Skip to main content

The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems

  • Conference paper
  • First Online:
Ubiquitous Computing Application and Wireless Sensor

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 331))

Abstract

To meet the demand for seamless real-time services with limited resources of ubiquitous computing environments, this paper suggests a new virtualization-based server cluster system introducing three schemes: simplified rotation process to reduce system overhead, exposure time adjustment to prevent the degradation of system performance, and spare server insertion to cope with heavy incoming packets. It is verified for ubiquitous computing systems which should satisfy strict operational constraints with limited resources that the proposed schemes enable the systems to achieve higher levels of service quality as well as to stand up to distributed denial of service (DDoS) attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Smith M, Schridde C, Freisleben B (2008) Securing stateful grid servers through virtual server rotation. In: Proceedings of the 17th international symposium on high performance distributed computing (HPDC ‘08), pp 11–22

    Google Scholar 

  2. Advanced Micro Devices (2008) AMD-VTM nested paging

    Google Scholar 

  3. Varanasi P, Heiser G (2011) Hardware-supported virtualization on ARM. In: Proceedings of the second Asia-Pacific workshop on system article no. 11

    Google Scholar 

  4. Saidane A, Nicomette V, Deswarte Y (2009) The design of a generic intrusion-tolerant architecture for web servers. IEEE Trans Dependable Secure Comput 6(1):45–48

    Google Scholar 

  5. Huang Y, Arsenault D, Sood A (2006) Incorruptible system self-cleansing intrusion tolerance and its application to dns security. J Netw 1(5):21–30

    Google Scholar 

  6. Yih H, Arun S (2002) Self-cleansing systems for intrusion containment. In: Proceedings of workshop on self-healing, adaptive, and self-managed systems (SHAMAN)

    Google Scholar 

  7. Lim J, Kim Y, Koo D, Lee S, Doo S, Yoon H (2013) A novel adaptive cluster transformation (act)-based intrusion tolerant architecture for hybrid information technology. J Super Comput 66(2):918–935

    Article  Google Scholar 

  8. Kim Y, Lim J, Doo S, Yoon H (2012) The design of adaptive intrusion tolerant system (ITS) based on historical data. In: International conference for internet technology and secured transactions, pp 662–667

    Google Scholar 

  9. Huang Y, Arsenault D, Sood A (2006) Closing cluster attack windows through server redundancy and rotations. In: Proceedings of the sixth international symposium on cluster computation and the grid workshops (ccgridw ‘06)

    Google Scholar 

  10. Lim J, Doo S, Yoon H (2013) The design of a robust intrusion tolerance system through advanced adaptive cluster transformation and vulnerability-based vm selection. Mil Commun Conf (MILCOM 2013), pp 1422–1428

    Google Scholar 

  11. Bangalore AK, Sood AK (2009) Securing web servers using self cleansing intrusion tolerance (scit). In: The Second international conference on dependability (DEPEND)

    Google Scholar 

  12. Nguyen Q, Sood A (2010) Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism. International conference on dependable systems and networks workshops (DSN-W)

    Google Scholar 

  13. Schwetman H (2001) CSIM19: a powerful tool for building system models. In: Proceedings of the 2001 winter simulation conference, pp 250–255

    Google Scholar 

Download references

Acknowledgments

This work was supported by the IT R&D program of MKE/KEIT[10041244, SmartTV 2.0 Software Platform].This work was supported by the National Research Foundation of Korea(NRF) grant funded by the KoreaGovernment(MEST) (No.2014R1A2A2A01006957).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jungmin Lim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Lim, J., Song, S., Lee, S., Doo, S., Yoon, H. (2015). The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9618-7_34

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9617-0

  • Online ISBN: 978-94-017-9618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics