Comparative Study on Virtual Machine Monitors for Cloud

被引:0
|
作者
Kolhe, Sneha [1 ]
Dhage, Sudhir [2 ]
机构
[1] Mahatma Gandhi Mission, Dept Comp Engn, Navi Mumbai, India
[2] Sardar Patel Inst Technol, Dept Comp Engn, Bombay, Maharashtra, India
关键词
Cloud computing; KVM; VMM; Qemu; KSM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud Computing is the distributed architecture in which scalable resources are used to provide computing services to user using virtualization concept. Cloud requires virtual machine for accessing any guest operating system at local desktop, this is handled by software interface such as Virtual Machine Monitor (VMM) or hypervisor. This paper reveals not only its features,architecture, working but also comparative analysis of Kernel Virtual Machine (KVM) and Xen using various benchmarking tools. Paper also explains test analysis of measuring CPU performance, network speed and disk access. From this analysis which hypervisor has to be used for the implementation of cloud computing system for getting better performance is decided.
引用
收藏
页码:425 / 430
页数:6
相关论文
共 50 条
  • [1] Comparative Study of the Virtual Machine Scheduling Approaches in Cloud Environment
    Rawat, Pradeep Singh
    Bhadoria, Robin Singh
    Gupta, Punit
    [J]. SMART SYSTEMS: INNOVATIONS IN COMPUTING (SSIC 2021), 2022, 235 : 411 - 418
  • [2] Separation Virtual Machine Monitors
    McDermott, John
    Montrose, Bruce
    Li, Margery
    Kirby, James
    Kang, Myong
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 419 - 428
  • [3] Using Virtual Machine Monitors to Overcome the Challenges of Monitoring and Managing Virtualized Cloud Infrastructures
    Bamiah, Mervat Adib
    Brohi, Sarfraz Nawaz
    Chuprat, Suriayati
    [J]. FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS, 2012, 8349
  • [4] On the Impossibility of Detecting Virtual Machine Monitors
    Gueron, Shay
    Seifert, Jean-Pierre
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 143 - 151
  • [5] Rethinking the design of virtual machine monitors
    Whitaker, A
    Cox, RS
    Shaw, M
    Gribble, SD
    [J]. COMPUTER, 2005, 38 (05) : 57 - +
  • [6] Scheduling I/O in Virtual Machine Monitors
    Ongaro, Diego
    Cox, Alan L.
    Rixner, Scott
    [J]. VEE'08: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON VIRTUAL EXECUTION ENVIRONMENTS, 2008, : 1 - 10
  • [7] Lightweight monitors for the Java']Java virtual machine
    Yang, BS
    Moon, SM
    Ebcioglu, K
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2005, 35 (03): : 281 - 299
  • [8] Noninterference policy for trusted virtual machine monitors
    Huang Qiang
    Shen Changxiang
    Fang Yanxiang
    [J]. 2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2595 - +
  • [9] Fast Software Rejuvenation of Virtual Machine Monitors
    Kourai, Kenichi
    Chiba, Shigeru
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 839 - 851
  • [10] Performance Measuring and Comparing of Virtual Machine Monitors
    Che, Jianhua
    He, Qinming
    Gao, Qinghua
    Huang, Dawei
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 381 - 386