To see the other types of publications on this topic, follow the link: Virtual machines security.

Journal articles on the topic 'Virtual machines security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Virtual machines security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bellovin, Steven M. "Virtual machines, virtual security?" Communications of the ACM 49, no. 10 (2006): 104. http://dx.doi.org/10.1145/1164394.1164414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Farhan, Mansoor, Kashif Saghar Dr., Uddin Agha Shahab, and Rehmat Sabir. "Virtual Machine's Network Security." LC International Journal of STEM 4, no. 3 (2023): 99–127. https://doi.org/10.5281/zenodo.10185182.

Full text
Abstract:
Network virtualization has become progressively unmistakable lately. It enables the creation of organizational frameworks that are expressly tailored to the requirements of distinctive organizational applications and facilitates the introduction of favorable circumstances for the occurrence and evaluation of new designs and conventions. Despite the extensive materiality of organizational virtualization, the widespread use of communication channels and steering devices raises a number of safety-related issues. To enable their use in real, large-scale settings, virtual organization foundations m
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Jing, Feng Zhi Zhao, and Yu Dan Dong. "Design on Virtual Machine Frame of Cloud Computing Platform." Advanced Materials Research 834-836 (October 2013): 1832–35. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1832.

Full text
Abstract:
In the framework of the virtual machine can be well applied to cloud computing platforms such as multi-level security environment for guest virtual machines and communication between the fine-grained access control to prevent malicious software attacks and the spread between the guest virtual machine. This paper presents a set of virtual machines framework for assurance in the cloud computing software services in the guest virtual machines user-level application security.
APA, Harvard, Vancouver, ISO, and other styles
4

Mattsson, Ulf. "Real security for virtual machines." Network Security 2009, no. 4 (2009): 15–17. http://dx.doi.org/10.1016/s1353-4858(09)70041-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.

Full text
Abstract:
In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.
APA, Harvard, Vancouver, ISO, and other styles
6

Dina, Mohsen Zoughbi, and Dutta Nitul. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 2 (2020): 42–48. https://doi.org/10.5281/zenodo.5835945.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
7

Raghavendran, R., and B. Ragupathi. "Update Checker: Increasing Virtual Machine Security in Cloud Environments." Applied Mechanics and Materials 513-517 (February 2014): 1268–73. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1268.

Full text
Abstract:
A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permissions to customers eases the installation and use of user software, but it may lead to security issues. The providers usually delegate the task of keeping virtual machines up to date to the customers, while the customers expect the providers to perform this task. Consequently, a large number of virtual machines (either running or dormant) are not patched against the latest software vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Ruirui, and Xin Xiao. "Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment." Mobile Information Systems 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/2301970.

Full text
Abstract:
Cloud computing platforms are usually based on virtual machines as the underlying architecture; the security of virtual machine systems is the core of cloud computing security. This paper presents an immune-based intrusion detection model in virtual machines of cloud computing environment, denoted as IB-IDS, to ensure the safety of user-level applications in client virtual machines. In the model, system call sequences and their parameters of processes are used, and environment information in the client virtual machines is extracted. Then the model simulates immune responses to ensure the state
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Zongyuan, Sergei Stepanenko, Jean Pichon-Pharabod, Amin Timany, Aslan Askarov, and Lars Birkedal. "VMSL: A Separation Logic for Mechanised Robust Safety of Virtual Machines Communicating above FF-A." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1438–62. http://dx.doi.org/10.1145/3591279.

Full text
Abstract:
Thin hypervisors make it possible to isolate key security components like keychains, fingerprint readers, and digital wallets from the easily-compromised operating system. To work together, virtual machines running on top of the hypervisor can make hypercalls to the hypervisor to share pages between each other in a controlled way. However, the design of such hypercall ABIs remains a delicate balancing task between conflicting needs for expressivity, performance, and security. In particular, it raises the question of what makes the specification of a hypervisor, and of its hypercall ABIs, good
APA, Harvard, Vancouver, ISO, and other styles
10

Rachana, S. C., and H. S. Guruprasad. "Virtual Machine Introspection." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 860–67. https://doi.org/10.5281/zenodo.14742634.

