2018 International Conference on Frontiers of Information Technology (FIT) 2018
DOI: 10.1109/fit.2018.00031
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Secure Mechanism for Virtual Machine Migration in Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…S.Sengole Merlin et al [10] in their paper proposed an automated intelligent system which detects the overload or under load condition to select a VM, then encryption is done with the help of security algorithm which renders integrity, confidentiality , mutual authentication and data security also the overall cost and time of the migration process is reduced significantly. Kanwal Janjua et al [11] in their paper have discussed six important security features and they were tested by the AVISPA tool. Yuchen Wong et al [12] in their paper proposed a familiarity model for load balancing and secure VM placement.…”
Section: International Journal Of Engineering Research and Technology (mentioning
confidence: 99%
“…S.Sengole Merlin et al [10] in their paper proposed an automated intelligent system which detects the overload or under load condition to select a VM, then encryption is done with the help of security algorithm which renders integrity, confidentiality , mutual authentication and data security also the overall cost and time of the migration process is reduced significantly. Kanwal Janjua et al [11] in their paper have discussed six important security features and they were tested by the AVISPA tool. Yuchen Wong et al [12] in their paper proposed a familiarity model for load balancing and secure VM placement.…”
Section: International Journal Of Engineering Research and Technology (mentioning
confidence: 99%
“…This last issue is a challenge because one must keep the VM safe from attacks while it is running and assure the VM is not modified before arriving at the destination. During migration, a VM is vulnerable to DDoS attacks, loss of data integrity, confidentiality, unauthorized access, and virus contamination [9].…”
Section: Introductionmentioning
confidence: 99%