cost [100] N/A Computational cost, communication overhead [101] Hyperledger Transactions per second, consensus delay, communication times [102] Hyperledger Transactions per second, scalability, storage cost, block weight N/A Transactions per second [103] Hyperledger Scalability, storage cost, transactions delay, processing time [104] N/A DAG consensus: cumulative weights, number of tips, simulation time [106] Python Transaction confirmation overhead, validation overhead [107] Matlab Operating capability under the symmetric and asymmetric information environments [108] Python Authentication delay, application delay, network usage and energy consumption [109] Ethereum Gas cost, response time [110] Python Storage overhead, consensus latency [111] Hyperledger Transfer speed, migration time [112] Ethereum Disk usage, memory allocation, CPU usage, throughput, power consumption [113] NS3 Cryptography computational cost [114] N/A Power consumption, CPU usage, block transmission cost, message transmission overhead [114] Java Computational cost, storage, communication overhead, consensus delay...…”
Section: A Lightweight Blockchain Technical Aspectsmentioning
confidence: 99%