Three phase optimisation for qualified and secured VMs for resource allocation Online publication date: Tue, 11-Sep-2018
by D. Arivudainambi; D. Dhanya
International Journal of Enterprise Network Management (IJENM), Vol. 9, No. 3/4, 2018
Abstract: Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Enterprise Network Management (IJENM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com