Virtual Private Computing

نویسندگان

  • Martin Steckermeier
  • Franz Hauck
چکیده

There is still no widely accepted system to exploit the capabilities offered by the tremendously grown number of computers connected to the Internet or to large intranets. Missing abstractions as well as deficiencies of software development prevent the effective use of more than two computers by standard applications. The architecture that is presented in this report overcomes these problems by creating a vision of a Virtual Private Computer, which combines all participating machines and presents them as a large, omnipresent computer. Beside several services that are essential to realize this system, a programming model is introduced that supports the development of applications that are composed of components, which can be automatically distributed over the virtual computer. Several examples will show how this architecture is capable of realizing all usual distribution paradigms, and how it supports fully distributed applications. Moreover the paper indicates how applications and special areas like mobile computing can benefit from such a system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Genetic Based Resource Management Algorithm Considering Energy Efficiency in Cloud Computing Systems

Cloud computing is a result of the continuing progress made in the areas of hardware, technologies related to the Internet, distributed computing and automated management. The Increasing demand has led to an increase in services resulting in the establishment of large-scale computing and data centers, in addition to high operating costs and huge amounts of electrical power consumption. Insuffic...

متن کامل

Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing UMBC Computer Science Technical Report Number TR-CS-10-04

Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Vi...

متن کامل

Proposed Architecture For Implementing Privacy In Cloud Computing Using Grids And Virtual Private Network

Cloud computing technology use central server and provide applications as services to users. The organization can take advantage of reducing the cost of hardware and software ownership and maintenance. Many surveys proved cloud computing reduces total cost of ownership. But due to centralized server approach there is always risk to system security. All applications required by different set of ...

متن کامل

To Propose A Novel Technique to Isolate and Detect Virtual Side Channel Attack in Cloud Computing

Cloud computing is one of the most important technology of networking which is widely used in these days. Cloud computing has some security issue also. There are several types of attacks which can be launch on cloud very easily and has many serious effects on the network. This paper discussed the proposed scheme to overcome the adversary effects of virtual side channel effects. Keywords— Privat...

متن کامل

A Near Optimal Approach in Choosing The Appropriate Physical Machines for Live Virtual Machines Migration in Cloud Computing

Migration of Virtual Machine (VM) is a critical challenge in cloud computing. The process to move VMs or applications from one Physical Machine (PM) to another is known as VM migration. In VM migration several issues should be considered. One of the major issues in VM migration problem is selecting an appropriate PM as a destination for a migrating VM. To face this issue, several approaches are...

متن کامل

A Trust Management System in Mobile Enterprise Networking

Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise’s virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999