Achieving cloud computing efficiency using VM Migration
DOI:
https://doi.org/10.53573/rhimrj.2025.v12n1.033Keywords:
Cloud Computing, VM Migration, Security.Abstract
Cloud computing is a paradigm now days frequently used to access resources from shared pool. Resources are being accessed concurrently and hence waiting time is significantly reduced due to presence of simultaneous access. Malicious entry within cloud will be a threat required to be blocked and for this purpose cloud security consideration as a service is critical. Although cloud is supposed to possess infinite resources but still load or any of the malicious activity can cause virtual machine within cloud to fail. Virtual machine migration is initiated as the failure takes place within current virtual machine. This paper purposes a mechanism for enhancing security during migration of job to the targeted virtual machine. Redundancy tackling mechanism is present to tackle the similar content migration to targeted machine resulting in decrease in downtime and migration time. The result in terms of key size also show improvement than existing migration strategies.
References
Y. Sharma, B. Javadi, W. Si, and D. Sun, “Reliability and energy efficiency in cloud computing systems:
Survey and taxonomy,” J. Netw. Comput. Appl., vol. 74, pp. 66–85, 2016.
A. Paya and D. C. Marinescu, “Energy-aware Load Balancing and Application Scaling for the Cloud
Ecosystem,” vol. 7161, no. c, 2015.
B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing
model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.
W. Leesakul, P. Townend, and J. Xu, “Dynamic Data Deduplication in Cloud Storage,” in 2014 IEEE
th International Symposium on Service Oriented System Engineering, 2014, pp. 320–325.
R. C. I. Egwutuoha, S. Chen, D. Levy, B. Selic, “Energy efficient fault tolerance for high performance
computing (hpc) in the cloud,” Sixth Int. Conf. Cloud Comput. (CLOUD), IEEE, , pp. 762–769, 2013.
K. N. Suchetha and H. S. Guruprasad, “Integration of IOT , Cloud and Big Data G LOBAL J OURNAL
OF E NGINEERING S CIENCE AND R ESEARCHES,” no. October, 2016.
N. Jain and K. Inderveer, “Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly
Optimization Approach,” J. Grid Comput., 2016.
S. P. Mirashe and N. V Kalyankar, “Cloud Computing,” Commun. ACM, vol. 51, no. 7, p. 9, 2010.
V. Yadav, P. Malik, A. Kumar, and G. Sahoo, “Energy Efficient Data Center in Cloud Computing,” 2015
IEEE Int. Conf. Cloud Comput. Emerg. Mark., pp. 59–67, 2015.
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.
O. Rebollo, D. Mellado, and E. Fernandez-medina, “ISGcloud : a Security Governance Framework for
Cloud Computing,” IEEE Access, 2014.
K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption
Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.
K. Govinda and E. Sathiyamoorthy, “Identity Anonymization and Secure Data Storage using Group
Signature in Private Cloud,” Procedia Technol., vol. 4, pp. 495–499, 2012.
S. Kaushik, “Cloud data security with hybrid symmetric encryption,” pp. 0–4, 2016.
M. Yang, K. Zheng, K. Chen, X. Zhang, B. Liu, and X. Guan, “Automatically configuring the network
layer of data centers for cloud computing,” vol. 55, no. 6, pp. 1–10, 2011.
P. Yellamma, C. Narasimham, and V. Sreenivas, “Data security in cloud using RSA,” 2013 4th Int. Conf.
Comput. Commun. Netw. Technol. ICCCNT 2013, 2013.
K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.
J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security considerations for cloud
supported Internet of Things,” vol. 4662, no. c, pp. 1–16, 2015.
J. Aikat, N. Carolina, J. S. Chase, A. Juels, C. Tech, T. Ristenpart, and C. Tech, “Rethinking Security in
the Era of Cloud Computing,” no. June, 2017.
V. Inukollu, S. Arsi, and S. Ravuri, “Security Issues Associated With Big Data in Cloud Computing,”
Airccse.Org, vol. 6, no. 3, pp. 45–56, 2014.
J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block Design-based Key Agreement for
Group Data Sharing in Cloud Computing,” IEEE Trans. Dependable Secur. Comput., vol. 5971, no. c,
pp. 1–15, 2017.
F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.
P. Pandey, P. Dhasal, and R. Pandit, “Implementation of RSA RC5 Algorithm in Cloud,” Int. J. Comput.
Sci. Inf. Technol., vol. 6, no. 1, pp. 224–227, 2015.
V. P. R. Jhawar, “Fault Tolerance and Resilience in Cloud Computing Environments,” Comput. Inf.
Secur. Handb., 2013.
G. Thomas, “Cloud computing security using encryption technique,” pp. 1–7.
O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security
Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw.,
vol. 06, no. 01, pp. 15–21, 2014.
T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation
Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367
, Feb. 2016.
L. Feinbube, L. Pirl, P. Troger, and A. Polze, “Software Fault Injection Campaign Generation for Cloud
Infrastructures,” 2017 IEEE Int. Conf. Softw. Qual. Reliab. Secur. Companion, pp. 622–623, 2017.
L. Gupta, M. Samaka, R. Jain, A. Erbad, D. Bhamare, and H. A. Chan, “Fault and Performance
Management in Multi-Cloud Based NFV using Shallow and Deep Predictive Structures,” 2017.
D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” IEEE Access, vol.
, no. 1, pp. 39–45, 2012.
M. Malik, A. P. Singh, and P. Narain, “To Enhance the Data Security of Cloud in Cloud Computing
Using Rsa Algorithm,” vol. 3, no. 7, pp. 8–11, 2017.
X. Zhou and L. Y. He, “A virtualized hybrid distributed file system,” Proc. - 2013 Int. Conf. Cyber
Enabled Distrib. Comput. Knowl. Discov. CyberC 2013, pp. 202–205, 2013.
D. Jung, S. Chin, K. S. Chung, and H. Yu, “VM Migration for Fault Tolerance in Spot Instance Based
Cloud Computing,” Ieee, pp. 142–151, 2013.
N. R. Katsipoulakis, K. Tsakalozos, and A. Delis, “Adaptive Live VM Migration in Share-Nothing IaaS
Clouds with LiveFS,” in 2013 IEEE 5th International Conference on Cloud Computing Technology and
Science, 2013, vol. 2, pp. 293–298.
L. Yao, G. Wu, J. Ren, Y. Zhu, and Y. Li, “Guaranteeing Fault-Tolerant Requirement Load Balancing
Scheme Based on VM Migration,” ieee, vol. 57, no. 2, 2014.
Z. Li, “Optimizing VM Live Migration Strategy Based On Migration Time Cost Modeling,” pp. 99–109,
M. R. Desai, “Efficient Virtual Machine Migration in Cloud Computing,” IEEE Access, no. Vm, pp. 1015
, 2015.
T. Jaswal, “An Enhanced Hybrid Approach for Reducing Downtime , Cost and Power Consumption of
Live VM Migration.”
W. Zhang, K. T. Lam, and C. L. Wang, “Adaptive Live VM Migration over a WAN: Modeling and
Implementation,” in 2014 IEEE 7th International Conference on Cloud Computing, 2014, pp. 368–375.
W. Lang, J. M. Patel, and J. F. Naughton, “On energy management, load balancing and replication,”
ACM SIGMOD Rec., vol. 38, no. 4, p. 35, 2010.