Using Virtualization Technology for the User Authorization System

被引:2
|
作者
Polenov, Maxim [1 ]
Guzik, Vyacheslav [1 ]
Lukyanov, Vladislav [1 ]
机构
[1] Southern Fed Univ, Dept Comp Engn, Taganrog, Russia
关键词
Virtualization; Wireless network; Authorization system; Database; Virtual machine; Server;
D O I
10.1007/978-3-319-57141-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper deals with the use of virtualization technology for the development of software system that supports authorization of Wi-Fi networks users. The suggested approach is to use two databases of operators and users, implemented on MySQL, and two subsystems of registration and authorization to be placed on a virtual machine. The paper presents the organization and a general algorithm of the authorization system operation, as well as the load analysis of server with the authorization system. Here considered the graph of hardware resources loads used by the virtual machine. Using the hypervisor allows changing the configuration and provides the possibility to monitor the virtual machine, the necessary disk space, the memory consumption and CPU usage.
引用
收藏
页码:192 / 200
页数:9
相关论文
共 50 条
  • [41] Research of University Disaster Recovery System Based on Virtualization Technology
    Li, Yue
    Sun, Jian
    Zheng, Zheng
    Shen, Hong
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2012, 307 : 110 - +
  • [42] Intel virtualization technology
    Uhlig, R
    Neiger, G
    Rodgers, D
    Santoni, AL
    Martins, FCM
    Anderson, AV
    Bennett, SM
    Kägi, A
    Leung, FH
    Smith, L
    COMPUTER, 2005, 38 (05) : 48 - +
  • [43] An approach to a trustworthy system architecture using virtualization
    Stumpf, Frederic
    Benz, Michael
    Hermanowski, Martin
    Eckert, Claudia
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 191 - +
  • [44] Network virtualization under user control
    Cherkaoui, Omar
    Halima, Elbiaze
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2008, 18 (02) : 147 - 158
  • [45] An Privacy-preserving Cross-organizational Authentication/Authorization/Accounting System using Blockchain Technology
    Lu, Peggy Joy
    Yeh, Lo-Yao
    Huang, Jiun-Long
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [46] A Cross Cloud Authorization Mechanism Using NFC and RBAC Technology
    Chan, Jun-Fu
    Yang, Ta-Chih
    Liaw, Horng Twu
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 239 - 246
  • [47] Using Virtualization Technology for Fault-Tolerant Replication in LAN
    Dettoni, Fernando
    Lung, Lau Cheuk
    Luiz, Aldelir Fernando
    NEW RESULTS IN DEPENDABILITY AND COMPUTER SYSTEMS, 2013, 224 : 131 - 140
  • [48] Using Virtualization and noVNC to Support Assistive Technology in Cloud Computing
    Mulfari, Davide
    Celesti, Antonio
    Villari, Massimo
    Puliafito, Antonio
    2014 IEEE 3RD SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS (NCCA), 2014, : 125 - 132
  • [49] Virtualization in control technology – Virtualization and consolidation of programmable logic controllers
    Susen C.
    Storms S.
    Herfs W.
    WT Werkstattstechnik, 2022, 112 (11-12): : 792 - 796
  • [50] User Isolation in Multi-user Multi-touch Devices Using OS-Level Virtualization
    Lee, Minkyeong
    Lee, Minho
    Kim, Inhyeok
    Eom, Young Ik
    CLOUD COMPUTING (CLOUDCOMP 2015), 2016, 167 : 30 - 38