{"id":"https://openalex.org/W2514189115","doi":"https://doi.org/10.1145/2905055.2905152","title":"A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud","display_name":"A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2514189115","doi":"https://doi.org/10.1145/2905055.2905152","mag":"2514189115"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088403295","display_name":"Priti Narwal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Priti Narwal","raw_affiliation_strings":["AMITY University, Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"AMITY University, Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012794152","display_name":"Deepak Kumar","orcid":"https://orcid.org/0000-0003-2409-9706"},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Deepak Kumar","raw_affiliation_strings":["AMITY University, Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"AMITY University, Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100734233","display_name":"Mayank Sharma","orcid":"https://orcid.org/0000-0003-3137-9845"},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mayank Sharma","raw_affiliation_strings":["AMITY University, Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"AMITY University, Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088403295"],"corresponding_institution_ids":["https://openalex.org/I4210126505"],"apc_list":null,"apc_paid":null,"fwci":3.3174,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.9329871,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.8622405529022217},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8282027244567871},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.8176088929176331},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8071355819702148},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7954006195068359},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.569312572479248},{"id":"https://openalex.org/keywords/full-virtualization","display_name":"Full virtualization","score":0.54234778881073},{"id":"https://openalex.org/keywords/temporal-isolation-among-virtual-machines","display_name":"Temporal isolation among virtual machines","score":0.5394684672355652},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5167631506919861},{"id":"https://openalex.org/keywords/hardware-virtualization","display_name":"Hardware virtualization","score":0.4931947588920593},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48824241757392883},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.48118311166763306},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.43121927976608276},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.41333746910095215},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.412925660610199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3918365240097046},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20610177516937256}],"concepts":[{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.8622405529022217},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8282027244567871},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8176088929176331},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8071355819702148},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7954006195068359},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.569312572479248},{"id":"https://openalex.org/C47878483","wikidata":"https://www.wikidata.org/wiki/Q848333","display_name":"Full virtualization","level":4,"score":0.54234778881073},{"id":"https://openalex.org/C142355369","wikidata":"https://www.wikidata.org/wiki/Q7698919","display_name":"Temporal isolation among virtual machines","level":4,"score":0.5394684672355652},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5167631506919861},{"id":"https://openalex.org/C68793194","wikidata":"https://www.wikidata.org/wiki/Q1616095","display_name":"Hardware virtualization","level":5,"score":0.4931947588920593},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48824241757392883},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.48118311166763306},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.43121927976608276},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.41333746910095215},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.412925660610199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3918365240097046},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20610177516937256},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W56540897","https://openalex.org/W1535012564","https://openalex.org/W1965145411","https://openalex.org/W1968909445","https://openalex.org/W1978299338","https://openalex.org/W1992291252","https://openalex.org/W2003229135","https://openalex.org/W2031195340","https://openalex.org/W2056145019","https://openalex.org/W2056356307","https://openalex.org/W2062381198","https://openalex.org/W2062757535","https://openalex.org/W2086979623","https://openalex.org/W2096120508","https://openalex.org/W2125083487","https://openalex.org/W2170038998","https://openalex.org/W2320144636"],"related_works":["https://openalex.org/W4220910311","https://openalex.org/W2005435933","https://openalex.org/W2017036943","https://openalex.org/W4200209786","https://openalex.org/W3022486612","https://openalex.org/W2179519055","https://openalex.org/W2188343919","https://openalex.org/W2955107253","https://openalex.org/W2077384014","https://openalex.org/W2357943512"],"abstract_inverted_index":{"Cloud":[0,16],"Computing":[1],"is":[2],"a":[3,78,107,128],"new":[4],"evolutionary":[5],"and":[6,42,69,114,134],"dynamic":[7],"platform":[8],"that":[9,28,53,99],"makes":[10],"use":[11],"of":[12,47,80,109,132,140],"virtualization":[13,19],"technology.":[14],"In":[15],"computing":[17],"environment,":[18],"abstracts":[20],"the":[21,39,45],"hardware":[22,72],"system":[23],"resources":[24],"in":[25,34,71],"software":[26],"so":[27],"each":[29,144],"application":[30],"can":[31,85,124],"be":[32,86,125],"run":[33],"an":[35],"isolated":[36],"environment":[37],"called":[38],"virtual":[40,48,97],"machine":[41],"hypervisor":[43],"does":[44],"allocation":[46],"machines":[49,98],"to":[50],"different":[51],"users":[52,142],"are":[54,100],"hosted":[55,101],"on":[56,88,94,102],"same":[57],"server.":[58],"Although":[59],"it":[60,75],"provides":[61],"many":[62],"benefits":[63],"like":[64],"resource-sharing,":[65],"cost-efficiency,":[66],"high-performance":[67],"computability":[68],"decrease":[70],"cost":[73],"but":[74],"also":[76,115],"imposes":[77],"number":[79],"security":[81,112],"threats.":[82],"The":[83],"threats":[84,113],"directly":[87],"Virtual":[89],"Machines":[90],"(VMs)":[91],"or":[92],"indirectly":[93],"Hyper-visor":[95],"through":[96],"it.":[103],"This":[104],"paper":[105],"presents":[106],"review":[108],"all":[110],"possible":[111,150],"their":[116],"countermeasures":[117],"by":[118],"using":[119],"Game-Theoretic":[120],"approaches.":[121],"Game":[122],"Theory":[123],"used":[126],"as":[127],"defensive":[129],"measure":[130],"because":[131],"independent":[133],"strategic":[135],"rational":[136],"decision":[137],"making":[138],"nature":[139],"cloud":[141],"where":[143],"player":[145],"would":[146],"compete":[147],"for":[148],"best":[149],"solution":[151]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
