Skip to main content
Top
Published in: Soft Computing 19/2020

04-04-2020 | Methodologies and Application

Performance improvement of cloud security with parallel anarchies society optimization algorithm for virtual machine selection in cloud computing

Authors: B. Lanitha, S. Karthik

Published in: Soft Computing | Issue 19/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing (CC) is a future promising computing technology and has proven tremendous exceptional attainable in managing the hardware and software program sources placed at third-party provider vendors. However, security and virtual machines (VMs) selection to a process a request characterize a large venture. The major problem in the usage of the technology is the security concerns which increase the demand for a robust security mechanism to protect the data on the cloud. Hence in order to resolve this issue, an approach was designed for the purpose of enhancing the cloud security as well as the time of execution known as weighted mean-based convolutional neural network with advanced encryption standard (WMCNN-AES). By employing the method of pseudorandom number generators (PRNGs), random keys are generated and the finest keys are produced by using the WMCNN method. In the WMCNN approach, randomly generated keys are taken as input and the approximation concerning the secret key of the input is produced by the hidden layers. For the purpose of encrypting the data, the finest secret keys are generated by the output layer. By employing the advanced encryption standard (AES) algorithm, encryption is executed. Storage of the files concerning the encrypted data is done in the cloud storage system. Optimal selection of VMs performs a significant enhancement of the performance through reducing the execution time of requests (tasks) coming from stakeholders and maximizing utilization of cloud resources. For the purpose of optimizing the virtual machines’ or VMs’ selection, parallel anarchies society optimization (PASO) is employed in the cloud environment to increase the performance and resource utilization. When comparing the experimental results of the proposed system with the existing system, it is observed that the proposed system accomplished an enhanced performance with respect to resource utilization, cost, throughput, service latency as well as execution time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdelaziz A, Elhoseny M, Salama AS, Riad AM (2018) A machine learning model for improving healthcare services in cloud computing. Elsevier, AmsterdamCrossRef Abdelaziz A, Elhoseny M, Salama AS, Riad AM (2018) A machine learning model for improving healthcare services in cloud computing. Elsevier, AmsterdamCrossRef
go back to reference Alresheedi SS, Lu S, Ahmed MA, Ewees A (2019) Improved multi objective salp swarm optimization for virtual machine placement in cloud computing 2019 Alresheedi SS, Lu S, Ahmed MA, Ewees A (2019) Improved multi objective salp swarm optimization for virtual machine placement in cloud computing 2019
go back to reference Amanpreetaur K, Singh VP (2018) The future of cloud computing: opportunities challenges and research trends. In: IEEE explore Amanpreetaur K, Singh VP (2018) The future of cloud computing: opportunities challenges and research trends. In: IEEE explore
go back to reference Bozong-Haddad O, Latifi M, Bozorgi A (2017) Development and application of the anarchic society algorithm(ASO) to the optimal operation of water distribution networks. IWA publishing 2017 Bozong-Haddad O, Latifi M, Bozorgi A (2017) Development and application of the anarchic society algorithm(ASO) to the optimal operation of water distribution networks. IWA publishing 2017
go back to reference Dikaiakos MD, Katsaros D, Mehra P, Pallis G, Vakali A (2009) Cloud computing: istributed internet computing for IT and scientific research. IEEE Internet Computing 13:10–13CrossRef Dikaiakos MD, Katsaros D, Mehra P, Pallis G, Vakali A (2009) Cloud computing: istributed internet computing for IT and scientific research. IEEE Internet Computing 13:10–13CrossRef
go back to reference Elsedimy E, Rasad MZ, Darwish MG (2017) Multi objective optimization approach for virtual machine placement based on particle swarm optimization in cloud data centers. J Comput Theory Nanosci 79:5145–5150CrossRef Elsedimy E, Rasad MZ, Darwish MG (2017) Multi objective optimization approach for virtual machine placement based on particle swarm optimization in cloud data centers. J Comput Theory Nanosci 79:5145–5150CrossRef
go back to reference Fang Z, Hui J, Deng D, Li Y, Gu T, Zhang J (2016) An Energy Efficient Ant Colony System for Virtual Machine Placement in Cloud Computing”. Computational Intelligence Society, IEEE 22:1–15 Fang Z, Hui J, Deng D, Li Y, Gu T, Zhang J (2016) An Energy Efficient Ant Colony System for Virtual Machine Placement in Cloud Computing”. Computational Intelligence Society, IEEE 22:1–15
go back to reference Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Fut Gener Comput Syst 29(4):1012–1023CrossRef Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Fut Gener Comput Syst 29(4):1012–1023CrossRef
go back to reference Han Y, Chan T, Alpcan C (2017) Leckie Using virtual machine allocation policies against co-resident attacks in cloud computing, IEEE Trans Dependable Secure Comput 95–108 Han Y, Chan T, Alpcan C (2017) Leckie Using virtual machine allocation policies against co-resident attacks in cloud computing, IEEE Trans Dependable Secure Comput 95–108
go back to reference Juels A, Opera A (2013) New approaches to security and availability for cloud data. Commun ACM 56(2):64–73CrossRef Juels A, Opera A (2013) New approaches to security and availability for cloud data. Commun ACM 56(2):64–73CrossRef
go back to reference Kamara S, Lauter K (2010) Cryptographic cloud storage. Financial cryptography and data security. Springer, Berlin, pp 136–149CrossRef Kamara S, Lauter K (2010) Cryptographic cloud storage. Financial cryptography and data security. Springer, Berlin, pp 136–149CrossRef
go back to reference Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators. In: International workshop on fast software encryption, pp 168–188. Springer, Berlin, Heidelberg Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators. In: International workshop on fast software encryption, pp 168–188. Springer, Berlin, Heidelberg
go back to reference Kiran SS (2017) Enhance data security in cloud computing using machine learning and hybrid cryptography techniques. In: International journal of advanced research in computer science, 2017 Kiran SS (2017) Enhance data security in cloud computing using machine learning and hybrid cryptography techniques. In: International journal of advanced research in computer science, 2017
go back to reference Kumar D (2019) Review on task scheduling n ubiquitous clouds. J ISMAC 1(01):72–80 Kumar D (2019) Review on task scheduling n ubiquitous clouds. J ISMAC 1(01):72–80
go back to reference Li H, Li W, Wang H, Wang J (2018) An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud. Fut Gener Comput Syst 84:98–107CrossRef Li H, Li W, Wang H, Wang J (2018) An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud. Fut Gener Comput Syst 84:98–107CrossRef
go back to reference Lin H, Tzeng W (2012) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003CrossRef Lin H, Tzeng W (2012) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003CrossRef
go back to reference Maggiani R (2009) Cloud computing is changing how we communicate. In: Professional communication conference, 2009. IPCC 2009. IEEE Maggiani R (2009) Cloud computing is changing how we communicate. In: Professional communication conference, 2009. IPCC 2009. IEEE
go back to reference Mann ZA (2015) A taxonomy for the virtual machine allocation problem. Int J Math Models Methods Appl Sci 9:269–276 Mann ZA (2015) A taxonomy for the virtual machine allocation problem. Int J Math Models Methods Appl Sci 9:269–276
go back to reference Sarkar MK, Kumar S (2016) A framework to ensure data storage security in cloud computing, IEEE, 2016 Sarkar MK, Kumar S (2016) A framework to ensure data storage security in cloud computing, IEEE, 2016
go back to reference Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1(2):136–146 Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1(2):136–146
go back to reference Schmidt M, Fallenbeck N, Smith M, Freisleben B (2010) Efficient distribution of virtual machines for cloud computing. In: Parallel, distributed and network-based processing (PDP), 2010 18th Euromicro International Conference on pp 567–574. IEEE Schmidt M, Fallenbeck N, Smith M, Freisleben B (2010) Efficient distribution of virtual machines for cloud computing. In: Parallel, distributed and network-based processing (PDP), 2010 18th Euromicro International Conference on pp 567–574. IEEE
go back to reference Singla S, Singh J (2013) Cloud data security using authentication and encryption technique. Int J Adv Res Comput Eng Technol (IJARCET) 2(7) Singla S, Singh J (2013) Cloud data security using authentication and encryption technique. Int J Adv Res Comput Eng Technol (IJARCET) 2(7)
go back to reference Smys S, Josemin Bala G (2012) Performance analysis of virtual clusters in personal communication networks. Clust Comput 15(3):211–222CrossRef Smys S, Josemin Bala G (2012) Performance analysis of virtual clusters in personal communication networks. Clust Comput 15(3):211–222CrossRef
go back to reference Voorsluys William, Broberg James, Buyya Rajkumar (2011) Introduction to cloud computing. Cloud computing. Principles and Paradigms. Springer, Berlin, pp 1–41CrossRef Voorsluys William, Broberg James, Buyya Rajkumar (2011) Introduction to cloud computing. Cloud computing. Principles and Paradigms. Springer, Berlin, pp 1–41CrossRef
go back to reference Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing”. In: 2010 5th international conference on computer sciences and convergence information technology (iccit), pp 18–21. IEEE Wu H, Ding Y, Winer C, Yao L (2010) Network security for virtual machine in cloud computing”. In: 2010 5th international conference on computer sciences and convergence information technology (iccit), pp 18–21. IEEE
go back to reference Yu X, Wen Q (2010) A view about cloud data security from data life cycle”. In: 2010 international conference on computational intelligence and software engineering (CiSE), pp 1–4. IEEE Yu X, Wen Q (2010) A view about cloud data security from data life cycle”. In: 2010 international conference on computational intelligence and software engineering (CiSE), pp 1–4. IEEE
Metadata
Title
Performance improvement of cloud security with parallel anarchies society optimization algorithm for virtual machine selection in cloud computing
Authors
B. Lanitha
S. Karthik
Publication date
04-04-2020
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 19/2020
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-04892-x

Other articles of this Issue 19/2020

Soft Computing 19/2020 Go to the issue

Premium Partner