guest operating system
Recently Published Documents


TOTAL DOCUMENTS

9
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

2020 ◽  
Vol 13 (3) ◽  
pp. 491-501
Author(s):  
A.M. Serma Kani ◽  
D. Paulraj

Background:: Virtualization is an efficient technology that accelerates available data center to support efficient workload for the application. It completely based on guest operating system which keeps track of infrastructure that keeps track of real time usage of hardware and utilization of software. Objective:: To address the issues with Virtualization this paper analyzed various virtualization terminology for treating best effective way to reduce IT expenses while boosting efficiency and deployment for all levels of businesses. Methods: This paper discusses about the scenarios where various challenges met by Dynamic VM consolidation. Dynamic conclusion of virtual machines has the ability to increase the consumption of physical setup and focus on reducing power utilization with VM movement for stipulated period. Gathering the needs of all VM working in the application, adjusting the Virtual machine and suitably fit the virtual resource on a physical machine. Profiling and scheduling the virtual CPU to another Physical resource. This can be increased by making live migration with regards to planned schedule of virtual machine allotment. Results:: The recent trends followed in comprehending dynamic VM consolidation is applicable either in heuristic-based techniques which has further approaches based on static as well as adaptive utilization threshold. SLA with unit of time with variant HOST adoption (SLATAH) which is dependent on CPU utilization threshold with 100% for active host. Conclusion:: The cloud provider decision upon choosing the virtual machine for their application also varies with their decision support system that considers data storage and other parameters. It is being compared for the continuous workload distribution as well as eventually compared with changing demands of computation and in various optimization VM placement strategies.



2020 ◽  
Vol 8 (1) ◽  
pp. 49-66
Author(s):  
Agus Priyo Utomo ◽  
Idris Winarno ◽  
Iwan Syarif

Currently, cloud computing technology is implemented by many industries in the world. This technology is very promising due to many companies only need to provide relatively smaller capital for their IT infrastructure. Virtualization is the core of cloud computing technology. Virtualization allows one physical machine to runs multiple operating systems. As a result, they do not need a lot of physical infrastructures (servers). However, the existence of virtualization could not guarantee that system failures in the guest operating system can be avoided. In this paper, we discuss the monitoring of hangs in the guest operating system in a virtualized environment without installing a monitoring agent in the guest operating system. There are a number of forensic applications that are useful for analyzing memory, CPU, and I/O, and one of it is called as LibVMI. Drakvuf, black-box binary analysis system, utilizes LibVMI to secure the guest OS. We use the LibVMI library through Drakvuf plugins to monitor processes running on the guest operating system. Therefore, we create a new plugin to Drakvuf to detect Hangs on the guest operating system running on the Xen Hypervisor. The experiment reveals that our application is able to monitor the guest operating system in real-time. However, Extended Page Table (EPT) violations occur during the monitoring process. Consequently, we need to activate the altp2m feature on Xen Hypervisor to by minimizing EPT violations.



2018 ◽  
Vol 9 (2) ◽  
pp. 39-54 ◽  
Author(s):  
Sultan Abdullah Algarni ◽  
Mohammad Rafi Ikbal ◽  
Roobaea Alroobaea ◽  
Ahmed S Ghiduk ◽  
Farrukh Nadeem

Hardware virtualization plays a major role in IT infrastructure optimization in private data centers and public cloud platforms. Though there are many advancements in CPU architecture and hypervisors recently, but overhead still exists as there is a virtualization layer between the guest operating system and physical hardware. This is particularly when multiple virtual guests are competing for resources on the same physical hardware. Understanding performance of a virtualization layer is crucial as this would have a major impact on entire IT infrastructure. This article has performed an extensive study on comparing the performance of three hypervisors KVM, Xen, and Proxmox VE. The experiments showed that KVM delivers the best performance on most of the selected parameters. Xen excels in file system performance and application performance. Though Proxmox has delivered the best performance in only the sub-category of CPU throughput. This article suggests best-suited hypervisors for targeted applications.



Author(s):  
Gustavo Betarte ◽  
Carlos Luna

In this work we investigate the security of security-critical applications, i.e. applications in which a failure may produce consequences that are unacceptable. We consider three areas: mobile devices, virtualization platforms, and domain name systems.The Java Micro Edition platform defines the Mobile Information Device Profile (MIDP) to facilitate the development of applications for mobile devices, like cell phones and PDAs. We first study and compare formally several variants of the security model specified by MIDP to access sensitive resources of a mobile device.Hypervisors allow multiple guest operating systems to run on shared hardware, and offer a compelling means of improving the security and the flexibility of software systems. In this work we present a formalization of an idealized model of a hypervisor. We establish (formally) that the hypervisor ensures strong isolation properties between the different operating systems, and guarantees that requests from guest operating systems are eventually attended. We show also that virtualized platforms are transparent, i.e. a guest operating system cannot distinguish whether it executes alone or together with other guest operating systems on the platform.The Domain Name System Security Extensions (DNSSEC) is a suite of specifications that provides origin authentication and integrity assurance services for DNS data. We finally introduce a minimalistic specification of a DNSSEC model which provides the grounds needed to formally state and verify security properties concerning the chain of trust of the DNSSEC tree.We develop all our formalizations in the Calculus of Inductive Constructions —formal language that combines a higher-order logic and a richly-typed functional programming language— using the Coq proof assistant.



Sign in / Sign up

Export Citation Format

Share Document