Skip to main content

Using Virtualization Technology for the User Authorization System

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 575))

Abstract

The paper deals with the use of virtualization technology for the development of software system that supports authorization of Wi-Fi networks users. The suggested approach is to use two databases of operators and users, implemented on MySQL, and two subsystems of registration and authorization to be placed on a virtual machine. The paper presents the organization and a general algorithm of the authorization system operation, as well as the load analysis of server with the authorization system. Here considered the graph of hardware resources loads used by the virtual machine. Using the hypervisor allows changing the configuration and provides the possibility to monitor the virtual machine, the necessary disk space, the memory consumption and CPU usage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kusek, Ch., Noy, V.V., Daniel, A.: VMware vSphere 5 Administration Instant Reference. Sybex, Indianapolis (2011)

    Google Scholar 

  2. Wireless networking products for broadband and enterprise. Ubiquiti Networks. https://www.ubnt.com

  3. Nixon, R.: Learning PHP, MySQL, JavaScript, CSS & HTML5. O’Reilly Media, Sebastopol (2014)

    Google Scholar 

  4. Coggeshall, J.: PHP 5 Unleashed. Sams, Indianapolis (2004)

    Google Scholar 

  5. Tansley, D.: Linux and UNIX Shell Programming. Addison-Wesley, Boston (2000)

    Google Scholar 

  6. PhpMyAdmin, https://www.phpmyadmin.net

  7. Kostyuk, A., Polenov, M., Lukyanov, V., Muntyan, E., Nikolava, A.: Research of virtualization deployment possibility in smart house control systems. In: Informatization and Communication, vol. 3, pp. 72–77, Moscow (2015). (in Russian)

    Google Scholar 

  8. Polenov, M., Kostyuk, A., Muntyan, E., Guzik, V., Lukyanov, V.: Application of virtualization technology for implementing smart house control systems. In: Silhavy, R., Senkerik, R., Oplatkova, Z.K., Silhavy, P., Prokopova, Z. (eds.) Software Engineering Perspectives and Application in Intelligent Systems. AISC, vol. 465, pp. 329–339. Springer, Cham (2016). doi:10.1007/978-3-319-33622-0_30

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was financially supported by the Ministry of Education and Science of the Russian Federation under Project No. 2.3928.2017 (Project part of State task).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maxim Polenov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Polenov, M., Guzik, V., Lukyanov, V. (2017). Using Virtualization Technology for the User Authorization System. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57141-6_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57140-9

  • Online ISBN: 978-3-319-57141-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics