{"title":"Three phase optimisation for qualified and secured VMs for resource allocation","authors":"D. Arivudainambi, D. Dhanya","doi":"10.1504/IJENM.2018.10015842","DOIUrl":null,"url":null,"abstract":"Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"273-293"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Enterprise Network Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJENM.2018.10015842","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Business, Management and Accounting","Score":null,"Total":0}
引用次数: 1
Abstract
Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions.