• Title/Summary/Keyword: virtualization system

Search Result 259, Processing Time 0.024 seconds

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment (ACAS를 통한 클라우드 가상화 내부 환경 보안성 강화 연구)

  • Park, Tae-Sung;Choi, Do-Hyeon;Do, Kyoung-Hwa;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1355-1362
    • /
    • 2012
  • As the utilization of cloud computing service rapidly increases to meet demands for various forms of service recently, the virtualization technology has made a rapid rise, further leading to some issues related to security, such as safety and reliability. As a system to provide environments what multiple virtual operating systems can be loaded, hypervisors may be a target of various attacks, such as control loss and authority seizure, since all the agents fcan be damaged by a malicious access to the virtualization layer. Therefore, this paper was conducted to investigate the access control for agents and suggest a plan to control malicious accesses to the cloud virtualization internal environment. The suggested technique was verified not to have effect on the performance of the system and environment through an analysis of its performance.

Virtualization of Safety-Related Controller Processor Module (안전등급 제어기 프로세서 모듈 가상화)

  • Lee, Youn-Sang;Kim, Jong-Myung;Yoon, Hyeok-Jae;Song, Seung Whan;Kim, Jeong-Beom
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.449-458
    • /
    • 2022
  • In a power plant, the utility operates controllers include safety program that has performed several stages verification to prevent accidents in preparation for accidents, or to stably operate in accident. This paper describes the virtualization technology so that the verified binary operating system and application program can operate on the controller processor used in the power plant safety control facility. The technology applied to this virtualization processor uses commercial tools to implement the essential components for the operation of the safety-grade controller processor module, such as command interpreters and analyzers, and the virtualization platform was developed in a Linux-based operating system using the Imperas Tool. In addition, it was checked whether the implemented virtual processor module can normally interpret and execute binary-type instructions.

A Study on Computer Center Maintenance Savings through NT Server Consolidate Virtualization (NT 서버 통합 가상화를 통한 전산센터 유지보수 절감에 대한 연구)

  • Lee, Yong-Hui;Kim, Hwan-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2014
  • In this paper, we build server consolidate virtualization focusing on NT server dilapidated and through analysis of the effect of this, has been presented the following results. First, it was possible to obtain an increase in the constant temperature constant humidity chamber efficiency by securing the upper surface space for computing data center mounted virtualization integration server servers multiple physical. Second, by the deployment of virtualization of a large server dilapidated, the introduction of new resources and the cost of maintaining computerized data center and reduce power consumption, the reduction of hardware introduction of additional due to the new server deployment it was possible to derive a cost reduction effect. We obtain the reduction of 89% and 79% compared with conventional consumption of cooling and power savings of the top surface, respectively. Integration of NT servers are virtualized can be expected to change in the Green-IT to contribute to providing the maintenance costs of computing centers in the future as well as current. Building a virtualization server integration applied in this paper can be similarly applied to the UNIX system and to integrate the server group other.

Service Delivery Time Improvement using HDFS in Desktop Virtualization (데스크탑 가상화에서 HDFS를 이용한 서비스 제공시간 개선 연구)

  • Lee, Wan-Hee;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.913-921
    • /
    • 2012
  • The current PC-based desktop environment is being converted into server-based virtual desktop environment due to security, mobility, and low upgrade cost. In this paper, a desktop virtualization system is implemented using an open source-based cloud computing platform and hypervisor. The implemented system is applied to the virtualziation of computer in university. In order to reduce the image transfer time, we propose a solution using HDFS. In addition, an image management structure needed for desktop virtualization is designed and implemented, and applied to a real computer lab which accommodates 30 PCs. The performance of the proposed system is evaluated in various aspects including implementation cost, power saving rate, reduction rate of license cost, and management cost. The experimental results showed that the proposed system considerably reduced the image transfer time for desktop service.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

Softwarization of Cloud-based Real-Time Broadcast Channel System

  • Kwon, Myung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.25-32
    • /
    • 2017
  • In this paper, we propose the softwareization of broadcasting system. Recently, the topic of industry is the fourth industrial revolution. The fourth industrial revolution is evolving from physical to virtualization. The Industrial Revolution is based on IT technology. Artificial Intelligence (AI), Big Data, and the Internet of Things, which are famous for Alpha Go, are based on software. Among IT, software is the main driver of industrial terrain change. The systemization of software on the basis of cloud environment is proceeding rapidly. System development through softwarization can reduce time to market lead time, hardware cost reduction and manual operation compared to existing hardware system. By developing and implementing broadcasting system such as IPTV based on cloud, lead time for opening service compared to existing hardware system can be shortened by more than 90% and investment cost can be saved by about 40%. In addition, the area of the system can be reduced by 50%. In addition, efficiency can be improved between infrastructures, shortening of trouble handling and ease of maintenance. Finally, we can improve customer experience through rapid service opening.

Efficient Virtual Machine Placement Considering System Load (시스템 부하를 고려한 효율적인 가상 머신 배치)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.35-43
    • /
    • 2020
  • Cloud computing integrates computing resources such as servers, storage, and networks with virtualization technology to provide suitable services according to user needs. Due to the structural characteristics of sharing physical resources based on virtualization technology, threats to availability can occur, so it is essential to respond to availability threats in cloud computing. Existing over-provisioning method is not suitable because it can generate idle resources and cause under-provisioning to degrade or disconnect service. System resources must be allocated in real-time according to the system load to guarantee the cloud system's availability. Through appropriate management measures, it is necessary to reduce the system load and increase the performance of the system. This paper analyzes the work response time according to the allocation or migration of virtual machines and discusses an efficient resource management method considering the system load.

Important Information Protection using Client Virtualization (클라이언트 가상화를 이용한 중요정보 보호)

  • Lim, Se-Jung;Kim, Gwang-Jun;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.111-117
    • /
    • 2011
  • In this paper, proposed client virtualization technology to minimize degradation of the local computing environment, efficient and qualified users in the area of virtual functions needed to enable the user to provide important information in the local computing environment protection and performance, stability and continuity was important to keep. As well as the local computing environment from malicious code attacks such as methods for protecting virtualized domain also can not be overlooked as a major problem area in a virtualized, virtualized data through the encryption of user-space security, maximized. In addition, through virtualization using local computing resources efficiently while still a local computing system separate from the computing resources to a single user can get the same effect.