Full text
Abstract:
Cloud computing is an Internet-based computing solution which provides the resources in an effective manner. A very serious issue in cloud computing is security which is a major obstacle for the adoption of cloud. The most important threats of cloud computing are Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attacks, malicious insiders, etc. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues. Thus, monitoring of virtual machine is essential. The paper proposes a Virtual Network Introspection [VMI] System to secu
APA, Harvard, Vancouver, ISO, and other styles
11

Hetzelt, Felicitas, and Robert Buhren. "Security Analysis of Encrypted Virtual Machines." ACM SIGPLAN Notices 52, no. 7 (2017): 129–42. http://dx.doi.org/10.1145/3140607.3050763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

England, Paul, and John Manferdelli. "Virtual machines for enterprise desktop security." Information Security Technical Report 11, no. 4 (2006): 193–202. http://dx.doi.org/10.1016/j.istr.2006.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss
APA, Harvard, Vancouver, ISO, and other styles
14

Anitha, H. M., and P. Jayarekha. "An Software Defined Network Based Secured Model for Malicious Virtual Machine Detection in Cloud Environment." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 526–30. http://dx.doi.org/10.1166/jctn.2020.8481.

Full text
Abstract:
Cloud computing is an emerging technology that offers the services to all the users as per their demand. Services are leveraged according to the Service level agreement (SLA). Service level agreement is monitored so that services are offered to the users without any problem and deprival. Software Defined Network (SDN) is used in order to monitor the trust score of the deployed Virtual Machines (VM) and Quality of Service (QoS) parameters offered. Software Defined Network controller is used to compute the trust score of the Virtual Machines and find whether Virtual Machine is malicious or trust
APA, Harvard, Vancouver, ISO, and other styles
15

Hasan, Waqas. "Virtual Machine Migration in Cloud Computing." Oriental journal of computer science and technology 14, no. 010203 (2022): 46–51. http://dx.doi.org/10.13005/ojcst14.010203.06.

Full text
Abstract:
Cloud computing provides multiple services to users through the internet and these services include cloud storage, applications, servers, security and large network access. Virtual Machine allows the user to emulate multiple operating systems on a single computer; with the help of virtual machine migration users can transfer operating system instances from one computer to multiple computer machines. In this paper we will be discussing VM migration in cloud and also I will explain the whole procedure of VM migration. The two methods through which we can perform VM migration are Live VM migratio
APA, Harvard, Vancouver, ISO, and other styles
16

Sanchez Rubio, Manuel, German Lopez Civera, and Jose Javier Martinez Herraiz. "Automatic Generation Of Virtual Machines For Security Training." IEEE Latin America Transactions 14, no. 6 (2016): 2795–800. http://dx.doi.org/10.1109/tla.2016.7555257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Researcher. "IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 351–65. https://doi.org/10.5281/zenodo.13828259.

Full text
Abstract:
Cloud computing is a prominent developing technology that primarily focuses on data storage and the provision of on-demand computer resources for diverse applications. Users may save their data on the cloud and access it quickly and effortlessly. The accessibility of cloud data from any location at any time has drawn many users to this technology; yet, a significant concern in this setting is the privacy of user data. The consolidation of many users' data in a single location raises concerns over data privacy among the users. Virtualization is a method used to provide a virtual environment for
APA, Harvard, Vancouver, ISO, and other styles
18

Kamoun-Abid, Ferdaous, Hounaida Frikha, Amel Meddeb-Makhoulf, and Faouzi Zarai. "Automating cloud virtual machines allocation via machine learning." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 1 (2024): 191. http://dx.doi.org/10.11591/ijeecs.v35.i1.pp191-202.

Full text
Abstract:
In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering
APA, Harvard, Vancouver, ISO, and other styles
19

Ferdaous, Kamoun-Abid Hounaida Frikha Amel Meddeb-Makhoulf Faouzi Zarai. "Automating cloud virtual machines allocation via machine learning." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 1 (2024): 191–202. https://doi.org/10.11591/ijeecs.v35.i1.pp191-202.

Full text
Abstract:
In the realm of healthcare applications leveraging cloud technology, ongoing progress is evident, yet current approaches are rigid and fail to adapt to the dynamic environment, particularly when network and virtual machine (VM) resources undergo modifications mid-execution. Health data is stored and processed in the cloud as virtual resources supported by numerous VMs, necessitating critical optimization of virtual node and data placement to enhance data application processing time. Network security poses a significant challenge in the cloud due to the dynamic nature of the topology, hindering
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Ji-Ming, Shi Chen, Xiang Wang, Lin Lin, and Li Wang. "A Virtual Machine Migration Strategy Based on the Relevance of Services against Side-Channel Attacks." Security and Communication Networks 2021 (December 21, 2021): 1–17. http://dx.doi.org/10.1155/2021/2729949.

Full text
Abstract:
With the rapid development of Internet of Things technology, a large amount of user information needs to be uploaded to the cloud server for computing and storage. Side-channel attacks steal the private information of other virtual machines by coresident virtual machines to bring huge security threats to edge computing. Virtual machine migration technology is currently the main way to defend against side-channel attacks. VM migration can effectively prevent attackers from realizing coresident virtual machines, thereby ensuring data security and privacy protection of edge computing based on the
APA, Harvard, Vancouver, ISO, and other styles
21

Hasan, Waqas. "A Survey on Virtual Machine Migration in Cloud Computing." International Journal of Scientific & Engineering Research 13, no. 03 (2022): 648–53. http://dx.doi.org/10.14299/ijser.2022.03.03.

Full text
Abstract:
Cloud computing provides multiple services to users through the internet and these services include cloud storage, applications, servers, security and large network access. Virtual Machine allows the user to emulate multiple operating systems on a single computer; with the help of virtual machine migration users can transfer operating system instances from one computer to multiple computer machines. In this paper we will be discussing VM migration in cloud and also I will explain the whole procedure of VM migration. The two methods through which we can perform VM migration are Live VM migratio
APA, Harvard, Vancouver, ISO, and other styles
22

Ally, Said. "Assessment of Web Security Vulnerabilities for Common Open Source Virtualization Software." Tanzania Journal of Engineering and Technology 43, no. 2 (2024): 92–107. http://dx.doi.org/10.52339/tjet.v43i2.925.

Full text
Abstract:
Open-source hypervisors have emerged as an integral technology for virtualizing server resources in cloud and data center computing. Hypervisor security efficiency is determined by virtual machine isolation, which is a de facto adoption factor in the selection process, as well as its ability to respond to web attacks. This paper assesses the security performance of Proxmox VE and XenServer for type 1 hypervisors, and Kernel Virtual Machine and Oracle Virtual Box for type 2 hypervisors. Security analysis was conducted using common exposures extracted from vulnerability databases and mapped agai
APA, Harvard, Vancouver, ISO, and other styles
23

Cheong, Il Ahn, Seul Gi Lee, and Kyung Ho Son. "A Study on the Virtualization Security Management in the Cloud Computing Environment." Applied Mechanics and Materials 336-338 (July 2013): 2035–39. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2035.

Full text
Abstract:
Service providers provide virtualized IT resources by using Internet technologies in their services. Users use the provided IT resources as much as they want and pay the corresponding fee. In such cloud computing environments, issues of malicious codes, hacking and leak of confidential information are the biggest concerns of the people involved. In this paper, we study the virtualization security management, which is important for the proper management of collection of virtualization resources information and security events, monitoring and analysis of cloud security situations, and cloud secu
APA, Harvard, Vancouver, ISO, and other styles
24

Tupakula, U. K., and V. Varadharajan. "Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines." Computer Journal 55, no. 4 (2011): 397–409. http://dx.doi.org/10.1093/comjnl/bxr084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ren, Xun Yi, and Yang Yu. "SELinux-Based Secure Server Virtualization." Advanced Materials Research 756-759 (September 2013): 2829–33. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2829.

Full text
Abstract:
Server virtualization is to create and run several independent operation systems at the same time to maximize the utilization efficiency and flexibility of IT resource, the most serious security problem of which, however, is the unauthorized access of unsafe virtual machines. This paper presents a SELinux-based secure server virtualization method against the issue. With SELinux access control, virtual machine process is isolated from system processes by setting up different type labels and access control policies. Whats more, different virtual machine processes can be independent with each oth
APA, Harvard, Vancouver, ISO, and other styles
26

V. Samuel Blessed Nayagam, P., and A. Shajin Nargunam. "Secure Data Verification and Virtual Machine Monitoring." International Journal of Engineering & Technology 7, no. 4.36 (2018): 574. http://dx.doi.org/10.14419/ijet.v7i4.36.24140.

Full text
Abstract:
Powerfully configurable virtualized assets make the physical area of the information and process autonomous of its portrayal and the clients have no influence over the physical arrangement of information and running procedure. In a multi-cloud condition the layer of deliberation between the physical equipment and virtualized frameworks gives a great way to convey cost reserve funds through server union and also expanded operational productivity and adaptability. This additional usefulness presents a virtualization layer that it turns into a chance of assault for the facilitated virtual adminis
APA, Harvard, Vancouver, ISO, and other styles
27

Szuster, Marcin, and Bartłomiej Kozioł. "Hidden Security Breaches in Automatic Control of Technological Processes." Pomiary Automatyka Robotyka 25, no. 2 (2021): 31–39. http://dx.doi.org/10.14313/par_240/31.

Full text
Abstract:
The progressing automation and robotization in the industrial plants as well as the increasing complexity of the control systems of integrated machines make it necessary to constantly improve the functional safety of machines through the correct validation of safety systems. Despite the validation process carried out, the potential software errors may reveal during the usage of the machine as hidden security breaches. The article presents examples of security breaches of real machine tools and attempts to implement solutions of automated mechanisms for detecting security problems. Another aspe
APA, Harvard, Vancouver, ISO, and other styles
28

N, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.

Full text
Abstract:
Cloud computing is a computing model for delivering resources in a convenient manner from a shared pool. The resources provisioned and released on an on-demand basis with minimal intervention of service provider. Cloud Computing is becoming the platform for all kind of web based services. Virtualization is the key concept to adopt the cloud computing. Virtualization offers many benefits comparing to real physical machine implementation infrastructure. Even though virtualization provides lots of benefits, it is also brings several security vulnerabilities. This paper presents the security breac
APA, Harvard, Vancouver, ISO, and other styles
29

Dong, Jian, Hui Zhu, Chao Song, Qiang Li, and Rui Xiao. "Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT." Wireless Communications and Mobile Computing 2018 (July 10, 2018): 1–11. http://dx.doi.org/10.1155/2018/5938152.

Full text
Abstract:
With the development of cloud computing technology and the proliferation of the Internet of Things (IoT) terminals, more and more scenes need the collaboration of virtual machines and IoT terminals to resolve. However, there are many severe challenges on the security of virtual machines and IoT terminals. Based on Bell-LaPadula Model (BLP), a task-oriented multilevel cooperative access control scheme virtualization and reality BLP, named VR-BLP, is proposed. Specifically, tasks are created for each user of the platform and tasks and users are divided into multiple levels to provide more granul
APA, Harvard, Vancouver, ISO, and other styles
30

Zardari, Munwar Ali, and Low Tang Jung. "Classification of File Data Based on Confidentiality in Cloud Computing using K-NN Classifier." International Journal of Business Analytics 3, no. 2 (2016): 61–78. http://dx.doi.org/10.4018/ijban.2016040104.

Full text
Abstract:
Cloud computing is a new paradigm model that offers different services to its customers. The increasing number of users for cloud services i.e. software, platform or infrastructure is one of the major reasons for security threats for customers' data. Some major security issues are highlighted in data storage service in the literature. Data of thousands of users are stored on a single centralized place where the possibility of data threat is high. There are many techniques discussed in the literature to keep data secure in the cloud, such as data encryption, private cloud and multiple clouds co
APA, Harvard, Vancouver, ISO, and other styles
31

Ashraf, Zeeshan, Adnan Sohail, and Muddesar Iqbal. "Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks." Electronics 13, no. 13 (2024): 2649. http://dx.doi.org/10.3390/electronics13132649.

Full text
Abstract:
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between peo
APA, Harvard, Vancouver, ISO, and other styles
32

Nemirajaiah, Naveen Kumar Adalagere, and Channa Krishna Raju. "Securing Virtual Machines using Cloning in Cloud Services." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 20770–75. https://doi.org/10.48084/etasr.9391.

Full text
Abstract:
Cloud Computing (CC) is now a service available to everyone, where all computing resources are made available as a service over the internet, based on the user's needs. Virtualization is a critical component of cloud services that significantly reduces costs and improves resource utilization by creating Virtual Machines (VMs), which are essentially virtual resources that can serve multiple users simultaneously. VMs are subject to security threats and attacks such as malware, and it is very important to create a secure environment for VMs to run seamlessly. In this novel strategy, we create clo
APA, Harvard, Vancouver, ISO, and other styles
33

Shambhu, Prasad Sah* Sanjeev Kumar Panjiyar Purushottam Das Ankur Singh Bist. "CLOUD RESOURCE VIRTUALIZATION TOWARDS SECURITY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 5 (2016): 305–9. https://doi.org/10.5281/zenodo.51427.

Full text
Abstract:
Cloud computing is an advanced technology or engineering  that increase IT technologies potentialities in terms of usage ,running, elastic resource(storage, computing power, servers, bandwidth etc) management and collaborative execution approach. The most critical aspect of cloud computing is cloud resource virtualization which is equally important for cloud providers and their subscribers. The resources comes in various forms such as client, applications, storage, server, network etc.. This paper focus as on how virtualization helps to improve security by protecting the integrity of virt
APA, Harvard, Vancouver, ISO, and other styles
34

Bhansali, Aayushi. "Cloud Security and Privacy." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1539–42. http://dx.doi.org/10.22214/ijraset.2023.55416.

