Provided by: International Journal for Advance Research in Engineering and Technology (IJARET)
Date Added: Jan 2014
A Virtual Machine (VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the user has to redo all of the work in their actual workspace since there is no easy way to commit (i.e., merge) only the benign updates within the VM back to the host environment. A practical application is to allow users to install and try new applications without worrying about malware. In other words, if something abnormal happens, one can simply throw away the infected VM but their proposed system is fault tolerant it roll back to previous position.