I/O for virtual machine monitors - Security and performance issues

被引:11
|
作者
Karger, Paul A.
Safford, David
机构
[1] IBM T.J. Watson Research Center
关键词
Context switching - Department of Defense - Device Driver - Hypervisions - Para-virtualization - Security and performance - Virtual machine monitors - Virtual processor;
D O I
10.1109/MSP.2008.119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtual machine monitors (VMM) or hypervisor, is a specialized operating system (OS) that creates multiple virtual processors and behave exactly like a real hardware CPU. The Xen VMM popularized the concept of paravirtualization to simplify some aspects of CPU virtualization and I/O virtualization. Studies have demonstrated the feasibility of using hypervisions for the very high levels of security demanded by the Department of Defense projects. Pure isolation VMMs such as PR/SM on zSeries mainframes or systems, allow each guest partition with a dedicated I/O hardware and device drivers, without sharing device between them. The biggest source of performance overhead in a VMM is the cost of context switching into and out of the VMM and between guest partitions. The VMMs can run a full Linux or AIX OS in the special partitions and redirect all I/O requests from guest.
引用
收藏
页码:16 / 23
页数:8
相关论文
共 50 条
  • [31] A Practical Look at Micro-Kernels and Virtual Machine Monitors
    Armand, Francois
    Gien, Michel
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 395 - 401
  • [32] Secure Live Virtual Machine Migration through Runtime Monitors
    Mahfouz, Ahmed M.
    Rahman, Md Lutfar
    Shiva, Sajjan G.
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 184 - 188
  • [33] On Recent Security Issues in Machine Learning
    Alani, Mohammed M.
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 384 - 389
  • [34] An Approach for Virtual Machine Image Security
    Pandey, Anjali
    Srivastava, Shashank
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 616 - 623
  • [35] On State of The Art in Virtual Machine Security
    Chen, Qian
    Mehrotra, Rajat
    Dubey, Abhishek
    Abdelwahed, Sherif
    Rowland, Krisa
    2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,
  • [36] VIRTUAL MACHINE ENVIRONMENT - SECURITY ASPECTS
    WATTAM, KW
    INFORMATION PRIVACY, 1981, 3 (02): : 68 - 74
  • [37] Security reinforcement for Ethereum virtual machine
    Ma, Fuchen
    Ren, Meng
    Fu, Ying
    Wang, Mingzhe
    Li, Huizhong
    Song, Houbing
    Jiang, Yu
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (04)
  • [38] Network Issues in Virtual Machine Migration
    Ibn-Khedher, Hatem
    Abd-Elrahman, Emad
    Afifi, Hossam
    Forestier, Jacky
    2015 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2015), 2015,
  • [39] Security architecture for a virtual heterogeneous machine
    Wright, R
    Shifflett, DJ
    Irvine, CE
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 167 - 177
  • [40] On virtual private networks security design issues
    Cheung, KH
    Misic, J
    COMPUTER NETWORKS, 2002, 38 (02) : 165 - 179