An intelligent security centered resource-efficient resource management model for cloud computing environments

D Saxena, AK Singh - arXiv preprint arXiv:2210.16602, 2022 - arxiv.org
This paper proposes a conceptual model for a secure and performance-efficient workload
management model in cloud environments. In this model, a resource management unit is …

A smart resource management mechanism with trust access control for cloud computing environment

S Chhabra, AK Singh - arXiv preprint arXiv:2212.05319, 2022 - arxiv.org
The core of the computer business now offers subscription-based on-demand services with
the help of cloud computing. We may now share resources among multiple users by using …

Security embedded dynamic resource allocation model for cloud data centre

D Saxena, AK Singh - Electronics Letters, 2020 - Wiley Online Library
Cloud clients face high security risks while sharing physical resources with multiple users. A
malicious cloud user exploits co‐residency and hypervisor vulnerabilities to steal and …

Emerging vm threat prediction and dynamic workload estimation for secure resource management in industrial clouds

D Saxena, R Gupta, AK Singh… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The inefficient sharing of industrial cloud resour-ces among multiple users and
vulnerabilities of virtual machines (VM) s and servers prompt unauthorized access to users' …

Security risk-aware resource provisioning scheme for cloud computing infrastructures

T Halabi, M Bellaiche - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
The last decade has witnessed a growing interest in exploiting the advantages of Cloud
Computing technology. However, the full migration of services and data to the Cloud is still …

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments

EB Choi - Journal of Convergence for Information Technology, 2018 - koreascience.kr
The purpose of access control is to prevent computing resources from illegal behavior such
as leakage, modification, and destruction by unauthorized users. As the cloud computing …

Virtualized Secure Cloud Computing Using Targetive Dynamic Secured Resource Allocation Algorithm

D Singh, M Chitkara - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Currently Cloud Computing (CC) has dramatic changes in secured task scheduling in
emerging countries, the volume of the company must cost-effectively process large amounts …

Security Aware Resource Management Framework (SARMF) for Edge-Cloud Computing

GC Shwethashree, S Manjula - 2023 7th International …, 2023 - ieeexplore.ieee.org
In recent years, there has been an increasing demand for edge computing, which utilizes
resources at the edge of the network to improve response times and reduce bandwidth …

[HTML][HTML] Review and analysis of secure energy efficient resource optimization approaches for virtual machine migration in cloud computing

H Kaur, A Anand - Measurement: Sensors, 2022 - Elsevier
Computing operations such as databases, networks, hardware, programs, analytics, and so
on are all part of the cloud computing service. As such, it may serve as an option to in-house …

Information security framework for cloud and virtualization security

MI Tariq, S Tayyaba, MA Jaffar, MW Ashraf… - Security and Privacy …, 2022 - taylorfrancis.com
In recent years, researchers have struggled to build a utility computing model. Cloud
computing enables the delivery of information technology on demand. Many organizations …