Full text
Abstract:
Abstract: Over the last decade, cloud computing has grown and evolved significantly. It provides cost-effective solutions as well as a wide range of adaptable services. Many businesses are using cloud services. Users mostly use cloud services to save data in a virtual environment. Users have no knowledge of or influence over what happens in the cloud, and nothing in the cloud is visible to them, which raises security and privacy problems. Malicious administrators can mess with the integrity, privacy, virtual machines, and volatile confidentiality of cloud services. Clouds are vulnerable to hac
APA, Harvard, Vancouver, ISO, and other styles
35

E. C., ONUOHA, and AKOMOLAFE O. P. "INTER-AGENT COORDINATED SECURITY MODEL FOR CLOUD BASED VIRTUAL MACHINES." i-manager’s Journal on Cloud Computing 5, no. 2 (2018): 11. http://dx.doi.org/10.26634/jcc.5.2.15688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Shu, Zhaogang, Xiangmin Ji, and Yaohua Lin. "A hybrid security model for virtual machines in cloud environment." International Journal of Autonomous and Adaptive Communications Systems 10, no. 2 (2017): 236. http://dx.doi.org/10.1504/ijaacs.2017.084714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shu, Zhaogang, Yaohua Lin, and Xiangmin Ji. "A hybrid security model for virtual machines in cloud environment." International Journal of Autonomous and Adaptive Communications Systems 10, no. 2 (2017): 236. http://dx.doi.org/10.1504/ijaacs.2017.10005571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Fengzhe, and Haibo Chen. "Security-Preserving Live Migration of Virtual Machines in the Cloud." Journal of Network and Systems Management 21, no. 4 (2012): 562–87. http://dx.doi.org/10.1007/s10922-012-9253-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jyothi, G., Ch V. Bhargavi, G. Mani, Ch Usha Kumari, and E. Laxmi Lydia. "Analysis of Various Security Methods of Virtual Machines in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5368–77. http://dx.doi.org/10.1166/jctn.2020.9430.

Full text
Abstract:
Cloud computing can carry both software and hardware applications over the internet, based on the requirement of supplies and services. Hence it acts as the next generation network and computing easy of operations. Security is the at most significant also it influence the cloud computing. Virtualization is the imperative factor through cloud computing related to speed and accuracy. This research work concentrates on the safety of simulated system in virtualized situation. The security problems in virtual machines are summarized first, as well as the safety issues which are present in a virtual
APA, Harvard, Vancouver, ISO, and other styles
40

Lasota, Krzysztof, and Adam Kozakiewicz. "Model of User Access Control to Virtual Machines Based on RT-Family Trust Management Language with Temporal Validity Constraints – Practical Application." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2012): 13–21. http://dx.doi.org/10.26636/jtit.2012.3.1274.

Full text
Abstract:
The paper presents an application of an RT-family trust management language as a basis for an access control model. The discussion concerns a secure workstation running multiple virtual machines used to process sensitive information from multiple security domains, providing strict separation of the domains. The users may act in several different roles, with different access rights. The inference mechanisms of the language are used to translate credentials allowing users to access different functional domains, and assigning virtual machines to these domains into clear rules, regulating the righ
APA, Harvard, Vancouver, ISO, and other styles
41

TYMOSHCHUK, Dmytro, and Vasyl YATSKIV. "USING HYPERVISORS TO CREATE A CYBER POLYGON." MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, no. 3 (August 29, 2024): 52–56. http://dx.doi.org/10.31891/2219-9365-2024-79-7.

Full text
Abstract:
Cyber polygon used to train cybersecurity professionals, test new security technologies and simulate attacks play an important role in ensuring cybersecurity. The creation of such training grounds is based on the use of hypervisors, which allow efficient management of virtual machines, isolating operating systems and resources of a physical computer from virtual machines, ensuring a high level of security and stability. The paper analyses various aspects of using hypervisors in cyber polygons, including types of hypervisors, their main functions, and the specifics of their use in modelling cyb
APA, Harvard, Vancouver, ISO, and other styles
42

Subramanian N., Dr Venkata, and Dr Shankar Sriram V S. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.b1032.14020125.

