cs 18: e2

Research Article

Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN

Download19 downloads
  • @ARTICLE{10.4108/eai.7-6-2022.174150,
        author={Chanchal Antony and Manu A P},
        title={Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN},
        journal={EAI Endorsed Transactions on Cloud Systems: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={CS},
        year={2022},
        month={6},
        keywords={Cloud computing, Security breaches, Resource provisioning, Optimization, CloudSim, Artificial Neural networks, Virtual Machines},
        doi={10.4108/eai.7-6-2022.174150}
    }
    
  • Chanchal Antony
    Manu A P
    Year: 2022
    Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN
    CS
    EAI
    DOI: 10.4108/eai.7-6-2022.174150
Chanchal Antony1,*, Manu A P2
  • 1: Associate Professor, AJ Institute of Engineering & Technology,Mangaluru, Karnataka,575006
  • 2: Professor, PES Institute of Technology and Management, Shivamogga, Karnataka, 577204
*Contact email: antonychanchal@gmail.com

Abstract

Cloud computing is one of the active research areas in High Performance Computing. It helps to share the resources globally in a distributed manner. In this paper, hybrid ACO with ANN is designed to ensure the best and the secured VM consolidation process. Initially, the objectives constraints for power consumption, resource deterioration and the SLA parameters are modelled for the Physical Machines and Virtual Machines. The selection of VMs is explored by the concept of Ant Colony Optimization that select the best VMs by the predefined SLA parameters. Also, the eavesdropping attack is also modulated in the cloud shared environment. The proposed hybrid ACO with ANN is implemented in CloudSim and it’s compared with the honeybee with GA and PSO with GA. The simulation results have proved the efficiency of the VMs consolidation process with the security constraints in terms of time-related on uptime and downtime of the servers.