Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud

Author(s):  
Yosr Jarraya ◽  
Arash Eghtesadi ◽  
Mourad Debbabi ◽  
Ying Zhang ◽  
Makan Pourzandi
Author(s):  
Shailendra Raghuvanshi ◽  
Priyanka Dubey

Load balancing of non-preemptive independent tasks on virtual machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, we propose an algorithm named honey bee behavior inspired load balancing, which aims to achieve well balanced load across virtual machines for maximizing the throughput. The proposed algorithm also balances the priorities of tasks on the machines in such a way that the amount of waiting time of the tasks in the queue is minimal. We have compared the proposed algorithm with existing load balancing and scheduling algorithms. The experimental results show that the algorithm is effective when compared with existing algorithms. Our approach illustrates that there is a significant improvement in average execution time and reduction in waiting time of tasks on queue using workflowsim simulator in JAVA.


2016 ◽  
Vol 136 (6) ◽  
pp. 858-867
Author(s):  
Hitoshi Kamei ◽  
Osamu Yashiro ◽  
Takaki Nakamura

Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


Vestnik MEI ◽  
2018 ◽  
pp. 98-105
Author(s):  
Alexander A. Larin ◽  
◽  
Leonid I. Abrosimov ◽  
Keyword(s):  

2001 ◽  
Author(s):  
Anand Chavan ◽  
Byoung Woo Min ◽  
Shiu-Kai Chin

2020 ◽  
Author(s):  
Himadri Biswas ◽  
Sudipta Sahana ◽  
Priyajit Sen ◽  
Debabrata Sarddar

Sign in / Sign up

Export Citation Format

Share Document