Improving the Security of Commodity Hypervisors for Cloud Computing
|
|
|
- Abigail Sullivan
- 10 years ago
- Views:
Transcription
1 Improving the Security of Commodity Hypervisors for Cloud Computing Anh Nguyen 1, Himanshu Raj, Shravan Rayanchu 2, Stefan Saroiu, and Alec Wolman 1 UIUC, 2 U. of Wisconsin, and MSR
2 Today s cloud computing hypervisors have very large trusted computing bases!
3 Hyper-V Architecture Root VM (Dom0) Child VM (Dom1) Hypervisor
4 Hyper-V Architecture Root VM (Dom0) Child VM (Dom1) TCB Hypervisor
5 How Large is the TCB? Hypervisor Xen Hyper-V Lines of Code 250 KLOC 100+ KLOC OS Linux Windows Server 2008 Lines of Code 11.2 MLOC 50 MLOC TCB of commodity hypervisors consists of tens of millions of lines of code!
6 Two Classes of Attacks 1. Attacks from guest VMs Cases of malicious customer software already documented: On Amazon EC2, customer sent spam & launch DoS 2. Physical attacks Many already have access to locked datacenters Providers are starting to outsource to 3 rd -parties Code offload servers deployed in coffee shops, mall areas
7 Two Classes of Attacks 1. Attacks from guest VMs Cases of malicious customer software already documented: On Amazon EC2, customer sent spam & launch DoS 2. Physical attacks Many already have access to locked datacenters Providers are starting to outsource to 3 rd -parties Code offload servers deployed in coffee shops, mall areas
8 Outline Motivation Requirements and design alternatives Design of Bunker-V Conclusions
9 Req#1: Hypervisors Must Accommodate Legacy OSes Year OS Supported by Amazon EC RedHat 2008 Solaris, Oracle Linux, Win Server Win Server 2008 Future Fedora, opensuse, Gentoo, Ubuntu, Debian Future cloud computing goal: hosting home desktops
10 Req#2: High Performance Performance remains critical for cloud computing hypervisors: Higher degree of multiplexing $$$ The need for high performance is making the cloud push its computation closer to the edge Cloudlets for code offload
11 Summary of Requirements Cloud hypervisors must: 1. Be secure 2. Accommodate legacy OSes 3. Have high performance Next, we look at hypervisor alternatives
12 Alt#1: Tiny Hypervisors Recent project built a hypervisor in 7889 LoC! Can run legacy OS! Remove full-fledged OS from root VM Drawback: must compromise on functionality Can t run more than one VM at a time Refs: SecVisor[SOSP 07], TrustVisor[Oakland 10]
13 Alt#2: Disaggregated Hypervisors Improves security: Any exploit remains isolated in one compartment However, it does not reduce the size of TCB We suspect TCB is even larger to include interface code among compartments Refs: NOVA[Eurosys 10], S. Hand s group[oasis 04, VEE 08]
14 Our Approach: Bunker-V Bunker-V: reduce TCB s attack surface by minimizing the interface between the TCB and guest VMs Even if vulnerability exists inside TCB, system remains secure as long as attacker cannot exploit it Re-think the design of a hypervisor for cloud scenario: eliminate unnecessary virtual devices
15 Outline Motivation Requirements and design alternatives Design of Bunker-V Conclusions
16 Virtual Devices: Interface btw. Root & Child VMs Virtual Devices Root VM (Dom0) Physical Devices Child VM (Dom1) Hypervisor
17 Categories of Virtual Devices (vdev) Extraneous vdevs: not needed in the cloud e.g., floppy, keyboard, mouse, monitor, serial port Legacy vdevs: not needed in the cloud, but OS cannot boot without them e.g., keyboard controller, PIT, ISA bus Required vdevs: needed to run in the cloud e.g., storage, NIC, PIC, PCI bus
18 Categories of Virtual Devices (vdev) Extraneous vdevs: not needed in the cloud e.g., floppy, keyboard, mouse, monitor, serial port Legacy vdevs: not needed in the cloud, but OS cannot boot without them e.g., keyboard controller, PIT, ISA bus Required vdevs: needed to run in the cloud e.g., storage, NIC, PIC, PCI bus
19 Bunker-V s Interface
20 Challenge: Handle Guest OS Booting Approach: delusional boot Boot OS on a separate node: Separate node has legacy vdevs enabled Separate node is isolated from datacenter
21 Conclusions Bunker-V improves security of hypervisors for cloud computing: 79% reduction of TCB s interfaces Can run legacy OSes with high performance Delusional Boot: new technique for booting legacy OSes in the absence of many devices
