An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment

Pub Date : 2023-11-20 DOI:10.3233/idt-230264
H. Niroshini Infantia, C. Anbuananth, S. Kalarani
{"title":"An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment","authors":"H. Niroshini Infantia, C. Anbuananth, S. Kalarani","doi":"10.3233/idt-230264","DOIUrl":null,"url":null,"abstract":"The virtualization of hardware resources like network, memory and storage are included in the core of cloud computing and are provided with the help of Virtual Machines (VM). The issues based on reliability and security reside in its acceptance in the cloud environment during the migration of VMs. VM migration highly enhanced the manageability, performance, and fault tolerance of cloud systems. Here, a set of tasks submitted by various users are arranged in the virtual cloud computing platform by using a set of VMs. Energy efficiency is effectively attained with the help of a loadbalancing strategy and it is a critical issue in the cloud environment. During the migration of VMs, providing high security is a very important task in the cloud environment. To resolve such challenges, an effective method is proposed using an optimal key-based encryption process. The main objective of this research work is to perform the VM migration and derive the multi-objective constraints with the help of hybrid heuristic improvement. The optimal VM migration is achieved by the hybrid algorithm as Improved Binary Battle Royale with Moth-flame Optimization (IBinBRMO). It can also be used to derive the multi-objective functions by some constraints like resource utilization, active servers, makespan, energy consumption, etc. After VM migration, the data transmission should take place securely between the source and destination. To secure the data, the HybridHomophorphic and Advanced Encryption Standard(HH-AES) Algorithm, where IBinBRMO optimizes the key. After optimizing the keys, the data are securely transformed along with multi-objective functions using parameters includingthe degree of modification, hiding failure rate and information preservation rate. Thus, the effectiveness is guaranteed and analyzed with other classical models. Hence, the results illustrate that the proposed work attains better performance.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/idt-230264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The virtualization of hardware resources like network, memory and storage are included in the core of cloud computing and are provided with the help of Virtual Machines (VM). The issues based on reliability and security reside in its acceptance in the cloud environment during the migration of VMs. VM migration highly enhanced the manageability, performance, and fault tolerance of cloud systems. Here, a set of tasks submitted by various users are arranged in the virtual cloud computing platform by using a set of VMs. Energy efficiency is effectively attained with the help of a loadbalancing strategy and it is a critical issue in the cloud environment. During the migration of VMs, providing high security is a very important task in the cloud environment. To resolve such challenges, an effective method is proposed using an optimal key-based encryption process. The main objective of this research work is to perform the VM migration and derive the multi-objective constraints with the help of hybrid heuristic improvement. The optimal VM migration is achieved by the hybrid algorithm as Improved Binary Battle Royale with Moth-flame Optimization (IBinBRMO). It can also be used to derive the multi-objective functions by some constraints like resource utilization, active servers, makespan, energy consumption, etc. After VM migration, the data transmission should take place securely between the source and destination. To secure the data, the HybridHomophorphic and Advanced Encryption Standard(HH-AES) Algorithm, where IBinBRMO optimizes the key. After optimizing the keys, the data are securely transformed along with multi-objective functions using parameters includingthe degree of modification, hiding failure rate and information preservation rate. Thus, the effectiveness is guaranteed and analyzed with other classical models. Hence, the results illustrate that the proposed work attains better performance.
分享
查看原文
基于混合启发式辅助加密技术的虚拟机迁移过程在云环境下的安全数据传输
网络、内存、存储等硬件资源的虚拟化包含在云计算的核心之中,并借助于虚拟机(VM)来提供。基于可靠性和安全性的问题在于虚拟机迁移过程中在云环境中的接受程度。虚拟机迁移极大地增强了云系统的可管理性、性能和容错性。在这里,各种用户提交的一组任务通过一组虚拟机被安排在虚拟云计算平台中。在负载平衡策略的帮助下,可以有效地实现能源效率,这是云环境中的一个关键问题。在虚拟机迁移过程中,提供高安全性是云环境中非常重要的任务。为了解决这些问题,提出了一种有效的方法,即使用最优的基于密钥的加密过程。本研究的主要目的是利用混合启发式改进的方法进行虚拟机迁移,并推导出多目标约束。采用改进二进制大逃杀与蛾焰优化(IBinBRMO)混合算法实现虚拟机的最优迁移。该方法还可以根据资源利用率、活动服务器、完工时间、能耗等约束条件导出多目标函数。虚拟机迁移完成后,源端和目的端之间的数据传输应该是安全的。为了保护数据,采用了混合同态和高级加密标准(HH-AES)算法,其中IBinBRMO优化了密钥。优化密钥后,利用修改程度、隐藏故障率、信息保存率等参数对数据进行多目标函数的安全转换。从而保证了模型的有效性,并与其他经典模型进行了对比分析。因此,结果表明,所提出的工作取得了较好的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信