Abstract
Virtualization is a framework or methodology that is used to divide the resources of a computer into multiple execution environments by applying concepts or technologies storage virtualization, client virtualization, and server virtualization are different ways to achieve virtualization. Our goal in this paper is to implement server virtualization with attacks and threats with possible solutions. Server virtualization is best suitable for dividing a server into a multiple virtual servers via software such as VMware and Hyper V. This method is used to increase the resource utilization by performing the same. In this each virtual server act and look like a physical server by increasing the capacity of every single physical machine (Kuche et al. in Int J Comput Netw Wireless Mobile Commun (IJCNWMC) 4:5–10 (2014), [1] with problems like efficient resource management, more downtime and privacy and security of data are associated with server virtualization. The problem is unauthorized users are accessing the access of machine/server in VMware platform. This can be done by proposing model named object level permission model to provide security by assigning permissions and roles as per level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kuche AJ, Dakhne DM, Pardi RL (2014) Towards future smart phone: mobile virtualization using smart phone. Int J Comput Netw Wireless Mobile Commun (IJCNWMC) 4:5–10
Mod P, Bhatt M (2014) A survey on dynamic resource allocation technique in cloud environment—a survey. Int J Adv Res Comput Eng Technol 3:7815–7818
Durairaj M, Kannan P (2014) A study in virtualization techniques and challenges in cloud computing. Int J Sci Technol Res 3:147–151
Prohit B, Sharma T, Jarged S (2016) Virtualization techniques in cloud computing. Imper J Interdiscip Res (IJIR) 2:1476–1479
Subbaiah KV, Kiran Kumar P (2014) Dynamic resource allocation using virtual machines for cloud computing environment. Int J Adv Res Softw Eng 4:978–990
Frtala T, Zokova K (2014) Virualization: an answer to secure development of online experiments. The International Federation of Automatic Control, pp 9738–9743
Sharma AK, Soni P (2013) Mobile cloud computing. Int J Innov Eng Technol (IJIET), 24–27
Kaushik N, Kumar J (2014) A literature survey on mobile cloud computing: open issues and future directions. Int J Eng Comput Sci 3:6165–6171
Oberheide J, Veeraraghavan K, Cooke E, Flinn J, Johanian F (2011) Virtualized in-cloud security service for mobile devices. Electrical Engineering and Computer Science Department, pp 1–5
Sunitha Rekha G (2018) A study on virtualization and virtual machines. Int J Eng Sci Invention (IJESI), 51–55
Ghorpade Y, Bennur T, Acharya HS, Kamatchi R (2015) Server virtualization implementation: an experimental study for cost effective and green computing approach. Int J Comput Sci Trends Technol (IJCST), 109–123
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Grover, V., Gagandeep (2021). Secure Server Virtualization Using Object Level Permission Model. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 135. Springer, Singapore. https://doi.org/10.1007/978-981-15-5421-6_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-5421-6_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5420-9
Online ISBN: 978-981-15-5421-6
eBook Packages: EngineeringEngineering (R0)