Skip to main content

Secure Server Virtualization Using Object Level Permission Model

  • Conference paper
  • First Online:
Advances in Information Communication Technology and Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 135))

  • 764 Accesses

Abstract

Virtualization is a framework or methodology that is used to divide the resources of a computer into multiple execution environments by applying concepts or technologies storage virtualization, client virtualization, and server virtualization are different ways to achieve virtualization. Our goal in this paper is to implement server virtualization with attacks and threats with possible solutions. Server virtualization is best suitable for dividing a server into a multiple virtual servers via software such as VMware and Hyper V. This method is used to increase the resource utilization by performing the same. In this each virtual server act and look like a physical server by increasing the capacity of every single physical machine (Kuche et al. in Int J Comput Netw Wireless Mobile Commun (IJCNWMC) 4:5–10 (2014), [1] with problems like efficient resource management, more downtime and privacy and security of data are associated with server virtualization. The problem is unauthorized users are accessing the access of machine/server in VMware platform. This can be done by proposing model named object level permission model to provide security by assigning permissions and roles as per level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kuche AJ, Dakhne DM, Pardi RL (2014) Towards future smart phone: mobile virtualization using smart phone. Int J Comput Netw Wireless Mobile Commun (IJCNWMC) 4:5–10

    Google Scholar 

  2. Mod P, Bhatt M (2014) A survey on dynamic resource allocation technique in cloud environment—a survey. Int J Adv Res Comput Eng Technol 3:7815–7818

    Google Scholar 

  3. Durairaj M, Kannan P (2014) A study in virtualization techniques and challenges in cloud computing. Int J Sci Technol Res 3:147–151

    Google Scholar 

  4. Prohit B, Sharma T, Jarged S (2016) Virtualization techniques in cloud computing. Imper J Interdiscip Res (IJIR) 2:1476–1479

    Google Scholar 

  5. Subbaiah KV, Kiran Kumar P (2014) Dynamic resource allocation using virtual machines for cloud computing environment. Int J Adv Res Softw Eng 4:978–990

    Google Scholar 

  6. Frtala T, Zokova K (2014) Virualization: an answer to secure development of online experiments. The International Federation of Automatic Control, pp 9738–9743

    Google Scholar 

  7. Sharma AK, Soni P (2013) Mobile cloud computing. Int J Innov Eng Technol (IJIET), 24–27

    Google Scholar 

  8. Kaushik N, Kumar J (2014) A literature survey on mobile cloud computing: open issues and future directions. Int J Eng Comput Sci 3:6165–6171

    Google Scholar 

  9. Oberheide J, Veeraraghavan K, Cooke E, Flinn J, Johanian F (2011) Virtualized in-cloud security service for mobile devices. Electrical Engineering and Computer Science Department, pp 1–5

    Google Scholar 

  10. Sunitha Rekha G (2018) A study on virtualization and virtual machines. Int J Eng Sci Invention (IJESI), 51–55

    Google Scholar 

  11. Ghorpade Y, Bennur T, Acharya HS, Kamatchi R (2015) Server virtualization implementation: an experimental study for cost effective and green computing approach. Int J Comput Sci Trends Technol (IJCST), 109–123

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Varsha Grover .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Grover, V., Gagandeep (2021). Secure Server Virtualization Using Object Level Permission Model. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 135. Springer, Singapore. https://doi.org/10.1007/978-981-15-5421-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5421-6_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5420-9

  • Online ISBN: 978-981-15-5421-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics