Abstract
This structural design mainly concentrates on the concept of Virtualization. This architecture is an innovative approach towards the virtualization technology. This mainly depends on ‘Virtual Service’, providing the optimal implementation of Virtual Hardware, Virtual Machine, Virtual Applications, Virtual Trust, Virtual Security and Virtual Space. This Virtual Space contains collection of virtual machines which run on virtual hardware environment containing virtual applications. During communication between the virtual applications, Virtual Security has been ensured along with virtual trusted connection. This architecture also aims to increase the speed of transmission and minimize the malware threat.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cacheiro, J.L., Fernández, C., Freire, E., Díaz, S., Simón, A.: Providing Grid Services Based on Virtualization and Cloud Technologies. In: Lin, H.-X., Alexander, M., Forsell, M., Knüpfer, A., Prodan, R., Sousa, L., Streit, A. (eds.) Euro-Par 2009. LNCS, vol. 6043, pp. 444–453. Springer, Heidelberg (2010)
Benzina, H., Goubault-Larrecq, J.: Some Ideas on Virtualized System Security, and Monitors. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 244–258. Springer, Heidelberg (2011)
Cafaro, M., Aloisio, G.: Grids, Clouds, and Virtualization. Computer Communications and Networks, 1–21 (2011)
Teixeira, R.A., Cavenaghi, M.A., Lobato, R.S., Spolon, R.: Proposal of an On-demand Software Deployment System Based on Application Streaming, Virtualization Techniques and P2P Transport. In: Özcan, A., Chaki, N., Nagamalai, D. (eds.) WiMo 2010. CCIS, vol. 84, pp. 417–424. Springer, Heidelberg (2010)
Zhang, Y., Su, G., Zheng, W.: Converting Legacy Desktop Applications into On-Demand Personalized Software. IEEE Transactions on Services Computing 3, 306–321 (2010)
Chen, B., Xiao, N., Cai, Z., Wang, Z., Wang, J.: Fast, On-Demand Software Deployment with Lightweight, Independent Virtual Disk Images. In: Grid and Cooperative Computing, vol. 1, pp. 16–23 (2009)
Ku, K.-I., Choi, W.-H., Chung, M., Kim, K., Kim, W.-Y., Hur, S.-J.: Method for distribution, execution and management of the customized application based on software virtualization. In: Advanced Communication Technology (ICACT), vol. 1, pp. 493–496 (2010)
Van Do, T., Krieger, U.R.: A Performance Model for Maintenance Tasks in an Environment of Virtualized Servers. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds.) NETWORKING 2009. LNCS, vol. 5550, pp. 931–942. Springer, Heidelberg (2009)
Zhang, B., Wang, X., Lai, R., Yang, L., Wang, Z., Luo, Y., Li, X.: Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM). In: Ding, C., Shao, Z., Zheng, R. (eds.) NPC 2010. LNCS, vol. 6289, pp. 220–231. Springer, Heidelberg (2010)
Xie, W., Navathe, S.B., Prasad, S.K., Fisher, D., Yang, Y.: Optimizing Peer Virtualization and Load Balancing. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 357–373. Springer, Heidelberg (2006)
He, R., Lacoste, M., Leneutre, J.: Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. In: Computer and Information Technology (CIT), pp. 851–858 (2010)
Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21 (2010)
Huang, D., Ata, S., Medhi, D.: Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet. In: GLOBECOM 2010, pp. 1–6 (2010)
Peng, S., Het, J., Dai, F.: Trust Propagation Model for Federated Virtual Commnunities. In: Communications and Information Technologies, pp. 402–406 (2008)
Ma, S.-G., Yang, J.-H., Ma, S.-G.: Research on trust model in optimal resource allocation for a virtual organization. In: E -Business and E -Government (ICEE), pp. 1–4 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anand, R., Saraswathi, S., Sindu, V.R., Sandhya, B. (2012). Design of Secure Communication Model for Virtual Environment. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-29219-4_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29218-7
Online ISBN: 978-3-642-29219-4
eBook Packages: Computer ScienceComputer Science (R0)