Full text
Abstract:
Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual machine images. The primar
APA, Harvard, Vancouver, ISO, and other styles
43

Dr., Venkata Subramanian N. "Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 14, no. 2 (2025): 12–20. https://doi.org/10.35940/ijitee.B1032.14020125.

Full text
Abstract:
<strong>Abstract: </strong>Safeguarding virtual machines (VMs) during migration is essential to avert Service Level Agreement (SLA) violations. This research article presents a robust security framework that utilizes deep learning and advanced encryption methods to reduce the impact of Distributed Denial of Service (DDoS) attacks during virtual machine migration. The study introduces an Improved Sparrow Search Algorithm-based Deep Neural Network (ISSA-DNN) for the classification of DDoS attacks and utilizes Advanced Encryption Standard-Elliptic Curve Cryptography (AES-ECC) to safeguard virtual
APA, Harvard, Vancouver, ISO, and other styles
44

Chandrakala, N., and B. Thirumala Rao. "Migration of Virtual Machine to improve the Security of Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 210. http://dx.doi.org/10.11591/ijece.v8i1.pp210-219.

Full text
Abstract:
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation
APA, Harvard, Vancouver, ISO, and other styles
45

N., Chandrakala, and Thirumala Rao B. "Migration of Virtual Machine to improve the Security in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 1 (2018): 210–19. https://doi.org/10.11591/ijece.v8i1.pp210-219.

Full text
Abstract:
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation
APA, Harvard, Vancouver, ISO, and other styles
46

Michael, N. Aliguay, and I. Teleron Jerry. "Revolutionizing Computational Efficiency: A Comprehensive Analysis of Virtual Machine Optimization Strategies." Engineering and Technology Journal 9, no. 05 (2024): 4121–26. https://doi.org/10.5281/zenodo.11367817.

Full text
Abstract:
This study undertakes a systematic exploration of contemporary virtual machine optimization strategies, aiming to unravel the intricate dynamics that shape computational efficiency in virtualized environments. The research synthesizes findings from a diverse array of recent studies published from 2020 onwards, encompassing themes such as dynamic resource allocation, machine learning integration, security fortification, and technology synergies. Through rigorous thematic analysis, a comprehensive framework is developed, providing a holistic view of the interrelated strategies that drive the evo
APA, Harvard, Vancouver, ISO, and other styles
47

Wilczyński, Andrzej. "Using Polymatrix Extensive Stackelberg Games in Security – Aware Resource Allocation and Task Scheduling in Computational Clouds." Journal of Telecommunications and Information Technology, no. 1 (March 30, 2017): 71–80. http://dx.doi.org/10.26636/jtit.2017.1.653.

Full text
Abstract:
In this paper, the Stackelberg game models are used for supporting the decisions on task scheduling and resource utilization in computational clouds. Stackelberg games are asymmetric games, where a specific group of players’ acts first as leaders, and the rest of the players follow the leaders’ decisions and make their decisions based on the leader’s actions. In the proposed model, the optimal schedules are generated under the security criteria along with the generation of the optimal virtual machines set for the scheduled batch of tasks. The security criteria are defined as security requireme
APA, Harvard, Vancouver, ISO, and other styles
48

Zhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.

Full text
Abstract:
The dramatic proliferation of cloud computing makes it an attractive target for malicious attacks. Increasing solutions resort to virtual machine introspection (VMI) to deal with security issues in the cloud environment. However, the existing works are not feasible to support tenants to customize individual security services based on their security requirements flexibly. Additionally, adoption of VMI-based security solutions makes tenants at the risk of exposing sensitive information to attackers. To alleviate the security and privacy anxieties of tenants, we present SECLOUD, a framework for m
APA, Harvard, Vancouver, ISO, and other styles
49

Saeed, Hadeel Amjed, Sufyan T. Faraj Al-Janabi, Esam Taha Yassen, and Omar A. Aldhaibani. "Survey on Secure Scientific Workflow Scheduling in Cloud Environments." Future Internet 17, no. 2 (2025): 51. https://doi.org/10.3390/fi17020051.

Full text
Abstract:
In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security of intermediate data, often transmitted between virtual machines during workflow execution, is critical for maintaining the integrity and confidentiality of scientific workflows. This review analyzes methods for securing scientific workflow scheduling in cloud environments, emphasizing the application
APA, Harvard, Vancouver, ISO, and other styles
50

Althobaiti, Ahmad Fayez S. "Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment." Journal of Information Security 08, no. 01 (2017): 1–7. http://dx.doi.org/10.4236/jis.2017.81001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!