A fountain-coding based cooperative jamming strategy for secure service migration in edge computing

M Cui, H Zhang, Y Huang, Z Xu, Q Zhao - Wireless Networks, 2021 - Springer
In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed
around the base stations. Generally, due to the uneven distribution and mobility of users …

Secure live virtual machine migration through runtime monitors

AM Mahfouz, ML Rahman… - 2017 Tenth International …, 2017 - ieeexplore.ieee.org
In this paper, we propose a new model for live migration of virtual machines (VMs) in a
secure environment. The live migration of a VM is the process of moving the VM from one …