Abstract
In the existing network computing system, the increasingly serious performance problems and endless security problems constantly troubled users and developers. Although the emergence of transparent computing, edge computing and fog computing alleviates this situation to some extent, they still do not fully utilize the collaborative computing power of server side and end-user. In order to address these problems, a new computing and loading model based on hypervisor, which is also called module-level software streaming loading model, will be introduced in this paper. Besides, Cleanroom Protocol and On-demand Prefetching Mechanism will be discussed in this paper. Based on this model, the system does not need to wait for OS or software data download completely when a device or a program to startup. It means the corresponding services can be immediately directly used or accessed by users. This solution can effectively reduce the waiting time for users and improve the user experience. Through a variety of comparative analyses, this model is proved to be an efficient and safe solution for the future computing and loading infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, Y., Zhou, Y.: Transparent computing: spatio-temporal extension on Von Neumann architecture for cloud services. Tsinghua Sci. Technol. 18(1), 10–21 (2013)
Ming, W.: Analysis and a case study of transparent computing implementation with UEFI. Int. J. Cloud Comput. 1(4), 312–328 (2012)
Oliveros, W.V.A., Festin, C.A.M., Ocampo, R.M.: A P2P network booting scheme using a BitTorrent-like protocol. In: 2013 International Conference on IEEE (2013)
Liang, Z., Chunming, H., Tianyu, W., et al.: Prefetching mechanism for on-demand software streaming. J. Comput. Res. Dev. 48(7), 1178–1189 (2011)
Zhang, Y.H., Li, Y.H., Zheng, W.M.: Cloudow: a SaaS runtime system based on the user-level virtualization technology. SCIENTIA SINICA Informationis 3, 001 (2012)
Li, B., Wo, T.Y., Hu, C.M., et al.: Hidden OS objects correlated detection technology based on VMM. J. Softw. 24(2), 405–420 (2013)
Ren, J.B., Qi, Y., Dai, Y.H., et al.: Transparent privacy protection based on virtual machine monitor. J. Softw. 26(8), 2124–2137 (2015)
Dai, Y., Shi, Y., Qi, Y., et al.: Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture. Front. Comput. Sci. 7(1), 34–43 (2013)
Zhang, Y., Zhou, Y.: TransOS: a transparent computing-based operating system for the cloud. Int. J. Cloud Comput. 1(4), 287–301 (2012)
Zhang, Y., Zhou, Y.: Transparent computing: a new paradigm for pervasive computing. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 1–11. Springer, Heidelberg (2006). https://doi.org/10.1007/11833529_1
Peng, T., Liu, Q., Wang, G.J.: A multilevel access control scheme for data security in transparent computing. Comput. Sci. Eng. 2, PP (2016)
Zhang, F., Leach, K., Stavrou, A., et al.: Using hardware features for increased debugging transparency. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 55–69. IEEE (2015)
Chen, B., Xiao, N., Cai, Z., et al.: Prefetch mechanism for on-demand software deployment in virtual machine environments. J. Softw. 21(12), 3186–3198 (2010)
Zhong, Y.Q.: Study on performance optimization based on web caching and prefetching technique. Jiangxi University of Science and Technology (2014)
Griffioen, J., Appleton, R.: Reducing file system latency using a predictive approach. In: USENIX Summer, pp. 197–207 (1994)
Chang, W., Zheng, H., Wu, J.: On the RSU-based secure distinguishability among vehicular flows. In: 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6. IEEE (2017)
Wei, C., Jie, W.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)
Luo, E., Liu, Q., Abawajy, J.H., Wang, G.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)
Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)
Zhang, S., Choo, K.K.R., Liu, Q., Wang, G.: Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future
Zhang, S., Wang, G., Liu, Q., Abawajy, J.H.: A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 1–13 (2017). https://doi.org/10.1007/s00500-017-2676-6
Hypervisor. https://zh.wikipedia.org/wiki/Hypervisor
Acknowledgments
This work is supported in part by the Changsha Science and Technology Project of Changsha Science and Technology Bureau No. kq1701089, in part by the National Natural Science Foundation of China under Grants Nos. 61632009, 61772194 and 61472451, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006 and High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01. The authors would like to thank the anonymous reviewers, guest editors and the participants of this project for their helpful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Duan, L., Qi, F., Wang, G., Tang, Z. (2017). Module-Level Software Streaming Loading Model Based on Hypervisor. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)