Abstract
Virtual machine (VM) clusters are used in cloud computing models to safeguard resources from failure and provide redundancy. Tasks for cloud users are planned by choosing appropriate resources to carry out the work within the virtual machine cluster. Issues with pre-configuration, downtime, complicated backup procedures, and disaster management plague the current VM clustering methods. High availability resources with dynamic and on-demand configuration are provided by virtual machine infrastructure. To improve efficiency and availability, the suggested technique supports the VM clustering process, which places and allocates virtual machines (VMs) based on the size of the requested task and the bandwidth level based on the migration, the suggested clustering procedure is divided into pre- and post-clustering stages. The task and bandwidth classification procedure groups jobs that can run in a virtual machine cluster with sufficient bandwidth. Depending on the VM’s availability inside the cluster, the bandwidth is mapped to the virtual machine. Several performance metrics, including bucket size, task execution time, VM lifetime, and VM utilization, are used in the VM clustering process. The suggested VM clustering’s primary goal is to map tasks to bandwidth-efficient virtual machines (VMs) in order to achieve high availability and dependability. As opposed to current algorithms, it shortens the time allotted for tasks and their execution.
Similar content being viewed by others
Data Availability
The corresponding author can provide the datasets upon request.
References
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 2021;34(1):1–11.
Kaur JP, Kaur R. Security issues and use of cryptography in cloud computing. Int J Adv Res Comput Sci Softw Eng. 2014. https://doi.org/10.32628/CSEIT206639.
Wang L, Tao J, Kunze M. Scientific cloud computing: early definition and experience. In: Proceedings of the 10th IEEE international conference on high performance computing and communications, Austin, TX. 2008. pp. 825–830
Reservoir work. http://www-03.ibm.com/press/us/en/pressrelease/23448.wss/. Accessed June 2008
Amazon elastic compute cloud. http://aws.amazon.com/ec2. Accessed Nov 2007
IBM blue cloud work. http://www3.ibm.com/press/us/en/pressrelease/22613.wss/, Accessed June 2008
Nimbus work. http://workspace.globus.org/ clouds/nimbus.html/. Accessed June 2008
Status work. http://www.acis.ufl.edu/vws/. Accessed June 2008
OpenNEbula work. http://www.opennebula.org/. Accessed Apr 2008
Sharma S, Bhushan B, Sharma S. Improvising information security in cloud computing environment. Inter J Comput Appl. 2014. https://doi.org/10.5120/15071-3503.
DJ Bernstein, T Lange (editors). eBACS: ECRYPT Benchmarking of cryptographic systems. http://bench.crypto. Accessed Oct 2013
Shanmugalakshmi M Prabu. Research issues on elliptic curve cryptography and its applications. IJCSNS Int J Comput Sci Netw Secur. 2009;9(6):19–22.
Wang H, Sheng B, Li Q. Elliptic curve cryptographybased access control in sensor networks. Int J Secur Netw. 2006;1(3/4):127–37.
B Sharma, BPIT Rohini. Security architecture of cloud computing based on elliptic curve cryptography (ecc). ICETEM. 2013
Wikipedia, the free encyclopedia of cloud computing
Lim I, Coolidge E, Hourani P. Securing cloud and mobility: A Practitioner’s Guide. USA: CRC Press; 2013.
https://www.techopedia.com/definition/30564/ellipticcurve-cryptography-ecc. Accessed 6 May 2024.
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen. Cloud data integrity checking with an identity-based auditing mechanism from RSA. https://wiki.openssl.org/index.php/Elliptic_Curve_Cryptography. Accessed 6 May 2024.
Bhagawat VC, Arul A, Kumar LS. Survey on data security issues in cloud environment. Int J Innov Res Adv Eng. 2015. https://doi.org/10.4304/jsw.8.5.1068-1078.
Harinath D, et al. Enhancing security through steganography by using sudoku puzzle and ECC algorithm. Int J Res Sci Eng Technol. 2015;2(6):29–43.
Harinath D, et al. Enhancing security by using ECC algorithm in wireless sensor networks. Int J Artif Intell Mechatron. 2015. https://doi.org/10.1109/ICECET58911.2023.10389443.
Elliptic curve cryptography. https://en.wikipedia.org/wiki/Elliptic_curve_cryptograph RSA (algorithm). http://en.wikipedia.org/wiki/RSA_(algorithm). Accessed 6 May 2024.
JavaTM cryptography extension (JCE), reference guide. http://docs.oracle.com/javase/1.5.0/docs/guide/security/jce/JCERefGuide.html. Accessed 6 May 2024.
Acknowledgements
The research work was made possible with the support of REVA University, Bangalore, India which provided the necessary facilities.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
This research was a collective effort, made possible through the collaboration and contributions of all authors involved.
Corresponding author
Ethics declarations
Conflicts of Interest
Hereby we are declaring that there is No Conflict of Interest related to this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Manoli, S., Metipatil, P. & Raghavendra Nayaka, P. An Efficient Approach for VM and Database Segmentation of Cloud Resources Over Cloud Computing. SN COMPUT. SCI. 5, 977 (2024). https://doi.org/10.1007/s42979-024-03204-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03204-6