Mitigating theft-of-service attack - Ensuring cloud security on virtual machines

2022 ◽  
Author(s):  
Waquib Rafique Baruah ◽  
R. Dhanalakshmi ◽  
S. Bairavel
2013 ◽  
Vol 336-338 ◽  
pp. 2035-2039
Author(s):  
Il Ahn Cheong ◽  
Seul Gi Lee ◽  
Kyung Ho Son

Service providers provide virtualized IT resources by using Internet technologies in their services. Users use the provided IT resources as much as they want and pay the corresponding fee. In such cloud computing environments, issues of malicious codes, hacking and leak of confidential information are the biggest concerns of the people involved. In this paper, we study the virtualization security management, which is important for the proper management of collection of virtualization resources information and security events, monitoring and analysis of cloud security situations, and cloud security policies. Specifically, we propose the structuring of the virtualization security management system and the management method to reduce the complexity of administering the virtual machines installed in the cloud data centers caused by the inherent properties of virtual machines characterized by dynamic changes in the form of image files. Therefore, we studied the tracing method for history of infected virtual machines following an analysis of the VM lifecycle status and VM running states.


Author(s):  
Shailendra Raghuvanshi ◽  
Priyanka Dubey

Load balancing of non-preemptive independent tasks on virtual machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, we propose an algorithm named honey bee behavior inspired load balancing, which aims to achieve well balanced load across virtual machines for maximizing the throughput. The proposed algorithm also balances the priorities of tasks on the machines in such a way that the amount of waiting time of the tasks in the queue is minimal. We have compared the proposed algorithm with existing load balancing and scheduling algorithms. The experimental results show that the algorithm is effective when compared with existing algorithms. Our approach illustrates that there is a significant improvement in average execution time and reduction in waiting time of tasks on queue using workflowsim simulator in JAVA.


Author(s):  
Tiejun Jia ◽  
Ximing Xiao ◽  
Fujie Zhang ◽  
Zhaohong Feng

2019 ◽  
Vol 7 (2) ◽  
pp. 342-348
Author(s):  
Vaishali Singh ◽  
Kavita Bhatia ◽  
S. K. Pandey

2018 ◽  
Vol 6 (5) ◽  
pp. 473-478
Author(s):  
K. K. Chauhan ◽  
◽  
◽  
A. K. S. Sanger

2014 ◽  
Vol 1 (1) ◽  
pp. 1-5
Author(s):  
Poonam Rawat ◽  
◽  
Neha Rawat ◽  
Shikha Singh ◽  
Awantika . ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document