Secure Aware Optimized Support Vector Regression Models Based Host Overload Detection in Cloud

被引:1
作者
Parthasarathy, S. [1 ]
机构
[1] SRM Valliammai Engn Coll, Dept Comp Sci & Engn, Kattankulathur 603203, India
关键词
Overloaded; Migration; Cloud computing; Consolidation; Encryption; Security; OSVR; ETDO; Cyclic Shift Transposition Algorithm;
D O I
10.1007/s11277-024-11079-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The increasing need for high-performance computing, preservation, and networking capabilities to support corporate and scientific applications is driving a rapid expansion in the use of cloud computing server farms. Virtual machine (VM) consolidation plays a crucial role in this context, involving the direct migration of VMs from underutilized physical servers to optimize power consumption efficiency, operational costs, and reduce CO2 emissions. A pivotal step in VM consolidation is the detection of host overload, which aims to predict potential server over-subscription with VMs. This paper introduces an Optimized Support Vector Regression model for overloaded detection. To enhance the Support Vector Regression (SVR) performance, optimal selection of SVR parameters is achieved using the Enhanced Tasmanian Devil Optimization algorithm. Following overload detection, VM migration occurs, but this process raises concerns about system integrity and data confidentiality. To address these concerns, data is encrypted using the Cyclic Shift Transposition Algorithm before migration. The proposed approach's performance is evaluated across various metrics such as energy consumption, ESV, Migration, and SLA X0.001, and its effectiveness is compared with different existing methods.
引用
收藏
页码:2061 / 2075
页数:15
相关论文
共 20 条
[1]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[2]   Host Overloading Detection based on EWMA Algorithm in Cloud Computing Environment [J].
Chen, Jen-Hsiang ;
Lu, Shin-Li .
2018 IEEE 15TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2018), 2018, :274-279
[3]  
Chen R.C., 2010, ARXIV
[4]   Tasmanian Devil Optimization: A New Bio-Inspired Optimization Algorithm for Solving Optimization Algorithm [J].
Dehghani, Mohammad ;
Hubalovsky, Stepan ;
Trojovsky, Pavel .
IEEE ACCESS, 2022, 10 :19599-19620
[5]   Characterization of ISP traffic: Trends, user habits, and access technology impact [J].
García-Dorado, J.L. ;
Finamore, A. ;
Mellia, M. ;
Meo, M. ;
Munafò, M. .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :142-155
[6]  
GholipourGoodarzi B., 2014, J ADV COMPUT RES, V5, P43
[7]   Resource Management in Clouds: Survey and Research Challenges [J].
Jennings, Brendan ;
Stadler, Rolf .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (03) :567-619
[8]   Tech Titans Building Boom [J].
Katz, Randy H. .
IEEE SPECTRUM, 2009, 46 (02) :40-+
[9]  
Kim H., 2008, P ACM CONEXT
[10]  
Kokila RT, 2014, INT CONF ADV COMPU, P205, DOI 10.1109/ICoAC.2014.7229711