Cloud computing provides various types of services to users. The goal of virtual machine placement (VMP) is to map the best physical machine to a virtual machine. With the help of Virtual Machine Placement, we can reduce cost, maximize resource utilization, reduced energy consumption of data centers in cloud environments. The focus of Virtual Machine Placement is to saving of power, quality of service. In this paper, we have reviewed various placements techniques used in cloud computing. At last, we have also studied various challenges for virtual machine placement in cloud computing. The main motive of various types of Virtual Machine Placement algorithms have to reduced energy consumption and minimize cost by maximizing utilization of various resources in the cloud platform. For further study, the researcher should focus on these challenges for the best virtual machine placement in a cloud environment. In this paper, we critically examine the techniques, challenges, and research gaps in virtual placements in cotext with Cloud Computing. Cloud computing, placement of virtual machines becomes major problems. For finding the solution to the problem we can use the various virtual machine placement algorithms. The main motive is to reduce consumption of energy, maximum resource utilization, minimizing cost factors used for virtual to the physical machine mapping in the cloud environment. For selecting the best algorithm various optimization methods are used. With these different optimization methods, we can analyze different algorithms. There is a great scope of improvement in existing systems of virtual placements to make them more energy-efficient, more reliable, and fault-tolerant. Redundancy in cloud downloading can be made more intelligent and minimized for duplicate data while downloading and uploading.
A smart contract is a computerized transaction protocol that executes the terms of a contract in a trusted decentralized manner, meaning the execution of this contract is no more dependent on one single party or a node and the execution is immutable. This key core idea also leads to many vulnerabilities, which in turn results in huge financial loss to the consumers. The main objective of this article is to cover the various common vulnerabilities stages from development to implementation and proposed some of the best-recommended practices to tackle the above mentioned potential security risks.
Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of reducing the hardware cost. In this paper, we introduced coincidence count attack at bit level, a kind of known-plaintext attack and evaluated the resistance of TEA to withstand with it. We also examined confrontation of full round TEA against bit sum attack. Furthermore, we introduced a modest algorithm based on coincidence count and bit sum concept that makes it easy to find relevant plaintext corresponding to an arbitrary cipher text with a probability of 0.93. We also presented how cipher text originated from tiny encryption algorithm can be distinguished from a random permutation of binary sequence.
In an increasingly intrusive era, the deep web is considered to be a bastion of privacy, while for others it is one of the most evil places to exist. The deep web is a part of the world wide web that cannot be readily accessed by conventional search engines, and a small part of it forms the dark web. The enshrouded nature and complex methodology required for access have made dark web a platform for carrying out numerous illicit activities, one of them being drug trafficking. This article explores how deep web and dark web operate, the trade of illegal drugs online in so-called cryptomarkets or dark net markets, the foundation and shut-down of Silk Road, the new cryptomarkets that popped up to take its place, the use of ‘the onion router' or TOR browser in this anonymous sale and purchase of illegal drugs, the role of encryption and cryptocurrencies, the existing and suggested tactics of the law enforcement to prevent internet-facilitated drug trafficking, and the future research areas.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.