References
- J. S. Reuben, "A survey on virtual machine security," in Proceedings of TKK T-110.5290 Seminar on Network Security, 2007.
- H. Jin, W. Gao, S. Wu, X. Shi, X. Wu, and F. Zhou, "Optimizing the live migration of virtual machine by CPU scheduling," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1088-1096, 2011. https://doi.org/10.1016/j.jnca.2010.06.013
- D. S. Dias and L. H. M. Costa, "Online traffic-aware virtual machine placement in data center networks," in Proceedings of Global Information Infrastructure and Networking Symposium (GIIS), Choroni, Venezuela, 2012, pp. 1-8.
- V. Mann, A. Kumar, P. Dutta, and S. Kalyanaraman, "VMFlow: leveraging VM mobility to reduce network power costs in data centers," in Proceedings of the 10th International IFIP TC6 Conference on Networking, Valencia, Spain, 2011, pp. 198-211.
- H. Jin, S. Ibrahim, T. Bell, W. Gao, D. Huang, and S. Wu, "Cloud types and services," in Handbook of Cloud Computing. New York, NY: Springer, 2010, pp. 335-355.
- U. Deshpande and K. Keahey, "Traffic-sensitive live migration of virtual machines," in Proceedings of 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Shenzhen, China, 2015, pp. 51-60.
- R. Narayani and W. A. Banu, "Framework for provenance based virtual machine placement in cloud," International Journal of Education and Management Engineering, vol. 5, no. 1, pp. 19-26, 2015. https://doi.org/10.5815/ijeme.2015.01.03
- X. Meng, V. Pappas, and L. Zhang, "Improving the scalability of data center networks with traffic-aware virtual machine placement," in Proceedings of INFOCOM, San Diego, CA, 2010, pp. 1-9.
- H. Mi, H. Wang, G. Yin, Y. Zhou, D. Shi, and L. Yuan, "Online self-reconfiguration with performance guarantee for energy-efficient large-scale cloud computing data centers," in Proceedings of 2010 IEEE International Conference on Services Computing (SCC), Miami, FL, 2010, pp. 514-521.
- National Institute of Standards and Technology (NIST) cloud computing program [Online]. Available: http://www.nist.gov/.
- P. Xiao, Z. Hu, D. Liu, G. Yan, and X. Qu, "Virtual machine power measuring technique with bounded error in cloud environments," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 818-828, 2013. https://doi.org/10.1016/j.jnca.2012.12.002
- Y. Luo, B. Zhang, X. Wang, Z. Wang, Y. Sun, and H. Chen, "Live and incremental whole-system migration of virtual machines using block-bitmap," in Proceedings of 2008 IEEE International Conference on Cluster Computing, Tsukuba, Japan, 2008, pp. 99-106.
- D. Perez-Botero, "A brief tutorial on live virtual machine migration from a security perspective," University of Princeton, Princeton, NJ, 2011.
- C. Li, A. Raghunathan and N. K. Jha, "A trusted virtual machine in an untrusted management environment," IEEE Transactions on Services Computing, vol. 5, no. 4, pp. 472-483, 2012. https://doi.org/10.1109/TSC.2011.30
- J. Dong, X. Jin, H. Wang, Y. Li, P. Zhang, and S. Cheng, "Energy-saving virtual machine placement in cloud data centers," in Proceedings of 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Delft, Netherlands, 2013, pp. 618-624.
- F. Sabahi, "Secure virtualization for cloud environment using hypervisor-based technology," International Journal of Machine Learning and Computing, vol. 2, no. 1, pp. 39-45, 2012.
- Y. Cheng and X. Ding, "Guardian: hypervisor as security foothold for personal computers," in Trust and Trustworthy Computing. Heidelberg: Springer, 2013, pp. 19-36.
- X. Chen, X. Gao, H. Wan, S. Wang, and X. Long, "Application-transparent live migration for a virtual machine on network security enhanced hypervisor," China Communications, vol. 8, no. 3, pp. 32-42, 2011.
- E. Feller, C. Morin, and A. Esnault, "A case for fully decentralized dynamic VM consolidation in clouds," in Proceedings of 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), Taipei, Taiwan, 2012, pp. 26-33.
- T. Hirofuchi, H. Nakada, S. Itoh, and S. Sekiguchi, "Reactive consolidation of virtual machines enabled by postcopy live migration," in Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing, San Jose, CA, 2011, pp. 11-18.
- X. Wang, X. Liu, L. Fan, and X. Jia, "A decentralized virtual machine migration approach of data centers for cloud computing," Mathematical Problems in Engineering, vol. 2013, article no. 878542, 2013.
- W. F. Hsu, G. H. Luo, S. M. Yuan, and C. T. Tsai, "Constructing private cloud storage using network attached storage," in Proceedings of 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), Fukuoka, Japan, 2012, pp. 713-718.
- R. Delgado, "The need for decentralized cloud computing," 2015 [Online]. Available: https://www.socpub.com/articles/the-need-for-decentralized-cloud-computing-14741.
- Amazon Web Services, "AWS Well-Architected Framework," October 2015 [Online]. Available: https://aws.amazon.com/ko/blogs/aws/are-you-well-architected/.
- D. Diaconescu, F. Pop, and V. Cristea, "Energy-aware placement of VMs in a datacenter," in Proceedings of 2013 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj-Napoca, Romania, 2013, pp. 313-318.
- M. Mukhtarov, N. Miloslavskaya, and A. Tolstoy, "Network security threats and cloud infrastructure services monitoring," in Proceedings of 7th International Conference on Networking and Services, Venice/Mestre, Italy, 2011, pp. 141-145.
- A. Shribman and B. Hudzia, "Pre-copy and post-copy VM live migration for memory intensive applications," in European Conference on Parallel Processing. Heidelberg: Springer, 2012, pp. 539-547.
- M. Nanavati, P. Colp, B. Aiello, and A. Warfield, "Cloud security: a gathering storm," Communications of the ACM, vol. 57, no. 5, pp. 70-79, 2014. https://doi.org/10.1145/2593686
- M. Pantazoglou, G. Tzortzakis, and A. Delis, "Decentralized and energy-efficient workload management in enterprise clouds," IEEE Transactions on Cloud Computing, vol. 4, no. 2, pp. 196-209, 2016. https://doi.org/10.1109/TCC.2015.2464817
- D. Loreti and A. Ciampolini, "A decentralized approach for virtual infrastructure management in cloud datacenters," International Journal on Advances in Intelligent Systems, vol. 7, no. 3/4, pp. 507-518, 2014.
- N. Ahmad, A. Kanwal, and M. A. Shibli, “Survey on secure live virtual machine (VM) migration in Cloud,”in Proceedings of 2013 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan, 2013,pp. 101-106.
- G. Booth, A. Soknacki, and A. Somayaji, “Cloud security: attacks and current defenses,” in Proceedings of 8thAnnual Symposium on Information Assurance (ASIA'13), Albany, NY, 2013, pp. 4-5.
- S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, “vTPM: virtualizing the trustedplatform module,” in Proceedings of 15th Conference on USENIX Security Symposium, Vancouver, Canada, 2006,pp. 305-320.