Three phase optimisation for qualified and secured VMs for resource allocation
D. Arivudainambi and
D. Dhanya
International Journal of Enterprise Network Management, 2018, vol. 9, issue 3/4, 273-293
Abstract:
Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured virtual machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimisation techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimised resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VM's to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyse network traffic and to monitor the data transactions.
Keywords: virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimisation technique. (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=94668 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijenma:v:9:y:2018:i:3/4:p:273-293
Access Statistics for this article
More articles in International Journal of Enterprise Network Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().