A Strong Execution Environment for a Critical Application Even in the Presence of Corrupted Environment
Valarmathi S1, Sathishkumar S2, Venkatesan D3
1Ms. S.Valarmathi, M.E, Department of Computer Science and Enginerring, Srinivasan Enginerring College, Perambalur (Tamil Nadu), India.
2Mr. S.Sathishkumar, Assistant Professor, Department of Information Technology, Srinivasan Enginerring College, Perambalur (Tamil Nadu), India.
3Mr. D.Venkatesan, M.E, Department of Computer science and Enginerring, Srinivasan Enginerring College, Perambalur (Tamil Nadu), India.
Manuscript received on 15 April 2013 | Revised Manuscript received on 22 April 2013 | Manuscript Published on 30 April 2013 | PP: 28-30 | Volume-2 Issue-5, April 2013 | Retrieval Number: E0620032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A strong execution environment is created for a critical application even in the presence of entrusted environment. Generally in an entrusted environment if any application is going to be executed mean suddenly it terminates an application or data loss is occurred. To overcome this drawback some of the existing technique was developed such as variant based and replication technique and it is not much effective because overhead problem is occurred. A new technique called Virtual Machine is going to be developed. In this technique VM is used as a secondary storage to store all the details. Two modes are created one is user mode and another one is kernel mode. In user mode user can view the file name only they do not have the rights to view the file content. In kernel mode only the user have the rights to view the content of the file. Virtual memory monitors and displays the user details that are when the user comes. This technique is mainly used for critical applications such as colleges, bank and hospitals and so on.
Keywords: Memory Corruption, Operating System, Security, Virtual Machine.
Scope of the Article: Vision-based applications