Abstract

ABSTRACT Most applications use Transport Layer Security (TLS) as a default to encrypt network traffic to increase privacy and security. The adversary, however, also used LS encryption to conceal attacks or command-and-control communications. Encryption is essential for deciphering and assessing risks associated with communications. This issue should be resolved in a way that provides effective and covert decryption without compromising overall security. As a result of server consolidation, virtualization has emerged as a key technique for increasing data center energy efficiency. Consolidation of servers relies on the location of virtual machines. The placement of virtual machines has been approached from many different perspectives in recent years. Virtual machine placement approaches, however, only take into account the energy consumption of the physical machines within a data center, not the energy consumption of the communication network. Through the application domain, CVM offers a model-driven, user-centered approach to design, synthesis, and communication solutions by utilizing a fundamentally new method for handling these issues. This proposal discusses the concept, architecture, model languages, design prototypes, and implementation of CVM, arguing that it is a significantly more effective approach to technical communication solutions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call