2019
DOI: 10.1016/j.procs.2019.01.204
|View full text |Cite
|
Sign up to set email alerts
|

Security Strategy for Virtual Machine Allocation in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…K-L Tsai et al presented the modified AES-based algorithm for power reduction in IoT using cloud computing applications [14]. In this paper, similarly, VM (virtual machine) allocation policy is used for security which is almost similar to the technique used in the previous work [36].…”
Section: Literature Reviewmentioning
confidence: 99%
“…K-L Tsai et al presented the modified AES-based algorithm for power reduction in IoT using cloud computing applications [14]. In this paper, similarly, VM (virtual machine) allocation policy is used for security which is almost similar to the technique used in the previous work [36].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, we give an estimation of the energy consumption by using a linear interpolation of the utilization change for a given time interval [10]. We adopt the definition from [24]. The formula is given in (9), where R k γ indicates the actual CPU proportion of the k th host under the allocation policy γ, N is the total number of hosts, and P max represents the maximum power that a host uses and 70% of power defines the minimum percentage of power a Host uses, even when it is if in idle mode.…”
Section: ) Performance Factorsmentioning
confidence: 99%
“…When using heuristic methods with the consideration of co-resident attacks, various policies were compared. Jia et al [23] proposed a VM allocation method to optimize load balancing and reduce energy consumption and security risks by managing CPU utilization of the hosting PMs. Miao et al offered two metrics to outline co-residency and conflict of the cloud [24].…”
Section: Related Work: Secure Cloud Resource Managementmentioning
confidence: 99%
“…An evolutionary mechanism was presented in the hierarchical cooperative game model for VMs deployment strategy to improve the efficiency in the public cloud environment. Jia et al modeled several basic VM allocation policies using game theory to achieve a quantitative analysis, while also presenting the attack effectiveness, coverage, power consumption, workload balance, and cost under the VM allocation policies and solving the mathematical solution in CloudSim [23]. Their results found that to reduce the efficiency rates for the attacker, the cloud provider should apply a probabilistic VM allocation policy.…”
Section: Related Work: Secure Cloud Resource Managementmentioning
confidence: 99%