Research Article
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service
Table 3
The test’s results of V-MGSM.
(a) The result of VM1’s first query |
| VM name | | Data (first byte) | | |
| VM1 | L1 | b | H2 | H3 | VM2 | L1 | b | H2 | H2 | VM3 | L1 | e | H1 | H1 |
|
|
(b) The result of VM4’s query |
| VM name | | Data (first byte) | | |
| VM4 | L2 | k | H3 | H3 | VM5 | L2 | m | H2 | H2 |
|
|
(c) The result of VM2’s query |
| VM name | | Data (first byte) | | |
| VM2 | L1 | f | H2 | H2 | VM3 | L1 | e | H1 | H1 |
|
|
(d) The result of VM1’s second query |
| VM name | | Data (first byte) | | |
| VM1 | L1 | f | H2 | H3 | VM2 | L1 | f | H2 | H2 | VM3 | L1 | e | H1 | H1 |
|
|