virtual machine monitor
Recently Published Documents


TOTAL DOCUMENTS

78
(FIVE YEARS 7)

H-INDEX

7
(FIVE YEARS 1)

Author(s):  
Pritam Patange

Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.


Author(s):  
A. Alfred Raja Melvin ◽  
G. Jaspher W. Kathrine ◽  
S. Sudhakar Ilango ◽  
S. Vimal ◽  
Seungmin Rho ◽  
...  

2020 ◽  
Vol 10 (3) ◽  
pp. 67-80 ◽  
Author(s):  
Ganeshayya Ishwarayya Shidaganti ◽  
Amogh Shreedhar Inamdar ◽  
Sindhuja V. Rai ◽  
Anagha M. Rajeev

Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.


This chapter introduces a trustworthy cloud computing architecture that uses the security properties offered by a virtual machine monitor that enforces the principle of least privilege. These security properties are a strong building block to provide trustworthy cloud computing services to cloud consumers. This chapter briefly explained about a proposed system to prevent insider attacks in cloud environment from cloud consumer and cloud service provider perspectives. The proposed framework is initiating how virtual machines are providing the most reliable security materials of the cloud computing architecture. For cloud consumers, the proposed architecture allocates the well-built security materials of the reliable cloud computing services.


2017 ◽  
Vol 5 (4) ◽  
pp. 604-616 ◽  
Author(s):  
Jian Li ◽  
Ruhui Ma ◽  
Haibing Guan ◽  
David S.L. Wei

2016 ◽  
Vol 62 (3) ◽  
pp. 231-236 ◽  
Author(s):  
Waldemar Graniszewski ◽  
Adam Arciszewski

Abstract Virtualization of operating systems and network infrastructure plays an important role in current IT projects. With the number of services running on different hardware resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their competitors. In this paper we evaluate performance of different solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard benchmark tools to compare efficiency of main hardware components, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented.


Computer ◽  
2016 ◽  
Vol 49 (6) ◽  
pp. 66-74
Author(s):  
Qiuming Luo ◽  
Feng Xiao ◽  
Zhong Ming ◽  
Hao Li ◽  
Jianyong Chen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document