151. An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment.
- Author
-
Infantia, H. Niroshini, Anbuananth, C., and Kalarani, S.
- Subjects
VIRTUAL machine systems ,ADVANCED Encryption Standard ,DATA transmission systems ,OPTICAL disks ,MULTICASTING (Computer networks) ,COMPUTING platforms ,FAULT tolerance (Engineering) ,CLOUD computing ,ENERGY consumption - Abstract
The virtualization of hardware resources like network, memory and storage are included in the core of cloud computing and are provided with the help of Virtual Machines (VM). The issues based on reliability and security reside in its acceptance in the cloud environment during the migration of VMs. VM migration highly enhanced the manageability, performance, and fault tolerance of cloud systems. Here, a set of tasks submitted by various users are arranged in the virtual cloud computing platform by using a set of VMs. Energy efficiency is effectively attained with the help of a loadbalancing strategy and it is a critical issue in the cloud environment. During the migration of VMs, providing high security is a very important task in the cloud environment. To resolve such challenges, an effective method is proposed using an optimal key-based encryption process. The main objective of this research work is to perform the VM migration and derive the multi-objective constraints with the help of hybrid heuristic improvement. The optimal VM migration is achieved by the hybrid algorithm as Improved Binary Battle Royale with Moth-flame Optimization (IBinBRMO). It can also be used to derive the multi-objective functions by some constraints like resource utilization, active servers, makespan, energy consumption, etc. After VM migration, the data transmission should take place securely between the source and destination. To secure the data, the HybridHomophorphic and Advanced Encryption Standard(HH-AES) Algorithm, where IBinBRMO optimizes the key. After optimizing the keys, the data are securely transformed along with multi-objective functions using parameters includingthe degree of modification, hiding failure rate and information preservation rate. Thus, the effectiveness is guaranteed and analyzed with other classical models. Hence, the results illustrate that the proposed work attains better performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF