D Saxena, AK Singh - arXiv preprint arXiv:2210.16602, 2022 - arxiv.org
This paper proposes a conceptual model for a secure and performance-efficient workload management model in cloud environments. In this model, a resource management unit is …
S Chhabra, AK Singh - arXiv preprint arXiv:2207.07955, 2022 - arxiv.org
Cloud computing has become the backbone of the computing industry and offers subscription-based on-demand services. Through virtualization, which produces a virtual …
N Manikandan, S Devayani… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Domain specific allocation plays a major role in cloud computing. The recent trends in cloud computing attracts user to generate random requests to any processor which are not domain …
NK Sehgal, PCP Bhatt, JM Acken - Concepts and practices. Second …, 2020 - Springer
The Internet has brought revolutionary changes in the way we use computers and computing services. The paradigm mostly used is a client-server architecture supported over …
The Internet has brought revolutionary changes in the way we use computers and computing services. The paradigm mostly used is a client-server architecture supported over …
SS Merlin, NM Arunkumar… - … Conference on Inventive …, 2018 - ieeexplore.ieee.org
Cloud computing provides on-demand computing and storage services with high performance and high scalability. In this paper, we first introduce an energy-aware …
Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational …
M Bartock, K Scarfone, M Souppaya, H Singh… - 2020 - csrc.nist.gov
A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources …
D Saxena, AK Singh - Electronics Letters, 2020 - Wiley Online Library
Cloud clients face high security risks while sharing physical resources with multiple users. A malicious cloud user exploits co‐residency and hypervisor vulnerabilities to steal and …