Abstract
Cloud services are possible to consisting of personal service using service virtualization for user. However, this process set up a group of users, and has offers a group service of common structure by organized group than a service of personalized cloud. Therefore, this paper proposes a rule of virtualization to provide personalized service with optimal resources in cloud computing. Proposed rule constitute personalized service to fit the user’s status by analyzing user’s situation. A model for personalized service configuration is based on MLP(Multi-Layer Perceptron). And, it should ensure the connectivity of service using connection weights for link of each layer. A history of Matched service with served DR(Direct Relationship) reconstruct the user’s context information by feedback. Thus, proposed rule provides personalized service automatically configured the information and application on user’s situation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Goldberg, R.P.: Survey of Virtual Machine Research. IEEE Computer Magazine, 34–45 (1974)
Wang, S.X., Zhang, L., Wang, S., et al.: A cloud-based trust model for evaluating quality of Web services. Journal of Computer Science and Technology 25(6), 1130–1142 (2010)
Tchepnda, C., Riguidel, M.: Distributed Trust Infrastructure and Trust-Security articulation:Application to Heterogeneous networks. In: Advanced Information Networking and Applications (AINA 2006), vol. 2, pp. 33–38 (2006)
Brakensiek, J., Droge, A., Hartig, H., Lackorzynski, A., Botteck, M.: Virtualization as an Enabler for Security in Mobile Devices. In: Proc. of the 1st Workshop on Isolation and Integration in Embedded Systems, pp. 17–22 (2008)
Hypponen, M.: Malware Goes Mobile. Scientific American 295(5), 70–77 (2006)
VirtualLogix VLX for Mobile handsets, http://www.virtuallogix.com/products/vlx-for-mobile-handsets.html
Zhang, X., Kunjithapatham, A., Jeong, S., Simon, G.: Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. Mobile Networks and Applicatons 16(3), 270–284 (2011)
Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD Thesis, Massachusetts Institute of Technology (2002)
Bharadwaj, K.K., Al-Shamri, M.Y.H.: Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications 8(1), 37–47 (2009)
Zhang, T., Du, Z., Chen, Y., Ji, X., Wang, X.: Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. The Journal of Systems and Software 84(3), 377–387 (2011)
Hwang, J., Suh, S., Heo, S., Park, C., Ryu, J., Park, S., Kim, C.: Xen on ARM:System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones. In: Consumer Communications and Networking Conference 2008 (CCNC 2008), pp. 257–261 (2008)
Grundig Mobile U900, http://linuxfordevices.com/c/a/News/Singlecore-Linux-phone-hitsthe-market , Heiser, G.: Virtualization for Embedded Systems. Open Kernel Labs (2007)
Heiser, G.: The Motorola Evoke QA4-A Case Study in Mobile Virtualization. Open Kernel Labs (2009)
Ryu, E., Kim, I., Kim, J., Eom, Y.: MyAV:An All round virtual Machine Monitor for Mobile Environments. In: Proc. of the 8th IEEE International Conference on Industrial Informatics 2010 (INDIN 2010), pp. 657–662 (2010)
VMware MVP (Mobile Virtualization Platform), http://www.vmware.com/products/mobile/
Yoon, H., Lee, M., Gatton, T.M.: A multi-agent based user context Bayesian neural network analysis system. Artificial Intelligence Review 34(3), 261–270 (2010)
Yoon, H., Kim, E., Lee, M., Lee, J., Gatton, T.M.: A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment. In: Proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008), pp. 332–337 (2008)
Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness. In: Proceedings of the CHI 2000 Workshop on The What, Who, Where, When and How of Context-Awareness (2000)
Schilit, B.N., Adams, N.I., Want, R.: Context-Aware Computing Applications. In: IEEE Workshop on Mobile Computing Systems and Applications, pp. 85–90 (1994)
Crowley, J.L., Coutaz, J., Rey, G., Reignier, P.: Perceptual Components for Context Aware Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 117–134. Springer, Heidelberg (2002)
Pascoe, J.: Adding generic contextual capabilities to wearable computers. In: Proceedings of 2nd International Symposium on Wearable Computers, pp. 92–99 (1998)
Moran, T.P., Dourish, P.: Introduction to This Special Issue on Comtext-Aware Computing. Human-Computer Ineraction (HCI) 16 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, H., Lee, H. (2011). The Design of Personal Virtualization Rule Based on Context-Awareness in Environment of Cloud Computing. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Lecture Notes in Computer Science, vol 6935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24082-9_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-24082-9_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24081-2
Online ISBN: 978-3-642-24082-9
eBook Packages: Computer ScienceComputer Science (R0)