Skip to main content

Module-Level Software Streaming Loading Model Based on Hypervisor

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

  • 2919 Accesses

Abstract

In the existing network computing system, the increasingly serious performance problems and endless security problems constantly troubled users and developers. Although the emergence of transparent computing, edge computing and fog computing alleviates this situation to some extent, they still do not fully utilize the collaborative computing power of server side and end-user. In order to address these problems, a new computing and loading model based on hypervisor, which is also called module-level software streaming loading model, will be introduced in this paper. Besides, Cleanroom Protocol and On-demand Prefetching Mechanism will be discussed in this paper. Based on this model, the system does not need to wait for OS or software data download completely when a device or a program to startup. It means the corresponding services can be immediately directly used or accessed by users. This solution can effectively reduce the waiting time for users and improve the user experience. Through a variety of comparative analyses, this model is proved to be an efficient and safe solution for the future computing and loading infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, Y., Zhou, Y.: Transparent computing: spatio-temporal extension on Von Neumann architecture for cloud services. Tsinghua Sci. Technol. 18(1), 10–21 (2013)

    Article  Google Scholar 

  2. Ming, W.: Analysis and a case study of transparent computing implementation with UEFI. Int. J. Cloud Comput. 1(4), 312–328 (2012)

    Article  Google Scholar 

  3. Oliveros, W.V.A., Festin, C.A.M., Ocampo, R.M.: A P2P network booting scheme using a BitTorrent-like protocol. In: 2013 International Conference on IEEE (2013)

    Google Scholar 

  4. Liang, Z., Chunming, H., Tianyu, W., et al.: Prefetching mechanism for on-demand software streaming. J. Comput. Res. Dev. 48(7), 1178–1189 (2011)

    Google Scholar 

  5. Zhang, Y.H., Li, Y.H., Zheng, W.M.: Cloudow: a SaaS runtime system based on the user-level virtualization technology. SCIENTIA SINICA Informationis 3, 001 (2012)

    Google Scholar 

  6. Li, B., Wo, T.Y., Hu, C.M., et al.: Hidden OS objects correlated detection technology based on VMM. J. Softw. 24(2), 405–420 (2013)

    Article  Google Scholar 

  7. Ren, J.B., Qi, Y., Dai, Y.H., et al.: Transparent privacy protection based on virtual machine monitor. J. Softw. 26(8), 2124–2137 (2015)

    MathSciNet  Google Scholar 

  8. Dai, Y., Shi, Y., Qi, Y., et al.: Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. Front. Comput. Sci. 7(1), 34–43 (2013)

    Article  MathSciNet  Google Scholar 

  9. Zhang, Y., Zhou, Y.: TransOS: a transparent computing-based operating system for the cloud. Int. J. Cloud Comput. 1(4), 287–301 (2012)

    Article  Google Scholar 

  10. Zhang, Y., Zhou, Y.: Transparent computing: a new paradigm for pervasive computing. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 1–11. Springer, Heidelberg (2006). https://doi.org/10.1007/11833529_1

    Chapter  Google Scholar 

  11. Peng, T., Liu, Q., Wang, G.J.: A multilevel access control scheme for data security in transparent computing. Comput. Sci. Eng. 2, PP (2016)

    Google Scholar 

  12. Zhang, F., Leach, K., Stavrou, A., et al.: Using hardware features for increased debugging transparency. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 55–69. IEEE (2015)

    Google Scholar 

  13. Chen, B., Xiao, N., Cai, Z., et al.: Prefetch mechanism for on-demand software deployment in virtual machine environments. J. Softw. 21(12), 3186–3198 (2010)

    Article  Google Scholar 

  14. Zhong, Y.Q.: Study on performance optimization based on web caching and prefetching technique. Jiangxi University of Science and Technology (2014)

    Google Scholar 

  15. Griffioen, J., Appleton, R.: Reducing file system latency using a predictive approach. In: USENIX Summer, pp. 197–207 (1994)

    Google Scholar 

  16. Chang, W., Zheng, H., Wu, J.: On the RSU-based secure distinguishability among vehicular flows. In: 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6. IEEE (2017)

    Google Scholar 

  17. Wei, C., Jie, W.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)

    Article  Google Scholar 

  18. Luo, E., Liu, Q., Abawajy, J.H., Wang, G.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)

    Article  Google Scholar 

  19. Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)

    Article  Google Scholar 

  20. Zhang, S., Choo, K.K.R., Liu, Q., Wang, G.: Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future

  21. Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 1–13 (2017). https://doi.org/10.1007/s00500-017-2676-6

  22. Hypervisor. https://zh.wikipedia.org/wiki/Hypervisor

Download references

Acknowledgments

This work is supported in part by the Changsha Science and Technology Project of Changsha Science and Technology Bureau No. kq1701089, in part by the National Natural Science Foundation of China under Grants Nos. 61632009, 61772194 and 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01. The authors would like to thank the anonymous reviewers, guest editors and the participants of this project for their helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhe Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, L., Qi, F., Wang, G., Tang, Z. (2017). Module-Level Software Streaming Loading Model Based on Hypervisor. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics