Optimization of live virtual machine migration in cloud computing: A survey and future directions

M Noshy, A Ibrahim, HA Ali - Journal of Network and Computer Applications, 2018 - Elsevier
In the growing age of cloud computing, shared computing and storage resources can be
accessed over the Internet. Conversely, the infrastructure cost of the cloud reaches an …

[HTML][HTML] A critical survey of live virtual machine migration techniques

A Choudhary, MC Govil, G Singh, LK Awasthi… - Journal of Cloud …, 2017 - Springer
Virtualization techniques effectively handle the growing demand for computing, storage, and
communication resources in large-scale Cloud Data Centers (CDC). It helps to achieve …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

Live migration for multiple correlated virtual machines in cloud-based data centers

G Sun, D Liao, D Zhao, Z Xu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the development of cloud computing, virtual machine migration is emerging as a
promising technique to save energy, enhance resource utilizations, and guarantee Quality of …

Network services anomalies in NFV: Survey, taxonomy, and verification methods

M Zoure, T Ahmed, L Réveillère - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network Function Virtualization (NFV) has emerged as a disruptive networking architecture
whose galloping evolution is prompting enterprises to outsource network functions to the …

Security challenges with network functions virtualization

MD Firoozjaei, JP Jeong, H Ko, H Kim - Future Generation Computer …, 2017 - Elsevier
The advent of network functions virtualization (NFV) has revolutionized numerous network-
based applications due to its several benefits such as flexibility, manageability, scalability …

[HTML][HTML] Cyber-storms come from clouds: Security of cloud computing in the IoT era

M De Donno, A Giaretta, N Dragoni, A Bucchiarone… - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …

Location privacy attacks and defenses in cloud-enabled internet of vehicles

J Kang, R Yu, X Huang, M Jonsson… - IEEE Wireless …, 2016 - ieeexplore.ieee.org
As one of the promising branches of the Internet of Things, the cloud-enabled Internet of
Vehicles (CE-IoV) is envisioned to serve as an essential data sensing, exchanging, and …

Security threats in wireless network communication-status, challenges, and future trends

AN Kadhim, SB Sadkhan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The wireless air interface is open and accessible to both authorized and unauthorized users
due to the broadcast nature of radio propagation. In a wired network, communication …

Live migration of virtual machine memory content in networked systems

RM Haris, KM Khan, A Nhlabatsi - Computer Networks, 2022 - Elsevier
Enterprises are increasingly outsourcing their computing needs to cloud computing. This
dependency on cloud services requires uninterrupted and high availability of services …