An iot-centric data protection method for preserving security and privacy in cloud
A malevolent utility provider may extract outsourced data from the cloud while storing,
analyzing, and sharing the data among the involved entities to acquire sensitive information …
analyzing, and sharing the data among the involved entities to acquire sensitive information …
Performance analysis of machine learning centered workload prediction models for cloud
The precise estimation of resource usage is a complex and challenging issue due to the
high variability and dimensionality of heterogeneous service types and dynamic workloads …
high variability and dimensionality of heterogeneous service types and dynamic workloads …
A bio-inspired virtual machine placement toward sustainable cloud resource management
Virtual machine placement (VMP) is the process of selecting the most appropriate physical
machine (PM) to place users' requested virtual machine (VM) in large cloud data centers …
machine (PM) to place users' requested virtual machine (VM) in large cloud data centers …
An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity
Cloud virtualization technology, ingrained with physical resource sharing, prompts
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
A high availability management model based on VM significance ranking and resource estimation for cloud applications
Massive upsurge in cloud resource usage stave off service availability resulting into
outages, resource contention, and excessive power-consumption. The existing approaches …
outages, resource contention, and excessive power-consumption. The existing approaches …
Emerging vm threat prediction and dynamic workload estimation for secure resource management in industrial clouds
The inefficient sharing of industrial cloud resour-ces among multiple users and
vulnerabilities of virtual machines (VM) s and servers prompt unauthorized access to users' …
vulnerabilities of virtual machines (VM) s and servers prompt unauthorized access to users' …
A comprehensive survey on sustainable resource management in cloud computing environments
Sustainable resource management within a cloud computing environment is a highly critical
and prominently studied research topic. In this context, this paper presented a …
and prominently studied research topic. In this context, this paper presented a …
A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment
The primary aim of Virtual Machine Placement (VMP) is the map** of Virtual Machines
(VMs) to Physical Machines (PMs), such that the PMs may be utilized to their maximum …
(VMs) to Physical Machines (PMs), such that the PMs may be utilized to their maximum …
A sustainable and secure load management model for green cloud data centres
The massive upsurge in cloud resource demand and inefficient load management stave off
the sustainability of Cloud Data Centres (CDCs) resulting in high energy consumption …
the sustainability of Cloud Data Centres (CDCs) resulting in high energy consumption …
Compendium of data security in cloud storage by applying hybridization of encryption algorithm
This paper is about preserving the Cloud data whose idea is to cure everyday problems with
computing. Cloud computing is fundamentally pooling the resources virtually and the …
computing. Cloud computing is fundamentally pooling the resources virtually and the …