Research Article
A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing
Algorithm 2
VMs migration solution calculated algorithm.
input: , acir | output: | (1) FOR(:) | (2) FOR(:) | (3) coVMs = getCoVMs ; | (4) acirU = acir; | (5) confVMs = sameElem(cVMs, confU); | (6) IF() | (7) h·num ; | (8) nConf = h·num(confVMs); | (9) IF(()) | (10) (, acir, ); | (11) getSolution(, , cHosts); | (12) update ; | (13) ELSE | (14) FOR(: nConf.user) | (15) cHosts = getCandHosts(, acir, ); | (16) getSolution(, nConf.num , cHosts); | (17) update(); | (18) ENDFOR | (19) ENDIF | (20) ENDIF | (21) ENFFOR | (22) ENDFOR |
|