The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation...
Cloud computing is a technology of inter-connected servers and resources that use virtualization to utilize the resources, flexibility, and scalability. Cloud computing is accessible through the network. This accessibility and utilization have its own benefit and drawbacks. Utilization and scalability make this technology more economic and affordable for small businesses. Flexibility drastically reduces...
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, cloud users' data bring about many security issues, including data leakage and data tampering. Now, the security and integrity of cloud data usually depend on a trusted third party auditors...
Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can...
As the development in the cloud environment, virtual technology can consolidate multiple servers and abstract the hardware resources to each virtual machine. Memory is a well-known physical hardware resource, which has various limitations because of its high cost and strong power. The size of memory in which virtual machines in the Cloud environment always changes dynamically. Therefore, a flexible...
Malicious stealth software can detect being executed in a virtual machine and thus behave differently. If the system virtualization however is moved to the hardware level, the malware is fooled and can be identified and monitored. This paper gives an overview of requirements for a hardware supported virtualization facility implemented on an FPGA. These requirements are examined along the lines of...
Many universities offer students to work on live networking equipment. Unfortunately this is not very efficient for teaching networking labs, especially if the size of the class is really large. The aim of this project is to create a virtual lab to help overcome the existing issues of limited hardware and accessibility in physical laboratories. The lab gives students the ability to deploy virtual...
As the course of computer operating system requires students to understand the interactions between computer systems, users and hardware platform, this paper concentrates on the problem of using the virtualization technology in computer operating system teaching. Particularly, virtualization technology is designed to simulate the real computer hardware environment, and then make the operating system...
Virtualization helps a lot in handling critical applications in a highly availability manner, stream lining in applications deployment, application migrations etc. It is because of the virtualization that users are able to reduce the extra requirements of hardware, power consumption, trimming the space requirements, air conditioning requirements etc. Server consolidation, disaster recovery, dynamic...
There is an increased trend in information insecurity, online fraud and social engineering activities today as a result of high dependence on the Internet and social networks for communication, advertisement of products and services, etc. Malwares are most times, deliberately programmed as worms to appear as flash messages, online games, gift awards and in many other attractive forms for the user...
The emergence of cloud computing as a ubiquitous platform for elastically scaling services has generated need and opportunity for new types of operating systems. A service that needs to be both elastic and resource efficient needs A) highly specialized components, and B) to run with minimal resource overhead. Classical general purpose operating systems designed for extensive hardware support are by...
With ubiquitous presence and perpetual growth of software applications and computing devices connected to the Internet, organizations and businesses are faced with increasing challenges in operating and maintaining technologies that support their IT infrastructure. Among the goals of technology management are cost-effectiveness, energy efficiency, and secure management of information technologies,...
This paper presents a new hybrid honeypot architecture which focuses on the coverage of large IPv6 address spaces. Results from a 15-months darknet experiment verify that attackers and researchers utilise various approaches to scan wide and unforeseeable IPv6 address ranges which cannot be managed with current honeypot solutions. The huge IPv6 address space not only makes it hard for attackers to...
Rainbow is the system for running hardware accelerated virtual machines with an interactive access capability as grid jobs submitted to the Advanced Resource Connector (ARC) [1] powered infrastructure. Methods for running virtual machine as a grid jobs as well as Rainbow architecture has been proposed and implemented for practical use in the Ukrainian National Grid (UNG). Rainbow framework had been...
Traditional distributed schedulers only consider the scheduling of jobs and treat the storage system as static and already deployed. However, individual application often needs its own configuration of storage system. Therefore, traditional distributed schedulers are not able to serve multiple tenants. To improve the resource utilization, some mechanisms are needed to consolidate multiple applications...
It is expected to meet improving IO efficiency, lower management costs, higher storage utilization at the same time when creating a virtual cluster on a host machine. To meet these three goals, many existing methods improve the host storage utilization and improve virtual machine performance by increasing number of nodes and adopting COW technology and QCOW2 image format. However, adding more nodes...
This paper examines computer virtualization as a solution to issues encountered in maintaining HMI and SCADA systems based on commercial off-the-shelf computing hardware. Following a brief primer, this paper outlines issues arising from the rapid advancement of personal and server computing hardware, including automation software conflicts with new operating systems, device driver availability for...
Hypervisors enable multiple operating systems to run above it with the help of virtualization technique by sharing underlying physical resources. KVM hypervisor uses hybrid virtualization technique i.e., it uses full virtualization technique along with hardware assisted virtualization. It is motivating to analyse different Operating Systems (OSs) performance in the Private Cloud with KVM hypervisor...
Encrypted and Deniable File System (EDFS) is widely used to hide the existence of files and directories. However, existing EDFS solutions suffer the challenges which operating systems and many applications will leak the existence information. This paper proposes a novel virtual machine based approach, namely Shadow Execution Environment (SEE), to address this issue. SEE combines EDFS and our Local-Booted...
Today, healthcare service providers are increasingly making use of the cloud for hosting their services. Although such services are regulated by policies such as HIPAA and healthcare service providers follow best practises to minimise attacks, the attackers can easily exploit such services. Hence there is need for securing such critical services. In this paper we propose trust enhanced cloud security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.