About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
cs 22(22): e2

Research Article

Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN

Download142 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.7-6-2022.174150,
        author={Chanchal Antony and Manu A P},
        title={ Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN},
        journal={EAI Endorsed Transactions on Cloud Systems},
        volume={7},
        number={22},
        publisher={EAI},
        journal_a={CS},
        year={2022},
        month={6},
        keywords={Cloud computing, Security breaches, Resource provisioning, Optimization, CloudSim, Artificial Neural networks, Virtual Machines},
        doi={10.4108/eai.7-6-2022.174150}
    }
    
  • Chanchal Antony
    Manu A P
    Year: 2022
    Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN
    CS
    EAI
    DOI: 10.4108/eai.7-6-2022.174150
Chanchal Antony1,*, Manu A P2
  • 1: AJ Institute of Engineering & Technology
  • 2: PES University
*Contact email: antonychanchal@gmail.com

Abstract

Cloud computing is one of the active research areas in High Performance Computing. It helps to share the resources globally in a distributed manner. In this paper, hybrid ACO with ANN is designed to ensure the best and the secured VM consolidation process. Initially, the objectives constraints for power consumption, resource deterioration and the SLA parameters are modelled for the Physical Machines and Virtual Machines. The selection of VMs is explored by the concept of Ant Colony Optimization that select the best VMs by the predefined SLA parameters. Also, the eavesdropping attack is also modulated in the cloud shared environment. The proposed hybrid ACO with ANN is implemented in CloudSim and it’s compared with the honeybee with GA and PSO with GA. The simulation results have proved the efficiency of the VMs consolidation process with the security constraints in terms of time-related on uptime and downtime of the servers.

Keywords
Cloud computing, Security breaches, Resource provisioning, Optimization, CloudSim, Artificial Neural networks, Virtual Machines
Received
2022-04-05
Accepted
2022-06-01
Published
2022-06-07
Publisher
EAI
http://dx.doi.org/10.4108/eai.7-6-2022.174150

Copyright © 2022 Chanchal Antony et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL