Resource allocation through optimized three-phase scheduled VMs by grey wolf optimization and introspection security analysis

[1]  Muhammad Khurram Khan,et al.  Cloud resource allocation schemes: review, taxonomy, and opportunities , 2017, Knowledge and Information Systems.

[2]  M. Sridhar Hybrid Genetic Swarm Scheduling for Cloud Computing , 2015 .

[3]  Niraj K. Jha,et al.  A Trusted Virtual Machine in an Untrusted Management Environment , 2012, IEEE Transactions on Services Computing.

[4]  Rajkumar Buyya,et al.  Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing , 2012, Future Gener. Comput. Syst..

[5]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[6]  Ritu Aggarwal,et al.  Resource Provisioning and Resource Allocation in Cloud Computing Environment , 2018 .

[7]  Yongzhao Zhan,et al.  Virtualization and Cloud Computing , 2019, CompTIA® A+® Complete Practice Tests.

[8]  Shahaboddin Shamshirband,et al.  BSS: block-based sharing scheme for secure data storage services in mobile cloud environment , 2014, The Journal of Supercomputing.

[9]  D Arivudainambi,et al.  Scheduling Optimized Secured Virtual Machine Using Cuckoo Search and Flow Analyzer , 2017 .

[10]  Odej Kao,et al.  Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud , 2011, IEEE Transactions on Parallel and Distributed Systems.

[11]  P. Jayarekha,et al.  Load Balancing with Optimal Cost Scheduling Algorithm , 2014, 2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).

[12]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[13]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[14]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.

[15]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[16]  Kevin Lee,et al.  Empirical prediction models for adaptive resource provisioning in the cloud , 2012, Future Gener. Comput. Syst..

[17]  Nicola Cordeschi,et al.  FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method , 2014, Cluster Computing.

[18]  Rolf Stadler,et al.  Resource Management in Clouds: Survey and Research Challenges , 2015, Journal of Network and Systems Management.

[19]  Wei Tan,et al.  Self-Adaptive Learning PSO-Based Deadline Constrained Task Scheduling for Hybrid IaaS Cloud , 2014, IEEE Transactions on Automation Science and Engineering.

[20]  Sunilkumar S. Manvi,et al.  Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..

[21]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[22]  Shahaboddin Shamshirband,et al.  A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.

[23]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[24]  Nicola Blefari-Melazzi,et al.  An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers , 2018, IEEE Transactions on Sustainable Computing.

[25]  Meikang Qiu,et al.  High reliable real-time bandwidth scheduling for virtual machines with hidden Markov predicting in telehealth platform , 2015, Future Gener. Comput. Syst..

[26]  Jin-Soo Kim,et al.  Energy Reduction in Consolidated Servers through Memory-Aware Virtual Machine Scheduling , 2011, IEEE Transactions on Computers.

[27]  M. Sridhar,et al.  Hybrid Particle Swarm Optimization scheduling for cloud computing , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[28]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[29]  Paul T. Jaeger,et al.  Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..

[30]  Abdelkader H. Ouda,et al.  Resource allocation in a network-based cloud computing environment: design challenges , 2013, IEEE Communications Magazine.