{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:58:11Z","timestamp":1771851491257,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Virtual machines (VMs) are preferred by the majority of organizations due to their high performance. VMs allow for reduced overhead with multiple systems running from the same console at the same time. A physical server is a bare-metal system whose hardware is controlled by the host operating system. A physical server runs on a single instance of OS and application. A virtual server or virtual machine encapsulates the underlying hardware and networking resources. With the existing physical server, it is difficult to migrate the tasks from one platform to another platform or to a datacentre. Centralized security is difficult to setup. But with Hypervisor the virtual machine can be deployed, for instance, with automation. Virtualization cost increases as well as a decrease in hardware and infrastructure space costs. We propose an efficient Azure cloud framework for the utilization of physical server resources at remote VM servers. The proposed framework is implemented in two phases first by integrating physical servers into virtual ones by creating virtual machines, and then by integrating virtual servers into cloud service providers in a cost-effective manner. We create a virtual network in the Azure datacenter using the local host physical server to set up the various virtual machines. Two virtual machine instances, VM1 and VM2, are created using Microsoft Hyper-V with the server Windows 2016 R. The desktop application is deployed and VM performance is monitored using the PowerShell script. Tableau is used to evaluate the physical server functionality of the worksheet for the deployed application.<\/jats:p><jats:p>The proposed Physical to Virtual to Cloud model (P2V2C) model is being tested, and the performance result shows that P2V2C migration is more successful in dynamic provisioning than direct migration to cloud platform infrastructure. The research work was carried out in a secure way through the migration process from P2V2C.<\/jats:p>","DOI":"10.1186\/s13677-022-00326-1","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T11:03:12Z","timestamp":1663585392000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Dynamic resource provisioning and secured file sharing using virtualization in cloud azure"],"prefix":"10.1186","volume":"11","author":[{"given":"Kumaresan","family":"Perumal","sequence":"first","affiliation":[]},{"given":"Senthilkumar","family":"Mohan","sequence":"additional","affiliation":[]},{"given":"Jaroslav","family":"Frnda","sequence":"additional","affiliation":[]},{"given":"Parameshachari Bidare","family":"Divakarachari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"issue":"11","key":"326_CR1","doi-asserted-by":"publisher","first-page":"9095","DOI":"10.1007\/s11227-020-03203-3","volume":"76","author":"A Tarafdar","year":"2020","unstructured":"Tarafdar A, Debnath M, Khatua S, Das RK (2020) Energy and quality of service-aware virtual machine consolidation in a cloud data center. J Supercomput 76(11):9095\u20139126","journal-title":"J Supercomput"},{"issue":"4","key":"326_CR2","doi-asserted-by":"publisher","first-page":"2126","DOI":"10.1007\/s11227-018-2709-7","volume":"75","author":"MH Sayadnavard","year":"2019","unstructured":"Sayadnavard MH, Haghighat AT, Rahmani AM (2019) A reliable energy-aware approach for dynamic virtual machine consolidation in cloud data centers. J Supercomput 75(4):2126\u20132147","journal-title":"J Supercomput"},{"issue":"11","key":"326_CR3","doi-asserted-by":"publisher","first-page":"5846","DOI":"10.1007\/s11227-017-2104-9","volume":"74","author":"G Luo","year":"2018","unstructured":"Luo G, Qian Z, Dong M, Ota K, Lu S (2018) Improving performance by network-aware virtual machine clustering and consolidation. J Supercomput 74(11):5846\u20135864","journal-title":"J Supercomput"},{"issue":"9","key":"326_CR4","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1007\/s11227-018-2485-4","volume":"74","author":"M Torquato","year":"2018","unstructured":"Torquato M, Umesh IM, Maciel P (2018) Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM live migration. J Supercomput 74(9):4817\u20134841","journal-title":"J Supercomput"},{"issue":"11","key":"326_CR5","doi-asserted-by":"publisher","first-page":"6126","DOI":"10.1007\/s11227-018-2518-z","volume":"74","author":"H Yang","year":"2018","unstructured":"Yang H (2018) A virtual machine anomaly detection system for cloud computing infrastructure. J Supercomput 74(11):6126\u20136134","journal-title":"J Supercomput"},{"key":"326_CR6","doi-asserted-by":"publisher","first-page":"102464","DOI":"10.1016\/j.jnca.2019.102464","volume":"149","author":"DA