files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
120
Views
2
Downloads

Predator-Prey Model for Infectious Virtual Machines in IaaS Cloud Environment Based on Lakota-Volterra Equation

S.B. Dash, H. Saini, T.C. Panda and A. Mishra
Page: 84-91 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Infrastructure as a Service (IaaS) is an innovative and one of the significantly achieved developments in the cloud computing environment. Providing security to the cloud virtual machines and users’ data are the greatest challenge of information system. So, understanding the risks of the security and privacy in the cloud and developing efficient and effective solutions for it is really a difficult task. This manuscript describes about the mathematical ontology and a new model based on the Lakota-Volterra equation known as Predator-Prey Model which predicts the trustworthiness of the IaaS virtual platform. The proposed research would minimize the threats to the virtual machines in the cloud environment irrespective of the user’s applications and security policy. It will basically ensure the degree of the security of virtual machines in a cloud environment which helps the cloud service providers to take the quick decisions and about the up gradation of the counter attack measurements.


How to cite this article:

S.B. Dash, H. Saini, T.C. Panda and A. Mishra. Predator-Prey Model for Infectious Virtual Machines in IaaS Cloud Environment Based on Lakota-Volterra Equation.
DOI: https://doi.org/10.36478/ajit.2015.84.91
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2015.84.91