IMPROVED PRE-COPY APPROACH FOR A SECURITY BASED LIVE VIRTUAL MACHINE MIGRATION IN CLOUD COMPUTING
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 2
Abstract
In current time Cloud Computing is the most recent pattern where IT applications and foundations are provided as 'administrations' under a use based installment model to its end-clients. Normally two issues happen amid relocation of CPU or memory concentrated VMs which are known as complete movement time and memory utilization at host which results in corruption in the general execution of the framework. In this paper we have proposed a method that removes the memory utilization, utilizing improved pre-copy methodology. So as to expand the security of the data and to limit the information loss, a safe relocation has been accomplished by utilizing the Elgamal cryptographic technique.
Authors and Affiliations
BINDIYA and SANDEEP SHARMA
FACE RECOGNITION IMPLEMENTATION ON RASPBERRYPI USING OPENCV AND PYTHON
Distinguishing an individual with a picture has been advanced through the broad communications. Be that as it may, it is less powerful to unique finger impression or retina examining. This report depicts the face detec...
RELIEFF FEATURE SELECTION BASED ALZHEIMER DISEASE CLASSIFICATION USING HYBRID FEATURES AND SUPPORT VECTOR MACHINE IN MAGNETIC RESONANCE IMAGING
Alzheimer disease is a form of dementia that results in memory-related problems in human beings. An accurate detection and classification of Alzheimer disease and its stages plays a crucial role in human health monitor...
EXPERIMENTAL STUDY ON CLOUD SECURITY FOR PERSONAL HEALTH RECORDS OVER PATIENT CENTRIC DATA
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner...
DIABETES CLASSIFICATION AND PREDICTION USING ARTIFICIAL NEURAL NETWORK
The classification of data is an important field of data mining comes under supervised learning. In this approach classifier is trained on the pre-categorized data thereafter tested on unseen part called test data to e...
RESOLVING PRIVACY CONFLICT FOR MAINTAINING PRIVACY POLICIES IN ONLINE SOCIAL NETWORKS
In recent years, the use of online social networks (OSNs) such as Facebook, Twitter etc has tremendous increased. Users see these OSNs as a useful tool to find friends and interact with them. Moreover, OSNs allow their...