Monge","year":"2020","unstructured":"Monge DA, Pacini E, Mateos C, Alba E, Garino CG (2020) CMI: an online multi-objective genetic autoscaler for scientific and engineering workflows in cloud infrastructures with unreliable virtual machines. J Netw Comput Appl 149:102464","journal-title":"J Netw Comput Appl"},{"key":"326_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.future.2018.08.036","volume":"91","author":"B Mao","year":"2019","unstructured":"Mao B, Yang Y, Wu S, Jiang H, Li KC (2019) IOFollow: improving the performance of VM live storage migration with IO following in the cloud. Futur Gener Comput Syst 91:167\u2013176","journal-title":"Futur Gener Comput Syst"},{"key":"326_CR8","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.future.2019.05.005","volume":"100","author":"A Agarwal","year":"2019","unstructured":"Agarwal A, Duong TN (2019) Secure virtual machine placement in cloud data centers. Futur Gener Comput Syst 100:210\u2013222","journal-title":"Futur Gener Comput Syst"},{"key":"326_CR9","first-page":"1570","volume-title":"2018 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE)","author":"M Alkhonaini","year":"2018","unstructured":"Alkhonaini M, El-Sayed H, August. (2018) Migrating data between physical server and cloud: improving accuracy and data integrity. In: 2018 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp 1570\u20131574"},{"key":"326_CR10","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jss.2016.11.037","volume":"125","author":"I Mavridis","year":"2017","unstructured":"Mavridis I, Karatza H (2017) Performance evaluation of cloud-based log file analysis with apache Hadoop and apache spark. J Syst Softw 125:133\u2013151","journal-title":"J Syst Softw"},{"key":"326_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2015.02.002","volume":"52","author":"RW Ahmad","year":"2015","unstructured":"Ahmad RW, Gani A, Hamid SHA, Shiraz M, Yousafzai A, Xia F (2015) A survey on virtual machine migration and server consolidation frameworks for cloud data centers. J Netw Comput Appl 52:11\u201325","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"326_CR12","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/JSYST.2015.2458273","volume":"11","author":"A Varasteh","year":"2015","unstructured":"Varasteh A, Goudarzi M (2015) Server consolidation techniques in virtualized data centers: a survey. IEEE Syst J 11(2):772\u2013783","journal-title":"IEEE Syst J"},{"key":"326_CR13","first-page":"124","volume-title":"Learning of visual studio practice usage, IEEE 23rd International Conference on Software Analysis, Evolution and Re-Engineering","author":"S Aman","year":"2016","unstructured":"Aman S (2016) Learning of visual studio practice usage, IEEE 23rd International Conference on Software Analysis, Evolution and Re-Engineering, pp 124\u2013134"},{"key":"326_CR14","first-page":"772","volume-title":"Reliable and available data replication planning for cloud storage, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)","author":"J Janpet","year":"2013","unstructured":"Janpet J, Wen YF (2013) Reliable and available data replication planning for cloud storage, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp 772\u2013779"},{"key":"326_CR15","first-page":"1","volume-title":"2016 6th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH)","author":"P Jordan","year":"2016","unstructured":"Jordan P, Van Patten C, Peterson G, Sellers A (2016) Distributed powershell load generator (D-PLG): a new tool for dynamically generating network traffic. In: 2016 6th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), pp 1\u20138"},{"issue":"8","key":"326_CR16","first-page":"1","volume":"14","author":"Y Liu","year":"2016","unstructured":"Liu Y, Guo S, Hu S (2016) Presentation estimation and improvement on multi-dimensional directory in HIVE, 2016, Citation Information. J LaTex Class Files 14(8):1\u201314","journal-title":"J LaTex Class Files"},{"issue":"1","key":"326_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-017-0092-1","volume":"6","author":"A Choudhary","year":"2017","unstructured":"Choudhary A, Govil MC, Singh G, Awasthi LK, Pilli ES, Kapil D (2017) A critical survey of live virtual machine migration techniques. J Cloud Comput 6(1):1\u201341. https:\/\/doi.org\/10.1186\/s13677-017-0092-1","journal-title":"J Cloud Comput"},{"key":"326_CR18","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/B978-1-59749-431-1.00008-4","volume-title":"Microsoft virtualization","author":"T Olzak","year":"2010","unstructured":"Olzak T, Boomer J, Keefer RTM, Sabovik J (2010) Performing physical-to-virtual and virtual-to-virtual migrations. In: Microsoft virtualization. Syngress Publishing Inc., Rockland, Massachusetts, pp 143\u2013174"},{"issue":"3\u20134","key":"326_CR19","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1504\/IJRIS.2018.096216","volume":"10","author":"P Kumaresan","year":"2018","unstructured":"Kumaresan P, Prabukumar M (2018) Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT). Int J Reasoning-based Intelligent Systems 10(3\u20134):258\u2013268","journal-title":"Int J Reasoning-based Intelligent Systems"},{"issue":"6","key":"326_CR20","doi-asserted-by":"publisher","first-page":"3912","DOI":"10.1520\/JTE20180512","volume":"47","author":"K Perumal","year":"2019","unstructured":"Perumal K, Manoharan P (2019) A comparative analysis of energy-efficient protocols for WBAN on heterogeneous transceivers. J Test Eval 47(6):3912\u20133927","journal-title":"J Test Eval"},{"issue":"1","key":"326_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11227-014-1156-3","volume":"69","author":"X Liu","year":"2014","unstructured":"Liu X, Tong W, Zhi X, ZhiRen F, WeZhao L (2014) Performance analysis of cloud computing services considering resources sharing among virtual machines. J Supercomput 69(1):357\u2013374","journal-title":"J Supercomput"},{"key":"326_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4842-1043-7","volume-title":"Microsoft azure and cloud computing","author":"M Copeland","year":"2015","unstructured":"Copeland M et al (2015) Microsoft azure and cloud computing. Microsoft Azure. Apress, Berkeley, pp 3\u201326"},{"issue":"12","key":"326_CR23","doi-asserted-by":"publisher","first-page":"3012","DOI":"10.1109\/TC.2013.185","volume":"63","author":"F Xu","year":"2014","unstructured":"Xu F, Liu F, Liu L, Jin H, Li B, Li B (2014) iAware: making live migration of virtual machines interference-aware in the cloud. IEEE Trans Comput 63(12):3012\u20133025. https:\/\/doi.org\/10.1109\/TC.2013.185","journal-title":"IEEE Trans Comput"},{"key":"326_CR24","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.future.2016.05.003","volume":"72","author":"U Deshpande","year":"2017","unstructured":"Deshpande U, Keahey K (2017) Traffic-sensitive live migration of virtual machines. Futur Gener Comput Syst 72:118\u2013128. https:\/\/doi.org\/10.1016\/j.future.2016.05.003","journal-title":"Futur Gener Comput Syst"},{"key":"326_CR25","doi-asserted-by":"publisher","first-page":"2963","DOI":"10.1109\/ICC.2014.6883775","volume-title":"2014 IEEE International Conference on Communications, ICC 2014","author":"W Cerroni","year":"2014","unstructured":"Cerroni W, Callegati F (2014) Live migration of virtual network functions in cloud-based edge networks. In: 2014 IEEE International Conference on Communications, ICC 2014, pp 2963\u20132968. https:\/\/doi.org\/10.1109\/ICC.2014.6883775"},{"issue":"2","key":"326_CR26","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10586-011-0194-3","volume":"16","author":"H Liu","year":"2013","unstructured":"Liu H, Jin H, Xu CZ, Liao X (2013) Performance and energy modeling for live migration of virtual machines. Clust Comput 16(2):249\u2013264. https:\/\/doi.org\/10.1007\/s10586-011-0194-3","journal-title":"Clust Comput"},{"key":"326_CR27","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/CLOUD.2011.48","volume-title":"Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011","author":"S Kikuchi","year":"2011","unstructured":"Kikuchi S, Matsumoto Y (2011) Performance modeling of concurrent live migration operations in cloud computing systems using prism probabilistic model checker. In: Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011, pp 49\u201356. https:\/\/doi.org\/10.1109\/CLOUD.2011.48"},{"issue":"1","key":"326_CR28","doi-asserted-by":"publisher","first-page":"519","DOI":"10.32604\/cmc.2022.021269","volume":"72","author":"J Stanly Jayaprakash","year":"2022","unstructured":"Stanly Jayaprakash J, Balasubramanian K, Sulaiman R, Hasan MK, Parameshachari BD, Iwendi C (2022) Cloud data encryption and authentication based on enhanced Merkle hash tree method. Computers, Materials Continua 72(1):519\u2013534. https:\/\/doi.org\/10.32604\/cmc.2022.021269","journal-title":"Computers, Materials Continua"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00326-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00326-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00326-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T11:32:50Z","timestamp":1663587170000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00326-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["326"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00326-1","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"15 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"46"}}