Open Access Open Access  Restricted Access Subscription Access

Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment


Affiliations
1 CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India
2 Department of Computer Science and Technology, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh,, India
3 Department of Mathematics, Ravenshaw University, Revenshaw College Campus, College Square, Cuttack - 753003, Odisha, India
4 Department of Mathematics, CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India
 

Background/Objectives: Cloud virtualization is a creative and one of the altogether accomplished improvements in the current figuring environment. It provides a virtualized environment based on Service Level Agreement (SLA) to cloud. Methods/Statistical Analysis: Infrastructures of Physical machines are rapidly replacing by Virtual machines (VMs) for their abilities to emulate hardware environments, share hardware resources, and utilization of a variety of operating systems. Accordingly, giving security to the cloud virtual machines and clients’ information is one of the essential difficulties to data frameworks. This manuscript describes about the mathematical ontology based upon the attacked VMs and infectious VMs which predicts the trustworthiness of the IaaS virtual platform. Findings: The proposed work will diminish the dangers to the VMs in the cloud surrounding independent of the client’s security and applications approach. Application/Improvements: It will fundamentally guarantee the level of the security of VMs in a cloud situation which assists the cloud administration suppliers to take the fast choices and about the up-degree of the counter assault estimations.

Keywords

Cloud Computing, Cloud Virtualization Security, Mathematical Ontology, Predator-Prey Model, SLA
User

Abstract Views: 143

PDF Views: 0




  • Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment

Abstract Views: 143  |  PDF Views: 0

Authors

S. B. Dash
CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India
H. Saini
Department of Computer Science and Technology, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh,, India
T. C. Panda
Department of Mathematics, Ravenshaw University, Revenshaw College Campus, College Square, Cuttack - 753003, Odisha, India
A. Mishra
Department of Mathematics, CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India

Abstract


Background/Objectives: Cloud virtualization is a creative and one of the altogether accomplished improvements in the current figuring environment. It provides a virtualized environment based on Service Level Agreement (SLA) to cloud. Methods/Statistical Analysis: Infrastructures of Physical machines are rapidly replacing by Virtual machines (VMs) for their abilities to emulate hardware environments, share hardware resources, and utilization of a variety of operating systems. Accordingly, giving security to the cloud virtual machines and clients’ information is one of the essential difficulties to data frameworks. This manuscript describes about the mathematical ontology based upon the attacked VMs and infectious VMs which predicts the trustworthiness of the IaaS virtual platform. Findings: The proposed work will diminish the dangers to the VMs in the cloud surrounding independent of the client’s security and applications approach. Application/Improvements: It will fundamentally guarantee the level of the security of VMs in a cloud situation which assists the cloud administration suppliers to take the fast choices and about the up-degree of the counter assault estimations.

Keywords


Cloud Computing, Cloud Virtualization Security, Mathematical Ontology, Predator-Prey Model, SLA



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i34%2F116748