Asian Journal of Information Technology

Year: 2015
Volume: 14
Issue: 3
Page No. 84 - 91

Predator-Prey Model for Infectious Virtual Machines in IaaS Cloud Environment Based on Lakota-Volterra Equation

Authors : S.B. Dash, H. Saini, T.C. Panda and A. Mishra

Abstract: Infrastructure as a Service (IaaS) is an innovative and one of the significantly achieved developments in the cloud computing environment. Providing security to the cloud virtual machines and users’ data are the greatest challenge of information system. So, understanding the risks of the security and privacy in the cloud and developing efficient and effective solutions for it is really a difficult task. This manuscript describes about the mathematical ontology and a new model based on the Lakota-Volterra equation known as Predator-Prey Model which predicts the trustworthiness of the IaaS virtual platform. The proposed research would minimize the threats to the virtual machines in the cloud environment irrespective of the user’s applications and security policy. It will basically ensure the degree of the security of virtual machines in a cloud environment which helps the cloud service providers to take the quick decisions and about the up gradation of the counter attack measurements.

How to cite this article:

S.B. Dash, H. Saini, T.C. Panda and A. Mishra, 2015. Predator-Prey Model for Infectious Virtual Machines in IaaS Cloud Environment Based on Lakota-Volterra Equation. Asian Journal of Information Technology, 14: 84-91.

Design and power by Medwell Web Development Team. © Medwell Publishing 2021 All Rights Reserved