22 Questions?
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center
Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE Overview IT Network Global Solutions Division UNIVERGE Support Center ProgrammableFlow API architecture Microsoft VSEM Provider Third
Xen Cloud Platform Update
Xen Cloud Platform Update John Garbutt Senior Software Developer, Cloud, Citrix @johngarbutt What is Xen Cloud Platform? The Xen Hypervisor was designed for the Cloud straight from the outset! What is
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors
Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors Rafal Wojtczuk [email protected] 27 Jul 2014 Summary Hypervisors have become a key element of both cloud and client computing.
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS. Rafal Wojtczuk <[email protected]>
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk Agenda About the speaker Types of hypervisors Attack surface Examples of past and
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
OVERVIEW. The complete IaaS platform for service providers
OVERVIEW The complete IaaS platform for service providers The complete IaaS platform for service providers With OnApp you can sell more services, automate more of your infrastructure and extend your reach
Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
Overview. The OnApp Cloud Platform. Dashboard APPLIANCES. Used Total Used Total. Virtual Servers. Blueprint Servers. Load Balancers.
Overview The OnApp Cloud Platform Dashboard APPLIANCES Virtual Servers Blueprint Servers Load Balancers Bare Metal Smart Servers Hypervisors Assets Integrated Storage COMPONENTS DNS Templates Blueprints
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Detection of virtual machine monitor corruptions
Detection of virtual machine monitor corruptions Benoît Morgan, Eric Alata, Vincent Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) Team Journée SEC 2 - June 30th, 2015 Detection of
How To Install Eucalyptus (Cont'D) On A Cloud) On An Ubuntu Or Linux (Contd) Or A Windows 7 (Cont') (Cont'T) (Bsd) (Dll) (Amd)
Installing Eucalyptus Past, Present, and Future Eucalyptus Overview Most widely deployed software platform for on-premise IaaS clouds 25,000+ cloud starts as of mid 2011 AWS-compatible, enterprise-deployed
x86 Servers and Operating Systems - Information applicable for PRIMEQUEST (PQ) and PRIMERGY (PY) Servers PY RX300 S8 PY RX200 S8 PY CX272 S1
program Fujitsu will provide technical support for the system-specific server drivers and ServerView PQ 2400E2 PQ 2400E3 PQ 2800B2 PQ 2800B3 PQ 2800E2 PQ 2800E3 PY BX2560 M1 PY BX2560 M2 PY BX2580 M1 Asianux
Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor
ASPE RESOURCE SERIES Virtualization 101 Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor Real Skills. Real Results. Real IT. in partnership with Virtualization 101
Xen Virtualization: Xen (source) and XenServer
Xen Virtualization: Xen (source) and XenServer An introduction to free and commercial methods of creating virtual servers by Mark Sallee, Sys Admin, NCAR " Why Virtualization? Scenario: imagine that you
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Development of Type-2 Hypervisor for MIPS64 Based Systems
Development of Type-2 Hypervisor for MIPS64 Based Systems High Performance Computing and Networking Lab Al-Khwarizmi Institute of Computer Science University of Engineering & Technology Lahore Pakistan
Windows Server 2008 R2 Hyper V. Public FAQ
Windows Server 2008 R2 Hyper V Public FAQ Contents New Functionality in Windows Server 2008 R2 Hyper V...3 Windows Server 2008 R2 Hyper V Questions...4 Clustering and Live Migration...5 Supported Guests...6
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Deep Security 9.6 SP1 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Cooperation of Operating Systems with Hyper-V. Bartek Nowierski ([email protected]) Software Development Engineer, Hyper-V Microsoft Corporation
Cooperation of Operating Systems with Hyper-V Bartek Nowierski ([email protected]) Software Development Engineer, Hyper-V Microsoft Corporation Presentation Agenda Hyper-V V Architecture Integration
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
SCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
SURFnet Cloud Computing Solutions
Marvin Rambhadjan Arthur Schutijser SURFnet February 3, 2010 Overview Introduction Cloud Computing Introduction Cloud Computing What is Cloud Computing? Resource Pooling Resources are bundled High Level
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
The Virtual Environment
Chapter 2 The Virtual Environment In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Cloud computing security
Cloud computing security Exploring information leakage in third-party compute clouds Yangchun Fu November 18 th, 2011 Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm
Operating Systems Virtualization mechanisms
Operating Systems Virtualization mechanisms René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Contents 1 Introduction 2 Hardware Virtualization mechanisms
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
VX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at:
Openstack. Cloud computing with Openstack. Saverio Proto [email protected]
Openstack Cloud computing with Openstack Saverio Proto [email protected] Lugano, 23/03/2016 Agenda SWITCH role in Openstack and Cloud Computing What is Virtualization? Why is Cloud computing more
Cloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
Deep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
OnApp Cloud. The complete platform for cloud service providers. 114 Cores. 286 Cores / 400 Cores
OnApp Cloud The complete platform for cloud service providers 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete platform for cloud service providers OnApp software turns your datacenter into an
Creating a Linux Virtual Machine using Virtual Box
A. Install Virtual Box: Creating a Linux Virtual Machine using Virtual Box 1. Download the Virtualbox installer http://www.virtualbox.org/wiki/downloads 2. Run the installer and have the installer complete.
Introduction to OpenStack
Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa [email protected] Cloud Computing - Definition Cloud Computing is a term coined to refer
FIA Athens 2014 [email protected] ~OKEANOS: A LARGE EUROPEAN PUBLIC CLOUD BASED ON SYNNEFO. VANGELIS KOUKIS, TECHNICAL LEAD, ~OKEANOS
~OKEANOS: A LARGE EUROPEAN PUBLIC CLOUD BASED ON SYNNEFO. VANGELIS KOUKIS, TECHNICAL LEAD, ~OKEANOS 1 Fact 1 NRENs and Europe need to decide on how to deliver cloud services Brokering between 3 rd party
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
OGF25/EGEE User Forum Catania, Italy 2 March 2009
OGF25/EGEE User Forum Catania, Italy 2 March 2009 Constantino Vázquez Blanco Javier Fontán Muiños Raúl Sampedro Distributed Systems Architecture Research Group Universidad Complutense de Madrid 1/31 Outline
Software. Programming Language. Software. Instructor Özgür ZEYDAN. Bülent Ecevit University Department of Environmental Engineering
Computer Bülent Ecevit University Department of Environmental Engineering Case & Inside units Hardware Peripherals Operating Systems Application : Instructions for the computer. A series of instructions
Deploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
x86 Servers and Operating Systems - Information applicable for PRIMEQUEST (PQ) and PRIMERGY (PY) Servers PY RX300 S8 PY RX200 S8 PY CX272 S1
program Fujitsu will provide technical support for the system-specific server drivers and ServerView PQ 2400E2 PQ 2400E3 PQ 2800B2 PQ 2800B3 PQ 2800E2 PQ 2800E3 PY BX2560 M1 PY BX2560 M2 PY BX2580 M1 Asianux
Virtualization Technologies. Embrace the new world of healthcare
Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
Elastic Management of Cluster based Services in the Cloud
First Workshop on Automated Control for Datacenters and Clouds (ACDC09) June 19th, Barcelona, Spain Elastic Management of Cluster based Services in the Cloud Rafael Moreno Vozmediano, Ruben S. Montero,
An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability
An Oracle White Paper August 2011 Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability Note This whitepaper discusses a number of considerations to be made when
