CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection

被引:5
|
作者
Qiang, Weizhong [1 ]
Xu, Gongping [1 ]
Dai, Weiqi [1 ]
Zou, Deqing [1 ]
Jin, Hai [1 ]
机构
[1] Huazhong Univ Sci & Technol, Big Data Technol & Syst Lab, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab,Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
来源
IEEE ACCESS | 2017年 / 5卷
基金
中国国家自然科学基金;
关键词
Virtual machine introspection; cloud management; security monitoring;
D O I
10.1109/ACCESS.2017.2758356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The concern regarding cloud security is more severe because many devices are connected to the cloud. It is important to automatically monitor and control these resources and services to efficiently and securely deliver cloud computing. The writable virtual machine introspection (VMI) technique can not only detect the runtime state of a guest VM from the outside but also update the state from the outside without any need for administrator efforts. Thus, the writable VMI technique can provide the benefit of high automation, which is helpful for automated cloud management. However, the existing writable VMI technique produces high overhead, fails to monitor the VMs distributed on different host nodes, and fails to monitor multiple VMs with heterogeneous guest OSes within a cloud; therefore, it cannot be applied for automated and centralized cloud management. In this paper, we present CloudVMI, which is a writable and cross-node monitoring VMI framework that can overcome the aforementioned issues. CloudVMI solves the semantic gap problem by redirecting the critical execution of system calls issued by the VMI program into the monitored VM. It has strong practicability by allowing one introspection program to inspect heterogeneous guest OSes and to monitor VMs distributed on remote host nodes. Thus, CloudVMI can be directly applied for automated and centralized cloud management. Moreover, we implement some defensive measures to secure CloudVMI itself. To highlight the writable capability and practical usefulness of CloudVMI, we implement four applications based on CloudVMI. CloudVMI is designed, implemented, and systematically evaluated. The experimental results demonstrate that CloudVMI is effective and practical for cloud management and that its performance overhead is acceptable compared with existing VMI systems.
引用
收藏
页码:21962 / 21976
页数:15
相关论文
共 50 条
  • [21] A SOUND Approach to Security in Mobile and Cloud-Oriented Environments
    Figueroa, Michael
    Uttecht, Karen
    Rosenberg, Jothy
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [22] CWOM: A lightweight cloud-oriented workflow optimisation middleware
    Xiao, Peng
    [J]. International Journal of Networking and Virtual Organisations, 2021, 24 (01) : 67 - 83
  • [23] MMBIP: Biofeedback System Design on Cloud-Oriented Architecture
    Alhamid, Mohammed F.
    Eid, Mohamad
    Alshareef, Abdulrhman
    El Saddik, Abdulmotaleb
    [J]. 2012 IEEE INTERNATIONAL SYMPOSIUM ON ROBOTIC AND SENSORS ENVIRONMENTS (ROSE 2012), 2012, : 79 - 84
  • [24] A cloud-oriented integrity verification system for audio forensics
    Camacho, Steven
    Ballesteros L, Dora M.
    Renza, Diego
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 259 - 267
  • [25] Virtual Machine Introspection: Techniques and Applications
    Hebbal, Yacine
    Laniepce, Sylvie
    Menaud, Jean-Marc
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 676 - 685
  • [26] A lightweight method for virtual machine introspection
    N. I. Fursova
    P. M. Dovgalyuk
    I. A. Vasil’ev
    V. A. Makarov
    [J]. Programming and Computer Software, 2017, 43 : 307 - 313
  • [27] CloudPhylactor: Harnessing Mandatory Access Control for Virtual Machine Introspection in Cloud Data Centers
    Taubmann, Benjamin
    Rakotondravony, Noelle
    Reiser, Hans P.
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 957 - 964
  • [28] Virtual machine introspection - Observation or interference?
    Nance, Kara
    Hay, Brian
    Bishop, Matt
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 32 - 37
  • [29] ESI-Cloud: Extending Virtual Machine Introspection for Integrating Multiple Security Services
    Ren, Jiangchun
    Liu, Ling
    Zhang, Da
    Zhou, Huaizhe
    Zhang, Qi
    [J]. PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 804 - 807
  • [30] Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection
    Jiang, Fangjie
    Cai, Quanwei
    Guan, Le
    Lin, Jingqiang
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 213 - 230