Abstract
Cloud computing systems consist of a pool of Virtual Machines (VMs), which are installed physically on the provider's set up. The main aim of the VMs is to offer the service to the end users. With the current increasing demand for the cloud VMs, there is always a huge requirement to secure the cloud systems. To keep these cloud systems secured, they need a continuous and a proper monitoring. For the purpose of monitoring, several algorithms are available with FVMs. FVM is a forensic virtual machine which monitors the threats among the VMs. Our formulated algorithm runs on FVM. In this paper, we formulate the Random-Start-Round-Robin algorithm for monitoring inside FVM.
Highlights
The concept of cloud computing can be understood as a combination of two related concepts
The monitoring is done by visiting or inspecting Virtual Machines (VMs) to see whether they have the found the symptoms or not? The main contribution of this paper is to study the impact of the new proposed algorithm in the hierarchical structure of a cloud system that influences the efficiency of the monitoring of Forensic Virtual Machines (FVM), and how to implement it in an efficient way
Uniform inputs in this paper mean that all VMs are equal in regard to weights; without loss of generality, it could be assumed that all of the weights of VMs are ones [8]
Summary
The concept of cloud computing can be understood as a combination of two related concepts. The applications which are transported as services over the Internet. The hardware and the software components that are supporting these respective services in the data centers [1]. Cloud systems could be designed according to cloud providers and user needs [2]. Other different reasons could control the design architecture of cloud computing. Security aspects should be considered in designing the cloud systems. Security aspects should be considered in designing the cloud systems. [3, 4]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Bulletin of Electrical Engineering and Informatics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.