Course Title: Virtualization Security, 1st Edition
Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised
Understanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia
OPEN SOURCE VIRTUALIZATION TRENDS SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia WHAT I WILL BE TALKING ON? Introduction to Virtualization Full Virtualization, Para Virtualization
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches
Privacy Protection in Virtualized Multi-tenant Cloud: Software and Hardware Approaches Haibo Chen Institute of Parallel and Distributed Systems Shanghai Jiao Tong University http://ipads.se.sjtu.edu.cn/haibo_chen
OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud
OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud June 16, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. 1 [email protected] Table of Contents Executive Summary.. 3 What
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642
Cloud security CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642 Announcements Take- home final versus in- class Homework
DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION
DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION Dr. Taieb Znati Computer Science Department University of Pittsburgh Fall 2014 Thoughts on Cloud Computing A way to increase capacity or add capabilities
The Review of Virtualization in an Isolated Computer Environment
The Review of Virtualization in an Isolated Computer Environment Sunanda Assistant professor, Department of Computer Science & Engineering, Ludhiana College of Engineering & Technology, Ludhiana, Punjab,
VIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies
Server-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
Hyper-V vs ESX at the datacenter
Hyper-V vs ESX at the datacenter Gabrie van Zanten www.gabesvirtualworld.com GabesVirtualWorld Which hypervisor to use in the data center? Virtualisation has matured Virtualisation in the data center grows
Securing Your Cloud with Xen Project s Advanced Security Features
Securing Your Cloud with Xen Project s Advanced Security Features Russell Pavlicek, Xen Project Evangelist CloudOpen North America 2013 Who is the Old, Fat Geek Up Front? Xen Project Evangelist Employed
Quantum Hyper- V plugin
Quantum Hyper- V plugin Project blueprint Author: Alessandro Pilotti Version: 1.0 Date: 01/10/2012 Hyper-V reintroduction in OpenStack with the Folsom release was primarily focused
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
Enterprise Cloud VM Image Import User Guide. Version 1.0
Enterprise Cloud VM Image Import User Guide Version 1.0 Version History Issue Date Comments 1.0 2013/03/20 Initial version i Introduction 1) Purpose of this document: The purpose of this document is to
Restricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
EEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing
EEDC Execution Environments for Distributed Computing 34330 Master in Computer Architecture, Networks and Systems - CANS Scalability Study of web apps in AWS Sergio Mendoza [email protected]
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected]
CSE 501 Monday, September 09, 2013 Kevin Cleary [email protected] What is Virtualization? Practical Uses What can be virtualized Popular virtualization products Demo Question, answer, discussion Can
How To Get A Cloud Security System To Work For You
Trust in the Cloud Ovidiu Pismac MCSE Security, CISSP, MCSE Private Cloud / Server & Desktop infrastructure, MCTS Forefront Microsoft Romania [email protected] Technology trends: driving cloud adoption
Container Clusters on OpenStack
Container Clusters on OpenStack 和 信 雲 端 首 席 技 術 顧 問 孔 祥 嵐 / Brian Kung [email protected] Outlines VMs vs. Containers N-tier Architecture & Microservices Two Trends Emerging Ecosystem VMs vs.
Dell Networking Solutions Guide for Microsoft Hyper-V
Dell Networking Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION:
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis
Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis William A. R. de Souza and Allan Tomlinson Information Security Group Royal Holloway, University of London Egham Hill,
