Asian Journal of Information Technology

Year: 2015
Volume: 14
Issue: 3
Page No. 84 - 91

Predator-Prey Model for Infectious Virtual Machines in IaaS Cloud Environment Based on Lakota-Volterra Equation

Authors : S.B. Dash, H. Saini, T.C. Panda and A. Mishra

References

Ashktorab, V. and S.R. Taghizadeh, 2012. Security threats and countermeasures in cloud computing. Int. J. Applic. Innov. Eng. Manage., 1: 234-245.
Direct Link  |  

Aymerich, F.M., G. Fenu and S. Surcis, 2008. An approach to a cloud computing network. Proceedings of the 1st International Conference on the Applications of Digital Information and Web Technologies, August 4-6, 2008, Ostrava, Czech Republic, pp: 113-118.

Batiha, B., M.S.M. Noorani and I. Hashim, 2007. Variational iteration method for solving multispecies Lotka-Volterra equations. Comput. Math. Applic., 54: 903-909.
CrossRef  |  Direct Link  |  

Chapman, I.M., S.P. Leblanc and A. Partington, 2011. Taxonomy of cyber attacks and simulation of their effects. Proceedings of the Military Modeling and Simulation Symposium, April 3-7, 2011, Boston, MA., USA., pp: 73-80.

Che, J., Y. Duan, T. Zhang and J. Fan, 2011. Study on the security models and strategies of cloud computing. Procedia Eng., 23: 586-593.
CrossRef  |  Direct Link  |  

Cull, P., 1981. Global stability of population models. Bull. Math. Biol., 43: 47-58.
CrossRef  |  Direct Link  |  

Dash, S.B., H. Saini, T.C. Panda and A. Mishra, 2014. A theoretical aspect of cloud computing service models and its security issues: A paradigm. J. Eng. Res. Applic., 4: 248-254.
Direct Link  |  

Dash, S.B., H. Saini, T.C. Panda and A. Mishra, 2014. Service level agreement assurance in cloud computing: A trust issue. Int. J. Comput. Sci. Inform. Technol., 5: 2899-2906.
Direct Link  |  

Elliott, C., 2010. Botnets: To what extent are they a threat to information security? Inform. Secur. Tech. Rep., 15: 79-103.
CrossRef  |  Direct Link  |  

Gorman, S.P., R.G. Kulkarni, L.A. Schintler and R.R. Stough, 2004. A predator prey approach to the network structure of cyberspace. Proceedings of the Winter International Synposium on Information and Communication Technologies, January 5-8, 2004, Cancun, Mexico, pp: 1-6.

Grobauer, B., T. Walloschek and E. Stocker, 2011. Understanding cloud computing vulnerabilities. IEEE Secur. Privacy, 9: 50-57.
CrossRef  |  Direct Link  |  

Hamdaqa, M. and L. Tahvildari, 2012. Cloud Computing Uncovered: A Research Landscape. In: Advances in Computers, Volume 86, Hurson, A. and A. Memon (Eds.). Chapter 2, Academic Press, Oxford, UK., ISBN-13: 9780123965356, pp: 41-85.

Hyde, D., 2009. A survey on the security of virtual machines. http://www.cs.wustl.edu/~jain/cse571-09/ftp/vmsec.pdf.

Jing, X. and Z. Jian-Jun, 2010. A brief survey on the security model of cloud computing. Proceedings of the 9th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, August 10-12, 2010, Hong Kong, pp: 475 478-.

Li, Y., W. Li and C. Jiang, 2010. A survey of virtual machine system: Current technology and future trends. Proceedings of the 3rd International Symposium on Electronic Commerce and Security, July 29-31, 2010, Guangzhou, China, pp: 332-336.

Mansukhani, B. and T.A. Zia, 2012. The security challenges and countermeasures of virtual cloud. Proceedings of the 10th Australian Information Security Management Conference, December 3-5, 2012, Perth, Western Australia, pp: 51-58.

Mell, P., 2012. What's special about cloud security? IT Prof., 14: 6-8.
CrossRef  |  Direct Link  |  

Moghadam, S.S., 2013. A survey of virtualization security. Int. J. Scient. Eng. Res., 4: 1533-1536.
Direct Link  |  

Moreno-Vozmediano, R., R.S. Montero and I.M. Llorente, 2013. Key challenges in cloud computing: Enabling the future internet of services. IEEE Internet Comput., 17: 18-25.
CrossRef  |  Direct Link  |  

Murray, J.M., 1989. Mathematical Biology. 2nd Edn., Springer-Verlag, Berlin, Germany, ISBN-13: 9780387194608, Pages: 767.

Ouedraogo, M., D. Khadraoui, H. Mouratidis and E. Dubois, 2002. Appraisal and reporting of security assurance at operational systems level. J. Syst. Software, 85: 193-208.
CrossRef  |  Direct Link  |  

Prasad, M.R., R.L. Naik and V. Bapuji, 2013. Cloud computing: Research issues and implications. Int. J. Cloud Comput. Serv. Sci., 2: 134-140.
Direct Link  |  

Saini, H., S.B. Dash, T.C. Panda and A. Mishra, 2013. Prediction of trustworthiness in the cloud computing environment using predator-prey model. Int. J. Cloud Comput. Serv. Sci., 2: 336-344.
Direct Link  |  

Sato, H., A. Kanai and S. Tanimoto, 2010. A cloud trust model in a security aware cloud. Proceedings of the 10th IEEE/IPSJ International Symposium on Applications and the Internet, July 19-23, 2010, Seoul, South Korea, pp: 121-124.

Shaikh, F.B. and S. Haider, 2011. Security threats in cloud computing. Proceedings of the International Conference on Internet Technology and Secured Transactions, December 11-14, 2011, Abu Dhabi, pp: 214-219.

Takabi, H., J.B. Joshi and G.J. Ahn, 2010. Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy, 8: 24-31.
CrossRef  |  Direct Link  |  

Tianfield, H., 2011. Cloud computing architectures. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, October 9-12, 2011, Anchorage, AK., USA., pp: 1394-1399.

Vouk, M.A., 2008. Cloud computing-issues, research and implementations. J. Comput. Inform. Technol., 16: 235-246.
Direct Link  |  

Wu, L. and Y. Wang, 2011. Estimation the parameters of Lotka-Volterra model based on grey direct modelling method and its application. Expert Syst. Applic., 38: 6412-6416.
CrossRef  |  Direct Link  |  

Xiao, Z. and Y. Xiao, 2013. Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials, 15: 843-859.
CrossRef  |  Direct Link  |  

Xu, X and J. Yan, 2012. Research on cloud computing security platform. Proceedings of the 4th International Conference on Computational and Information Sciences, August 17-19, 2012, Chongqing, China, pp: 799-802.

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved