Privacy-preserving virtual machine checkpointing mechanism
نویسندگان
چکیده
Virtual Machines (VMs) have been widely adopted in cloud platforms to improve server consolidation and reduce operating costs. VM checkpointing is used to capture a persistent snapshot of a running VM and to later restore the VM to a previous state. Although VM checkpointing eases system administration, such as in recovering from a VM crash or undoing a previous VM activity, it can also increase the risk of exposing users’ confidential data. This is because the checkpoint may store a VM’s physical memory pages and disk contents that contain confidential data such as clear text passwords and credit card numbers. This paper presents the design and implementation of SPARC, a Security and Privacy AwaRe virtual machine Checkpointing mechanism. SPARC enables users to selectively exclude users’ confidential data within a VM from being checkpointed. We describe the design challenges in effectively tracking and excluding process-specific memory and disk contents from the checkpoint file for a VM running on the commodity Linux operating system. We also present techniques to track process dependencies due to inter-process communication and to account for such dependencies in SPARC .
منابع مشابه
Fast, Lightweight Virtual Machine Checkpointing
Virtual machine checkpoints provide a clean encapsulation of the full state of an executing system. Due to the large nature of state involved, the process of VM checkpoints can be slow and costly. We describe the implementation of a a fast and lightweight mechanism of VM checkpointing for the Xen virtualization machine monitor that utilizes copy-on-write techniques to reduce the VM’s downtime a...
متن کاملVirtual Machine Based Heterogeneous Checkpointing
Checkpointing an application is the act of saving the application’s state during its execution on stable storage so that if the application fails, it can be restarted from the last saved state, thereby avoiding loss of the work that was already done. A heterogeneous checkpoint/restart mechanism allows to restart an application from a saved state that was taken in a hardware architecture and/or ...
متن کاملPrivacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment
Received Jul 23, 2016 Revised Jun 7, 2017 Accepted Sep 11, 2017 Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as ...
متن کاملDesign Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual Machines
This paper analyzes the usage data from a live deployment of an enterprise client management system based on virtual machine (VM) technology. Over a period of seven months, twenty-three volunteers used VM-based computing environments hosted by the system and created over 800 checkpoints of VM state, where each checkpoint included the virtual memory and disk states. Using this data, we study the...
متن کاملStraightforward Java Persistence Through Checkpointing
Several techniques have been proposed for adding persistence to the Java language environment. This paper describes a system we call icee that works by checkpointing the Java Virtual Machine. We compare the scheme to other persistent Java techniques. Checkpointing offers two unique advantages: first, the implementation is independent of the JVM implementation, and therefore survives JVM updates...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCC
دوره 3 شماره
صفحات -
تاریخ انتشار 2014