Achieving cloud computing efficiency using VM Migration

Authors

  • Dr. Ankit Jagga Assistant Professor, Computer Science, Sri Guru Teg Bahadur Khalsa College for Girls, Aakar, Patiala

DOI:

https://doi.org/10.53573/rhimrj.2025.v12n1.033

Keywords:

Cloud Computing, VM Migration, Security.

Abstract

Cloud computing is a paradigm now days frequently used to access resources from shared pool. Resources are being accessed concurrently and hence waiting time is significantly reduced due to presence of simultaneous access. Malicious entry within cloud will be a threat required to be blocked and for this purpose cloud security consideration as a service is critical. Although cloud is supposed to possess infinite resources but still load or any of the malicious activity can cause virtual machine within cloud to fail. Virtual machine migration is initiated as the failure takes place within current virtual machine. This paper purposes a mechanism for enhancing security during migration of job to the targeted virtual machine. Redundancy tackling mechanism is present to tackle the similar content migration to targeted machine resulting in decrease in downtime and migration time. The result in terms of key size also show improvement than existing migration strategies.

References

Y. Sharma, B. Javadi, W. Si, and D. Sun, “Reliability and energy efficiency in cloud computing systems:

Survey and taxonomy,” J. Netw. Comput. Appl., vol. 74, pp. 66–85, 2016.

A. Paya and D. C. Marinescu, “Energy-aware Load Balancing and Application Scaling for the Cloud

Ecosystem,” vol. 7161, no. c, 2015.

B. Mills, T. Znati, and R. Melhem, “Shadow Computing: An energy-aware fault tolerant computing

model,” 2014 Int. Conf. Comput. Netw. Commun., pp. 73–77, 2014.

W. Leesakul, P. Townend, and J. Xu, “Dynamic Data Deduplication in Cloud Storage,” in 2014 IEEE

th International Symposium on Service Oriented System Engineering, 2014, pp. 320–325.

R. C. I. Egwutuoha, S. Chen, D. Levy, B. Selic, “Energy efficient fault tolerance for high performance

computing (hpc) in the cloud,” Sixth Int. Conf. Cloud Comput. (CLOUD), IEEE, , pp. 762–769, 2013.

K. N. Suchetha and H. S. Guruprasad, “Integration of IOT , Cloud and Big Data G LOBAL J OURNAL

OF E NGINEERING S CIENCE AND R ESEARCHES,” no. October, 2016.

N. Jain and K. Inderveer, “Energy-aware Virtual Machine Migration for Cloud Computing - A Firefly

Optimization Approach,” J. Grid Comput., 2016.

S. P. Mirashe and N. V Kalyankar, “Cloud Computing,” Commun. ACM, vol. 51, no. 7, p. 9, 2010.

V. Yadav, P. Malik, A. Kumar, and G. Sahoo, “Energy Efficient Data Center in Cloud Computing,” 2015

IEEE Int. Conf. Cloud Comput. Emerg. Mark., pp. 59–67, 2015.

Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme

over Encrypted Cloud Data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.

O. Rebollo, D. Mellado, and E. Fernandez-medina, “ISGcloud : a Security Governance Framework for

Cloud Computing,” IEEE Access, 2014.

K. Li, W. Zhang, C. Yang, and N. Yu, “Security Analysis on One-to-Many Order Preserving Encryption

Based Cloud data Search,” vol. 6013, no. c, pp. 1–9, 2015.

K. Govinda and E. Sathiyamoorthy, “Identity Anonymization and Secure Data Storage using Group

Signature in Private Cloud,” Procedia Technol., vol. 4, pp. 495–499, 2012.

S. Kaushik, “Cloud data security with hybrid symmetric encryption,” pp. 0–4, 2016.

M. Yang, K. Zheng, K. Chen, X. Zhang, B. Liu, and X. Guan, “Automatically configuring the network

layer of data centers for cloud computing,” vol. 55, no. 6, pp. 1–10, 2011.

P. Yellamma, C. Narasimham, and V. Sreenivas, “Data security in cloud using RSA,” 2013 4th Int. Conf.

Comput. Commun. Netw. Technol. ICCCNT 2013, 2013.

K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.

J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security considerations for cloud

supported Internet of Things,” vol. 4662, no. c, pp. 1–16, 2015.

J. Aikat, N. Carolina, J. S. Chase, A. Juels, C. Tech, T. Ristenpart, and C. Tech, “Rethinking Security in

the Era of Cloud Computing,” no. June, 2017.

V. Inukollu, S. Arsi, and S. Ravuri, “Security Issues Associated With Big Data in Cloud Computing,”

Airccse.Org, vol. 6, no. 3, pp. 45–56, 2014.

J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block Design-based Key Agreement for

Group Data Sharing in Cloud Computing,” IEEE Trans. Dependable Secur. Comput., vol. 5971, no. c,

pp. 1–15, 2017.

F. Sabahi, “Cloud Computing Security Threats and Responses,” pp. 245–249, 2011.

P. Pandey, P. Dhasal, and R. Pandit, “Implementation of RSA RC5 Algorithm in Cloud,” Int. J. Comput.

Sci. Inf. Technol., vol. 6, no. 1, pp. 224–227, 2015.

V. P. R. Jhawar, “Fault Tolerance and Resilience in Cloud Computing Environments,” Comput. Inf.

Secur. Handb., 2013.

G. Thomas, “Cloud computing security using encryption technique,” pp. 1–7.

O. Harfoushi, B. Alfawwaz, N. a. Ghatasheh, R. Obiedat, M. M. Abu-Faraj, and H. Faris, “Data Security

Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review,” Commun. Netw.,

vol. 06, no. 01, pp. 15–21, 2014.

T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation

Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367

, Feb. 2016.

L. Feinbube, L. Pirl, P. Troger, and A. Polze, “Software Fault Injection Campaign Generation for Cloud

Infrastructures,” 2017 IEEE Int. Conf. Softw. Qual. Reliab. Secur. Companion, pp. 622–623, 2017.

L. Gupta, M. Samaka, R. Jain, A. Erbad, D. Bhamare, and H. A. Chan, “Fault and Performance

Management in Multi-Cloud Based NFV using Shallow and Deep Predictive Structures,” 2017.

D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” IEEE Access, vol.

, no. 1, pp. 39–45, 2012.

M. Malik, A. P. Singh, and P. Narain, “To Enhance the Data Security of Cloud in Cloud Computing

Using Rsa Algorithm,” vol. 3, no. 7, pp. 8–11, 2017.

X. Zhou and L. Y. He, “A virtualized hybrid distributed file system,” Proc. - 2013 Int. Conf. Cyber

Enabled Distrib. Comput. Knowl. Discov. CyberC 2013, pp. 202–205, 2013.

D. Jung, S. Chin, K. S. Chung, and H. Yu, “VM Migration for Fault Tolerance in Spot Instance Based

Cloud Computing,” Ieee, pp. 142–151, 2013.

N. R. Katsipoulakis, K. Tsakalozos, and A. Delis, “Adaptive Live VM Migration in Share-Nothing IaaS

Clouds with LiveFS,” in 2013 IEEE 5th International Conference on Cloud Computing Technology and

Science, 2013, vol. 2, pp. 293–298.

L. Yao, G. Wu, J. Ren, Y. Zhu, and Y. Li, “Guaranteeing Fault-Tolerant Requirement Load Balancing

Scheme Based on VM Migration,” ieee, vol. 57, no. 2, 2014.

Z. Li, “Optimizing VM Live Migration Strategy Based On Migration Time Cost Modeling,” pp. 99–109,

M. R. Desai, “Efficient Virtual Machine Migration in Cloud Computing,” IEEE Access, no. Vm, pp. 1015

, 2015.

T. Jaswal, “An Enhanced Hybrid Approach for Reducing Downtime , Cost and Power Consumption of

Live VM Migration.”

W. Zhang, K. T. Lam, and C. L. Wang, “Adaptive Live VM Migration over a WAN: Modeling and

Implementation,” in 2014 IEEE 7th International Conference on Cloud Computing, 2014, pp. 368–375.

W. Lang, J. M. Patel, and J. F. Naughton, “On energy management, load balancing and replication,”

ACM SIGMOD Rec., vol. 38, no. 4, p. 35, 2010.

Downloads

Published

2025-01-15

How to Cite

Jagga, A. (2025). Achieving cloud computing efficiency using VM Migration . RESEARCH HUB International Multidisciplinary Research Journal, 12(1), 246–258. https://doi.org/10.53573/rhimrj.2025.v12n1.033