scholarly journals Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment

2017 ◽  
Vol 08 (01) ◽  
pp. 1-7 ◽  
Author(s):  
Ahmad Fayez S. Althobaiti
2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


2020 ◽  
Vol 17 (6) ◽  
pp. 2430-2434
Author(s):  
R. S. Rajput ◽  
Dinesh Goyal ◽  
Rashid Hussain ◽  
Pratham Singh

The cloud computing environment is accomplishing cloud workload by distributing between several nodes or shift to the higher resource so that no computing resource will be overloaded. However, several techniques are used for the management of computing workload in the cloud environment, but still, it is an exciting domain of investigation and research. Control of the workload and scaling of cloud resources are some essential aspects of the cloud computing environment. A well-organized load balancing plan ensures adequate resource utilization. The auto-scaling is a technique to include or terminate additional computing resources based on the scaling policies without involving humans efforts. In the present paper, we developed a method for optimal use of cloud resources by the implementation of a modified auto-scaling feature. We also incorporated an auto-scaling controller for the optimal use of cloud resources.


2019 ◽  
Vol 8 (S1) ◽  
pp. 80-83
Author(s):  
J. VimalRosy ◽  
S. Britto Ramesh Kumar

Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.


2020 ◽  
Vol 20 (1) ◽  
pp. 36-52
Author(s):  
C. Vijaya ◽  
P. Srinivasan

AbstractThe goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.


Author(s):  
Abdullahi Abubakar ◽  
Alhaji Idi Babate ◽  
Abdulhakeem Ishola ◽  
Asma’u Muhammad Sani

Cloud computing holds the possibility to annihilate the needs for setting up of costly computing infrastructure for IT-based services and proffering IT Solutions.  It offers an adaptable IT architecture which is accessible via the internet for lightweight and hand-held compact gadgets. The concept has encouraged numerous folds to improve in the capacity or capabilities of the existing and new software. In the cloud computing environment, the whole data/information is available over a set of networked resources, empowering the information to be accessible via virtual machines. Considering the fact that the cloud computing server may be located in any part of the world beyond the reach and control of users, there are various security issues and privacy challenges that need to be clearly understood with a view to identifying how to mitigate them.  Likewise, there are possibilities of the imminent breakdown of servers which have been witnessed in recent times. This research addresses the security issues connected with cloud computing, provides analysis of the militating factors against the successful implementation of cloud computing and proffers useful recommendations on how to ameliorate identified issues.


Sign in / Sign up

Export Citation Format

Share Document