Module-Level Software Streaming Loading Model Based on Hypervisor

In the existing network computing system, the increasingly serious performance problems and endless security problems constantly troubled users and developers. Although the emergence of transparent computing, edge computing and fog computing alleviates this situation to some extent, they still do not fully utilize the collaborative computing power of server side and end-user. In order to address these problems, a new computing and loading model based on hypervisor, which is also called module-level software streaming loading model, will be introduced in this paper. Besides, Cleanroom Protocol and On-demand Prefetching Mechanism will be discussed in this paper. Based on this model, the system does not need to wait for OS or software data download completely when a device or a program to startup. It means the corresponding services can be immediately directly used or accessed by users. This solution can effectively reduce the waiting time for users and improve the user experience. Through a variety of comparative analyses, this model is proved to be an efficient and safe solution for the future computing and loading infrastructure.

[1]  Yaoxue Zhang,et al.  Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services , 2013 .

[2]  Ying Wang,et al.  Hidden OS Objects Correlated Detection Technology Based on VMM: Hidden OS Objects Correlated Detection Technology Based on VMM , 2013 .

[3]  Yaoxue Zhang,et al.  TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..

[4]  Bin CHEN,et al.  Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments: Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments , 2011 .

[5]  Jie Wu,et al.  Progressive or Conservative: Rationally Allocate Cooperative Work in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Jim Griffioen,et al.  Reducing File System Latency using a Predictive Approach , 1994, USENIX Summer.

[7]  Zhong Liang,et al.  Prefetching Mechanism for On-demand Software Streaming , 2011 .

[8]  YouHui Zhang,et al.  Cloudow: A SaaS runtime system based on the user-level virtu-alization technology , 2012 .

[9]  Yuezhi Zhou,et al.  Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.

[10]  Wo Tian Hidden OS Objects Correlated Detection Technology Based on VMM , 2013 .

[11]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[12]  Wu Ming Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..

[13]  Jemal H. Abawajy,et al.  Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..

[14]  Cai Zhi Prefetch Mechanism for On-Demand Software Deployment in Virtual Machine Environments , 2010 .

[15]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[16]  Cedric Angelo M. Festin,et al.  A P2P Network Booting Scheme Using a BitTorrent-Like Protocol , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[17]  Yong Qi,et al.  Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture , 2012, Frontiers of Computer Science.

[18]  Jie Wu,et al.  On the RSU-based secure distinguishability among vehicular flows , 2017, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS).

[19]  Angelos Stavrou,et al.  Using Hardware Features for Increased Debugging Transparency , 2015, 2015 IEEE Symposium on Security and Privacy.

[20]  Qin Liu,et al.  Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.