Total views : 663

Mathematical Ontology for Infectious Virtual Machines in IaaS Cloud Environment


  • CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India
  • Department of Computer Science and Technology, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh,, India
  • Department of Mathematics, Ravenshaw University, Revenshaw College Campus, College Square, Cuttack - 753003, Odisha, India
  • Department of Mathematics, CUTM, Paralakhemundi, R.Sitapur - 761211, Odisha, India


Background/Objectives: Cloud virtualization is a creative and one of the altogether accomplished improvements in the current figuring environment. It provides a virtualized environment based on Service Level Agreement (SLA) to cloud. Methods/Statistical Analysis: Infrastructures of Physical machines are rapidly replacing by Virtual machines (VMs) for their abilities to emulate hardware environments, share hardware resources, and utilization of a variety of operating systems. Accordingly, giving security to the cloud virtual machines and clients’ information is one of the essential difficulties to data frameworks. This manuscript describes about the mathematical ontology based upon the attacked VMs and infectious VMs which predicts the trustworthiness of the IaaS virtual platform. Findings: The proposed work will diminish the dangers to the VMs in the cloud surrounding independent of the client’s security and applications approach. Application/Improvements: It will fundamentally guarantee the level of the security of VMs in a cloud situation which assists the cloud administration suppliers to take the fast choices and about the up-degree of the counter assault estimations.


Cloud Computing, Cloud Virtualization Security, Mathematical Ontology, Predator-Prey Model, SLA

Full Text:

 |  (PDF views: 207)


  • Hamdaqa M, Tahvildari L. Cloud Computing Uncovered: A Research Landscape. Advances in Computers. 2012; 86:41–85.
  • Moreno-Vozmediano R, S Montero R, M Llorente I. Key Challenges in Cloud Computing -Enabling the Future Internet of Services. IEEE Internet Computing. 2012; 17(4):18–25.
  • Zissis D, Lekkas D. Addressing cloud computing security issues. Future Generation Computer Systems. 2012; 28(3):583–92.
  • Dash SB, Saini H, Panda TC, Mishra A. Service Level Agreement Assurance in Cloud Computing: A Trust Issue. International Journal of Computer Science and Information Technologies. 2014; 5(3):2899–906.
  • Prasad MR, Naik RL, Bapuji V. Cloud Computing: Research Issues and Implications. International Journal of Cloud Computing and Services Science. 2013; 2(2):134–40.
  • Francesco MA, Gianni F. An approach to a cloud computing network. Czech Republic: Proceedings of First International Conference on the Applications of Digital Information and Web Technologies. 2008; p. 113–18.
  • Dash SB, Saini H, Panda TC, Mishra A. Prediction of Trustworthiness in the Cloud Computing Environment using Predator-Prey Model. International Journal of Cloud Computing and Services Science. 2013; 2(5):336–44.
  • Dash SB, Saini H, Panda TC, Mishra A. A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm. Journal of Engineering Research and Applications. 2014; 4(6):248–54.
  • Li Y, Li W, Jiang C. A Survey of Virtual Machine System: Current Technology and Future Trends. Guangzhou, China: Proceedings of Third International Symposium on Electronic Commerce and Security. 2010; p. 332–36.
  • Mansukhani B, Zia TA. The Security Challenges and Countermeasures of Virtual Cloud. Perth, Australia: Proceedings of the 10th Australian Information Security Management Conference. 2012; p. 51–8.
  • Saini H, Dinesh Saini D. VAIN: A Stochastic Model for Dynamics of Malicious Objects. ICFAI University Journal of Systems Management. 2008; 6(1):14–28.
  • Chen Z, Gao L, Kwiat K. Modeling the Spread of Active Worms. USA: Proceedings of INFOCOM: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. 2003; 3:1890–1900.
  • Hadeler KP, Freedman HI. Predator-prey populations with parasitic infection. Journal of Mathematical Biology. 1989; 27:609–31.
  • Tianfield H. Cloud Computing Architectures. USA: Proceedings of 2011 IEEE International Conference on Systems, Man, and Cybernetics. 2011; p. 1394–99.
  • Xiaoping X, Junhu Y. Research on Cloud Computing Security Platform. China: Proceedings of 2012 Fourth International Conference on Computational and Information Sciences. 2012; p.799–802.
  • Grobauer B, Siemens, Walloschek T, Stocker E. Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy. 2011; 9(2):50–7.
  • Takabi H, James BD, Gail-Joon Ahn. Security and Privacy Challenges in Cloud Computing Environments. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy. 2010; 8(6):24–31.
  • Mishra BK, Ansari GM. Predator-Prey Model for the attack of Malicious objects in computer network. Journal of Engineering and Applied Science. 2009; 4(3):215–20.
  • Xiao Z, Xiao Y. Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials. 2013; 15(2):843–59.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.