Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8392
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dash, S. B. | - |
dc.contributor.author | Saini, H. | - |
dc.contributor.author | Panda, T. C. | - |
dc.contributor.author | Mishra, A. | - |
dc.date.accessioned | 2022-11-30T08:52:06Z | - |
dc.date.available | 2022-11-30T08:52:06Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8392 | - |
dc.description.abstract | Background/Objectives: Cloud virtualization is a creative and one of the altogether accomplished improvements in the current figuring environment. It provides a virtualized environment based on Service Level Agreement (SLA) to cloud. Methods/Statistical Analysis: Infrastructures of Physical machines are rapidly replacing by Virtual machines (VMs) for their abilities to emulate hardware environments, share hardware resources, and utilization of a variety of operating systems. Accordingly, giving security to the cloud virtual machines and clients’ information is one of the essential difficulties to data frameworks. This manuscript describes about the mathematical ontology based upon the attacked VMs and infectious VMs which predicts the trustworthiness of the IaaS virtual platform. Findings: The proposed work will diminish the dangers to the VMs in the cloud surrounding independent of the client’s security and applications approach. Application/Improvements: It will fundamentally guarantee the level of the security of VMs in a cloud situation which assists the cloud administration suppliers to take the fast choices and about the up-degree of the counter assault estimations. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Cloud virtualization security | en_US |
dc.subject | Mathematical ontology | en_US |
dc.subject | Predator-prey model | en_US |
dc.title | Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment.pdf | 712.33 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.