Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    A Multi-Objective Secure Optimal VM Placement in Energy-Efficient Server of Cloud Computing

    Sangeetha Ganesan*, Sumathi Ganesan

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 387-401, 2021, DOI:10.32604/iasc.2021.019024 - 11 August 2021

    Abstract Cloud Computing has been economically famous for sharing the resources of third-party applications. There may be an increase in the exploitation of the prevailing Cloud resources and their vulnerabilities as a result of the aggressive growth of Cloud Computing. In the Cache Side Channel Attack (CSCA), the attackers can leak sensitive information of a Virtual Machine (VM) which is co-located in a physical machine due to inadequate logical isolation. The Cloud Service Provider (CSP) has to modify either at the hardware level to isolate their VM or at the software, level to isolate their applications.… More >

  • Open Access

    ARTICLE

    A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing

    Sohan Kumar Pande1, Sanjaya Kumar Panda2, Satyabrata Das1, Kshira Sagar Sahoo3, Ashish Kr. Luhach4, N. Z. Jhanjhi5,*, Roobaea Alroobaea6, Sivakumar Sivanesan5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2647-2663, 2021, DOI:10.32604/cmc.2021.015026 - 05 February 2021

    Abstract In recent years, vehicular cloud computing (VCC) has gained vast attention for providing a variety of services by creating virtual machines (VMs). These VMs use the resources that are present in modern smart vehicles. Many studies reported that some of these VMs hosted on the vehicles are overloaded, whereas others are underloaded. As a circumstance, the energy consumption of overloaded vehicles is drastically increased. On the other hand, underloaded vehicles are also drawing considerable energy in the underutilized situation. Therefore, minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded… More >

  • Open Access

    ARTICLE

    An Enhanced Decentralized Virtual Machine Migration Approach for Energy-Aware Cloud Data Centers

    R. Jayamala*, A. Valarmathi

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 347-358, 2021, DOI:10.32604/iasc.2021.012401 - 18 January 2021

    Abstract Cloud computing is an increasingly important technology to deliver pay-as-you-go online computing services. In this study, the cloud service provider permits the cloud user to pay according to the user’s needs. Various methods have been used to reduce energy utilization in the cloud. The rapid increase of cloud users has led to increased energy consumption and higher operating costs for cloud providers. A key issue in cloud data centers is their massive energy consumption to operate and maintain computing services. Virtual machine (VM) migration is a method to reduce energy consumption. This study proposes enhanced More >

  • Open Access

    ARTICLE

    Big Data of Home Energy Management in Cloud Computing

    Rizwan Munir1,*, Yifei Wei1, Rahim Ullah2, Iftikhar Hussain3, Kaleem Arshid4, Umair Tariq1

    Journal of Quantum Computing, Vol.2, No.4, pp. 193-202, 2020, DOI:10.32604/jqc.2020.016151 - 07 January 2021

    Abstract A smart grid is the evolved form of the power grid with the integration of sensing, communication, computing, monitoring, and control technologies. These technologies make the power grid reliable, efficient, and economical. However, the smartness boosts the volume of data in the smart grid. To obligate full benefits, big data has attractive techniques to process and analyze smart grid data. This paper presents and simulates a framework to make sure the use of big data computing technique in the smart grid. The offered framework comprises of the following four layers: (i) Data source layer, (ii) More >

  • Open Access

    ARTICLE

    Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters

    Muhammad Abdullah1,*, Saad Ahmad Khan1, Mamdouh Alenez2, Khaled Almustafa3, Waheed Iqbal1

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 13-25, 2020, DOI:10.31209/2018.100000047

    Abstract An efficient placement of virtual machines (VMs) in a cloud datacenter is important to maximize the utilization of infrastructure. Most of the existing work maximises the number of VMs to place on a minimum number of physical machines (PMs) to reduce energy consumption. Recently, big data applications become popular which are mostly hosted on cloud datacenters. Big data applications are deployed on multiple VMs and considered data and communication intensive applications. These applications can consume most of the datacenter bandwidth if VMs do not place close to each other. In this paper, we investigate the More >

  • Open Access

    ARTICLE

    Virtual Machine Based on Genetic Algorithm Used in Time and Power Oriented Cloud Computing Task Scheduling

    Tongmao Ma1,2, Shanchen Pang1, Weiguang Zhang1, Shaohua Hao1

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 605-613, 2019, DOI:10.31209/2019.100000115

    Abstract In cloud computing, task scheduling is a challenging problem in cloud data center, and there are many different kinds of task scheduling strategies. A good scheduling strategy can bring good effectiveness, where plenty of parameters should be regulated to achieve acceptable performance of cloud computing platform. In this work, combined elitist strategy, three parameters values oriented genetic algorithms are proposed. Specifically, a model built by Generalized Stochastic Petri Nets (GSPN) is introduced to describe the process of scheduling in cloud datacenter, and then the workflow of the algorithms is showed. After that, the effectiveness of More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation… More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI:10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on… More >

Displaying 31-40 on page 4 of 38. Per Page