2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) 2021
DOI: 10.1109/icais50930.2021.9395922
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Machine Security Problems and Countermeasures for Improving Quality of Service in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Since the Cloud plentiful computing and storage resources, connectivity to the cloud is usually essential for large-scale IoT applications. Having an appropriate encryption technique, the IoT data can be easily stored and kept secure at the cloud datacenters [25], however, once stored, it is impractical to use it for any purpose except for restoring it to be decrypted. To resolve this, numerous academic and industrial efforts are being devoted to developing new cryptographic methods such as homomorphic encryption, which enables the use of encrypted data in computational tasks, and searchable encryption, which promotes searching within encrypted data.…”
Section: Data Security (S5)mentioning
confidence: 99%
See 1 more Smart Citation
“…Since the Cloud plentiful computing and storage resources, connectivity to the cloud is usually essential for large-scale IoT applications. Having an appropriate encryption technique, the IoT data can be easily stored and kept secure at the cloud datacenters [25], however, once stored, it is impractical to use it for any purpose except for restoring it to be decrypted. To resolve this, numerous academic and industrial efforts are being devoted to developing new cryptographic methods such as homomorphic encryption, which enables the use of encrypted data in computational tasks, and searchable encryption, which promotes searching within encrypted data.…”
Section: Data Security (S5)mentioning
confidence: 99%
“…It is an attempt to make the use of vulnerabilities of hyper-visor with the main aim to dictate the fundamental infrastructure greedy for its design elasticity and code intricacy, which agree with enterprises requirements [117] Trustworthy virtual datacenter, dependable cloud computing platform, hyper safe, appropriately designing the host/guest interaction [25] (continued) [118,119] Access control [118], virtual machine debugging tools, high assurance platform (HAP) [120] communication [142]. RFID is always tagged to any IoT objects including humans, physical objects, and animals.…”
Section: Allmentioning
confidence: 99%
“…In order to meet the above objectives, construction of a service level agreement (SLA) should be established [8]. The QoS of cloud computing environment is further increased by performing efficient scheduling of resources for distributing the resources to complete the tasks (or jobs) with low execution time [9,10]. Several works perform efficiencyaware resource scheduling to increase the cloud computing QoS.…”
Section: Introductionmentioning
confidence: 99%