Skip to main content

Design of Secure Communication Model for Virtual Environment

  • Conference paper
Global Trends in Computing and Communication Systems (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 269))

Included in the following conference series:

  • 2002 Accesses

Abstract

This structural design mainly concentrates on the concept of Virtualization. This architecture is an innovative approach towards the virtualization technology. This mainly depends on ‘Virtual Service’, providing the optimal implementation of Virtual Hardware, Virtual Machine, Virtual Applications, Virtual Trust, Virtual Security and Virtual Space. This Virtual Space contains collection of virtual machines which run on virtual hardware environment containing virtual applications. During communication between the virtual applications, Virtual Security has been ensured along with virtual trusted connection. This architecture also aims to increase the speed of transmission and minimize the malware threat.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cacheiro, J.L., Fernández, C., Freire, E., Díaz, S., Simón, A.: Providing Grid Services Based on Virtualization and Cloud Technologies. In: Lin, H.-X., Alexander, M., Forsell, M., Knüpfer, A., Prodan, R., Sousa, L., Streit, A. (eds.) Euro-Par 2009. LNCS, vol. 6043, pp. 444–453. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Benzina, H., Goubault-Larrecq, J.: Some Ideas on Virtualized System Security, and Monitors. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 244–258. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Cafaro, M., Aloisio, G.: Grids, Clouds, and Virtualization. Computer Communications and Networks, 1–21 (2011)

    Google Scholar 

  4. Teixeira, R.A., Cavenaghi, M.A., Lobato, R.S., Spolon, R.: Proposal of an On-demand Software Deployment System Based on Application Streaming, Virtualization Techniques and P2P Transport. In: Özcan, A., Chaki, N., Nagamalai, D. (eds.) WiMo 2010. CCIS, vol. 84, pp. 417–424. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Zhang, Y., Su, G., Zheng, W.: Converting Legacy Desktop Applications into On-Demand Personalized Software. IEEE Transactions on Services Computing 3, 306–321 (2010)

    Article  Google Scholar 

  6. Chen, B., Xiao, N., Cai, Z., Wang, Z., Wang, J.: Fast, On-Demand Software Deployment with Lightweight, Independent Virtual Disk Images. In: Grid and Cooperative Computing, vol. 1, pp. 16–23 (2009)

    Google Scholar 

  7. Ku, K.-I., Choi, W.-H., Chung, M., Kim, K., Kim, W.-Y., Hur, S.-J.: Method for distribution, execution and management of the customized application based on software virtualization. In: Advanced Communication Technology (ICACT), vol. 1, pp. 493–496 (2010)

    Google Scholar 

  8. Van Do, T., Krieger, U.R.: A Performance Model for Maintenance Tasks in an Environment of Virtualized Servers. In: Fratta, L., Schulzrinne, H., Takahashi, Y., Spaniol, O. (eds.) NETWORKING 2009. LNCS, vol. 5550, pp. 931–942. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Zhang, B., Wang, X., Lai, R., Yang, L., Wang, Z., Luo, Y., Li, X.: Evaluating and Optimizing I/O Virtualization in Kernel-based Virtual Machine (KVM). In: Ding, C., Shao, Z., Zheng, R. (eds.) NPC 2010. LNCS, vol. 6289, pp. 220–231. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Xie, W., Navathe, S.B., Prasad, S.K., Fisher, D., Yang, Y.: Optimizing Peer Virtualization and Load Balancing. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 357–373. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. He, R., Lacoste, M., Leneutre, J.: Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. In: Computer and Information Technology (CIT), pp. 851–858 (2010)

    Google Scholar 

  12. Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21 (2010)

    Google Scholar 

  13. Huang, D., Ata, S., Medhi, D.: Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet. In: GLOBECOM 2010, pp. 1–6 (2010)

    Google Scholar 

  14. Peng, S., Het, J., Dai, F.: Trust Propagation Model for Federated Virtual Commnunities. In: Communications and Information Technologies, pp. 402–406 (2008)

    Google Scholar 

  15. Ma, S.-G., Yang, J.-H., Ma, S.-G.: Research on trust model in optimal resource allocation for a virtual organization. In: E -Business and E -Government (ICEE), pp. 1–4 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anand, R., Saraswathi, S., Sindu, V.R., Sandhya, B. (2012). Design of Secure Communication Model for Virtual Environment. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29219-4_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29218-7

  • Online ISBN: 978-3-642-29219-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics