Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Infantia, H. Niroshinia; * | Anbuananth, C.b | Kalarani, S.a
Affiliations: [a] Information Technology, St. Joseph’s Institute of Technology, Chennai, Tamil Nadu, India | [b] Computer Science and Engineering, Annamalai University, Tamil Nadu, India
Correspondence: [*] Corresponding author: H. Niroshini Infantia, Research Scholar, Information Technology, St. Joseph's Institute of Technology, Chennai, Tamil Nadu, India. E-mail: niroshininfantia89@gmail.com.
Abstract: The virtualization of hardware resources like network, memory and storage are included in the core of cloud computing and are provided with the help of Virtual Machines (VM). The issues based on reliability and security reside in its acceptance in the cloud environment during the migration of VMs. VM migration highly enhanced the manageability, performance, and fault tolerance of cloud systems. Here, a set of tasks submitted by various users are arranged in the virtual cloud computing platform by using a set of VMs. Energy efficiency is effectively attained with the help of a loadbalancing strategy and it is a critical issue in the cloud environment. During the migration of VMs, providing high security is a very important task in the cloud environment. To resolve such challenges, an effective method is proposed using an optimal key-based encryption process. The main objective of this research work is to perform the VM migration and derive the multi-objective constraints with the help of hybrid heuristic improvement. The optimal VM migration is achieved by the hybrid algorithm as Improved Binary Battle Royale with Moth-flame Optimization (IBinBRMO). It can also be used to derive the multi-objective functions by some constraints like resource utilization, active servers, makespan, energy consumption, etc. After VM migration, the data transmission should take place securely between the source and destination. To secure the data, the HybridHomophorphic and Advanced Encryption Standard(HH-AES) Algorithm, where IBinBRMO optimizes the key. After optimizing the keys, the data are securely transformed along with multi-objective functions using parameters includingthe degree of modification, hiding failure rate and information preservation rate. Thus, the effectiveness is guaranteed and analyzed with other classical models. Hence, the results illustrate that the proposed work attains better performance.
Keywords: Virtual machine migration, derived multi-objective constraints, improved binary battle royale with moth-flame optimization, secured data transmission, hybrid homophorphic and advanced encryption standard
DOI: 10.3233/IDT-230264
Journal: Intelligent Decision Technologies, vol. 17, no. 4, pp. 983-1006, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl