International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 8, Issue 7 (July 2021), Pages: 7-13

----------------------------------------------

 Original Research Paper

 Title: Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure

 Author(s): Badr Almutairi *

 Affiliation(s):

 Department of Information Technology, College of Computer Sciences and Information Technology, Majmaah University, Al-Majmaah, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0003-1187-6908

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2021.07.002

 Abstract:

As workloads increase in the industry so does the requirement for IT resources. IT companies are now shifting from in-house data centers to cloud-based IT services such as IAAS, PAAS, and SAAS which can offer flexibility at different levels to the developers of the applications working on different projects. Lots of researchers have contributed to migrating virtual machines migration from one cloud service provider to the other in case of backup as a service and other related services. Some of the previous works by some researchers focus on the migration of SAAS and PAAS onto different cloud service provider platforms. This research work focuses on the mitigation and migration of IAAS, PAAS, and SAAS services of the cloud. My contribution in this research will be in how to avoid loss of data during mitigation and migration of the VM from one Hypervisor environment to the other hypervisor environment on a physical machine infrastructure. This will help SME’s to provide end-user access to their data without worrying about the losses which may have incurred if the Mitigation process was not carried out carefully while migrating VM’s from one bare metal Hypervisor environment to the other bare metal Hypervisor environment. 

 © 2021 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Virtualization, Hypervisors, Virtual machines, Mitigation, Migration

 Article History: Received 23 October 2020, Received in revised form 9 January 2021, Accepted 6 February 2021

 Acknowledgment 

I would like to thank my university and college for guiding me in the right direction and to keep motivating me for completing this research work. This research work would not have been complete with the core references which have enlighten my knowledge about cloud computing IT infrastructure resources and how they have been playing important role in many industries for enhancing the ever-increasing demand of IT resources by the customer and developers.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

  Almutairi B (2021). Secure mitigation and migration of virtual machines over hybrid cloud hypervisors infrastructure. International Journal of Advanced and Applied Sciences, 8(7): 7-13

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4

 Tables

 No Table 

----------------------------------------------

 References (10)

  1. Choudhary A, Govil MC, Singh G, Awasthi LK, Pilli ES, and Kumar N (2016a). Improved virtual machine migration approaches in cloud environment. In the IEEE International Conference on Cloud Computing in Emerging Markets, IEEE, Bangalore, India: 17-24. https://doi.org/10.1109/CCEM.2016.013   [Google Scholar]
  2. Choudhary A, Rana S, and Matahai KJ (2016b). A critical analysis of energy efficient virtual machine placement techniques and its optimization in a cloud computing environment. Procedia Computer Science, 78(C): 132-138. https://doi.org/10.1016/j.procs.2016.02.022   [Google Scholar]
  3. Hidayat T and Alaydrus M (2019). Performance analysis and mitigation of virtual machine server by using naive bayes classification. In the 4th International Conference on Informatics and Computing, IEEE, Semarang, Indonesia: 1-5. https://doi.org/10.1109/ICIC47613.2019.8985932   [Google Scholar]
  4. Huseynov H, Kourai K, Saadawi T, and Igbe O (2020). Virtual machine introspection for anomaly-based keylogger detection. In the 21st International Conference on High Performance Switching and Routing, IEEE, Newark, USA: 1-6. https://doi.org/10.1109/HPSR48589.2020.9098980   [Google Scholar]
  5. Kang J and Yu H (2018). Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing. Journal of Communications and Networks, 20(3): 257-265. https://doi.org/10.1109/JCN.2018.000038   [Google Scholar]
  6. Lawal BH and Nuray AT (2018). Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN). In the 26th Signal Processing and Communications Applications Conference, IEEE, Izmir, Turkey: 1-4. https://doi.org/10.1109/SIU.2018.8404674   [Google Scholar] PMid:31883240
  7. Raghunath BR and Annappa B (2015). Virtual machine migration triggering using application workload prediction. Procedia Computer Science, 54: 167-176. https://doi.org/10.1016/j.procs.2015.06.019   [Google Scholar]
  8. Singh G, Behal S, and Taneja M (2015). Advanced memory reusing mechanism for virtual machines in cloud computing. Procedia Computer Science, 57(5): 91-103. https://doi.org/10.1016/j.procs.2015.07.373   [Google Scholar]
  9. Usmani Z and Singh S (2016). A survey of virtual machine placement techniques in a cloud data center. Procedia Computer Science, 78: 491-498. https://doi.org/10.1016/j.procs.2016.02.093   [Google Scholar]
  10. Zhang X, Shae ZY, Zheng S, and Jamjoom H (2012). Virtual machine migration in an over-committed cloud. In the IEEE Network Operations and Management Symposium, IEEE, Maui, USA: 196-203. https://doi.org/10.1109/NOMS.2012.6211899   [Google Scholar]